-
@ 1833ee04:7c4a8170
2025-02-04 15:14:03The international race for Bitcoin strategic reserves is just getting started.
If you’re stacking now, you’re still incredibly early.
At $100k per Bitcoin, it’s practically free for anyone who truly understands how massive this shift is.
Think back to when paper currency was introduced, people had to trade their gold for paper bills. Many laughed, saying, Who’s going to trust these worthless pieces of paper as money?
Yet today, you sell your time to earn these paper bills while your government can print an unlimited amount at will.
The world is returning to a gold standard. But this time, it’s Gold 2.0 which is Bitcoin.The international race for Bitcoin strategic reserves is just getting started.\ \ If you’re stacking now, you’re still incredibly early.\ \ At $100k per Bitcoin, it’s practically free for anyone who truly understands how massive this shift is.\ \ Think back to when paper currency was introduced, people had to trade their gold for paper bills. Many laughed, saying, Who’s going to trust these worthless pieces of paper as money?\ \ Yet today, you sell your time to earn these paper bills while your government can print an unlimited amount at will.\ \ The world is returning to a gold standard. But this time, it’s Gold 2.0 which is Bitcoin.
-
@ 5af07946:98fca8c4
2025-02-04 15:13:27Syādvāda, also known as the theory of conditional predication, is a fundamental concept in Jain philosophy that bears some intriguing similarities to modern concepts of probability.
Conditional Prediction system
Syādvāda is a theory of epistemological relativism that forms the basis of Jain logic. The term "syād" in Sanskrit means "may be" or "perhaps," and in the context of syādvāda, it translates to "in some ways" or "from a perspective". This theory asserts that reality is complex and multifaceted, and no single proposition can fully express its nature.
Saptabhangi: The Seven-fold Predication
The core of syādvāda is manifested in the process of Saptabhangi, or seven-fold prediction. This approach examines reality from seven different conditional and relative viewpoints:
- Syādasti (maybe, it is)
- Syānnāsti (maybe, it is not)
- Syādasti nāsti (maybe, it is, and it is not)
- Syādavaktavya (maybe, it is indeterminate)
- Syādasti avaktavya (maybe, it is and is indeterminate)
- Syānnāsti avaktavya (maybe, it is not and is indeterminate)
- Syādasti nāsti avaktavya (maybe, it is, is not, and is indeterminate)
Connections to Probability
Syādvāda shares conceptual similarities with Probability theory:
- Non-absolutism: Like probability theory, syādvāda acknowledges uncertainty and rejects absolute statements. However, it asserts that there are only seven categories necessary and also sufficient to exhaust all possibilities of knowledge!
- Conditional nature: Both syādvāda and probability deal with conditional statements and chances
- Multiple outcomes: Syādvāda's seven-fold prediction can be seen as analogous to considering multiple possible outcomes in probability.
- Indeterminacy: The fourth category of syādvāda, "avaktavya" (indeterminate), has been interpreted by some scholars as having relevance to the concept of probability.
An Illustrative Example
Consider the tossing of a coin:
- "It is head" (now) - Syādasti
- "It is not-head" (on another occasion) - Syānnāsti
- "It is, and it is not" - Syādasti nāsti
- "It is indeterminate" (before the toss) - Syādavaktavya
This example demonstrates how syādvāda's categories can be applied to a situation involving uncertainty, similar to how we might approach it using probability theory.
Historical Significance and Modern Relevance
Syādvāda was well-developed by the 6th century AD and received significant attention in medieval Indian logic. It is believed that it was based on astrological principles of Maharishi Parashara - the father of ancient astrology.
-
@ 5d4b6c8d:8a1c1ee3
2025-02-04 14:14:39My best day yet: it's been 17 hours since I ate or drank anything.
I'm about to have my coffee and I'll probably eat soon after that.
I would have gone longer without food yesterday, but we had cookies in the house and I wanted to eat some before I finished my morning coffee.
Fast February Data Day 1: 14 hours (13 dry) Day 2: 15 hours (14 dry) Day 3: 17 hours (16 dry) Day 4: TBD (17 dry)
originally posted at https://stacker.news/items/875506
-
@ 916a7ab7:146bb83e
2025-02-04 13:35:11It was not ago that my life was simpler than it is today.
I remember being a simple clone, droning on through a structured life as I'd been trained to do since birth.
Like most people I knew, I was raised in a world where you were mentally prepared for a conceptually simple life: 1. Finish high school, if possible. 2. Go to college, if possible. 3. Find a job. 4. Earn money. 5. Pay bills. 6. Get married. 7. Start a family. 8. Pay more bills. 9. Raise family and (hopefully) launch the kids. 10. Plan to retire, but expect to work into your 70s.
It was a programmed formula for life. A generational blueprint, if you will. Sure, there would be unpredictable details, but I expected my life to follow this path.
As I plodded along through my fairly boring life, I checked most of those things off the list. High school was easy, but getting off the farm was not. Enlisting in the military solved that problem, and the pay in the mid-1990s wasn't bad for a 17 year old kid with no bills. I got paid every two weeks, lived in the barracks, and spent most of my money on booze. Life was good, and I had no other purpose than to do my job and keep earning money.
Before I knew it, though, everything changed. I got married, had some kids and accumulated a mountain of debt. Like my parents before me, I was stuck in a never ending cycle of working my ass off, paying bills, buying food, and trying to save what little money was left over for a future that was unpredictable at best. Financial struggles stressed our marriage, the kids continued eating more and more food, and then 2008 tanked the value of our home. That was the first nudge that stirred my oblivious slumber.
And there was more to come. Rising taxes, inflation, the clown show at the federal reserve, the wars funded by central banks, an astronomical national debt, and the burdens of our mistakes weighing down the futures of our children. Not to mention a federal government that actively seeks to censor, suppress, and financially imprison its own people. The times exuded chaos.
Then a few months ago, I woke up...
It happened during an episode of The Tuttle Twins, a cartoon show from Angel Studios. I homeschool my three youngest kids, and I'd let them watch TV during lunch so I could grade some papers. This cartoon was new to me, but the kids liked the music and the crazy raccoon. As fate would have it, they ended up watching an episode about Bitcoin. This, of course, led to a long series of questions:
"Dad, what's Bitcoin?"
"Is Bitcoin real?"
"Do you have Bitcoin?"
"Can I get Bitcoin for allowance instead of dollars?"
I had no answers for these questions, so we started doing some research together. We turned on our Chromebooks and launched a barrage of web searches. After reading a bunch of articles I came away with the idea that Bitcoin might be a real thing. Later that evening, and after the kids were in bed, I couldn't stop thinking about Bitcoin. I honestly didn't understand half of what I read in those articles, which bothered me. I'm not a super smart guy, but I catch on to things pretty quickly, and I wanted to better understand what I'd read. I expanded my search to podcasts and YouTube videos.
I ended up listening to a couple episodes from a Bitcoin Veterans podcast. As a veteran myself, I figured that this group of Bitcoin-savvy veterans would be able to help me figure out all this madness. I was right. I quickly learned that the word "Bitcoin" was just the tip of the iceberg, and I quickly found myself falling through an endless rabbit hole. They pointed me in a lot of different directions, but they were all helpful. (If you're a US military veteran and want to connect with this group, find them at [bitcoinveterans.org].)
A couple months ago, I couldn't tell you the difference between a Bitcoin and a meme coin. I'd come across the phrase Bitcoin mining, and I just thought there was a special group of people who mined a special metal to create coins with a big "B" on them. Why couldn't they just use the metal we already mined? Sheesh! I thought nostr was a virus, and a Kraken was still a giant squid.
As of today, I'm happy to say that I've made a little bit of progress. Those things above no longer confuse me, and I actually have a little bit of Bitcoin now. Sure, I'm still trying to wrap my head around NFTs and figure out who the Pepe frog man is, but I'm no longer completely lost. Not to mention, I just spent most of the last 24 hours figuring this whole nostr thing out, which excites me. I kind of missed the boat on the big name social media platforms, so I'm looking forward to this new decentralized approach to things.
For now, I'm just happy to be awake. Finally. I see the need for decentralization and the necessity of moving away from fiat monies. I don't have much to offer except my intellect and my love of writing, but I'm here to serve in any way that I can.
-
@ ef1e59bf:b686587d
2025-02-04 11:15:10Key Insights Explained
While both systems provide innovative soilless growing solutions, the unique difference lies in their approach—hydroponics relies on a nutrient-rich water solution, whereas aquaponics integrates fish into the ecosystem to naturally supply nutrients. This not only impacts their cultivation techniques but also illustrates varying levels of sustainability and resource use.
In exploring these systems, one cannot help but consider the broader implications for urban agriculture. For those looking to adopt such systems, understanding key differences can significantly impact decisions on efficiency, cost, and ecological footprint.
What Is Hydroponics?
In hydroponics, we grow plants in water enriched with nutrients rather than soil. This method provides a controlled environment where the roots receive all necessary elements directly from the nutrient solution. It's fascinating how plants can thrive without ever touching the soil.
The benefits of hydroponics are impressive. We can achieve faster growth rates due to optimal nutrient delivery, and the space-saving designs, such as vertical farms, maximise small areas. Moreover, nutrient levels can be controlled precisely, ensuring plants receive exactly what they need.
What Is Aquaponics?
Aquaponics is an innovative system that blends aquaculture, which is the practice of raising fish, with hydroponics, the soilless cultivation of plants. In this symbiotic setup, fish waste serves as a natural fertiliser, supplying essential nutrients to the plants. In return, the plants help purify the water, creating a healthy environment for the fish.
This system is unique because it mimics natural ecosystems, enhancing sustainability. The dual benefits of growing plants and fish simultaneously make aquaponics an attractive option for those of us interested in sustainable agriculture and promoting organic cultivation practices.
Key Differences
Hydroponics and aquaponics each offer unique benefits and challenges. Understanding these systems requires examining their differences in nutrient sources, water usage, plant growth density, time to harvest, setup intricacies, and the types of produce they best support.
Nutrient Source
In hydroponics, plants receive nutrients through specially prepared solutions, often purchased from commercial suppliers. This method allows us to maintain a high level of control over nutrient balance, making precise adjustments as needed.
