-
@ f4db5270:3c74e0d0
2025-01-23 18:09:14Hi Art lover! đ¨đŤđ You may not know it yet but all of the following paintings are available in #Bitcoin on my website: https://isolabell.art/#shop
For info and prices write to me in DM and we will find a good deal! đ¤
ON THE ROAD AGAIN 40x50cm, Oil on canvas Completed January 23, 2025
SUN OF JANUARY 40x50cm, Oil on canvas Completed January 14, 2025
THE BLUE HOUR 40x50cm, Oil on canvas Completed December 14, 2024
LIKE A FRAGMENT OF ETERNITY 50x40cm, Oil on canvas Completed December 01, 2024
WHERE WINTER WHISPERS 50x40cm, Oil on canvas Completed November 07, 2024
L'ATTESA DI UN MOMENTO 40x40cm, Oil on canvas Completed October 29, 2024
LE COSE CHE PENSANO 40x50cm, Oil on paper Completed October 05, 2024
TWILIGHT'S RIVER 50x40cm, Oil on canvas Completed September 17, 2024
GOLD ON THE OCEAN 40x50cm, Oil on paper Completed September 08, 2024
SUSSURRI DI CIELO E MARE 50x40cm, Oil on paper Completed September 05, 2024
THE END OF A WONDERFUL WEEKEND 40x30cm, Oil on board Completed August 12, 2024
FIAMME NEL CIELO 60x35cm, Oil on board Completed July 28, 2024
INIZIO D'ESTATE 50x40cm, Oil on cradled wood panel Completed July 13, 2024
OMBRE DELLA SERA 50x40cm, Oil on cradled wood panel Completed June 16, 2024
NEW ZEALAND SUNSET 80x60cm, Oil on canvas board Completed May 28, 2024
VENICE 50x40cm, Oil on board Completed May 4, 2024
CORNWALL 50x40cm, Oil on board Completed April 26, 2024
DOCKS ON SUNSET 40x19,5cm, Oil on board Completed March 14, 2024
SOLITUDE 30x30cm, Oil on cradled wood panel Completed March 2, 2024
LULLING WAVES 40x30cm, Oil on cradled wood panel Completed January 14, 2024
MULATTIERA IN AUTUNNO 30x30cm, Oil on cradled wood panel
TRAMONTO A KOS 40x40cm, oil on board canvas
HIDDEN SMILE 40x40cm, oil on board
INIZIO D'AUTUNNO 40x40cm, oil on canvas
BOE NEL LAGO 30x30cm, oil on canvas board
BARCHE A RIPOSO 40x40cm, oil on canvas board
IL RISVEGLIO 30x40cm, oil on canvas board
LA QUIETE PRIMA DELLA TEMPESTA 30x40cm, oil on canvas board
LAMPIONE SUL LAGO 30x30cm, oil on canvas board
DUE NELLA NEVE 60x25cm, oil on board
UNA CAREZZA 30x30cm, oil on canvas board
REBEL WAVES 44x32cm, oil on canvas board
THE SCREAMING WAVE 40x30cm, oil on canvas board
"LA DONZELLETTA VIEN DALLA CAMPAGNA..." 30x40cm, oil on canvas board
LIGHTHOUSE ON WHITE CLIFF 30x40cm, oil on canvas board
-
@ 7f29628d:e160cccc
2025-01-07 11:50:30Der gut informierte BĂźrger denkt bei der Pandemie sofort an Intensivstationen, an die Bilder aus Bergamo und erinnert sich an die Berichterstattung damals â also muss es wohl ein Maximum gewesen sein. Manche Skeptiker behaupten jedoch das Gegenteil. Klarheit sollte ein Blick nach Wiesbaden, zum Statistischen Bundesamt, schaffen. SchlieĂlich sitzen dort gut bezahlte Profis, die seit vielen Jahrzehnten die Sterbestatistik pflegen und verĂśffentlichen. Jeder Todesfall wird in Deutschland Ăźber die Standesämter exakt erfasst.
Doch die Ăberraschung: Das Statistische Bundesamt liefert uns auf diese einfache Frage zwei extrem unterschiedliche Antworten â ein Minimum und ein Maximum. Das Ergebnis hängt davon ab, wie tief man in die VerĂśffentlichungen des Bundesamtes eintaucht. Betrachtet man nur die Webseiten und Pressemitteilungen, erhält man den Eindruck eines Maximums. Schaut man jedoch etwas tiefer in die Tabellen und Rohdaten, zeigt sich plĂśtzlich ein Minimum. Aber wie kann das sein? Beides gleichzeitig geht ja wohl kaum. Wer lĂźgt hier â die Tabellen des Amtes oder die Pressemitteilungen? Gehen wir dieser Frage Schritt fĂźr Schritt auf den Grund.
2020: Ein historisches Maximum?
Schauen wir uns die vielen Hundert VerĂśffentlichungen des Statistischen Bundesamtes aus dieser Zeit an. Oder wir kĂźrzen ab und fragen ChatGPT, da die KI auf diesen Daten trainiert wurde und das gesamte Material kennt. Die Frage an ChatGPT lautet also: Wie war das Sterbegeschehen im Jahr 2020 im Vergleich zu den Vorjahren?
ChatGPT antwortet: ÂťIm Jahr 2020 war die Sterblichkeit in Deutschland hĂśher als in den Jahren zuvor. Es gab eine Ăbersterblichkeit von etwa 982.000 Todesfällen, das sind rund 46.000 mehr als der Durchschnitt der Vorjahre (2016 bis 2019). Dieser Anstieg wurde Ăźberwiegend im Zusammenhang mit der COVID-19-Pandemie gesehen. Während die Sterbezahlen in den Vorjahren schwankten, war ein solch signifikanter Anstieg wie 2020 bisher nicht zu beobachten.ÂŤ
Wir fragen konkreter: Ist es ein Fakt, dass wir eine so ernste Lage im Sterbegeschehen wie im FrĂźhjahr 2020 noch nie erlebt haben?
ChatGPT bestätigt: ÂťJa, die COVID-19-Pandemie fĂźhrte im FrĂźhjahr 2020 zu einer auĂergewĂśhnlichen Situation im Sterbegeschehen in Deutschland. Die dramatische Ăbersterblichkeit, die ab der 13. Kalenderwoche auftrat, veranlasste das Statistische Bundesamt, besonders eindringliche Warnungen zu verĂśffentlichen. Der damalige Vizepräsident des Amtes und andere fĂźhrende Stimmen wiesen Ăśffentlich darauf hin, dass die Todesfallzahlen stark vom Durchschnitt abwichen. Diese klare Warnung richtete sich an die Ăffentlichkeit und die Politik gleichermaĂen. Die Medien berichteten intensiv Ăźber diese Warnungen, was das Bewusstsein fĂźr die Schwere der Pandemie erheblich schärfte. In den vergangenen Jahrzehnten hatte es keine vergleichbare Ăbersterblichkeit gegeben, die eine solch umfangreiche Kommunikation durch das Statistische Bundesamt erforderlich gemacht hätte.ÂŤ
Ein gut informierter Zeitungsleser wird sich an dieser Stelle bestätigt fĂźhlen: Ja, so war es damals. Ein Maximum im Sterbegeschehen â wegen der Pandemie. Oder etwa nicht?
2020: Ein historisches Minimum?
Tauchen wir in die Rohdaten des Statistischen Bundesamtes ein. Die Tabellen, die das Amt seit Jahrzehnten verlässlich verÜffentlicht, nennen sich Sterbetafeln. Diese werden jährlich bereitgestellt und stehen auf der Website des Bundesamtes zum Download bereit. Ein erster Blick in die Sterbetafeln mag den Laien abschrecken, doch mit einer kurzen Erklärung wird alles verständlich. Wir gehen schrittweise vor.
Nehmen wir die Sterbetafel des Jahres 2017. Sie enthält zwei groĂe Tabellen â eine fĂźr Männer und eine fĂźr Frauen. Jede Zeile der Tabelle steht fĂźr einen Jahrgang, zum Beispiel zeigt die Zeile 79 die Daten der 79-jährigen Männer. Besonders wichtig ist nun die zweite Spalte, in der der Wert 0,05 eingetragen ist. Das bedeutet, dass 5 Prozent der 79-jährigen Männer im Jahr 2017 verstorben sind. Das ist die wichtige Kennzahl. Wenn wir diesen exakten Wert, den man auch als Sterberate bezeichnet, nun in ein Säulendiagramm eintragen, erhalten wir eine leicht verständliche visuelle Darstellung (Grafik 1).
Es ist wichtig zu betonen, dass dieser Wert weder ein Schätzwert noch eine Modellrechnung oder Prognose ist, sondern ein exakter Messwert, basierend auf einer zuverlässigen Zählung. Sterberaten (fĂźr die Fachleute auch Sterbewahrscheinlichkeiten qx) sind seit Johann Peter SĂźĂmilch (1707â1767) der Goldstandard der Sterbestatistik. Jeder Aktuar wird das bestätigen. FĂźgen wir nun die Sterberaten der 79-jährigen Männer aus den Jahren davor und danach hinzu, um das Gesamtbild zu sehen (Grafik 2). Und nun die entscheidende Frage: Zeigt das Jahr 2020 ein Maximum oder ein Minimum?
Ein kritischer Leser kĂśnnte vermuten, dass die 79-jährigen Männer eine Ausnahme darstellen und andere Jahrgänge im Jahr 2020 ein Maximum zeigen wĂźrden. Doch das trifft nicht zu. Kein einziger Jahrgang verzeichnete im Jahr 2020 ein Maximum. Im Gegenteil: Auch die 1-Jährigen, 2-Jährigen, 3-Jährigen, 9-Jährigen, 10-Jährigen, 15-Jährigen, 18-Jährigen und viele weitere männliche Jahrgänge hatten ihr Minimum im Jahr 2020. Dasselbe gilt bei den Frauen. Insgesamt hatten 31 Jahrgänge ihr Minimum im Jahr 2020. Wenn wir schlieĂlich alle Jahrgänge in einer einzigen Grafik zusammenfassen, ergibt sich ein klares Bild: Das Minimum im Sterbegeschehen lag im Jahr 2020 (Grafik 3).
Ein kritischer Leser kĂśnnte nun wiederum vermuten, dass es innerhalb des Jahres 2020 mĂśglicherweise starke Ausschläge nach oben bei einzelnen Jahrgängen gegeben haben kĂśnnte, die später durch Ausschläge nach unten ausgeglichen wurden â und dass diese Schwankungen in der jährlichen Ăbersicht nicht sichtbar sind. Doch auch das trifft nicht zu. Ein Blick auf die wĂśchentlichen Sterberaten zeigt, dass die ersten acht Monate der Pandemie keine nennenswerten Auffälligkeiten aufweisen. Es bleibt dabei: Die Rohdaten des Statistischen Bundesamtes bestätigen zweifelsfrei, dass die ersten acht Monate der Pandemie das historische Minimum im Sterbegeschehen darstellen. (FĂźr die Fachleute sei angemerkt, dass im gleichen Zeitraum die Lebenserwartung die historischen HĂśchststände erreicht hatte â Grafik 4.)
So konstruierte das Amt aus einem Minimum ein Maximum:
Zur Erinnerung: Die Rohdaten des Statistischen Bundesamtes, die in den jährlichen Sterbetafeln zweifelsfrei dokumentiert sind, zeigen fĂźr das Jahr 2020 eindeutig ein Minimum im Sterbegeschehen. Aus diesen Âťin Stein gemeiĂeltenÂŤ Zahlen ein Maximum zu ÂťkonstruierenÂŤ, ohne die Rohdaten selbst zu verändern, scheint auf den ersten Blick eine unlĂśsbare Aufgabe. Jeder Student wĂźrde an einer solchen Herausforderung scheitern. Doch das Statistische Bundesamt hat einen kreativen Weg gefunden - ein MeisterstĂźck gezielter Manipulation. In fĂźnf Schritten zeigt sich, wie diese Täuschung der Ăffentlichkeit umgesetzt wurde:
(1) Ignorieren der Sterberaten: Die präzisen, objektiven und leicht verständlichen Sterberaten aus den eigenen Sterbetafeln wurden konsequent ignoriert und verschwiegen. Diese Daten widersprachen dem gewßnschten Narrativ und wurden daher gezielt ausgeklammert.
(2) Fokus auf absolute Todeszahlen: Die Aufmerksamkeit wurde stattdessen auf die absolute Zahl der Todesfälle gelenkt. Diese wirkt allein durch ihre schiere GrĂśĂe dramatisch und emotionalisiert die Diskussion. Ein entscheidender Faktor wurde dabei ignoriert: Die absolute Zahl der Todesfälle steigt aufgrund der demografischen Entwicklung jedes Jahr an. Viele Menschen verstehen diesen Zusammenhang nicht und verbinden die steigenden Zahlen fälschlicherweise mit der vermeintlichen Pandemie.
(3) EinfĂźhrung der Ăbersterblichkeit als neue Kennzahl: Erst ab Beginn der âPandemieâ wurde die Kennzahl "Ăbersterblichkeit" eingefĂźhrt â und dies mit einer fragwĂźrdigen Methode, die systematisch ĂźberhĂśhte Werte lieferte. Diese Kennzahl wurde regelmäĂig, oft monatlich oder sogar wĂśchentlich, berechnet und diente als ständige Grundlage fĂźr alarmierende Schlagzeilen.
(4) Intensive Ăffentlichkeitsarbeit: Durch eine breit angelegte Kampagne wurden die manipulativen Kennzahlen gezielt in den Fokus gerĂźckt. Pressemitteilungen, Podcasts und Ăśffentliche Auftritte konzentrierten sich fast ausschlieĂlich auf die absoluten Todeszahlen und die Ăbersterblichkeit. Ziel war es, den Eindruck einer dramatischen Situation in der Ăffentlichkeit zu verstärken.
(5) Bekämpfen kritischer Stimmen: Kritiker, die die Schwächen und manipulativen Aspekte dieser Methoden aufdeckten, wurden systematisch diskreditiert. Ihre Glaubwßrdigkeit und Kompetenz wurden Üffentlich infrage gestellt, um das sorgsam konstruierte Narrativ zu schßtzen.
Ohne diesen begleitenden Statistik-Betrug wäre das gesamte Pandemie-Theater meiner Meinung nach nicht mĂśglich gewesen. Wer aus einem faktischen Minimum ein scheinbares Maximum "erschafft", handelt betrĂźgerisch. Die Folgen dieses Betruges sind gravierend. Denken wir an die Angst, die in der BevĂślkerung geschĂźrt wurde â die Angst, bald sterben zu mĂźssen. Denken wir an Masken, Abstandsregeln, isolierte ältere Menschen, Kinderimpfungen und all die MaĂnahmen, die unter anderem auf diese falsche Statistik zurĂźckgehen.
Wollen wir BĂźrger uns das gefallen lassen?
Wenn wir als BĂźrger zulassen, dass ein derart offensichtlicher und nachprĂźfbarer Täuschungsversuch ohne Konsequenzen bleibt, dann gefährdet das nicht nur die Integrität unserer Institutionen â es untergräbt das Fundament unserer Gesellschaft. In der DDR feierte man Ăśffentlich PlanerfĂźllung und ĂbererfĂźllung, während die Regale leer blieben. Damals wusste jeder: Statistik war ein Propagandainstrument. Niemand traute den Zahlen, die das Staatsfernsehen verkĂźndete.
Während der Pandemie war es anders. Die Menschen vertrauten den Mitteilungen des Statistischen Bundesamtes und des RKI â blind. Die EnthĂźllungen durch den "RKI-Leak" haben gezeigt, dass auch das Robert-Koch-Institut nicht der Wissenschaft, sondern den Weisungen des Gesundheitsministers und militärischen Vorgaben folgte. Warum sollte es beim Statistischen Bundesamt anders gewesen sein? Diese BehĂśrde ist dem Innenministerium unterstellt und somit ebenfalls weisungsgebunden.
Die Beweise fĂźr Täuschung liegen offen zutage. Es braucht keinen Whistleblower, keine geheimen EnthĂźllungen: Die Rohdaten des Statistischen Bundesamtes sprechen fĂźr sich. Sie sind Ăśffentlich einsehbar â klar und unmissverständlich. Die Daten, die Tabellen, die VerĂśffentlichungen des Amtes selbst â sie sind die Anklageschrift. Sie zeigen, was wirklich war. Nicht mehr und nicht weniger.
Und wir? Was tun wir? Schweigen wir? Oder fordern wir endlich ein, was unser Recht ist? Wir BĂźrger dĂźrfen das nicht hinnehmen. Es ist Zeit, unsere BehĂśrden zur Rechenschaft zu ziehen. Diese Institutionen arbeiten nicht fĂźr sich â sie arbeiten fĂźr uns. Wir finanzieren sie, und wir haben das Recht, Transparenz und Verantwortung einzufordern. Manipulationen wie diese mĂźssen aufgearbeitet werden und dĂźrfen nie wieder geschehen. Die Strukturen, die solche Fehlentwicklungen in unseren BehĂśrden ermĂśglicht haben, mĂźssen offengelegt werden. Denn eine Demokratie lebt von Vertrauen â und Vertrauen muss verdient werden. Jeden Tag aufs Neue.
.
.
MARCEL BARZ, Jahrgang 1975, war Offizier der Bundeswehr und studierte Wirtschafts- und Organisationswissenschaften sowie Wirtschaftsinformatik. Er war Grßnder und Geschäftsfßhrer einer Softwarefirma, die sich auf Datenanalyse und Softwareentwicklung spezialisiert hatte. Im August 2021 verÜffentlichte Barz den Videovortrag Die Pandemie in den Rohdaten, der ßber eine Million Aufrufe erzielte. Seitdem macht er als "Erbsenzähler" auf Widersprßche in amtlichen Statistiken aufmerksam.
-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Letâs dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computersâand it has nothing to do with what so-called âquantum coachesâ teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoinâs security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computingâs Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. Itâs a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoinâs Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoinâs blockchain.
- Lamport: Created in 1977, itâs considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoinâs Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the communityâs constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoinâs future is not at riskâit is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodesâthe computers that participate in the Bitcoin networkâagree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effortâprotecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"âaccumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, itâs important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco ItaĂş. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currencyâs use to a 5-kilometer radius around a personâs residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa FamĂlia welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the countryâs Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC â or âdigital yuanâ â the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. Chinaâs CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System âblacklistsâ have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizensâ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
âThe more I read about DREX, the less I want its implementation,â says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizenâs transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, âfreeze balances or even delete funds directly from user accounts.â
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. âToday we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,â he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked â those without regular access to banking services â were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizenâs choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. âHow many more rules will banks create to profit from us?â asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Juliaâs: in a digitalized system, âwith one click, your money could disappear.â She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREXâs advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. âIf the future means control, I prefer to live in the past,â Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. âI am only one deputy, and we need the publicâs support to raise the projectâs visibility,â she explains, encouraging the public to press other parliamentarians and ask them to âpay attention to PL 3341 and the project that prohibits the end of physical money.â The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Braziliansâ financial freedom.
Whatâs at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bankâs CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and itâs up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. âThis agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.â Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanattaâs concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. âMy fear is that this project will pass, and people wonât even understand what is happening.â Therefore, may every citizen at least have the chance to understand whatâs at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messagesâeven those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive informationâbe it personal messages, financial details, or confidential business communicationsâremains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signalâs Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygieneâsuch as using strong passwords and being cautious with personal informationâcan enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ a95c6243:d345522c
2025-01-24 20:59:01Menschen tun alles, egal wie absurd, \ um ihrer eigenen Seele nicht zu begegnen. \ Carl Gustav Jung
Extremer Reichtum ist eine Gefahr fßr die Demokratie, sagen ßber die Hälfte der knapp 3000 befragten Millionäre aus G20-Staaten laut einer Umfrage der Patriotic Millionaires. Ferner stellte dieser Zusammenschluss wohlhabender US-Amerikaner fest, dass 63 Prozent jener Millionäre den Einfluss von Superreichen auf US-Präsident Trump als Bedrohung fßr die globale Stabilität ansehen.
Diese Besorgnis haben 370 Millionäre und Milliardäre am Dienstag auch den in Davos beim WEF konzentrierten Privilegierten aus aller Welt Ăźbermittelt. In einem offenen Brief forderten sie die ÂŤgewählten FĂźhrerÂť auf, die Superreichen â also sie selbst â zu besteuern, um ÂŤdie zersetzenden Auswirkungen des extremen Reichtums auf unsere Demokratien und die Gesellschaft zu bekämpfenÂť. Zum Beispiel kontrolliere eine handvoll extrem reicher Menschen die Medien, beeinflusse die Rechtssysteme in unzulässiger Weise und verwandele Recht in Unrecht.
Schon 2019 beanstandete der bekannte Historiker und Schriftsteller Ruthger Bregman an einer WEF-Podiumsdiskussion die Steuervermeidung der Superreichen. Die elitäre Veranstaltung bezeichnete er als Feuerwehr-Konferenz, bei der man nicht ßber LÜschwasser sprechen darf. Daraufhin erhielt Bregman keine Einladungen nach Davos mehr. Auf seine Aussagen machte der Schweizer Aktivist Alec Gagneux aufmerksam, der sich seit Jahrzehnten kritisch mit dem WEF befasst. Ihm wurde kßrzlich der Zutritt zu einem dreiteiligen Kurs ßber das WEF an der Volkshochschule Region Brugg verwehrt.
Nun ist die Erkenntnis, dass mit Geld politischer Einfluss einhergeht, alles andere als neu. Und extremer Reichtum macht die Sache nicht wirklich besser. Trotzdem hat man Ăźber Initiativen wie Patriotic Millionaires oder Taxmenow bisher eher selten etwas gehĂśrt, obwohl es sie schon lange gibt. Auch scheint es kein Problem, wenn ein Herr Gates fast im Alleingang versucht, globale Gesundheits-, Klima-, Ernährungs- oder BevĂślkerungspolitik zu betreiben â im Gegenteil. Im Jahr, als der Milliardär Donald Trump zum zweiten Mal ins WeiĂe Haus einzieht, ist das Echo in den Gesinnungsmedien dagegen enorm â und uniform, wer hätte das gedacht.
Der neue US-Präsident hat jedoch ÂŤDavos geerdetÂť, wie Achgut es nannte. In seiner kurzen Rede beim Weltwirtschaftsforum verteidigte er seine Politik und stellte klar, er habe schlicht eine ÂŤRevolution des gesunden MenschenverstandsÂť begonnen. Mit deutlichen Worten sprach er unter anderem von ersten MaĂnahmen gegen den ÂŤGreen New ScamÂť, und von einem ÂŤErlass, der jegliche staatliche Zensur beendetÂť:
ÂŤUnsere Regierung wird die ĂuĂerungen unserer eigenen BĂźrger nicht mehr als Fehlinformation oder Desinformation bezeichnen, was die LieblingswĂśrter von Zensoren und derer sind, die den freien Austausch von Ideen und, offen gesagt, den Fortschritt verhindern wollen.Âť
Wie der Trumpismus letztlich einzuordnen ist, muss jeder fßr sich selbst entscheiden. Skepsis ist definitiv angebracht, denn einer von uns sind weder der Präsident noch seine auserwählten Teammitglieder. Ob sie irgendeinen Sumpf trockenlegen oder Staatsverbrechen aufdecken werden oder was aus WHO- und Klimaverträgen wird, bleibt abzuwarten.
Das WHO-Dekret fordert jedenfalls die Ăbertragung der Gelder auf ÂŤglaubwĂźrdige PartnerÂť, die die Aktivitäten Ăźbernehmen kĂśnnten. Zufällig scheint mit ÂŤImpfguruÂť Bill Gates ein weiterer Harris-UnterstĂźtzer kĂźrzlich das Lager gewechselt zu haben: Nach einem gemeinsamen Abendessen zeigte er sich ÂŤbeeindrucktÂť von Trumps Interesse an der globalen Gesundheit.
Mit dem Projekt ÂŤStargateÂť sind weitere dunkle Wolken am Erwartungshorizont der Fangemeinde aufgezogen. Trump hat dieses Joint Venture zwischen den Konzernen OpenAI, Oracle, und SoftBank als das ÂŤgrĂśĂte KI-Infrastrukturprojekt der GeschichteÂť angekĂźndigt. Der Stein des AnstoĂes: Oracle-CEO Larry Ellison, der auch Fan von KI-gestĂźtzter Echtzeit-Ăberwachung ist, sieht einen weiteren potenziellen Einsatz der kĂźnstlichen Intelligenz. Sie kĂśnne dazu dienen, Krebserkrankungen zu erkennen und individuelle mRNA-ÂŤImpfstoffeÂť zur Behandlung innerhalb von 48 Stunden zu entwickeln.
Warum bitte sollten sich diese superreichen ÂŤElitenÂť ins eigene Fleisch schneiden und direkt entgegen ihren eigenen Interessen handeln? Weil sie Menschenfreunde, sogenannte Philanthropen sind? Oder vielleicht, weil sie ein schlechtes Gewissen haben und ihre Schuld kompensieren mĂźssen? Deswegen jedenfalls brauchen ÂŤLinkeÂť laut Robert Willacker, einem deutschen Politikberater mit brasilianischen Wurzeln, rechte Parteien â ein ebenso Ăźberraschender wie humorvoller Erklärungsansatz.
Wenn eine Krähe der anderen kein Auge aushackt, dann tut sie das sich selbst noch weniger an. Dass Millionäre ernsthaft ihre eigene Besteuerung fordern oder Machteliten ihren eigenen Einfluss zugunsten anderer einschränken wĂźrden, halte ich fĂźr sehr unwahrscheinlich. So etwas glaube ich erst, wenn zum Beispiel die RĂźstungsindustrie sich um Friedensverhandlungen bemĂźht, die Pharmalobby sich gegen institutionalisierte Korruption einsetzt, Zentralbanken ihre CBDC-Pläne fĂźr Bitcoin opfern oder der ĂRR die Abschaffung der RundfunkgebĂźhren fordert.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ c631e267:c2b78d3e
2025-01-18 09:34:51Die grauenvollste Aussicht ist die der Technokratie â \ einer kontrollierenden Herrschaft, \ die durch verstĂźmmelte und verstĂźmmelnde Geister ausgeĂźbt wird. \ Ernst JĂźnger
Davos ist nicht mehr sexy, das Weltwirtschaftsforum (WEF) mache Davos kaputt, diese Aussagen eines Einheimischen las ich kßrzlich in der Handelszeitung. Während sich einige vor Ort enorm an der teuersten Gewerbeausstellung der Welt bereicherten, wßrden die negativen Begleiterscheinungen wie Wohnungsnot und Niedergang der lokalen Wirtschaft immer deutlicher.
Nächsten Montag beginnt in dem Schweizer Bergdorf erneut ein Jahrestreffen dieses elitären Clubs der Konzerne, bei dem man mit hochrangigen Politikern aus aller Welt und ausgewählten Vertretern der Systemmedien zusammenhocken wird. Wie bereits in den vergangenen vier Jahren wird die Präsidentin der EU-Kommission, Ursula von der Leyen, in Begleitung von Klaus Schwab ihre Grundsatzansprache halten.
Der deutsche WEF-Grßnder hatte bei dieser Gelegenheit immer hÜchst lobende Worte fßr seine Landsmännin: 2021 erklärte er sich stolz, dass Europa wieder unter Ihrer Fßhrung steht und 2022 fand er es bemerkenswert, was sie erreicht habe angesichts des erstaunlichen Wandels, den die Welt in den vorangegangenen zwei Jahren erlebt habe; es gebe nun einen neuen europäischen Geist.
Von der Leyens Handeln während der sogenannten Corona-ÂŤPandemieÂť lobte Schwab damals bereits ebenso, wie es diese Woche das Karlspreis-Direktorium tat, als man der Beschuldigten im Fall Pfizergate die diesjährige internationale Auszeichnung ÂŤfĂźr Verdienste um die europäische EinigungÂť verlieh. AuĂerdem habe sie die EU nicht nur gegen den ÂŤAggressor RusslandÂť, sondern auch gegen die ÂŤinnere Bedrohung durch Rassisten und DemagogenÂť sowie gegen den Klimawandel verteidigt.
Jene Herausforderungen durch ÂŤKrisen epochalen AusmaĂesÂť werden indes aus dem Umfeld des WEF nicht nur herbeigeredet â wie man alljährlich zur Zeit des Davoser Treffens im Global Risks Report nachlesen kann, der zusammen mit dem Versicherungskonzern Zurich erstellt wird. Seit die Globalisten 2020/21 in der Praxis gesehen haben, wie gut eine konzertierte und konsequente Angst-Kampagne funktionieren kann, geht es Schlag auf Schlag. Sie setzen alles daran, Schwabs goldenes Zeitfenster des ÂŤGreat ResetÂť zu nutzen.
Ziel dieses ÂŤgroĂen UmbruchsÂť ist die totale Kontrolle der Technokraten Ăźber die Menschen unter dem Deckmantel einer globalen GesundheitsfĂźrsorge. Wie aber kĂśnnte man so etwas erreichen? Ein Mittel dazu ist die ÂŤkreative ZerstĂśrungÂť. Weitere unabdingbare Werkzeug sind die Einbindung, ja Gleichschaltung der Medien und der Justiz.
Ein ÂŤGreat Mental ResetÂť sei die Voraussetzung dafĂźr, dass ein GroĂteil der Menschen Einschränkungen und Manipulationen wie durch die Corona-MaĂnahmen praktisch kritik- und widerstandslos hinnehme, sagt der Mediziner und Molekulargenetiker Michael Nehls. Er meint damit eine regelrechte Umprogrammierung des Gehirns, wodurch nach und nach unsere Individualität und unser soziales Bewusstsein eliminiert und durch unreflektierten Konformismus ersetzt werden.
Der aktuelle Zustand unserer Gesellschaften ist auch fĂźr den Schweizer Rechtsanwalt Philipp Kruse alarmierend. Durch den Umgang mit der ÂŤPandemieÂť sieht er die Grundlagen von Recht und Vernunft erschĂźttert, die Rechtsstaatlichkeit stehe auf dem PrĂźfstand. Seiner dringenden Mahnung an alle BĂźrger, die Prinzipien von Recht und Freiheit zu verteidigen, kann ich mich nur anschlieĂen.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que ĂŠ Cwtch? Cwtch (/kĘtĘ/ - uma palavra galesa que pode ser traduzida aproximadamente como âum abraço que cria um lugar seguroâ) ĂŠ um protocolo de mensagens multipartidĂĄrio descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : NĂŁo existe âserviço Cwtchâ ou ârede Cwtchâ. Os participantes do Cwtch podem hospedar seus prĂłprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch ĂŠ aberto e qualquer pessoa ĂŠ livre para criar bots, serviços e interfaces de usuĂĄrio e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch Ê criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguĂŠm sem seu consentimento explĂcito, incluindo mensagens durante a transmissĂŁo e metadados de protocolo
Uma breve histĂłria do bate-papo resistente a metadados Nos Ăşltimos anos, a conscientização pĂşblica sobre a necessidade e os benefĂcios das soluçþes criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuĂĄrios comunicaçþes seguras.
No entanto, essas ferramentas exigem vĂĄrios nĂveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados ââpara obter detalhes sobre como e por que uma pessoa estĂĄ usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados Ê o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicaçþes.
NĂŁo havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. NinguĂŠm alĂŠm das partes envolvidas em uma conversa poderia saber que tal conversa estĂĄ ocorrendo.
Ricochet tinha limitaçþes; não havia suporte para vårios dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuårio enviar mensagens enquanto um contato estå offline.
Isto tornou a adoção do Ricochet uma proposta difĂcil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistĂŞncia aos metadados, sem saber que ela existe.
AlÊm disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensaçþes, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente estå inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiåveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicaçþes sĂŁo explorados por vĂĄrios adversĂĄrios para minar a segurança dos sistemas, para rastrear vĂtimas e para realizar anĂĄlises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estĂŁo em sua infância e faltam pesquisas sobre a construção e a experiĂŞncia do usuĂĄrio de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensĂŁo do protocolo Ricochet resistente a metadados para suportar comunicaçþes assĂncronas de grupos multiponto por meio do uso de infraestrutura anĂ´nima, descartĂĄvel e nĂŁo confiĂĄvel.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverå os vårios riscos conhecidos que o Cwtch tenta mitigar e serå fortemente referenciado no restante do documento ao discutir os vårios subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
à importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; Ê de facto necessårio que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informaçþes que são úteis para facilitar peers e servidores tambÊm são altamente relevantes para adversårios que desejam explorar tais informaçþes.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação Ê criptografado de tal forma que um adversårio Ê praticamente incapaz de quebrå-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
⢠Quem estĂĄ envolvido em uma comunicação? Pode ser possĂvel identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, âesta comunicação envolve Alice, uma jornalista, e Bob, um funcionĂĄrio pĂşblicoâ.
⢠Onde estĂŁo os participantes da conversa? Por exemplo, âdurante esta comunicação, Alice estava na França e Bob estava no CanadĂĄâ.
⢠Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, âBob, um funcionĂĄrio pĂşblico, conversou com Alice ao telefone por uma hora ontem Ă noite. Esta ĂŠ a primeira vez que eles se comunicam.â *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou nĂŁo criptografado pode fornecer informaçþes Ăşteis. Por exemplo, âAlice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outroâ.
⢠Sobre o que ĂŠ a conversa? Mesmo que o conteĂşdo da comunicação seja criptografado, Ă s vezes ĂŠ possĂvel derivar um contexto provĂĄvel de uma conversa sem saber exatamente o que ĂŠ dito, por exemplo, âuma pessoa ligou para uma pizzaria na hora do jantarâ ou âalguĂŠm ligou para um nĂşmero conhecido de linha direta de suicĂdio na hora do jantarâ. 3 horas da manhĂŁ."
AlĂŠm das conversas individuais, tambĂŠm procuramos defender-nos contra ataques de correlação de contexto, atravĂŠs dos quais mĂşltiplas conversas sĂŁo analisadas para obter informaçþes de nĂvel superior:
⢠Relacionamentos: Descobrir relaçþes sociais entre um par de entidades analisando a frequĂŞncia e a duração de suas comunicaçþes durante um perĂodo de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante vĂĄrias horas seguidas.
⢠Cliques: Descobrir relaçþes sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
⢠Grupos vagamente conectados e indivĂduos-ponte: descobrir grupos que se comunicam entre si atravĂŠs de intermediĂĄrios, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
⢠PadrĂŁo de Vida: Descobrir quais comunicaçþes sĂŁo cĂclicas e previsĂveis. Por exemplo, Alice liga para Eve toda segunda-feira Ă noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch nĂŁo fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch sĂŁo mais vulnerĂĄveis ââa ataques baseados em declaraçþes falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo bĂĄsico de um desses ataques ĂŠ o seguinte, embora tambĂŠm existam outros fluxos:
â˘Alice tem um amigo chamado Bob e outro chamado Eve
⢠Eve descobre que Alice tem um amigo chamado Bob
⢠Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não serå idêntica, mas pode enganar alguÊm por alguns minutos)
⢠Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
⢠Eve então muda seu nome em "Eve New Account" para "Bob"
⢠Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declaraçþes falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitå-los Ê os usuårios validarem absolutamente a chave pública. Obviamente, isso não Ê o ideal e, em muitos casos, simplesmente não acontecerå .
Como tal, pretendemos fornecer algumas dicas de experiĂŞncia do usuĂĄrio na interface do usuĂĄrio para orientar as pessoas na tomada de decisĂľes sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuĂĄrios.
Uma nota sobre ataques fĂsicos A Cwtch nĂŁo considera ataques que exijam acesso fĂsico (ou equivalente) Ă mĂĄquina do usuĂĄrio como praticamente defensĂĄveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condiçþes que exigem tal privilĂŠgio e indicaremos onde quaisquer mitigaçþes que implementĂĄmos falharĂŁo.
Um perfil Cwtch.
Os usuĂĄrios podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatĂłrio compatĂvel com Tor.
AlĂŠm do material criptogrĂĄfico, um perfil tambĂŠm contĂŠm uma lista de Contatos (outras chaves pĂşblicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens histĂłricas), uma lista de Grupos (contendo o material criptogrĂĄfico do grupo, alĂŠm de outros dados associados, como apelido do grupo e mensagens histĂłricas).
ConversĂľes entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessĂvel por meio do serviço Onion. Por uma questĂŁo de clareza, muitas vezes rotulamos uma parte como âponto de entradaâ (aquele que hospeda o serviço cebola) e a outra parte como âponto de saĂdaâ (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
⢠Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
⢠Gera uma chave de sessão efêmera usada para criptografar todas as comunicaçþes futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) ĂŠ negĂĄvel offline , ou seja, ĂŠ possĂvel para qualquer parte falsificar transcriçþes desta troca de protocolo apĂłs o fato e, como tal - apĂłs o fato - ĂŠ impossĂvel provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, Ê gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicaçþes do grupo são criptografadas usando esta chave. AlÊm disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite Ê gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando tambĂŠm uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografĂĄ-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch ĂŠ composto por vĂĄrias bibliotecas de componentes menores, cada uma desempenhando um papel especĂfico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligaçþes C para Cwtch para uso em implementaçþes de UI.
TAPIR: Uma VisĂŁo Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
EstĂĄ dividido em vĂĄrias camadas:
⢠Identidade - Um par de chaves ed25519, necessårio para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptogråfica consistente para um par.
⢠ConexĂľes â O protocolo de rede bruto que conecta dois pares. AtĂŠ agora, as conexĂľes sĂŁo definidas apenas atravĂŠs do Tor v3 Onion Services.
⢠Aplicativos - As diversas lógicas que permitem um determinado fluxo de informaçþes em uma conexão. Os exemplos incluem transcriçþes criptogråficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
⢠Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptogråfica compartilhada e o aplicativo peer cwtch principal Ê baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessårio para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptogråfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatĂłrio: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptogrĂĄfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nĂvel superior
O aplicativo de transcrição entrarå em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão Ê baseada em uma e apenas uma transcrição).
Merlin Ê uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto Ê significativamente mais fåcil e menos sujeito a erros do que realizar a transformação manualmente e, alÊm disso, tambÊm fornece suporte natural para:
⢠protocolos multi-round com fases alternadas de commit e desafio;
⢠separação natural de domĂnios, garantindo que os desafios estejam vinculados Ă s afirmaçþes a serem provadas;
⢠enquadramento automĂĄtico de mensagens, evitando codificação ambĂgua de dados de compromisso;
⢠e composição do protocolo, usando uma transcrição comum para vårios protocolos.
Finalmente, o Merlin tambÊm fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintÊtica derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicaçþes entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola atravÊs do Tor.
Criptografia e armazenamento de perfil.
Os perfis sĂŁo armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuĂĄrio (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a Ăşnica maneira de recuperar um perfil ĂŠ recuperando a senha - como tal, nĂŁo ĂŠ possĂvel fornecer uma lista completa de perfis aos quais um usuĂĄrio pode ter acesso atĂŠ inserir uma senha.
Perfis nĂŁo criptografados e a senha padrĂŁo Para lidar com perfis "nĂŁo criptografados" (ou seja, que nĂŁo exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso nĂŁo ĂŠ o ideal, preferirĂamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo especĂfico, mas esses recursos sĂŁo atualmente uma colcha de retalhos - tambĂŠm notamos, ao criar um perfil nĂŁo criptografado, pessoas que usam Cwtch estĂŁo explicitamente optando pelo risco de que alguĂŠm com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a polĂtica de sempre habilitar cacheWidth e/ou cacheHeight mĂĄximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo Ê a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionårios pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer açþes em nĂvel de sistema operacional e ĂŠ um desafio contĂnuo para a segurança mĂłvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch Ê permitir a comunicação em grupo atravÊs de infraestrutura não confiåvel .
Ao contrĂĄrio dos esquemas baseados em retransmissĂŁo, onde os grupos atribuem um lĂder, um conjunto de lĂderes ou um servidor confiĂĄvel de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hĂĄbil (mesmo que os membros estejam offline) - infraestrutura nĂŁo confiĂĄvel tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
⢠O Cwtch Server pode ser usado por vårios grupos ou apenas um.
⢠Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
⢠Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
⢠Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo especĂfico. Observamos aqui que essas propriedades sĂŁo um superconjunto dos objetivos de design das estruturas de Recuperação de Informaçþes Privadas.
Melhorias na Eficiência e Segurança
EficiĂŞncia do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este mÊtodo tem um impacto direto na eficiência da largura de banda, especialmente para usuårios em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens especĂficas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Anålise de Metadados
Essa abordagem permite uma anålise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessþes ao longo do tempo. Essa preocupação Ê mitigada por dois fatores:
- Os perfis podem atualizar suas conexĂľes a qualquer momento, resultando em uma nova sessĂŁo do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso ĂŠ comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluçþes futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficåcia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não Ê uma solução robusta na presença de um adversårio determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessårias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existĂŞncia de todos os tipos de chave. Se o perfil jĂĄ tiver importado o pacote de chaves do servidor anteriormente, todas as chaves sĂŁo consideradas iguais.
Configuração prÊvia do aplicativo para ativar o RelÊ do Cwtch.
No Android, a hospedagem de servidor nĂŁo estĂĄ habilitada, pois essa opção nĂŁo estĂĄ disponĂvel devido Ă s limitaçþes dos dispositivos Android. Essa funcionalidade estĂĄ reservada apenas para servidores hospedados em desktops.
No Android, a Ăşnica forma direta de importar uma chave de servidor ĂŠ atravĂŠs do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo Ê Habilitar a opção de grupo no Cwtch que estå em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configuraçþes do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a prÊ-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
PrĂłximo passo ĂŠ Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta estĂĄ protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderĂĄ acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis sĂŁo armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuĂĄrio (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a Ăşnica maneira de recuperar um perfil ĂŠ recuperando a chave da senha - como tal, nĂŁo ĂŠ possĂvel fornecer uma lista completa de perfis aos quais um usuĂĄrio pode ter acesso atĂŠ inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O prĂłximo passo ĂŠ adicionar o FuzzBot, que ĂŠ um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, vocĂŞ receberĂĄ um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, vocĂŞ serĂĄ automaticamente conectado ao servidor Cwtch. VocĂŞ pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dĂşvidas sobre o aplicativo e outros assuntos. Depois, vocĂŞ pode configurar seu prĂłprio servidor Cwtch, o que ĂŠ altamente recomendĂĄvel.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora vocĂŞ pode utilizar o aplicativo normalmente. Algumas observaçþes que notei: se houver demora na conexĂŁo com outra pessoa, ambas devem estar online. Se ainda assim a conexĂŁo nĂŁo for estabelecida, basta clicar no Ăcone de reset do Tor para restabelecer a conexĂŁo com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch vocĂŞ pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatĂłrio compatĂvel com a Rede Tor.
Este ĂŠ o identificador que vocĂŞ pode fornecer Ă s pessoas e que elas podem usar para entrar em contato com vocĂŞ via Cwtch.
Cwtch permite criar e gerenciar vårios perfis separados. Cada perfil estå associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirå a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lĂĄpis ao lado do perfil que vocĂŞ deseja editar
-
Role para baixo atĂŠ a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocarĂĄ uma cĂłpia do perfil no local indicado. Este arquivo ĂŠ criptografado no mesmo nĂvel do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentarĂĄ descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerĂĄ na tela Gerenciamento de perfil e estarĂĄ pronto para uso.
OBSERVAĂĂO Embora um perfil possa ser importado para vĂĄrios dispositivos, atualmente apenas uma versĂŁo de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vĂĄrios dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual Ê a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexþes ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexþes ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que vĂĄrias partes participem de uma Ăşnica conversa usando um servidor nĂŁo confiĂĄvel (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores nĂŁo conseguem saber quantas pessoas estĂŁo em um grupo ou o que estĂĄ sendo discutido. Se vĂĄrios grupos estiverem hospedados em um Ăşnico servidor, o servidor nĂŁo conseguirĂĄ saber quais mensagens pertencem a qual grupo sem a conivĂŞncia de um membro do grupo. Ao contrĂĄrio das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assĂncrona, para que todos num grupo nĂŁo precisem estar online ao mesmo tempo.
Por que os grupos cwtch sĂŁo experimentais? Mensagens em grupo resistentes a metadados ainda sĂŁo um problema em aberto . Embora a versĂŁo que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela ĂŠ bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usĂĄ-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch Ê de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um Ăcone do botĂŁo "Shutdown Cwtch" (com um 'X'). Pressionar este botĂŁo irĂĄ acionar uma caixa de diĂĄlogo e, na confirmação, o Cwtch serĂĄ desligado e todos os perfis serĂŁo descarregados.
Suas doaçþes podem fazer a diferença no projeto Cwtch? O Cwtch ĂŠ um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. AlĂŠm disso, o projeto tambĂŠm desenvolve o Cofre, formulĂĄrios da web criptografados para ajudar mĂştua segura. Suas contribuiçþes apoiam iniciativas importantes, como a divulgação de violaçþes de dados mĂŠdicos em Vancouver e pesquisas sobre a segurança do voto eletrĂ´nico na SuĂça. Ao doar, vocĂŞ estĂĄ ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. AlĂŠm disso, o projeto trabalha em soluçþes inovadoras, como a quebra de segredos atravĂŠs da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E tambĂŠm tem a infraestrutura: toda nossa infraestrutura ĂŠ open source e sem fins lucrativos. Conheça tambĂŠm o Fuzzytags, uma estrutura criptogrĂĄfica probabilĂstica para marcação resistente a metadados. Sua doação ĂŠ crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ a95c6243:d345522c
2025-01-13 10:09:57Ich begann, Social Media aufzubauen, \ um den Menschen eine Stimme zu geben. \ Mark Zuckerberg
Sind euch auch die Tränen gekommen, als ihr Mark Zuckerbergs Wendehals-Deklaration bezßglich der Meinungsfreiheit auf seinen Portalen gehÜrt habt? Rßhrend, oder? Während er frßher die offensichtliche Zensur leugnete und später die Regierung Biden dafßr verantwortlich machte, will er nun angeblich die Zensur auf unseren Plattformen drastisch reduzieren.
Purer Opportunismus ob des anstehenden Regierungswechsels wäre als Klassifizierung viel zu kurz gegriffen. Der jetzige Schachzug des Meta-Chefs ist genauso Teil einer kßhl kalkulierten Business-Strategie, wie es die 180 Grad umgekehrte Praxis vorher war. Social Media sind ein hÜchst lukratives Geschäft. Hinzu kommt vielleicht noch ein bisschen verkorkstes Ego, weil derartig viel Einfluss und Geld sicher auch auf die Psyche schlagen. Verständlich.
ÂŤEs ist an der Zeit, zu unseren Wurzeln der freien MeinungsäuĂerung auf Facebook und Instagram zurĂźckzukehren. Ich begann, Social Media aufzubauen, um den Menschen eine Stimme zu gebenÂť, sagte Zuckerberg.
Welche Wurzeln? Hat der Mann vergessen, dass er von der Ăberwachung, dem Ausspionieren und dem Ausverkauf sämtlicher Daten und digitaler Spuren sowie der Manipulation seiner ÂŤKundenÂť lebt? Das ist knallharter Kommerz, nichts anderes. Um freie MeinungsäuĂerung geht es bei diesem Geschäft ganz sicher nicht, und das war auch noch nie so. Die Wurzeln von Facebook liegen in einem Projekt des US-Militärs mit dem Namen ÂŤLifeLogÂť. Dessen Ziel war es, ÂŤein digitales Protokoll vom Leben eines Menschen zu erstellenÂť.
Der Richtungswechsel kommt allerdings nicht ßberraschend. Schon Anfang Dezember hatte Meta-Präsident Nick Clegg von zu hoher Fehlerquote bei der Moderation von Inhalten gesprochen. Bei der Gelegenheit erwähnte er auch, dass Mark sehr daran interessiert sei, eine aktive Rolle in den Debatten ßber eine amerikanische Fßhrungsrolle im technologischen Bereich zu spielen.
Während Milliardärskollege und Big Tech-Konkurrent Elon Musk bereits seinen Posten in der kommenden Trump-Regierung in Aussicht hat, mĂśchte Zuckerberg also nicht nur seine Haut retten â Trump hatte ihn einmal einen ÂŤFeind des VolkesÂť genannt und ihm lebenslange Haft angedroht â, sondern am liebsten auch mitspielen. KI-Berater ist wohl die gewĂźnschte Funktion, wie man nach einem Treffen Trump-Zuckerberg hĂśrte. An seine Verhaftung dachte vermutlich auch ein weiterer Multimilliardär mit eigener Social Media-Plattform, Pavel Durov, als er Zuckerberg jetzt kritisierte und gleichzeitig warnte.
Politik und Systemmedien drehen jedenfalls durch â was zu viel ist, ist zu viel. Etwas weniger Zensur und mehr Meinungsfreiheit wĂźrden die Freiheit der BĂźrger schwächen und seien potenziell vernichtend fĂźr die Menschenrechte. Zuckerberg setze mit dem neuen Kurs die Demokratie aufs Spiel, das sei eine ÂŤEinladung zum nächsten VĂślkermordÂť, ernsthaft. Die Frage sei, ob sich die EU gegen Musk und Zuckerberg behaupten kĂśnne, BrĂźssel mĂźsse jedenfalls hart durchgreifen.
Auch um die Faktenchecker macht man sich Sorgen. Fßr die deutsche Nachrichtenagentur dpa und die Experten von Correctiv, die (noch) Partner fßr Fact-Checking-Aktivitäten von Facebook sind, sei das ein lukratives Geschäftsmodell. Aber mÜglicherweise werden die Inhalte ohne diese vermeintlichen Korrektoren ja sogar besser. Anders als Meta wollen jedoch Scholz, Faeser und die Tagesschau keine Fehler zugeben und zum Beispiel Correctiv-Falschaussagen einräumen.
Bei derlei dramatischen BefĂźrchtungen wundert es nicht, dass der Ăśffentliche Plausch auf X zwischen Elon Musk und AfD-Chefin Alice Weidel von 150 EU-Beamten Ăźberwacht wurde, falls es irgendwelche RechtsverstĂśĂe geben sollte, die man ihnen ankreiden kĂśnnte. Auch der Deutsche Bundestag war wachsam. Gefunden haben dĂźrften sie nichts. Das Ganze war eher eine Show, viel Wind wurde gemacht, aber letztlich gab es nichts als heiĂe Luft.
Das Anbiedern bei Donald Trump ist indes gerade in Mode. Die Weltgesundheitsorganisation (WHO) tut das auch, denn sie fĂźrchtet um Spenden von Ăźber einer Milliarde Dollar. Eventuell kĂśnnte ja Elon Musk auch hier kĂźnftig aushelfen und der Organisation sowie deren grĂśĂtem privaten FĂśrderer, Bill Gates, etwas unter die Arme greifen. Nachdem Musks KI-Projekt xAI kĂźrzlich von BlackRock & Co. sechs Milliarden eingestrichen hat, geht da vielleicht etwas.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2025-01-03 20:26:47Was du bist hängt von drei Faktoren ab: \ Was du geerbt hast, \ was deine Umgebung aus dir machte \ und was du in freier Wahl \ aus deiner Umgebung und deinem Erbe gemacht hast. \ Aldous Huxley
Das brave Mitmachen und Mitlaufen in einem vorgegebenen, recht engen Rahmen ist gewiss nicht neu, hat aber gerade wieder mal Konjunktur. Dies kann man deutlich beobachten, eigentlich egal, in welchem gesellschaftlichen Bereich man sich umschaut. Individualität ist nur soweit angesagt, wie sie in ein bestimmtes Schema von ÂŤDiversitätÂť passt, und Freiheit verkommt zur WorthĂźlse â nicht erst durch ein gewisses Buch einer gewissen ehemaligen Regierungschefin.