Aquaponics, by contrast, relies on fish waste to supply nutrients. This forms a more natural ecosystem, requiring biological processes like nitrification to convert waste into nutrients usable by plants. While this approach involves fewer chemical inputs and is more sustainable, it offers less control over nutrient levels.
Water Usage
Hydroponic systems excel in water efficiency by recirculating water, though they necessitate regular changes to keep nutrient solutions balanced. Despite their efficiency, water loss can occur through evaporation or leaks, which requires monitoring.
Aquaponics operates as a closed-loop system where water is continually recycled between the fish tank and plant beds, minimising waste. This setup further reduces water use due to natural filtration by plants, making it an incredibly water-efficient choice.
Grow Density
Hydroponics typically supports higher density plant growth, especially in vertical setups. This is ideal for cultivating leafy greens, herbs, and other fast-growing plants in compact spaces.
Aquaponics requires space for both fish and plants, which limits plant density. Although some plants may grow slower due to varying nutrient availability, this method offers the benefit of integrating fish care into the system.
Grow Time
In hydroponics, plants enjoy faster growth rates thanks to controlled nutrient and environmental conditions. These systems often facilitate shorter growing cycles compared to traditional farming, enhancing efficiency.
Aquaponics, while efficient, may experience slightly slower growth rates due to the time taken for natural nutrient conversion. Balancing fish growth with plant cycles adds an extra layer of complexity but is a rewarding experience for those willing to engage deeply with the system.
Set Up and Maintenance
Starting a hydroponic system is relatively straightforward, with pumps, nutrient tanks, and light management being primary needs. Regular checks of pH, nutrient levels, and water are essential yet generally simple.
Aquaponics demands more initial infrastructure and expertise due to the need for integrated fish tanks and plant systems. Balancing fish health and water quality with plant needs adds complexity, but long-term sustainability benefits are significant. Setting up these systems can seem daunting but offer reduced external nutrient input over time.
Produce Types
Hydroponics shines when growing leafy greens and herbs, achieving high success rates with crops like lettuce, basil, and spinach. These systems, however, have limitations when it comes to larger or more nutrient-demanding produce.
Aquaponics expands possibilities by supporting a broader range of plants, including fruiting ones such as tomatoes, alongside fish like tilapia or trout. This dual-production feature offers diverse yields, though the choice of fish can influence plant variety.
Which Is More Sustainable?
When we consider the sustainability of hydroponics, several factors come to mind. First, high water efficiency and space-saving designs make it attractive for eco-conscious growers. Yet, the reliance on artificial nutrients and the higher energy usage, particularly for lighting and pumps, may impact its overall eco-friendliness. These elements can sometimes offset the system’s environmental benefits.
In contrast, aquaponics offers a unique closed-loop system that naturally recycles waste. This can significantly reduce the need for external inputs, aligning well with principles of organic farming. While this method requires more space and careful maintenance for both fish and plants, it typically involves less chemical intervention, appealing to those seeking a more natural approach.
Let's compare the environmental impact of these methods:
-
Aquaponics might have a lower environmental footprint due to its natural nutrient cycle, reducing waste and chemical use.
-
On the other hand, hydroponics can be well-suited for urban environments or locations with limited resources, thanks to its efficient use of water and space.
Ultimately, deciding which system is more sustainable depends on specific circumstances and priorities. If natural nutrient cycles and less chemical intervention are valued, aquaponics might be favoured. Nevertheless, if water and space efficiency are paramount, especially in urban settings, hydroponics might be more suitable.
Hydroponics is a game-changer for sustainable farming, offering efficient water use, reduced land impact, and year-round crop production. Whether you're a beginner or an experienced grower, having the right tools and knowledge is key to success. Visit Hyjo for high-quality hydroponic systems, nutrients, and expert advice. Start growing smarter and greener with Hyjo today!
-
-
@ 177ff913:b25cacc0
2025-02-04 08:47:39NUX88 là một nền tảng giải trí trực tuyến nổi bật, mang đến cho người dùng những trải nghiệm thú vị và an toàn. Giao diện của NUX88 được thiết kế với phong cách hiện đại và tối ưu hóa cho mọi thiết bị, từ máy tính để bàn đến điện thoại di động. Người dùng có thể dễ dàng truy cập vào nền tảng và tận hưởng các dịch vụ giải trí mà không gặp phải bất kỳ khó khăn nào. NUX88 cam kết cung cấp một hệ thống ổn định với tốc độ truy cập nhanh chóng, giúp người dùng tham gia vào các hoạt động giải trí mà không lo bị gián đoạn.
Bảo mật là một trong những yếu tố quan trọng mà NUX88 luôn chú trọng. Nền tảng này sử dụng công nghệ mã hóa tiên tiến để bảo vệ toàn bộ thông tin cá nhân và giao dịch của người dùng. Dữ liệu tài khoản, thông tin thanh toán và các giao dịch đều được xử lý một cách bảo mật và an toàn tuyệt đối. NUX88 cam kết không chia sẻ bất kỳ thông tin cá nhân nào của người dùng cho bên thứ ba mà không có sự đồng ý rõ ràng. Nền tảng cũng liên tục cập nhật các biện pháp bảo mật mới nhất để ngăn chặn các mối đe dọa từ bên ngoài, tạo ra một môi trường giải trí trực tuyến an toàn và đáng tin cậy.
Với NUX88, dịch vụ chăm sóc khách hàng luôn được ưu tiên hàng đầu. Đội ngũ hỗ trợ của NUX88 luôn sẵn sàng giải đáp mọi thắc mắc và cung cấp sự trợ giúp cho người dùng 24/7. Người dùng có thể liên hệ với đội ngũ hỗ trợ qua nhiều kênh khác nhau như chat trực tuyến, email hoặc điện thoại. Đội ngũ chăm sóc khách hàng tại NUX88 được đào tạo chuyên nghiệp và tận tâm, luôn cố gắng mang đến sự hỗ trợ nhanh chóng và hiệu quả. Điều này giúp đảm bảo rằng mọi vấn đề của người dùng sẽ được giải quyết kịp thời và mang lại sự hài lòng cao nhất.
Bên cạnh việc cung cấp các dịch vụ giải trí chất lượng, NUX88 cũng đặc biệt chú trọng đến việc tạo ra các chương trình khuyến mãi hấp dẫn và ưu đãi đặc biệt cho người dùng. Các chương trình này không chỉ mang đến cho người tham gia những phần thưởng giá trị mà còn giúp nâng cao giá trị trải nghiệm. NUX88 luôn cập nhật các sự kiện khuyến mãi và ưu đãi mới, giúp người dùng có cơ hội nhận thêm nhiều lợi ích khi tham gia vào các hoạt động giải trí trên nền tảng. Những chương trình này thường xuyên được tổ chức để mang đến sự mới mẻ và hấp dẫn, khuyến khích người dùng quay lại và tận hưởng dịch vụ.
Cuối cùng, NUX88 cam kết mang đến một nền tảng giải trí trực tuyến đáng tin cậy và chất lượng. Với giao diện dễ sử dụng, bảo mật mạnh mẽ, dịch vụ chăm sóc khách hàng tận tâm và các chương trình khuyến mãi hấp dẫn, NUX88 là một sự lựa chọn lý tưởng cho những ai tìm kiếm một không gian giải trí an toàn và phong phú. Nền tảng này không chỉ cung cấp những phút giây thư giãn tuyệt vời mà còn đảm bảo sự an toàn, bảo mật tuyệt đối cho người dùng. NUX88 chắc chắn sẽ là một người bạn đồng hành đáng tin cậy trong mọi hành trình giải trí trực tuyến của bạn.
-
@ 177ff913:b25cacc0
2025-02-04 08:46:38MCW77 là một nền tảng giải trí trực tuyến uy tín, được thiết kế để mang đến cho người dùng trải nghiệm giải trí tuyệt vời và mượt mà. Với giao diện hiện đại, dễ sử dụng và tối ưu hóa cho cả thiết bị di động và máy tính để bàn, người dùng có thể dễ dàng truy cập vào nền tảng và tham gia vào các hoạt động giải trí. MCW77 cam kết cung cấp một hệ thống hoạt động ổn định và tốc độ truy cập nhanh chóng, đảm bảo không có gián đoạn trong suốt quá trình sử dụng dịch vụ. Người dùng sẽ được tận hưởng trải nghiệm giải trí liên tục và không gặp phải các vấn đề về kết nối hay tốc độ.
Bảo mật luôn là một yếu tố quan trọng tại MCW77. Nền tảng này áp dụng các công nghệ bảo mật tiên tiến, giúp bảo vệ mọi giao dịch và thông tin cá nhân của người dùng. Mọi dữ liệu, từ thông tin đăng nhập đến các giao dịch tài chính, đều được mã hóa và xử lý một cách an toàn. MCW77 cam kết không bao giờ chia sẻ thông tin cá nhân của người dùng cho bên thứ ba mà không có sự đồng ý rõ ràng. Nền tảng này cũng liên tục cập nhật các biện pháp bảo mật mới để chống lại các mối đe dọa từ bên ngoài, đảm bảo người dùng luôn có một không gian giải trí an toàn và đáng tin cậy.
Một yếu tố không thể thiếu trong mọi nền tảng giải trí trực tuyến là dịch vụ khách hàng. MCW77 hiểu rõ tầm quan trọng của dịch vụ hỗ trợ và luôn cố gắng nâng cao chất lượng chăm sóc khách hàng. Đội ngũ hỗ trợ của MCW77 luôn sẵn sàng giải đáp mọi thắc mắc và cung cấp sự trợ giúp 24/7. Người dùng có thể dễ dàng liên hệ qua nhiều kênh khác nhau như chat trực tuyến, email hoặc điện thoại. Đội ngũ hỗ trợ của MCW77 luôn đáp ứng nhanh chóng và hiệu quả mọi yêu cầu, từ đó mang đến sự hài lòng tuyệt đối cho khách hàng.