Erklärungsansätze fĂźr solche Entwicklungen sind bekannt, und praktisch alle haben etwas mit Massenpsychologie zu tun. Der Herdentrieb, also der Trieb der Menschen, sich â zum Beispiel aus Unsicherheit oder Bequemlichkeit â lieber der Masse anzuschlieĂen als selbstständig zu denken und zu handeln, ist einer der Erklärungsversuche. Andere drehen sich um Macht, Propaganda, Druck und Angst, also den gezielten Einsatz psychologischer Herrschaftsinstrumente.
Aber wollen die Menschen ßberhaupt Freiheit? Durch Gespräche im privaten Umfeld bin ich diesbezßglich in der letzten Zeit etwas skeptisch geworden. Um die Jahreswende philosophiert man ja gerne ein wenig ßber das Erlebte und ßber die Erwartungen fßr die Zukunft. Dabei hatte ich hin und wieder den Eindruck, die totalitären Anwandlungen unserer Repräsentanten kämen manchen Leuten gerade recht.
ÂŤDesinformationÂť ist so ein brisantes Thema. Davor mĂźsse man die Menschen doch schĂźtzen, hĂśrte ich. Jemand mĂźsse doch zum Beispiel diese ganzen merkwĂźrdigen Inhalte in den Social Media filtern â zur Ukraine, zum Klima, zu Gesundheitsthemen oder zur Migration. Viele wĂźssten ja gar nicht einzuschätzen, was richtig und was falsch ist, sie bräuchten eine FĂźhrung.
Freiheit bedingt Eigenverantwortung, ohne Zweifel. Eventuell ist es einigen tatsächlich zu anspruchsvoll, die Verantwortung fĂźr das eigene Tun und Lassen zu Ăźbernehmen. Oder die persĂśnliche Freiheit wird nicht als ausreichend wertvolles Gut angesehen, um sich dafĂźr anzustrengen. In dem Fall wäre die mangelnde Selbstbestimmung wohl das kleinere Ăbel. Allerdings fehlt dann gemäà Aldous Huxley ein Teil der PersĂśnlichkeit. Letztlich ist natĂźrlich alles eine Frage der Abwägung.
Sind viele Menschen mÜglicherweise schon so eingenordet, dass freiheitliche Ambitionen gar nicht fßr eine ganze Gruppe, ein Kollektiv, verfolgt werden kÜnnen? Solche Gedanken kamen mir auch, als ich mir kßrzlich diverse Talks beim viertägigen Hacker-Kongress des Chaos Computer Clubs (38C3) anschaute. Ich war nicht nur ßberrascht, sondern reichlich erschreckt angesichts der in weiten Teilen mainstream-geformten Inhalte, mit denen ein dankbares Publikum beglßckt wurde. Wo ich allgemein hellere KÜpfe erwartet hatte, fand ich Konformismus und enthusiastisch untermauerte Narrative.
Gibt es vielleicht so etwas wie eine Herdenimmunität gegen Indoktrination? Ich denke, ja, zumindest eine gestärkte Widerstandsfähigkeit. Was wir brauchen, sind etwas gesunder Menschenverstand, offene Informationskanäle und der Mut, sich freier auch zwischen den Herden zu bewegen. Sie tun das bereits, aber sagen Sie es auch dieses Jahr ruhig weiter.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2025-01-01 17:39:51Heute mÜchte ich ein Gedicht mit euch teilen. Es handelt sich um eine Ballade des Üsterreichischen Lyrikers Johann Gabriel Seidl aus dem 19. Jahrhundert. Mir sind diese Worte fest in Erinnerung, da meine Mutter sie perfekt rezitieren konnte, auch als die Kräfte schon langsam schwanden.
Dem originalen Titel ÂŤDie UhrÂť habe ich fĂźr mich immer das Wort ÂŤinnereÂť hinzugefĂźgt. Denn der Zeitmesser â hier vermutliche eine Taschenuhr â symbolisiert zwar in dem Kontext das damalige Zeitempfinden und die UmbrĂźche durch die industrielle Revolution, sozusagen den Zeitgeist und das moderne Leben. Aber der Autor setzt sich philosophisch mit der Zeit auseinander und gibt seinem Werk auch eine klar spirituelle Dimension.
Das Ticken der Uhr und die Momente des Glßcks und der Trauer stehen sinnbildlich fßr das unaufhaltsame Fortschreiten und die Vergänglichkeit des Lebens. Insofern kÜnnte man bei der Uhr auch an eine Sonnenuhr denken. Der Rhythmus der Ereignisse passt uns vielleicht nicht immer in den Kram.
Was den Takt pocht, ist durchaus auch das Herz, unser ÂŤinneres UhrwerkÂť. Wenn dieses Meisterwerk einmal stillsteht, ist es unweigerlich um uns geschehen. Hoffentlich kĂśnnen wir dann dankbar sagen: ÂŤIch habe mein Bestes gegeben.Âť
Ich trage, wo ich gehe, stets eine Uhr bei mir; \ Wieviel es geschlagen habe, genau seh ich an ihr. \ Es ist ein groĂer Meister, der kĂźnstlich ihr Werk gefĂźgt, \ Wenngleich ihr Gang nicht immer dem tĂśrichten Wunsche genĂźgt.
Ich wollte, sie wäre rascher gegangen an manchem Tag; \ Ich wollte, sie hätte manchmal verzÜgert den raschen Schlag. \ In meinen Leiden und Freuden, in Sturm und in der Ruh, \ Was immer geschah im Leben, sie pochte den Takt dazu.
Sie schlug am Sarge des Vaters, sie schlug an des Freundes Bahr, \ Sie schlug am Morgen der Liebe, sie schlug am Traualtar. \ Sie schlug an der Wiege des Kindes, sie schlägt, will's Gott, noch oft, \ Wenn bessere Tage kommen, wie meine Seele es hofft.
Und ward sie auch einmal träger, und drohte zu stocken ihr Lauf, \ So zog der Meister immer groĂmĂźtig sie wieder auf. \ Doch stände sie einmal stille, dann wär's um sie geschehn, \ Kein andrer, als der sie fĂźgte, bringt die ZerstĂśrte zum Gehn.
Dann mĂźĂt ich zum Meister wandern, der wohnt am Ende wohl weit, \ Wohl drauĂen, jenseits der Erde, wohl dort in der Ewigkeit! \ Dann gäb ich sie ihm zurĂźcke mit dankbar kindlichem Flehn: \ Sieh, Herr, ich hab nichts verdorben, sie blieb von selber stehn.
Johann Gabriel Seidl (1804-1875)
-
@ 7e538978:a5987ab6
2024-10-02 13:57:31Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoinâs Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isnât just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but itâs not just about gameplay; itâs about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? Thatâs where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, weâll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Letâs explore how LNbits transforms payment processing and why itâs quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The gameâs current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duelâs efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbitsâ tools means that game developers donât need to worry about building custom payment systems from scratchâthey can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the gameâs developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the gameâs logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Networkâs complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distributionâensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their projectâs needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible natureâeverything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether youâre developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbitsâ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isnât just a payment tool â itâs a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ a95c6243:d345522c
2024-12-21 09:54:49Falls du beim Lesen des Titels dieses Newsletters unwillkßrlich an positive Neuigkeiten aus dem globalen polit-medialen Irrenhaus oder gar aus dem wirtschaftlichen Umfeld gedacht hast, darf ich dich beglßckwßnschen. Diese Assoziation ist sehr lÜblich, denn sie weist dich als unverbesserlichen Optimisten aus. Leider muss ich dich diesbezßglich aber enttäuschen. Es geht hier um ein anderes Thema, allerdings sehr wohl ein positives, wie ich finde.
Heute ist ein ganz besonderer Tag: die Wintersonnenwende. Genau gesagt hat heute morgen um 10:20 Uhr Mitteleuropäischer Zeit (MEZ) auf der Nordhalbkugel unseres Planeten der astronomische Winter begonnen. Was daran so auĂergewĂśhnlich ist? Der kĂźrzeste Tag des Jahres war gestern, seit heute werden die Tage bereits wieder länger! Wir werden also jetzt jeden Tag ein wenig mehr Licht haben.
Fßr mich ist dieses Ereignis immer wieder etwas kurios: Es beginnt der Winter, aber die Tage werden länger. Das erscheint mir zunächst wie ein Widerspruch, denn meine spontanen Assoziationen zum Winter sind doch eher Kälte und Dunkelheit, relativ zumindest. Umso erfreulicher ist der emotionale Effekt, wenn dann langsam die Erkenntnis durchsickert: Ab jetzt wird es schon wieder heller!
NatĂźrlich ist es kalt im Winter, mancherorts mehr als anderswo. Vielleicht jedoch nicht mehr lange, wenn man den Klimahysterikern glauben wollte. Mindestens letztes Jahr hat Väterchen Frost allerdings gleich zu Beginn seiner Saison â und passenderweise während des globalen Ăberhitzungsgipfels in Dubai â nochmal richtig mit der Faust auf den Tisch gehauen. Schnee- und Eischaos sind ja eigentlich in der Agenda bereits nicht mehr vorgesehen. Deswegen war man in Deutschland vermutlich in vorauseilendem Gehorsam schon nicht mehr darauf vorbereitet und wurde glatt lahmgelegt.
Aber ich schweife ab. Die Aussicht auf nach und nach mehr Licht und damit auch Wärme stimmt mich froh. Den Zusammenhang zwischen beidem merkt man in Andalusien sehr deutlich. Hier, wo die Häuser im Winter arg auskĂźhlen, geht man zum Aufwärmen raus auf die StraĂe oder auf den Balkon. Die Sonne hat auch im Winter eine erfreuliche Kraft. Und da ist jede Minute Gold wert.
AuĂerdem ist mir vor Jahren so richtig klar geworden, warum mir das sĂźdliche Klima so sehr gefällt. Das liegt nämlich nicht nur an der Sonne als solcher, oder der Wärme â das liegt vor allem am Licht. Ohne Licht keine Farben, das ist der ebenso simple wie gewaltige Unterschied zwischen einem deprimierenden matschgraubraunen Winter und einem frĂśhlichen bunten. Ein groĂes StĂźck Lebensqualität.
Mir gefällt aber auch die Symbolik dieses Tages: Licht aus der Dunkelheit, ein Wendepunkt, ein Neuanfang, neue MĂśglichkeiten, Ăbergang zu neuer Aktivität. In der winterlichen Stille keimt bereits neue Lebendigkeit. Und zwar in einem Zyklus, das wird immer wieder so geschehen. Ich nehme das gern als ein StĂźck Motivation, es macht mir Hoffnung und gibt mir Energie.
Ăbrigens ist parallel am heutigen Tag auf der sĂźdlichen Halbkugel Sommeranfang. Genau im entgegengesetzten Rhythmus, sich ergänzend, wie Yin und Yang. Das alles liegt an der Schrägstellung der Erdachse, die ist nämlich um 23,4Âş zur Umlaufbahn um die Sonne geneigt. Wir erinnern uns, gell?
Insofern bleibt eindeutig festzuhalten, dass âschräg seinâ ein willkommener, wichtiger und positiver Wert ist. Mit anderen Worten: auch ungewĂśhnlich, eigenartig, untypisch, wunderlich, kauzig, ⌠ja sogar irre, spinnert oder gar âquerâ ist in Ordnung. Das schlieĂt das Denken mit ein.
In diesem Sinne wĂźnsche ich euch allen urige Weihnachtstage!
Dieser Beitrag ist letztes Jahr in meiner Denkbar erschienen.
-
@ a95c6243:d345522c
2024-12-13 19:30:32Das Betriebsklima ist das einzige Klima, \ das du selbst bestimmen kannst. \ Anonym
Eine Strategie zur Anpassung an den Klimawandel hat das deutsche Bundeskabinett diese Woche beschlossen. Da Wetterextreme wie die immer häufiger auftretenden Hitzewellen und Starkregenereignisse oft desastrÜse Auswirkungen auf Mensch und Umwelt hätten, werde eine Anpassung an die Folgen des Klimawandels immer wichtiger. Klimaanpassungsstrategie nennt die Regierung das.
FĂźr die ÂŤVorsorge vor KlimafolgenÂť habe man nun erstmals klare Ziele und messbare Kennzahlen festgelegt. So sei der Erfolg ĂźberprĂźfbar, und das solle zu einer schnelleren Bewältigung der Folgen fĂźhren. Dass sich hinter dem Begriff Klimafolgen nicht Folgen des Klimas, sondern wohl ÂŤFolgen der globalen ErwärmungÂť verbergen, erklärt den Interessierten die Wikipedia. Dabei ist das mit der Erwärmung ja bekanntermaĂen so eine Sache.
Die Zunahme schwerer Unwetterereignisse habe gezeigt, so das Ministerium, wie wichtig eine frĂźhzeitige und effektive Warnung der BevĂślkerung sei. Daher solle es eine deutliche Anhebung der Nutzerzahlen der sogenannten Nina-Warn-App geben.
Die ARD spurt wie gewohnt und setzt die Botschaft zielsicher um. Der Artikel beginnt folgendermaĂen:
ÂŤDie Flut im Ahrtal war ein Schock fĂźr das ganze Land. Um kĂźnftig besser gegen Extremwetter gewappnet zu sein, hat die Bundesregierung eine neue Strategie zur Klimaanpassung beschlossen. Die Warn-App Nina spielt eine zentrale Rolle. Der Bund will die Menschen in Deutschland besser vor Extremwetter-Ereignissen warnen und dafĂźr die Reichweite der Warn-App Nina deutlich erhĂśhen.Âť
Die Kommunen wĂźrden bei ihren ÂŤKlimaanpassungsmaĂnahmenÂť vom Zentrum KlimaAnpassung unterstĂźtzt, schreibt das Umweltministerium. Mit dessen Aufbau wurden das Deutsche Institut fĂźr Urbanistik gGmbH, welches sich stark fĂźr Smart City-Projekte engagiert, und die Adelphi Consult GmbH beauftragt.
Adelphi beschreibt sich selbst als Europas fßhrender Think-and-Do-Tank und eine unabhängige Beratung fßr Klima, Umwelt und Entwicklung. Sie seien global vernetzte Strateg*innen und weltverbessernde Berater*innen und als Vorreiter der sozial-Ükologischen Transformation sei man mit dem Deutschen Nachhaltigkeitspreis ausgezeichnet worden, welcher sich an den Zielen der Agenda 2030 orientiere.
Ăber die Warn-App mit dem niedlichen Namen Nina, die mĂśglichst jeder auf seinem Smartphone installieren soll, informiert das Bundesamt fĂźr BevĂślkerungsschutz und Katastrophenhilfe (BBK). Gewarnt wird nicht nur vor Extrem-Wetterereignissen, sondern zum Beispiel auch vor Waffengewalt und Angriffen, Strom- und anderen Versorgungsausfällen oder Krankheitserregern. Wenn man die Kategorie Gefahreninformation wählt, erhält man eine Dosis von ungefähr zwei Benachrichtigungen pro Woche.
Beim BBK erfahren wir auch einiges Ăźber die empfohlenen Systemeinstellungen fĂźr Nina. Der Benutzer mĂśge zum Beispiel den Zugriff auf die Standortdaten ÂŤimmer zulassenÂť, und zwar mit aktivierter Funktion ÂŤgenauen Standort verwendenÂť. Die Datennutzung solle unbeschränkt sein, auch im Hintergrund. AuĂerdem sei die uneingeschränkte Akkunutzung zu aktivieren, der Energiesparmodus auszuschalten und das Stoppen der App-Aktivität bei Nichtnutzung zu unterbinden.
Dass man so dramatische Ereignisse wie damals im Ahrtal auch anders bewerten kann als Regierungen und Systemmedien, hat meine Kollegin Wiltrud Schwetje anhand der TragĂśdie im spanischen Valencia gezeigt. Das Stichwort ÂŤAgenda 2030Âť taucht dabei in einem Kontext auf, der wenig mit Nachhaltigkeitspreisen zu tun hat.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2024-12-06 18:21:15Die Ungerechtigkeit ist uns nur in dem Falle angenehm,\ dass wir Vorteile aus ihr ziehen;\ in jedem andern hegt man den Wunsch,\ dass der Unschuldige in Schutz genommen werde.\ Jean-Jacques Rousseau
Politiker beteuern jederzeit, nur das Beste fĂźr die BevĂślkerung zu wollen â nicht von ihr. Auch die zahlreichen unsäglichen ÂŤCorona-MaĂnahmenÂť waren angeblich zu unserem Schutz notwendig, vor allem wegen der ÂŤbesonders vulnerablen PersonenÂť. Daher mussten alle mĂśglichen Restriktionen zwangsweise und unter Umgehung der Parlamente verordnet werden.
Inzwischen hat sich immer deutlicher herausgestellt, dass viele jener ÂŤSchutzmaĂnahmenÂť den gegenteiligen Effekt hatten, sie haben den Menschen und den Gesellschaften enorm geschadet. Nicht nur haben die experimentellen Geninjektionen â wie erwartet â massive Nebenwirkungen, sondern Maskentragen schadet der Psyche und der Entwicklung (nicht nur unserer Kinder) und ÂŤLockdowns und Zensur haben Menschen getĂśtetÂť.
Eine der wichtigsten Waffen unserer ÂŤBeschĂźtzerÂť ist die Spaltung der Gesellschaft. Die tiefen Gräben, die Politiker, Lobbyisten und Leitmedien praktisch weltweit ausgehoben haben, funktionieren leider nahezu in Perfektion. Von ihren persĂśnlichen Erfahrungen als Kritikerin der MaĂnahmen berichtete kĂźrzlich eine Schweizerin im Interview mit Transition News. Sie sei schwer enttäuscht und verspĂźre bis heute eine Hemmschwelle und ein seltsames Unwohlsein im Umgang mit ÂŤGeimpftenÂť.
Menschen, die aufrichtig andere schĂźtzen wollten, werden von einer eindeutig politischen Justiz verfolgt, verhaftet und angeklagt. Dazu zählen viele Ărzte, darunter Heinrich Habig, Bianca Witzschel und Walter Weber. Ăber den aktuell laufenden Prozess gegen Dr. Weber hat Transition News mehrfach berichtet (z.B. hier und hier). Auch der Selbstschutz durch Verweigerung der Zwangs-Covid-ÂŤImpfungÂť bewahrt nicht vor dem Knast, wie Bundeswehrsoldaten wie Alexander Bittner erfahren mussten.
Die eigentlich Kriminellen schĂźtzen sich derweil erfolgreich selber, nämlich vor der Verantwortung. Die ÂŤImpfÂť-Kampagne war ÂŤdas grĂśĂte Verbrechen gegen die MenschheitÂť. Trotzdem stellt man sich in den USA gerade die Frage, ob der scheidende Präsident Joe Biden nach seinem Sohn Hunter mĂśglicherweise auch Anthony Fauci begnadigen wird â in diesem Fall sogar präventiv. Gibt es Ăźberhaupt noch einen Rest GlaubwĂźrdigkeit, den Biden verspielen kĂśnnte?
Der Gedanke, den ehemaligen wissenschaftlichen Chefberater des US-Präsidenten und Direktor des National Institute of Allergy and Infectious Diseases (NIAID) vorsorglich mit einem Schutzschild zu versehen, dßrfte mit der vergangenen Präsidentschaftswahl zu tun haben. Gleich mehrere Personalentscheidungen des designierten Präsidenten Donald Trump lassen Leute wie Fauci erneut in den Fokus rßcken.
Das Buch ÂŤThe Real Anthony FauciÂť des nominierten US-Gesundheitsministers Robert F. Kennedy Jr. erschien 2021 und dreht sich um die Machenschaften der Pharma-Lobby in der Ăśffentlichen Gesundheit. Das Vorwort zur rumänischen Ausgabe des Buches schrieb Ăźbrigens CÄlin Georgescu, der Ăberraschungssieger der ersten Wahlrunde der aktuellen Präsidentschaftswahlen in Rumänien. Vielleicht erklärt diese Verbindung einen Teil der Panik im Wertewesten.
In Rumänien selber gab es gerade einen Paukenschlag: Das bisherige Ergebnis wurde heute durch das Verfassungsgericht annuliert und die fĂźr Sonntag angesetzte Stichwahl kurzfristig abgesagt â wegen angeblicher ÂŤaggressiver russischer EinmischungÂť. Thomas OysmĂźller merkt dazu an, damit sei jetzt in der EU das Tabu gebrochen, Wahlen zu verbieten, bevor sie etwas ändern kĂśnnen.
Unsere EmpĂśrung angesichts der Historie von MaĂnahmen, die die Falschen beschĂźtzen und fĂźr die meisten von Nachteil sind, mĂźsste enorm sein. Die Frage ist, was wir damit machen. Wir sollten nach vorne schauen und unsere Energie clever einsetzen. Abgesehen von der Umgehung von jeglichem ÂŤSchutz vor Desinformation und HassredeÂť (sprich: Zensur) wird es unsere wichtigste Aufgabe sein, Gräben zu Ăźberwinden.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2024-11-29 19:45:43Konsum ist Therapie.
Wolfgang JoopUmweltbewusstes Verhalten und verantwortungsvoller Konsum zeugen durchaus von einer wĂźnschenswerten Einstellung. Ob man deswegen allerdings einen grĂźnen statt eines schwarzen Freitags braucht, darf getrost bezweifelt werden â zumal es sich um manipulatorische Konzepte handelt. Wie in der politischen Landschaft sind auch hier die Etiketten irgendwas zwischen nichtssagend und trĂźgerisch.
Heute ist also wieder mal Black Friday, falls Sie es noch nicht mitbekommen haben sollten. Eigentlich haben wir ja eher schon eine ganze Black Week, der dann oft auch noch ein Cyber Monday folgt. Die Werbebranche wird nicht mßde, immer neue Anlässe zu erfinden oder zu importieren, um uns zum Konsumieren zu bewegen. Und sie ist damit sehr erfolgreich.
Warum fallen wir auf derartige Werbetricks herein und kaufen im Zweifelsfall Dinge oder Mengen, die wir sicher nicht brauchen? Pure Psychologie, wßrde ich sagen. Rabattschilder triggern etwas in uns, was den Verstand in Stand-by versetzt. Zusätzlich beeinflussen uns alle mÜglichen emotionalen Reize und animieren uns zum Schnäppchenkauf.
Gedankenlosigkeit und MaĂlosigkeit kĂśnnen besonders bei der Ernährung zu ernsten Problemen fĂźhren. Erst kĂźrzlich hat mir ein Bekannter nach einer USA-Reise erzählt, dass es dort offenbar nicht unĂźblich ist, schon zum ausgiebigen FrĂźhstĂźck in einem Restaurant wenigstens einen Liter Cola zu trinken. Gerne auch mehr, um das Gratis-NachfĂźllen des Bechers auszunutzen.
Kritik am schwarzen Freitag und dem unnÜtigen Konsum kommt oft von Umweltschßtzern. Neben Ressourcenverschwendung, hohem Energieverbrauch und wachsenden Mßllbergen durch eine zunehmende Wegwerfmentalität kommt dabei in der Regel auch die Klimakrise auf den Tisch.
Die EU-Kommission lancierte 2015 den Begriff Green Friday im Kontext der ßberarbeiteten Rechtsvorschriften zur Kennzeichnung der Energieeffizienz von Elektrogeräten. Sie nutzte die Gelegenheit kurz vor dem damaligen schwarzen Freitag und vor der UN-Klimakonferenz COP21, bei der das Pariser Abkommen unterzeichnet werden sollte.
Heute wird ein grßner Freitag oft im Zusammenhang mit der Forderung nach nachhaltigem Konsum benutzt. Derweil ist die Europäische Union schon weit in ihr Geschäftsmodell des Green New Deal verstrickt. In ihrer Propaganda zum Klimawandel verspricht sie tatsächlich Unterstßtzung der Menschen und Regionen, die von immer häufigeren Extremwetter-Ereignissen betroffen sind. Was wohl die Menschen in der Region um Valencia dazu sagen?
Ganz im Sinne des Great Reset propagierten die Vereinten Nationen seit Ende 2020 eine ÂŤgrĂźne Erholung von Covid-19, um den Klimawandel zu verlangsamenÂť. Der UN-Umweltbericht sah in dem Jahr einen Schwerpunkt auf dem Verbraucherverhalten. Ănderungen des Konsumverhaltens des Einzelnen kĂśnnten dazu beitragen, den Klimaschutz zu stärken, hieĂ es dort.
Der Begriff ÂŤSchwarzer FreitagÂť wurde in den USA nicht erstmals fĂźr Einkäufe nach Thanksgiving verwendet â wie oft angenommen â, sondern fĂźr eine Finanzkrise. Jedoch nicht fĂźr den BĂśrsencrash von 1929, sondern bereits fĂźr den Zusammenbruch des US-Goldmarktes im September 1869. Seitdem mussten die Menschen weltweit so einige schwarze Tage erleben.
KĂźrzlich sind die britischen AufsichtsbehĂśrden weiter von ihrer ZurĂźckhaltung nach dem letzten groĂen Finanzcrash von 2008 abgerĂźckt. Sie haben Regeln fĂźr den Bankensektor gelockert, womit sie ÂŤverantwortungsvolle RisikobereitschaftÂť unterstĂźtzen wollen. Man wĂźrde sicher zu schwarz sehen, wenn man hier ein grĂźnes Wunder befĂźrchten wĂźrde.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2024-11-08 20:02:32Und plĂśtzlich weiĂt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister EckhartSchwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung, der mir freitags ins Postfach flattert. Rot, gelb und grĂźn werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen â und hinterlässt einen wirtschaftlichen und gesellschaftlichen TrĂźmmerhaufen.
Mit einem bemerkenswerten Timing hat die deutsche Regierungskoalition am Tag des ÂŤComebacksÂť von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer Selbsthypnose rund um Harris-Hype und Trump-Panik â mit teils erschreckenden AuswĂźchsen. Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grĂźnen Minderheitsregierung ÂŤgeleitetÂť und man steuert auf Neuwahlen zu.
Das Kindergarten-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner auĂerdem den ÂŤAbsturz DeutschlandsÂť ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik ÂŤvorsätzlich herbeigefĂźhrtÂť worden seien.
Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen. Verkehrs- und Digitalminister Wissing trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium ßbernommen. Und mit JÜrg Kukies habe Scholz seinen Lieblingsbock zum Obergärtner, sprich: Finanzminister befÜrdert, meint Norbert Häring.
Es gebe keine Vertrauensbasis fßr die weitere Zusammenarbeit mit der FDP, hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg fßr vorgezogene Neuwahlen freimachen wßrde.
Apropos Vertrauen: Ăber die Hälfte der BundesbĂźrger glauben, dass sie ihre Meinung nicht frei sagen kĂśnnen. Das ging erst kĂźrzlich aus dem diesjährigen ÂŤFreiheitsindexÂť hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der BĂźrger misst. ÂŤBeim Vertrauen in Staat und Medien zerreiĂt es uns geradeÂť, kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut fĂźr Demoskopie Allensbach durchfĂźhrt.
ÂŤDie absolute Mehrheit hat absolut die Nase vollÂť, titelte die Bild angesichts des ÂŤAmpel-ShowdownsÂť. Die Mehrheit wolle Neuwahlen und die GrĂźnen sollten zuerst gehen, lasen wir dort.
Dass Insolvenzminister Robert Habeck heute seine Kandidatur fßr das Kanzleramt verkßndet hat, kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel kÜnne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei Manova. Und er kenne Friedrich Merz schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
Was also tun? Der Schweizer Verein Losdemokratie will eine Volksinitiative lancieren, um die Bestimmung von Parlamentsmitgliedern per Los einzufßhren. Das Losverfahren sorge fßr mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
In jedem Fall wird es notwendig sein, unsere BemĂźhungen um Freiheit und Selbstbestimmung zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen â also die Suche nach dezentralen LĂśsungsansätzen â gehĂśrt dabei sicher zu den MĂśglichkeiten. Das gilt sowohl fĂźr jede/n Einzelne/n als auch fĂźr Entitäten wie die alternativen Medien.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ a95c6243:d345522c
2024-10-26 12:21:50Es ist besser, ein Licht zu entzĂźnden, als auf die Dunkelheit zu schimpfen. Konfuzius
Die BemĂźhungen um Aufarbeitung der sogenannten Corona-Pandemie, um Aufklärung der HintergrĂźnde, Benennung von Verantwortlichkeiten und das Ziehen von Konsequenzen sind durchaus nicht eingeschlafen. Das Interesse daran ist unter den gegebenen Umständen vielleicht nicht sonderlich groĂ, aber es ist vorhanden.
Der sächsische Landtag hat gestern die Einsetzung eines Untersuchungsausschusses zur Corona-Politik beschlossen. In einer Sondersitzung erhielt ein entsprechender Antrag der AfD-Fraktion die ausreichende Zustimmung, auch von einigen Abgeordneten des BSW.
In den Niederlanden wird Bill Gates vor Gericht erscheinen mßssen. Sieben durch die Covid-Impfstoffe geschädigte Personen hatten Klage eingereicht. Sie werfen unter anderem Gates, Pfizer-Chef Bourla und dem niederländischen Staat vor, sie hätten gewusst, dass diese Präparate weder sicher noch wirksam sind.
Mit den mRNA-ÂŤImpfstoffenÂť von Pfizer/BioNTech befasst sich auch ein neues Buch. Darin werden die Erkenntnisse von Ărzten und Wissenschaftlern aus der Analyse interner Dokumente Ăźber die klinischen Studien der Covid-Injektion präsentiert. Es handelt sich um jene in den USA freigeklagten Papiere, die die ArzneimittelbehĂśrde (Food and Drug Administration, FDA) 75 Jahre unter Verschluss halten wollte.
Ebenfalls Wissenschaftler und Ărzte, aber auch andere Experten organisieren als Verbundnetzwerk Corona-Solution kostenfreie Online-Konferenzen. Ihr Ziel ist es, ÂŤwissenschaftlich, demokratisch und friedlichÂť Ăźber Impfstoffe und Behandlungsprotokolle gegen SARS-CoV-2 aufzuklären und die Diskriminierung von Ungeimpften zu stoppen. Gestern fand eine weitere Konferenz statt. Ihr Thema: ÂŤCorona und modRNA: Von Toten, Lebenden und Physik lernenÂť.
Aufgrund des Digital Services Acts (DSA) der Europäischen Union sei das Risiko groĂ, dass ihre Arbeit als ÂŤFake-NewsÂť bezeichnet wĂźrde, so das Netzwerk. Staatlich unerwĂźnschte wissenschaftliche Aufklärung mĂźsse sich passende Kanäle zur VerĂśffentlichung suchen. Ihre Live-Streams seien deshalb zum Beispiel nicht auf YouTube zu finden.
Der vielfältige Einsatz fßr Aufklärung und Aufarbeitung wird sich nicht stummschalten lassen. Nicht einmal der Zensurmeister der EU, Deutschland, wird so etwas erreichen. Die frisch aktivierten Trusted Flagger dßrften allerdings kßnftige Siege beim Denunzianten-Wettbewerb im Kontext des DSA zusätzlich absichern.
Wo sind die Grenzen der Meinungsfreiheit? Sicher gibt es sie. Aber die ideologische Gleichstellung von illegalen mit unerwĂźnschten ĂuĂerungen verfolgt offensichtlich eher das Ziel, ein derart elementares demokratisches Grundrecht mĂśglichst weitgehend auszuhebeln. VorwĂźrfe wie ÂŤHassredeÂť, ÂŤDelegitimierung des StaatesÂť oder ÂŤVolksverhetzungÂť werden heute inflationär verwendet, um Systemkritik zu unterbinden. Gegen solche Bestrebungen gilt es, sich zu wehren.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ c631e267:c2b78d3e
2024-10-23 20:26:10Herzlichen GlĂźckwunsch zum dritten Geburtstag, liebe Denk Bar! Wieso zum dritten? Das war doch 2022 und jetzt sind wir im Jahr 2024, oder? Ja, das ist schon richtig, aber bei Geburtstagen erinnere ich mich immer auch an meinen Vater, und der behauptete oft, der erste sei ja schlieĂlich der Tag der Geburt selber und den mĂźsse man natĂźrlich mitzählen. Wo er recht hat, hat er nunmal recht. Konsequenterweise wird also heute dieser Blog an seinem dritten Geburtstag zwei Jahre alt.
Das ist ein Grund zum Feiern, wie ich finde. Einerseits ganz einfach, weil es dafßr gar nicht genug Grßnde geben kann. Das Leben sind zwei Tage, lautet ein gängiger Ausdruck hier in Andalusien. In der Tat kÜnnte es so sein, auch wenn wir uns im Alltag oft genug von der Routine vereinnahmen lassen.
Seit dem Start der Denk Bar vor zwei Jahren ist unglaublich viel passiert. Ebenso wie die zweieinhalb Jahre davor, und all jenes war letztlich auch der AuslĂśser dafĂźr, dass ich begann, Ăśffentlich zu schreiben. Damals notierte ich:
ÂŤSeit einigen Jahren erscheint unser Ăśffentliches Umfeld immer fragwĂźrdiger, widersprĂźchlicher und manchmal schier unglaublich - jede Menge Anlass fĂźr eigene Recherchen und Gedanken, ganz einfach mit einer Portion gesundem Menschenverstand.Âť
Wir erleben den sogenannten ÂŤgroĂen UmbruchÂť, einen globalen Coup, den skrupellose Egoisten clever eingefädelt haben und seit ein paar Jahren knallhart â aber nett verpackt â durchziehen, um buchstäblich alles nach ihrem Gusto umzukrempeln. Die Gelegenheit ist ja angeblich gĂźnstig und muss genutzt werden.
Nie hätte ich mir träumen lassen, dass ich so etwas jemals miterleben mßsste. Die Bosheit, mit der ganz offensichtlich gegen die eigene BevÜlkerung gearbeitet wird, war frßher fßr mich unvorstellbar. Mein (Rest-) Vertrauen in alle mÜglichen Bereiche wie Politik, Wissenschaft, Justiz, Medien oder Kirche ist praktisch komplett zerstÜrt. Einen inneren Totalschaden hatte ich mal fßr unsere Gesellschaften diagnostiziert.
Was mich vielleicht am meisten erschreckt, ist zum einen das Niveau der Gleichschaltung, das weltweit erreicht werden konnte, und zum anderen die praktisch totale Spaltung der Gesellschaft. Haben wir das tatsächlich mit uns machen lassen?? Unfassbar! Aber das Werkzeug Angst ist sehr mächtig und funktioniert bis heute.
Zum GlĂźck passieren auch positive Dinge und neue Perspektiven Ăśffnen sich. FĂźr viele Menschen waren und sind die Entwicklungen der letzten Jahre ein AugenĂśffner. Sie sehen ÂŤQuerdenkenÂť als das, was es ist: eine Tugend.
Auch die immer ernsteren ZensurbemĂźhungen sind letztlich nur ein Zeichen der Schwäche, wo Argumente fehlen. Sie werden nicht verhindern, dass wir unsere Meinung äuĂern, unbequeme Fragen stellen und dass die Wahrheit peu Ă peu ans Licht kommt. Es gibt immer Mittel und Wege, auch fĂźr uns.
Danke, dass du diesen Weg mit mir weitergehst!
-
@ a95c6243:d345522c
2024-10-19 08:58:08Ein Lämmchen lÜschte an einem Bache seinen Durst. Fern von ihm, aber näher der Quelle, tat ein Wolf das gleiche. Kaum erblickte er das Lämmchen, so schrie er:
"Warum trĂźbst du mir das Wasser, das ich trinken will?"
"Wie wäre das mĂśglich", erwiderte schĂźchtern das Lämmchen, "ich stehe hier unten und du so weit oben; das Wasser flieĂt ja von dir zu mir; glaube mir, es kam mir nie in den Sinn, dir etwas BĂśses zu tun!"
"Ei, sieh doch! Du machst es gerade, wie dein Vater vor sechs Monaten; ich erinnere mich noch sehr wohl, daà auch du dabei warst, aber glßcklich entkamst, als ich ihm fßr sein Schmähen das Fell abzog!"
"Ach, Herr!" flehte das zitternde Lämmchen, "ich bin ja erst vier Wochen alt und kannte meinen Vater gar nicht, so lange ist er schon tot; wie soll ich denn fĂźr ihn bĂźĂen."
"Du Unverschämter!" so endigt der Wolf mit erheuchelter Wut, indem er die Zähne fletschte. "Tot oder nicht tot, weià ich doch, daà euer ganzes Geschlecht mich hasset, und dafßr muà ich mich rächen."
Ohne weitere Umstände zu machen, zerrià er das Lämmchen und verschlang es.
Das Gewissen regt sich selbst bei dem grĂśĂten BĂśsewichte; er sucht doch nach Vorwand, um dasselbe damit bei Begehung seiner Schlechtigkeiten zu beschwichtigen.
Quelle: https://eden.one/fabeln-aesop-das-lamm-und-der-wolf
-
@ c4f5e7a7:8856cac7
2024-09-27 08:20:16Best viewed on Habla, YakiHonne or Highlighter.
TL;DR
This article explores the links between public, community-driven data sources (such as OpenStreetMap) and private, cryptographically-owned data found on networks such as Nostr.
The following concepts are explored:
- Attestations: Users signalling to their social graph that they believe something to be true by publishing Attestations. These social proofs act as a decentralised verification system that leverages your web-of-trust.
- Proof of Place: An oracle-based system where physical letters are sent to real-world locations, confirming the corresponding digital ownership via cryptographic proofs. This binds physical locations in meatspace with their digital representations in the Nostrverse.
- Check-ins: Foursquare-style check-ins that can be verified using attestations from place owners, ensuring authenticity. This approach uses web-of-trust to validate check-ins and location ownership over time.
The goal is to leverage cryptographic ownership where necessary while preserving the open, collaborative nature of public data systems.
Open Data in a public commons has a place and should not be thrown out with the Web 2.0 bathwater.
Cognitive Dissonance
Ever since discovering Nostr in August of 2022 I've been grappling with how BTC Map - a project that helps bitcoiners find places to spend sats - should most appropriately use this new protocol.
I am assuming, dear reader, that you are somewhat familiar with Nostr - a relatively new protocol for decentralised identity and communication. If you donât know your nsec from your npub, please take some time to read these excellent posts: Nostr is Identity for the Internet and The Power of Nostr by @max and @lyn, respectively. Nostr is so much more than a short-form social media replacement.
The social features (check-ins, reviews, etc.) that Nostr unlocks for BTC Map are clear and exciting - all your silos are indeed broken - however, something fundamental has been bothering me for a while and I think it comes down to data ownership.
For those unfamiliar, BTC Map uses OpenStreetMap (OSM) as its main geographic database. OSM is centred on the concept of a commons of objectively verifiable data that is maintained by a global community of volunteer editors; a Wikipedia for maps. There is no data ownership; the data is free (as in freedom) and anyone can edit anything. It is the data equivalent of FOSS (Free and Open Source Software) - FOSD if you will, but more commonly referred to as Open Data.
In contrast, Notes and Other Stuff on Nostr (Places in this cartographic context) are explicitly owned by the controller of the private key. These notes are free to propagate, but they are owned.
How do we reconcile the decentralised nature of Nostr, where data is cryptographically owned by individuals, with the community-managed data commons of OpenStreetMap, where no one owns the data?
Self-sovereign Identity
Before I address this coexistence question, I want to talk a little about identity as it pertains to ownership. If something is to be owned, it has to be owned by someone or something - an identity.
All identities that are not self-sovereign are, by definition, leased to you by a 3rd party. You rent your Facebook identity from Meta in exchange for your data. You rent your web domain from your DNS provider in exchange for your money.
Taken to the extreme, you rent your passport from your Government in exchange for your compliance. You are you at the pleasure of others. Where Bitcoin separates money from the state; Nostr separates identity from the state.
Or, as @nvk said recently: "Don't build your house on someone else's land.".
https://i.nostr.build/xpcCSkDg3uVw0yku.png
While weâve had the tools for self-sovereign digital identity for decades (think PGP keys or WebAuthN), we haven't had the necessary social use cases nor the corresponding social graph to elevate these identities to the mainstream. Nostr fixes this.
Nostr is PGP for the masses and will take cryptographic identities mainstream.
Full NOSTARD?
Returning to the coexistence question: the data on OpenStreetMap isnât directly owned by anyone, even though the physical entities the data represents might be privately owned. OSM is a data commons.
We can objectively agree on the location of a tree or a fire hydrant without needing permission to observe and record it. Sure, you could place a tree âon Nostrâ, but why should you? Just because something can be âon Nostrâ doesnât mean it should be.
https://i.nostr.build/s3So2JVAqoY4E1dI.png
There might be a dystopian future where we can't agree on what a tree is nor where it's located, but I hope we never get there. It's at this point we'll need a Wikifreedia variant of OpenStreetMap.
While integrating Nostr identities into OpenStreetMap would be valuable, the current OSM infrastructure, tools, and community already provide substantial benefits in managing this data commons without needing to go NOSTR-native - there's no need to go Full NOSTARD. H/T to @princeySOV for the original meme.
https://i.nostr.build/ot9jtM5cZtDHNKWc.png
So, how do we appropriately blend cryptographically owned data with the commons?
If a location is owned in meatspace and it's useful to signal that ownership, it should also be owned in cyberspace. Our efforts should therefore focus on entities like businesses, while allowing the commons to manage public data for as long as it can successfully mitigate the tragedy of the commons.
The remainder of this article explores how we can:
- Verify ownership of a physical place in the real world;
- Link that ownership to the corresponding digital place in cyberspace.
As a side note, I don't see private key custodianship - or, even worse, permissioned use of Places signed by another identity's key - as any more viable than the rented identities of Web 2.0.
And as we all know, the Second Law of Infodynamics (no citation!) states that:
"The total amount of sensitive information leaked will always increase over time."
This especially holds true if that data is centralised.
Not your keys, not your notes. Not your keys, not your identity.
Places and Web-of-Trust
@Arkinox has been leading the charge on the Places NIP, introducing Nostr notes (kind 37515) that represent physical locations. The draft is well-crafted, with bonus points for linking back to OSM (and other location repositories) via NIP-73 - External Content IDs (championed by @oscar of @fountain).
However, as Nostr is permissionless, authenticity poses a challenge. Just because someone claims to own a physical location on the Internet doesnât necessarily mean they have ownership or control of that location in the real world.
Ultimately, this problem can only be solved in a decentralised way by using Web-of-Trust - using your social graph and the perspectives of trusted peers to inform your own perspective. In the context of Places, this requires your network to form a view on which digital identity (public key / npub) is truly the owner of a physical place like your local coffee shop.
This requires users to:
- Verify the owner of a Place in cyberspace is the owner of a place in meatspace.
- Signal this verification to their social graph.
Let's look at the latter idea first with the concept of Attestations ...
Attestations
A way to signal to your social graph that you believe something to be true (or false for that matter) would be by publishing an Attestation note. An Attestation note would signify to your social graph that you think something is either true or false.
Imagine you're a regular at a local coffee shop. You publish an Attestation that says the shop is real and the owner behind the Nostr public key is who they claim to be. Your friends trust you, so they start trusting the shop's digital identity too.
However, attestations applied to Places are just a single use case. The attestation concept could be more widely applied across Nostr in a variety of ways (key rotation, identity linking, etc).
Here is a recent example from @lyn that would carry more signal if it were an Attestation:
https://i.nostr.build/lZAXOEwvRIghgFY4.png
Parallels can be drawn between Attestations and transaction confirmations on the Bitcoin timechain; however, their importance to you would be weighted by clients and/or Data Vending Machines in accordance with:
- Your social graph;
- The type or subject of the content being attested and by whom;
- Your personal preferences.
They could also have a validity duration to be temporally bound, which would be particularly useful in the case of Places.
NIP-25 (Reactions) do allow for users to up/downvote notes with optional content (e.g., emojis) and could work for Attestations, but I think we need something less ambiguous and more definitive.
âThis is trueâ resonates more strongly than âI like this.â.
https://i.nostr.build/s8NIG2kXzUCLcoax.jpg
There are similar concepts in the Web 3 / Web 5 world such as Verified Credentials by tdb. However, Nostr is the Web 3 now and so wen Attestation NIP?
https://i.nostr.build/Cb047NWyHdJ7h5Ka.jpg
That said, I have seen @utxo has been exploring âsmart contractsâ on nostr and Attestations may just be a relatively âdumbâ subset of the wider concept Nostr-native scripting combined with web-of-trust.
Proof of Place
Attestations handle the signalling of your truth, but what about the initial verification itself?
We already covered how this ultimately has to be derived from your social graph, but what if there was a way to help bootstrap this web-of-trust through the use of oracles? For those unfamiliar with oracles in the digital realm, they are simply trusted purveyors of truth.
Introducing Proof of Place, an outâof-band process where an oracle (such as BTC Map) would mail - yes physically mail- a shared secret to the address of the location being claimed in cyberspace. This shared secret would be locked to the public key (npub) making the claim, which, if unlocked, would prove that the associated private key (nsec) has physical access to the location in meatspace.
One way of doing this would be to mint a 1 sat cashu ecash token locked to the npub of the claimant and mail it to them. If they are able to redeem the token then they have cryptographically proven that they have physical access to the location.
Proof of Place is really nothing more than a weighted Attestation. In a web-of-trust Nostrverse, an oracle is simply a npub (say BTC Map) that you weigh heavily for its opinion on a given topic (say Places).
In the Bitcoin world, Proof of Work anchors digital scarcity in cyberspace to physical scarcity (energy and time) in meatspace and as @Gigi says in PoW is Essential:
"A failure to understand Proof of Work, is a failure to understand Bitcoin."
In the Nostrverse, Proof of Place helps bridge the digital and physical worlds.
@Gigi also observes in Memes vs The World that:
"In Bitcoin, the map is the territory. We can infer everything we care about by looking at the map alone."
https://i.nostr.build/dOnpxfI4u7EL2v4e.png
This isnât true for Nostr.
In the Nostrverse, the map IS NOT the territory. However, Proof of Place enables us to send cryptographic drones down into the physical territory to help us interpret our digital maps. đ¤Ż
Check-ins
Although not a draft NIP yet, @Arkinox has also been exploring the familiar concept of Foursquare-style Check-ins on Nostr (with kind 13811 notes).
For the uninitiated, Check-ins are simply notes that signal the publisher is at a given location. These locations could be Places (in the Nostr sense) or any other given digital representation of a location for that matter (such as OSM elements) if NIP-73 - External Content IDs are used.
Of course, not everyone will be a Check-in enjoyooor as the concept will not sit well with some peopleâs threat models and OpSec practices.
Bringing Check-ins to Nostr is possible (as @sebastix capably shows here), but they suffer the same authenticity issues as Places. Just because I say I'm at a given location doesn't mean that I am.
Back in the Web 2.0 days, Foursquare mitigated this by relying on the GPS position of the phone running their app, but this is of course spoofable.
How should we approach Check-in verifiability in the Nostrverse? Well, just like with Places, we can use Attestations and WoT. In the context of Check-ins, an Attestation from the identity (npub) of the Place being checked-in to would be a particularly strong signal. An NFC device could be placed in a coffee shop and attest to check-ins without requiring the owner to manually intervene - Iâm sure @blackcoffee and @Ben Arc could hack something together over a weekend!
Check-ins could also be used as a signal for bonafide Place ownership over time.
Summary: Trust Your Bros
So, to recap, we have:
Places: Digital representations of physical locations on Nostr.
Check-ins: Users signalling their presence at a location.
Attestations: Verifiable social proofs used to confirm ownership or the truth of a claim.
You can visualise how these three concepts combine in the diagram below:
https://i.nostr.build/Uv2Jhx5BBfA51y0K.jpg
And, as always, top right trumps bottom left! We have:
Level 0 - Trust Me Bro: Anyone can check-in anywhere. The Place might not exist or might be impersonating the real place in meatspace. The person behind the npub may not have even been there at all.
Level 1 - Definitely Maybe Somewhere: This category covers the middle-ground of âMaybe at a Placeâ and âDefinitely Somewhereâ. In these examples, you are either self-certifying that you have checked-in at an Attested Place or you are having others attest that you have checked-in at a Place that might not even exist IRL.
Level 2 - Trust Your Bros: An Attested Check-in at an Attested Place. Your individual level of trust would be a function of the number of Attestations and how you weigh them within your own social graph.
https://i.nostr.build/HtLAiJH1uQSTmdxf.jpg
Perhaps the gold standard (or should that be the Bitcoin standard?) would be a Check-in attested by the owner of the Place, which in itself was attested by BTC Map?
Or perhaps not. Ultimately, itâs the users responsibility to determine what they trust by forming their own perspective within the Nostrverse powered by web-of-trust algorithms they control. âTrust Me Broâ or âTrust Your Brosâ - you decide.
As we navigate the frontier of cryptographic ownership and decentralised data, itâs up to us to find the balance between preserving the Open Data commons and embracing self-sovereign digital identities.
Thanks
With thanks to Arkinox, Avi, Ben Gunn, Kieran, Blackcoffee, Sebastix, Tomek, Calle, Short Fiat, Ben Weeks and Bitcoms for helping shape my thoughts and refine content, whether you know it or not!
-
@ 7460b7fd:4fc4e74b
2024-09-05 08:37:48诡ç2014ĺš´çĺ ´çä¸ĺşć睴碰ćďźč§é˘27ĺéĺźĺ§
ćĺďźä¸ä¸Şĺ˝ćść ćłč§Łĺłççšďźä¸˘ĺ¤ą
-
@ 266815e0:6cd408a5
2024-05-09 17:23:28Lot of people are starting to talk about building a web-of-trust and how nostr can or is already being used as such
We all know about using the kind:3 following lists as a simple WoT that can be used to filter out spam. but as we all know it does not really signal "trust", its mostly just "I find your content interesting"
But what about real "trust"... well its kind of multi-denominational, I could trust that your a good developer or a good journalist but still not trust you enough to invite you over to my house. There are some interesting and clever solutions proposed for quantifying "trust" in a digital sense but I'm not going to get into that here. I want to talk about something that I have not see anyone discuss yet.
How is the web-of-trust maintained? or more precisely how do you expect users to update the digital representation of the "trust" of other users?
Its all well and good to think of how a user would create that "trust" of another user when discovering them for the first time. They would click the "follow" button, or maybe even rate them on a few topics with a 1/5 star system But how will a user remove that trust? how will they update it if things change and they trust them less?
If our goal is to model "trust" in a digital sense then we NEED a way for the data to stay up-to-date and as accurate as possible. otherwise whats the use? If we don't have a friction-less way to update or remove the digital representation of "trust" then we will end up with a WoT that continuously grows and everyone is rated 10/10
In the case of nostr kind:3 following lists. its pretty easy to see how these would get updated. If someone posts something I dislike or I notice I'm getting board of their content. then I just unfollow them. An important part here is that I'm not thinking "I should update my trust score of this user" but instead "I'm no longer interested, I don't want to see this anymore"
But that is probably the easiest "trust" to update. because most of us on social media spend some time curating our feed and we are used to doing it. But what about the more obscure "trust" scores? whats the regular mechanism by which a user would update the "honestly" score of another user?
In the real world its easy, when I stop trusting someone I simply stop associating with them. there isn't any button or switch I need to update. I simply don't talk to them anymore, its friction-less But in the digital realm I would have to remove or update that trust. in other words its an action I need to take instead of an action I'm not doing. and actions take energy.
So how do we reflect something in the digital world that takes no-energy and is almost subconscious in the real world?
TLDR; webs-of-trust are not just about scoring other users once. you must keep the score up-to-date
-
@ f977c464:32fcbe00
2024-01-30 20:06:18GĂźneĹin kaybolmasÄąnÄąn ßçßncĂź gĂźnĂź, saat ĂśÄlen on ikiyi yirmi geçiyordu. Trenin kalkmasÄąna yaklaĹÄąk iki saat vardÄą. Hepimiz perondaydÄąk. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarÄąmÄązla yan yana dizilmiĹ, kÄąsa aralÄąklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalÄąm zaman bir tĂźrlĂź istediÄimiz hÄązla ilerlemiyordu. Herkes birkaç dakika sĂźrmesi gereken alelade bir doÄa olayÄąna sÄąkÄąĹÄąp kalmÄąĹ, karanlÄąktan sĂźrĂźnerek çĹkmayÄą deniyordu.
Bekleme salonuna doÄru dĂśndĂźm. Nefesimden çĹkan buharÄąn arkasÄąnda, kalÄąn taĹ duvarlarÄą ve camlarÄąyla morg kadar gĂźvenli ve soÄuk duruyordu. Cesetleri o yĂźzden bunun gibi yerlere taĹÄąmaya baĹlamÄąĹlardÄą. Demek insanlarÄąn bĂźtĂźn iyiliÄi baĹkalarÄą onlarÄą gĂśrdĂźÄĂź içindi ki gĂźndĂźzleri gecelerden daha karanlÄąk olduÄunda hemen birbirlerinin gÄąrtlaÄÄąna çÜkmĂźĹ, bĂśÄĂźrlerinde delikler açmÄąĹ, gĂśzlerini oyup kafataslarÄąnÄą parçalamÄąĹlardÄą.
İstasyonun ÄąĹÄąÄÄą titrediÄinde karanlÄąÄÄąn enseme saplandÄąÄÄąnÄą hissettim. EÄer Ĺimdi, bĂśyle kalabalÄąk bir yerde elektrik kesilse baĹÄąmÄąza ne gelirdi?
İçerideki askerlerden biri bakÄąĹlarÄąmÄą yakalayÄąnca yeniden saate odaklanmĹŠgibi yaptÄąm. Sadece birkaç dakika geçmiĹti.
âTarlalarÄąm gitti. BĂśyle boyum kadar ayçiçeÄi doluydu. Ah, hepsi ĂślĂźp gidiyor. AfitapâÄąn çiçekleri de gi-â
âDayÄą, AllahâÄąnÄą seversen sus. Hepimizi yakacaksÄąn Ĺimdi.â
KaranlÄąkta durduÄunda, gĂśrĂźnmez olmayÄą istemeye baĹlÄąyordun. Kimse seni gĂśrmemeli, nefesini bile duymamalÄąydÄą. Kimsenin de ayaÄÄąnÄąn altÄąnda dolaĹmamalÄąydÄąn; gelip kazayla sana çarpmamalÄąlar, takÄąlÄąp sendelememeliydiler. Yoksa aslÄąnda hedefi sen olmadÄąÄÄąn bir Ăśfke gĂźrlemeye baĹlar, yaĹadÄąÄÄąn ilk Ĺoku ve acÄąyÄą silerek ĂźstĂźnden geçerdi.
İlk konuĹan, yaĹlÄąca bir adam, kafasÄąnda kasketi, nasÄąrlÄą ellerine hohluyordu. GĂśzleri ve burnu kÄązarmÄąĹtÄą. GĂźneĹin kaybolmasÄą onun için kendi baĹÄąna bir felaket deÄildi. HayatÄąna olan pratik yansÄąmalarÄąndan korkuyordu olsa olsa. Bir anÄąnÄąn kaybolmasÄą, bu yĂźzden çoktan kaybettiÄi birinin biraz daha eksilmesi. Hayatta kalmasÄąnÄą gerektiren sebepler azalÄąrken, hayatta kalmasÄąnÄą saÄlayacak kaynaklarÄąnÄą da kaybediyordu.
Onu susturan delikanlÄąysa atkÄąsÄąnÄą bĂźtĂźn kafasÄąna sarmÄąĹ, sakalÄą ve yĂźzĂźnĂźn derinliklerine kaçmĹŠgĂśzleri dÄąĹÄąnda bedeninin bĂźtĂźn parçalarÄąnÄą gizlemeye çalÄąĹÄąyordu. İĹte o, gĂźneĹin kaybolmasÄąnÄąn tam olarak ne anlama geldiÄini anlamamĹŠolsa bile, dehĹetini olduÄu gibi hissedebilenlerdendi.
GĂźneĹin onlardan alÄąndÄąktan sonra kime verileceÄini sormuyorlardÄą. En baĹta onlara verildiÄinde de hiçbir soru sormamÄąĹlardÄą zaten.
İki saat ne zaman geçer?
Midemin ĂźstĂźnde, saÄ tarafÄąma doÄru keskin bir acÄą hissettim. KaraciÄerim. GĂśzlerimi yumdum. YanÄąmda biri metal bir nesneyi yere bÄąraktÄą. Bir kafesti. İçerisindeki kartalÄąn Äąslak kokusu burnuma ulaĹmadan Ăśnce bile biliyordum bunu.
âYeniden mi?â diye sordu bana kartal. KanatlarÄą kanlÄą. ZamanÄąn her bir parçasÄą tĂźylerinin ĂźstĂźne çÜreklenmiĹti. GagasÄą bir Ĺey, tahminen et parçasÄą geveliyor gibi hareket ediyordu. Eski anÄąlar kolay unutulmazmÄąĹ. Ĺu anda kafesinin kalÄąn parmaklÄąklarÄąnÄąn ardÄąnda olsa da bunun bir aldatmaca olduÄunu bir tek ben biliyordum. Her an kanatlarÄąnÄą iki yana uzatÄąverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar geniĹleyebilir, parmaklÄąklar Ăśnce ayaklarÄąmÄązÄąn altÄąna serilir gibi gĂśzĂźkebilir ama aslÄąnda hepimizin ĂźstĂźnde yĂźkselerek tepemize çÜkebilirdi.
AĹaÄÄąya baktÄąm. Tahtalarla zapt edilmiĹ, hiçbir yere gidemeyen ama her yere uzanan tren raylarÄą. AtlayÄąp koĹsam⌠Ăantam çok aÄÄąrdÄą. Daha birkaç adÄąm atamadan, kartal, suratÄąnÄą bedenime gĂśmerdi.
âBu sefer farklÄą,â diye yanÄątladÄąm onu. âYeniden diyemezsin. TekrarladÄąÄÄąm bir Ĺey deÄil bu. Hatta bir hata yapÄąyormuĹum gibi tonlayamazsÄąn da. Bu sefer, insanlarÄąn hak etmediÄini biliyorum.â
âO zaman daha vahim. SĂźzme salaksÄąn demektir.â
âİnsanlarÄąn hak etmemesi, insanlÄąÄÄąn hak etmediÄi anlamÄąna gelmez ki.â
Az Ăśnce gĂśz gĂśze geldiÄim genççe ama çÜkĂźk asker hâlâ bana bakÄąyordu. Bir kartalla konuĹtuÄumu anlamamÄąĹtÄą ĹĂźphesiz. YanÄąmdakilerden biriyle konuĹtuÄumu sanmĹŠolmalÄąydÄą. Ama konuĹtuÄum kiĹiye bakmÄąyordum ona gĂśre. Ăekingence kafamÄą eÄmiĹtim. Bir kez daha gĂśz gĂśze geldiÄimizde içerideki diÄer iki askere bir Ĺeyler sĂśyledi, onlar dĂśnĂźp beni sĂźzerken dÄąĹarÄą çĹktÄą.
YanÄąmÄązdaki, az Ăśnce konuĹan iki adam da ĹaĹkÄąnlÄąkla bir bana bir kartala bakÄąyordu.
âYalnÄąz bu sefer kalbin de kÄąrÄąlacak, Prometheus,â dedi kartal, bana. âBelki son olur. Biliyorsun, bir sĂźrĂź soruna neden oluyor bu yaptÄąklarÄąn.â
Beni koruyordu sĂśzde. En çok kanÄąma dokunan buydu. KasÄąklarÄąmÄąn ĂźstĂźne oturmuĹ, kanlÄą suratÄąnÄąn ardÄąnda gĂśzleri parlarken attÄąÄÄą çĹÄlÄąk kulaklarÄąmda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi dĂźĹĂźndĂźÄĂź yoktu. KartalÄąn, yanÄąmÄązdaki adamlarÄąn, artÄąk arkama kadar gelmiĹ olmasÄą gereken askerin, tren raylarÄąnÄąn, geçmeyen saatlerinâŚ
ArkamÄą dĂśndĂźÄĂźmde, asker sahiden oradaydÄą. Zaten Ăśyle olmasÄą gerekiyordu; gĂśrmĂźĹtĂźm bunu, biliyordum. Kehanetler⌠Bir Ĺeyler sĂśylĂźyordu ama aÄzÄą oynarken sesi çĹkmÄąyordu. YavaĹlamÄąĹ, kendisini saatin akÄąĹÄąna uydurmuĹtu. Havada donan tĂźkĂźrĂźÄĂźnden anlaĹÄąlÄąyordu, sinirliydi. KorktuÄu için olduÄunu biliyordum. Her seferinde korkmuĹlardÄą. Beni unutmuĹ olmalarÄą iĹlerini kolaylaĹtÄąrmÄąyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleĹmiĹti.
OlmasÄą gerekenle olanlarÄąn farklÄą olmasÄą ne kadar acÄąnasÄąydÄą. OlmasÄą gerekenlerin doÄasÄąnÄąn kĂśtĂźcĂźl olmasÄąysa bir yerde buna dayanÄąyordu.
âSalaksÄąn,â dedi kartal bana. ZamanÄą aĹan bir çĹÄlÄąk. Hepimizin ĂśnĂźne geçmiĹti ama kimseyi durduramÄąyordu.
SonsuzluÄa kaç tane iki saat sÄąkÄąĹtÄąrabilirsiniz?
Ben bir tane bile sÄąkÄąĹtÄąramadÄąm.
Ăantama uzanÄąyordum. Asker de sÄąrtÄąndaki tĂźfeÄini indiriyordu. Benim acelem yoktu, onunsa eli ayaÄÄą birbirine dolaĹÄąyordu. Oysaki her Ĺey tam olmasÄą gerektiÄi anda olacaktÄą. Kehanet baĹkasÄąnÄąn parmaklarÄąnÄąn ucundaydÄą.
GĂźneĹ, bir tĂźfeÄin patlamasÄąyla yeryĂźzĂźne doÄdu.
RaylarÄąn Ăźzerine serilmiĹ gĂśÄsĂźmĂźn ortasÄąndan, bir çantanÄąn içinden.
Not: Bu ĂśykĂź ilk olarak 2021 yÄąlÄąnda Esrarengiz Hikâyeler'de yayÄąmlanmÄąĹtÄąr.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galĂĄxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrås da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragå-los. Os homens jå havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando vĂĄrias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramĂĄtica, o homem vestido de mago voltou a falar.
Terra, nossa nave mĂŁe.
Neste momento eu me afastei. Ă frente do palco onde o mago e seu coral faziam apelos Ă multidĂŁo havia vĂĄrios estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraĂdos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pĂŠ para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chĂŁo, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do Ă´nibus grĂĄtis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nĂłs, os homens, habitantes do isolado planetinha, passĂĄssemos a ver o planetinha, nossa nave mĂŁe, como um todo, e adquirĂssemos a consciĂŞncia de que ele estava entrando em maus lençóis. A idĂŠia, reforçada pela logomarca do evento, era que parĂĄssemos de olhar sĂł para a nossa vida e pensĂĄssemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupaçþes, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mĂŁe, dessas de ficção cientĂfica, habitada por milhĂľes de pessoas, seguia no espaço sem rumo, e sem saber que logo Ă frente um longo precipĂcio espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. NinguÊm sabia quem estava conduzindo a nave, e ninguÊm se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoĂstas e incapazes de levar em conta a totalidade, ĂŠ que determinava a direção da nave-mĂŁe. O efeito, no entanto, nĂŁo era imediato, como nunca ĂŠ. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bĂŞbada, mau-carĂĄter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bĂŞbada era atraĂda atĂŠ ali pela corrupção das instituiçþes e da moral comum que, no fundo no fundo, era causada pelo egoĂsmo da população, atravĂŠs de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento pĂşblico -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscĂłpica, ele achava que estava fazendo o bem ao alertar sua platĂŠia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsĂĄvel pelo planeta. A sua incapacidade, porĂŠm, de explicar o que precisava ser feito sĂł aumentava a angĂşstia geral; a culpa que ele jogava sobre seu pĂşblico, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famĂlias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsĂĄveis pelas mais horrendas conseqßências.
O mago, que após o show tirava o chapÊu entortado e ia tomar cerveja num boteco, era responsåvel por uma parcela consideråvel do caos que levava a nave na direção do seu desgraçado fim. No filme, porÊm, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciåtica do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituiçþes e retirar os bêbados da condução da måquina. A questão da moral pública Ê ignorada para abreviar a trama, jå com duas horas e quarenta de duração, mas subentende-se que ela tambÊm fora resolvida.
No planeta Terra real, que nĂŁo estĂĄ indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a prĂłpria vida porque lhes ĂŠ impossĂvel viver a dos outros, nĂŁo tĂŞm uma consciĂŞncia global de nada porque sĂł ĂŠ possĂvel mesmo ter a consciĂŞncia delas mesmas, e onde a maioria, de uma maneira ou de outra, estĂĄ tentando como pode, fazer as coisas direito, o filme ĂŠ exibido.
Para a maioria dos espectadores, ĂŠ um filme que evoca reflexĂľes, um filme forte. Por um segundo elas tĂŞm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platĂŠia do mago, o prĂłprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam tambĂŠm crĂticos de televisĂŁo e jornal e gente que fala pelos cotovelos na internet -- o filme ĂŠ um horror, o filme ĂŠ uma vulgarização de um problema real e sĂŠrio, o filme apela para a figura do herĂłi salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas prĂłpria vidinhas miserĂĄveis enquanto espera por um herĂłi que vem do Olimpo e os salva da mixĂłrdia que eles mesmos causaram, ĂŠ um filme que presta um enorme desserviço Ă causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levarå ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gĂśrdĂźÄĂź o gĂźn, diÄerleri gibi olduÄunu anlamÄąĹtÄą. Oysaki her insan biricik olmalÄąydÄą. SĂśzgelimi sinirlendiÄinde bir kaĹÄą diÄerinden birkaç milimetre daha az çatÄąlabilirdi veya sevindiÄinde dudaÄÄą ona has bir açĹyla dalgalanabilirdi. Hatta bunlarÄąn hiçbiri mĂźmkĂźn deÄilse, en azÄąndan, gĂśzlerinin içinde sadece onun sahip olabileceÄi bir ÄąĹÄąk parlayabilirdi. Ăok sÄąradan, Ăśyle sÄąradan ki kimsenin fark etmediÄi o milyonlarca minik Ĺeyden herhangi biri. Ne olursa.
Ama yansÄąmasÄąna bakarken bunlarÄąn hiçbirini bulamadÄą ve diÄer gĂźnlerden hiç de farklÄą baĹlamamĹŠo gĂźn, iĹe gitmek için vagonunun gelmesini beklediÄi alelade bir metro istasyonunda, içinde kaybolduÄu illĂźzyon daÄÄąlmaya baĹladÄą.
İlk Ăśnce derisi dĂśkĂźldĂź. Tam olarak dĂśkĂźlmedi aslÄąnda, daha çok kÄąvÄąlcÄąmlara dĂśnĂźĹĂźp bedeninden fÄąrlamĹŠve bir an sonra sĂśnerek kĂźlleĹmiĹ, havada daÄÄąlmÄąĹtÄą. ArdÄąnda da, kaybolmadan hemen Ăśnce, kÄąsa sĂźre için hayal meyal gĂśrĂźlebilen, bir ruhun yok oluĹuna aÄÄąt yakan rengârenk peri cesetleri bÄąrakmÄąĹtÄą. Beklenenin aksine, havaya toz kokusu yayÄąldÄą.
DehĹete dĂźĹtĂź elbette. DehĹete dĂźĹtĂźler. Panikle Ăźstlerini yÄąrtan 50 iĹçi. Her Ĺeyin sebebiyse o vagon.
SaçlarĹ da dÜkßldß. Her tel, yere varmadan Ünce, her santimde ikiye ayrĹla ayrĹla yok oldu.
BĂźtĂźn yĂźzeylerin mat olduÄu, hiçbir Ĺeyin yansÄąmadÄąÄÄą, suyun siyah aktÄąÄÄą ve kendine ancak kameralarla bakabildiÄin bir dĂźnyada, vagonun içine yerleĹtirilmiĹ bir aynadan ilk defa kendini gĂśrmek.
GĂśzlerinin aklarÄą buharlaĹÄąp havada daÄÄąldÄą, mercekleri boĹalan yeri doldurmak için eriyip yayÄąldÄą. GerçeÄi gĂśrmemek için yaratÄąlmÄąĹ, bu yĂźzden gĂśrmeye hazÄąr olmayan ve hiç olmayacak gĂśzler.
Her Ĺeyin o anda sona erdiÄini sanabilirdi insan. Derin bir karanlÄąk ve ĂślĂźm. GĂśrmenin gĂśrmek olduÄu o anÄąn bitiĹi.
Ben geldiÄimde ĂślmĂźĹlerdi.
Yani bozulmuĹlardÄą demek istiyorum.
Belleklerini yeni taĹÄąyÄącÄąlara takmam mĂźmkĂźn olmadÄą. Fiziksel olarak kusursuz durumdaydÄąlar, olmayanlarÄą da tamir edebilirdim ama tĂźm o hengamede kendilerini baĹtan programlamĹŠve girdilerini modifiye etmiĹlerdi.
Belleklerden birini masanÄąn Ăźzerinden ileriye savurdu. HÄąnca hÄąnç dolu bir barda oturuyorlardÄą. O ve arkadaĹÄą.
SÄąrf Ĺu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapÄąyoruz, insanÄąn aklÄą almÄąyor.
Eliyle arkasÄąnÄą iĹaret etti.
Polislerin sĂśylediÄine gĂśre biri vagonun içerisine ayna yerleĹtirmiĹ. Bu zavallÄąlar da kapÄą açĹlÄąp bir anda yansÄąmalarÄąnÄą gĂśrĂźnce kafayÄą kÄąrmÄąĹlar.
ArkadaĹÄą bunlarÄąn ona ne hissettirdiÄini sordu. Yani o kadar bozuk, insan olduÄunu sanan androidi kendilerini parçalamĹŠolarak yerde gĂśrmek onu sarsmamĹŠmÄąydÄą?
HayÄąr, sonuçta belirli bir amaç için yaratÄąlmĹŠĹeyler onlar. Kaliteli bir bilgisayarÄąm bozulduÄunda ĂźzĂźlĂźrĂźm çßnkĂź parasÄąnÄą ben vermiĹimdir. Bunlarsa devletin. Bana ne ki?
ArkadaĹÄą anlayÄąĹla kafasÄąnÄą sallayÄąp suyundan bir yudum aldÄą. KravatÄąnÄą biraz gevĹetti.
Bira istemediÄinden emin misin?
İstemediÄini sĂśyledi. Sahi, neden deliriyordu bu androidler?
Basit. OnlarÄąn yapay zekâlarÄąnÄą kodlarken bir Ĺeyler yazÄąyorlar. YazÄąlÄąmcÄąlar. Biliyorsun, ben donanÄąmdayÄąm. Bunlar da kendilerini insan sanÄąyorlar. Tiplerine bak.
Sesini alçalttĹ.
Arabalarda kaza testi yapÄąlan mankenlere benziyor hepsi. AÄÄązlarÄą burunlarÄą bile yok ama Ĺu geldiÄimizden beri sakalÄąnÄą dĂźzeltip duruyor mesela. HayÄąr, hepsi de diÄerleri onun sakalÄą varmĹŠsanÄąyor, o manyak bir Ĺey.
ArkadaĹÄą bunun delirmeleriyle baÄlantÄąsÄąnÄą çÜzemediÄini sĂśyledi. O da normal sesiyle konuĹmaya devam etti.
Anlasana, aynayÄą falan ayÄąrt edemiyor mercekleri. LĂśnk diye kendilerini gĂśrĂźyorlar. BĂśyle, olduÄu gibi...
NedenmiĹ peki? Ne gerek varmÄąĹ?
Ne bileyim be abicim! Ahiret sorularÄą gibi.
BirasÄąna bakarak dalÄąp gitti. Sonra masaya abanarak arkadaĹÄąna iyice yaklaĹtÄą. BulanÄąk, bir tĂźnelin ucundaki biri gibi, Ĺekli ĹemalÄą belirsiz bir adam.
Ben seni nereden tanÄąyorum ki ulan? Kimsin sen?
BelleÄi makineden çĹkardÄąlar. İki kiĹiydiler. SoruĹturmadan sorumlu memurlar.
â BaĹtan mÄą baĹlÄąyoruz, diye sordu belleÄi elinde tutan ilk memur.
â Bir kere daha deneyelim ama bu sefer direkt aynayÄą sorarak baĹla, diye cevapladÄą ikinci memur.
â Bence de. Yeterince dĂźzgĂźn çalÄąĹÄąyor.
SimĂźlasyon yĂźklenirken, ayakta, biraz arkada duran ve alnÄąnÄą kaĹÄąyan ikinci memur sormaktan kendisini alamadÄą:
â Bu androidleri niye bĂśyle bir olay yerine gĂśndermiĹler ki? Belli tost olacaklarÄą. İsraf. Gidip biz baksak aynayÄą kÄąrÄąp delilleri mahvetmek zorunda da kalmazlar.
DiÄer memur sandalyesinde hafifçe dĂśnecek oldu, o sÄąrada soruyu bilgisayarÄąn hoparlĂśrĂźnden teknisyen cevapladÄą.
Hangi iĹimizde bir yamukluk yok ki be abi.
Ama bir son deÄildi. Ăstlerindeki tĂźm illĂźzyon daÄÄąldÄąÄÄąnda ve çĹplak, cinsiyetsiz, birbirinin aynÄą bedenleriyle kaldÄąklarÄąnda sÄąra dĂźnyaya gelmiĹti.
Yere dĂźĹtĂźler. Elleri -bĂźtĂźn bedeni gibi siyah turmalinden, boÄumlarÄą çelikten- yere deÄdiÄi anda, metronun zemini daÄÄąldÄą.
Yerdeki karolar Ăśncesinde beyazdÄą ve çok parlaktÄą. Tepelerindeki floresan, ÄąĹÄąÄÄąnÄą olduÄu gibi yansÄątÄąyor, tek bir lekenin olmadÄąÄÄą ve tek bir tozun uçmadÄąÄÄą istasyonu aydÄąnlatÄąyorlardÄą.
Duvarlara duyurular asÄąlmÄąĹtÄą. ĂrneÄin, yarÄąn akĹam kĂźltĂźr merkezinde 20.00âda baĹlayacak bir tekno blues festivalinin cÄąvÄąl cÄąvÄąl afiĹi vardÄą. Onun yanÄąnda daha geniĹ, sarÄą puntolu harflerle yazÄąlmÄąĹ, yatay siyah kesiklerle çerçevesi çizilmiĹ, bir platformdan dĂźĹen çÜp adamÄąn bulunduÄu âDikkat! SarÄą bandÄą geçmeyin!â uyarÄąsÄą. Biraz ilerisinde gĂźnlĂźk resmi gazete, onun ilerisinde bir aksiyon filminin ve baĹka bir romantik komedi filminin afiĹleri, yapÄąlacaklarÄąn ve yapÄąlmayacaklarÄąn sĂśylendiÄi kßçßk puntolu çeĹitli duyurular... Duvar uzayÄąp giden bir panoydu. On, on beĹ metrede bir tekrarlanÄąyordu.
TĂźm istasyonun eni yĂźz metre kadar. GeniĹliÄi on metre civarÄą.
Ănlerinde, açĹk kapÄąsÄąndan o mendebur aynanÄąn gĂśzĂźktĂźÄĂź vagon duruyordu. Metro, istasyona sÄąÄmayacak kadar uzundu. Bir kÄąlÄącÄąn keskinliÄiyle uzanÄąyor ama yer yer vagonlarÄąn ek yerleriyle bĂślĂźnĂźyordu.
Hiçbir vagonda pencere olmadÄąÄÄą için metronun içi, içlerindekiler meçhuldĂź.
SonrasÄąnda karolar zerrelerine ayrÄąlarak yĂźkseldi. FloresanÄąn ÄąĹÄąÄÄąnda her yeri toza boÄdular ve ortalÄąÄÄą gri bir sisin altÄąna gĂśmdĂźler. Ăok kÄąsa bir an. AfiĹleri dalgalandÄąrmadÄąlar. DalgalandÄąrmaya vakitleri olmadÄą. Yerlerinden sĂśkĂźp aldÄąlar en fazla. IĹÄąk birkaç kere sĂśnĂźp yanarak direndi. Son kez sĂśndĂźÄĂźnde bir daha geri gelmedi.
Yine de etraf aydÄąnlÄąktÄą. KÄąrmÄązÄą, her yere eĹit daÄÄąlan soluk bir ÄąĹÄąkla.
Yer tamamen tele dĂśnĂźĹmĂźĹtĂź. AltÄąnda çapraz hatlarla desteklenmiĹ demir bir iskelet. IĹÄąk birkaç metreden daha fazla aĹaÄÄąya uzanamÄąyordu. SonsuzluÄa giden bir uçurum.
DuvarÄąn yerini aynÄą teller ve demir iskelet almÄąĹtÄą. ArkasÄąnda, birbirine vidalarla tutturulmuĹ demir plakalardan oluĹan, ĂźstĂźnden geçen borularÄąn ek yerlerinden bazen ince buharlarÄąn çĹktÄąÄÄą ve bir sĂźre asÄąlÄą kaldÄąktan sonra aÄÄąr, yaÄlÄą bir havayla sĂźrĂźklendiÄi bir koridor.
DiÄer tarafta paslanmÄąĹ, pencerelerindeki camlar kÄąrÄąldÄąÄÄą için demir plakalarla kapatÄąlmĹŠkĂźlĂźstĂźr bir metro. KapÄąnÄąn karĹÄąsÄąndaki aynadan her Ĺey olduÄu gibi yansÄąyordu.
Bir konteynÄąrÄąn içini andÄąran bir evde, gerçi gayet de birbirine eklenmiĹ konteynÄąrlardan oluĹan bir Ĺehirde âandÄąranâ demek doÄru olmayacaÄÄą için dĂźpedĂźz bir konteynÄąrÄąn içinde, masaya mum gĂśrĂźntĂźsĂź vermek için koyulmuĹ, yarÄą katÄą yaÄ atÄąklarÄąndan ĹekillendirilmiĹ kĂźtleleri yakmayÄą deniyordu. KafasÄąnda hayvan kÄąllarÄąndan yapÄąlmĹŠgrili siyahlÄą bir peruk. AynÄą kÄąllardan kendisine gĂźr bir bÄąyÄąk da yapmÄąĹtÄą.
ĂstĂźnde mavi çÜp poĹetlerinden yapÄąlmÄąĹ, kravatlÄą, ĹÄąk bir takÄąm.
MasanÄąn ayaklarÄą yerine oradan buradan çĹkmĹŠparçalar konulmuĹtu: bir arabanÄąn Ĺaft mili, Ăźst Ăźste konulmuĹ ve ĂźstĂźnde yazÄą okunamayan tenekeler, boĹ kitaplar, boĹ gazete balyalarÄą... Hiçbir Ĺeye yazÄą yazÄąlmÄąyordu, gerek yoktu da zaten çßnkĂź merkez veri bankasÄą onlarÄą fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. FarklÄą Ĺekilde isimlendirmek bir fark yaratacaksa.
OnlarÄąn mercekleri için deÄil. BaÄlantÄąlarÄą çok Ăśnceden kopmuĹtu.
â HayatÄąm, sofra hazÄąr, diye baÄÄąrdÄą yatak odasÄąndaki karÄąsÄąna.
Sofrada tabak yerine dĂźz, bardak yerine bĂźkĂźlmĂźĹ, çatal ve bĹçak yerine sivriltilmiĹ plakalar.
KarÄąsÄą salonun kapÄąsÄąnda durakladÄą ve ancak kulaklarÄąna kadar uzanan, kocasÄąnÄąnkine benzeyen, cansÄąz, ĂślĂź hayvanlarÄąn kÄąllarÄąndan ibaret peruÄunu eliyle dĂźzeltti. DudaÄÄąnÄą, daha doÄrusu dudaÄÄąnÄąn olmasÄą gereken yeri koyu kÄąrmÄązÄą bir yaÄ tabakasÄąyla renklendirmeyi denemiĹti. Biraz da yanaklarÄąna sĂźrmĂźĹtĂź.
â NasÄąl olmuĹ, diye sordu.
Sesi tek dĂźzeydi ama hafif bir neĹe olduÄunu hissettiÄinize yemin edebilirdiniz.
Ăzerinde, çÜp poĹetlerinin içini yazÄąsÄąz gazete kaÄÄątlarÄąyla doldurarak yaptÄąÄÄą iki parça giysi.
â Ăok gĂźzelsin, diyerek kravatÄąnÄą dĂźzeltti kocasÄą.
â Sen de Ăśylesin, sevgilim.
YaklaĹÄąp kocasÄąnÄą ĂśptĂź. KocasÄą da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasÄąna yardÄąm etti.
Sofrada yemek niyetine hiçbir Ĺey yoktu. Gerek de yoktu zaten.
KonteynÄąrÄąn kapÄąsÄą gĂźrĂźltĂźyle tekmelenip içeri iki memur girene kadar birbirlerine ĂśykĂźler anlattÄąlar. O gĂźn neler yaptÄąklarÄąnÄą. İĹten erken çĹkÄąp yemyeĹil çimenlerde gezdiklerini, uçurtma uçurduklarÄąnÄą, kadÄąnÄąn nasÄąl o elbiseyi bulmak için saatlerce gezip yorulduÄunu, kocasÄąnÄąn kÄąsa sĂźreliÄine iĹe dĂśnĂźp nasÄąl baĹarÄąlÄą bir hamleyle yaĹanan krizi çÜzdĂźÄĂźnĂź ve kadÄąnÄąn yanÄąna dĂśndĂźkten sonra, alÄąĹveriĹ merkezinde oturduklarÄą yeni dondurmacÄąnÄąn dondurmalarÄąnÄąn ne kadar lezzetli olduÄunu, boÄazlarÄąnÄąn aÄrÄąmasÄąndan korktuklarÄąnÄą...
AkĹam film izleyebilirlerdi, televizyonda -boĹ ve mat bir plaka- gĂźzel bir film oynayacaktÄą.
İki memur. ĂÄąplak bedenleriyle birbirinin aynÄą. Ellerindeki silahlarÄą onlara doÄrultmuĹlardÄą. Mum ÄąĹÄąÄÄąnda, tertemiz bir ĂśrtĂźnĂźn serili olduÄu masada, bardaklarÄąnda Ĺaraplarla oturan ve henĂźz sofranÄąn ortasÄąndaki hindiye dokunmamĹŠçifti gĂśrdĂźklerinde bocaladÄąlar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gÜzßkmßyorlardĹ.
â Sessiz kalma hakkÄąna sahipsiniz, diye baÄÄąrdÄą içeri giren ikinci memur. SĂśylediÄiniz her Ĺey...
CĂźmlesini bitiremedi. Yatak odasÄąndaki, masanÄąn Ăźzerinden gĂśrdĂźÄĂź o Ĺey, onunla aynÄą hareketleri yapan android, yoksa, bir aynadaki yansÄąmasÄą mÄąydÄą?
BĂźtĂźn illĂźzyon o anda daÄÄąlmaya baĹladÄą.
Not: Bu ĂśykĂź ilk olarak 2020 yÄąlÄąnda Esrarengiz Hikâyeler'de yayÄąmlanmÄąĹtÄąr.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. đśđžđŤĄđđđ
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- â˛ď¸ Prep time: 30 min
- đł Cook time: 1 - 2 hours
- đ˝ď¸ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter đ¤Łđđ§) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
đśđžđ¤Żđ¤Żđ¤ŻđŤđ
-
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. đśđžđŤĄ
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port â4321â that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, â-dâ tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53Thereâs a lot of conversation around the #TwitterFiles. Hereâs my take, and thoughts on how to fix the issues identified.
Iâll start with the principles Iâve come to believeâŚbased on everything Iâve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trumpâs account. As Iâve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldnât be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. Itâs critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
Iâm a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is âfreeâ and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I donât believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A âfollowâ action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. Thereâs a default âG-ratedâ algorithm, and then thereâs everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of whatâs available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you wonât trust this solution just because itâs me stating it. I get it, but thatâs exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. Iâm hopeful all of this will happen. Thereâs nothing to hideâŚonly a lot to learn from. The current attacks on my former colleagues could be dangerous and doesnât solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet anotherâŚand there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isnât about a âdecentralized Twitter.â This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitterâs future, and the public conversationâs ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
đ¸đ ď¸đ To accelerate open internet and protocol work, Iâm going to open a new category of #startsmall grants: âopen internet development.â It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. Iâll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ c3b2802b:4850599c
2025-01-28 10:46:10Dear sisters and brothers, I have been born in a country without any religion. As a young adult I understood that a life without spirituality does not make sense. Today, 50 years later, I am convinced that the family of creation consists of divine beings with the potential to unfold endless love - independently of the controversies between singular religions.
Each of us human beings is full of divine sparks which may strengthen each moment during our life the fire of love and compassion toward all living beings in the universe. These divine sparks may feed the eternal dance of creation.
Religion and science have converged during the last centuries: Divine spirit is the driving force of all happenings in our universe. Buddha, Plato, Jesus Christ, Kabir, Guru Nanak, Albert Schweitzer and recently many Nobel Price winning physicists have expressed the same conviction:
We are divine creators of the paradise resulting from genesis on this planet within the living universe. Looking around the world these days, however, we observe harm, hunger, dissence, struggle and war.
How does this coexist â the potential to create the paradise on the one hand â and the destructive forces leading to a multitude of catastrophes? May be you like the following way to interprete what is going on actually:
We are born to be tested in a learning adventure of evolution within the cosmos. The life of each of us is an examination checking whether we are ripe for creating the paradise.
Each generation of human beings has the chance to reach the tipping point. Possibly todays generation, all of us sitting here, might overcome the centennial struggle on details of diverse religions and worldviews. If we today conjointly remember our potential as divine beings to create a peaceful and well balanced world - then we can make the next step of cosmic evolution â charcterized by love, peace and respect for all forms of life:
We may give now birth to a new chapter in the process of evolution. The time might be ripe these days. Let me give some illustrations for my optimism based on my work of the past 30 years in Germany: 30 years ago in my country most of all fuels for electricity and heating were imported. All German villages depended existially from international trusts supplying nuclear and fossil energy. The great majority of Germans relied on imported fossile or nuclear fuels. Today, 30 years later, we count 200 villages with own energy production based on regional ressources which were initiated by teams of german universities, where I have been active.
During the same time the number of similar activities aiming at a regionally organized society all over the world exploded. In many countries many local initiatives were founded organizing food production, local trade, water supply and many other fields of human needs on a regional base in fair and clean ways, without any international activities of global players like MacDonald or Monsanto.
Another world is possible â and even better, the regional society is blossoming already since decades worldwide.
A second source for my optimism is my scientific work. Humans dispose of spiritual potentials enabling us to connect with the holy spirit surrounding us since eternal times. Individuals unfolding this potential and behaving respectfully toward other beings report higher well-being as compared to other people. That empirical pattern has been found in hundreds of scientific studies all over the world. These results feed our trust, that we are on the right way with our regional initiatives like Kirpal Sagar in India, the new energy villages in Germany, the clean and fair agriculture initiatives worldwide, the open seeds movement and the many further initiatives.
Remembering Mahatma Gandhi, the great indian philosopher and politician: We do not need to fight against the players of the old world, against psychopathic people in international trusts and organizations who plan a world all of us dislike. This old structure will break down by itself.
Meanwhile we build the society we prefere: Ethically grounded communities like Kirpal Sagar, based on grace, fairness and respect between all living beings. My congratulation to the golden jubilee of this wonderful project, which may serve as a model for the whole world.
Let´s shake our hands, connect our hearts and let´s bring our souls in harmony within the cosmic concert of love!
Peter Schmuck, psychologist and regional society activist, Germany, february 5 2024.
First published at the German platform for future communities
-
@ da0b9bc3:4e30a4a9
2025-01-28 10:01:29Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
đ¨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!đ¨
đ¨Subscribe to the territory to ensure you never miss a post! đ¨
originally posted at https://stacker.news/items/867409
-
@ 0463223a:3b14d673
2025-01-28 09:38:30I still donât have much of an idea how it all works, even after all these years. I scroll around the web looking for connection and often donât find it. Building on the theme I wrote before, how some folks are very sure of themselves. I still donât get it. A critique people had of me in the past was a lack of confidence. Thatâs a hard thing to deal with as a man. The statement is really saying youâre low status and if only this that and a third, youâd be a decent human. Cheers!
Iâm a recluse. Thereâs been periods of life Iâve been non verbal and Iâve avoided social interaction a lot. On the flip, I got quite good at wiggling records about to make funny noises and this enabled me to involve myself in music in various was, despite never being a âproper musicianâ, you know, like someone who plays a guitar or piano etc. Over a very long time frame Iâve found myself around music makers that I share common interest with, be that Dub, Hip Hop, weird noises etc. Itâs funny, I now know some pretty serious players within those genres and count as few as good friends. Itâs fucking mental to be honest. Iâve ticked off a number of childhood heroes, probably people you donât know, some you wouldâve definitely heard on radio but wouldnât know their names.
I like to think Iâm quite good at what I do but the confidence thing is still difficult. Had I moved to London in my youth I could've earned a lot more money, especially in the 90s when there was actually a functioning music industry but I know I canât deal with that level of hectic so Iâve remained in small places by the sea both in the UK and abroad.
Iâve been working on an album for the best part of a year and have 4 tracks I feel happy with, at least I feel theyâre a good representation of my abilities and Iâve been very lucky to have a world class player contribute bass on a couple of tracks. I donât share the talents of my compardres but as one well known musician I toured with said to me, âI know youâre for the bandâ. A simple statement but thatâs what mattered to him. He liked that I gave a shit about how they sounded, despite beating myself up because I often felt I was fucking their sound up big time (I didnât let on, with the exception of one gig where EVERYTHING went wrong. I went straight to the dressing room after and flung myself at the mercy of the band apologising!).
After many years Iâve found my groove. Now Iâm on this protocol called Nostr. Itâs a strange place. Itâs very niche, made up of money obsessed nutters. I share some of their beliefs but not all. Itâs very American (is anywhere online not?) but itâs cool. Iâm finding myself there more and more. I quit all major platforms in 2019. Iâd learned too much nasty shit to contribute to making the companies richer. Itâs weird, many people donât seem to realise, you can stop using these platforms and they disappear. Thatâs the only thing giving these people power. Maybe people enjoy being milked for data? Do cows like having their teets clamped for milking? Iâve never got an answer from oneâŚ
Prior to that I found some weird internet money thing which is also becoming more popular, even the President of the USA has some (I think, he also has some other funny tokens and appears to be scamming people big time, yet people still really dig him for some reason).
This funny money has given me something Iâve not really had before, at least since I was maybe 10. A sense of security. Itâs remarkable how much more mentally stable it can make you. When I lost my last living place (usual landlord BS) I moved in with my now wife and built a shed, filled it with noise making stuff. That wouldnât have been possible without my anger towards the banks and how our governments gave them a free pass after they fucked us all. Some deep shit happened but thatâs a whole other story. This thing internet money seems to be catching on...
Now I watch higher status folks stake their claim on the world. I try to zone them out as best I can, at least when theyâre telling me how successful they are for reasons and playing their status games online. Iâm much more interested in learning, mostly via audio, Iâve spent more hours listening to people I disagree with online than I can keep track of. I learn what I can from them and do my best to disregard the noise and try to maintain an awareness of my biases.
I donât want to agree with everyone here. The moment I do, I know Iâm doing something wrong.
Theyâll be someone reading this, maybe you, thinking this is utter cringe. Fair enough, Iâm not here for you, Iâm looking for cool noise makers and weird people to hang with. Clearly this is self indulgent bollocks but fuck it, Iâll put it on this Nostr thing anyway.
-
@ 16d11430:61640947
2025-01-28 09:05:13The Millennial generation stands at a unique crossroads in history. Born into a world where traditional systems of economic and social power were firmly entrenched, they have matured in an era where those very systems are showing cracks. Nowhere is this more evident than in the rise of Bitcoinâa financial and cultural phenomenon that reflects not only technological progress but also the profound sociopsychological struggles of a generation attempting to wrest autonomy from the aging custodians of power.
Prolonged Adolescence and the Deferred Quest for Autonomy
Millennials, often caricatured as perpetual adolescents, have endured an extended transition into adulthood. Saddled with unprecedented student debt, stagnant wages, and skyrocketing living costs, this generation has been systematically delayed in achieving the milestones traditionally associated with maturityâhome ownership, financial independence, and generational leadership. Their prolonged adolescence was not born of laziness or indulgence but of structural barriers, many of which were crafted and perpetuated by the Baby Boomer generation.
Bitcoin represents a symbolic and literal breaking away from these constraints. The decentralized cryptocurrency is, in essence, a rejection of the financial institutions that Millennials perceive as oppressive. It offers an alternative to a system that has kept them financially infantilized, tethered to debt, and locked out of wealth-building opportunities. Embracing Bitcoin is not merely an economic actâit is a psychological declaration of independence.
The Boomer Legacy and the Daunting Task of Succession
The Baby Boomers, who rose to dominance in an era of postwar economic growth, have remained the gatekeepers of wealth and power well into their senior years. This has created an intergenerational bottleneck: Millennials find themselves poised to inherit a world that is increasingly unsustainable, while also confronting the inertia of a generation reluctant to relinquish control. The sociopsychological impact of this dynamic is profound. For Millennials, the act of "growing up" has become synonymous with the Herculean task of dismantling or reforming entrenched systems.
Bitcoinâs narrative of decentralization, transparency, and individual sovereignty resonates deeply with Millennials because it offers a vision of empowerment. It provides a means of bypassing the gatekeepersâof creating value and financial freedom outside the confines of legacy institutions. Psychologically, this represents a vital step in the developmental journey: the move from dependency to self-reliance, from frustration to agency.
Weaning from the Teat: Financial and Emotional Independence
The metaphor of weaning is particularly apt for understanding the Millennial relationship with Bitcoin and the broader financial landscape. For much of their lives, Millennials have been financially dependentâon parents, on government programs, on an economic system that rewards conformity and punishes risk. Bitcoin is the ultimate tool for "weaning" this generation off the teat of dependency. It demands financial literacy, discipline, and a willingness to embrace uncertaintyâall hallmarks of psychological maturity.
However, this journey is not without its challenges. The volatility of cryptocurrency markets mirrors the emotional turbulence of late adulthood, where the quest for independence often involves trial, error, and occasional failure. Millennials are learning, through Bitcoin, the hard truths of self-governance: that freedom is inseparable from responsibility, and that control cannot be wrested from others without first mastering oneself.
The Psychology of Late Adulthood in a Transitional World
Late adulthood, for Millennials, is marked by a dual psychological burden: the need to create a new world while still living in the shadow of the old. This is not merely a financial or technological challengeâit is a deeply existential one. Bitcoin, as both a tool and a symbol, encapsulates the struggle to bridge these worlds. It offers hope, but it also demands courage.
The generational shift from Boomers to Millennials is not just a passing of the torch; it is a seismic cultural shift. Millennials are redefining the very meaning of adulthood in the 21st century, and Bitcoin is a cornerstone of this redefinition. By rejecting the centralized systems of their predecessors, they are building a future that prioritizes autonomy, equity, and resilience.
Conclusion: Bitcoin as the Rite of Passage
In clinical terms, rites of passage are critical for psychological growth. They mark the transition from one stage of life to another, providing both challenge and transformation. For Millennials, Bitcoin is not just a financial instrument; it is a rite of passage. It is the means by which they assert their adulthood, reclaim their autonomy, and begin to dismantle the structures that have held them back.
In the broader context of human development, the rise of Bitcoin may be seen as a pivotal moment in the collective psycheâa moment when a generation, long delayed in its coming-of-age, finally steps into its power. The journey is fraught with uncertainty, but it is also rich with possibility. And as with all rites of passage, the true transformation lies not in the destination but in the courage to undertake the journey.
-
@ 57d1a264:69f1fee1
2025-01-28 08:19:40TASK: Provide three solutions to one of the problems (non-technical) observed during the UX audit in Kenya.
https://www.youtube.com/watch?v=0ht9cy4ZOUw
This call was after the Bitcoin UX Bootcamp which was held in Africa at the ABC conference in 2024. 10 UX designers were selected and completed a 2 day bootcamp as well as a pre-learning phase. During the bootcamp itself they were each project leads for an open-source African bitcoin wallet. They did a UX analysis and usability testing of the wallet to understand how the user experience could be improved. Now after understanding the problem space this call was focussed on how to move from the problem space to the solution space in terms of design. A step by step process was outlined and shared with the participants.
We would greatly appreciate your feedback on these design solutions. Please feel free to share comments, suggestions, or point out any oversights in the comments below or directly on the following figma files (Figma account required, you can create a dummy one, no KYC required).
PRODUCT: TANDO TEAM MEMBERS: @thetimileyin. @LoĂŻc Kassamoto Figma Link: https://www.figma.com/design/LEbxbCBb2WnuneJAL5GFs7/Tando-UX-Audit?node-id=225-987&t=eePmVu0Fx8ibFaEm-4
PRODUCT: BITSACCO TEAM MEMBERS: @afolabioluwatobiloba. @Osatuyi Figma link: https://www.figma.com/design/LYxCZLbq17vxbPNU9FTZ6d/UX-Bootcamp-group-file-(BITSACCO)?node-id=60-61&t=IEnTauLGib3SHA7T-4
We look forward to hearing from you. Thank you!
originally posted at https://stacker.news/items/867378
-
@ 57d1a264:69f1fee1
2025-01-28 02:36:34About the role In this role, you will work on the product design of umbrelOS, some of our umbrelOS apps, and the umbrel.com website.
What are you looking for in candidates? Talent, passion, genuine love for your craft, and the desire to do meaningful work. What weâre not looking for: credentials and degrees. When you really love what you do, work feels like play. And when work feels like play, you become the best at it. Thatâs what weâre looking for.
We hope you: - Like to spend your days staring at artboards in Figma - Are obsessed with creating delightful micro-interactions and animations - Are willing to throw away ideas if they're not great, and optimistic enough to keep hunting for new ones - Care about the details, maybe a bit too much (a pixel off ruins your sleep) - Are excited to collaborate with everyone on the team: engineers, customer facing folks, etcâyou believe inspiration can come from anywhere - Have good judgement of when to ship - Like to level up your design skills continually - Put yourselves in the shoes of our users to craft a great experience - Enjoy being a generalist and are not tied down to a specific design, trend, or tools
Benefits - đ Health insurance - đť New work equipment - đ Work from anywhere in the world - đââď¸ Complete autonomy at work - đ Learning and development stipend - đ Minimum 2-weeks of paid time off - â¤ď¸ Most importantly â doing meaningful work that can change the world
Apply at https://app.withrapha.com/job/692
originally posted at https://stacker.news/items/867248
-
@ 3ae7fdae:f8d4b19d
2025-01-28 00:00:26Lifting the Curtain on Power and Scandal
The Illusion of Power and TrustIn the modern world, the line between trust and skepticism is razor-thin, especially when it comes to powerful figures and organizations. They present polished facades, dazzling us with promises of stability, innovation, or in Disneyâs case, enchantment. Yet, the revelations surrounding Jeffrey Epsteinâs network reminded us that power is often far more complex than it appears. This scandal became a litmus test for public trust and fueled questions about who, or what, might be entwined in hidden truths.
When Epstein's crimes were exposed, they revealed not just the horrifying details of exploitation, but also the unsettling reach of his influence. As the media peeled back the layers of his associations, public attention naturally shifted to recognizable names and institutions, including Disney. How could a company that represented childhood innocence, with castles and fairy tales, find itself whispered about in the same breath as Epsteinâs infamous circle? This segment examines the roots of that question and the facts that illuminate its plausibility or dismiss it.
Epstein: A Man Who Mastered Access to PowerJeffrey Epstein was more than just a financierâhe was a gatekeeper to influence. His lifestyle and operations were an entangled web of charm, manipulation, and wealth, meticulously designed to secure him a place among the powerful. Investigative articles by The Guardian and The New York Times depict Epstein as a social engineer, curating relationships that ranged from politicians and royalty to scientists and celebrities.
Court documents and deposition testimonies during Epsteinâs trial confirmed that his homes and private jet were hubs for connecting with influential figures. This access did not come without consequence; it cemented him as both a source of curiosity and, later, fear. Public records, such as those scrutinized in The Washington Post, indicated his involvement with many high-profile individuals. Yet, the details of these relationships variedâsome guests were casual acquaintances, others, confidants.
The Infamous Flight LogsThe flight logs of Epsteinâs private jet, colloquially known as the "Lolita Express," became a centerpiece for public scrutiny. Released through court orders and accessed by journalists, these logs listed names that triggered a cascade of questions. Guests ranged from prominent business executives to entertainment figures, sparking a debate over whether mere association implied complicity or deeper connections. This fueled the narrative that Epsteinâs reach was far more extensive than previously understood, implicating industries where entertainment, power, and trust intersected.
The Role of Speculation in Public DiscourseAs soon as these flight logs surfaced, discussions surged online and across media platforms. The presence of any entertainment figure in Epsteinâs orbit raised an eyebrow and, in many cases, invited a leap of logic: if influential media personalities were tied to him, could companies known for entertainment and global reach, like Disney, have hidden associations as well? This hypothesis, though lacking concrete evidence, found fertile ground among those predisposed to distrust large, seemingly untouchable institutions.
Itâs crucial to dissect why Disney, specifically, became a subject of speculation. On one hand, its status as an omnipresent media empire makes it an easy target for conspiracy theories that thrive on the juxtaposition of light (Disneyâs brand) and darkness (Epsteinâs crimes). On the other, it speaks to a larger societal impulse to find cracks in the foundations of those we consider infallible. The idea that even the most beloved entities might harbor hidden truths appeals to a deep-seated desire for transparency and accountability.