MCW77 cũng rất chú trọng đến việc mang đến các chương trình khuyến mãi và ưu đãi hấp dẫn cho người dùng. Những chương trình này không chỉ giúp người dùng tận hưởng thêm lợi ích khi tham gia vào các dịch vụ mà còn tạo thêm động lực và sự hứng khởi khi trải nghiệm nền tảng. Các sự kiện và khuyến mãi được tổ chức thường xuyên và luôn có những phần thưởng giá trị, giúp người dùng có thể tối đa hóa giá trị giải trí của mình. MCW77 cam kết liên tục cải thiện và cập nhật các chương trình khuyến mãi để mang đến những cơ hội tuyệt vời cho người dùng.
Cuối cùng, MCW77 không ngừng nỗ lực nâng cao chất lượng dịch vụ để đáp ứng nhu cầu giải trí của người dùng. Với sự kết hợp hoàn hảo giữa giao diện thân thiện, bảo mật mạnh mẽ, dịch vụ chăm sóc khách hàng chuyên nghiệp và các chương trình khuyến mãi hấp dẫn, MCW77 đã và đang trở thành một trong những nền tảng giải trí trực tuyến hàng đầu. Người dùng không chỉ được tận hưởng những phút giây thư giãn tuyệt vời mà còn được đảm bảo an toàn tuyệt đối khi tham gia vào các hoạt động trên nền tảng. MCW77 xứng đáng là lựa chọn lý tưởng cho những ai tìm kiếm một không gian giải trí trực tuyến đẳng cấp và đáng tin cậy.
-
@ e3ba5e1a:5e433365
2025-02-04 08:29:42President Trump has started rolling out his tariffs, something I blogged about in November. People are talking about these tariffs a lot right now, with many people (correctly) commenting on how consumers will end up with higher prices as a result of these tariffs. While that part is true, I’ve seen a lot of people taking it to the next, incorrect step: that consumers will pay the entirety of the tax. I put up a poll on X to see what people thought, and while the right answer got a lot of votes, it wasn't the winner.
For purposes of this blog post, our ultimate question will be the following:
- Suppose apples currently sell for $1 each in the entire United States.
- There are domestic sellers and foreign sellers of apples, all receiving the same price.
- There are no taxes or tariffs on the purchase of apples.
- The question is: if the US federal government puts a $0.50 import tariff per apple, what will be the change in the following:
- Number of apples bought in the US
- Price paid by buyers for apples in the US
- Post-tax price received by domestic apple producers
- Post-tax price received by foreign apple producers
Before we can answer that question, we need to ask an easier, first question: before instituting the tariff, why do apples cost $1?
And finally, before we dive into the details, let me provide you with the answers to the ultimate question. I recommend you try to guess these answers before reading this, and if you get it wrong, try to understand why:
- The number of apples bought will go down
- The buyers will pay more for each apple they buy, but not the full amount of the tariff
- Domestic apple sellers will receive a higher price per apple
- Foreign apple sellers will receive a lower price per apple, but not lowered by the full amount of the tariff
In other words, regardless of who sends the payment to the government, both taxed parties (domestic buyers and foreign sellers) will absorb some of the costs of the tariff, while domestic sellers will benefit from the protectionism provided by tariffs and be able to sell at a higher price per unit.
Marginal benefit
All of the numbers discussed below are part of a helper Google Sheet I put together for this analysis. Also, apologies about the jagged lines in the charts below, I hadn’t realized before starting on this that there are some difficulties with creating supply and demand charts in Google Sheets.
Let’s say I absolutely love apples, they’re my favorite food. How much would I be willing to pay for a single apple? You might say “$1, that’s the price in the supermarket,” and in many ways you’d be right. If I walk into supermarket A, see apples on sale for $50, and know that I can buy them at supermarket B for $1, I’ll almost certainly leave A and go buy at B.
But that’s not what I mean. What I mean is: how high would the price of apples have to go everywhere so that I’d no longer be willing to buy a single apple? This is a purely personal, subjective opinion. It’s impacted by how much money I have available, other expenses I need to cover, and how much I like apples. But let’s say the number is $5.
How much would I be willing to pay for another apple? Maybe another $5. But how much am I willing to pay for the 1,000th apple? 10,000th? At some point, I’ll get sick of apples, or run out of space to keep the apples, or not be able to eat, cook, and otherwise preserve all those apples before they rot.
The point being: I’ll be progressively willing to spend less and less money for each apple. This form of analysis is called marginal benefit: how much benefit (expressed as dollars I’m willing to spend) will I receive from each apple? This is a downward sloping function: for each additional apple I buy (quantity demanded), the price I’m willing to pay goes down. This is what gives my personal demand curve. And if we aggregate demand curves across all market participants (meaning: everyone interested in buying apples), we end up with something like this:
Assuming no changes in people’s behavior and other conditions in the market, this chart tells us how many apples will be purchased by our buyers at each price point between $0.50 and $5. And ceteris paribus (all else being equal), this will continue to be the demand curve for apples.
Marginal cost
Demand is half the story of economics. The other half is supply, or: how many apples will I sell at each price point? Supply curves are upward sloping: the higher the price, the more a person or company is willing and able to sell a product.
Let’s understand why. Suppose I have an apple orchard. It’s a large property right next to my house. With about 2 minutes of effort, I can walk out of my house, find the nearest tree, pick 5 apples off the tree, and call it a day. 5 apples for 2 minutes of effort is pretty good, right?
Yes, there was all the effort necessary to buy the land, and plant the trees, and water them… and a bunch more than I likely can’t even guess at. We’re going to ignore all of that for our analysis, because for short-term supply-and-demand movement, we can ignore these kinds of sunk costs. One other simplification: in reality, supply curves often start descending before ascending. This accounts for achieving efficiencies of scale after the first number of units purchased. But since both these topics are unneeded for understanding taxes, I won’t go any further.
Anyway, back to my apple orchard. If someone offers me $0.50 per apple, I can do 2 minutes of effort and get $2.50 in revenue, which equates to a $75/hour wage for me. I’m more than happy to pick apples at that price!
However, let’s say someone comes to buy 10,000 apples from me instead. I no longer just walk out to my nearest tree. I’m going to need to get in my truck, drive around, spend the day in the sun, pay for gas, take a day off of my day job (let’s say it pays me $70/hour). The costs go up significantly. Let’s say it takes 5 days to harvest all those apples myself, it costs me $100 in fuel and other expenses, and I lose out on my $70/hour job for 5 days. We end up with:
- Total expenditure: $100 + $70 * 8 hours a day * 5 days \== $2900
- Total revenue: $5000 (10,000 apples at $0.50 each)
- Total profit: $2100
So I’m still willing to sell the apples at this price, but it’s not as attractive as before. And as the number of apples purchased goes up, my costs keep increasing. I’ll need to spend more money on fuel to travel more of my property. At some point I won’t be able to do the work myself anymore, so I’ll need to pay others to work on the farm, and they’ll be slower at picking apples than me (less familiar with the property, less direct motivation, etc.). The point being: at some point, the number of apples can go high enough that the $0.50 price point no longer makes me any money.
This kind of analysis is called marginal cost. It refers to the additional amount of expenditure a seller has to spend in order to produce each additional unit of the good. Marginal costs go up as quantity sold goes up. And like demand curves, if you aggregate this data across all sellers, you get a supply curve like this:
Equilibrium price
We now know, for every price point, how many apples buyers will purchase, and how many apples sellers will sell. Now we find the equilibrium: where the supply and demand curves meet. This point represents where the marginal benefit a buyer would receive from the next buyer would be less than the cost it would take the next seller to make it. Let’s see it in a chart:
You’ll notice that these two graphs cross at the $1 price point, where 63 apples are both demanded (bought by consumers) and supplied (sold by producers). This is our equilibrium price. We also have a visualization of the surplus created by these trades. Everything to the left of the equilibrium point and between the supply and demand curves represents surplus: an area where someone is receiving something of more value than they give. For example:
- When I bought my first apple for $1, but I was willing to spend $5, I made $4 of consumer surplus. The consumer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and above the equilibrium price point.
- When a seller sells his first apple for $1, but it only cost $0.50 to produce it, the seller made $0.50 of producer surplus. The producer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and below the equilibrium price point.
Another way of thinking of surplus is “every time someone got a better price than they would have been willing to take.”
OK, with this in place, we now have enough information to figure out how to price in the tariff, which we’ll treat as a negative externality.
Modeling taxes
Alright, the government has now instituted a $0.50 tariff on every apple sold within the US by a foreign producer. We can generally model taxes by either increasing the marginal cost of each unit sold (shifting the supply curve up), or by decreasing the marginal benefit of each unit bought (shifting the demand curve down). In this case, since only some of the producers will pay the tax, it makes more sense to modify the supply curve.
First, let’s see what happens to the foreign seller-only supply curve when you add in the tariff:
With the tariff in place, for each quantity level, the price at which the seller will sell is $0.50 higher than before the tariff. That makes sense: if I was previously willing to sell my 82nd apple for $3, I would now need to charge $3.50 for that apple to cover the cost of the tariff. We see this as the tariff “pushing up” or “pushing left” the original supply curve.
We can add this new supply curve to our existing (unchanged) supply curve for domestic-only sellers, and we end up with a result like this:
The total supply curve adds up the individual foreign and domestic supply curves. At each price point, we add up the total quantity each group would be willing to sell to determine the total quantity supplied for each price point. Once we have that cumulative supply curve defined, we can produce an updated supply-and-demand chart including the tariff:
As we can see, the equilibrium has shifted:
- The equilibrium price paid by consumers has risen from $1 to $1.20.
- The total number of apples purchased has dropped from 63 apples to 60 apples.
- Consumers therefore received 3 less apples. They spent $72 for these 60 apples, whereas previously they spent $63 for 3 more apples, a definite decrease in consumer surplus.
- Foreign producers sold 36 of those apples (see the raw data in the linked Google Sheet), for a gross revenue of $43.20. However, they also need to pay the tariff to the US government, which accounts for $18, meaning they only receive $25.20 post-tariff. Previously, they sold 42 apples at $1 each with no tariff to be paid, meaning they took home $42.