The Catalyst of Public CuriosityThe timing of Epsteinâs exposure was a critical factor. His arrest and subsequent death in 2019 coincided with a period marked by rising distrust in institutions, fueled by political and social upheavals globally. Social media platforms amplified this distrust, creating echo chambers where half-truths and speculative narratives merged seamlessly with confirmed facts.
It is here that Disneyâs name began to surface not as an accused, but as a speculative point in discussions. The reasoning often pointed to a "guilt by association" logic: if the powerful dined, flew, or partied with Epstein, then it was worth questioning the circles in which those powerful entities moved, even without direct evidence. This leap from speculation to assumption reflects a pattern that sociologists recognize as part of conspiracy theory psychologyâwhere a lack of clear answers invites the mind to fill in gaps, often with what feels most compelling.
Reframing the Publicâs QuestionsThe real question becomes: why does this speculation hold such sway, even when evidence is scarce? Part of the answer lies in precedent. History is replete with instances where institutions that seemed above reproach were later implicated in hidden misdeeds, from financial frauds to abuse scandals within trusted organizations. This collective memory primes the public to believe that beneath any glittering surface could lie a dark, concealed underbelly.
Disneyâs position as an icon of childhood and innocence adds another layer to this narrative. To imagine that such a symbol could be tainted by proximity to someone like Epstein is not just shockingâitâs fascinating. It strikes at the core of what we hold sacred, making it an irresistible topic of conversation and investigation.
Why This MattersUnderstanding why names like Disney are brought into these discussions without verified evidence is essential. It helps differentiate between warranted inquiry and unsupported speculation, allowing us to approach these narratives critically. Addressing this head-on does not only clear the air but strengthens the foundation upon which valid criticism and accountability are built.
A Note on EvidenceAs we move deeper into this exploration, itâs critical to emphasize that while Epsteinâs connections to high-profile figures are thoroughly documented, there remains no evidence tying Disney, as an organization, to his operations. Still, the fascination with the âwhat-ifsâ continues, driven by our collective quest for understanding power, secrecy, and the thin line between public and private lives.
The next segment will dive into Epsteinâs proven network, unraveling the extent of his influence and why it has been the breeding ground for questions involving the worldâs most trusted corporations.
Epsteinâs Documented Network
The Web of Power: A Portrait of InfluenceJeffrey Epsteinâs network was not merely a collection of acquaintances; it was a curated gallery of the worldâs most influential figures, built on calculated relationships and strategic connections. Epstein wielded this network with the precision of a skilled operator, bridging disparate realms of societyâpolitics, academia, business, and media. Investigative reporting by sources such as The New York Times and The Guardian exposed how Epstein maintained access to individuals who shaped policy, managed wealth, and crafted the narratives of popular culture.
Court records, testimonies, and detailed analyses of his interactions revealed that Epstein was adept at placing himself at the center of elite circles. His estates, from Manhattan townhouses to private islands, hosted events that blurred the lines between social gatherings and strategic networking. This chapter delves into the proven extent of Epsteinâs reach and why it sparked questions about connections to corporations and public institutions, including Disney.
Flight Logs: The Proof and the SparkThe flight logs from Epsteinâs private jet, the infamous "Lolita Express," were among the most illuminating pieces of evidence in mapping his connections. These logs, legally obtained and examined by journalists, painted a picture of Epsteinâs influence stretching across industries. High-profile figures were listed, including financiers, political leaders, and entertainment personalities. The presence of notable names triggered waves of speculationâif Epstein had access to such power players, how many more remained unnamed but entangled?
The Guardian and The Washington Post reported that these flights were not just transportation but often involved visits to Epsteinâs various properties, known for their opulence and the dark rumors surrounding them. While these logs confirmed that many public figures knew Epstein, the depth and nature of their associations varied widely, from casual acquaintance to deeper involvement.
The Limits of the KnownDespite the breadth of documented connections, there was no verifiable evidence linking Disney as an entity to Epsteinâs circle. What the flight logs and guest lists revealed was a man deeply embedded in networks of power, yet even within these proven associations, context was crucial. For instance, some guests, confirmed by court records and investigative articles, were shown to have attended public events or engaged in business unrelated to Epsteinâs criminal activities.
The distinction between documented presence and complicity is where the narrative often splinters. The leap from association to implication fueled public debate and conspiracy theories. This was especially true when figures from media and entertainment, sectors known for influencing public sentiment and childhood memories, appeared on the periphery of Epsteinâs activities.
Epsteinâs Parties and Gatherings: The Eliteâs Shadowed StageEpsteinâs parties were legendary, drawing attendees from the highest echelons of influence. These gatherings were not casual mixers but orchestrated showcases of power. Reports from court depositions and firsthand accounts highlighted how Epstein leveraged these events to cement alliances and reinforce his status as a gatekeeper to the elite. Some testimonies even described how these events served as platforms for discussing investments, politics, and global initiatives, reinforcing Epsteinâs perceived omnipotence.
High-Profile Confirmations and Their ImplicationsSeveral prominent individuals were indeed verified as having ties to Epstein, raising legitimate questions about the extent of their knowledge or involvement. These names included politicians, royalty, and entertainment figures. The ambiguity surrounding these associations allowed theories to flourish. The sheer presence of influential names on Epsteinâs guest lists raised the question: If these individuals were implicated, what about the institutions they represented or the circles they moved within?
This was a turning point for public speculation. The logic extended: if an individual from a major media company or entertainment empire like Disney was even remotely connected, could that implicate the company itself? The answer, according to existing court records and credible investigations, remained no. Yet, the absence of direct evidence did not stop speculation; in many cases, it intensified it.
Why Disney Was Brought Into the ConversationDisneyâs reputation as a family-friendly giant contrasted starkly with the dark nature of Epsteinâs activities, making it an unlikely yet intriguing topic for public discourse. While some entertainment figures appeared on Epsteinâs flight logs or were rumored to have interacted with him, investigations have not yielded any proof of corporate-level involvement. However, public fascination persisted, bolstered by the broader questions Epsteinâs connections evoked.
Itâs worth noting that corporations like Disney, with their vast reach and unparalleled influence, naturally become focal points when discussions of hidden truths arise. The mere idea that such an iconic entity could be associated with real-world shadows captures the imagination and fuels stories that, while lacking proof, thrive on the âwhat-ifsâ that echo through media and online forums.
How Public Perception Shapes the NarrativeSociologists studying the psychology of conspiracy theories point out that the human mind tends to fill gaps in knowledge with what feels most plausible or compelling. When figures from reputable media or entertainment companies are tied, even tangentially, to a scandal as vast as Epsteinâs, it challenges the boundaries of trust. This is exacerbated when concrete answers remain elusive, leading to a cycle where suspicion feeds speculation.
The publicâs thirst for accountability, especially in the wake of uncovered scandals involving powerful institutions, is both a force for truth and a catalyst for assumptions. In Epsteinâs case, the proven reach of his influence and the confirmed involvement of significant figures were enough to trigger the question of how many untold stories lay beneath.
What We Know vs. What We ImagineThe narrative surrounding Epsteinâs documented network shows us that while connections can be verified and associations noted, the leap to implicating entire organizations like Disney requires more than names on a list or rumors. It requires evidence that has, thus far, not been presented in any court or investigation. The proven facts are compelling enough: Epsteinâs influence was extensive, his ties to power irrefutable. Yet, without direct links, the conversations about specific corporate involvement remain speculative.
In the next segment, we will explore why Disneyâs reputation makes it a prime target for such speculation and how its historical handling of public crises plays into these narratives.
Disney â The Symbol of Trust and Target of Suspicion
Why Disney? The Paradox of a Trusted InstitutionDisneyâs legacy is built on a foundation of storytelling, dreams, and the belief in happy endings. For nearly a century, the company has woven itself into the fabric of childhoods, becoming synonymous with innocence and magic. This legacy, however, has a dual edge. As the public's trust in institutions erodes and hidden truths are revealed in other sectors, Disneyâs position as an untouchable cultural icon makes it both a beacon of light and a potential target for suspicion.
The Symbolism of Disneyâs BrandDisney represents more than just a company; it embodies an ideaâa refuge where imagination and wonder reign. But this same image that has made Disney a household name also contributes to the paradox of suspicion it faces. When an organization is seen as larger than life, transcending generations and continents, the notion that it could have skeletons in its closet becomes a tantalizing thought. The juxtaposition of innocence with possible shadows creates a narrative that is compelling and worth exploring, even if it remains speculative.
This paradox of Disney as both a trusted symbol and a target for scandal reflects a broader trend. Major corporations that hold influence in our everyday livesâparticularly those that shape childhood memories and societal valuesâare natural focal points when scandals involving power, influence, and exploitation arise. The idea that a company with as much reach as Disney could be connected, however tangentially, to figures like Epstein feeds into this pattern.
Documented Misconduct and Public ReactionsThere have been verified cases involving Disney employees engaging in misconduct, which have been reported by media outlets such as NBC News and local news channels. These incidents, though not systemic and unrelated to Epsteinâs network, show how the actions of a few can impact public perception of an entire organization. Examples include arrests for crimes involving minors or inappropriate behavior, isolated events that Disney has publicly addressed through statements and cooperation with law enforcement.
However, these incidents were sufficient to plant seeds of doubt in some minds. Even when addressed swiftly and in line with corporate protocols, such cases reveal a vulnerability: the companyâs image can be tarnished not just by its policies, but by the misdeeds of individuals who wear its badge.
The Fuel for SpeculationThe Epstein case acted as a catalyst for looking beyond the obvious, particularly in the context of powerful organizations. If political leaders, financiers, and cultural icons could be connected to Epsteinâs circle, why not wonder about the involvement of a company with as vast a presence as Disney? While investigations by trusted outlets have shown no direct corporate link, the sheer scope of Epsteinâs influence suggested that any entity known for associating with the powerful could be implicated.
This speculation was not helped by Disneyâs approach to public relations. The companyâs PR strategies, while sophisticated and generally effective, often prioritize message control over transparency. In a world where silence can be seen as complicity, this strategy sometimes backfires, leading to more questions than answers.
Public Distrust and Historical ContextThe publicâs fascination with uncovering hidden truths within major institutions is not unfounded. History is replete with cases where seemingly trustworthy organizations were later found to have concealed scandals. From corporate frauds to abuses within religious institutions, these stories have taught the public that innocence is not immune to corruption. This backdrop primes society to believe that even the most beloved entities, like Disney, could harbor secrets.
Sociologists and media analysts argue that this distrust is a byproduct of what they term the âbetrayal effectââwhere past disappointments with trusted institutions lower the threshold for believing that betrayal could be lurking everywhere. Disney, with its spotless public image and vast influence, becomes an especially juicy target for such theories. The leap from real cases of employee misconduct to more systemic accusations, however, is where evidence often falls short.
The Role of Social Media and Echo ChambersThe digital age has amplified how speculation morphs into perceived truth. Platforms like Twitter, Reddit, and Facebook allow theories to spread quickly, often outpacing fact-checking and nuanced analysis. Discussions that might once have been confined to fringe circles now gain mainstream attention, especially when they involve powerful figures or beloved brands.
In the context of Epsteinâs exposure, this meant that any high-profile connection or name could become part of a broader narrative of guilt by association. The fact that Disney, as a corporation, appeared in speculative discussions alongside verified names from Epsteinâs logs was enough for some to draw connections, even without direct evidence.
Reputation Management and PerceptionDisneyâs approach to crises and controversies has long involved careful reputation management. From its response to legal issues to how it handles employee-related incidents, the company employs sophisticated PR strategies to mitigate damage and maintain its standing. This is standard practice for global brands; however, the publicâs interpretation can be different. Strategic silence or tightly controlled statements can come across as evasive, fueling theories that there is something more to hide.
For a company like Disney, which operates at the intersection of family values and global corporate power, the stakes are high. The expectation isnât just for entertainment but for upholding the moral high ground. When speculation links Disney to scandals, no matter how peripherally, it chips away at this carefully crafted image.
Why Address This Now?The speculation around Disney and Epstein underscores a crucial point about the nature of public inquiry and corporate reputation. It is not enough for companies to rely solely on public relations strategies that worked in the past. The demand for transparency is greater than ever, and silence, even when warranted, can erode trust.
Disneyâs role in the public consciousness means that even baseless theories need addressing. By understanding why these narratives gain traction, both companies and the public can engage in more meaningful dialogues about accountability, proof, and trust.
The next segment will delve into how the public navigates between confirmed facts and conspiratorial whispers, exploring why certain theories stick and what it means for how we view powerful organizations.
Separating Fact from Conspiracy
The Thin Line Between Evidence and Speculation In the age of information, where facts are readily available yet often overshadowed by conjecture, separating truth from conspiracy is both an art and a necessity. When powerful entities like Disney find themselves drawn into discussions of hidden networks and scandals involving figures such as Jeffrey Epstein, it highlights a broader societal challenge: how do we differentiate between what is proven and what is assumed? This segment dissects the interplay of evidence, theory, and the psychological factors that drive our need to seek connections.
The Basis of Public Suspicion Public trust in large institutions has waned over decades, driven by a series of high-profile betrayals. From corporate frauds that shattered economies to scandals involving trusted religious or educational institutions, society has learned that power often conceals flaws and, in some cases, criminal actions. According to research published in the Journal of Communication, this erosion of trust leads to a phenomenon known as confirmation biasâthe tendency to interpret new evidence as confirmation of oneâs existing beliefs or suspicions.
The Epstein case provided fertile ground for such biases. The verified details of Epsteinâs operationsâthe private jet, the exclusive parties, the high-profile guestsâwere enough to prompt a collective re-examination of how far his reach extended. While many of his associations were proven to be casual or professional in nature, the publicâs hunger for deeper revelations ensured that speculation would thrive in areas where clarity was lacking.
The Role of Real Connections Epsteinâs documented network included figures from politics, academia, finance, and media. The release of flight logs and court documents revealed that powerful individuals attended his events and interacted within his sphere. This factual basis, verified by investigative reporting from The New York Times, The Guardian, and other reputable sources, provided legitimacy to the idea that Epsteinâs influence was pervasive. However, the extent to which these relationships were innocent or complicit was not uniformly clear.
This ambiguity created a vacuum where speculation could flourish. Public attention shifted from individuals named in the logs to the institutions and industries they represented. It was here that major corporations, including Disney, entered the discourseânot because of documented ties, but because of their visibility and influence.
The Psychology Behind Linking Power and Scandal To understand why theories about Disneyâs potential involvement in Epsteinâs network persist, it is essential to examine the psychology of conspiracy. Sociological and psychological studies indicate that people are naturally inclined to question narratives when they feel that the truth is being withheld. The more powerful or untouchable an institution seems, the more likely it is to be suspected of hiding something significant.
Disneyâs image as a global giant that molds childhoods and shapes culture makes it an appealing target for such theories. The companyâs public persona as a bastion of family values and innocence stands in stark contrast to any whispers of scandal or misconduct. This contrast alone provides fertile ground for stories to grow, even in the absence of solid proof.
Confirmed Misconduct vs. Conspiracy It is important to acknowledge that Disney, like any large corporation, has faced incidents involving employee misconduct. News reports from outlets such as NBC News have documented cases where employees were arrested for inappropriate conduct involving minors. These cases, while serious and handled with appropriate legal responses, were isolated incidents. No evidence points to these cases being part of a larger, systemic issue within the company or connected to external figures like Epstein.
However, the very existence of these incidents is often enough to keep theories alive. Public perception does not always differentiate between an individualâs actions and the culture of the organization they work for. When these incidents coincide with broader conversations about power and secrecy, they feed into narratives that imply guilt by association.
The Amplifying Power of Social Media The role of social media in shaping and amplifying conspiracy theories cannot be overstated. Platforms like Twitter and Reddit have created spaces where facts, opinions, and theories coexist with little separation. When the Epstein scandal broke, social media was flooded with discussions, many of which featured a mix of verifiable information and speculative connections. The absence of direct evidence linking companies like Disney to Epstein did not deter users from proposing connections based on circumstantial evidence and âwhat-ifâ scenarios.
This phenomenon, described by media analysts as the âecho chamber effect,â allows theories to gain credibility through repetition rather than proof. As theories are shared, retweeted, and commented on, they accumulate a sense of legitimacy that belies their origins.
Why Certain Theories Stick Certain theories persist because they tap into deep-seated fears and the knowledge that the powerful often operate beyond the reach of conventional accountability. High-profile scandals involving powerful figuresâwhether in business, politics, or entertainmentâreinforce the belief that more may be hidden just out of reach. Epsteinâs network was confirmed to include names that were once considered untouchable, which validated the idea that hidden truths could surface anywhere.
Disneyâs name appearing in speculative discussions highlights the intersection of innocence and power. It reflects a societal expectation that if one pillar of influence is shown to be compromised, others may be as well. This expectation, however, must be tempered with critical thinking and an examination of evidence.
The Need for Discernment Understanding the difference between fact and theory is crucial for informed dialogue. Public scrutiny is essential for accountability, but it must be balanced with discernment. While Epsteinâs known associations spanned many sectors, and while individuals from the entertainment industry were involved in his circle, the leap to implicating entire organizations like Disney has not been supported by verified investigations.
The Reality Check Hereâs what we know:
Documented Facts: Epsteinâs network included influential figures, confirmed by court records and journalistic investigations. Disneyâs Position: While Disney has faced isolated cases of employee misconduct, no substantial evidence ties the company as an institution to Epsteinâs criminal activities. Public Perception: Theories are fueled by a combination of legitimate distrust in powerful institutions and the psychological need to connect the dots, even when the evidence does not support it. In the next segment, we will explore how media control and the use of non-disclosure agreements (NDAs) contribute to the publicâs perception of secrecy and whether this perception is warranted.
Media Control and NDAs â Protecting Power or Ensuring Silence?
The Strategy of Silence in Crisis Management When powerful organizations face potential scandal or crises, the first line of defense is often controlâcontrol over the narrative, control over information, and control over public perception. This strategy, while effective in mitigating immediate damage, can backfire by fostering an aura of secrecy that leads to suspicion. Disney, like many other global corporations, has historically employed these tactics, particularly through the use of non-disclosure agreements (NDAs) and strategic public relations (PR) campaigns. But do these measures protect legitimate corporate interests, or do they simply fuel theories that there is more being hidden?
Understanding the Role of NDAs NDAs are legal tools designed to maintain confidentiality and protect business interests. In most cases, their use is standard practice, whether to protect trade secrets, secure settlements, or manage sensitive internal matters. However, when NDAs intersect with scandals involving powerful individuals or organizations, they can become symbols of enforced silence. A report from the Harvard Business Review highlights that while NDAs are often employed for legitimate purposes, their misuseâespecially when used to silence allegations of misconductâhas cast a shadow over their intent.
Disney has used NDAs in its corporate dealings, as have many in the media and entertainment sectors. This is not in itself suspicious; however, the mere presence of NDAs in a companyâs arsenal can contribute to a narrative of secrecy, especially when paired with limited transparency during controversies.
The Case of High-Profile Secrecy The Epstein scandal showed how the use of NDAs and strategic silence could be perceived in a different light. When influential figures and companies were linked to his circle, silence from those implicated was interpreted by many as an attempt to avoid deeper inquiry. While Disney has not been tied to Epsteinâs activities through verified evidence, its use of NDAs in unrelated circumstances and its approach to handling public controversies have made it a recurring subject in theories about hidden truths.
For example, Disneyâs meticulous control over its brand image means that it often handles internal issues privately, releasing carefully crafted statements that address public concerns without divulging specifics. This approach, while protective, sometimes has the unintended consequence of making the public wonder what is not being said.
The Intersection of PR and Public Perception Public relations are designed to safeguard a companyâs image, ensuring that responses to any negative news are swift and tightly managed. Disneyâs PR machine is among the most sophisticated, capable of steering narratives and maintaining its reputation as an entertainment titan. This strategic control has allowed Disney to weather crises that might have permanently damaged lesser brands. However, in the context of a scandal as sprawling and notorious as Epsteinâs, such control is perceived differently.
When the Epstein story broke and high-profile connections came to light, companies with any tenuous ties activated their crisis management protocols. For some, this meant issuing vague statements or refusing to comment altogether. To the public, this read as silenceâa strategic choice that seemed suspicious when paired with known instances of NDAs being used to keep serious allegations quiet in other industries. The #MeToo movement, for instance, revealed how NDAs were used by some media companies to shield powerful perpetrators of harassment, showing that these tools can sometimes contribute to a culture of concealment.
Silence as Complicity? For a company like Disney, known for its polished public image, silence during times of widespread speculation can amplify suspicions. The question becomes: Is silence an act of protection or complicity? While NDAs are often used to manage settlements or protect internal processes, the fact that they prevent full transparency can make even innocent parties appear as if they have something to hide.
Experts in crisis communication argue that silence may protect the brand short-term but can erode trust long-term. Disneyâs approach to handling public perception, from managing employee misconduct cases to addressing larger social controversies, often involves strategic responses that give the public enough information to stay satisfied but not enough to quell the more skeptical voices. This is standard practice but becomes contentious when the public is searching for accountability.
The Impact of Strategic Silence on Public Trust Media and communication studies have shown that transparency is increasingly becoming a measure of trustworthiness for corporations. In an era where the public demands answers and alternative media thrive on filling in gaps left by corporate PR, the stakes for maintaining trust are higher than ever. The use of NDAs and controlled statements can protect a companyâs interests, but it also contributes to a perception of secrecy that feeds public doubt.
Disneyâs balancing actâprotecting its brand while managing incidents behind closed doorsâreflects a broader industry trend. Corporations that prioritize narrative control must now reckon with an environment where even a hint of concealment can lead to damaging speculation. The Epstein case amplified this issue, putting the spotlight on how major organizations handle proximity to scandal, even if only by association.
Navigating the Perception The real challenge for Disney and similar companies lies in navigating the fine line between protecting their interests and fostering trust. Complete transparency can be risky, but strategic silence risks becoming complicit silence in the eyes of the public. This dualityâwhere necessary protection measures are perceived as proof of hidden wrongdoingâis why entities like Disney find themselves caught up in discussions about figures like Epstein, despite the absence of concrete evidence.
The Takeaway for Institutions and the Public Understanding the role of NDAs and PR in managing public crises helps frame why powerful companies might become targets of suspicion. While the use of these tools is standard and often justified, their impact on public perception canât be ignored. For the public, recognizing the difference between warranted inquiry and overreach is key to maintaining productive scrutiny without falling into the trap of baseless theories.
The next segment will focus on what these perceptions mean for society as a whole and why the pursuit of transparency and trust must be a collective endeavor.
Beyond the Shadows â A Call to Unity
The Complex Path to UnderstandingIn an age where trust in powerful institutions is fraying, and access to information is both a blessing and a burden, our approach to truth becomes more critical than ever. The discussions surrounding figures like Jeffrey Epstein and corporations like Disney are not just about scandal; they are about how we, as a society, confront power, secrecy, and transparency. This segment is a call to unite in the pursuit of truthânot through a divisive lens, but with collective discernment and an unwavering commitment to evidence and integrity.
The Lessons from HistoryHistory teaches us that institutions once seen as untouchable can harbor hidden truths. The exposure of corporate frauds, systemic abuses, and cover-ups within trusted sectors has shaped a society that questions everything. The Epstein scandal underscored this, revealing a network of power that reached further than many dared to imagine. Yet, while it validated the publicâs instinct to question, it also highlighted a key challenge: differentiating between grounded inquiry and baseless theory.
Disneyâs name appearing in speculative discussions about Epstein points to a broader patternâour collective desire to ensure that those who hold power are not above scrutiny. But as we demand accountability, we must also unite in the practice of informed skepticism. The leap from isolated cases of misconduct or association to implicating entire organizations requires evidence, not just conjecture. This distinction is where we, as a society, must find common ground.
The Role of TransparencyTransparency has become the cornerstone of public trust. Organizations that handle controversies behind closed doors risk damaging their credibility. For companies like Disney, known for protecting their brand with meticulous care, the challenge is clear: find a balance between safeguarding legitimate interests and providing enough transparency to maintain public trust.
The use of NDAs, strategic silence, and controlled narratives may shield brands in the short term, but they can erode trust in the long run. Studies in crisis communication emphasize that openness, even when it exposes vulnerabilities, can reinforce loyalty and confidence among stakeholders. In the context of Epstein and the persistent whispers about powerful corporations, this lesson is especially relevant.
A Collective Call to ClarityThe pursuit of truth is not just the responsibility of journalists, whistleblowers, or industry watchdogsâit is a collective endeavor. The public plays a crucial role in this, but so do the corporations that hold sway over cultural and economic landscapes. When Disneyâs name enters speculative discussions, it reflects a deep-seated desire for transparency from those we trust. This desire should be met not with fear of the unknown but with a commitment to clarity.
This segment is a call for unity in approaching these conversations. The balance between healthy skepticism and conspiracy theory is delicate but essential. We must ask hard questions and hold power accountable without losing sight of what separates substantiated fact from assumption.
Why Unity MattersIn times where speculation can divide and misinformation can spread faster than verified facts, unity in the pursuit of truth is vital. When we allow fear and uncertainty to fracture our approach, we weaken our collective power to bring genuine issues to light. Epsteinâs case showed that hidden wrongs do exist and can involve the most influential figures. It also showed that uncovering the full scope of such wrongs takes a community committed to patience, evidence, and shared purpose.
Public scrutiny is essential for democracy and social justice, but so is discernment. When theories about organizations like Disney arise without evidence, they risk diverting attention from real, proven issues that demand action. Unity in seeking truth means supporting real investigations, demanding transparency, and recognizing the power of evidence-based inquiry.
Building a Culture of Informed AccountabilityThe goal is not to silence questions but to elevate them, ensuring that they are grounded in reality. This approach not only empowers the public but also sets a standard for institutions. If Disney and other corporations prioritize transparency, they can reinforce the public trust that sustains their brands. Similarly, when the public insists on evidence and integrity in its discussions, it strengthens the very fabric of accountability.
Reflections for the Road AheadAs we move forward, let us commit to being a society that seeks truth not for scandalâs sake but for justice and integrity. Let us stand together in holding power to account, using facts as our foundation and unity as our strength. The story of Epstein and the questions it raises about power, influence, and hidden truths are reminders that transparency and trust are not just corporate responsibilitiesâthey are collective ones.
This call to unity is a reminder that we all play a part in shaping how these stories unfold. When we seek, question, and demand clarity together, we create a society that values truth over rumor, evidence over assumption, and justice over division.
As we conclude this exploration, may we carry forward the lessons learned: the importance of questioning with integrity, seeking truth with diligence, and facing the unknown not as individuals, but as a united community.
-
@ ae6ce958:d0f02c7d
2025-01-27 23:27:51In a world dominated by overhyped tech and broken promises, DamageBDD stands apart as a Bitcoin-first revolution for developers, QA teams, and enterprises. Built on the belief that resilience, transparency, and accountability are not optional, this innovation is more than just another BDD platformâit's a tool designed to harness the unstoppable power of Bitcoin and the Lightning Network to redefine software quality and team productivity. Here's why DamageBDD will light up the Lightning Network like never before:
1. Lightning-Powered Incentives for Development
Imagine a world where developers are rewarded in sats the moment their code passes a milestone. With DamageBDD, thatâs no longer a dream. We use Lightning-based escrow payments tied to milestone completions, ensuring every contributor gets instant, trustless payouts for verified work. This isnât just about paymentsâthis is about transforming the economics of collaboration and incentivizing excellence.
2. Real-Time Transparency Meets Bitcoin Immutability
Every BDD test, every passing milestone, and every failure is immutably recorded, showcasing the evolution of a project with a timestamped on-chain timeline. By anchoring progress to Bitcoinâs ultimate ledger of truth, DamageBDD creates a level of transparency that ensures trustâwhether you're a developer, a manager, or an investor.
3. Immediate Liquidity Without Compromise
The Lightning Network enables participants to exit their locked funds through near-instant buybacksâno risk of long-term lock-ins or centralized interference. Developers and stakeholders can convert their contributions back to Bitcoin at market-close rates, minus nominal fees. This system protects value while keeping all incentives aligned with delivering quality software.
4. A Bitcoin Economy for BDD
Why settle for fiat-denominated payments or centralized intermediaries when you can build directly on Bitcoin? DamageBDDâs ecosystem ensures that every satoshi stays true to the ethos of decentralization, enabling organizations to manage projects in a way thatâs fair, transparent, and resilient.
5. Scalable Adoption of High-Performance Teams
The Lightning Network isnât just a payments railâitâs a bridge for building relationships across borders. DamageBDD allows distributed teams to thrive, making trustless collaboration possible while fostering high-performance, Bitcoin-powered workflows.
6. Redefining ROI for Investors
Investors can now lock funds into milestone-driven escrows, ensuring ROI is directly tied to results. With DamageBDDâs Lightning-enabled payouts, thereâs no waiting for endless revisions or missed deadlinesâjust real-time accountability, measured and delivered on a timeline thatâs verifiable and immutable.
Bitcoiners, this is the spark.
While the fiat world struggles with inefficiency, corruption, and misaligned incentives, DamageBDD fuels the future with a Bitcoin-powered toolkit that transforms how teams work, get paid, and build trust. This isnât just about better softwareâitâs about building an unstoppable Bitcoin economy where transparency reigns, quality wins, and the Lightning Network becomes the default rail for human collaboration.
DamageBDD isnât here to gamble on hypeâitâs here to build the future. Letâs light up the Lightning Network and show the world what Bitcoin-backed innovation can achieve. Are you ready to join the revolution?
-
@ cb43dde2:ef277171
2025-01-27 23:10:39HODL has been defined by many as an acronym for âHold on for Dear Life.â Many my age were taught to earn money and save it for the future as conventional wisdom. That wisdom would have you holding something designed to degrade in value at a rate of 2% annually. If all âgoes to plan,â the purchasing power (value) of your savings in 35 years will be half that of today. In 2022 the US dollar value degraded a total of 8%. At this rate, your savingsâ value will cut in half in less than nine years. Not quite the retirement plan one would hope for, but happens to be what my generation was taught in school. Thankfully there is a solution: become a HODLer of assets.
Every investor is a collector of assets. They all have their own thesis about the assets they collect and how the collection will transport their monetary value across space and time. My thesis is that when you hold assets (the practice of HODLing) you hold the superposition in the market and can make better decisions against the overall economic tide. I like to hold a diverse portfolio across asset types, themes, and tax treatments, so that I am always in a superposition when liquidity is needed for the next opportunity. In the words of Charles Darwin, âit is not the strongest of the species that survive, nor the most intelligent, but the one most responsive to change.â
The Superposition of Markets
A superposition is a phenomenon observed in nature where something is in one of two antithetical positions, both equally likely, and is only defined when observed or measured. Most have heard of the SchrĂśdingerâs Cat thought experiment; this is an example of superposition (references below). The financial markets act as a measuring tool identifying the next entangled pair of buyer and seller. Therefore, as a HODLer you remain in a superposition within the market until either your buy price or sell price is realized, instantaneously identifying your entangled counterpart within the market. To hold assets puts the HODLer in a superposition within the markets in which they HODL.
Making a Market: It Only Takes Two
A market is made when two parties, a buyer and a seller, come to an agreement to transfer personal property between each other. Without an agreement, there is no market activity and therefore no market. There are many more participants that help to facilitate markets like stock exchanges, store fronts, and Craigslist to name a few. This infrastructure has not changed the necessities to make a market but instead acts as a courier of information, often referred to as data. Knowing what a group of sellers are willing to take in exchange for their property, and knowing what a group of buyers are willing to pay, allows for the mapping of the marketâs superpositions (known as an order book). HODLers remain in a superposition except at the moment when a market is made, identifying the two parties involved and the respective roles each will play out.
HODLers are Not Market Participants
They have in fact shown to be previous market participants and willing to fill at least one side of the transaction. However, if youâre HODLing, you are neither a seller nor a buyer and thus not in the market. Rather, you are both a buyer and a seller that has not been realized yet. We all have our buy price and our sell price of the assets we own. However, the market may have not dropped to the point where you are willing to buy again, nor has it risen to the level in which you are prepared to sell. You are but a âHODLer-in-waitingâ with two potential states; you are a potential buyer and a potential seller, waiting to be measured, thus identifying and filling your market role as dictated by the market and your need for access to liquidity.
HODLing: An Investment Strategy Built Upon Superpositions
Due to many market forces, successful investors do not simply stack cash for retirement, they are buying assets. As Robert Kiyosaki explains in his book, Rich Dad Poor Dad, âAn asset is something that puts money in my pocket. A liability is something that takes money out of my pocket.â Investors are buying assets in hopes that their portfolio will ferry their purchasing power, todayâs monetary value, across space and time. Why HODL something that is planned to lose value for any longer than necessary?
HODLing can feel like a rollercoaster at times with the need to âhold on for dear life.â Markets are unpredictable and (as an ex-manager of mine used to say) they will always do what f@&ks the most amount of people. Combat this with conviction in your purchase decisions. Conviction on where you think the price of the asset will go and in how much time. If you start by finding and choosing your long-term savings vehicle, many will call this money, asset purchases on your way to retirement become easier as you are not battling inflation, aka planned degradation of your hard-earned dollars. What you HODL matters.
-
@ 16d11430:61640947
2025-01-27 21:33:11Gather âround, corporate overlords, bloated bureaucracies, and self-appointed tech deities. @DamageBDD is here to show you what happens when your castles of sand face a tsunami of irrefutable logic. Your empire of spaghetti code and buzzword bingo won't hold against the relentless precision of code as truth.
Letâs set the stage. For years, you've been huddling in glass towers, touting innovation while running on fumes of mediocrity. Your agile "transformations"? A PowerPoint deck. Your tech stack? A monument to vendor lock-in and weekend duct tape. And letâs not forget the compliance theater, where fake audits masquerade as accountability. Enter DamageBDD, where logic doesnât lie, blockchain doesnât forget, and BS dies a swift death.
Code Is the Law (But Better) Youâve heard it before: "Code is law." But weâre not here for slogansâweâre here for receipts. DamageBDD doesnât trust your claims of success; it verifies them on-chain. Deliver your milestones or donâtâthereâs no fudging it here. Your failed builds and broken promises are exposed in broad daylight, immutable as your shame.
BDD: The Guillotine of Bad Engineering Oh, how the giants hate being held accountable. They thrive on opacity, on a system where results are obscured by layers of corporate doublespeak. DamageBDD flips the table: if it can be defined, it can be verified. That MVP you promised? Weâll test it. That sprint you boasted about? Weâll see it on-chain. In this world, the only thing that ships is the truth. Everything else is noise.
"Move Fast and Break Things"? Nah, Try Building Things That Last Letâs talk about your cult of "disruption," where moving fast and breaking things conveniently excludes fixing them. DamageBDD doesnât move fastâit moves right. Every behavior-driven test is a brick in a foundation that lasts, unlike your latest "pivot" designed to dazzle VCs while hiding the rot underneath.
Cypherpunk Cynicism, Powered by Bitcoin Hereâs where we really shine. While youâre busy worshiping at the altar of fiat, weâre running Damage Token on Bitcoin and Aeternityâsystems you canât co-opt, corrupt, or inflate away. Your centralized control schemes crumble when faced with a network that doesnât care about your boardroom games. DamageBDD doesnât just bypass gatekeepers; it renders them obsolete.
The Era of Verifiable Integrity Youâve built a world where accountability is optional and profits trump principles. DamageBDD brings receipts to the revolution. Imagine a world where every claim you make is tested, verified, and recorded immutably. No more hiding behind marketing fluff or burying failures in red tape. DamageBDD strips away the facade and says, "Letâs see what youâre really made of."
Weâre Not Here to Compete. Weâre Here to Outlast. You canât kill an idea whose time has come. DamageBDD is more than a toolâitâs a movement, a manifesto in code. While you scramble to protect your crumbling monopolies, weâre building something that doesnât need your approval, your funding, or your permission. DamageBDD will humble you not with arrogance, but with truth, written in lines of immutable logic that your PR spin canât erase.
So, keep clinging to your illusions of control. DamageBDD is patient. Itâs inevitable. And when the dust settles, your legacy will be nothing more than a footnote in a system designed to be better, faster, and ungovernable by the likes of you.
Youâve been warned. Verification > Authority. Always.
-
@ 5579d5c0:db104ded
2025-01-27 19:49:52"Chris, what do you tell your clients to do?"
This is a question I get asked regularly, and the answer is not simple.
The truth is, every personâs health journey is unique.
There are no 'one size fits all' solutions, no rigid plans that guarantee results for everyone.
Thatâs why, as a health coach, my role isnât to hand out answers or impose rules. Itâs to guide you toward uncovering your own.
Bruce Lee on being a teacher.
Your health, your truth
Bruce Lee was right, you already hold the answers to your health challenges.
Your body is constantly giving you signals about what works and what doesnât.
My role is to help you listen to those signals to cut through the noise of diets, trends, and quick fixes.
Together we focus on what aligns with your unique biology and lifestyle.
This isnât about creating a rigid plan or forcing you into a pre-made program.Â
Itâs about asking the right questions, giving you tools to explore, and helping you build the confidence to make decisions that work for you.
Health is deeply personal, and lasting change comes from understanding yourself.
Rigid oatmeal diet plan.
A coach who adapts to you
One of the most important aspects of my approach is meeting you where you are.
Your life, your habits, and your why are the foundation.
Together, we adapt strategies to fit your needs.
Health coaching isnât about me telling you what to do.
Itâs about empowering you to take ownership of your journey.
Sometimes that means learning to tune out the latest biohacking tool or Instagram diet trend, I'm looking at you 'Oatmeal diet for weight loss'.
Sometimes it means starting small, with manageable steps that build momentum.
Whatever it looks like, my focus is on helping you create sustainable habits that work for life, not just for the next few weeks.
Health information overload.
Protecting you from the noise
The world of health advice is noisy.
Thereâs always a new diet, a miracle supplement, or a "hack" promising results.
But more information doesnât always mean better decisions, it often leads to overwhelm.
My role as your coach is to help you tune out the noise.
Together, weâll focus on the basics that always work:
-
Sunlight
-
Circadian alignment
-
Eating real nutrient dense local and seasonal food
-
Moving regularly
-
Targeted training
-
Sleeping well
-
Dealing with stress in the right way
You donât need the latest trends, you need a clear path thatâs grounded in whatâs proven and tailored to you.
Exploring, not imposing
The beauty of health coaching is that itâs not about giving you a checklist or medical guideline telling you "do this, not that."
Itâs about exploration. What makes you feel your best? What habits energise you? What changes feel sustainable?
Together, we experiment, reflect, and adjust.
This process isnât about finding the "right" way, itâs about finding your way.
Iâm here to guide, support, and challenge you, but ultimately, the answers come from within.
As a coach, I see your potential even when you donât. My job is to help you see it too.
Health isnât a destination, itâs a journey. And the most powerful changes happen when you take ownership of that journey.
You already hold the answers. I just help you uncover them.
- Chris
If you're ready to explore your potential, letâs talk.
Click https://calendly.com/hello-chrispatrick to book a free discovery call with me.
-
-
@ c7e300eb:e94ebe38
2025-01-27 17:44:53How many people have you successfully orange-pilled? What's your success rate? I'm going to guess it's way worse than you wish it was. I'd like to share 3 different stories from people I've talked to about Bitcoin and the varying degrees of "success" in each of them. Maybe you can relate to one (or all) of them...\ \ Bob (Person 1)
This first person we will call Bob. Ironically, Bob was stacking sats long before I ever took an interest in Bitcoin. He's a pretty financially savvy person, loves history, and is a bit of a prepper. Bob views Bitcoin as a nice-to-have and certainly understands the NGU math that comes with a fixed supply asset and money printing; unfortunately, that's largely where his interest ends. He's not stacking anymore and doesn't seem moved to ever resume, despite his understanding of how fragile our financial system is. If/when hyper-bitcoinization happens, he's "got enough". \ \ I've been able to get him out of shitcoins entirely and he seems content hodling, which is a pretty big win in my book. At the same time, it can be disheartening to see someone sitting near the edge of the rabbit hole and parking the bus right there...\ \ Alice (Person 2)
Person 2 will be Alice. This person is much more motivated by social topics than economical ones, which always made me approach our Bitcoin conversations in a unique way. She inspired me to see through a different lens than I was normally comfortable with, which ultimately expanded my own interest in how Bitcoin, both as a money and a network, could positively impact people all over the world.
Alice, in my observation, grew to appreciate the way I saw Bitcoin. She understood the Cantillon Effect, fractional reserve lending, why censorship resistance is important, etc. Hell, she even managed to (sorta) orange-pill someone else! She was effectively as orange-pilled as one could get without actually owning sats. \ \ Through our many talks about money and personal finance, she greatly leveled up her game compared to when we first met. She now uses budgeting software, has a high-yield savings account, an investment account, and is building credit. For some reason though, she never got the desire to start stacking sats...
\ Mary (Person 3)
Mary is the least financially-literate of our 3 persons of interest. Just not wired that way at all. She's never had dedicated savings or tracked her spending. Getting her to set up direct deposit at her place of employment was a daunting task. \ \ Saving and investing have never been part of her vocabulary either. A few days ago, however, she asked if I could help her begin this process. For someone taking that first big step, I felt like stacking sats would be a bit daunting. We talked about automatically sending X% to a high-yield savings account. When we got to "investing" though, something interesting happened: she said she would rather start buying Bitcoin because "nobody can take it from me, right?" This was fascinating to me, as I had never heard a normal person express concerns about a bank actually not having their money (despite how many people I have told this to, including Alice and Bob). We agreed on the same X% into Bitcoin as into her HYS. Starting with her next paycheck, Mary will officially begin stacking sats.
If I had to make a chart of all the people in my life and rate how likely they'd be to adopt Bitcoin, Mary would be near the bottom. After so many failed attempts, I still don't quite understand how this specific case ended up being my first success in getting someone to enter the rabbit hole. We'll see how far she ends up going, but I am committed to helping her with every step.
Conclusion
So, what have I taken away from these 3 example cases? For starters, I learned that orange-pilling can take more than one form: Bob got rid of shitcoins and committed to hodling, but won't stack any more; Alice groks the problems Bitcoin will fix, but won't stack at all; Mary hardly even knows about Bitcoin, yet she understands the importance of having control over her own savings enough to take the leap. Each one of these examples has helped me refine my approach to orange-pilling, while also teaching me that it is no science. It's as much a choice and a willingness on their end as it is how you approach the conversation. You cannot force someone to take the pill or jump down the hole. Just stay humble and keep stacking sats. Cheers!
-
@ 378562cd:a6fc6773
2025-01-27 15:32:25In the ever-evolving cryptocurrency space, few assets have attracted as much attentionâand controversyâas XRP. Marketed as a tool for revolutionizing cross-border payments, XRP has been at the center of debates about its legitimacy, legal entanglements, and centralization. In contrast, Bitcoin remains the gold standard of decentralization, embodying the original ideals of cryptocurrency as a secure, censorship-resistant, and community-driven digital asset.
The Ripple-SEC Legal Battle: A Dark Cloud Over XRP
XRP's legal troubles began in December 2020 when the U.S. Securities and Exchange Commission (SEC) filed a lawsuit against Ripple Labs, alleging the company had conducted an unregistered securities offering. The lawsuit hinged on whether XRP, the token Ripple uses for its cross-border payment solutions, qualifies as a security under U.S. law.
Ripple Labs and its executives, including CEO Brad Garlinghouse, argued that XRP should not be classified as a security. They claimed it was a digital currency akin to Bitcoin or Ethereum, which the SEC had already deemed non-securities. Despite Ripple scoring partial victories in courtâsuch as a judge's ruling that XRP sales to retail investors did not constitute securities transactionsâthe company was ordered to pay a $125 million fine. While Ripple touted the outcome as a victory, the SECâs ongoing appeal means uncertainty lingers over XRP's regulatory future.
These legal uncertainties have had significant implications for XRPâs adoption. After the lawsuit, major U.S. exchanges delisted XRP, temporarily causing its price to plummet. Although some platforms have since reintroduced XRP trading, its reputation remains tarnished in some circles.
Centralization Concerns: Is XRP Truly a Cryptocurrency?
A key critique of XRP lies in its centralized structure. Unlike Bitcoinâs decentralized proof-of-work (PoW) system, which relies on a distributed network of miners to validate transactions, XRP operates on a consensus protocol managed by a limited number of validators. This has led to accusations that Ripple Labs wields too much control over the network, undermining the core principle of decentralization that defines cryptocurrencies.
Adding to these concerns is Ripple Labsâ significant ownership of XRP tokens. Ripple initially held 80 billion of the 100 billion XRP tokens ever created, and as of 2024, it still holds a substantial portion in escrow. Critics argue that this concentration of ownership allows Ripple to manipulate XRPâs price and limits the assetâs independence.
Bitcoin: The Decentralized Gold Standard
In stark contrast to XRP, Bitcoin remains the archetype of decentralization. Introduced in 2009 by the pseudonymous Satoshi Nakamoto, Bitcoin operates on a PoW system that ensures no single entity can control the network. Its open-source code, coupled with a vast network of miners and nodes distributed globally, makes Bitcoin nearly immune to censorship and manipulation.
Bitcoin's decentralized nature is a cornerstone of its value. Unlike XRP, which is closely tied to Ripple Labs and its business interests, Bitcoin is not controlled by any organization or individual. This decentralization ensures transparency, security, and trust among its users, reinforcing its status as a digital alternative to gold.
Moreover, Bitcoinâs capped supply of 21 million coins enhances its appeal as a store of value. In a world where inflation and monetary policy can erode the value of fiat currencies, Bitcoinâs scarcity offers a hedge against economic uncertainty.
Adoption and Market Perception: Bitcoin vs. XRP
Despite its controversies, XRP has gained traction among financial institutions for its speed and low transaction costs in cross-border payments. Rippleâs partnerships with major banks and remittance providers have bolstered its utility, even as skepticism around its centralization persists.
Bitcoin, on the other hand, has achieved mainstream acceptance as both an investment asset and a medium of exchange. From institutional investors adding Bitcoin to their balance sheets to countries like El Salvador adopting it as legal tender, Bitcoin's adoption is steadily growing. Its resilience in the face of regulatory scrutiny and market volatility further cements its position as the most trusted cryptocurrency.
What XRP's Journey Teaches Us About Cryptocurrency Values
The contrasting narratives of XRP and Bitcoin highlight a fundamental tension in the cryptocurrency world: the trade-off between utility and decentralization. While XRP offers practical solutions for specific use cases, its centralized nature and reliance on Ripple Labs compromise its alignment with the ideals of cryptocurrency.
Bitcoin, by comparison, stays true to the vision of a decentralized financial system free from intermediaries. Its robust network, transparency, and immutability make it not just a cryptocurrency but a symbol of financial freedom.
Conclusion: Bitcoinâs Enduring Legacy
As the legal and market drama around XRP continues to unfold, one thing remains clear: decentralization is at the heart of what makes cryptocurrencies revolutionary. Bitcoin exemplifies this ideal, serving as a reliable store of value and a hedge against centralized control. While XRP may have its place in specific financial ecosystems, it cannot claim to uphold the principles that Bitcoin has come to represent.
For investors and enthusiasts alike, understanding these differences is crucial. In a rapidly evolving market, Bitcoinâs true value lies not just in its price but in its unwavering commitment to decentralizationâa principle that defines the future of financial freedom.
-
@ 6bae33c8:607272e8
2025-01-27 14:56:31I was rooting for the Eagles in the NFC because I want Saquon Barkley to win Super Bowl MVP, and on the first play from scrimmage he took a 60-yard run to the house. Unfortunately he got banged up on the play and was used sparingly for the rest of the game, but no matter. Another 118 yards and three TDs later, heâs got his chance in the Super Bowl.Â
The Killer Redskins are pretty good â they donât stop coming at you, and Jayden Daniels should be a star for the next decade. But three lost fumbles destroyed any hopes they had. Fumbles and penalties are the worst part of the NFL â like getting Sorryâed in the game of Sorry, they reverse whatever is happening on the field seismically.Â
-
The KRs are close. They could use an offensive line upgrade, maybe one more pass rusher and another explosive skill player, but with Daniels around, theyâll be contenders again.Â
-
Terry McLaurin didnât have a big role, but he showed how fast and explosive he is on the 36-yard TD catch and run. Heâs also big (210 lbs) for a speed receiver, but turns 30 in September.Â
-
Jalen Hurts made some nice downfield throws to A.J. Brown which is a good sign. If the Eagles are going to beat the Chiefs, theyâll need to make some plays in the passing game.Â
-
Jake Elliott missed a long FG and has been shaky all year. People donât care about kickers, but I wouldnât want to trust him with the game on the line.Â
-
In both games there were penalties on a TD that resulted in teams opting for the 1-yard 2-point conversion, and both failed. The Bills even took a successful PAT off the board.Â
-
I know there was controversy on the Chiefsâ fourth quarter. 4th-down stop, down 1 (and also the spot on the preceding 3rd-down play that made it 4th down.) But the Chiefs still had to drive for the touchdown and subsequent FG after the Bills tied it, stop them on defense one more time and then convert that last third down to seal it. In other words, it looked like two bad spots, but even if that was âcheating,â the game was won on the field. The Chiefs also lost a fumble on a botched snap, and the Bills recovered all of theirs.Â
-
Kareem Hunt is such a tough runner, heâs basically a healthy Isiah Pacheco at this point. Pacheco himself doesnât look 100 percent.Â
-
Travis Kelce had a surprisingly minor role, but Xavier Worthy had a good game, and Patrick Mahomes spread the ball around. It was almost as if they had played it vanilla on purpose in earlier weeks and broke out a more aggressive passing game when they needed it.Â
-
Mahomes will now have appeared in five of the last six Super Bowls, with only Joe Burrow and the Bengals interrupting his streak. If he wins a fourth this year, heâll have a chance to do the unthinkable which is to catch Tom Bradyâs seven. Three more is still a lot though, and thatâs only IF he wins against the Eagles.Â
-
Josh Allen played well on the road against one of the leagueâs best defenses. The Bills offense wasnât as efficient as Buffaloâs, though, and theyâre really missing a go-to playmaking receiver. Amari Cooper never seemed to integrate fully into the offense.Â
-
The AFC is loaded with QB talent that will never see a Super Bowl so long as Andy Reid and Mahomes are in the league. Allen, Lamar Jackson, Justin Herbert, Burrow (again) or maybe C.J. Stroud will break through one of these years, but itâs likely at least two of them wonât.Â
-
-
@ eee391ee:8d0b97c2
2025-01-27 14:55:16Amber 3.2.0
- Fix relay connection when starting the service
- Added profile picture in the incoming requests screen when using a large screen device
- Added more event kinds translations
- Added a log with the bunker request response
- Use the relay from the request to send the response when no app is found
Download it with zap.store, Obtainium, f-droid or download it directly in the releases page
If you like my work consider making a donation
Verifying the release
In order to verify the release, you'll need to have
gpg
orgpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:bash gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
Once you have his PGP key you can verify the release (assuming
manifest-v3.2.0.txt
andmanifest-v3.2.0.txt.sig
are in the current directory) with:bash gpg --verify manifest-v3.2.0.txt.sig manifest-v3.2.0.txt
You should see the following if the verification was successful:
bash gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03 gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>"
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:
bash cat manifest-v3.2.0.txt
One can use the
shasum -a 256 <file name here>
tool in order to re-compute thesha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly. -
@ da0b9bc3:4e30a4a9
2025-01-27 14:32:50Hello Stackers!
It's Monday so we're back doing "Meta Music Mondays" đ.
From before the territory existed there was just one post a week in a ~meta take over. Now each month we have a different theme and bring music from that theme.
This month it's New Year New Artists! Bringing you small time artists with great music. Artists without some huge record label or massive following. Let's find those hidden little gems.
This week, may I present to you, Belle Sisoski and her cover of "Legends Never Die"
https://youtu.be/VMIL1YbUQrI?si=kR2YLib5x3qLEn8A
originally posted at https://stacker.news/items/866591
-
@ 54286b98:3debc100
2025-01-27 14:30:18Looking back on that time, I now see clearly that my faith--my only real faith--that which apart from my animal instincts gave impulse to my life --was a belief in perfecting myself. But in what this perfecting consisted and what its object was, I could not have said. I tried to perfect myself mentally--I studied everything I could, anything life threw in my way; I tried to perfect my will, I drew up rules I tried to follow; I perfected myself physically, cultivating my strength and agility by all sorts of exercises, and accustoming myself to endurance and patience by all kinds of privations. And all this I considered to be the pursuit of perfection. â Leo Tolstoy, A Confession
It seems to be a good trait, perfecting sounds and looks good. Why would you not want to improve yourself? You should!
In his book A Confession, Tolstoy starts the first chapter by laying down one of the main Christian principles: we cannot do enough work to achieve salvation, nor can we buy our way into it.
We may strive to be perfect and solve things in our own strength, but we may fail miserably. Christ bought our way in, and the only way to claim that ticket is by surrendering our strength and working in His. Striving to be perfect in our own strength is not different from living by the law (this refers to the Law given to the Jewish people versus living by faith alone).
10 For all who rely on works of the law are under a curse; for it is written, âCursed be everyone who does not abide by all things written in the Book of the Law, and do them.â 11 Now it is evident that no one is justified before God by the law, for âThe righteous shall live by faith.â Galatians 3: 10-11
Trying to be good and do good works is an excellent attitude, but we can only achieve this by walking in His footsteps. Moreover, I think and believe that the inner call to be perfect may exist within us simply to reveal our incapability of such an accomplishment.
For by works of the law no human being will be justified in his sight, since through the law comes knowledge of sin.â Romans 3:20
Of course, faith alone is not proof either, but itâs a start. If we are given the gift of believing in Christ, what we do with that belief is shown through the fruits of the works we do.
14 What good is it, my brothers, if someone says he has faith but does not have works? Can that faith save him? 15 If a brother or sister is poorly clothed and lacking in daily food, 16 and one of you says to them, âGo in peace, be warmed and filled,â without giving them the things needed for the body, what good[a] is that? 17 So also faith by itself, if it does not have works, is dead.
18 But someone will say, âYou have faith and I have works.â Show me your faith apart from your works, and I will show you my faith by my works. 19 You believe that God is one; you do well. Even the demons believeâand shudder! 20 Do you want to be shown, you foolish person, that faith apart from works is useless? 21 Was not Abraham our father justified by works when he offered up his son Isaac on the altar? 22 You see that faith was active along with his works, and faith was completed by his works; 23 and the Scripture was fulfilled that says, âAbraham believed God, and it was counted to him as righteousnessââand he was called a friend of God. 24 You see that a person is justified by works and not by faith alone. James 2:14-24
Until the next one,
J
-
@ a012dc82:6458a70d
2025-01-27 12:51:47In the contemporary financial world, Cathie Wood, the founder of ARK Invest, stands out for her innovative investment approaches. Recently, Wood has focused on Bitcoin (BTC), highlighting its potential as a hedge against both inflationary and deflationary economic conditions. This article delves into Wood's perspective, exploring Bitcoin's evolving role in the global financial landscape. We examine its multifaceted nature, not just as a digital currency, but as a strategic asset capable of navigating the complex dynamics of the modern economy. Wood's insights offer a nuanced understanding of Bitcoin's potential in offering stability amidst economic uncertainties.
Table Of Content
-
Bitcoin's Hedge Potential
-
Decentralization: A Key Advantage
-
The Banking Crisis and Bitcoin
-
Bitcoin vs. Gold
-
Institutional Involvement
-
Conclusion
-
FAQs
Bitcoin's Hedge Potential
Cathie Wood's perspective on Bitcoin transcends its usual perception as a mere digital currency. She champions it as a dynamic tool against economic fluctuations, a quality rarely matched by traditional assets. In an era marked by economic instability, Bitcoin stands as a beacon of potential stability. This is particularly notable in its capacity to act as a hedge during inflationary periods, where fiat currencies lose value, and deflationary periods, characterized by increased money value but decreased economic activity. This dual capability positions Bitcoin as a significant asset in diversified portfolios, resonating with Wood's innovative investment philosophy.
Decentralization: A Key Advantage
For Wood, Bitcoin's decentralization is a critical advantage. This aspect sets it apart from traditional banking systems, which often grapple with issues of transparency and central control. In Bitcoin's ecosystem, there is a clear absence of counterparty risk, thanks to its decentralized ledger and visible transactions. This transparency assures investors of a level of security and autonomy not found in conventional financial systems. In Wood's view, this decentralization is not just a technical feature but a foundational aspect that provides Bitcoin with a resilience and reliability, crucial in a world where financial systems are increasingly interconnected and vulnerable.
The Banking Crisis and Bitcoin
Reflecting on recent financial upheavals, such as the U.S. regional bank crisis and the FTX collapse, Wood sees these events as vindications of Bitcoin's stability and resilience. These crises underscored the inherent risks of centralized financial systems, revealing their fragility under stress. In contrast, Bitcoin demonstrated an impressive resilience, with its value surging during these tumultuous times. This reaction not only highlights Bitcoin's potential as a safe haven but also its capacity to serve as a barometer for the health of the broader financial system.
Bitcoin vs. Gold
While gold has traditionally been the go-to asset for hedge investments, Wood argues that Bitcoin has a distinct edge over it. Her preference for Bitcoin stems from its novelty and the increasing interest from younger investors and institutional players. Unlike gold, whose market and demand patterns are well-established, Bitcoin represents an emerging asset class with untapped potential. Wood believes that Bitcoin's journey is just beginning, and its full potential as a hedge asset is yet to be realized, making it a more attractive option for forward-looking investors.
Institutional Involvement
Wood's belief in Bitcoin's future is mirrored in ARK Invest's substantial investments in cryptocurrency-related ventures. These investments are not mere speculative plays; they represent a deep conviction in the long-term value of Bitcoin. ARK's pursuit of a spot Bitcoin ETF is a significant move, indicating a belief in the cryptocurrency's viability as a mainstream investment asset. This institutional backing by a leading investment firm not only legitimizes Bitcoin's role in the financial markets but also paves the way for more widespread adoption among traditional investors.
Conclusion
Cathie Wood's endorsement of Bitcoin is a compelling narrative in the evolving story of this digital asset. Her insights provide a valuable perspective on Bitcoin's role as a hedge against both inflation and deflation, highlighting its potential in the current economic climate. As we navigate through uncertain financial times, Wood's views offer a guidepost for investors looking to diversify and stabilize their portfolios with innovative assets like Bitcoin.
FAQs
What is Cathie Wood's view on Bitcoin? Cathie Wood sees Bitcoin as a viable hedge against both inflation and deflation, highlighting its decentralized nature and resilience.
Why does Wood prefer Bitcoin over traditional banking systems? Wood values Bitcoin's transparency and lack of counterparty risk, contrasting it with the opacity of traditional banking systems.
How did the banking crisis impact Bitcoin's value? The U.S. regional bank crisis and the FTX collapse showed Bitcoin's stability, with its value increasing during these times.
Why does Wood favor Bitcoin over gold? Wood believes Bitcoin has more potential for growth and is more appealing to younger investors and institutions compared to gold.
What is ARK Invest's involvement in Bitcoin? ARK Invest holds significant stakes in cryptocurrency ventures and is pursuing a spot Bitcoin ETF, reflecting a strong belief in Bitcoin's future.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ cf7ed325:050194cf
2025-01-27 12:39:41The Steigenberger Minerva Nile Cruise offers an exceptional way to explore Egypt's ancient wonders while cruising along the timeless Nile River. This luxurious cruise combines modern amenities with traditional Egyptian hospitality, making it an ideal choice for those seeking comfort and adventure. With spacious cabins, fine dining, and various entertainment options, the Steigenberger Minerva promises an unforgettable experience.
While aboard, guests can enjoy a range of excursions to famous sites like the Pyramids of Giza, Luxor Temple, and the Valley of the Kings. The ship provides a perfect base for exploring Egyptâs rich history, from the bustling streets of Cairo to the serene landscapes of Aswan. The cruise features a blend of relaxation and adventure, offering guests an opportunity to unwind while taking in Egypt's stunning scenery.
In addition to the Steigenberger Minerva Nile Cruise, Egypt offers a variety of other luxurious options. For example, the Farah Nile Cruise is known for its elegant design and top-notch service, while the Gemma Nile Cruise provides a more intimate, boutique experience. The Movenpick SS Misr Nile Cruise is another excellent choice for those who enjoy a classic, refined atmosphere on the river.
If youâre looking for other luxury cruises, consider the Nile Capital Nile Cruise, which combines modern comfort with historical exploration, or the Movenpick Hamees Nile Cruise, a ship that offers a unique blend of luxury and cultural immersion. The Movenpick Lotus Nile Cruise and the Jaz Regent Nile Cruise are also popular choices, known for their impeccable service and well-designed cabins.
For a more opulent experience, the Jaz Crown Jewel Nile Cruise is a top contender, while the Salacia Nile Cruise and Nabilatan Nile Cruise provide a more exclusive atmosphere. Alternatively, the Tulip Nile Cruise and Tia Nile Cruise offer comfortable accommodations with excellent amenities.
No matter which cruise you choose, Egypt's Nile River promises an unforgettable journey through history and culture.
đ Visit us at www.etbtoursegypt.com đ˛ Contact us now! +20 10 21100873 đ§ Email: info@etbtours.com đ˘ Company Address: 4 El Lebeny Axis , Nazlet Al Batran , Al Haram, Giza , Egypt
-
@ b8851a06:9b120ba1
2025-01-27 11:58:53Trump's Blueprint for Gaza: The New Nakba
Trumpâs offhand suggestion to âclean outâ 1.5 million Palestinians from Gaza isnât just recklessâitâs a thinly veiled blueprint for ethnic cleansing. The proposed forced displacement of millions isn't new; itâs the 21st-century sequel to the Nakba, designed to erase Palestine from the map.
Gaza: The Systematic Machinery of Destruction
The assault on Gaza isnât chaosâitâs coordinated demolition:
- 47,306+ killed â lives extinguished with impunity.
- 111,483 injured â survivors burdened with physical and psychological scars.
- 92% of homes destroyed â families displaced, memories shattered.
- 60% of infrastructure dismantled â society intentionally crippled.
This is more than warâitâs annihilation by design.
A Second Nakba in Motion
The original Nakba (1948) was the template:
- 6 million refugees still barred from returning home.
- Generations of children growing up stateless, inheriting loss.
- Cultural heritage erased, lands stolen, and identities fractured.
Trumpâs âsolutionâ carries this legacy forward, pushing millions toward another endless exile.
The Humanitarian Collapse
If enacted, the mass displacement would trigger a humanitarian apocalypse across the region:
- Healthcare systems overwhelmed in neighboring nations.
- Schools collapsing under the weight of refugee students.
- Economic and social infrastructures stretched beyond capacity.
This isnât just a Palestinian crisisâitâs a global one.
A Calculated Plan for Erasure
Make no mistake: the destruction of Gaza is deliberate. Israeli Finance Minister Avi Dichterâs chilling declaration of a "rolling Gaza Nakba" lays bare the intent: erase Gaza and its people from existence. The steps are cold, calculated, and systematic:
- Starvation as a weapon of war.
- Targeting hospitals to eliminate healthcare.
- Destroying water supplies to force displacement.
This isnât collateral damageâitâs genocide.
Generational Wounds That Wonât Heal
The impact of this erasure will reverberate for centuries:
- Children growing up with inherited trauma.
- A culture erased piece by piece.
- Future generations left stateless, voiceless, and forgotten.
Every demolished building and every child killed are steps toward creating a permanent refugee underclass.
Silence is Complicity
The global silence is deafening. Trumpâs âsolutionâ isnât a spontaneous ideaâitâs the culmination of decades of dehumanization and demographic engineering. And every moment the world stays silent, the machinery of genocide moves forward.
Resistance is Survival
The choice is clear: submit to tyranny or resist. Every truth told, every act of defiance, every refusal to look away chips away at their plans. They want us silent. They need us indifferent.
But weâre not sheepâweâre the descendants of those who refused to kneel. - Share their crimes. - Expose their lies. - Refuse their narrative.
Because the battle for Palestine isnât just about landâitâs about dignity, existence, and the refusal to be erased.
-
@ 0463223a:3b14d673
2025-01-27 10:47:00I wrote this article back in 2019 but I wanted to see how it stood up today. Since writing this Iâve been diagnosed with autism. However, I question this. For sure Iâve gone through lots of ups and downs in life. Some issues probably due to childhood trauma, others due to drugs etc. but I still ask if is a natural response to bullshit.
I donât write this to belittle any problems anyone has and the autism spectrum disorder is real (but not disorder to me). When the whole population gets diagnosed as neurodivergent what next?
If you need help, get help. I write this as a person trying to get off the drugs prescribed to me many years ago. Something Iâm finding difficult but I will do itâŚ
From 2019
A large part of the adult population in the Western World are mad, mental, bonkers, have lost their marbles and are totally insane. Well, thatâs at least according to the World Health Organisation A recent WHO report stated one in four people in the world will be affected by mental or neurological disorders at some point in their lives. And thereâs a very high chance that you, the reader, are completely off your rocker. Mental Health is the buzzphrase of our times. Itâs on the TV, the radio and all over the internet. The UKâs Prime Minister goes on TV to state how big the problem is and just how very seriously she takes it and weâre assured the government are working extremely hard to tackle it. However, the rhetoric never amounts to anything, as anyone seeking genuine help will attest. Help is hard to come by. Doctors prescribe pills to subdue the wrong thoughts, but nothing else. No long term solutions, just keep taking the pills. Hundreds of thousands of adults are medicated in this way and now, more worryingly, are many children. So itâs vital to talk about it. Itâs permanently Mentalspeng Awareness Day or Tell Facebacon Your Neurologicalwankfuck Week. Itâs even become quite fashionable, with regular treats from celebrities telling of their darkest moments and how they nearly didnât get that huge Hollywood deal because they woke up feeling sad and unhappy one winter morning. If youâre a fruit-loop tell everyone. It will be ok⌠Tell them about the time you were going to drive your car off a cliff and ended up in hospital after a particularly long conversation with The Samaritans. Great stuff! Tell them about the regular, uncontrollable urges to slash yourself with a Stanley knife or any other sharp object close to hand. Awesome! Tell them about how you smash yourself repeatedly in the head, sometimes with a heavy object, as you can no longer deal with the stress and frustration of being disempowered by situations completely out of your control. Cool! Tell them how you feel trapped by an increasingly expensive housing market and how you have zero financial security. Brilliant! Or maybe just tell them that sometimes you canât get out of bed and you donât know why or that you panic uncontrollably for no reason. Skills! Tell the world! Weâre so understanding of mental health issues these days, just raise more awareness and everything will be fine, weâre here for you man/woman! (and yes, we might need to sell this information on to the appropriate persons, future employers, insurance companies or government agencies etc.). After all, weâre all good people right? Tell everyone youâre mad and theyâll understand. Theyâll think of the time you were a dick and theyâll say âAhh, poor sod, you know heâs a mental donât youâ. Well frankly no. The world is full of cunts and whilst the people close to you will be sympathetic, as far as wider society goes, youâll be marked, your position compromised and your word will not be trusted. I mean who knows, maybe youâre delusional, perhaps youâre about to rampage through town wielding a knife or driving your car into a crowded supermarket⌠But hold upâŚ. One in every four of us is mental?! Is that really the case? Letâs think about this for a second. When did 25% of the population become a massive neurospeng? This wasnât the case 30 years ago, a quarter of the population werenât mad. There wasnât the vast array of medications available these days; Prozac, Sertraline, Citralopram, Promethazine, Venlafaxine, Amiltryptaline, to name a few (there are many, many more). Itâs clear that a lot of people arenât feeling right but how come the suicide rates are higher now than they were 30 years ago? If weâre all so much more aware and well medicated, surely rates would be going down? Perhaps you were diagnosed as a mental because you responded negatively to events happening around you? Maybe youâre working increasingly longer hours for less money. Perhaps the terms of your work changed drastically and you no longer feel secure. Maybe you lost jobs because of funding cut backs. Perhaps youâre in despair because your friend took their own life when their job was cut in an austerity drive. Suicide is the most horrible thing which ever way you look at it. You strip a person of their purpose and they react with the most extreme act of self violence, causing an unbelievable amount of emotional distress for those left to pick up the pieces⌠And so we say, âAhh but you understand, they were mad⌠They were fucking mental, they lost control of their senses, it such a terrible shame but they were mad you knowâ. Bullshit. The term Mental Health removes all responsibility from the structures creating an environment where people are deemed no longer of value or viable human beings. But maybe you were angry because you were told by politicians that you need to live within your means, whilst those in large financial institutions increased their wealth exponentially? The world economy crashed in 2008 and thereâs no money. Eh? The governments of printed more and more money, but thereâs no money for you, you cunt. Perhaps it was packed aboard a spaceship and is now hurtling towards Mars! (mad people tend to think like this, after all it couldnât be that the money was stolen). Maybe you got angry with the blatant corruption from those in public life? Politicians shout loudly that theyâre for the people but will pocket pay rises, local council officials bully members of the public and make threats to cut funding . This can be done with total with total impunity, as the structures put in place to control such actions cover up any wrong doing. You see the powerful can not and will not be challenged. There is no pathway to justice. When the fire at Grenfell happened, it was clear for all to see that the housing association, council and big business were at fault, but no, blame was heaped on the lone fire officer who had the awful task of managing two lowly fire engines in Londonâs biggest fire since World War II. At the time my local Member of Parliament response was âthe flats were refurbished to a very high standardâ. We shouldnât lay blame at those in power, we cannot have any fault with the establishment. I bet that poor fire officer was a mental too⌠When discussing mental health weâre not talking about a brain injury or unfortunate illness. Thereâs extreme difficulty coping with the world but itâs not madness and itâs not a delusion. Itâs a natural reaction to bullshit. Weâre are completely surrounded by bullshit, on the internet bullshit, on the TV bullshit, in the work place bullshit, from our leaders bullshit etc. etc. The world is running on massive excess levels of bullshit. And this is the natural emotional response to bullshit. Mental Health is used to invalidate the anger, freeing the powerful from responsibility and laying blame squarely at the individuals door. In the meantime, piece by piece, the powerful steal everything weâve ever owned. So next time someone says to you raise awareness about mental health, maybe tell them to fuck off. Either that or tell them youâre flying to the Moon to have tea with Kim Jong Un and Barney The Dinosaur. Fuck mental health. *Image used without permission of Barney The Dinosaur.
-
@ e373ca41:b82abcc5
2025-01-27 08:33:39
This article by Milosz Matuschek first appeared in German in his publication "Freischwebende Intelligenz".
It's working! Or is it? Trump's inauguration casted its shadow in the last weeks already and produced the first big upsets. Meta/Facebook cancelled their squad of fact-checkers and will rely (like X) on community comments in future. Wokistan is unwound. Zuckerberg now presents himself as an advocate of free speech, declaring a âreturn to principlesâ.
For those who believe it, Zuckerberg is an opportunist who gave in to the Biden administration and its deletion requests during Covid without much resistance (after having given 400 mio. USD through intermediary organizations into Bidens campaign), regardless of whether it was about masks or later about âvaccinationsâ. His Canossa walk to Rogan does not change the fact that he betrayed his own principles and deleted millions of critical profiles, channels and groups, including groups in which Facebook users discussed vaccine damage. Where are the profiles? Are they back? Zuckerberg played Ministry of Truth and is now quoting Orwell and toeing the Musk line. This is what a driven man looks like, not a man of conviction. The mainstream is shocked and is already labeling Facebook as a new hate portal. When will the accusation of anti-Semitism kick in?
https://x.com/TheBabylonBee/status/1876683974560350626
The Musk effect
All of these are gestures of submission to the new ruler of public opinion: Elon Musk. He owns the largest network for "free speech", he himself is its biggest influencer and is recalibrating what can be said in public. His journeyman's piece was Trump's election victory. Changing the political mood in the world could be his masterpiece.
For a long time, he admittedly did this extremely skillfully. He tweeted about the deep state, Soros and Gates, the population collapse, compulsory vaccination, etc. and got on well with the critical scene, some of whom are now all too submissively trying to recognize their new messiah in him. Musk throws his media spotlight on topics that the newspapers remain silent about and gave politicians underrepresented in the mainstream, such as Alice Weidel (opposition leader in Germany, AfD), a forum.
Musk has repeatedly brought the Epstein case and paedophile scandals, such as in England (Rotherham, Oxford), into the media spotlight. Pakistani gangs abused minors and children there for years; anyone reading the verdict will need strong nerves. In Austria, a trial for gang abuse of a 12-year-old girl has just ended with an acquittal. The judges believe she wanted it that way. During the trial, the defendant put a hundred Euro note on the table for the victim's lawyer, which is what mocking âreparationâ looks like. In âour democracyâ in Germany, sentences are handed down on a piecework basis for ludicrous âinsults to politiciansâ.
Musk is de facto the most powerful man in the world (satellites, SpaceX, Mars, Tesla, mRNA vaccination routes, Pentagon connections, X..,). Where so much power is involved, megalomania is not far away. He is acting increasingly clumsily.
It is currently confirming for all to see the clichĂŠ that politics is basically the entertainment department of industry. Even in âour democracyâ, the bosses of the world have always chosen their political generals, who are interchangeable. In the case of Bill Gates, George Soros & Son etc., the executive was the woke nomenklatura right up to the EU. With Musk, it is the new, right-wing conservative nomenklatura.
ADVERTISEMENT:
Looking for the easiest way to buy Bitcoin and store it yourself? The Relai app is the No. 1 crypto start-up and No. 2 of all fintech start-ups in Switzerland. Here you can buy Bitcoin in just a few steps and also set up savings plans. Nobody has access to your Bitcoin except you. With the referral code MILOSZ you save on fees (no financial advice). Disclaimer due to regulatory issues: The services of the Relai App are hereby only recommended to inhabitants of Switzerland or Italy.
Need more security? The Trezor wallets are recommended and easy to use, others are available in the store. Need more advice? Book an introductory meeting with a wallet expert.
Musk smooches Meloni, interviews Alice Weidel, auditions Farage (and cancels again: âdoesn't have what it takesâ). The Weidel interview was certainly a necessary corrective to the current media asymmetry (and no one should be able to deny access to a source of information). There is no doubt that the second strongest party in the German mainstream media does not have a fair chance to convey its content. Talk shows, if there are invitations to AfD politicians at all, are public inquisition events with calls for self-criticism.
But the Musk-Weidel talk was not journalism either. It was a public casting event, a kind of âApprenticeâ on X. Or have you seen a journalist anywhere? A platform operator and a politician tapped each other a bit and confirmed each other. All this is already bringing the EU onto the scene, Thierry Breton is already waving the possible annulment of the elections in Germany. An oligarch is unmasking the EU oligarchy and both want to do it for democracy, what a world...
"Which piggy would you like?"
https://www.youtube.com/watch?v=tiwkYCFD6EA
So asked Robert Lembke some decades ago in the German TV show âWhat am I?â: And that's supposed to be the choice now: Pick your favorite oligarch or next slave owner. In the end, every big tech business model is based on advertising and data mining. Zuckerberg, Musk & Co. sell identity, friendship, memories and ultimately your content. Twitter also wanted to buy Substack and got âRevueâ. The customer (aka the product) is sold to the advertising industry, Zuckerberg potentially knows each of his users down to their character traits (unknown even to the user) (check: www.applymagicsauce.com). Like in the 80s movie with Arnie, this is a kind of ârunning manâ, a gladiator game in front of an assembled world audience.
Whoever wins attention for themselves (and the platform) wins back a small amount of freedom and even earns something in the process. Musk recently changed his X name to âKekius Maximusâ (whereupon memecoins of the same name immediately sprang up, to each ruler his own currency), reminiscent of the gladiator Maximus from the film of the same name by Ridley Scott. The gladiator's owner told him: âWin the crowd and you win your freedomâ. Not much has changed since ancient Rome. As the world's top meme maker with the greatest reach, Musk also has the greatest influence on social moods. No content is more viral and memorable than memes. The winner here is the one with the highest level of replication. That's what Musk does.
The changes we are currently seeing are just the beginning, both positive and (possibly) negative. The first effect is already visible: Wokistan is withdrawing from platforms that are not ideologically curated. Fearing accusations of contact guilt, they obediently throw themselves off the nearest cliff and voluntarily curtail their own reach; the last example was âWatson.châ from Switzerland, a journalistically narrow-chested list and click medium for chai latte sippers from Bern and Zurich. Will the âX-itusâ be followed by the great unfriending of Facebook? There won't be much left, Tiktok also ticked to the right beat by their standards (as long as it's not against China). The next place of mercy for Woke is called Bluesky, where there is neither hate nor agitation, right?
It must be clear to everyone now: The result of liberation by others is never freedom, but new dependence. What has not been fought for is always a continuation of neo-feudalism and (virtual) serfdom in a different form. The tools for regaining freedom have long been in our hands. What separates us from freedom is ultimately only comfort.
The book âThe Sovereign Individualâ was recently translated into German. It was written over 25 years ago.
Read it!
Join the marketplace of ideas! We are building a publishing ecosystem on Nostr for citizen-journalism, starting with a client for blogging and newsletter distribution. Sound money and sound information should finally be in the hands of the people, right? Want to learn more about the Pareto Project? Zap me, if you want to contribute (all Zaps go to the project).
Are you a publication or journalist and want to be part of it, test us, migrate your content to Nostr? Write to team@pareto.space**
Not yet on Nostr and want the full experience? Easy onboarding via Nosta.me.
-
@ 97121c7b:30a10e4e
2025-01-27 07:05:52test descripties c
-
@ da0b9bc3:4e30a4a9
2025-01-27 06:30:31Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
đ¨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!đ¨
đ¨Subscribe to the territory to ensure you never miss a post! đ¨
originally posted at https://stacker.news/items/865514
-
@ 97121c7b:30a10e4e
2025-01-27 06:18:42here is where the content will be just a test
-
@ ae6ce958:d0f02c7d
2025-01-27 05:36:26In the tradition of The Pragmatic Programmer, letâs dive deeper into how DamageBDD enables programmers to switch into flow, earn sats for their efforts, and unlock a positive neural feedback loop by fostering behavior-driven thinking. This not only amplifies productivity but also strengthens cognitive abilities, making developers sharper, more agile thinkers in the long run.
Flow State Meets Real-Time Rewards
What Is Flow?
The flow state is that magical zone where work feels effortless, time disappears, and every action seems to naturally lead to the next. Achieving flow requires clarity, focus, feedback, and a meaningful sense of progressâelements that DamageBDD inherently provides.
How DamageBDD Induces Flow
-
Behavior-Driven Focus:
BDD scenarios act as the âNorth Starâ for developers, defining what the system should do in clear, actionable terms. Thereâs no ambiguity, no wasted energy figuring out what needs to be doneâonly a set of behaviors to implement, refine, or fix. -
Instant Feedback Loops:
Every line of code you write is immediately evaluated against predefined BDD scenarios. If it works, you see the green light and earn sats. If it fails, you get actionable feedback to correct it. This near-instantaneous feedback is a cornerstone of flow, reinforcing productive momentum. -
Real-Time Rewards:
With Bitcoin Lightning integration, every passing test or fixed behavior comes with an immediate, tangible payout. The brain loves rewardsâearning sats becomes a dopamine hit, keeping you engaged and motivated.
The Positive Neural Feedback Loop of Thinking in Terms of Behavior
Why Behavior-Driven Thinking Matters
Programming in terms of behavior is more than a methodologyâitâs a cognitive framework that sharpens your mind. When you define problems as behaviors to achieve, you:
- Simplify Complexity: Abstracting functionality into behaviors reduces cognitive load, making it easier to reason about systems.
- Improve Problem Solving: Thinking in terms of "what should happen" (rather than "how to make it happen") trains your brain to identify outcomes first, encouraging solution-focused thinking.
- Enhance Communication: Clear behavior definitions bridge gaps between developers, testers, and stakeholders, fostering better collaboration.
The Neural Benefits
-
Reinforcing Neural Pathways for Logical Thinking:
Every time you think in terms of behaviors, you exercise critical thinking and decision-making processes. Over time, these neural pathways strengthen, making you a faster, sharper problem solver. -
Amplifying Pattern Recognition:
Writing and debugging BDD scenarios train your brain to recognize patterns in system behaviors. This skill extends beyond codingâyour ability to spot patterns in other domains improves as well. -
The Dopamine Feedback Loop:
Passing a test, fixing a bug, or earning sats provides immediate positive reinforcement. This dopamine boost strengthens your association between effort and reward, creating a virtuous cycle that keeps you engaged and growing. -
Cognitive Flexibility:
Behavior-driven thinking encourages adaptability. Youâre constantly switching between defining, implementing, and refining behaviorsâan exercise in cognitive flexibility that enhances your ability to pivot quickly in complex situations.
Amplifying Cognitive Skills Through BDD Practices
-
Systems Thinking:
DamageBDD encourages you to think holistically. BDD scenarios inherently connect individual behaviors to the larger system, fostering a deep understanding of how components interact. -
Empathy for End Users:
Since BDD focuses on expected behaviors, youâre always considering the userâs perspective. This not only improves product quality but also develops your ability to empathize and anticipate needsâa skill valuable in both technical and non-technical settings. -
Mindfulness and Focus:
Writing clear, precise BDD scenarios requires mindfulness. You must focus on the behavior youâre defining, ignoring distractions or unnecessary details. This mindful attention to detail translates into improved focus across all areas of life.
Switching Into Flow with DamageBDD: The Process
-
Defined Goals Through BDD:
BDD scenarios clearly define what needs to be accomplished. Each scenario is a mini-goal, providing a structured starting point for deep work. -
Automated Context Switching:
DamageBDD integrates seamlessly into CI/CD pipelines, handling testing, verification, and payouts. This automation eliminates the mental effort of managing manual workflows, freeing your mind to focus on the task at hand. -
Visual Dashboards for Real-Time Progress:
Real-time dashboards keep you in the loop, showing which tests have passed, which are failing, and how much youâve earned in sats. This constant visibility reinforces a sense of progress and achievement, key elements of flow.
Switching Out of Flow: Sustainable Productivity
-
Natural Breakpoints:
Each passing test, earned payout, or resolved scenario creates a natural stopping point, encouraging healthy breaks and preventing burnout. -
Celebrating Progress:
DamageBDD doesnât just reward you with satsâit gives you a clear picture of your contributions. Seeing how your work aligns with the productâs evolution provides intrinsic motivation and satisfaction. -
Gamification for Reflection:
Leaderboards, badges, or streaks could be implemented to gamify progress, encouraging reflection on your work and motivating future engagement.
Earning Sats in Cyberspace: Making Work Tangible
DamageBDDâs integration with the Bitcoin Lightning Network creates a revolutionary financial model for developers:
1. Every Contribution Matters:
Whether youâre fixing a bug, passing a test, or writing new BDD scenarios, youâre rewarded in sats. This turns even small contributions into meaningful, tangible outcomes.-
Microtransactions for Microtasks:
Unlike traditional compensation models, DamageBDD pays for specific, measurable achievements. This decentralizes reward distribution and ensures fairness. -
Compounding Value:
As you earn sats, youâre also improving the product and your skills. This creates a compounding effect where your work generates value for the system, for yourself, and for your future employability.
A Day in the Life with DamageBDD
- Morning: You review a list of failing BDDs, prioritizing those with the highest payouts. You dive in, quickly fixing a few behaviors, and see your balance increase by 15,000 sats.
- Midday: Collaborating with teammates, you define new BDD scenarios for a feature. As they pass, you collectively earn sats while seeing the feature evolve in real-time.
- Afternoon: You notice an ambiguous BDD and rewrite it for clarity. Your improved scenario prevents potential bugs and earns you recognition and additional sats.
By the end of the day, youâve been immersed in productive flow, refined your cognitive skills, and earned sats for your contributions.
Conclusion: DamageBDD as a Cognitive and Economic Catalyst
DamageBDD doesnât just make programming more productiveâit makes it more rewarding, both financially and cognitively. By fostering behavior-driven thinking, enabling flow states, and creating a tangible connection between effort and reward, it:
- Strengthens your brainâs problem-solving abilities.
- Encourages mindfulness and focus.
- Provides immediate gratification for meaningful contributions.For pragmatic programmers who value growth, productivity, and fairness, DamageBDD isnât just a toolâitâs a transformative experience that rewards you for diving into cyberspace, one behavior at a time.
-
-
@ 2d71bbd8:0088d52f
2025-01-27 05:14:52Some say certain events change our lives in such extreme ways that you will remember them as marking a before and an after. We could say that about some chaotic events making the news, or changes sweeping away the known ways of the world, like a new wave of technology. Something more meaningful can happen to each of us, transforming our lives in deeper ways: love.
I remember a time before him, and everything else is life with him.
Love can feel like a ghost arriving with unpredictable timing and difficult to imagine until you live it. Some think it's real though they've never experienced it. Others spend their lifetimes looking for it. Others think it doesn't exist, and that heartbreak is proof of that. Why does love feel so elusive? How do we even recognize what love is, real love. I'm recalling a scene in the movie While You Were Sleeping, which asks the question, "When did you fall in love with him?". The answer being the title of the movie. If you've experienced love, when did you know you were in love?
For me, it was a particular moment where he started digging into what I thought about something. We had spent many days exchanging conversations, I don't remember exactly how long. They felt formal, structured, without as much depth to them. It was as if we didn't yet feel free to be ourselves. I don't remember what we were talking about that specific night, but he was genuinely interested in what I was saying. Many can fake conversations, but this was not that. We had a deeper spontaneous conversation, and he continues to do that almost every single day. We are constantly extending the roots of our history.
Our lifetimes may be but dust in the existence of the universe, but, in this brief moment in time (which seems long to us), we have shared more thoughts than I have probably exchanged with most of the people I know, combined. I didn't think that was possible nor bearable, yet it feels comfortable and often cozy, even after all these years. I miss it significantly when we have gotten busy on something else in our lives. I thought it would fall back into the mundane, but it doesn't. It is like magnetic curiosity on fire.
Not a day goes by where I don't wonder how my life became so blessed by his existence. He has been an oasis, as there is no topic we cannot talk about or dive into respectfully and deeply. Life is not an easy clear path we walk on everyday. On days of turmoil, when emotional waves are crashing on the shores of our hearts, it is this ability to tell each other anything that has resolved most of the issues at core. Listening to what we each have to say has granted us an understanding of the situation no one else could have. The listening is the starting foundation, as we build a compilation of moments on it, like blocks on a Bitcoin blockchain that cannot be undone.
We often hear that happiness is the goal for a relationship, but we haven't experienced a relationship until we have walked through the whole range of emotions together. It is in those moments, where we're hanging on to each other for strength, that you realize the power of love. It is the sweetest nectar that carries you forward, even during bitter times.
There is a before and an after, and I feel grateful for living in the after, for as long as life grants us time.
I often wonder about all those little details that make him special to me, but also their opposite, which makes it often into our conversations as we decide what we want our love to be. It is as if we were creating a compass to how to love from understanding the differences between what we value and what we choose to leave out. It is not a ruleset. It works like a protocol.
It may be a cultural aspect of today's society, which favors women who do not speak their mind, but I hardly ever remember anyone being seriously interested in what I was saying. I've sometimes heard the idea of how we look more beautiful when we're quiet. I don't think beauty could be silent, as it lives within the heart, and you would never get to know it if it doesn't have a voice of its own.
I'm very familiar with the faces of people reacting to something a woman says. It takes different shapes. Some are worried about what you might say, even after they've asked for your advice. They can be concerned that your differing patterns of thinking might reveal a truth they are trying hard to conceal or ignore. Yet our thinking as individuals is often lacking in perspective, and we cannot gaze at the forest while being a tree. Humans are meant to be connected, and exchanging information is an important part of that connection.
Another familiar stare are those vacant eyes, similar nowadays to people looking at their phones. Cancel culture is comparable, as it ignores variety of thought, to live within a controlled sphere of what is acceptable, where truth cannot thrive. On social media, you may not see people's faces, but you can feel the coldness of their silence, as if they had turned their back on a part of their humanity. It used to be that we would only experience reactions from people, now it's not only the people but algorithms, bots.... I understand the need to feel comfortable somewhere, but I've learned the beauty of welcoming human thought, and with it heart. It is like staring out into the ocean, and realizing how small we are. A place where you cannot be yourself, and where you are worried about being censored if you speak on specific topics, seems like a lonely one. I'm grateful we have our own little niche of freedom here.
The worst reactions to differing voices are attacks, regardless of what you have to say. It is like that old Aesop's fable "The Man, the Boy, and the Donkey." That large book of fables is engraved in my childhood memories, with most of its fables lost to time, as if it was perpetually open to that one page. I didn't know then just how important it would be to love. Love requires you to be you. No alternative exists, nor would you want one, once you feel the freedom. As he likes to say, "It is those things you think are imperfect and flawed within you, that I love."
I learned early on that people's reactions are often a reflection of inner turmoil, so you always wonder what each person has lived through that has made them react to you so negatively. Some people seem wired for fighting without a conscious awareness of what's behind their fighting, as if they were trolls, forgoing the benefits of working toward similar goals. Others seem to enjoy the attention that comes with the chaos, and the likes from spreading lies. I wish there was a stronger culture of respect and a desire to understand and learn from each other, as I feel the benefits of that everyday with him. It seems strange to gaze at the conversations of people fighting each other to where they've forgotten what started the fight, and they continue fighting over nothing.
The human desire for ignoring differing points of view or bringing them down runs deeper and more widespread than I'd like. It's as if mutual listening has become a lost art. Without listening, knowledge fades away, along with empathy. Social media may be changing part of the culture, though at times it seems to magnify the issues. The existence of nostr, however, gives me hope, as it's core principle is to value human thought and the diverse ways to protect it. I am grateful for how it encourages a building of trust based on verification, shaping the foundation for both identity and communities.
Who are we if we cannot listen to each other. Who are we if we favor silence of what we do not understand or what is different. Could humanity be what it is today if people didn't exchange their voices and built upon them. Who are we if we silence criticism, when it is through constructive criticism that we grow. Would we want silence of what makes us unique to be the norm for those we love and those who will come in future generations, as if we were a single minded machine puppeteered by a few. Without an ability to think and speak freely, we lose the foundation that makes love possible. Without love it is as if we haven't lived.
-
@ bbb5dda0:f09e2747
2025-01-27 03:22:10At Nostriga in the middle of last year I got introduced to TollGate, a project to resell internet access, I was fascinated and hyped for this to become a thing. Later during SEC-03 I got involved in the development of TollGate and helped work out the idea utilizing Nostr to make the experience of using a TollGate super smooth. That's where the idea started to make a cross-platform app that would autoconnect and start streaming sats to TollGates for internet access.
I'd been working on it here and there and this week I feel like I got in to the developer high (i'm sure some of you know what that feels like) and I just wanted to see the android app work! So as the week moved along I just kept being drawn in. And progress there was! The vision we had during SEC is coming to be a reality very fast.
TL;DR There's a demo video at the bottom.
Quick CI/CD update
I've been talking to DanConwayDev to work together on getting the UI for the pipelines into GitWorkshop, which would be the perfect place for it. He's in the middle of a rewrite, so when that is progressing a bit more we'll cooperate on making this part of it, stay tuned!
Whoami
I started by creating a service that would run on every TollGate router that a client can use to fetch their own MAC address that's later included in the payment. The MAC address is the anchor for the router to allow/disallow access. The problem we have on Android is that the operating system restricts access to this information. But since we control the router, we can work around it by creating a predictable endpoint that gives us back this answer.
Beacon frames
Routers use something called Beacon Frames, which are sent out regularly and it is the thing your phone looks at when scanning for wifi networks. It contains the name of the network (SSID) and a whole bunch of other stuff you don't usually see.
We're utilising these beacon frames to add some information specific to tollgates. There is a field in these beacon frames called 'vendor elements'. Which is originally only intended for use by manufacturers of routers. But ofcourse we can utilize them too. Which is exactly what we do.
I eperimented with these beacon frames to see how many of them we can broadcast. It turns out that we're limited to only one of them, but the good news is we can fit up to 249 characters (256 - a few reserved ones) in there. This is amazing because it will fit everything we need in there.
We put in: - Nostr npub - TollGate version - Gateway IP (required to get around OS limitations) - allocationType (KiB/Minutes) - price per 1024 units (eg: 104900 sats per 1024 KiB) - price units (sat)
So now any tollgate can broadcast this info, which is used by clients to decide wether or not they should connect. And if they do, where the payment should go.
Suggestions, Suggestions, Suggestions
Unfortunately, Android in the past few years has locked down the wifi api's and we can no longer fully autoconnect to networks. Instead we have to use the 'wifi suggestions' API. As the name implies, it will only suggest a nework to a user using a silent notification that they have to press to actually connect. But alas, we'll work with that and if it's the only user-action required, that's still quite okay.
It took me quite a while to figure out the way the OS handles these suggestions, but eventually I got it to work and was able to get the flow to work!
Adding the payment
Ok this part doesn't include an actual payment yet, but all the components are in place now for a (semi-)automatic tollgate connection, which is EPIC! In this version i still manually tap 'connect', but this can and will be automatic soon.
So the steps are as follows (this happens in a few seconds): - đ˛ TollGate App scans for networks and filters for TollGates - đ¤ User taps Connect [to be automated] - đ˛ TollGate App suggests network - đ¤ User taps suggestion notification to connect - đ¤ Android connects to network - đ˛ TollGate App fetches it's own MAC address (whoami service on router) - đ˛ TollGate App Connects to Nostr relay (running on the router) - đ˛ TollGate App Sends payment - đ Router receives payment (merchant module) - đ Router creates session (merchant module) - đ Router opens the gate for user (valve module) - đ Router closes the gate for user, when purchase runs out (valve module)
I made this recording, it has a small caveat that at the end the page loaded because I was on 5g, the OS still thought the wifi network had a captive portal open. But there's an API to mark it as dismissed, which we can easily implement. So that's an issue we can overcome!
Demo video
https://cdn.satellite.earth/ede26976043a0b8edf278ea51aa0c00e721d2134c4e456928192090ea660bda0.mp4
-
@ 16d11430:61640947
2025-01-27 03:22:10As the fiat distortion field thickens, its intensity turns reality into an unrelenting mirageâa world where central bank promises are gospel, the inflationary inferno masquerades as growth, and every citizen's lifeline is a debit card leashed to an empty vault. In this battlefield of blind obedience, the Bitcoinersâthe insurgents who dared to build an alternative lifeboatâbecome phantoms. Their quiet exodus into a parallel economy is drowned out by the roaring lies of fiat propaganda, the din of compliance echoing across the smoldering ruins of free markets.
The fiat heads march in lockstep, their gaze fixed on the shimmering mirage of digital central bank tokens. "Progress," the generals of fiat scream, as they shovel paper promises into the bonfire of real wealth. The fiat faithful, eyes glazed with hope and fear, cannot see the Bitcoiners. To them, they are ghostsâwhispered myths of rebels who abandoned ship, whose defiance now lingers in the shadows, shielded by unbreakable cryptographic armor.
As the distortion field reaches its zenith, the fiat system's collapse becomes inevitable. Like a termite-riddled dam holding back the floodwaters of monetary truth, cracks begin to appear. Inflation spirals, savings vanish, and every bailout only tightens the noose. The Bitcoiners are nowhere to be found. They've long since disappeared into the layers of the Lightning Network, the on-chain fortress of hard moneyâa world impervious to fiat's decay. The fiat heads do not understand this exodus; they cannot comprehend a life beyond the permissioned panopticon that shackles them.
And then comes the reckoning.
The collapse is not orderly. It is a spectacular implosion of trust and liquidity, a cascading failure that shatters economies and erases generations of paper wealth. The fiat shillsâthose who fought tooth and nail to maintain the illusionâare the first to cash out, selling their last scraps of dignity for a seat on the escape pods. They abandon the wreckage, leaving behind a trail of blood and guts. It is not a clean break. The betrayal is writ large in the empty accounts of the faithful, in the pension funds robbed blind, in the riots of the starving masses.
For the Bitcoiners, this is no victory parade. There is no schadenfreude, no banners waving triumphantly. They have already built their citadels, their parallel world of decentralization and sovereignty. While the fiat faithful drown in the deluge, the Bitcoiners watch silently, their invisibility now a shield against the chaos. They knew this was coming. They prepared. But the blood on the streets is a bitter reminder that not everyone couldâor wouldâescape.
The war is over, but its scars run deep. A generation of fiat heads pays the ultimate price for their faith in a failing system. The Bitcoiners remain, rebuilding in the ashes, unseen yet omnipresentâreminders of the cost of ignorance in the face of hard truths. The distortion field fades, and the truth emerges: you cannot print trust, nor can you inflate sovereignty. The fiat mirage has finally burned away. But at what cost?
-
@ 16d11430:61640947
2025-01-27 02:53:44Introduction
In the field of clinical psychology, we understand that mental health is deeply influenced by external socioeconomic factors. Economic stress, financial uncertainty, and a lack of personal agency are pervasive contributors to psychological distress. Simultaneously, we are witnessing a global economic environment shaped by fiat currency systems that perpetuate cycles of inflation, wealth inequality, and financial instability. These forces exacerbate the mental health challenges faced by millions worldwide, from financial anxiety to depression, despair, and even suicide.
However, emerging technologies like Bitcoin present an unprecedented opportunity to address these issues at their core. Bitcoin, a decentralized digital currency with immutable monetary properties, offers individuals financial sovereignty and stability in an otherwise unpredictable fiat system. By combining the principles of sound money with evidence-based psychological therapies, we can create a mental health app that not only alleviates mental suffering but also empowers users to reclaim control over their financial futures.
This document outlines a proposal for a groundbreaking mental health app, appealing to clinical psychologists and mental health professionals who are dedicated to addressing the deeper socioeconomic roots of psychological distress. By integrating Bitcoin into therapeutic practices, this app aims to provide both psychological and financial liberationâa double-barreled solution to the interconnected crises of mental health and financial disempowerment.
The Problem: Economic Stress and Mental Health
- The Vicious Cycle of Economic Stress:
Economic instability, inflation, and job insecurity are leading contributors to mental health issues, including anxiety, depression, and suicide. Research has consistently shown that financial strain is one of the most significant stressors in modern life.
- The Fiat Systemâs Role:
Fiat currency systems, with their inherent susceptibility to inflation and devaluation, erode personal savings and wealth over time. This creates a pervasive sense of financial insecurity, particularly for individuals with low incomes or limited access to financial education.
- Mental Health Professionals' Challenge:
While therapy provides tools to manage stress and build resilience, the root causes of financial anxiety often remain unaddressed. Clinical psychologists lack tools to directly impact their patients' financial well-being, leaving a gap in treatment that perpetuates the cycle of distress.
The Solution: A Bitcoin-Based Mental Health App
This app bridges the gap between financial empowerment and mental health care, addressing both psychological and economic challenges through innovative features. It aligns with the principles of clinical psychology while leveraging Bitcoin's transformative potential as a decentralized, inflation-resistant monetary system.
Core Features
- Financial Sovereignty Through Bitcoin
Savings Mechanism: Users can set up automated Bitcoin savings (e.g., dollar-cost averaging) to build financial security. This reduces anxiety caused by inflation and the devaluation of fiat savings.
Educational Modules: The app provides accessible, gamified lessons on Bitcoin and sound money, empowering users with financial literacy. Understanding the stability and predictability of Bitcoin can mirror therapeutic principles of control and agency.
- Psychological Therapy with Incentives
Gamified Cognitive Behavioral Therapy (CBT): The app offers CBT exercises such as mindfulness practices, journaling, and gratitude exercises. Completing these tasks earns users small amounts of Bitcoin ("sats"), creating positive reinforcement and a tangible sense of reward.
Behavioral Economics Integration: Modules teach users to align their mental health practices with the principles of Bitcoin, such as patience (low time preference) and discipline, fostering resilience and long-term thinking.
- Immediate Crisis Support
Lightning Network Micro-Transactions: The app enables users to send and receive instant, low-cost Bitcoin payments, creating a decentralized crisis fund. This fund can be used to provide financial assistance for therapy sessions, medications, or emergency needs.
Access to Resources: Users can connect directly to mental health professionals, crisis helplines, and peer support groups within the app.
- Community and Peer Support
Bitcoin-Psychology Network: A global community of like-minded individuals provides social support, combating isolation and fostering shared resilience. Users can share stories of overcoming financial and psychological challenges, creating a collective sense of hope and purpose.
Collaborative Challenges: Gamified group activities encourage healthy behaviors, with Bitcoin rewards for participation and achievement.
- Data Sovereignty and Privacy
Decentralized Data Storage: Users own their mental health records and therapy progress through encrypted, decentralized storage, ensuring privacy and security. This aligns with Bitcoinâs ethos of self-sovereignty and trustlessness.
Psychological Benefits
- Alleviating Financial Anxiety:
By introducing users to a sound monetary system, the app reduces fears of inflation, devaluation, and financial instability. This newfound security supports mental well-being.
- Reinforcing Positive Behaviors:
The Bitcoin reward system creates an incentive structure that aligns with therapeutic goals, reinforcing habits that improve mental health.
- Promoting a Low Time Preference Mindset:
Bitcoinâs principles encourage long-term planning and delayed gratification, fostering mental resilience and reducing impulsive behaviors.
- Building Hope and Agency:
The app empowers users to take control of their finances and mental health, creating a sense of agency that is critical for psychological recovery.
Appeal to Clinical Psychologists
As a clinical psychologist, your mission is to heal minds and improve lives. This app offers you a unique opportunity to extend your impact beyond traditional therapy:
- Addressing Root Causes:
By integrating financial education and empowerment into mental health care, you can address one of the most significant sources of stress for your patients.
- Leveraging Innovation:
This app harnesses cutting-edge technology to provide scalable, accessible mental health support. It complements your clinical practice by providing tools that patients can use independently.
- Empowering Your Patients:
Offering your patients a pathway to financial sovereignty alongside psychological recovery enables them to build a sustainable, resilient future.
- Joining a Revolutionary Movement:
By supporting this app, you become part of a global movement to address the systemic causes of mental health crises and promote holistic well-being.
Call to Action
We invite clinical psychologists to collaborate with us in shaping this app. Your expertise is invaluable in ensuring that the psychological tools and interventions offered are evidence-based, effective, and user-friendly. Together, we can create a platform that not only saves lives but also empowers individuals to reclaim their mental and financial well-being.
Let us build a future where sound money and sound minds go hand in hand. Join us in revolutionizing mental health careâone sat at a time.
Would you like to discuss partnerships, provide feedback, or explore how this app could integrate with your practice? Letâs start a conversation that has the power to change lives.