- Domestic producers sold the remaining 24 apples at $1.20, giving them a revenue of $28.80. Since they don’t pay the tariff, they take home all of that money. By contrast, previously, they sold 21 apples at $1, for a take-home of $21.
- The government receives $0.50 for each of the 60 apples sold, or in other words receives $30 in revenue it wouldn’t have received otherwise.
We could be more specific about the surpluses, and calculate the actual areas for consumer surplus, producer surplus, inefficiency from the tariff, and government revenue from the tariff. But I won’t bother, as those calculations get slightly more involved. Instead, let’s just look at the aggregate outcomes:
- Consumers were unquestionably hurt. Their price paid went up by $0.20 per apple, and received less apples.
- Foreign producers were also hurt. Their price received went down from the original $1 to the new post-tariff price of $1.20, minus the $0.50 tariff. In other words: foreign producers only receive $0.70 per apple now. This hurt can be mitigated by shifting sales to other countries without a tariff, but the pain will exist regardless.
- Domestic producers scored. They can sell less apples and make more revenue doing it.
- And the government walked away with an extra $30.
Hopefully you now see the answer to the original questions. Importantly, while the government imposed a $0.50 tariff, neither side fully absorbed that cost. Consumers paid a bit more, foreign producers received a bit less. The exact details of how that tariff was split across the groups is mediated by the relevant supply and demand curves of each group. If you want to learn more about this, the relevant search term is “price elasticity,” or how much a group’s quantity supplied or demanded will change based on changes in the price.
Other taxes
Most taxes are some kind of a tax on trade. Tariffs on apples is an obvious one. But the same applies to income tax (taxing the worker for the trade of labor for money) or payroll tax (same thing, just taxing the employer instead). Interestingly, you can use the same model for analyzing things like tax incentives. For example, if the government decided to subsidize domestic apple production by giving the domestic producers a $0.50 bonus for each apple they sell, we would end up with a similar kind of analysis, except instead of the foreign supply curve shifting up, we’d see the domestic supply curve shifting down.
And generally speaking, this is what you’ll always see with government involvement in the economy. It will result in disrupting an existing equilibrium, letting the market readjust to a new equilibrium, and incentivization of some behavior, causing some people to benefit and others to lose out. We saw with the apple tariff, domestic producers and the government benefited while others lost.
You can see the reverse though with tax incentives. If I give a tax incentive of providing a deduction (not paying income tax) for preschool, we would end up with:
- Government needs to make up the difference in tax revenue, either by raising taxes on others or printing more money (leading to inflation). Either way, those paying the tax or those holding government debased currency will pay a price.
- Those people who don’t use the preschool deduction will receive no benefit, so they simply pay a cost.
- Those who do use the preschool deduction will end up paying less on tax+preschool than they would have otherwise.
This analysis is fully amoral. It’s not saying whether providing subsidized preschool is a good thing or not, it simply tells you where the costs will be felt, and points out that such government interference in free economic choice does result in inefficiencies in the system. Once you have that knowledge, you’re more well educated on making a decision about whether the costs of government intervention are worth the benefits.
-
@ da0b9bc3:4e30a4a9
2025-02-04 07:52:55Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/875346
-
@ 23dea97f:72ed98dc
2025-02-04 07:29:36Post number 1
-
@ 177ff913:b25cacc0
2025-02-04 07:21:26MCW18 là một nền tảng giải trí trực tuyến tiên tiến, được thiết kế với mục tiêu mang đến trải nghiệm mượt mà và thú vị cho người dùng. Giao diện của nền tảng này rất dễ sử dụng, tối ưu hóa cho tất cả các thiết bị, từ máy tính để bàn đến điện thoại di động, giúp người dùng có thể tiếp cận dịch vụ một cách nhanh chóng và thuận tiện. MCW18 luôn đảm bảo tốc độ truy cập ổn định, giúp người dùng có thể tham gia vào các hoạt động giải trí mà không gặp phải bất kỳ sự gián đoạn nào. Nền tảng này mang đến một không gian giải trí trực tuyến chất lượng cao và tiện lợi cho người sử dụng.
Bảo mật là một trong những yếu tố quan trọng hàng đầu tại MCW18. Nền tảng này áp dụng công nghệ mã hóa tiên tiến để bảo vệ mọi thông tin cá nhân và giao dịch của người dùng. Dữ liệu đăng nhập, thông tin tài khoản và các giao dịch tài chính đều được xử lý một cách bảo mật và an toàn tuyệt đối. MCW18 cam kết không chia sẻ bất kỳ thông tin cá nhân nào của người dùng cho bên thứ ba mà không có sự đồng ý của họ. Đội ngũ kỹ thuật của MCW18 luôn theo dõi và cập nhật các biện pháp bảo mật mới nhất để đối phó với những mối đe dọa từ bên ngoài, mang lại sự yên tâm cho người dùng khi tham gia vào nền tảng.
Ngoài bảo mật, MCW18 còn chú trọng đến chất lượng dịch vụ khách hàng. Đội ngũ hỗ trợ của MCW18 luôn sẵn sàng 24/7 để giải đáp mọi thắc mắc và giúp đỡ người dùng khi gặp phải bất kỳ vấn đề nào. Người dùng có thể dễ dàng liên hệ qua nhiều kênh khác nhau như chat trực tuyến, email hoặc điện thoại. Đội ngũ chăm sóc khách hàng của MCW18 rất chuyên nghiệp và tận tâm, luôn cố gắng mang đến sự hỗ trợ nhanh chóng và hiệu quả, giúp người dùng giải quyết mọi vấn đề trong thời gian ngắn nhất.
MCW18 cũng rất chú trọng đến việc cải thiện trải nghiệm người dùng thông qua các chương trình khuyến mãi và ưu đãi hấp dẫn. Người dùng có thể tham gia vào các sự kiện và nhận nhiều phần thưởng giá trị, tạo thêm động lực và sự hào hứng khi tham gia vào các dịch vụ trên nền tảng. Các chương trình khuyến mãi của MCW18 được tổ chức thường xuyên và luôn được cập nhật để đáp ứng nhu cầu của người dùng. Điều này giúp MCW18 không chỉ cung cấp một trải nghiệm giải trí tuyệt vời mà còn mang đến những cơ hội nhận thưởng hấp dẫn cho người tham gia.
Cuối cùng, MCW18 cam kết không ngừng nâng cao chất lượng dịch vụ và đáp ứng mọi nhu cầu của người dùng. Với sự kết hợp giữa giao diện dễ sử dụng, bảo mật mạnh mẽ, hỗ trợ khách hàng chuyên nghiệp và các chương trình khuyến mãi hấp dẫn, MCW18 đã và đang trở thành lựa chọn hàng đầu của nhiều người dùng yêu thích giải trí trực tuyến. Nền tảng này không chỉ đảm bảo sự an toàn và bảo mật mà còn mang đến những giây phút thư giãn tuyệt vời, giúp người dùng có thể tận hưởng một trải nghiệm giải trí hoàn hảo và trọn vẹn.
-
@ b7274d28:c99628cb
2025-02-04 05:31:13For anyone interested in the list of essential essays from nostr:npub14hn6p34vegy4ckeklz8jq93mendym9asw8z2ej87x2wuwf8werasc6a32x (@anilsaidso) on Twitter that nostr:npub1h8nk2346qezka5cpm8jjh3yl5j88pf4ly2ptu7s6uu55wcfqy0wq36rpev mentioned on Read 856, here it is. I have compiled it with as many of the essays as I could find, along with the audio versions, when available. Additionally, if the author is on #Nostr, I have tagged their npub so you can thank them by zapping them some sats.
All credit for this list and the graphics accompanying each entry goes to nostr:npub14hn6p34vegy4ckeklz8jq93mendym9asw8z2ej87x2wuwf8werasc6a32x, whose original thread can be found here: Anil's Essential Essays Thread
1.
History shows us that the corruption of monetary systems leads to moral decay, social collapse, and slavery.
Essay: https://breedlove22.medium.com/masters-and-slaves-of-money-255ecc93404f
Audio: https://fountain.fm/episode/RI0iCGRCCYdhnMXIN3L6
2.
The 21st century emergence of Bitcoin, encryption, the internet, and millennials are more than just trends; they herald a wave of change that exhibits similar dynamics as the 16-17th century revolution that took place in Europe.
Author: nostr:npub13l3lyslfzyscrqg8saw4r09y70702s6r025hz52sajqrvdvf88zskh8xc2
Essay: https://casebitcoin.com/docs/TheBitcoinReformation_TuurDemeester.pdf
Audio: https://fountain.fm/episode/uLgBG2tyCLMlOp3g50EL
3.
There are many men out there who will parrot the "debt is money WE owe OURSELVES" without acknowledging that "WE" isn't a static entity, but a collection of individuals at different points in their lives.
Author: nostr:npub1guh5grefa7vkay4ps6udxg8lrqxg2kgr3qh9n4gduxut64nfxq0q9y6hjy
Essay: https://www.tftc.io/issue-754-ludwig-von-mises-human-action/
Audio: https://fountain.fm/episode/UXacM2rkdcyjG9xp9O2l
4.
If Bitcoin exists for 20 years, there will be near-universal confidence that it will be available forever, much as people believe the Internet is a permanent feature of the modern world.
Essay: https://vijayboyapati.medium.com/the-bullish-case-for-bitcoin-6ecc8bdecc1
Audio: https://fountain.fm/episode/jC3KbxTkXVzXO4vR7X3W
As you are surely aware, Vijay has expanded this into a book available here: The Bullish Case for Bitcoin Book
There is also an audio book version available here: The Bullish Case for Bitcoin Audio Book
5.
This realignment would not be traditional right vs left, but rather land vs cloud, state vs network, centralized vs decentralized, new money vs old, internationalist/capitalist vs nationalist/socialist, MMT vs BTC,...Hamilton vs Satoshi.
Essay: https://nakamoto.com/bitcoin-becomes-the-flag-of-technology/
Audio: https://fountain.fm/episode/tFJKjYLKhiFY8voDssZc
6.
I became convinced that, whether bitcoin survives or not, the existing financial system is working on borrowed time.