-
@ 59c2e15a:d25e6e8d
2025-01-27 02:29:42Note: I originally wrote these essays on bitcoin and yoga in 2022 after completing my yoga teacher training and going deep down the bitcoin rabbit hole. I then published them to my Ghost blog in 2023. I decided to repost them here on Nostr to start 2025 to further spread the wisdom and timelessness that bitcoin and yoga share. I split my original essay into seven parts, and I will add an eighth comparing yoga and Nostr. I hope you enjoy part one - namaste!
Part I:Â Bitcoin and Yoga Shared Values
Part II:Â Mythical/Mystical Origins
Part III:Â Evolution of Money and Yoga
Part IV:Â Ashtanga Yoga - The Eight Limbs of Yoga (limbs 1-2)
Part V:Â Ashtanga Yoga - The Eight Limbs of Yoga (limbs 3-8)
Part VI: Bitcoin is Dharma
Part VII:Â Himalayan Kriya Yoga
Introduction
With each passing day, month, and year, it feels as though our human civilization is becoming more dysfunctional, untethered, and unsustainable. Individuals are working harder, longer hours, yet most remain stuck in place, goals farther from reach. We live in a world where many have outsourced the most critical task that has enabled humans to prosper â critical thinking. I challenge each one of you to remove preconceived notions you might have about Bitcoin or Yoga before reading this series. I invite you to enter with an open mind. Think for yourself â you are welcome to agree or disagree with the information and arguments I put forth.
I also encourage you to go beyond thinking â feel. Use your intuition to understand if the way youâre living your day-to-day life feels good to you, or if you have sense, an inner knowing that something is off with our society today â that there can be a better way. If you open your heart and mind to receiving new information, there is potential to motivate yourself to change your thoughts and behaviors for more aligned action towards individual sovereignty. Every individual can choose freedom and independence. Yet it has become increasingly difficult to live a life of freedom due to the fiat system of inflation and the many distractions that keep us from going inward. After deep study and reflection, I believe bitcoin and yoga both provide the individual control over their own life journey, and frameworks to understand our connection to self and others.
I'm excited to share what I have found in my own personal experience, and hope to spark curiosity within you to follow your passion. This writing is intended for anyone seeking tools to lead a life of freedom, make positive changes and deepen your understanding of self. In addition, it is written for yogis who want to learn about bitcoin, bitcoiners who want to learn more about yoga, and anyone who is interested in a fundamental understanding of these topics that I believe contain the potential to transform your life.
Part I: Bitcoin and Yoga Shared Values
Bitcoin and yoga share many fundamental values with one another and provide deep wisdom on guiding individuals towards living better and more meaningful lives. Ultimately bitcoin and yoga share the goal of individual liberation, freedom from suffering, and a deep inner, lasting peace in Being. In yoga, this state is called moksha or samadhi. I believe everyone has a true essence, an inner being that knows what is best. However, our external environment and our own conscious mind push us away from this serenity, leading to regrets about the past or anxieties about the future. This perspective of linear time and our own individual stories and identity damage our ability to stay present in the Now, leading to endless distractions. In similar ways, bitcoin and yoga provide us insight for an individualâs path to inner peace, as well as for humanityâs path to collective peace and prosperity.
Energy
At the most elemental level, energy is the force underlying both bitcoin and yoga. Energy is the universal currency of life. We would not exist without energy. We require physical energy to fuel our cells and bodies to perform essential tasks like breathing, circulation, digestion, and movement. We perceive many forms of energy such as light or sound waves, yet there are many energy wavelengths we are not able to or are not trained to perceive.
Bitcoin is powered by physical energy in the real world in a process that secures the network and unlocks new bitcoin for distribution, a process commonly referred to as mining. Interestingly, 100 years ago, Henry Ford pushed for an energy-linked currency measured in kilowatt hours that could bring peace after a brutal World War, as seen in the New York Tribune headline and article December 4, 1921: âFord Would Replace Gold with Energy Currency and Stop Warsâ (i). It took another century, but mankind has finally developed a digitally-native currency tied to the physical world through energy expenditure â bitcoin.
Yoga is similarly rooted in energy that individuals tap into through breathwork, physical movement and meditations practices. This life-force energy is known in Sanskrit as prana. Prana is not bound by time or space, and it flows through individuals in over 72,000 nadis, or channels. There are three main nadis - the first is ida, our left side body which corresponds to the feminine, receiving energy, or the moon. On the right side is pingala, relating to our masculine, giving energy, or the sun. The central nadi runs through our shushumna, linking our seven main energetic centers, known as chakras. These chakras run from the base of the tail bone, up through the spine and the top of the head. Each chakra has a name, a color and key characteristics that can often become blocked through negative emotion, trauma or stress in the body. Different yogic practices target these energy centers to unlock what is stuck and enable energy to more freely flow through us in an open exchange with the earth and out the universe. This energy is ever-present; one need only to tap into this energy, feel it and utilize it for the strengthening of oneâs inner being that then radiates outwards on others in your life. The energetic experience and upward surge can also be referred to as kundalini energy, a creative power of divine feminine energy that originates in the muladara chakra at the base of the spine.
Depiction of our chakras and nadis (image source)
Proof of Work
In both Bitcoin and Yoga, "proof of work" is required to operate, practice and move forwards. In the Bitcoin network as described in the original white paper, miners contribute tangible energy towards running a hashing algorithm on a computer â SHA256 â to earn the right to add the next block to the blockchain and collect both the coinbase and transaction fee reward (ii). The work is difficult to produce but easy to validate by others. Miners are collecting all of the valid peer-to-peer transactions being propagated to the network and establishing them as truth into the distributed ledger. The rules in bitcoinâs code incentivize honest behavior from miners through unforgeable costliness â if a miner were to lie about any of the transactions it includes in a block, independent nodes in the network would reject the block, and the miner would have lost all the real resources it expended to solve the proof of work calculation.
Example of an ASIC - a specialized computer solely dedicated to mining bitcoin.
In yoga, dedicated work is needed to learn the asanas, postures, and practice for oneself; you wonât just be able to go upside down or flow through sun salutations without first learning proper alignment and breathing techniques. An individual needs to conscious decision to work on a daily yoga practice that requires energy to flow. There are several ways to work on your yoga practice beyond physical movement; these include bhakti yoga (devotion/prayer), jnana yoga (study/wisdom), karma yoga(selfless action) and raja yoga (ashtanga). Raja yoga includes ashtanga, the eight limbs or paths of yoga that Patanjali detailed \~2000 years ago that we will explore in more depth in part IV. These ancient margas (paths) and subsequent development of these ancient teachings provides individual with ample opportunity to dedicate and work towards individual enlightenment.
Decentralization
Next, there are no external barriers preventing an individual from participating in Bitcoin or yoga. Bitcoin does not discriminate and can be accessed by anyone around the world. Yoga provides a way of life full of mindfulness and appreciation. The only barriers are internal blockages, or unwillingness to ask questions, learn and take responsibility for oneself and state of being. Therefore, Bitcoin and yoga can both be defined as decentralized. There are no centralized gatekeepers preventing one from accessing the Bitcoin network or using bitcoin as money; anyone can spin up a node, download a wallet or mine bitcoin. There are over 16,000 nodes geographically distributed around the world voluntarily running the bitcoin core software code establishing the payment network, validating transactions and storing the entire transaction history of bitcoin (iii). It costs as little as a few hundred dollars and requires less than 600 gigabytes of storage to run a node â in 2023 you can find mobile phones with that much storage. No one can prevent you from sending a peer-to-peer transaction or storing your own wealth with 12 words in your head â you need only decide to take true freedom into your own hands and learn how to do so (iv). The common maxim is âdonât trust, verifyâ. You donât need someone elseâs permission to participate in bitcoin or trust anyone else (eg, banks) to hold your wealth.
Geographic distribution of reachable bitcoin nodes (source: bitnodes)
Similarly, no one can stop an individual from practicing yoga, learning yogic philosophy or connecting with oneâs truest self and inner guru. Anyone can choose to follow the path of yoga, focus on ones breath or develop a strong asana practice. There are many different ways to learn and interact with yoga, with experienced teachers willing to share their lessons to students all over the world. One need to simply find yoga studio, enroll in a teacher training or and engage with a teacher to experience yoga for themselves. Yoga looks and feels different depending on what country you are in or in which lineage you are being taught. Tapping into these profound lessons, as fundamental as controlling ones own breath, requires only an individual desire and the conscious decision to act. Thereâs no CEO or central authority dictating how Bitcoin or yoga has to be. Individuals have the freedom to express themselves voluntarily guided by frameworks we will dive into deeper.
Low Time Preference
Another core value that bitcoin and yoga share is low time preference. In Austrian economics, time preference refers to individual decision making. An individual with a low time preference makes decisions with greater consideration of the future, quieting immediate cravings and desires to pursue a higher goal (v). In bitcoin and money, lower time preference decisions include putting off consumption to save value for the future. Unfortunately, our fiat (by government decree) system induces individuals to make high time preference decisions, heightening consumerism and poor habits today that we see rampant in our society. There is a disincentive to save, as inflation of the money supply leads to debasing value of the dollar and other fiat currencies, decreasing individuals purchasing power of cash they hold onto and donât spend soon. For example, the purchasing power of your dollar today will be cut in half over the next decade at current levels of inflation. In many ways, bitcoin is time, described brilliantly by Gigi, as it creates a decentralized clock that establishes consensus with each block (vi).
In contrast, the hard cap supply of 21 million bitcoin enables individuals to save with the knowledge that governments and central banks will not be able to debase their hard-earned value. This allows for one to plan with greater certainty, making investments that have a longer payoff period rather than chasing quick, material gains. Likewise in yoga, developing your own practice will not bear fruit right away; it takes discipline and time to continuously improve and strive towards a better future self. For example, in modern Ashtanga yoga taught by Pattabhi Jois, there is a set sequence of asanas that one studies and repeats each practice. It may even take months to have find the right alignment of body and breath for a single pose! The hours-long sequence requires dedication to practice and learn. The dedicated yogi understands that wholehearted commitment today will pay off for oneâs mental, physical and spiritual health in the years to come. The ability to develop a calm mind can also be beneficial when people donât initially understand or are intimidated by bitcoin. This approach can also enable you to stay grounded and discover the signal through the noise when learning about bitcoin.
Sequence of asanas in Jois' Ashtanga Yoga (image source)
Union
Yoga comes from the Sanskrit word âyujâ, which means âto joinâ or âto uniteâ. Yoga represents the union of the mind, body, and soul of an individual. Yoga provides a pathway to individual sovereignty through disciplined practice and purpose. Yoga unites an individual internally and to oneâs community, fostering connectedness and support (vii). Similarly, bitcoin provides a pathway to individual sovereignty in many ways. Bitcoin empowers the individual authority with property rights over oneâs value, which in turn frees individuals from outside control (government or otherwise). Bitcoinâs technology enables one to hold their own wealth and lifeâs energy in a self-custodial fashion. Bitcoin is money that can be stored forever and transmitted through space at the speed of light on layer two via the Lightning Network.
Bitcoin is an open economic network with the potential to unite eight billion people together in a way our current unfair and fragmented financial system could never do. In many countries, a majority of people are unbanked, while intermediaries take a cut of the value to transfer slow, legacy payments like Western Union. While tens of millions people around the world have so far interacted with bitcoin â we are still early â similar to the internet of the mid-nineties. Bitcoin eliminates counter party risk associated with non-bearer assets, such as fiat currency (e.g., dollars, euros, yen). Bitcoinâs supply schedule is set and eliminates inflation time theft that fiat currency wages on individuals, which leads to anxiety and depression or feelings of hopelessness. Fiat is money enforced by the monopoly on violence that modern nation states grip tightly.
In contrast, bitcoin and yoga empower the individual to remove the shackles and embrace personal responsibility to improve ones life. Bitcoin and yoga also connect people directly to each other and tap into truth, ones inner being, bringing peace in the present and ultimately offer hope for a better future for each person, your community, and the world. Bitcoin and yoga have the power to unite humanity in love.
In the next section, we will explore both yoga and bitcoin's mystical and mythical origins.
Note: Bitcoin with a capital "B" generally refers to the protocol/network; bitcoin with a lower case "b" refers to the money/currency.
References:
i. Redman, Jamie, How Henry Ford Envisaged Bitcoin 100 Years Ago â A Unique 'Energy Currency' That Could 'Stop Wars', News.Bitcoin.Com, October 11, 2021 <https://news.bitcoin.com/how-henry-ford-envisaged-bitcoin-100-years-ago-a-unique-energy-currency-that-could-stop-wars/>
ii. Nakomoto, Satoshi, Bitcoin: A Peer-to-Peer Electronic Cash System, bitcoin.org, October 31, 2008 <https://bitcoin.org/bitcoin.pdf>
iii. https://bitnodes.io/
iv. Hall, Stephen, What is a bitcoin seed phrase and how does it work? Unchained.com. December 17, 2021 <https://unchained.com/blog/what-is-a-bitcoin-seed-phrase/>
v. Ammous, Saifedean, Making Time Preference Low Again, The Bitcoin Times, Austrian Edition (V). November 8, 2022 <https://bitcointimes.io/making-time-preference-low-again/>
vi. Gigi, Bitcoin is Time, dergigi.com. Jan 14,2021 <https://dergigi.com/2021/01/14/bitcoin-is-time/>
vii. 200 hour yoga teacher training. House of Om, Bali, Indonesia. <https://houseofom.com/>
-
@ 16d11430:61640947
2025-01-27 01:55:54The web as we know it today is a grotesque, bloated, inefficient mess. What began as a noble idea of decentralized information sharing has metastasized into an all-consuming beast, sucking up energy, resources, and our collective attention span. Modern web technologies are a house of cards, built on sand, doomed to collapse under their own inefficiencies. Meanwhile, Bitcoin, with its pristine simplicity and focus on fundamental truths, exposes the web's rot and offers a radical way forwardâa path where we can finally cut out the cancer and rebuild technology on truly eco-friendly principles.
The Web: A Monument to Human Hubris
Web technologies are the product of shortcuts and compromises. JavaScript, HTML, CSS, and their ilk are glorified hacks, cobbled together to solve yesterday's problems but now expected to carry the weight of tomorrow's world. Every layer of abstraction adds inefficiency, every bloated framework compounds the energy drain, and every new browser update introduces more complexity to patch over the inherent flaws of the previous ones.
Modern web applications, stuffed with endless dependencies and ad trackers, demand more computational power than was used to land humans on the moon. The hardware arms race, fueled by these inefficiencies, ensures a constant churn of e-waste as old devices are discarded for newer, slightly faster ones. This isnât progressâitâs a perpetual motion machine of waste, driven by greed and ignorance.
Bitcoin: The Base Layer of Truth
Enter Bitcoin, the antithesis of the webâs insanity. Bitcoin operates on a principle the web has long abandoned: truth through simplicity. Its base layer is immutable, efficient, and designed to do one thing exceptionally wellâsecurely transfer value without trusted intermediaries. There are no bloated frameworks in Bitcoin, no endless layers of abstractionâjust elegant, austere code that prioritizes function over form.
Bitcoinâs lightning-fast, decentralized, and energy-efficient second layers like the Lightning Network expose the webâs redundancy. Why rely on slow, resource-hungry web applications when Bitcoin provides an eco-friendly, censorship-resistant, and trustless platform for payments, communication, and data validation?
Excising the Cancer
The web is a parasite. It feeds on electricity, devours developer time, and churns out products that are inherently wasteful. The internet doesnât need web browsers to function. It doesnât need JavaScript to execute logic. It doesnât need to be a bloated, surveillance-driven nightmare. What it needs is Bitcoinâs ethos applied at every layer.
Hereâs the brutal truth: the web is redundant in a world where Bitcoin is the base layer of value and truth. Imagine a world where applications are built directly on Bitcoinâs decentralized infrastructure:
Data Sovereignty: Every piece of information is owned by the user, validated, and secured on the blockchain.
Eco-Friendly Applications: Stripped-down, efficient protocols replace bloated web stacks, reducing energy consumption and e-waste.
Global Accessibility: No need for monstrous data centers or planned obsolescenceâsimple, lightweight devices can interact directly with Bitcoinâs network.
True Decentralization: No more reliance on Big Tech monopolies controlling browsers, servers, and frameworks.
Shaking the Foundations
The web as it exists today is not a neutral toolâitâs a weapon of mass distraction, a cancer consuming the planet's resources while feeding corporationsâ insatiable hunger for profit. Bitcoin reveals this grotesque reality and points to a better way. By adopting Bitcoin as the foundation of technology, we can eliminate the need for web browsers, JavaScript, and their toxic ecosystem. We can build systems that prioritize efficiency, decentralization, and sustainabilityâtechnologies that serve humanity rather than enslave it.
But this transition wonât happen without pain. For decades, people have been indoctrinated to believe that the web is essential, that web apps and cloud computing are the pinnacle of innovation. These are lies. They are lies told by those who profit from inefficiency, waste, and control. Bitcoin challenges these lies, not with words but with action. It functions as a silent rebuke to the waste and corruption of the web.
Burn It Down and Build Anew
Itâs time to excise the cancer. The web has failed us. Its inefficiencies, its bloat, its environmental impactâall are unforgivable. Bitcoin gives us a way out, a chance to start fresh. By adopting Bitcoinâs principlesâsimplicity, decentralization, and efficiencyâwe can build technologies that honor the planet, respect users, and secure a better future.
Let the web die. Itâs time to bury this relic of hubris and build something better. Bitcoin is the way forward. Everything else is noise.
-
@ 16d11430:61640947
2025-01-26 23:31:56Central Bank Digital Currencies (CBDCs) are on the horizon, promising a new era of state-controlled digital money. While they might appear to threaten Bitcoinâs role in the financial ecosystem, they also present a unique opportunity for Bitcoiners to showcase Bitcoinâs strengths and drive its adoption. This article explores how CBDCs might affect Bitcoin and why Bitcoiners should view their emergence as a chance to reinforce Bitcoinâs role as the foundation of financial sovereignty.
The Rise of CBDCs: A Gateway to Bitcoin Awareness
The rollout of CBDCs by governments around the world will inevitably bring digital currencies into the mainstream. For many, CBDCs will serve as their first interaction with a fully digital form of money. This widespread exposure will naturally spark curiosity about other digital assetsâmost notably Bitcoin.
Education Through Contrast
CBDCs provide Bitcoiners with an opportunity to highlight the stark differences between Bitcoin and state-controlled money. Key contrasts include: - Centralization vs. Decentralization: CBDCs are issued, controlled, and monitored by central banks, whereas Bitcoin operates on a trustless, decentralized network. - Infinite Supply vs. Scarcity: CBDCs are tied to fiat systems and can be issued in unlimited quantities, contributing to inflation. Bitcoinâs fixed supply of 21 million coins offers a deflationary alternative. - Surveillance vs. Privacy: CBDCs are programmable and likely to come with extensive surveillance features. In contrast, Bitcoin provides pseudonymity and financial sovereignty.
As governments promote CBDCs, Bitcoiners have a prime opportunity to educate the public about Bitcoinâs unique properties as a censorship-resistant, decentralized store of value.
The Flaws of CBDCs: Bitcoinâs Selling Points
While governments tout CBDCs as the future of money, their inherent flaws could drive individuals and businesses toward Bitcoin.
1. Erosion of Privacy
CBDCs are expected to enable unprecedented levels of financial surveillance. Governments could monitor and control how individuals spend their money, with features like: - Transaction tracking. - Spending restrictions. - Programmable expiration dates for money.
Bitcoin offers a clear alternative by enabling permissionless transactions and preserving financial privacy.
2. Inflationary Nature
Like fiat currencies, CBDCs will be subject to inflationary policies, reducing purchasing power over time. Bitcoin, with its fixed supply, stands in stark contrast as a hedge against inflation. As individuals experience the devaluation of CBDCs, they may turn to Bitcoin as a store of value.
3. Control and Censorship
CBDCs give governments the ability to impose financial controls, such as freezing accounts or limiting transactions. Bitcoinâs decentralized network makes it resistant to censorship, appealing to those seeking financial independence.
Opportunities for Bitcoiners
Rather than viewing CBDCs as competition, Bitcoiners can use their emergence as a springboard to drive Bitcoin adoption. Hereâs how:
1. Positioning Bitcoin as an Escape Hatch
For individuals and businesses wary of the surveillance and control inherent in CBDCs, Bitcoin represents a financial escape hatch. Bitcoiners can position Bitcoin as a parallel system that preserves privacy, autonomy, and freedom.
2. Leveraging Education and Advocacy
The introduction of CBDCs creates a natural opening for Bitcoiners to educate the public about Bitcoinâs advantages. Outreach efforts could focus on: - Hosting workshops and webinars that explain Bitcoinâs properties. - Sharing educational content that highlights the risks of CBDCs and the benefits of Bitcoin.
3. Promoting Bitcoin for Global Transactions
CBDCs will likely be restricted to domestic use, with limited interoperability between countries. Bitcoin, as a global, borderless currency, provides an alternative for cross-border transactions and remittances. The rise of CBDCs could drive demand for Bitcoin in this space.
4. Advancing the Lightning Network
While CBDCs may excel in everyday retail transactions, Bitcoinâs Lightning Network can compete as a fast and inexpensive payment layer. Bitcoiners can promote the Lightning Network as a viable alternative for small, instant payments.
The Bigger Picture: Bitcoin as a Hedge Against CBDCs
CBDCs may accelerate the decline of trust in fiat currencies. As governments experiment with new monetary policies enabled by CBDCsâsuch as negative interest rates or expiration dates on moneyâindividuals may lose confidence in state-controlled financial systems. This presents an opportunity for Bitcoin to solidify its role as a hedge against monetary mismanagement.
Case Studies in Bitcoin Adoption
Countries experiencing economic instability and inflationâwhere CBDCs fail to inspire trustâcould see increased Bitcoin adoption. For example: - In nations with hyperinflation, Bitcoinâs fixed supply makes it a lifeline for preserving wealth. - In authoritarian regimes, Bitcoin offers financial freedom where CBDCs impose restrictions.
Seizing the Moment
For Bitcoiners, the rise of CBDCs is not a threat but an opportunity. As governments introduce centralized digital currencies, Bitcoin can stand out as the decentralized, inflation-proof, and censorship-resistant alternative. By educating the public, advancing the Bitcoin ecosystem, and emphasizing Bitcoinâs unique properties, Bitcoiners can leverage CBDCs to drive adoption and solidify Bitcoinâs place in the global financial system.
The narrative is clear: while CBDCs represent a new chapter in centralized money, Bitcoin remains the future of financial sovereignty. For Bitcoiners, the time to act is now.
-
@ 76c71aae:3e29cafa
2025-01-26 22:51:16When I first heard about the DOGE project, I was ready to throw my laptop out the window. The initial proposal read like a Silicon Valley libertarian fever dream - taking Musk's chaotic "move fast and break democracy" Twitter approach and unleashing it on federal agencies. Great, I thought, just what we need: more tech bros thinking they can "optimize" public institutions into oblivion.
But here's the weird thing - when you actually dig into what DOGE has morphed into, it's basically just USDS with a meme-worthy rebrand. For those not deep in the civic tech weeds, USDS was Obama's attempt to drag government technology out of the 1990s, inspired by the UK's actually-functional GDS program. And let's be real - government tech procurement is an absolute dumpster fire right now. We're talking billions wasted on projects that would make a CS101 student cringe, while the average American has to navigate websites that look like they were designed on GeoCities.
The deeply ironic thing is that Musk - for all his cosplaying as a technocratic messiah following in his grandfather's footsteps of dreaming up an antidemocratic technocratic state - actually has some relevant experience here. SpaceX did figure out how to work with government contracts without producing $500 million paperweights, and Tesla somehow gamed clean vehicle incentives into birthing the first new major car company since we invented radio.
Look, I'm the first to roll my eyes at Musk's wannabe-fascist posting sprees and his perpetual "I'm the main character of capitalism" energy. But speaking as someone who's banged their head against the wall of government technology modernization for years - if he actually focuses on the tech and keeps his brainrot political takes to himself, maybe DOGE could do some good?
Even Jen Pahlka, who basically wrote the book on government digital services, is cautiously optimistic. The services Americans get from their government are objectively terrible, and the procurement system is trapped in an infinite loop of failure. Maybe - and I can't believe I'm typing this - Musk's particular flavor of disruptive tech deployment could help?
Just... please, for the love of all things agile, let's keep him focused on the actual technology and far away from any more attempts to recreate his grandfather's dreams of a technocratic dystopia. We've got enough of those already.
-
@ 006532cb:fd8f28b4
2025-01-26 22:10:39Law of Conservation of Energy: The Law of Conservation of Energy states that energy cannot be created or destroyed, only converted from one form to another. This means that the total energy of an isolated system remains constant over time, but the form of energy can change (e.g., from kinetic energy to potential energy). This fundamental principle in physics highlights the importance of energy efficiency and the potential for energy to be transformed and reused.
Henry Ford's Energy Currency: Henry Ford, the founder of the Ford Motor Company, proposed the concept of an "energy currency" in the 1920s. He suggested that energy, rather than gold or other commodities, could serve as the basis for a new monetary system. Ford's idea was that energy is the fundamental unit of value, as it is the driving force behind all economic activity. He proposed that energy could be used as a standard unit of exchange, allowing for more efficient and equitable trade.
Buckminster Fuller's View on Energy Production and Wealth: Buckminster Fuller, a renowned architect, systems theorist, and futurist, believed that energy production is the key to creating wealth and abundance. He argued that energy is the fundamental driver of economic growth and that increasing energy production can lead to increased prosperity. Fuller's concept of "ephemeralization" suggests that as energy production becomes more efficient and widespread, the cost of goods and services decreases, leading to increased abundance and wealth. He also emphasized the importance of designing systems that maximize energy efficiency and minimize waste, allowing for more equitable distribution of resources and wealth.
-
@ c9f80c8d:947f3cfd
2025-01-26 20:29:18Hey sleep enthusiast, how has it been to go through the festive celebrations and deeper into winter? Have you been leaning into the season of long nights and getting cosy, making the most of staying indoors? Or has the season brought more of a sense of dread?
Especially with thoughts about insomnia creeping in even more during the winter months? You may decide that winter is a time to give up and slob out - or go goblin mode, as itâs been called. As a sleep coach, I'm here to offer some reassurance that itâs possible to find restful ways to rejuvenate - even in winter!
How the winter season brings a shift in energy
As winter descends across the northern hemisphere, it brings colder temperatures and more hours of darkness. So we have less access to sunlight and the natural source of vitamin D that it provides - all of which takes some adjusting to.
The changes in the natural environment impact the circadian rhythms in our bodies. These are the natural processes that run according to various cycles in nature and affect our sleep, digestion and other functions. It is the circadian rhythms in some bears that guide and enable them to be able to hibernate for 100 days at a time. Many people also suffer from seasonal affective disorder (SAD), which is a type of depression experienced during particular times of the year.
Winter - the most restful season of the year
Whilst we can't opt out of winter altogether and hibernate, the slower pace of the season invites us to embrace tranquillity and conserve energy. So let's explore how lifestyle adjustments and rest during the winter months can help with improved sleep quality, increased daytime energy and taking care of mental well-being.
Are humans meant to sleep more in winter?
The thought of longer hours in bed can be daunting if your bed is associated with frustrating night times spent grappling with insomnia. Which can also turn into a habit of sleeping on the couch (if thatâs you, check out this blog article).
Itâs not interrupted sleep, itâs âthe watchâ
Whilst you may have some resistance to spending longer hours in bed during winter if you suffer with insomnia, consider how only a few generations ago, our ancestors faced long nights without electricity. They had no choice but to adapt to the seasons, and so the medieval night-time experience of 'the watch' was what people did at night.
This consisted of a few waking hours between a âfirst sleepâ and âsecond sleepâ. The watch would take place when people woke in the night, generally around the time when roosters would start their morning call in the darkness (which was also guided by, you guessed it, their circadian rhythms!). This article from the BBC describes the watch times as:
âUnder the weak glow of the Moon, stars, and oil lamps or "rush lights" â a kind of candle for ordinary households, made from the waxed stems of rushes â people would tend to ordinary tasks, such as adding wood to the fire, taking remedies, or going to urinate (often into the fire itself).â
How two sleeps, or bi-phasic sleeping, is natural
Thereâs also modern-day research into how human sleep cycles naturally form by examining people who were left in a dark room without stimulation and influence from the external world. Initially, their sleep cycles followed the usual singular sleep pattern, but eventually, their circadian rhythms shifted to a first sleep and a second sleep with some hours in between.
So rather than waking in the night being something to panic about or get annoyed by, can you see it as an ancient ritual and natural human response to winter? You could take some quiet moments to look at the stars, journal, listen to a relaxing podcast or do another calm activity. If you get into a routine of sleeping fairly reliably before waking in the night, you could even use the time to explore the psychedelic realm of lucid dreaming.
Other tips for looking after your well-being and rest in winter months include:
Getting winter sunshine when you can
Even during winter, exposure to light is still important for your body to regulate your circadian rhythms and for getting the âsunshine vitaminâ, vitamin D. It is most beneficial to get exposure to natural daylight as close to when the sun comes up as is possible for you.
This could be braving the cold for a morning walk before work, or switching 10 minutes of phone scrolling for some moments outside with your coffee instead. For more about the physiological benefits of exposure to sunlight, see this guide from the Huberman Lab.
Embracing cosy social time in winter
When the big celebrations of the festive season have passed you may have a reduced budget and a more sparse calendar, but it doesnât mean you have to give up on socialising altogether. Instead, can you get creative about finding more restful ways to enjoy social connection?
The idea is to go for more relaxed, lower-energy ways to connect with others. That way you can enjoy the nourishment of social connection in a way that is restful for your system. Instead of big group meals or dancing late at night, this could look like wrapping up warm and going for a winter walk with friends, or chats over hot chocolate at home. Check out the blog article on restful socialising for more about this.
Food for winter
You may feel drawn to comfort foods during the colder months and whilst takeaways can be tempting, fast food and highly processed food can impact sleep quality. So the alternative is to make meals that can warm you up, have nutrient-rich ingredients and support your sleep. Yes, all of that is possible! When selecting recipes, start with core ingredients from foods that can help with sleep.
Winter as a time for reflection
I like to embrace the winter as a time to reflect on the year gone by and whatâs ahead. I take inspiration from nature and plant bulbs for my spring season ahead, when there will be more light and I will have more energy. Even though the new calendar year has started, the natural world in winter offers a perfect time for introspection.
When working with clients as a sleep coach, I often share the concept of the seasons of life. Because life has its cycles and changes, so we wonât be in our most productive states all of the time. So with Restful Sleep, I encourage respecting the slower tempos that come with different phases of life - bringing permission and acceptance to slowing down for some time. It can seem radical at first, yet often brings relief.
So will you join me in taking the winter as an opportunity to reflect on your well-being and how your lifestyle may nourish you? Itâs something I encourage everyone to do and sleep coaching is a great way to get support with the process. If you'd like to explore how to make the most of your restful winter, and all thatâs ahead, youâd be welcome to book a free discovery call with me.
Stay curious,
MaĹĄa.
-
@ dbb19ae0:c3f22d5a
2025-01-26 20:11:28Nostr (Notes and Other Stuff Transmitted by Relays) is a decentralized, open protocol designed for creating censorship-resistant social networks. It was introduced in 2020. Unlike traditional social media platforms, Nostr operates without a central server, relying instead on a network of relays to transmit messages.
Key Features of Nostr:
- Decentralization: Nostr doesn't rely on a single central server. Instead, it uses a network of independent relays to transmit data, making it resistant to censorship and single points of failure.
- Public and Private Keys: Users are identified by cryptographic key pairs. A public key serves as a user's identifier, while a private key is used to sign messages, ensuring authenticity and security.
- Simplicity: The protocol is intentionally simple, focusing on text-based messages (notes) and other basic data types. This simplicity makes it easy to implement and extend.
- Interoperability: Since Nostr is an open protocol, anyone can build clients or relays that interact with the network, fostering a diverse ecosystem of applications.
- Censorship Resistance: Because there is no central authority, it is difficult for any single entity to censor or control the network.
How Nostr Works:
- Users generate a public/private key pair.
- They publish messages (called "events" or "notes") to relays, which are then broadcast to other users.
- Relays are independent servers that store and forward messages. Users can choose which relays to use or even run their own.
- Clients (applications that interact with Nostr) fetch messages from relays and display them to users.
Use Cases:
- Social Networking: Nostr can be used to build decentralized social networks where users have full control over their data.
- Microblogging: Users can post short messages or updates.
- Messaging: Nostr can be used for direct messaging between users.
- Collaborative Tools: The protocol can be extended to support collaborative applications like shared documents or task management.
Popular Clients:
- Damus: A Nostr client for iOS, designed for microblogging and social interactions.
- Amethyst: A Nostr client for Android.
- Yakihonne: A web-based Nostr client and Android app.
- Primal: A web-based Nostr client and Android app.
Challenges:
- Scalability: As the network grows, managing the volume of messages and ensuring efficient relay performance can be challenging.
- Spam and Abuse: Without central moderation, spam and abusive content can be difficult to manage.
- User Experience: Decentralized systems can be more complex for average users to understand and use compared to centralized platforms.
Nostr represents a growing trend toward decentralized, user-controlled social networks, offering an alternative to traditional, centralized platforms. Its success will depend on adoption, ease of use, and the ability to address challenges like spam and scalability.
-
@ f57bac88:6045161e
2025-01-26 19:43:21بŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą: Ř˘Ř˛Ř§ŘŻŰ Ů ÚŠŮتع٠دع دستا٠ش٠ا بŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą با ت٠عڊز بع ŘŽŮدگعداŮŰ Ů Ů ŘŞŮâباز بŮŘŻŮŘ Ř¨Ů Ř´Ů Ř§ اŰ٠ا٠ڊا٠عا Ů ŰâŘŻŮŘŻ تا ÚŠŮتع٠ڊا٠ŮŰ Ř¨Řą ŮعآŰŮŘŻ ٞعدا؎تâŮŘ§Ű ŘŽŮŘŻ داشت٠باشŰŘŻ. Ř¨ŘąŘŽŰ Ř§Ř˛ ٠زاŰŘ§Ű ÚŠŮŰŘŻŰ Ř§ŰŮ ŮžŮŘŞŮع٠ؚباعتŮŘŻ از:
اŮؚءاŮâٞذŰŘąŰ Ř¨Ř§Ůا: ا٠ڊا٠سŮاعشŰâŘłŘ§Ř˛Ű Ů ŘŞŮسؚ٠ŮŰÚÚŻŰâŮŘ§Ű ŘŹŘŻŰŘŻ بع اساس ŮŰازŮŘ§Ű ŘŽŘ§Řľ ڊسبâŮڊاع.
ŮزŰŮŮ ÚŠŮ ŘŞŘą: Řذ٠ŮاسءŮâŮا ٠ڊاع٠زدŮŘ§Ű Ř§ŘśŘ§ŮŰŘ Ů ŮŘŹŘą ب٠ڊاŮŘ´ ŮزŰŮŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ Ů ŰâŘ´ŮŘŻ.
ŘŮظ ŘŘąŰŮ ŘŽŘľŮŘľŰ: ÚŠŮتع٠بŰŘ´ŘŞŘą بع دادŮâŮŘ§Ű Ů Ř´ŘŞŘąŰا٠٠ڊاŮŘ´ ŘąŰŘłÚŠ ŮŮŘś ŘŘąŰŮ ŘŽŘľŮŘľŰ.
ٞشتŰباŮŰ Ř§Ř˛ ٞعŮŘŞÚŠŮ ŮاŰŘŞŮŰŮÚŻ: ا٠ڊا٠اŮ؏ا٠تعاڊŮŘ´âŮŘ§Ű ŘłŘąŰŘš Ů ÚŠŮ âŮزŰŮ٠با استŮاد٠از شبڊ٠ŮاŰŘŞŮŰŮÚŻ. ساŰŘą دعگاŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ ع٠زŮگاعŰ: عاŘŘŞŰ ŘŻŘą بعابع ÚŠŮتع٠دع Ů ŮابŮŘ ŘłŘ§ŰŘą دعگاŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ ع٠زŮÚŻŘ§ŘąŰ Ů Ř§ŮŮŘŻ ÚŠŮŰŮبŰŘłŘ ÚŠŮŰŮ ŮžŰŮ ŮŘŞ Ů ŮŮŮžŰŮŘŞ بع عاŘŘŞŰ Ř§ŘłŘŞŮاد٠٠سعؚت عاŮâاŮŘŻŘ§Ř˛Ű ŘŞŮ ŘąÚŠŘ˛ داعŮŘŻ. اŰŮ ŮžŮŘŞŮع٠âŮا اغŮب ŘŻŘ§ŘąŘ§Ű ŘąŘ§Ř¨Řˇ ÚŠŘ§ŘąŘ¨ŘąŰ ŘłŘ§ŘŻŮâŘŞŘą Ů ŮابŮŰŘŞâŮŘ§Ű ŮžŰŘ´âسا؎ت٠بŰŘ´ŘŞŘąŰ ŮستŮŘŻ. با اŰŮ ŘاŮŘ ŘŻŘą Ř§Ř˛Ř§Ű Ř§Ű٠عاŘŘŞŰŘ Ů Ů ÚŠŮ Ř§ŘłŘŞ Ř¨ŘąŘŽŰ Ř§Ř˛ ÚŠŮŘŞŘąŮâŮا ٠اŮؚءاŮâٞذŰŘąŰ ŘąŘ§ از دست بدŮŰŘŻ. ŘŹŘŻŮŮ Ů ŮاŰŘłŮ:
ڊدا٠ŰÚŠ Ř¨ŘąŘ§Ű Ř´Ů Ř§ Ů ŮاسبâŘŞŘą Ř§ŘłŘŞŘ Ř§Ůت؎اب بŰ٠بŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą ٠ساŰŘą دعگاŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ ب٠ؚŮا٠٠٠؎تŮŮŰ Ř¨ŘłŘŞÚŻŰ ŘŻŘ§ŘąŘŻŘ Ř§Ř˛ ŘŹŮ ŮŮ:
ŘłŘˇŘ ŘŻŘ§ŮŘ´ ŮŮŰ: اگع داŮŘ´ ŮŮŰ ÚŠŘ§ŮŰ ŘŻŘ§ŘąŰŘŻ ٠ب٠دŮبا٠ڊŮتع٠ڊا٠٠بع ŮعآŰŮŘŻ ٞعدا؎ت ŮستŰŘŻŘ Ř¨ŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą گزŰŮŮ Ů ŮŘ§ŘłŘ¨Ű Ř§ŘłŘŞ.
ŘłŘ§ŘŻÚŻŰ Ř§ŘłŘŞŮادŮ: اگع ب٠دŮبا٠عاŮÚŠŘ§ŘąŰ ŘłŘąŰŘš Ů Ř˘ŘłŘ§Ů Ř¨ŘąŘ§Ű Ř´ŘąŮŘš ٞذŰعش ٞعدا؎تâŮŘ§Ű ŘąŮ Ř˛ŮÚŻŘ§ŘąŰ ŮستŰŘŻŘ ŘłŘ§ŰŘą دعگاŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ ٠٠ڊ٠است اŮت؎اب بŮŘŞŘąŰ Ř¨Ř§Ř´ŮŘŻ.
ŮزŰŮŮâŮا: ŮزŰŮŮâŮŘ§Ű ŮŘą ŮžŮŘŞŮع٠٠تŮاŮŘŞ است ٠باŰŘŻ ب٠دŮŘŞ Ů ŮاŰس٠شŮŮŘŻ.
ŮŰÚÚŻŰâŮŘ§Ű Ů Ůعد ŮŰاز: ŮŰŘłŘŞŰ Ř§Ř˛ ŮŰÚÚŻŰâŮŘ§Ű Ů Ůعد ŮŰاز ŘŽŮŘŻ عا ŘŞŮŰŮ ÚŠŮŰŘŻ ٠ببŰŮŰŘŻ ڊدا٠ٞŮŘŞŮع٠بŰŘ´ŘŞŘąŰ٠تءاب٠عا با آ٠داعد. ŘŻŘą ŮŮاŰŘŞŘ Ř¨ŮŘŞŘąŰŮ ŘŻŘąÚŻŘ§Ů ŮžŘąŘŻŘ§ŘŽŘŞŘ ŘŻŘąÚŻŘ§ŮŰ Ř§ŘłŘŞ ÚŠŮ ŮŰازŮŘ§Ű ŘŽŘ§Řľ ڊسبâŮڊاعتا٠عا بعآŮعد٠ڊŮŘŻ. Ůڊات Ů ŮŮ ŮŮگا٠اŮت؎اب:
ا٠ŮŰŘŞ: اء٠ŰŮا٠Řاؾ٠ڊŮŰŘŻ ÚŠŮ ŮžŮŘŞŮع٠اŮŘŞŘŽŘ§Ř¨Ű Ř´Ů Ř§ ŘŻŘ§ŘąŘ§Ű Ř§ŘłŘŞŘ§ŮداعدŮŘ§Ű Ř§Ů ŮŰŘŞŰ Ř¨Ř§ŮاŰŰ Ř§ŘłŘŞ.
ٞشتŰباŮŰ Ů Ř´ŘŞŘąŰ: ŮŘŹŮŘŻ ٞشتŰباŮŰ Ů Ř´ŘŞŘąŰ ŮŮŰ Ř¨ŘąŘ§Ű ŘąŮŘš Ů Ř´ÚŠŮات اŘت٠اŮŰ Ř¨ŘłŰاع Ů Ů٠است.
ڊاع٠زدŮا: ب٠ءŮŘą ŘŻŮŰ٠ڊاع٠زدŮŘ§Ű ŮŘą ŮžŮŘŞŮع٠عا Ř¨ŘąŘąŘłŰ ÚŠŮŰŘŻ تا بتŮاŮŰŘŻ ŮزŰŮŮâŮŘ§Ű ŘŽŮŘŻ عا بŮŰŮŮ ÚŠŮŰŘŻ.
ŮابŮŰŘŞâŮŘ§Ű Ř§ŘśŘ§ŮŰ: Ř¨ŘąŘŽŰ Ř§Ř˛ ŮžŮŘŞŮع٠âŮا ŘŻŘ§ŘąŘ§Ű ŮابŮŰŘŞâŮŘ§Ű Ř§ŘśŘ§ŮŰ Ů Ř§ŮŮŘŻ ŮاڊتŮŘąŘłŘ§Ř˛Ű ŘŽŮŘŻÚŠŘ§ŘąŘ ÚŻŘ˛Ř§ŘąŘ´âÚŻŰŘąŰ Ů Ř§ŘŻŘşŘ§Ů Ř¨Ř§ ساŰŘą ŘłŰست٠âŮا ŮستŮŘŻ.
ŮŘŞŰŘŹŮâÚŻŰŘąŰ: بŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą Ř¨ŘąŘ§Ű ÚŠŘłŘ¨âŮڊاعŮاŰŰ ÚŠŮ Ř¨Ů ŘŻŮبا٠Řداڊ؍ع ÚŠŮŘŞŘąŮŘ Ř§ŮؚءاŮâٞذŰŘąŰ Ů ÚŠŘ§ŮŘ´ ŮزŰŮŮâŮا ŮستŮŘŻŘ ÚŻŘ˛ŰŮ٠بسŰاع Ů ŮŘ§ŘłŘ¨Ű Ř§ŘłŘŞ. ا٠ا اگع ب٠دŮبا٠عاŮÚŠŘ§ŘąŰ ŘłŘ§ŘŻŮâŘŞŘą ٠سعŰŘšâŘŞŘą ŮستŰŘŻŘ ŘłŘ§ŰŘą دعگاŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ ŮŰز Ů ŰâŘŞŮاŮŮŘŻ اŮت؎ابâŮŘ§Ű ŘŽŮŘ¨Ű Ř¨Ř§Ř´ŮŘŻ. با ŘŻŘą Ůظع ÚŻŘąŮŘŞŮ ŘšŮا٠٠ذڊع Ř´ŘŻŮ ŘŻŘą اŰŮ Ů ŮاŮŮŘ Ů ŰâŘŞŮاŮŰŘŻ بŮŘŞŘąŰ٠تؾ٠Ű٠عا Ř¨ŘąŘ§Ű ÚŠŘłŘ¨âŮڊاعتا٠ات؎اذ ÚŠŮŰŘŻ.
آŰا Ů ŰâŘŽŮاŮŰŘŻ ŘŻŘą Ů Ůعد ŮŰÚÚŻŰâŮŘ§Ű ŘŽŘ§ŘľŰ Ř§Ř˛ بŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą Űا ساŰŘą دعگاŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ اءŮاؚات بŰŘ´ŘŞŘąŰ ÚŠŘłŘ¨ ÚŠŮŰŘŻŘ ÚŻŮÚŻŮ ÚŠŮŰŘŻ! đ
ŮءŮا ŘŞŮ؏٠داشت٠باشŰŘŻ ڊ٠اŰŮ Ů ŮاŮ٠ؾعŮا٠ب٠٠ŮظŮŘą اءŮاؚâعساŮŰ Ř§ŘłŘŞ Ů ŮباŰŘŻ ب٠ؚŮŮا٠تŮŘľŰ٠سع٠اŰŮâÚŻŘ°Ř§ŘąŰ ŘŞŮŮŰ Ř´ŮŘŻ.
ŘŻŘą ŘŻŮŰŘ§Ű ŮžŘąŮŰاŮŮŰ Ř§ŘąŘ˛ŮŘ§Ű ŘŻŰŘŹŰتاŮŘ Ř§Ůت؎اب ŰÚŠ دعگا٠ٞعدا؎ت Ů Ůاسب Ř¨ŘąŘ§Ű ŮžŘ°Űعش ٞعدا؎تâŮŘ§Ű ŘąŮ Ř˛ŮگاعŰŘ ŘŞŘľŮ ŰŮ Ů ŮŮ Ű Ř¨ŘąŘ§Ű ÚŠŘłŘ¨âŮڊاعŮاست.
بŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą ب٠ؚŮŮا٠ŰÚŠ گزŰŮŮ Ů ŘŞŮâباز Ů ŘŽŮدگعداŮŘ ŘŹŘ§Űگا٠ŮŰÚŮâŘ§Ű ŘŻŘą Ů Űا٠اŰ٠دعگاŮâŮا داعد. ا٠ا آŰا بŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą بŮŘŞŘąŰ٠گزŰŮŮ Ř¨ŘąŘ§Ű ÚŠŘłŘ¨âŮÚŠŘ§ŘąŘŞŘ§Ů Ř§ŘłŘŞŘ ŘŻŘą اŰŮ Ů ŮاŮŮŘ Ř¨Ů Ů ŮاŰس٠بŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą با ساŰŘą دعگاŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ ع٠زŮÚŻŘ§ŘąŰ Ů ŰâٞعدازŰ٠تا ب٠ش٠ا ŘŻŘą اŮت؎اب آگاŮاŮŮ ÚŠŮ ÚŠ ÚŠŮŰŮ .
بŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą: Ř˘Ř˛Ř§ŘŻŰ Ů ÚŠŮتع٠دع دستا٠ش٠ا
بŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą با ت٠عڊز بع ŘŽŮدگعداŮŰ Ů Ů ŘŞŮâباز بŮŘŻŮŘ Ř¨Ů Ř´Ů Ř§ اŰ٠ا٠ڊا٠عا Ů ŰâŘŻŮŘŻ تا ÚŠŮتع٠ڊا٠ŮŰ Ř¨Řą ŮعآŰŮŘŻ ٞعدا؎تâŮŘ§Ű ŘŽŮŘŻ داشت٠باشŰŘŻ. Ř¨ŘąŘŽŰ Ř§Ř˛ ٠زاŰŘ§Ű ÚŠŮŰŘŻŰ Ř§ŰŮ ŮžŮŘŞŮع٠ؚباعتŮŘŻ از:
* اŮؚءاŮâٞذŰŘąŰ Ř¨Ř§Ůا: ا٠ڊا٠سŮاعشŰâŘłŘ§Ř˛Ű Ů ŘŞŮسؚ٠ŮŰÚÚŻŰâŮŘ§Ű ŘŹŘŻŰŘŻ بع اساس ŮŰازŮŘ§Ű ŘŽŘ§Řľ ڊسبâŮڊاع.
* ŮزŰŮŮ ÚŠŮ ŘŞŘą: Řذ٠ŮاسءŮâŮا ٠ڊاع٠زدŮŘ§Ű Ř§ŘśŘ§ŮŰŘ Ů ŮŘŹŘą ب٠ڊاŮŘ´ ŮزŰŮŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ Ů ŰâŘ´ŮŘŻ.
* ŘŮظ ŘŘąŰŮ ŘŽŘľŮŘľŰ: ÚŠŮتع٠بŰŘ´ŘŞŘą بع دادŮâŮŘ§Ű Ů Ř´ŘŞŘąŰا٠٠ڊاŮŘ´ ŘąŰŘłÚŠ ŮŮŘś ŘŘąŰŮ ŘŽŘľŮŘľŰ.
* ٞشتŰباŮŰ Ř§Ř˛ ٞعŮŘŞÚŠŮ ŮاŰŘŞŮŰŮÚŻ: ا٠ڊا٠اŮ؏ا٠تعاڊŮŘ´âŮŘ§Ű ŘłŘąŰŘš Ů ÚŠŮ âŮزŰŮ٠با استŮاد٠از شبڊ٠ŮاŰŘŞŮŰŮÚŻ.
ساŰŘą دعگاŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ ع٠زŮگاعŰ: عاŘŘŞŰ ŘŻŘą بعابع ÚŠŮŘŞŘąŮ
ŘŻŘą Ů ŮابŮŘ ŘłŘ§ŰŘą دعگاŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ ع٠زŮÚŻŘ§ŘąŰ Ů Ř§ŮŮŘŻ ÚŠŮŰŮبŰŘłŘ ÚŠŮŰŮ ŮžŰŮ ŘŞ Ů ŮŮŮžŰŮ ŮŘŞ بع عاŘŘŞŰ Ř§ŘłŘŞŮاد٠٠سعؚت عاŮâاŮŘŻŘ§Ř˛Ű ŘŞŮ ŘąÚŠŘ˛ داعŮŘŻ. اŰŮ ŮžŮŘŞŮع٠âŮا اغŮب ŘŻŘ§ŘąŘ§Ű ŘąŘ§Ř¨Řˇ ÚŠŘ§ŘąŘ¨ŘąŰ ŘłŘ§ŘŻŮâŘŞŘą Ů ŮابŮŰŘŞâŮŘ§Ű ŮžŰŘ´âسا؎ت٠بŰŘ´ŘŞŘąŰ ŮستŮŘŻ. با اŰŮ ŘاŮŘ ŘŻŘą Ř§Ř˛Ř§Ű Ř§Ű٠عاŘŘŞŰŘ Ů Ů ÚŠŮ Ř§ŘłŘŞ Ř¨ŘąŘŽŰ Ř§Ř˛ ÚŠŮŘŞŘąŮâŮا ٠اŮؚءاŮâٞذŰŘąŰ ŘąŘ§ از دست بدŮŰŘŻ.
ŘŹŘŻŮŮ Ů ŮاŰŘłŮ:
ڊدا٠ŰÚŠ Ř¨ŘąŘ§Ű Ř´Ů Ř§ Ů ŮاسبâŘŞŘą استŘ
اŮت؎اب بŰ٠بŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą ٠ساŰŘą دعگاŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ ب٠ؚŮا٠٠٠؎تŮŮŰ Ř¨ŘłŘŞÚŻŰ ŘŻŘ§ŘąŘŻŘ Ř§Ř˛ ŘŹŮ ŮŮ:
* ŘłŘˇŘ ŘŻŘ§ŮŘ´ ŮŮŰ: اگع داŮŘ´ ŮŮŰ ÚŠŘ§ŮŰ ŘŻŘ§ŘąŰŘŻ ٠ب٠دŮبا٠ڊŮتع٠ڊا٠٠بع ŮعآŰŮŘŻ ٞعدا؎ت ŮستŰŘŻŘ Ř¨ŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą گزŰŮŮ Ů ŮŘ§ŘłŘ¨Ű Ř§ŘłŘŞ.
* ŘłŘ§ŘŻÚŻŰ Ř§ŘłŘŞŮادŮ: اگع ب٠دŮبا٠عاŮÚŠŘ§ŘąŰ ŘłŘąŰŘš Ů Ř˘ŘłŘ§Ů Ř¨ŘąŘ§Ű Ř´ŘąŮŘš ٞذŰعش ٞعدا؎تâŮŘ§Ű ŘąŮ Ř˛ŮÚŻŘ§ŘąŰ ŮستŰŘŻŘ ŘłŘ§ŰŘą دعگاŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ ٠٠ڊ٠است اŮت؎اب بŮŘŞŘąŰ Ř¨Ř§Ř´ŮŘŻ.
* ŮزŰŮŮâŮا: ŮزŰŮŮâŮŘ§Ű ŮŘą ŮžŮŘŞŮع٠٠تŮاŮŘŞ است ٠باŰŘŻ ب٠دŮŘŞ Ů ŮاŰس٠شŮŮŘŻ.
* ŮŰÚÚŻŰâŮŘ§Ű Ů Ůعد ŮŰاز: ŮŰŘłŘŞŰ Ř§Ř˛ ŮŰÚÚŻŰâŮŘ§Ű Ů Ůعد ŮŰاز ŘŽŮŘŻ عا ŘŞŮŰŮ ÚŠŮŰŘŻ ٠ببŰŮŰŘŻ ڊدا٠ٞŮŘŞŮع٠بŰŘ´ŘŞŘąŰ٠تءاب٠عا با آ٠داعد.
ŘŻŘą ŮŮاŰŘŞŘ Ř¨ŮŘŞŘąŰŮ ŘŻŘąÚŻŘ§Ů ŮžŘąŘŻŘ§ŘŽŘŞŘ ŘŻŘąÚŻŘ§ŮŰ Ř§ŘłŘŞ ÚŠŮ ŮŰازŮŘ§Ű ŘŽŘ§Řľ ڊسبâŮڊاعتا٠عا بعآŮعد٠ڊŮŘŻ.
Ůڊات Ů ŮŮ ŮŮگا٠اŮت؎اب:
* ا٠ŮŰŘŞ: اء٠ŰŮا٠Řاؾ٠ڊŮŰŘŻ ÚŠŮ ŮžŮŘŞŮع٠اŮŘŞŘŽŘ§Ř¨Ű Ř´Ů Ř§ ŘŻŘ§ŘąŘ§Ű Ř§ŘłŘŞŘ§ŮداعدŮŘ§Ű Ř§Ů ŮŰŘŞŰ Ř¨Ř§ŮاŰŰ Ř§ŘłŘŞ.
* ٞشتŰباŮŰ Ů Ř´ŘŞŘąŰ: ŮŘŹŮŘŻ ٞشتŰباŮŰ Ů Ř´ŘŞŘąŰ ŮŮŰ Ř¨ŘąŘ§Ű ŘąŮŘš Ů Ř´ÚŠŮات اŘت٠اŮŰ Ř¨ŘłŰاع Ů Ů٠است.
* ڊاع٠زدŮا: ب٠ءŮŘą ŘŻŮŰ٠ڊاع٠زدŮŘ§Ű ŮŘą ŮžŮŘŞŮع٠عا Ř¨ŘąŘąŘłŰ ÚŠŮŰŘŻ تا بتŮاŮŰŘŻ ŮزŰŮŮâŮŘ§Ű ŘŽŮŘŻ عا بŮŰŮŮ ÚŠŮŰŘŻ.
* ŮابŮŰŘŞâŮŘ§Ű Ř§ŘśŘ§ŮŰ: Ř¨ŘąŘŽŰ Ř§Ř˛ ŮžŮŘŞŮع٠âŮا ŘŻŘ§ŘąŘ§Ű ŮابŮŰŘŞâŮŘ§Ű Ř§ŘśŘ§ŮŰ Ů Ř§ŮŮŘŻ ŮاڊتŮŘąŘłŘ§Ř˛Ű ŘŽŮŘŻÚŠŘ§ŘąŘ ÚŻŘ˛Ř§ŘąŘ´âÚŻŰŘąŰ Ů Ř§ŘŻŘşŘ§Ů Ř¨Ř§ ساŰŘą ŘłŰست٠âŮا ŮستŮŘŻ.
ŮŘŞŰŘŹŮâÚŻŰŘąŰ:
بŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą Ř¨ŘąŘ§Ű ÚŠŘłŘ¨âŮڊاعŮاŰŰ ÚŠŮ Ř¨Ů ŘŻŮبا٠Řداڊ؍ع ÚŠŮŘŞŘąŮŘ Ř§ŮؚءاŮâٞذŰŘąŰ Ů ÚŠŘ§ŮŘ´ ŮزŰŮŮâŮا ŮستŮŘŻŘ ÚŻŘ˛ŰŮ٠بسŰاع Ů ŮŘ§ŘłŘ¨Ű Ř§ŘłŘŞ. ا٠ا اگع ب٠دŮبا٠عاŮÚŠŘ§ŘąŰ ŘłŘ§ŘŻŮâŘŞŘą ٠سعŰŘšâŘŞŘą ŮستŰŘŻŘ ŘłŘ§ŰŘą دعگاŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ ŮŰز Ů ŰâŘŞŮاŮŮŘŻ اŮت؎ابâŮŘ§Ű ŘŽŮŘ¨Ű Ř¨Ř§Ř´ŮŘŻ. با ŘŻŘą Ůظع ÚŻŘąŮŘŞŮ ŘšŮا٠٠ذڊع Ř´ŘŻŮ ŘŻŘą اŰŮ Ů ŮاŮŮŘ Ů ŰâŘŞŮاŮŰŘŻ بŮŘŞŘąŰ٠تؾ٠Ű٠عا Ř¨ŘąŘ§Ű ÚŠŘłŘ¨âŮڊاعتا٠ات؎اذ ÚŠŮŰŘŻ.
آŰا Ů ŰâŘŽŮاŮŰŘŻ ŘŻŘą Ů Ůعد ŮŰÚÚŻŰâŮŘ§Ű ŘŽŘ§ŘľŰ Ř§Ř˛ بŰâŘŞŰâŘłŰ ŮžŰ ŘłŘąŮŘą Űا ساŰŘą دعگاŮâŮŘ§Ű ŮžŘąŘŻŘ§ŘŽŘŞ اءŮاؚات بŰŘ´ŘŞŘąŰ ÚŠŘłŘ¨ ÚŠŮŰŘŻŘ ÚŻŮÚŻŮ ÚŠŮŰŘŻ! đ
ŮءŮا ŘŞŮ؏٠داشت٠باشŰŘŻ ڊ٠اŰŮ Ů ŮاŮ٠ؾعŮا٠ب٠٠ŮظŮŘą اءŮاؚâعساŮŰ Ř§ŘłŘŞ Ů ŮباŰŘŻ ب٠ؚŮŮا٠تŮŘľŰ٠سع٠اŰŮâÚŻŘ°Ř§ŘąŰ ŘŞŮŮŰ Ř´ŮŘŻ.
-
@ f7d424b5:618c51e8
2025-01-26 19:03:22(These podcast shownotes were originally posted on our website melonmancy.net
A second video game award show has hit the south tower. Also if you have topic ideas feel free to sign up on our forum we decided to not restrict any posts on the idea threads.
We mentioned a few things in the show you might want to pull up while listening, they are the following:
- Literally WHO studio grandstanding over lewd PC mods
- Aggro Crab leaves X - cringe or no?
- Selacodev immediately bullied after their trailer was shown at TRGAs for free w/o permission
Obligatory:
- Listen to the new episode here!
- Discuss this episode on OUR NEW FORUM
- Get the RSS and Subscribe (this is a new feed URL, but the old one redirects here too!)
- Get a modern podcast app to use that RSS feed on at newpodcastapps.com
- Or listen to the show on the forum using the embedded Podverse player!
- Send your complaints here
Reminder that this is a Value4Value podcast so any support you can give us via a modern podcasting app is greatly appreciated and we will never bow to corporate sponsors!
Our podcast is created entirely with free software and is proudly hosted on RSSBlue!
-
@ 378562cd:a6fc6773
2025-01-26 18:51:00Here is the best list I could compile.... I hope I didn't miss anything but please let me know if I did in the comments.
- Withdrawal from the Paris Climate Agreement\ Directed the U.S. to exit the Paris Climate Agreement, citing economic priorities over global climate commitments.
- Withdrawal from the World Health Organization\ Initiated the process to withdraw the U.S. from the WHO, criticizing its handling of global health crises.
- Declaration of National Emergency at the Southern Border\ Declared an emergency to allocate military resources for border security and wall construction.
- Attempt to End Birthright Citizenship\ Proposed ending birthright citizenship for children of non-citizens in the U.S.; pending legal challenges.
- Mass Pardon of January 6th Defendants\ Pardoned approximately 1,500 individuals charged in the Capitol riot, sparking significant debate.
- Reinstatement of the Mexico City Policy\ Prohibited U.S. foreign aid from funding organizations that provide or promote abortions.
- Energy Policy Shift Favoring Fossil Fuels\ Ordered an expansion of fossil fuel production on federal lands and offshore, reversing previous restrictions.
- Rescission of Diversity, Equity, and Inclusion Programs\ Ended DEI initiatives within federal agencies, focusing on merit-based policies.
- Establishment of the Department of Government Efficiency\ Created a department tasked with reducing bureaucratic waste and improving federal operations.
- Designation of Mexican Drug Cartels as Terrorist Organizations\ Labeled certain cartels as foreign terrorist organizations to enhance enforcement measures.
- Mandate for Federal Employees to Return to Offices\ Ended remote work policies for federal employees, requiring a full return to physical offices.
- Artificial Intelligence Investment Initiative\ Repealed previous AI orders and allocated $500 billion to advance AI development in the U.S.
- Pardon of Ross Ulbricht\ Granted a full pardon to Ross Ulbricht, founder of the Silk Road online marketplace.
- Reversal of Electric Vehicle Targets and Renewable Energy Permits\ Halted permits for renewable energy projects and reversed EV adoption targets.
- Declaration of National Energy Emergency\ Declared an emergency to boost domestic energy production and enhance energy independence.
- Declassification of Assassination Files\ Ordered the release of government records related to the assassinations of JFK, RFK, and MLK Jr.
- Pardons for Anti-Abortion Protesters\ Pardoned individuals convicted of offenses related to anti-abortion protests, including clinic blockades.
- Strengthening American Leadership in Digital Financial Technology\ Promoted U.S. leadership in blockchain and digital assets while fostering innovation and regulatory clarity.
- National Hiring Freeze and IRS Agent Reassignment\ Froze federal hiring and proposed reassigning 90,000 IRS agents to border security roles.
- Trade Reform and Tariff Implementation\ Imposed tariffs on imports from Mexico, Canada, and China, aiming to boost U.S. manufacturing and tax revenue.
- Investigation into Weaponization of the Justice System\ Initiated a probe into federal, state, and local agencies to assess potential misuse of the justice system.
- Suspension of CBP One Program\ Terminated the system allowing asylum seekers to schedule appointments at legal ports of entry.
- Demand for Increased NATO Defense Spending\ Called on NATO allies to increase defense spending to 5% of GDP for equitable burden-sharing.
- Trade Tariff Threats Against Mexico and Canada\ Announced intentions to impose a 25% tariff on imports from Mexico and Canada to protect U.S. industries.
- Suspension of Foreign Aid, Including to Ukraine\ Halted all foreign aid programs, notably affecting assistance to Ukraine.
- Launch of Mass Deportations Using Military Aircraft\ Initiated large-scale deportations of undocumented immigrants utilizing military resources.
- Executive Order Recognizing Only Two Genders\ Stated that the federal government will recognize only two genders, male and female, eliminating DEI mandates.
- Ending Illegal Discrimination and Restoring Merit-Based Opportunity\ Prohibited private organizations from conducting Diversity, Equity, Inclusion, and Accessibility (DEIA) employment programs for jobs created by federal contracts.
- Designation of Ansar Allah as a Foreign Terrorist Organization\ Initiated the process of designating Yemen's Ansar Allah (the Houthis) as a Foreign Terrorist Organization.
- Rescission of Executive Order 11246\ Revoked the 1965 order that prohibited federal contractors from employment discrimination based on race, color, religion, sex, sexual orientation, gender identity, or national origin, and mandated affirmative action programs.
-
@ 0b118e40:4edc09cb
2025-01-26 16:39:37Does Bitcoin incentivize innovations in renewable and clean energy sectors? Absolutely.
While the debate about Bitcoinâs energy consumption continues, its role in driving innovation often goes unnoticed.
Over 50% of the energy consumed by Bitcoin miners now comes from renewable sources, and the industry is pushing the boundaries of repurposing waste energy and tapping into underutilized resources.
This sets a clear contradiction from industries like chemicals, primary metals, and textiles, which dominate global energy consumption with coal and natural gas. Despite global initiatives like the ESG (Environmental, Social, and Governance) framework, which mandates sustainability investments, fossil fuels still account for over 80% of global energy use in 2023. Big corporations can easily "greenwash" their efforts by purchasing carbon credits and slapping on green labels, yet their day-to-day operations remain largely unchanged.
Bitcoin miners, however, are not coerced into adopting clean energy; they are incentivized by the need to minimize costs. Their profitability depends on finding the most affordable energy sources, and this has led to innovations in utilizing surplus and waste energy.
What began with small-scale experiments has now captured the attention of global corporations like Deutsche Telekom and Tokyo Electric Power Company (TEPCO), which are leveraging surplus energy for Bitcoin mining.
Are these developments signaling that Bitcoin mining is becoming integral to mainstream energy systems? The answer increasingly appears to be yes.
I first came across the idea that Bitcoin could incentivize renewable energy through a tweet from Jack a few years ago, and out of curiosity, I explored some of the ways Bitcoin is advancing renewable and clean energy. Iâll share a few examples below. Please note that this is by no means an exhaustive list, but it provides a glimpse into Bitcoinâs role in driving renewable and clean energy innovation.
There are 2 categories of energy sources I looked into :
Renewables: Hydropower, geothermal, ocean wave energy, wind power, and solar energy. Clean Non-Renewables: Waste coal, flare gas, and nuclear energy.
Renewables
1. Hydropower
Hydropower is one of the oldest renewable energy sources, but many countries struggle with maintaining an aging infrastructure, leading to abandoned dams. However, countries like Paraguay and Laos have successfully utilized hydropower to meet 90% or more of their energy needs, often yielding a surplus. In Paraguay, Marathon Digital Holdings partnered with the Penguin Group to establish a hydro-powered Bitcoin mining facility near the ItaipĂş Dam. Globally, companies like GRIID Infrastructure and Sazmining have integrated hydropower into their operations, with hydropower now accounting for about 23% of Bitcoin miningâs energy use.
2. Geothermal Energy
In El Salvador, Bitcoin mining powered by volcanic heat has attracted investments, with proceeds funding schools and hospitals. In the last 3 years, nearly 474 Bitcoin worth $29 million using volcano-fueled geothermal power was mined. In Africa, Gridless leverages geothermal, hydro, and solar power for decentralized mining in Kenya, Malawi, and Zambia.
3. Ocean Energy
Ocean thermal energy conversion (OTEC), a 150-year-old concept, is emerging as a viable solution, particularly in regions like Hawaii (Oahu) where traditional renewables face challenges. Not only is the cost of energy the highest in the US, the people of Hawaii face a wastage of energy surplus which can be turned into profit through Bitcoin mining.
When I first read about the potential of ocean energy used for Bitcoin Mining, it was through Lord Fusituâa, a member of the Parliament of the Kingdom of Tonga in 2021. Unfortunately, he passed away and I was not able to find many updates on it after that. Ocean energy was also tested by Tara Ocean as a combination project between Paris and Los Angeles and it showed promising results.
4. Wind Power
Texas leads in wind energy, accounting for 25% of its grid. Bitcoin miners have flocked to the state, leveraging tax incentives and abundant wind power to fuel operations, tripling Bitcoin mining hashrate since 2021. DARI (Digital Assets Research Institute) revealed Bitcoin mining saved Texas up to $18 billion by reducing the need for new gas peaker plants. Companies like German Telekom also use excess wind and solar energy for mining, addressing intermittency challenges.
5. Solar Energy
Block Inc. and Blockstreamâs solar-powered Bitcoin mining facility highlight the untapped potential of solar in sun-rich regions like Africa. Companies like TeraWulf and Aspen Creek are also pioneering solar-powered mining operations. In late 2022, Meco unveiled the worldâs first solar-electric crypto-mining rigs. Additionally, investments are flowing into companies focusing on renewable-powered Bitcoin mining, with Aspen Creek securing $8 million in 2022 to expand its solar-powered operations.
Clean Non-Renewables
1. Flare Gas
Crusoe Energy Systems captures methane from oil drilling to power Bitcoin mining, making it carbon-negative and eliminating 99.89% of greenhouse gas emissions. This method is a key example of using waste gas that would otherwise be flared into the atmosphere.
2. Nuclear Energy
TeraWulfâs Nautilus Cryptomine facility in Pennsylvania represents the first nuclear-powered Bitcoin mining operation in the U.S., with nearly 8,000 mining rigs online. Nuclear energy is stable, scalable and clean as its low-carbon energy source, making it an attractive option for Bitcoin mining. I recall the mayor of Miami, Francis Suarez also recognized the potential of nuclear energy to attract Bitcoin mining operations to the city but I donât have any recent updates on this.
3. Waste Coal
Stronghold Digital Mining repurposes waste coal from old mining sites to generate energy for Bitcoin mining operations. While this method helps reduce the environmental impact of waste coal, it has faced criticism for emissions produced by burning additional materials like tires.
The Potentials of Bitcoin mining in underdeveloped regions
In regions where traditional energy infrastructure is scarce, Bitcoin mining is a significant opportunity to stimulate the development of renewable energy sources and improve living conditions.
In many African countries, solar and hydroelectric resources remain largely untapped or abandoned, with nations like Congo, South Sudan, and Malawi having less than 10% access to electricity. Bitcoin miningâs energy demand acts as a powerful economic incentive, attracting investments to build infrastructure that enhances access to electricity, clean water, and other basic amenities.
Alex Gladstein beautifully captures this idea in his article "The Humanitarian and Environmental Case for Bitcoin" where he discusses how Bitcoin mining can be a force for good, encouraging investment in renewable energy and providing sustainable economic growth for regions long underserved by traditional infrastructure.
On a last note
Bitcoin mining is proving to be a catalyst for renewable energy innovation. Despite decades of Keynesian counter-cyclical policies targeted at boosting infrastructure spending, ranging from IMF infrastructure loans in the 1970s to frameworks like the Sustainable Development Goals (SDGs), Millennium Development Plans, and now ESG, the Global South remains impoverished, with many regions still lacking basic amenities. Non-renewable energy usage remain high. Traditional approaches have not solved the problem.
Bitcoin, however, just works.
Its financial system empowers individuals worldwide, breaking free from centralized control, while its mining operations leverage surplus and clean energy sources to drive renewable innovation. With growing global adoption, Bitcoin is no longer an isolated financial system. It is becoming an integral part of daily life and a force for global energy transformation.
As the mining focus shifts toward individual contribution with open-source integrated chips and decentralized mining solutions, we are likely to witness a new wave of renewable energy innovations on a smaller, more accessible scale that anyone can adopt.
The current energy debate surrounding Bitcoin often overlooks its potential. Beyond the criticisms, Bitcoin mining is creating tangible opportunities to innovate in renewable energy, particularly in underdeveloped areas. As the industry grows, itâs becoming abundantly clear that Bitcoin is a key part of the solution to our financial and energy challenges.
-
@ 9e69e420:d12360c2
2025-01-26 15:26:44Secretary of State Marco Rubio issued new guidance halting spending on most foreign aid grants for 90 days, including military assistance to Ukraine. This immediate order shocked State Department officials and mandates âstop-work ordersâ on nearly all existing foreign assistance awards.
While it allows exceptions for military financing to Egypt and Israel, as well as emergency food assistance, it restricts aid to key allies like Ukraine, Jordan, and Taiwan. The guidance raises potential liability risks for the government due to unfulfilled contracts.
A report will be prepared within 85 days to recommend which programs to continue or discontinue.
-
@ 378562cd:a6fc6773
2025-01-26 14:50:23Top 20 U.S.-Based Cryptocurrency Headlines:
-
Pete Hegseth Confirmed as Secretary of Defense Amid Crypto Talks\ The newly confirmed Secretary of Defense, Pete Hegseth, has hinted at exploring blockchain applications for national security and defense logistics.
-
Senate to Debate Cryptocurrency Taxation Reform\ A bipartisan bill focusing on cryptocurrency taxation is set for Senate debate, aiming to simplify tax reporting and encourage blockchain innovation.
-
Florida Launches State-Backed Blockchain Pilot Program\ Florida has initiated a pilot program leveraging blockchain for state services, including property records and public benefits distribution.
-
Silicon Valley Firms Ramp Up Blockchain Development\ Tech giants in Silicon Valley, including Meta and Google, have announced increased investments in blockchain R&D to align with U.S. policy shifts.
-
California Mulls Digital Asset Consumer Protection Bill\ California lawmakers are reviewing a proposed bill designed to strengthen consumer protections in cryptocurrency transactions and prevent fraud.
-
Wyoming Leads in Blockchain Legislation\ Wyoming continues to set the standard for pro-blockchain legislation, introducing additional laws to attract cryptocurrency businesses and miners.
-
Texas Becomes a Hub for Crypto Mining\ Texas remains a hotbed for cryptocurrency mining operations, with favorable regulations and abundant energy resources attracting global miners.
-
New York Revisits BitLicense Regulations\ The New York Department of Financial Services is revising its stringent BitLicense requirements, seeking to balance industry growth and consumer protection.
-
SEC Proposes Clearer Guidelines for ICOs\ The Securities and Exchange Commission has proposed new rules to clarify and reduce ambiguity surrounding initial coin offerings (ICOs).
-
Banking Giants Reenter Crypto Markets\ JPMorgan and Goldman Sachs are reportedly resuming their cryptocurrency trading desks, reflecting renewed institutional confidence in the market.
-
Crypto Job Market Expands in the U.S.\ Major crypto companies, including Coinbase and Kraken, are expanding hiring efforts, focusing on compliance, engineering, and product development roles.
-
U.S. Treasury Collaborates with Private Sector on Blockchain Security\ The U.S. Treasury has launched a joint initiative with private companies to enhance blockchain cybersecurity and combat crypto-related crimes.
-
Nevada Considers Tax Incentives for Crypto Startups\ Nevada legislators are discussing tax breaks for cryptocurrency startups to attract more tech companies to the state.
-
Miami Hosts Blockchain Week\ Miami has kicked off Blockchain Week, drawing thousands of participants from around the world to discuss cryptocurrency innovation and regulation.
-
Colorado Accepts Tax Payments in Cryptocurrency\ Colorado residents can now pay state taxes using Bitcoin and Ethereum, marking a milestone in government adoption of digital currencies.
-
Boston Dynamics Explores Blockchain in Robotics\ Boston Dynamics has announced research into using blockchain technology to enhance coordination and security for robotic systems.
-
Crypto Payments Expand in the Retail Sector\ Major U.S. retailers, including Walmart and Home Depot, are piloting cryptocurrency payment systems in select locations.
-
Federal Reserve Examines Decentralized Finance (DeFi)\ The Federal Reserve has initiated a study on the potential implications and opportunities of decentralized finance within the U.S. economy.
-
Chicago Becomes a Cryptocurrency Innovation Hub\ Chicago has unveiled a public-private initiative to attract blockchain startups and establish the city as a leading hub for cryptocurrency innovation.
-
Arizona Proposes Bitcoin as Legal Tender\ Arizona legislators are drafting a bill recognizing Bitcoin as legal tender, potentially making it the first U.S. state to do so.
Top 5 Worldwide Cryptocurrency Headlines:
-
European Union Accelerates Crypto Regulation Framework\ The EU is working on comprehensive legislation to standardize cryptocurrency regulations across member states, focusing on consumer protection and innovation.
-
China's Shadow Crypto Market Flourishes Despite Crackdowns\ Despite stringent bans, underground cryptocurrency trading in China continues to thrive, fueled by over-the-counter brokers and international platforms.
-
India Explores Blockchain Voting Systems\ India is piloting blockchain technology for secure and transparent voting, aiming to modernize its electoral process.
-
El Salvador Expands Bitcoin Adoption Programs\ El Salvador, the first country to adopt Bitcoin as legal tender, is launching new programs to educate its citizens on cryptocurrency use and blockchain technology.
-
African Nations Adopt Bitcoin for Cross-Border Transactions\ African countries increasingly leverage Bitcoin to streamline cross-border trade, addressing inefficiencies in traditional banking systems.
-
-
@ 6b57533f:eaa341f5
2025-01-26 14:48:01Page 1
Welcome to Stories
This is a new way to tell stories on nostr.
Some content in the middle of the page.
Read More
Swipe left to continue...
Page 2
Top Info
This text appears at the top of the page.
Important Point
This content is centered in the middle.
Bottom Line
And this wraps it up at the bottom.
Page 3
The End
Thanks for reading! This text appears at the bottom.
-
@ 0463223a:3b14d673
2025-01-26 13:07:36Hmm so I heard that in order to improve my brain I should try writing⌠Ok groovy, Iâll give it a go. In all honesty I donât know what to write, my brain is a jumble of noise and titbits of random knowledge. I likely know more about sound than the average person but as physics goes, I donât have anything new or profound to add. Air moves and noises happen. Is there really any more to it? I could write some flowery bollocks about refraction, absorption coefficients and reverberation times, or I could write some out there, arty shit but I donât think that adds any value to anyone.
A lot of folks online have very strong beliefs in how the world operates or should operate. Whilst their conviction is strong, thereâs also is a large percentage of people who totally disagree with them and think the exact opposite is the answer. Thatâs quite shit isnât it? Humans have been around for 100,000 years or so and havenât worked it out. I wonder what makes the internet celeb so certain theyâve got it right when the next internet celeb completely disagrees? I do my best to avoid any of these cunts but despite running to the obscurest social media platforms they still turn up with their profound statements. Meh.
Ideologically Iâm leaning toward anarchism but even that seems full of arguments and contradictions and ultimately I donât think I can be arsed with identifying with any particular ideology. I tried reading some philosophy and struggled with it, although I deep fall into a lovely deep sleep. Itâs fair to say Iâm not the brightest button in the box. I have a wife, a couple of cats and lots of things that make nosies in my shed. Thatâs pretty cool right? Well it works for me.
So why write this? I clearly wrote in the first sentence that Iâm trying to improve my brain, a brain thatâs gone through a number to twists and turns, a lot brain altering substances. I own that, no one forced me to. Beside, George Clinton was still smoking crack aged 80, didnât do him any harmâŚ
Iâm on the 5th paragraph. I donât feel any smarter yet and each paragraph is getting shorter, having started from a low base. I guess Iâm being too high time preference⌠Might be a while before I launch my Deep Thought podcasts where myself and a guest talk for 500 hours about the philosophy of money and 13 amp plug sockets.
Iâve tortured myself enough. Iâm posting this on Nostr where it will never go away.. lol. If you got this far, I congratulate/commiserate you and wish you a wonderful day.
-
@ fbf0e434:e1be6a39
2025-01-26 12:40:45Hackathon ćŚč§
BTCfi ĺ¤ĺŁéťĺŽ˘ćžÂ ćŻäş2024ĺš´ĺ¤ĺŁçąCoreDAOçťçťďźä¸şć12ĺ¨çéťĺŽ˘ćžć´ťĺ¨ăćŹćŹĄć´ťĺ¨ć¨ĺ¨ć¨ĺ¨ćŻçšĺ¸çťćľä¸çĺć°ďźĺ¸ĺźäşćĽčŞWeb3ĺBTCfi礞ĺşçĺźĺč ĺä¸ăĺ ąć291ä˝ĺźĺč ĺä¸ďźć交äş74个ĺťä¸ĺżĺĺşç¨éĄšçŽďźBUIDLsďźĺ°Coreĺšłĺ°ä¸ăć¤ä¸žć¨ĺ¨ĺ ĺźşCoreĺ¨BTCé˘ĺçä˝ç¨ă
Hackathonäş2024ĺš´6ć6ćĽĺźĺ§ďźĺ ĺŤĺźĺšĺźăçłčݎć䝼ĺäş2024ĺš´8ć19ćĽçdemoćĽăčˇĺĽč äş2024ĺš´8ć26ćĽĺ Źĺ¸ăNLXăHalbornăTokenSoftăVerichainsĺRequest FinanceçčľĺŠĺçťäşäşćŻćă
ĺä¸č ä¸ćł¨äşĺźĺĺ°CoreéžććŻčĺ Ľĺ śč§ŁĺłćšćĄççŹçšĺşç¨ăć¤ćŹĄć´ťĺ¨ćććŠĺąäşCoreçćçłťçťďźĺ˘ĺźşäşĺźĺäşşĺçĺä¸ĺşŚăćć交饚çŽçĺ¤ć ˇć§ĺčĺ´çŞćžäşć´ťĺ¨çćĺĺŽć˝ĺĺ śĺŻšćŞćĽĺşĺéžććŻčżćĽçć˝ĺ¨ĺ˝ąĺă
Hackathon čˇĺĽéĄšçŽ
- 1st PlaceďźRune Bridge: 诼糝çťĺŽç°äşćŻçšĺ¸ĺCoreĺşĺéžäšé´ć éćéçéćăĺŽĺŠç¨EVMĺ źĺŽšć§ĺ桡ĺĺ ąčŻć¨ĄĺćĽĺŽç°ĺŻćŠĺąć§ďźçąćşč˝ĺ續ăéžĺ¤ä¸çť§ĺ¨ĺä¸ä¸ŞĺˇĽĺERC20ĺ續çťćďźäťĽéŤć玥ç䝣ĺ¸ă
- 2nd PlaceďźOnchainVampireSurvivors: čżćŻä¸ćŹžWeb3ćśé´çĺ游ćďźĺ ˇćĺşäşĺşĺéžçéžä¸ćčĄćŚĺ彊缨ĺč˝ă饚çŽä˝żç¨ThirdWebčżčĄéąĺ 莿éŽďźćł¨égasćçďźĺšśä˝żç¨CocosĺHardhatĺźĺăćŞćĽĺ˘ĺźşčŽĄĺĺ ćŹAIčľäş§ĺĺ¨Core丝ç˝ä¸çé¨ç˝˛ă
- 3rd Placeďźb14g Network - Enhancing Decentralization and Security on Core Chain with b14g: ćŹéĄšçŽć¨ĺ¨éčżĺŽć˝č§ĺŻč čçšĺĺĺšśč´¨ćźćĽĺ˘ĺźşCore ChainçĺŽĺ ¨ć§ďźäżčżçć§çĺťä¸ĺżĺĺšśč§ŁĺłćżčŻşéŽé˘ăĺŽć¨ĺ¨ĺ°BTCä¸DeFiéćďźćĺCORE䝣ĺ¸çĺŽç¨ć§ĺšśçĄŽäżç˝çťçĺŽć´ć§ă
揲äşč§Łććć交饚çŽççťźĺćŚčż°ďźčŻˇčŽżéŽBTCFi Summer Hackathon 2024饾é˘ă
ĺ łäşçťçťč
CoreDAO
Core DAO玥ççCore ChainďźčżćŻä¸ćĄäťĽĺŽĺ ¨ć§ĺĺŻćŠĺąć§ä¸şéçšçĺťä¸ĺżĺĺşĺéžç˝çťăéčżĺ°ćŻçšĺ¸ç塼ä˝éčŻćä¸Satoshi Plusĺ ąčŻçłťçťďźĺ§ć塼ä˝éčŻćĺĺ§ććçčŻćççťĺďźç¸çťĺďźCore DAOć¨ĺ¨ĺ˘ĺźşĺťä¸ĺżĺĺĺŽĺ ¨ć§ă诼嚳ĺ°ćäžäťĽĺ¤Şĺčććşĺ źĺŽšć§ďźä˝żćŻçšĺ¸çżĺˇĽĺŻäťĽĺä¸ďźĺćśćŻçšĺ¸ććč ĺŻäťĽĺ¨ä¸ćžĺźć玥çć ĺľä¸čżčĄč´¨ćźăCore ChainćŻćéŤäş¤ćĺĺéďźçąç¤žĺşçŽĄçďźĺšśćäžä¸ĺ śäťĺşĺéžçäşćä˝ć§ďźä˝żç¨SolidityčżčĄéŤććşč˝ĺ續ĺźĺă诼çťçťç使ĺ˝ćŻć¨ĺ¨çąćŻçšĺ¸äżć¤çĺťä¸ĺżĺĺşç¨ç¨ĺşĺźĺă
-
@ ed84ce10:cccf4c2a
2025-01-26 12:39:54Hackathon Summary
The BTCfi Summer Hackathon, organized by Core DAO in 2024, concluded after a 12-week period. The hackathon aimed to drive innovation in the Bitcoin economy, engaging developers from the Web3 and BTCfi communities. A total of 291 developers participated, submitting 74 decentralized application projects (BUIDLs) on the Core platform. This initiative sought to reinforce Coreâs role within the BTC space.
The hackathon commenced on June 6, 2024, featuring key activities such as the opening ceremony, application period, and a demo day on August 19, 2024. Winners were revealed on August 26, 2024. The event was supported by sponsors, including NLX, Halborn, TokenSoft, Verichains, and Request Finance.
Participants focused on developing unique applications that incorporated Core Chain technologies into their solutions. The event effectively expanded the Core ecosystem, enhancing developer engagement. The diversity and range of submitted projects underscored the event's successful execution and potential impact on future blockchain technology advancements.
Hackathon Winners
1st Place
Rune Bridge: This system facilitates integration between the Bitcoin and Core blockchains without requiring permission. It leverages EVM compatibility and a hybrid consensus model for scalability, consisting of a smart contract, off-chain relayer, and a factory ERC20 contract to manage tokens efficiently.
2nd Place
OnchainVampireSurvivors: A Web3 time survival game featuring a blockchain-based on-chain leaderboard and lottery. The project uses ThirdWeb for wallet access, prioritizes gas efficiency, and is developed using Cocos and Hardhat. Future enhancements include AI assets and deployment on the Core mainnet.
3rd Place
b14g Network - Enhancing Decentralization and Security on Core Chain with b14g: This project aims to bolster Core Chain's security by implementing Observer Nodes and Merge Staking, promoting decentralization in monitoring and addressing commitment challenges. It seeks to integrate BTC with DeFi, enhancing CORE token utility and ensuring network integrity.
For a comprehensive overview of all submitted projects, visit the BTCFi Summer Hackathon 2024 page.
About the Organizer
Core DAO
Core DAO manages the Core Chain, a decentralized blockchain network with a focus on security and scalability. By integrating Bitcoinâs Proof of Work with the Satoshi Plus consensus systemâa combination of Delegated Proof of Work and Delegated Proof of StakeâCore DAO aims to enhance decentralization and security. The platform offers Ethereum Virtual Machine compatibility, enabling Bitcoin miners to participate and Bitcoin holders to stake without relinquishing custody. Core Chain supports high transaction throughput, is community-governed, and provides interoperability with other blockchains, utilizing Solidity for efficient smart contract development. The organization's mission centers on promoting decentralized application development secured by Bitcoin.
-
@ fd78c37f:a0ec0833
2025-01-26 12:07:12ETHOS & PURPOSEđ
SATS'N'FACTS emphasizes Creativity, Privacy, FOSS Advocacyďźwith a focus on Local Community, Decentralization, and Health Balance. It is dedicated to nurturing an environment where decentralization and open collaboration thrive, providing space for deep technical discussions, hands-on learning, and meaningful networking, all with the goal of strengthening the Bitcoin community in Asia.
They aspire to redefine boundaries and usher in a new era of design and development excellence that leaves an indelible mark on the bitcoin environment. A three-day event dedicated to fostering innovation, and freedom within the Bitcoin Developer Community in Asia.
LEADSđ§âđź
Enthusiast developers and builders from around the globe, will attend this first installments of the SATSâNâFACTS. Including nostr:npub1nvfgglea9zlcs58tcqlc6j26rt50ngkgdk7699wfq4txrx37aqcsz4e7zd nostr:npub1cj6ndx5akfazux7f0vjl4fyx9k0ulf682p437fe03a9ndwqjm0tqj886t6 nostr:npub148jz5r9xujcjpqygk69yl4jqwjqmzgrqly26plktfjy8g4t7xaysj9xhgp nostr:npub1htnhsay5dmq3r72tukdw72pduzfdcja0yylcajuvnc2uklkhxp8qnz3qac nostr:npub1ejxswthae3nkljavznmv66p9ahp4wmj4adux525htmsrff4qym9sz2t3tv nostr:npub1gwa27rpgum8mr9d30msg8cv7kwj2lhav2nvmdwh3wqnsa5vnudxqlta2sz nostr:npub1zk6u7mxlflguqteghn8q7xtu47hyerruv6379c36l8lxzzr4x90q0gl6ef nostr:npub13rvvn5g23anm09kwnya8qvzqejxfajfa56rnn47ck5l96ke6cq4sdcd4e0 nostr:npub147whqsr5vsj86x0ays70r0hgreklre3ey97uvcmxhum65skst56s30selt nostr:npub190trvg63e6tyqlwlj6lccqpftx76lckj25c006vwx3dzvdl88yxs2nyqdx nostr:npub1hw6amg8p24ne08c9gdq8hhpqx0t0pwanpae9z25crn7m9uy7yarse465gr nostr:npub10xk2rsg9l9ksht66egss98z7mzhetf8d7q4476d9cm6vsfv3a00qld5tdf nostr:npub19x0h8jm3mnwzhv4tpq62zta05er0qlyge73m0pwsp7h666khkd9qev2ree and more.
AGENDAđ
The event is designed to be a âdecentralized and collaborativeâ effort between all participants, with activities being put together with attendeesâ feedback. So no agenda, but here some guidance to make sure this event will be joyful and constructive:
đď¸8áľĘ°Ňá´Ę Doors Openingďź
- [ ] Event Opening
- [ ] Welcome session and intros
- [ ] Presentations and open discussions
- [ ] Initial networking and collaborative sessions
- [ ] Hackathon begins
đď¸9áľĘ°Ňá´Ę ďź
- [ ] Hackathon continues
- [ ] Attendee-led sessions
- [ ] Recording room open for voluntarily podcasting and interviews
- [ ] Peer-to-peer learning and networking
đď¸10áľĘ°Ňá´Ę Closing UPďź
- [ ] Hackathon wrap-up
- [ ] Pitching contest and project presentations
- [ ] Networking
- [ ] Closing remarks and final session
MERCHđď¸
Their event merch is not just coolâitâs a must-have! T-shirts đ, bags đ, stickers đźď¸, caps đ§˘...Get yours and carry the event vibe wherever you go!
Other Fun ActivitiesđĄ
In addition to the exciting conference, they've prepared a variety of enriching experiences for youâlive art and craft activitiesđ¨, art exhibitionsđźď¸, creative workshopsâ¨, and Thai massage đâŚâŚ, and more.
How to join the EventđĄ
If you're in Asia this February, don't miss outâjoin them in the vibrant city of Chiang Mai, Thailand đšđ for an unforgettable experience!
đ Timeďź8â10th February 2025 đLocationďź12/8 ŕ¸.วูว฼าย ŕ¸ŕ¸ŕ¸˘ 3 ŕ¸ŕ¸łŕ¸ŕ¸Ľŕ¸Ťŕ¸˛ŕ¸˘ŕ¸˘ŕ¸˛, ŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕšŕ¸Ťŕ¸Ąŕš 50100 đšđŕšŕ¸ŕ¸˘ đşBook your seatďź https://formstr.app/#/fill/b3b9bd115fe936848a5e03134fefff945287285d51b1dee4731fef6a1070c597 đ¤Submit an ideaďź https://formstr.app/#/forms/cf02333ea3c0d0c21080df599373e289fa343a55e63a1abdc7f633d1594078ff đŤBuy your ticket: https://satsnfacts.btc.pub/p/ticket/
-
@ 6b57533f:eaa341f5
2025-01-26 11:57:39Page: cover
background: #000000 template: vertical
Welcome to My Story
This is an amazing story.
Page: page1
background-image: https://nostr.build/i/nostr.png template: vertical
First Page
Content goes here
-
@ 16d11430:61640947
2025-01-26 11:48:45For centuries, the global narrative has been dominated by Western powers, their economies, and their cultural hegemony. But beneath this veneer of dominance lies a reality that is becoming increasingly impossible to ignore: the Eastâspanning Asia, the Middle East, and beyondâis awakening, mobilizing human potential and economic resources on a scale that dwarfs anything seen in the West.
To grasp this transformation, one must break free from traditional Western-centric paradigms and understand the numbers, the sheer scale, and the unstoppable momentum of this shift.
Population: The Power of Numbers
The Eastâs greatest asset is its people. To put this into perspective:
-
China: With a population of 1.4 billion, it has more than four times the people of the United States. Imagine the United States replicating its entire labor force four times over, and you begin to see the scale of Chinaâs potential.
-
India: By 2023, India officially surpassed China as the most populous nation. Its Gen Z population aloneâover 375 million peopleâis larger than the entire U.S. population.
-
Southeast Asia: The ASEAN region, comprising nations like Indonesia, Vietnam, and Thailand, boasts a combined population of over 680 million. Indonesia alone, with 280 million people, is the worldâs fourth-most populous country.
In total, Asia accounts for 60% of the worldâs population. The raw human potential here is akin to unlocking billions of minds, all innovating, producing, and consuming.
The East is like a beehive, with billions of individuals working in unison, each contributing to a collective force that is buzzing with energy and unstoppable growth. Meanwhile, the West, though still industrious, often resembles a lone artisan toiling in a workshop, unaware of the scale of production happening just beyond their horizon.
Economic Growth: The Compounding Engine
Western economies, long considered the gold standard, are now being eclipsed by the rapid growth of Eastern nations.
-
Chinaâs GDP: In 1980, Chinaâs GDP was a mere $191 billion, less than 5% of the U.S. economy. By 2023, it surpassed $19 trillion, closing in on the U.S. ($25 trillion) as the largest economy. Analysts predict that by the 2030s, China will overtake the U.S. to claim the top spot.
-
Indiaâs Growth Rate: India, now the fifth-largest economy, has consistently achieved GDP growth rates of 6-8% annually over the past two decades. Its economy, currently valued at $3.7 trillion, is projected to become the worldâs third-largest by 2030.
-
ASEAN Economic Bloc: The combined GDP of ASEAN nations exceeds $3.6 trillion, making it the fifth-largest economic bloc globally. Its strategic position as a manufacturing hub and its youthful workforce are propelling it forward.
Compare these numbers to the 2-3% growth rates in the U.S. and Europe, and it becomes evident that the East isnât just catching up; itâs compounding at a rate that will leave Western economies in the dust.
The economic growth of the East is like a tidal wave gathering strength far out at sea. At first, itâs almost imperceptible, but as it approaches the shore, its size and force become undeniable, reshaping everything in its path. By comparison, the West resembles a well-built dam holding back a steady riverâresilient, but incapable of matching the raw power of the oncoming surge.
Infrastructure Development: Building Tomorrow
The East is constructing the foundations of its future at an unprecedented pace:
-
High-Speed Rail: Chinaâs high-speed rail network spans over 42,000 kilometers, more than the rest of the world combined. To put it in perspective, this is like building a rail line that circles the Earthâs equatorâwith some to spareâin just two decades.
-
Smart Cities: India has embarked on its ambitious 100 Smart Cities Mission, modernizing urban infrastructure to support its growing population. Meanwhile, the ASEAN region is investing billions in digital infrastructure to create hyper-connected economies.
-
Energy Transition: China leads the world in renewable energy investment, accounting for 45% of global renewable energy capacity additions in 2022. This is the equivalent of powering all of Europeâs renewable energy needs annually.
These infrastructure projects arenât just impressive feats of engineering; they are the scaffolding of economies that are designed to scale.
The Eastâs infrastructure boom is like planting an immense forest. Each rail line, smart city, and renewable energy project is a treeâseemingly small on its own but, when viewed together, forming a vast and thriving ecosystem that reshapes the climate of global power.
Education and Innovation: The Engine of Progress
The East is also mobilizing its human capital through education and innovation.
-
China graduates over 1.2 million engineers annually, dwarfing the 70,000 engineering graduates in the United States.
-
Indiaâs Tech Workforce: Indiaâs IT sector employs 5 million professionals and contributes nearly 10% of the countryâs GDP. Companies like Infosys and TCS arenât just outsourcing hubs; theyâre global innovation powerhouses.
-
Patents and R&D: China filed 1.5 million patents in 2022, compared to the U.S.âs 620,000. This means that for every patent filed in the West, two or more are being filed in China.
Innovation ecosystems in places like Shenzhen and Bangalore are the modern equivalents of Silicon Valley, but on steroidsâfueled by scale, government support, and an unrelenting hunger to lead.
The Eastâs educational and innovation push is like lighting a thousand candles in a dark room. Where the West may hold a single, steady flame, the East is illuminating every corner, creating a dazzling and unstoppable glow.
A Metaphor for the West: The Dam Bursting
For the average Westerner, understanding this shift requires a relatable metaphor. Imagine standing behind a dam holding back a massive reservoir. For decades, the dam (the West) controlled the flow, regulating what trickled out to the downstream (the East). But now, the reservoir has grown so vast and powerful that it can no longer be contained. The dam is cracking, and when it bursts, the torrent of economic and human potential will reshape the entire landscape.
Alternatively, think of it as a relay race. For centuries, the West held the baton and set the pace. But now, the baton has been passed to the East, whose runnersâwith their sheer numbers and untapped potentialâare sprinting at a speed that leaves the previous team struggling to keep up.
Conclusion: The Multi-Polar Future
The West must wake up to this reality, not with fear or resentment, but with a willingness to adapt. The world is moving towards a multi-polar order, where power is distributed rather than concentrated. Cooperation, not confrontation, will define success in this new era.
As the East continues to mobilize its vast resources, the question is not whether it will surpass the West, but how the West will respond. Will it resist, clinging to outdated notions of supremacy, or will it embrace this shift and find its place in a rebalanced world?
One thing is certain: the scale of whatâs happening in the East is not just big; itâs colossal. And itâs time for the world to take notice.
-
-
@ 6b57533f:eaa341f5
2025-01-26 11:48:05Page: cover
background: #000000 template: vertical
Welcome to My Story
This is an amazing story.
Page: page1
background-image: https://nostr.build/i/nostr.png template: vertical
First Page
Content goes here
-
@ faade9ee:1c6dfd69
2025-01-26 11:46:44test2c
-
@ faade9ee:1c6dfd69
2025-01-26 11:39:51This is a normal piece of text.z
This is a bold piece of text via button press.z
this is also bold, but via double-starsz
this is an italic via button press
this also but via one-star
look, it's an underline!
oh, a piece of code has appeared. Nice. Button press tho. seems like it's purple / missed styling it, will change that.
another code but via text
code block, kinda buggy (really buggy actually x3)
```this is another, but via text which is disabled for now as it's cause issues```
This is a top number thing222
a bottom number thing5ss65435ghrt
- bullets!
-
another!
- a third!
-
Number!
-
another!
- a third!
-
[x] check
- [x] box
this is a quote
"quote"
heading 1
heading 2
heading 3 via text
heading 4 via text
heading 5 via text
heading 6 via text
this is a link via text (button has an annoyance bug)
video below
::youtube{#aApSteSbeGA}
-
@ 599f67f7:21fb3ea9
2025-01-26 11:01:05ÂżQuĂŠ es Blossom?
nostr:nevent1qqspttj39n6ld4plhn4e2mq3utxpju93u4k7w33l3ehxyf0g9lh3f0qpzpmhxue69uhkummnw3ezuamfdejsygzenanl0hmkjnrq8fksvdhpt67xzrdh0h8agltwt5znsmvzr7e74ywgmr72
Blossom significa Blobs Simply Stored on Media Servers (Blobs Simplemente Almacenados en Servidores de Medios). Blobs son fragmentos de datos binarios, como archivos pero sin nombres. En lugar de nombres, se identifican por su hash sha256. La ventaja de usar hashes sha256 en lugar de nombres es que los hashes son IDs universales que se pueden calcular a partir del archivo mismo utilizando el algoritmo de hash sha256.
đĄ archivo -> sha256 -> hash
Blossom es, por lo tanto, un conjunto de puntos finales HTTP que permiten a los usuarios almacenar y recuperar blobs almacenados en servidores utilizando su identidad nostr.
ÂżPor quĂŠ Blossom?
Como mencionamos hace un momento, al usar claves nostr como su identidad, Blossom permite que los datos sean "propiedad" del usuario. Esto simplifica enormemente la cuestiĂłn de "quĂŠ es spam" para el alojamiento de servidores. Por ejemplo, en nuestro Blossom solo permitimos cargas por miembros de la comunidad verificados que tengan un NIP-05 con nosotros.
Los usuarios pueden subir en mĂşltiples servidores de blossom, por ejemplo, uno alojado por su comunidad, uno de pago, otro pĂşblico y gratuito, para establecer redundancia de sus datos. Los blobs pueden ser espejados entre servidores de blossom, de manera similar a cĂłmo los relays nostr pueden transmitir eventos entre sĂ. Esto mejora la resistencia a la censura de blossom.
A continuaciĂłn se muestra una breve tabla de comparaciĂłn entre torrents, Blossom y servidores CDN centralizados. (Suponiendo que hay muchos seeders para torrents y se utilizan mĂşltiples servidores con Blossom).
| | Torrents | Blossom | CDN Centralizado | | --------------------------------------------------------------- | -------- | ------- | ---------------- | | Descentralizado | â | â | â | | Resistencia a la censura | â | â | â | | ÂżPuedo usarlo para publicar fotos de gatitos en redes sociales? | â | â | â |
ÂżCĂłmo funciona?