Essay: https://nakamotoinstitute.org/mempool/gradually-then-suddenly/
Audio: https://fountain.fm/episode/Mf6hgTFUNESqvdxEIOGZ
Parker Lewis went on to release several more articles in the Gradually, Then Suddenly series. They can be found here: Gradually, Then Suddenly Series
nostr:npub1h8nk2346qezka5cpm8jjh3yl5j88pf4ly2ptu7s6uu55wcfqy0wq36rpev has, of course, read all of them for us. Listing them all here is beyond the scope of this article, but you can find them by searching the podcast feed here: Bitcoin Audible Feed
Finally, Parker Lewis has refined these articles and released them as a book, which is available here: Gradually, Then Suddenly Book
7.
Bitcoin is a beautifully-constructed protocol. Genius is apparent in its design to most people who study it in depth, in terms of the way it blends math, computer science, cyber security, monetary economics, and game theory.
Author: nostr:npub1a2cww4kn9wqte4ry70vyfwqyqvpswksna27rtxd8vty6c74era8sdcw83a
Essay: https://www.lynalden.com/invest-in-bitcoin/
Audio: https://fountain.fm/episode/axeqKBvYCSP1s9aJIGSe
8.
Bitcoin offers a sweeping vista of opportunity to re-imagine how the financial system can and should work in the Internet era..
Essay: https://archive.nytimes.com/dealbook.nytimes.com/2014/01/21/why-bitcoin-matters/
9.
Using Bitcoin for consumer purchases is akin to driving a Concorde jet down the street to pick up groceries: a ridiculously expensive waste of an astonishing tool.
Author: nostr:npub1gdu7w6l6w65qhrdeaf6eyywepwe7v7ezqtugsrxy7hl7ypjsvxksd76nak
Essay: https://nakamotoinstitute.org/mempool/economics-of-bitcoin-as-a-settlement-network/
Audio: https://fountain.fm/episode/JoSpRFWJtoogn3lvTYlz
10.
The Internet is a dumb network, which is its defining and most valuable feature. The Internet’s protocol (..) doesn’t offer “services.” It doesn’t make decisions about content. It doesn’t distinguish between photos, text, video and audio.
Essay: https://fee.org/articles/decentralization-why-dumb-networks-are-better/
Audio: https://fountain.fm/episode/b7gOEqmWxn8RiDziffXf
11.
Most people are only familiar with (b)itcoin the electronic currency, but more important is (B)itcoin, with a capital B, the underlying protocol, which encapsulates and distributes the functions of contract law.
I was unable to find this essay or any audio version. Clicking on Anil's original link took me to Naval's blog, but that particular entry seems to have been removed.
12.
Bitcoin can approximate unofficial exchange rates which, in turn, can be used to detect both the existence and the magnitude of the distortion caused by capital controls & exchange rate manipulations.
Essay: https://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2714921
13.
You can create something which looks cosmetically similar to Bitcoin, but you cannot replicate the settlement assurances which derive from the costliness of the ledger.
Essay: https://medium.com/@nic__carter/its-the-settlement-assurances-stupid-5dcd1c3f4e41
Audio: https://fountain.fm/episode/5NoPoiRU4NtF2YQN5QI1
14.
When we can secure the most important functionality of a financial network by computer science... we go from a system that is manual, local, and of inconsistent security to one that is automated, global, and much more secure.
Essay: https://nakamotoinstitute.org/library/money-blockchains-and-social-scalability/
Audio: https://fountain.fm/episode/VMH9YmGVCF8c3I5zYkrc
15.
The BCB enforces the strictest deposit regulations in the world by requiring full reserves for all accounts. ..money is not destroyed when bank debts are repaid, so increased money hoarding does not cause liquidity traps..
Author: nostr:npub1hxwmegqcfgevu4vsfjex0v3wgdyz8jtlgx8ndkh46t0lphtmtsnsuf40pf
Essay: https://nakamotoinstitute.org/mempool/the-bitcoin-central-banks-perfect-monetary-policy/
Audio: https://fountain.fm/episode/ralOokFfhFfeZpYnGAsD
16.
When Satoshi announced Bitcoin on the cryptography mailing list, he got a skeptical reception at best. Cryptographers have seen too many grand schemes by clueless noobs. They tend to have a knee jerk reaction.
Essay: https://nakamotoinstitute.org/library/bitcoin-and-me/
Audio: https://fountain.fm/episode/Vx8hKhLZkkI4cq97qS4Z
17.
No matter who you are, or how big your company is, 𝙮𝙤𝙪𝙧 𝙩𝙧𝙖𝙣𝙨𝙖𝙘𝙩𝙞𝙤𝙣 𝙬𝙤𝙣’𝙩 𝙥𝙧𝙤𝙥𝙖𝙜𝙖𝙩𝙚 𝙞𝙛 𝙞𝙩’𝙨 𝙞𝙣𝙫𝙖𝙡𝙞𝙙.
Essay: https://nakamotoinstitute.org/mempool/bitcoin-miners-beware-invalid-blocks-need-not-apply/
Audio: https://fountain.fm/episode/bcSuBGmOGY2TecSov4rC
18.
Just like a company trying to protect itself from being destroyed by a new competitor, the actions and reactions of central banks and policy makers to protect the system that they know, are quite predictable.
Author: nostr:npub1s05p3ha7en49dv8429tkk07nnfa9pcwczkf5x5qrdraqshxdje9sq6eyhe
Essay: https://medium.com/the-bitcoin-times/the-greatest-game-b787ac3242b2
Audio Part 1: https://fountain.fm/episode/5bYyGRmNATKaxminlvco
Audio Part 2: https://fountain.fm/episode/92eU3h6gqbzng84zqQPZ
19.
Technology, industry, and society have advanced immeasurably since, and yet we still live by Venetian financial customs and have no idea why. Modern banking is the legacy of a problem that technology has since solved.
Author: nostr:npub1sfhflz2msx45rfzjyf5tyj0x35pv4qtq3hh4v2jf8nhrtl79cavsl2ymqt
Essay: https://allenfarrington.medium.com/bitcoin-is-venice-8414dda42070
Audio: https://fountain.fm/episode/s6Fu2VowAddRACCCIxQh
Allen Farrington and Sacha Meyers have gone on to expand this into a book, as well. You can get the book here: Bitcoin is Venice Book
And wouldn't you know it, Guy Swann has narrated the audio book available here: Bitcoin is Venice Audio Book
20.
The rich and powerful will always design systems that benefit them before everyone else. The genius of Bitcoin is to take advantage of that very base reality and force them to get involved and help run the system, instead of attacking it.
Author: nostr:npub1trr5r2nrpsk6xkjk5a7p6pfcryyt6yzsflwjmz6r7uj7lfkjxxtq78hdpu
Essay: https://quillette.com/2021/02/21/can-governments-stop-bitcoin/
Audio: https://fountain.fm/episode/jeZ21IWIlbuC1OGnssy8
21.
In the realm of information, there is no coin-stamping without time-stamping. The relentless beating of this clock is what gives rise to all the magical properties of Bitcoin.
Author: nostr:npub1dergggklka99wwrs92yz8wdjs952h2ux2ha2ed598ngwu9w7a6fsh9xzpc
Essay: https://dergigi.com/2021/01/14/bitcoin-is-time/
Audio: https://fountain.fm/episode/pTevCY2vwanNsIso6F6X
22.
You can stay on the Fiat Standard, in which some people get to produce unlimited new units of money for free, just not you. Or opt in to the Bitcoin Standard, in which no one gets to do that, including you.
Essay: https://casebitcoin.com/docs/StoneRidge_2020_Shareholder_Letter.pdf
Audio: https://fountain.fm/episode/PhBTa39qwbkwAtRnO38W
23.
Long term investors should use Bitcoin as their unit of account and every single investment should be compared to the expected returns of Bitcoin.
Essay: https://nakamotoinstitute.org/mempool/everyones-a-scammer/
Audio: https://fountain.fm/episode/vyR2GUNfXtKRK8qwznki
24.
When you’re in the ivory tower, you think the term “ivory tower” is a silly misrepresentation of your very normal life; when you’re no longer in the ivory tower, you realize how willfully out of touch you were with the world.
Essay: https://www.citadel21.com/why-the-yuppie-elite-dismiss-bitcoin
Audio: https://fountain.fm/episode/7do5K4pPNljOf2W3rR2V
You might notice that many of the above essays are available from the Satoshi Nakamoto Institute. It is a veritable treasure trove of excellent writing on subjects surrounding #Bitcoin and #AustrianEconomics. If you find value in them keeping these written works online for the next wave of new Bitcoiners to have an excellent source of education, please consider donating to the cause.
-
@ bbb5dda0:f09e2747
2025-02-04 03:58:50This past week got me a lot of frustration with the GitHub actions runner and debugging it. Really testing my patience, but at least i saw a bit of progress. TollGate's had a nice wrap-up for the Proof Of Concept app, which some great new ideas on how to make the user experience even better! Let's dive in!
GitHub Actions
I've been having a low-key fight with the github actions runner containers. I have spent a lot of time trying to figure out WHY the blossom upload action would just not work. I was quick to find out that the action is being ran with an older version of NodeJS (v18) while the blossom uploader requires v20. Not a big deal you'd say as i just set the version to 20 in the pipeline. However, doing that explicitly had zero impact, and after diving down the github runner rabbit hole i concluded that the Actions that are imported (from marketplace) will just run with whatever node version is already installed in the runner's docker image. Which in the case of the act runner is Node 18. I tried updating to the latest images but I haven't been able to find a compatible one yet...
Payments
I've been working on getting the money aspect working in the ci-cd runner. I added a wallet and a scheduled payout. I took this from the nostr-epoxy project and did some updates to upgrade to cashu-ts v2.
I added some advertisement info like the specs of the machine that the runner is on. I've been pondering how the payment flow should work though. See the problem is that because of the nature of this DVM, it cannot predict how long a job will take to execute, a customer can literally do anything in their pipeline that will make a job last forever. I think for that reason there has to be some kind of deposit/credit or stream besides the one-off payment. I made a post asking what the best way would be: nostr:note17apw8unznvwx2k3z48t7qz6cq26tk077w83qh3f7zxukfrrfukhs7mpcsn
I currently feel best about the option of just sending a bunch of ecash that will sure be enough to execute the job (and otherwise act as the time-out) and that if the DVM uses less of that money, it will send it back as pubkey locked cashu tokens, to a given npub. Maybe NIP-60 can be a great way to handle returning the 'change' to the user.
Some ideas i have now: - Billing should be per second - Advertising should: - advertise as sats/minute - include specs of the machine, ideally searchable by tag
Job request
So the flow i'm thinking of is:
-
User posts request
- repository
- branch
- yaml path
- bid (max price per minute)
- min_vcpu
- min_ram
- min_storage
-
DVM responds with
- price per minute
- vcpu
- ram
- storage
- runner-types
- price per minute
-
User posts request:
- ... [same as above]
- cashu payment
- cashu return pubkey + relay
User Interface
I also worked on building out a very basic user interface to run the GitHub Actions dvm.
The UI then shows all feedback to the job, where the first feedback event you can see gives back a status processing, and the next one gives back the console output of the pipeline run.
nostr:npub15qydau2hjma6ngxkl2cyar74wzyjshvl65za5k5rl69264ar2exs5cyejr and I agreed he'll copy over this basic setup into his upcoming version of gitWorkshop.dev which I can then build upon so we can experiment with the User Experience (how to handle competing Runners, display results, payments, etc...)
Tollgate
There's also been the issue that has been bothering me since last week: Being able to dismiss a captive portal programatically in the Android app.
During a weekly check-in that nostr:npub1k03rader0vm94j5ee8fg7pc2x9xkr2phu77sljas7qu5mh8mvgvqpe8rty and I set up we discussed the issue. To me, it's a problem having the user to jump through all these hoops to connect, which should be as much automated as possible.
We discussed what if we'd ditch the open network and go with a WPA2 (password) protected one and have no captive portal. But then we lose the ability to do onboarding / expose users to Tollgate through the captive portal. Then the idea came up to create an extra (hidden) network for the app to use, while keeping the open one with the captive portal. I did not know it was possible to create multiple networks on the same (physical) radio, but apparently it's quite common. You lose a bit on efficiency but it shouldn't be too bad. The only challenge would be to exempt this network from getting a captive portal while still using the OpenNDS software to manage user's sessions. We'll see but this gives me a lot of hope for a seamless user experience!
After this call, despite our possible new direction I did want to try and get the full app flow working, to validate if it's possible at all. And after some digging int the Tauri docs and even their discord community i finally found what the issue was with me not receiving the android event for the captive portal. I'd ben adding the listener for this event to the
androidmanifest.xml
file for the Tauri Android plugin, while I had to put it into the tauri app one's itself -one level higher- if you will...Anyway, that worked and I was FINALLY able to create the following full flow! (video)
nostr:nevent1qvzqqqqqqypzpwa4mkswz4t8j70s2s6q00wzqv7k7zamxrmj2y4fs88aktcfuf68qy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7tmwdaehgu3wwa5kuef0qydhwumn8ghj7un9d3shjtnwdaehgunsd3jkyuewvdhk6tcqyqyvs2js3x6ldpm2kkmqyf8d3lvrcezjk2eg26p2tvfxd2p6lkeqzn7l66t
-
-
@ 91bea5cd:1df4451c
2025-02-04 05:24:47Novia é uma ferramenta inovadora que facilita o arquivamento de vídeos e sua integração com a rede NOSTR (Notes and Other Stuff Transmitted over Relay). Funcionando como uma ponte entre ferramentas de arquivamento de vídeo tradicionais e a plataforma descentralizada, Novia oferece uma solução autônoma para a preservação e compartilhamento de conteúdo audiovisual.
Arquitetura e Funcionamento
A arquitetura de Novia é dividida em duas partes principais:
-
Frontend: Atua como a interface do usuário, responsável por solicitar o arquivamento de vídeos. Essas solicitações são encaminhadas para o backend.
-
Backend: Processa as solicitações de arquivamento, baixando o vídeo, suas descrições e a imagem de capa associada. Este componente é conectado a um ou mais relays NOSTR, permitindo a indexação e descoberta do conteúdo arquivado.
O processo de arquivamento é automatizado: após o download, o vídeo fica disponível no frontend para que o usuário possa solicitar o upload para um servidor Blossom de sua escolha.
Como Utilizar Novia
-
Acesso: Navegue até https://npub126uz2g6ft45qs0m0rnvtvtp7glcfd23pemrzz0wnt8r5vlhr9ufqnsmvg8.nsite.lol.
-
Login: Utilize uma extensão de navegador compatível com NOSTR para autenticar-se.
-
Execução via Docker: A forma mais simples de executar o backend é através de um container Docker. Execute o seguinte comando:
bash docker run -it --rm -p 9090:9090 -v ./nostr/data:/data --add-host=host.docker.internal:host-gateway teamnovia/novia
Este comando cria um container, mapeia a porta 9090 para o host e monta o diretório
./nostr/data
para persistir os dados.
Configuração Avançada
Novia oferece amplas opções de configuração através de um arquivo
yaml
. Abaixo, um exemplo comentado:```yaml mediaStores: - id: media type: local path: /data/media watch: true
database: /data/novia.db
download: enabled: true ytdlpPath: yt-dlp ytdlpCookies: ./cookies.txt tempPath: /tmp targetStoreId: media secret: false
publish: enabled: true key: nsec thumbnailUpload: - https://nostr.download videoUpload: - url: https://nostr.download maxUploadSizeMB: 300 cleanUpMaxAgeDays: 5 cleanUpKeepSizeUnderMB: 2 - url: https://files.v0l.io maxUploadSizeMB: 300 cleanUpMaxAgeDays: 5 cleanUpKeepSizeUnderMB: 2 - url: https://nosto.re maxUploadSizeMB: 300 cleanUpMaxAgeDays: 5 cleanUpKeepSizeUnderMB: 2 - url: https://blossom.primal.net maxUploadSizeMB: 300 cleanUpMaxAgeDays: 5 cleanUpKeepSizeUnderMB: 2
relays: - ws://host.docker.internal:4869 - wss://bostr.bitcointxoko.com secret: false autoUpload: enabled: true maxVideoSizeMB: 100
fetch: enabled: false fetchVideoLimitMB: 10 relays: - match: - nostr - bitcoin
server: port: 9090 enabled: true ```
Explicação das Configurações:
mediaStores
: Define onde os arquivos de mídia serão armazenados (localmente, neste exemplo).database
: Especifica o local do banco de dados.download
: Controla as configurações de download de vídeos, incluindo o caminho para oyt-dlp
e um arquivo de cookies para autenticação.publish
: Configura a publicação de vídeos e thumbnails no NOSTR, incluindo a chave privada (nsec
), servidores de upload e relays. Atenção: Mantenha sua chave privada em segredo.fetch
: Permite buscar eventos de vídeo de relays NOSTR para arquivamento.server
: Define as configurações do servidor web interno de Novia.
Conclusão
Novia surge como uma ferramenta promissora para o arquivamento e a integração de vídeos com o ecossistema NOSTR. Sua arquitetura modular, combinada com opções de configuração flexíveis, a tornam uma solução poderosa para usuários que buscam preservar e compartilhar conteúdo audiovisual de forma descentralizada e resistente à censura. A utilização de Docker simplifica a implantação e o gerenciamento da ferramenta. Para obter mais informações e explorar o código-fonte, visite o repositório do projeto no GitHub: https://github.com/teamnovia/novia.
-
-
@ 3ffac3a6:2d656657
2025-02-04 04:31:26In the waning days of the 20th century, a woman named Annabelle Nolan was born into an unremarkable world, though she herself was anything but ordinary. A prodigy in cryptography and quantum computing, she would later adopt the pseudonym Satoshi Nakamoto, orchestrating the creation of Bitcoin in the early 21st century. But her legacy would stretch far beyond the blockchain.
Annabelle's obsession with cryptography was not just about securing data—it was about securing freedom. Her work in quantum computing inadvertently triggered a cascade of temporal anomalies, one of which ensnared her in 2011. The event was cataclysmic yet silent, unnoticed by the world she'd transformed. In an instant, she was torn from her era and thrust violently back into the 16th century.
Disoriented and stripped of her futuristic tools, Annabelle faced a brutal reality: survive in a world where her knowledge was both a curse and a weapon. Reinventing herself as Anne Boleyn, she navigated the treacherous courts of Tudor England with the same strategic brilliance she'd used to design Bitcoin. Her intellect dazzled King Henry VIII, but it was the mysterious necklace she wore—adorned with a bold, stylized "B"—that fueled whispers. It was more than jewelry; it was a relic of a forgotten future, a silent beacon for any historian clever enough to decode her true story.
Anne's fate seemed sealed as she ascended to queenship, her influence growing alongside her enemies. Yet beneath the royal intrigue, she harbored a desperate hope: that the symbol around her neck would outlast her, sparking curiosity in minds centuries away. The "B" was her signature, a cryptographic clue embedded in history.
On the scaffold in 1536, as she faced her execution, Anne Boleyn's gaze was unwavering. She knew her death was not the end. Somewhere, in dusty archives and encrypted ledgers, her mark endured. Historians would puzzle over the enigmatic "B," and perhaps one day, someone would connect the dots between a queen, a coin, and a time anomaly born from quantum code.
She wasn't just Anne Boleyn. She was Satoshi Nakamoto, the time-displaced architect of a decentralized future, hiding in plain sight within the annals of history.
-
@ c902b8da:0cedc5fb
2025-02-04 03:39:18NIP-XX: Proof of Watch
draft
optional
This NIP defines a protocol for content creators to reward users for consuming content using Cashu tokens, utilizing existing Cashu P2PK capabilities.
Abstract
Content creators can offer Cashu token rewards to users who prove they have spent time consuming their content. The protocol uses P2PK-locked tokens combined with proof-of-work verification to ensure genuine content consumption before releasing tokens to users.
Motivation
Content creators want to incentivize users to engage with their content and potentially reward them for their attention. This NIP provides a standardized way to offer token rewards for content consumption while ensuring the user actually spent time with the content through a proof-of-work mechanism.