Blossom utiliza varios tipos de eventos nostr para comunicarse con el servidor de medios.
| kind | descripciĂłn | BUD | | ----- | ------------------------------- | ------------------------------------------------------------------ | | 24242 | Evento de autorizaciĂłn | BUD01 | | 10063 | Lista de Servidores de Usuarios | BUD03 |
kind:24242 - AutorizaciĂłn
Esto es esencialmente lo que ya describimos al usar claves nostr como IDs de usuario. En el evento, el usuario le dice al servidor que quiere subir o eliminar un archivo y lo firma con sus claves nostr. El servidor realiza algunas verificaciones en este evento y luego ejecuta el comando del usuario si todo parece estar bien.
kind:10063 - Lista de Servidores de Usuarios
Esto es utilizado por el usuario para anunciar a quĂŠ servidores de medios estĂĄ subiendo. De esta manera, cuando el cliente ve esta lista, sabe dĂłnde subir los archivos del usuario. TambiĂŠn puede subir en mĂşltiples servidores definidos en la lista para asegurar redundancia. En el lado de recuperaciĂłn, si por alguna razĂłn uno de los servidores en la lista del usuario estĂĄ fuera de servicio, o el archivo ya no se puede encontrar allĂ, el cliente puede usar esta lista para intentar recuperar el archivo de otros servidores en la lista. Dado que los blobs se identifican por sus hashes, el mismo blob tendrĂĄ el mismo hash en cualquier servidor de medios. Todo lo que el cliente necesita hacer es cambiar la URL por la de un servidor diferente.
Ahora, ademĂĄs de los conceptos bĂĄsicos de cĂłmo funciona Blossom, tambiĂŠn hay otros tipos de eventos que hacen que Blossom sea aĂşn mĂĄs interesante.
| kind | descripciĂłn | | ----- | --------------------- | | 30563 | Blossom Drives | | 36363 | Listado de Servidores | | 31963 | ReseĂąa de Servidores |
kind:30563 - Blossom Drives
Este tipo de evento facilita la organizaciĂłn de blobs en carpetas, como estamos acostumbrados con los drives (piensa en Google Drive, iCloud, Proton Drive, etc.). El evento contiene informaciĂłn sobre la estructura de carpetas y los metadatos del drive.
kind:36363 y kind:31963 - Listado y ReseĂąa
Estos tipos de eventos permiten a los usuarios descubrir y reseĂąar servidores de medios a travĂŠs de nostr. kind:36363 es un listado de servidores que contiene la URL del servidor. kind:31963 es una reseĂąa, donde los usuarios pueden calificar servidores.
ÂżCĂłmo lo uso?
Encuentra un servidor
Primero necesitarĂĄs elegir un servidor Blossom donde subirĂĄs tus archivos. Puedes navegar por los pĂşblicos en blossomservers.com. Algunos de ellos son de pago, otros pueden requerir que tus claves nostr estĂŠn en una lista blanca.
Luego, puedes ir a la URL de su servidor y probar a subir un archivo pequeĂąo, como una foto. Si estĂĄs satisfecho con el servidor (es rĂĄpido y aĂşn no te ha fallado), puedes agregarlo a tu Lista de Servidores de Usuarios. Cubriremos brevemente cĂłmo hacer esto en noStrudel y Amethyst (pero solo necesitas hacer esto una vez, una vez que tu lista actualizada estĂŠ publicada, los clientes pueden simplemente recuperarla de nostr).
noStrudel
- Encuentra Relays en la barra lateral, luego elige Servidores de Medios.
- Agrega un servidor de medios, o mejor aĂşn, varios.
- Publica tu lista de servidores. â
Amethyst
- En la barra lateral, encuentra Servidores multimedia.
- Bajo Servidores Blossom, agrega tus servidores de medios.
- Firma y publica. â
Ahora, cuando vayas a hacer una publicaciĂłn y adjuntar una foto, por ejemplo, se subirĂĄ en tu servidor blossom.
â ď¸ Ten en cuenta que debes suponer que los archivos que subas serĂĄn pĂşblicos. Aunque puedes proteger un archivo con contraseĂąa, esto no ha sido auditado.
Blossom Drive
Como mencionamos anteriormente, podemos publicar eventos para organizar nuestros blobs en carpetas. Esto puede ser excelente para compartir archivos con tu equipo, o simplemente para mantener las cosas organizadas.
Para probarlo, ve a blossom.hzrd149.com (o nuestra instancia comunitaria en blossom.bitcointxoko.com) e inicia sesiĂłn con tu mĂŠtodo preferido.
Puedes crear una nueva unidad y agregar blobs desde allĂ.
Bouquet
Si usas mĂşltiples servidores para darte redundancia, Bouquet es una buena manera de obtener una visiĂłn general de todos tus archivos. Ăsalo para subir y navegar por tus medios en diferentes servidores y sincronizar blobs entre ellos.
Cherry Tree
nostr:nevent1qvzqqqqqqypzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzfmhxue69uhkummnw3e82efwvdhk6tcqyp3065hj9zellakecetfflkgudm5n6xcc9dnetfeacnq90y3yxa5z5gk2q6
Cherry Tree te permite dividir un archivo en fragmentos y luego subirlos en mĂşltiples servidores blossom, y mĂĄs tarde reensamblarlos en otro lugar.
ConclusiĂłn
Blossom aĂşn estĂĄ en desarrollo, pero ya hay muchas cosas interesantes que puedes hacer con ĂŠl para hacerte a ti y a tu comunidad mĂĄs soberanos. ÂĄPruĂŠbalo!
Si deseas mantenerte al dĂa sobre el desarrollo de Blossom, sigue a nostr:nprofile1qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzfmhxue69uhkummnw3e82efwvdhk6tcqyqnxs90qeyssm73jf3kt5dtnk997ujw6ggy6j3t0jjzw2yrv6sy22ysu5ka y dale un gran zap por su excelente trabajo.
Referencias
-
@ da0b9bc3:4e30a4a9
2025-01-26 10:29:32Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
đ¨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!đ¨
đ¨Subscribe to the territory to ensure you never miss a post! đ¨
originally posted at https://stacker.news/items/864256
-
@ dbb19ae0:c3f22d5a
2025-01-26 08:43:57First make sure to add this relay wss://relay.momostr.pink in your Nostr setting and second follow this account
Soon after an account will be created on bluesky and will mirror your Nostr profile the address will be like this: bsky.app/profile/npub1mwce4c8qa2zn9zw9f372syrc9dsnqmyy3jkcmpqkzaze0slj94dqu6nmwy.momostr.pink.ap.brid.gy
And from there keep spreading the good word
originally posted at https://stacker.news/items/825913
-
@ dbb19ae0:c3f22d5a
2025-01-26 08:37:55Step by Step migration from the Alby Hub Cloud to the Alby Hub local application.
Step 1. From the Alby Hub select the 'migrate node' option, this will generate a bkp file, and will shutdown the node
https://guides.getalby.com/user-guide/alby-account-and-browser-extension/alby-hub/faq-alby-hub/how-can-i-migrate-alby-hub-to-a-different-machine
Step 2. Preferably on a second machine, install the Alby application, synchronize the application with the Alby extension, then run the Alby 'advanced setup' import the bkp file, enter the password, and the Hub will open the wallet.
https://guides.getalby.com/user-guide/alby-account-and-browser-extension/alby-hub/faq-alby-hub/how-can-i-migrate-alby-hub-to-a-different-machine
Note: if the password is incorrect this message will show up
-
@ 8d34bd24:414be32b
2025-01-26 04:54:21My writing tends to be responsive. I respond to something I read in a book. I respond to something I read online. I respond to a podcast or sermon I was listening to. I also have a strong longing for truth (which seems to be in short supply these days). Because of my ideas being responsive, I probably tend to speak against things too often and not for things enough. I condemn not having a high enough view of God, but may inaccurately convey a harsh God and not spend enough time conveying His love and the positive reasons to follow Him. I may spend too much time on the stick and not enough on the carrot.
Iâve noticed in others that I can see two people arguing over a biblical point. One is arguing against an error/extreme to one direction while the other is arguing against an error/extreme in the opposite direction. In reality, their beliefs are very close, but they sound like they are far apart. Iâve had many opportunities to help the two people realize that they mostly agree with each other, but they are each personally dealing with opposite errors. Just as I can do a good job editing someone elseâs writing, but canât edit my own (I usually have my amazing, wonderful, handsome, intelligent, humorous husband [editorâs note - adjectives added by editor] read and edit everything I write before publishing), I may sometimes be too reactive to an error and fail to properly communicate the whole and complete truth.
Differences in Perspective
I was recently listening to a podcast by a by Bible teacher. He was talking about how he had an unloving father and how, after being saved, he originally didnât think God cared about him personally. He then went on to teach about how personal and loving God is and how God is actively involved in every detail of every believerâs life. I agree.
On the other hand, I have seen many people that focus only on Godâs love and ignore Godâs holiness. They believe it is more important to be âlovingâ and therefore they withhold the truth (if they even know it). They are so focused on Godâs forgiveness that they excuse believers actively sinning and promoting sin. Since being saved, I never doubted Godâs love or His involvement in my life, so I tend to not talk about Godâs love as much as I probably should. My big âAh Ha!â was seeing His absolute sovereignty and holiness and coming to understand that the fact that He is creator gives Him the authority to tell us how to live our lives, so I tend to focus on this area.
Although I would never say Godâs truth is whatever the compromise of ideas is, there are a lot of truths about God where we can fall into error in two (or more) opposing directions. God is loving and is holy. If we focus only on His love or only on His holiness, we are in error. God is forgiving and has the right to judge. If we focus so much on the fact that we are forgiven that we do not obey Him, we have erred, but if we focus so much on His judgment that we donât acknowledge His mercy for others and for ourselves, we have also erred.
To Associate or Not to Associate
There are lots of different denominations and division among Christians that are not what God desires. At the same time, there are churches that focus on the truth as communicated through Godâs word, the Bible and there are churches that have compromised that truth and let the culture, evil spirits, or just interest in self and popularity lead them astray. As Christians, we need to know Godâs word, so we can know when we should avoid a close association with those who call themselves Christians, but actively disobey His clear commands.
But actually, I wrote to you not to associate with any so-called brother if he is an immoral person, or covetous, or an idolater, or a reviler, or a drunkard, or a swindlerânot even to eat with such a one. (1 Corinthians 5:11) {emphasis mine}
If anyone does not obey our instruction in this letter, take special note of that person and do not associate with him, so that he will be put to shame (2 Thessalonians 4:13) {emphasis mine}
On the other hand there are many areas where our differences are not salvation issues but are more about style than substance. One side may be in error, but still be in right fellowship with God and earnestly seeking to follow Him faithfully. We shouldnât allow these things to cause the church to fight against itself.
But now God has placed the members, each one of them, in the body, just as He desired. If they were all one member, where would the body be? But now there are many members, but one body. (1 Corinthians 12:18-20) {emphasis mine}
Therefore I, the prisoner of the Lord, implore you to walk in a manner worthy of the calling with which you have been called, with all humility and gentleness, with patience, showing tolerance for one another in love, being diligent to preserve the unity of the Spirit in the bond of peace. There is one body and one Spirit, just as also you were called in one hope of your calling; one Lord, one faith, one baptism, one God and Father of all who is over all and through all and in all. (Ephesians 4:1-5) {emphasis mine}
A so-called church, that encourages or condones things God has called evil, is not a church with which we want to associate. There are other things of which we may disagree and disagree strongly (Armenian vs Calvinist, preterist/pre-trib/post-trib, or young earth vs old earth) that although important shouldnât cause division within the church. We should always seek the truth as spoken by God through the Scriptures, but we shouldnât let disagreements, that donât affect the Gospel and how we should live, keep us divided. Between Armenian and Calvinist opinions on whether we freely choose to accept Jesus or Jesus causes us to accept Jesus, as long as we agree that salvation comes through faith and not works and through Jesus and no other path, we can work together. With the different end times interpretations, as long as we agree that God said it and it will be as He said it and that it is important for us to live godly lives and to share the gospel with the lost, we can work together. With young earth vs old earth, as long as we both agree that God is ultimately our creator and His word is true, we can work together.
I do believe that there is only one truth in these and other areas, and discovering the truth is very important. Being wrong can mislead us and make us less effective for Jesus. Many of these errors can be caused by or lead us to put scientists or historians or theologians in authority over Godâs word. This is wrong. We should always continually search the scripture to find the truth. We should not fear honest debate which can help lead us to the truth and strengthen our faith in Godâs word. It is not wrong to correct a brother in Christ using Scripture as our foundation, but we also need to acknowledge that it could be we who are in error. I donât know any great theologian since the apostles that hasnât had an error in their thinking somewhere.
The Head or the Body
There can also be differences between the leadership and the individuals in a church or denomination. I have major concerns with the Vatican leadership and question if many of them are Christians at all. So much of what they say and do seem to be working against God and His commands. At the same time, I have many good friends (in person and online) who are wonderful Catholics, who I would never doubt are devout Christians with a true relationship with Jesus. I will maintain my Christian fellowship with my Catholic, Christian friends while speaking against unbiblical words and actions by the Pope and the Vatican.
But false prophets also arose among the people, just as there will also be false teachers among you, who will secretly introduce destructive heresies, even denying the Master who bought them, bringing swift destruction upon themselves. Many will follow their sensuality, and because of them the way of the truth will be maligned; and in their greed they will exploit you with false words; their judgment from long ago is not idle, and their destruction is not asleep. (2 Peter 2:1-3)
Of course false prophets and false teachers are most definitely not limited to the Catholic Church. For example, the female Episcopalian Bishop that led the inauguration prayer breakfast for Trump spent most of her time promoting LGBTQ+ issues which are contrary to the word of God and little to none actually honoring God or supporting the issues that God has stated are important. (For that matter, scripture specifically says women shouldnât be church leaders.) We all need to be more like the Bereans âNow these were more noble-minded than those in Thessalonica, for they received the word with great eagerness, examining the Scriptures daily to see whether these things were so.â (Acts 17:11) We need to use the Scripture to both test if our beliefs and actions are biblical and if the teachings of our leaders are biblical.
Different Paths, but One Jesus
Ultimately, there is only one way of salvation â repentance and faith in Jesus. On the other hand, the path each believer is called to walk towards sanctification can vary. I have seen God lead me at different times to correct different sins and misconceptions. The areas of my life that I am convicted of and my path towards understanding the truth communicated in the Bible is not the same as other believers. We should all be growing to be more like Jesus, but our path to His likeness will not look the same. We start as different people; we have different experiences; and God works on us in different ways. We must be careful about judging another because their growth in Christ looks different.
We all have strengths and weaknesses. We all have doctrines of the Bible that we understand better than others and doctrines of the Bible about which we are either unsure or in error. Most of us also have a tendency to judge someone who is weak where we are strong and overlook the fact that that same person might be strong where we are weak. We need to pray for wisdom and mercy. We need to earnestly study Godâs word. We need to listen closely to the Holy Spiritâs leading and use these differences to build up each other rather than divide and beat down those who are different, but are still part of the body of Christ.
For through the grace given to me I say to everyone among you not to think more highly of himself than he ought to think; but to think so as to have sound judgment, as God has allotted to each a measure of faith. For just as we have many members in one body and all the members do not have the same function, so we, who are many, are one body in Christ, and individually members one of another. Since we have gifts that differ according to the grace given to us, each of us is to exercise them accordingly: if prophecy, according to the proportion of his faith; if service, in his serving; or he who teaches, in his teaching; or he who exhorts, in his exhortation; he who gives, with liberality; he who leads, with diligence; he who shows mercy, with cheerfulness. (Romans 12:3-8)
My prayer is that we would all study Godâs word, understand His word, live His word, and work together to share the Gospel with the word. My prayer is that our different understandings of the Bible will lead to fruitful debate that leads all parties closer to truth, to God and to each other. May God lead us all to truth and fellowship in Him.
Trust Jesus.
-
@ 16d11430:61640947
2025-01-26 04:07:03In the grand tapestry of existence, humanity finds itself in a peculiar position: neither wholly bound to the physical nor fully immersed in the metaphysical. We stand at the threshold of realities, a liminal space that is both transitional and transformative, where dimensions overlap and professions converge to illuminate the intricacies of our shared existence.
Through the lens of Bruce Cathieâs harmonic worldview, the Earth is not merely a sphere of rock and water but an interconnected energy grid, a lattice of electromagnetic harmonics pulsing beneath our feet. If this grid represents the physical scaffolding of existence, humanity inhabits a liminal space within itâa realm where the boundaries of time, space, and consciousness blur.
A Multidimensional Perspective
From a multidimensional standpoint, this liminality can be seen as the overlap between the three-dimensional world we perceive and higher-dimensional realities we intuit. The Earth's energy grid, as theorized by Cathie, may function as a bridgeâa harmonic resonance linking the seen and the unseen, the measurable and the ineffable.
Physics and the Unseen Forces: Modern physics hints at the existence of dimensions beyond our perceptual grasp. String theory posits that the universe comprises multiple dimensions, vibrating at frequencies we cannot yet detect. In Cathieâs terms, the Earth's energy grid could be the physical manifestation of these vibrations, a harmonized nexus where the material world intersects with the quantum.
Consciousness as a Dimensional Traveler: Neuroscience reveals that the human brain operates on frequencies that resonate with the Earth's Schumann resonance, the harmonic pulse of the planet. This resonance suggests that our consciousness is not confined to our physical bodies but interacts with the energy grid, allowing glimpses of higher-dimensional realities through meditation, intuition, or creative inspiration.
A Multiprofessional Perspective
The liminal space we cohabit is not solely the domain of philosophers or physicists. It is a convergence point for professionals across disciplines, each contributing a facet to the mosaic of understanding.
Architects and Builders: The alignment of ancient structures like Stonehenge and the pyramids with the Earthâs energy lines hints at an architectural awareness of this grid. These monuments, enduring testaments to harmonic knowledge, suggest that ancient architects were as much energy workers as they were builders, attuned to the liminal currents of the Earth.
Healers and Scientists: In the medical profession, understanding the human body as an energy system has led to breakthroughs in alternative healing practices like acupuncture, which aligns with the body's energy meridians. These meridians mirror Cathieâs grid, suggesting that healing occurs not only in the physical but also in the liminal spaces where energy flows harmonically.
Artists and Creatives: Art, music, and literature often emerge from the liminal spaces of the human psyche, where conscious and subconscious meet. The harmonic interplay of tones and colors in art mirrors the vibrational nature of the universe, making creators unwitting cartographers of the unseen.
The Liminal Space as a Collective Experience
Humanityâs existence in this liminal space is not an individual journey but a shared, collective experience. It is where science meets spirituality, where logic and intuition find harmony, and where the professional and the personal intersect. It is the space where we question our origins and our destinies, where we ponder the mysteries of the universe and our place within it.
Cultural Intersections: Across cultures, liminality has been revered as sacred. Indigenous traditions, for example, often speak of the Earth as a living, conscious entity, resonating with Cathieâs grid. Rituals, dances, and ceremonies are designed to align human energies with the Earthâs harmonics, bridging the physical and spiritual realms.
Technological Implications: As we advance technologically, we edge closer to mapping the liminal space. Artificial intelligence and quantum computing may one day decode the harmonic mathematics Cathie proposed, providing tangible evidence of the multidimensional realities we only intuitively grasp today.
Humanity as Harmonic Resonators
To dwell in the liminal space is to accept that humanity itself is a harmonic entity, resonating with the Earth and the cosmos. Just as the Earthâs grid hums with energy, so do we, each individual a unique frequency within the symphony of existence. Our thoughts, actions, and creations ripple through the grid, influencing not only the physical world but also the higher-dimensional realities beyond it.
In this liminality lies our greatest potential. It is here, at the edge of the seen and unseen, that we find the power to transcend, to harmonize with the greater energies of the universe, and to co-create a future that resonates with truth, beauty, and unity.
Conclusion
The liminal space we cohabit is not a void but a vibrant thresholdâa meeting place of dimensions, disciplines, and destinies. It is where the harmonic mathematics of Bruce Cathie converge with the lived experience of humanity, offering us a glimpse of the profound interconnectedness of all things. To exist in this space is both a challenge and a privilege, an invitation to explore, to create, and to harmonize with the infinite.
In this liminal existence, we are not merely observers but participants, co-creators of the grid that binds us. By embracing the liminal, we step into the fullness of our multidimensional selves, resonating with the harmonic rhythms of the Earth and beyond.
-
@ df57b498:d049124f
2025-01-26 03:59:47Chef's notes
This is cobbled together from trial and error and the web.
Serve hot pancakes with preferably butter and maple syrup. Add other toppings like bananas, nuts, or other fruits and toppings as have available and/or desired.
Details
- â˛ď¸ Prep time: 10 minutes
- đł Cook time: 10 minutes
Ingredients
- 1 cup flour
- 2 tablespoons sugar
- 2 teaspoons baking powder
- 1 teaspoon salt
- 1 cup milk
- 2 tablespoons vegetable oil
- 1 egg, beaten
Directions
- Combine the dry ingredients.
- Add the wet ingredients and mix.
- Pour or ladle the batter onto the oiled griddle or pan.
- Cook until bubbles form, flip, and cook on the other side.
-
@ ae6ce958:d0f02c7d
2025-01-26 02:31:38In a world increasingly shaped by decentralization, Bitcoin stands as the pioneer of a revolutionary asset classânon-Newtonian assets. These assets defy conventional economic and financial expectations, thriving under pressure and leveraging their mathematical underpinnings to achieve exponential growth. However, as the ecosystem expands, the failures of Proof-of-Stake (PoS) architectures and the relentless attacks by financial incumbents have highlighted the need for resilience and verifiable integrity. Enter Damage Token, built on the Aeternity blockchainâa Proof-of-Work (PoW) platform designed to embrace Bitcoin's ethos while pushing the boundaries of verifiable behavior and incentivized accountability.
This article explores Bitcoinâs role as the foundation of non-Newtonian assets, the failures of centralized alternatives, and why Damage Token on Aeternity PoW strengthens the narrative of decentralized resilience in a hostile landscape.
Bitcoin: The Non-Newtonian Pioneer
Bitcoinâs design is rooted in immutable mathematical certainties. Its decentralized Proof-of-Work consensus ensures that every block, transaction, and piece of data is secured by external energy expenditure. This thermodynamic foundation makes Bitcoin resilient to attacks, centralization, and censorshipâa trait unmatched by PoS systems or fiat currencies.
As Bitcoin grows, its adoption follows an S-curve driven by Metcalfeâs Law, where network value increases exponentially with each new user. Bitcoinâs halving cycles further enforce scarcity, creating predictable supply shocks that fuel demand. Importantly, Bitcoin thrives under stress, becoming stronger with every regulatory crackdown or macroeconomic crisisâa hallmark of non-Newtonian behavior.
Aeternity PoW: Extending the Bitcoin Ethos
Aeternity, like Bitcoin, is a PoW blockchain designed for scalability and flexibility. Unlike Ethereumâs shift to PoS, Aeternity retains the security and decentralization benefits of PoW while incorporating features like state channels, oracles, and efficient smart contracts. This combination makes it uniquely positioned to support projects that demand verifiable trust, resilience, and high-performance scalability.
Aeternityâs PoW mechanism ensures that every action on the network is backed by energy expenditure, maintaining the immutability and decentralization that PoW guarantees. This framework lays the groundwork for Damage Token, a non-Newtonian asset designed to tokenize and verify behaviors, incentivizing accountability in a way that aligns with Bitcoinâs principles.
Damage Token: The Case for PoW and Verifiable Integrity
Damage Token, an AEX9 token built on the Aeternity blockchain, represents a new breed of non-Newtonian assets that thrive on mathematical certainty and verifiable behavior. Unlike speculative PoS systems that lack intrinsic resilience, Damage Token leverages Aeternityâs PoW foundation to ensure:
-
Immutability: All verifications and behaviors recorded via Damage Token are immutable and tamper-proof, thanks to PoW consensus. This ensures that participants in the ecosystem can trust the systemâs data and outcomes.
-
Incentivized Accountability: Damage Token introduces a model where behaviors (such as software testing, milestone completion, or conflict resolution) can be immutably verified and tokenized. Participants are incentivized to contribute positively, as their actions directly translate into payouts tied to provable outcomes.
-
Resilience Under Pressure: Like Bitcoin, Damage Token thrives in hostile environments. Regulatory scrutiny, competitive pressure, or market turbulence only highlight its unique value proposition: a verifiable, decentralized system immune to central authority or co-option.
-
Alignment with Bitcoinâs Vision: By utilizing Aeternityâs PoW architecture, Damage Token aligns with Bitcoinâs philosophy of trustless systems. This ensures the tokenâs utility and security are not compromised by centralization risks or reliance on wealth-based governance (a flaw inherent in PoS).
The Failures of PoS and the Importance of PoW
As Bitcoin and Damage Token continue to thrive, the failures of PoS systems like Ethereum become increasingly apparent. PoS centralizes control in the hands of large stakeholders, making networks vulnerable to censorship, collusion, and regulatory capture. These systems lack the external energy-backed security that PoW provides, making them brittle and susceptible to manipulation.
In contrast, PoW systems like Aeternity and Bitcoin externalize security through energy expenditure, creating a neutral, trustless environment where no single entity can dominate the network. For Damage Token, this ensures that every verification, behavior, and transaction remains free from undue influence, preserving the integrity of the ecosystem.
Non-Newtonian Assets and Mathematical Certainty
Both Bitcoin and Damage Token exhibit behaviors that reflect their non-Newtonian nature. Small inputsâlike increased adoption or the resolution of conflicts via Damage Tokenâcan generate outsized impacts. This phenomenon is driven by mathematical principles, including:
-
Exponential Growth: Network effects drive the adoption of Bitcoin and Damage Token, where each new participant amplifies the systemâs value quadratically, as per Metcalfeâs Law.
-
Halving Dynamics and Supply Scarcity: Bitcoinâs halving cycles are mirrored in Damage Tokenâs fixed supply of 42 million tokens. This scarcity creates long-term value and ensures that utility, not inflation, drives adoption.
-
Emergent Behavior: Both assets operate in decentralized systems governed by chaos theory, where minor eventsâlike a developer joining DamageBDD or a nation adopting Bitcoinâcan cascade into massive structural changes.
Damage Token in a Hostile Landscape
In todayâs financial and technological environment, non-Newtonian assets face relentless attacks. Incumbent systems resist the rise of decentralized alternatives through regulatory crackdowns, control over fiat on- and off-ramps, and energy consumption narratives. Yet, these attacks often backfire, driving innovation and adoption instead of suppression.
Damage Token, built on Aeternityâs PoW foundation, is uniquely positioned to resist these pressures. By incentivizing verifiable behaviors, it creates a system where trust, accountability, and resilience are rewarded. Whether itâs verifying software quality through DamageBDD or facilitating peace initiatives, Damage Token demonstrates that PoW-backed assets can transform hostile environments into opportunities for growth.
Conclusion
Bitcoin is the flagship of non-Newtonian assets, a pioneer of resilience and exponential growth in the face of adversity. However, the rise of alternatives like Damage Token on Aeternityâs PoW blockchain showcases how this ethos can be extended to new domains, from software verification to incentivized accountability.
In a world increasingly shaped by centralization and coercion, non-Newtonian assets offer a path to freedom, resilience, and trust. By embracing PoW, Bitcoin and Damage Token ensure that a slight push is all they need to achieve terminal velocityâchanging the trajectory of global finance and human behavior in the process.
-
-
@ 0ce97fba:4f9081a3
2025-01-26 01:48:00He walked the decaying streets; his curious expression masked a lifetime of hardship. The city of Bethada spread before him, a tangled maze of buildings and passages clinging to the surface of Mool. This settlement-turned-city once thrived as humanity expanded throughout the galaxy but was now an almost forgotten backwater outpost. A thin crescent of reflected sunlight hugged the horizon as the sun dipped behind the gas giant, casting the lunar city in a soft glow.
âHey, Mr. Fannec!â A voice from across the street hailed him. The human scowled; he hated being called âMr. Fannec.â He waved an arm in acknowledgment but didnât break stride, eager to leave the concrete and steel jungle behind for the day.
Robert Fannec grew up in a crowded housing unit on Mool, raised by his grandmother, while his mother went to work long hours to scrape by. From a young age, he learned that life was difficult and one should take respite where possible. He lived on the outskirts of Bethada City, barely getting by, as he grew up in poverty. His mother worked to exhaustion but failed to improve their living conditions.
âYa know, Bobby-boy,â said Pete, the local unkempt homeless man whom Robert was friendly with, âThis world is reminiscent of a less-than-ideal sandwich, the bread stale and the cheese nothing to write home about. One is left pondering if their hunger is clouding their judgment or if there isnât much to be thrilled about.â
Robert met the man when he first arrived in Bethada as a young teen; although Robert would not consider them close friends, a particular understanding drove him to keep checking up on the older man. Indeed, life was a struggle for Pete, an elderly citizen, amidst the chaos of the metropolis. Plus, theyâd talk about random topics such as music or history during their visits, which made those times personal rather than plain help alone from Robert.
âCouldnât have said it better myself,â he replied, half-smirking. âOne day, weâll get some fresh ingredients around here.â
âHa! Iâll believe it when I see it.â Pete laughed, shaking his head.
âMe too, Pete. Me too.â The heaviness of the townâs stagnant air pressed on his back as he nodded and walked down the street.
Robertâs face contorted as he inspected the town. It resembled a knockoff designer watch; instead of shoddy craftsmanship and cheap parts, it had abandoned storefronts and peeling paint. He let out a hearty chuckle at the comparison. As he wandered through the decrepit streets, he wondered what treasures lay beyond these crumbling walls.
âDamn shame,â Robert said, taking in the breathtaking landscape before him. âNature got the memo about beauty, but Bethada sure didnât.â
âHey, Rob.â One of his coworkers waved as they clocked into their shift at the local industrial farm. âYou daydreaming again?â
Responding with a grin, Robert shoved his hands into the pockets of his worn coveralls. âHey, Dave. The way this place looks, itâs a wonder we havenât all packed up and moved to a better neighborhood.â
âTell me about it.â Dave chuckled, pulling on his protective gloves. âBut then, whoâd keep these machines running? Theyâre almost family, after all.â
âOnly if your family is a ragtag group of misfits held together by sheer willpower.â Robertâs eyes crinkled in amusement.
âYou got me there.â
The atmosphere was filled with the howl of steam, engines, and other loud machinery as their shifts began;Â the high-pitched note of pressure released into a valve opening providing a familiar backdrop to their daily lives.
The other workers chattered about their outside lives, which was a welcome distraction from the monotony of work. Family adventures, weekend getaways, and hobbies or creative outlets were among the stories shared to describe how they spent their spare time. Robert kept his distance as snippets of their conversations reached him.
For Robert, the idea of discussing personal matters with his peers was uncomfortable. He struggled to bridge the gap between himself and his co-workers, unable to relate to their shared interests in such pastimes. They were experiences he could never relate to, as he had grown up too fast due to his familyâs financial struggles. As a result, he put more effort into getting along with the machines than with his fellow humans. He considered the equipment to be more dependable than any human friend, even if some machines were beyond repair or had been handled in a careless manner. But for him, the genuine excitement started when the work whistle blew, signaling the end of another grueling day.
âAbout time!â He wiped the sweat off his face. He often daydreamed about heading to the range to take out some frustration.
âMan, you love that shooting range, donât you?â Daveâs voice had a hint of envy.
âSure do,â Robert said, shrugging off his coveralls. âItâs the one place where I feel like Iâm actually in control and not another cog in this rusted-out machine of a city. I donât have to worry about life, exes, debt, nothinâ.â
âIâm hopeful that one day youâll be able to leave this place behind. Start off somewhere new.â Dave said, slapping Robert on the back.
âHereâs hoping.â His eyes were locked on the horizon as if he could see himself leaving this hellhole. He was off to the local shooting range, where he could pretend everything still had order.
After almost being run over by a white hover van while crossing the street, Robert arrived at his sanctuaryâs shooting range. The aroma of gunpowder, battery acid, and cut grass mingled as he reached his usual spot. Robert found it delightful compared to Bethada Cityâs typical mildew and burnt leather odor.
âAlright, letâs dance,â he said, loading his trusty rifle with practiced ease. His rifle was a simple affair that allowed Robert to vent his frustrations on targets. He was a decent shot; at least, that is what he thought of himself.
Squeezing the trigger, firing off round after round. The targets quivered under the onslaughtâa symphony of destruction played by the percussion section of his lifeâs dull and sad orchestra.
When he was still a teen, he found abandoned buildings around Bethada. Heâd take his rifle and practice shooting at bottles, furniture pieces, walls, and whatever appeared. His mother and grandmother were furious when they found out, but that didnât stop him from terrorizing bottles and paper targets.
âTake that, you cylindrical bastards,â he said, landing a satisfying shot on the smallest target. He was absorbed in his practice, not thinking about his lackluster life.
His rifle was a standard design of a powered weapon. The long barrel gun accelerated hunks of metal via a magnetic rail system, unlike other, more exotic armaments that used energy to produce high-speed plasma rounds. The sound of a round from this rifle would startle any man.
âStill the targets, if I had to guess,â came a raspy voice behind him. Turning around, Robert saw Pete. His beard was a patchwork quilt of gray and white strands, and his clothes had more holes than fabric.
Pete lived near the range because he realized the people who would frequent such an establishment would be well-armed and well-disciplined, making it a safe spot compared to other less savory locations.
âAh, Pete, my favorite critic,â Robert joked, setting down his weapon. âWhat brings you here today?â
âSame thing that always does,â Pete said, scratching his chin. âThe sweet sound of gunfire, the scent of ambition, and a hankering for some olâ fashioned conversation.â
âStill working on that novel?â Robert knew that Pete had been âworkingâ on it for years.
âIndeed, young Robert. Though I fear my magnum opus may never appear in daylight, trapped as it is in the literary purgatory between my brain and the page.â
âHey, at least itâs got company in there, right?â Robert laughed at his joke. âYouâve got a ton of unwritten works in there, right?â
âTrue enough,â Pete said, a sparkle in his eyes and tales left untold. âSpeaking of company, howâs your aim today? Plan on shootinâ repo-men?â
âPretty good, if I do say so myself. The grouping on the smallest target isnât the best Iâve done, but overall, I hit what Iâm aiming at.â Ignoring the quip about Robert shooting repo men. Embarrassed that he could not manage money as well as other people. He still wasnât able to constrain his urges to buy things he couldnât afford.
âAh, a prodigy in our midst!â Pete performed a mock bow.
Robert didnât always know how to handle Pete. So the younger man looked at him with an odd expression.
âYou remind me of my son.â A sad smile flickered across Peteâs weathered face. âHe was an odd duck, too, always tinkering with machines and dreaming big. He went off to work in the mines when he was a boy. Never saw him again after the collapse.â Pete shrugged, fidgeting with a broken timepiece in his hands.
âSorry to hear that. How old would he be?â
âAbout your age, I guess.â
âI bet I would have liked him.â
âI would like to think so, too. Youâre both good kids.â
After a brief conversation about Pete being unable to find one of his friends, they exchanged farewells. Robert packed his rifle into his worn bag and exited the street, where he focused on his thoughts and started making his way home.
The sun and planet started to set, and their fading orange light gave the sky a beautiful hue. Robert took in the scenery as he strolled, not paying attention to one of the sleek white hover vans that had become so popular in the past months. It zipped away through the air as he watched before returning to his thoughts on what he would have for dinner.
The building he lived in stood like a weary sentinel at the townâs boundary, a hodgepodge of mismatched bricks and creaking metal that had long ago lost any semblance of architectural grace. Despite its weather-beaten exterior, the residents maintained a veneer of pride, as evidenced by the door with a fresh coat of paint.
Upon entering his small apartment, Robert was greeted by the neutral aroma of cleanliness, not too sterile but not fragrant enough to be noticeable. The scent was as unremarkable as beige. A fragrance that announced, âI am clean and functional, but please donât expect any frills.â
He lived alone, which was considered a luxury tantamount to owning a solid gold toilet brush. He cherished living alone, deeming it a worthwhile trade-off to sacrifice financial stability for solitude.
His independence was threatened when he received an eviction notification last week. It had been weeks since his rent had been due, and the creditors were no longer in the mood to accept any more late payments. Unless Robert could find a way to earn the money necessary for back-rent and tenancy fees, he would have to pack his belongings and leave his beloved apartment for good.
Robert switched on his computer to search for night jobs but was soon distracted by a video that had popped up. The government shared an informative clip, motivating citizens to be proactive and responsible financially.
Robert recognized a humanoid alien named Damian Krestov, with pale yellow skin and a texture Robert couldnât place; he didnât know where the man was from. He almost spoke to Robert as if aware of his situation. Damian spoke about taking responsibility and believing and trusting in yourself when times are demanding because one must never give up hope.
As he spoke, Damian gestured enthusiastically to express himself and emphasize his points. This man believed every word that came from his mouth. After watching out of curiosity, Robert realized that it was all a propaganda video in disguise; he didnât pay enough attention to understand the actual goal of the ad, but he knew it wasnât âjust an ad.â
His green eyes fell on a colored flyer that someone had slipped under his door while he was stretching out his legs. It bore the headline: âPrestigious Shooting Competition on Zorath!â Beneath the flashy text, an illustration portrayed a muscular figure raising a gun in triumph while standing on top of a mountain of defeated foes.
Robert scoffed; he was skeptical of such an over-the-top advertisement, and one delivered on paper door-to-door. Still, a twinge of excitement hit him as he read the details: a grand prize of one million credits and a chance to become a professional shooter, whatever that means. Despite his initial skepticism about the ridiculous flyer, his heart raced at the thought of escaping his less-than-ideal life on Mool, proving his skills, and making enough money to not worry about those debt collectors.
Questions swirled in Robertâs mind, but none could snuff out the flame of hope that had ignited within him. As he crumpled the flyer in his hand, he imagined the look on Peteâs face if he were to win the competition and return to Mool with a million credits and a newfound sense of freedom.
âWho designed this? A five-year-old with a crayon?â Robert scoffed. Yet, despite the ridiculous presentation, he couldnât ignore the Sub-Lunar Protective Service logo, a shield with âSLPSâ stamped in the bottom right corner.
âWhat is a government agency running a shoot for?â It wasnât news to Robert that the agency would run events, but it still perplexed him why.
âAlright, Fannec,â he said, attempting to rationalize the situation. âLetâs say this is legit. Youâve spent your whole life shooting targets at the range. You can leave this shit moon and pay off some debts.â
As he weighed the pros and cons, his eyes flicked back to the grand prize: one million credits. With that money, his life could undergo a complete metamorphosis, rescuing him from this decrepit city and launching him into an existence he had only imagined. But was it worth the risk of taking time off work? He was already behind by several weeksâ rent and couldnât afford time off.
âItâs a risky gamble.â He thought. âBut it might be my ticket out of this mess.â He rubbed his temples. âWhy couldnât they have made a normal ad instead of this cartoonish mess? Is this some cruel joke?â
Deep down in his subconscious, he was aware he had already decided. His desire to escape was far more potent than any doubts he might have about the competitionâs legitimacy or his abilities.
âOkay,â he said, preparing himself for the decision ahead. âWorst-case scenario, I lose the apartment, and Iâm the laughingstock of the city for a while. Best case, I walk away with a million credits, which would pay off all of my debt and buy me a new life somewhere else.â
âAlright, letâs see what kind of mess Iâm getting myself into.â Pulling up the competition details on his comm device, he scrolled through the information, his eyebrows furrowing with each new bit of it. âItâs scheduled during storm season on Zorath. Do these event planners even know how to read a weather report?â
The thought of traveling to a distant planet during its tumultuous storm season made Robertâs stomach churn. He had never left Mool before, and while he was confident in his shooting skills, everything else about this trip was uncharted territory.
This kind of shoot requires more than marksmanship. To outsmart his rivals, Robert must think fast and use the landscape and surroundings to gain an advantage. Storms would make that difficult, and Robert didnât practice a lot of situational shooting. Sniper shooting was his strong suit, which he practiced most.
âAt least itâll be a memorable experience.â
Robert couldnât shake off his hesitation. His worries extended beyond the storms. He would be up against marksmen who possessed more shooting and life experience. He stopped pacing and stared at his reflection in the window. The city lights of Bethada flickered in the glass, casting a melancholy glow over his face. His eyes were tired but resolute.
The competition didnât worry him; the entry fee wasnât refundable. The price was going up soon to encourage more people to register early. He had to decide, and quick.
âI guess if these guys are dumb enough to hold a shooting competition during one of the worst storm seasons in the Confederation, then theyâre dumb enough to let me win.â
He chuckled, imagining the event planners huddled over a meteorological terminal, unaware of the impending storm clouds. The United Confederationâs government should have caught such an obvious detail. Perhaps they thought the turbulent weather would excite or challenge the competition. Which would be something that a management or administrative employee would think of.
âPerhaps the storms will scare off some of the competition,â his mind was scrambling with images of seasoned marksmen fleeing in terror from the torrential rains and howling winds. âYeah, I bet half of âem will drop out before they even fired the first shot.â
His chest swelled with newfound confidence. Sure, he had never left Mool before, but that didnât mean he couldnât hold his own on a strange, stormy planet. After all, he spent countless hours honing his skills at the local shooting range. And he always dreamed of fleeing the drudgery of his dull life in this rundown city on a forgotten moon.
âAlright, enough daydreaming,â he chided himself, shaking off his momentary lapse into fantasy. âLetâs make this official.â
Robert picked up his comm device and navigated to the registration page for the competition. He paused for a moment. The magnitude of the decision he was about to make was massive. He would have to prepare for missing out on some income. Once he registered, there would be no backing out, no second-guessing. The entry fee was substantial, but it would have to be bought on credit, like everything Robert paid for.
With a final deep breath and a surge of determination, Robert tapped the âRegisterâ button on his comm device. A cheerful confirmation message popped up on the screen: âCongratulations! You are now officially registered for the Zorath Shooting Competition!â It was followed by information about equipment checks, times, and locations.
âWell, this will be fun.â
-
@ 16d11430:61640947
2025-01-26 01:03:44The colonial fiat systemâan intricate network of financial, social, and psychological constructsârelies on its ability to manipulate collective behavior, sustain economic dependency, and enforce systemic conformity. For the individual navigating this landscape, the brain becomes both a target and a tool. The question arises: how can the human brain, with its remarkable capacity for autonomy and adaptability, defend itself against the manipulative information siege of such a system? The answer lies in understanding and leveraging the brain's strengths to build defenses, foster resilience, and reclaim personal sovereignty.
Understanding the Siege: The Colonial Fiat System's Manipulative Arsenal
The fiat system exerts its control through psychological and informational tactics designed to overwhelm the individual mind:
-
Fear and Uncertainty: Constant narratives of inflation, economic crises, and scarcity exploit the brainâs amygdala, triggering anxiety and compliance.
-
Hyperconsumerism: By hijacking the brainâs reward pathways, the system fosters addiction to materialism, making individuals dependent on endless cycles of consumption.
-
Herd Mentality: Swarm consciousness, driven by social norms and media influence, suppresses critical thinking and reinforces collective conformity.
-
Short-Term Thinking: The system capitalizes on impulsive decision-making, eroding long-term planning and independence.
To resist these tactics, the individual brain must become a fortressâfortified by critical thought, emotional regulation, and intentional living.
Fortifying the Mind: Strategies for Resilience
- Cultivate Cognitive Autonomy
At the heart of resistance lies the brainâs ability to think independently. By engaging the prefrontal cortexâthe seat of logic, reasoning, and decision-makingâindividuals can reclaim their mental autonomy.
Question Narratives: Evaluate the motives behind information presented by media, corporations, and governments. Ask: Who benefits from this message?
Strengthen Critical Thinking: Regularly challenge your own assumptions and seek out diverse perspectives to avoid echo chambers.
Learn the System: Understand how the fiat system functions, from its reliance on inflationary policies to its ties to debt-based economies. Knowledge dismantles manipulation.
- Master Emotional Regulation
The colonial fiat system thrives on fear, uncertainty, and the dopamine-driven cycles of consumerism. Emotional regulation shields the brain from these manipulative forces.
Practice Mindfulness: Techniques such as meditation and deep breathing calm the amygdala, reducing reactivity to fear-based propaganda.
Delay Gratification: Strengthen your ability to prioritize long-term rewards over impulsive consumption, engaging the brainâs executive functions.
Build Emotional Awareness: Recognize when your emotions are being manipulated, whether through scarcity marketing or fearmongering headlines.
- Rewire Reward Systems
The brainâs reward pathways, driven by dopamine, are a primary target of the fiat systemâs consumerist messaging. Reclaim control by redefining what brings you fulfillment.
Seek Intrinsic Rewards: Shift focus from material possessions to meaningful activities, such as learning, creating, and connecting with others.
Limit Exposure: Reduce consumption of advertising and social media, which are designed to exploit your reward circuits.
Adopt Sound Money Principles: Embrace financial practices that align with long-term stability, such as saving in Bitcoin or other deflationary assets.
Adaptability: The Key to Outwitting the System
- Harness Neuroplasticity
The human brainâs neuroplasticityâits ability to rewire and adaptâoffers a powerful tool for resisting the systemâs influence.
Unlearn Dependency: Challenge habits and beliefs that tie your self-worth to fiat-driven success metrics, such as status symbols or debt-financed lifestyles.
Learn Decentralization: Educate yourself on alternatives to fiat systems, such as Bitcoin, decentralized finance, and peer-to-peer economies.
Adopt Resilient Skills: Develop capabilities that enhance your independence, such as critical financial literacy, coding, or permaculture.
- Reclaim Time and Focus
The fiat system thrives on distraction, keeping individuals too overwhelmed to question its constructs. Reclaiming focus is an act of rebellion.
Set Boundaries: Allocate time for deep work and personal growth, free from the constant noise of digital media.
Practice Digital Minimalism: Use technology intentionally, ensuring it serves your goals rather than consuming your attention.
Value Rest: Recognize that productivity is not your sole measure of worth. Rest and reflection strengthen your cognitive resilience.
A Community of Sovereignty: The Collective Defense
While the individual brain is formidable, collective resistance amplifies its power. The social brain network enables connection with others who share a vision of autonomy and decentralization.
Build Like-Minded Networks: Engage with communities that value critical thinking, self-reliance, and alternative systems.
Share Knowledge: Spread awareness of the manipulative mechanisms of the fiat system, empowering others to resist.
Collaborate on Solutions: From supporting decentralized technologies to creating resilient local economies, collective action dismantles dependency.
Finding Anchors: Philosophy, Purpose, and Meaning
The brainâs capacity for self-reflection and existential thought provides a deep well of strength. By anchoring your life to principles and purpose, you can resist the shallow incentives of fiat-driven systems.
Explore Philosophical Anchors: Ideas such as sound money, personal sovereignty, and ethical living provide a framework for resistance.
Seek Transcendence: Practices like spirituality, art, and nature connection foster a sense of purpose beyond materialism.
Define Success on Your Terms: Reject fiat-driven definitions of success, focusing instead on values like freedom, creativity, and meaningful relationships.
Conclusion: The Brain as a Bastion of Sovereignty
The colonial fiat systemâs manipulative siege is formidable, but the human brain is a far greater force. Through critical thinking, emotional regulation, adaptability, and purpose, the brain has the power to resist the swarm consciousness that perpetuates systemic dependency. By building mental fortresses, individuals can reclaim their autonomy, foster resilience, and pave the way for a decentralized, self-sovereign future.
The battle for freedom begins not in institutions but within the neural networks of the individual brain. Each mind fortified against manipulation is a victory for personal sovereigntyâand a step toward a world where human potential thrives beyond the shadow of fiat control.
-
-
@ d3052ca3:d84a170e
2025-01-25 23:17:10It seems to me that the primary opposition to ecash from bitcoiners comes from the belief that lightning will enable self-custodial micropayments for the masses. Many lightning enthusiasts see ecash as competition that will eliminate this technological outcome (whether they admit it or not).
I understand the motivation for this line of reasoning but I don't see things this way at all. Ecash is a superset of lightning. Cashu literally doesn't have a spec for on-chain transactions (yet!). Everything cashu accomplishes is built on the back of lightning. Standing on the shoulders of giants.
I don't believe that ecash will take away market share from self-custodial lightning because lightning is not a good technology for self-custody. The high overhead costs of running your own node create a natural incentive for a semi-centralized hub and spoke network graph. It just makes economic sense for many users to share a lightning node. It doesn't make economic sense for individuals to bear this cost alone.
This stacker news post is the best writeup on this topic: https://stacker.news/items/379225
It comes from a builder who struggled with these issues for years and learned the shortcomings of the tech first hand. Notice they experimented with ecash as a solution to these problems before they burned out and pivoted to save the company.
Ecash is a superset of lightning. It extends the capability and reach of the lightning network. Without ecash, I don't believe we can achieve bitcoin mass adoption. You can't jam a square peg into a round hole.
We still have a need for self-custody of "small" amounts of bitcoin. I put small in quotes because the block size limit and the fee market it creates impose a fundamental constraint on the minimum practical size of a UTXO. This limit is pegged to the unit of bitcoin. As bitcoin increases in value the minimum size for an on-chain transaction will grow in value as well. You can send $10 worth of bitcoin on-chain today but will this be true in 10 years when the price is much higher? 100 years?
If the current exponential trends hold, we will soon price out the majority of humanity from owning a UTXO. This is bad. Like really bad. "Bitcoin is a failure" bad. This is the motivation for my posts about scaling on-chain usage to 10 billion people. I believe we will need to radically rearchitect bitcoin to achieve this goal.
Lightning is not up to the task. We should leverage lightning for what it's good at: gluing together different self-custodial bitcoin service providers. We should leverage ecash for what it's good at: peer-to-peer electronic cash micropayments. IN ADDITION we also need to start seriously looking at new ideas for scaling self custody to "small" amounts of bitcoin. I am very optimistic that we can solve this problem. There are a number of promising avenues to pursue but I think first we need to move the Overton window ~~beyond the idea of mass adoption of self-custodial lightning~~ regarding on-chain scaling.
Edit: I think the original Overton window statement was incorrect. If on-chain fees stay low then self-custodial lightning or something similar is a much better prospect.
Just my 2 sats...let me know what you think. Keep it civil or be muted.
-
@ 1cb14ab3:95d52462
2025-01-25 23:13:34Tree branches. 4' x 4 [Castle Pines, USA. 2016]
Introduction
Sanctuary offers a layered view of resilience, juxtaposing the green expanses of the Sanctuary Golf Course with the majesty of Pikes Peak and the scars of past destruction. Framed by the lens, this work explores the tension between human intervention and natureâs cycles of renewal.
Site & Placement
Perched at Daniels Park in Castle Pines, the lens focuses on the rolling terrain of the golf course, leading the eye to the distant peak. The surrounding brush, which once burned in a major fire, adds depth to the narrative of renewal. A bench, positioned for an unobstructed view, invites visitors to sit and reflect on the landâs capacity to heal and endure.
Impermanence & Integration
As an ephemeral installation, Sanctuary embodies natureâs cycles of destruction and rebirth. The materialsâbranches and rockâwill eventually decay and return to the earth, a process that mirrors the recovery of the landscape itself after fire. This impermanence underscores the delicate balance between human influence and natural forces.
Reflection
Sanctuary serves as a reminder of both the fragility and resilience of the world around us. It invites viewers to pause and consider the interplay of destruction and growth, human and natural, as they gaze upon a scene shaped by both time and transformation
Photos
More from the 'Earth Lens' Series:
Earth Lens Series: Artist Statement + List of Works
"Looking Glass" (Earth Lens 001)
COMING SOON: "Platte" (Earth Lens 004)
COMING SOON: "Grandfather" (Earth Lens 005)
COMING SOON: "Chongming" (Earth Lens 006)
More from Hes
All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.