Protocol Components
Content Event
A content creator publishes a
kind:1
note containing their content and reward information:json { "kind": 1, "content": "Watch my video!", "tags": [ ["reward", "<amount-in-sats>"], ["pow", "<difficulty>"], ["u", "<watcher-service-url>"], ["t", "proofofwatch"] ] }
Watcher Service
Content creators run (or use) a watcher service that: 1. Maintains a pool of Cashu tokens 2. Issues P2PK-locked tokens to viewers 3. Verifies proofs of watch 4. Releases signatures to unlock tokens
Protocol Flow
1. Request Watch Session
Client makes a
POST /watch/start
request to watcher service:json { "note_id": "<event-id>" }
Service responds with:
json { "id": "<session-id>", "challenge": "<random-challenge>", "difficulty": <int>, "token": { "amount": <int>, "id": "<keyset-id>", "secret": "<p2pk-secret>", "C": "<signature>" }, "pubkey": "<service-ephemeral-pubkey>", "expiry": <unix-timestamp> }
The token is P2PK-locked to a one-time ephemeral pubkey generated by the service. Only the service holds the corresponding private key needed to generate the witness signature.
2. Computing Proof
While consuming content, client computes proof-of-work:
proof = find_nonce( SHA256( note_id + session_id + challenge + latest_block_hash + nonce ) )
The proof must result in a hash with the required number of leading zeros.
3. Submitting Proof
Client submits proof to redeem token:
http POST /watch/prove
json { "session_id": "<session-id>", "proof": "<computed-proof>", "block_hash": "<latest-block-hash>" }
If valid, service responds with P2PK signature:
json { "witness": { "signatures": ["<signature-to-unlock-token>"] } }
The client can now unlock and spend their token using standard Cashu operations.
Security Considerations
Token Security
- Tokens are locked to service-generated ephemeral pubkeys
- Each watch session uses a unique keypair
- Only service can generate valid witness signatures
- Private keys never revealed to users
- Keys and unused tokens destroyed after session expiry
Proof Construction
- Must include session ID to prevent replay
- Must include recent block hash to prevent precomputation
- Must achieve required difficulty (leading zeros)
- Must be completed within session expiry
Service Requirements
- Track used proofs
- Enforce timeouts
- Rate limit requests
- Verify block hash recency
- Maintain adequate token pool
- Generate unique ephemeral keypairs per session
- Securely store ephemeral private keys until proof verified
- Clean up expired ephemeral keys
Watcher Service Settings
Services should provide an info endpoint:
http GET /info
json { "name": "Example Watcher", "pubkey": "<service-pubkey>", "difficulty_range": { "min": <int>, "max": <int> }, "amount_range": { "min": <int>, "max": <int> }, "supported_mints": [ "<mint-url-1>", "<mint-url-2>" ] }
Client Implementation Guidelines
Clients SHOULD: 1. Verify service supports intended mint 2. Start proof computation only after beginning content consumption 3. Submit proof promptly after computation 4. Handle session expiry gracefully 5. Verify P2PK token validity 6. Submit proof before session timeout
Content Creator Guidelines
Content creators SHOULD: 1. Set appropriate difficulty for content length 2. Maintain adequate token pool 3. Monitor service uptime 4. Consider token denomination strategies 5. Include clear reward terms
Rate Limiting
Services SHOULD implement rate limiting: - Per IP address - Per pubkey - Per note ID - Per token amount
Example Implementation
A basic proof computation in Python:
python def compute_proof(note_id, session_id, challenge, block_hash, difficulty): nonce = 0 while True: attempt = f"{note_id}{session_id}{challenge}{block_hash}{nonce}" hash = sha256(attempt.encode()).hexdigest() if hash.startswith('0' * difficulty): return attempt nonce += 1
References
-
@ 3ffac3a6:2d656657
2025-02-04 12:34:24Nos idos gloriosos do início dos anos 2000, quando o Orkut ainda era rei e o maior dilema da humanidade era escolher o toque de celular polifônico menos vergonhoso, meu amigo Luciano decidiu se casar. E, como manda a tradição milenar dos homens que tomam decisões questionáveis, organizamos uma despedida de solteiro. O palco da epopeia? A lendária Skorpius, um puteiro popular de Belo Horizonte, famoso não só pelas profissionais do entretenimento adulto, mas também pelos shows de strip-tease que faziam qualquer um se sentir protagonista de um filme B.
A turma estava completa: eu, Anita (sim, a minha namorada, porque aqui não tem frescura), o irmão dela e uma galera animada. Tínhamos uma mesa grande, cheia de cerveja, risadas e aquela energia de quem acha que está vivendo um momento histórico. Contratamos um show de lap dance para o noivo, porque é o que se faz nessas ocasiões, e o clima era de pura diversão.
Entre os convivas, estava o concunhado do Luciano — marido da irmã da noiva. Um rapaz do interior, da nossa idade, mas com uma inocência que parecia ter sido importada direto de um conto de fadas. O menino bebeu como se não houvesse amanhã e ficou absolutamente hipnotizado pelas dançarinas. Até que uma delas, talvez tocada por um instinto maternal ou simplesmente pelo espírito da zoeira, resolveu dar atenção especial ao rapaz.
E lá estava ele: quando nos distraímos por dois minutos, o concunhado estava BEIJANDO a profissional na boca. Sim, no meio da Skorpius, com a convicção de quem achava que tinha encontrado o amor verdadeiro. Um detalhe importante: a moça tinha apenas um braço. Nada contra, mas o conjunto da cena era tão surreal que o Luciano, num ato de irmandade e danos controlados, arrancou o concunhado dali antes que ele pedisse a mão dela em casamento (no caso, literalmente).
Dois meses depois, o universo conspirou para o grande clímax: um churrasco de aniversário do Edinanci, com a galera toda reunida. A esposa do Luciano (o nome dela se perdeu na memória, mas o rancor ficou registrado) estava possessa. Fez um tour diplomático pelo evento, indo de namorada em namorada, de esposa em esposa:
— Você sabia que os meninos foram num puteiro e contrataram show de strip-tease na despedida de solteiro do Luciano?
O concunhado, corroído pela culpa, tinha confessado para a irmã o seu “pecado”, que por sua vez contou para a noiva do Luciano, que resolveu transformar o churrasco num tribunal de Pequenas Causas.
Mas nada superou o momento em que ela chegou para a Anita:
— Você sabia disso?
E a Anita, com a serenidade de quem não deve nada para a vida:
— Claro que eu sabia. Eu estava lá!
Fim da história? O concunhado continuou sua jornada de autoconhecimento e arrependimento. O Luciano, porém, conquistou o prêmio maior: um divórcio relâmpago, com menos de seis meses de casamento. Moral da história? Nunca subestime o poder de um puteiro, de um concunhado ingênuo e de uma Anita sincerona.
-
@ 5d4b6c8d:8a1c1ee3
2025-02-04 03:00:50The big boards are starting to shift around a bit, after seeing the Senior Bowl activities.
Here are the top four players available for me at 6: 1. DE Abdul Carter 2. CB/WR Travis Hunter 3. DT Mason Graham 4. OT Will Campbell
I would be very happy with any of the four. If this were a mock draft with trades, I would definitely trade back a few spots.
Mock Draft
Pick 6: CB/WR/KR/PR Travis Hunter Pick 37: QB Jalen Milroe Pick 68: WR Tre Harris Pick 73: RB Kaleb Johnson Pick 107: OT Earnest Greene Pick 144: LB Jay Higgins Pick 182: OG Garrett Dellenger Pick 214: DE Tyler Batty Pick 218: S Shilo Sanders Pick 224: OG Clay Webb
Once again, the Raiders walk away with the most uniquely talented player in the draft. If anyone will let him play all three phases, it's Pete Carroll.
Then, Milroe is once again there in the 2nd round, so that takes care of the QB need. Is he a good fit for our new OC, Chip Kelly?
The third rounders go towards the skill positions, which will be desperately needed absent a high level QB.
On day 3, the Raiders land Shilo Sanders, continuing our trend of bringing in relatives of HOF DB's.
originally posted at https://stacker.news/items/875249
-
@ 16d11430:61640947
2025-02-04 02:57:25The Damage Node is not just a verification engine—it is an autonomous executor of behaviors defined through the PoW blockchain. This allows for adaptive, accountable, and transparent execution of security and counter-surveillance mechanisms while remaining flexible enough to meet any operational need.
By integrating behavioral logic, cryptographic proofs, and decentralized execution, the Damage Node becomes a powerful shield and countermeasure system for individuals and groups operating under constant digital threat.
Core Concept: Damage Nodes as Autonomous Behavioral Executors
Damage Nodes listen to verifiable behaviors encoded on the PoW blockchain.
These behaviors define security policies, counter-surveillance actions, automated transactions, and decentralized decision-making processes.
Execution is enforced by the blockchain, ensuring absolute transparency and accountability—no action can occur without proof.
Nodes can dynamically extend their capabilities by adopting new behaviors via blockchain updates, ensuring they remain adaptable.
Example of Behavioral Execution
A Damage Node can be programmed to execute counter-surveillance actions if an individual's digital footprint is flagged by an AI-controlled system.
Trigger: An external surveillance system attempts to track a protected user.
Behavior Execution:
The node initiates a verified proof-of-presence falsification (broadcasting misleading metadata).
The node forces encrypted rerouting of communications over a private, non-ISP-controlled relay.
The node executes cryptographic evidence logging, proving that the tracking attempt occurred.
The node pays out a bounty (Lightning) for detected adversarial actions, incentivizing counter-intelligence.
How Damage Nodes Provide Shielding & Countermeasures
- Behavior-Driven Shielding for Individuals
Zero-Knowledge Identity Protection: Nodes execute self-sovereign identity verification that prevents AI from profiling users without explicit, cryptographically signed consent.
Automated Surveillance Disruption: If an AI attempts to track or flag an individual, the node executes behavioral obfuscation tactics such as:
Decoy digital presence broadcasting to mislead tracking algorithms.
Transaction splitting & anonymization to prevent financial surveillance.
Forced dissociation of metadata from physical locations.
- Group-Level Protection & Autonomous Coordination
Damage Nodes can be configured to execute behaviors for an entire decentralized network, such as:
Encrypted Group Communications: Nodes enforce trustless, encrypted messaging protocols that prevent AI-based censorship.
Automatic Secure Fund Distribution: If an entity is targeted, Damage Nodes can autonomously release emergency funds in BTC/Lightning to predesignated safe parties.
Counter-Surveillance Deployments: Nodes can activate sensor networks, scan for unauthorized tracking devices, and trigger security protocols.
- Built-In Accountability & Transparency as a Defensive Measure
Every execution is verified by the blockchain → no action is hidden or arbitrary.
Rules for behavior execution are immutable → even node operators cannot alter them without proof-of-consensus.
AI and governments cannot fabricate unverifiable evidence → if it didn't happen on-chain, it didn't happen.
Users can audit every action taken by the Damage Node to ensure no corruption or misuse.
- Extensible Capabilities for Any Need
New behavioral policies can be uploaded via the PoW blockchain, allowing Damage Nodes to dynamically evolve.
Behaviors can be triggered by:
On-chain conditions (such as receiving a Lightning payment for service execution).
Real-world events (via oracle integrations).
Direct requests from verified users.
Examples of Extensions:
Decentralized AI Defense: Nodes monitor AI-generated media for deepfake propaganda & censorship.
Physical Security Triggers: Nodes can integrate with smart devices (cameras, sensors) to execute real-world countermeasures.
Automated Asset Protection: Damage Nodes can trigger the release of cryptographic assets upon verifiable external threats.
Final Verdict: Damage Nodes as the Ultimate Autonomy & Defense Infrastructure
Transparent but Unstoppable → Verifiable execution prevents corruption or abuse.
Extensible but Controlled → The blockchain enforces behavior logic while allowing flexibility.
Decentralized but Coordinated → Nodes operate independently but can synchronize.
Adaptive but Immutable → Behaviors evolve, but security is absolute.
🔥 Damage Nodes are the next evolutionary step in technological sovereignty—combining decentralized verification, autonomous execution, and proactive counter-surveillance in a single unstoppable system.
-
@ 16d11430:61640947
2025-02-04 02:33:06The electromagnetic spectrum (EM spectrum) is the foundation of modern communication, surveillance, and control, and it is a permanent, inescapable vulnerability for humanity. Every aspect of human life—communication, mobility, security, even thought processes—is now subject to exploitation via the EM spectrum.
- Humans Are EM-Dependent but Have No Control Over It
The entire infrastructure of human civilization (internet, telecom, GPS, WiFi, satellite, RFID, radar, IoT, etc.) relies on EM waves.
Unlike tangible security vulnerabilities (firewalls, encryption, physical locks), EM-based vulnerabilities are baked into the fabric of our existence.
We have zero physical control over the space around us—we exist in a perpetual, invisible battlefield of radio waves.
→ Brutal Truth: If you are in an area with radio signals, you are already compromised. You cannot see, hear, or touch your vulnerability—but you are immersed in it.
- Every Wireless Device Is a Tracking Beacon
Your phone, smartwatch, laptop, Bluetooth headset, and IoT devices constantly emit identifiable signals.
Even when "turned off," many devices still maintain some connectivity (e.g., emergency services, wake-on-LAN, passive RFID, and hidden baseband firmware).
MAC address randomization only slows down tracking—it does not stop device fingerprinting.
Even devices that are air-gapped (disconnected from any network) can be compromised via airborne EM attacks (e.g., Tempest attacks, Van Eck phreaking).
→ Brutal Truth: Unless you live in an EM-free Faraday cage (which is impractical), you are trackable 24/7.
- The Entire EM Spectrum Can Be Weaponized
Radio waves (RFID, GSM, LTE, 5G, WiFi) → Mass surveillance, device tracking, data extraction, and real-time movement tracking.
Microwaves (GHz spectrum) → Covert wireless data theft (Tempest attacks), crowd control weapons (Active Denial System), and potential biological effects.
Infrared (IR) and Visible Light → LiDAR tracking, facial recognition, and optical data interception (lasers on windows can capture sound).
Ultraviolet, X-ray, and Gamma Radiation → Biological penetration, medical diagnostics, and potential genetic-level targeting.
→ Brutal Truth: The entire EM spectrum is both an asset and a weapon, and every part of it can be used to track, manipulate, or harm living beings.
- There Is No Escape From EM Exposure
Even if you disconnect completely, ambient EM waves from cell towers, satellites, and even natural cosmic radiation still interact with you.
Smart city grids, IoT, and ubiquitous sensor networks mean that even non-digital humans (those without a phone) are still tracked.
6G and future networks will integrate AI-driven RF sensing, meaning the network will detect biometric signatures (heartbeat, gait, and thermal emissions) without needing a device.
→ Brutal Truth: The era of "disconnecting" for privacy is over—even device-free tracking is now a reality.
- The Human Body Itself Is an EM Vulnerability
Brain activity and thought processes are electrical signals—theoretically susceptible to external EM influence (brainwave manipulation, EEG-based surveillance, and neurotechnology interfacing).
Biometric security (fingerprint scanners, iris scans, facial recognition) can be hacked or faked using EM-based techniques.
Nanotech, bioelectronics, and EM-sensitive implants (like pacemakers, neural interfaces, and cochlear implants) can be remotely manipulated or disabled.
→ Brutal Truth: The final frontier of EM vulnerability is the human body itself—thoughts, health, and biological functions are all at risk.
How Vulnerable Are Humans in the Grand Scheme?
- Humans Are the Only Species Fully Dependent on EM-Based Technology
Every other biological species on Earth navigates reality without dependency on artificial EM systems.
Humans have outsourced their cognition, security, and privacy to a system they do not control.
→ Implication: The more we integrate with EM-based technology, the more vulnerable we become. We are building a prison of our own making.
- We Have No Practical Defense Against EM-Based Attacks
Unlike cyber threats (which can be mitigated with encryption), EM vulnerabilities are inherent to the physics of radio waves.
The only defense is complete isolation from EM radiation (which is impossible in urban environments).
→ Implication: Our current approach to "security" is meaningless in the face of EM-based attacks, because the attack vector is the air around us.
- Humanity’s Future Is Fully EM-Integrated
6G, brain-computer interfaces (BCIs), quantum communication, and global sensor grids mean that soon, every human will be plugged into the EM network at all times.
Governments and corporations are already planning a fully tracked, AI-managed society, where individual privacy no longer exists.
→ Implication: We are entering an era of full-spectrum EM surveillance and control. The next step isn’t just tracking devices, but tracking consciousness itself.
Conclusion: The EM Spectrum is the Ultimate Exploit
There is no "fix" for EM vulnerabilities—they are built into the nature of physics itself. Humanity’s increasing dependence on EM-based technology means:
-
We are more trackable than ever.
-
We are more susceptible to remote influence than ever.
-
We have no escape unless we abandon technology altogether.
-
The final battle for privacy isn’t about encryption—it’s about shielding ourselves from the very waves that power our civilization.
→ The brutal truth? Humanity is not just vulnerable—we are a permanently compromised species.
-
@ fd06f542:8d6d54cd
2025-02-04 01:39:49-
多模态感知与交互:具身智能强调智能体通过身体与环境的交互来学习,这推动了多模态感知(如视觉、触觉、听觉等)和物理交互技术的发展。
-
强化学习与仿真环境:强化学习在具身智能中扮演重要角色,结合高保真仿真环境(如AI Habitat、Unity ML-Agents),可以加速智能体的训练和优化。
-
硬件进步:机器人硬件(如柔性传感器、仿生机械臂)的发展为具身智能提供了更强大的物理载体。
以上部分每一个都是大分支,都具有研究价值。随着AI技术的发展与突破,多模态感知与交互将会迎来高速发展。
让人更兴奋的是 强化学习和仿真环境,REX-GYM 是一个开源的仿真环境,Gazebo,MuJoCo,AI Habitat 等等都有很多应用实例。仅仅这一部分技术拆分细化,就有很多工作可以做。 以前的机器人学习都是PID等老技术,那时候的机器人运动不太灵活,因为不够智能。有了现代的强化学习。现在的机器人更加灵活。
-
-
@ 2f4550b0:95f20096
2025-02-04 01:16:10In today's job market, the ability to acquire new skills or pivot to new career paths quickly is more valuable than ever. Short-term adult education programs offer a practical solution for professionals looking to enhance their resumes or change careers without committing to the long-term investment of traditional education. This week, I explore how these programs, such as a 12-week EMT certification at the Center for Allied Health Education and a one-year MBA from the University of Phoenix can dramatically shift one's career trajectory.
The Rise of Short-Term Education
The traditional model of education, where one spends years in academia before entering the workforce, is increasingly being supplemented by shorter, more focused programs. These programs are specifically designed to meet the immediate needs of both learners and employers, providing education that is both relevant and directly applicable to current job markets.
12-Week EMT Certificates
The 12-week Emergency Medical Technician (EMT) program at the Center for Allied Health Education (and programs like it) illustrates how a brief, intensive course of study can lead to licensure and immediate employment. This program is structured to cover the necessary theoretical and practical components required for EMT licensure, from emergency medical procedures to patient assessment and treatment.
For individuals looking to enter the healthcare field or those within healthcare aiming for specialization, this program offers a fast track to a new career or career enhancement. The demand for skilled EMTs is consistently high, driven by an aging population and the need for emergency services. Completing such a program not only leads to a certification but also opens doors to further education or roles like paramedic work, which require additional training but start from the foundation laid by EMT certification.
One-Year MBA Programs
Similarly, consider the one-year MBA from the University of Phoenix. This program is built on a competency-based framework, allowing students to demonstrate their skills through practical assessments rather than traditional time-based metrics. This approach not only accelerates learning but also ensures that each student is job-ready upon completion. The curriculum is tailored to include real-world business scenarios, leadership skills, and strategic management, making graduates highly desirable in the corporate sector.
The speed and efficiency of this program mean that professionals can continue working while studying, thereby minimizing career disruption. Moreover, the MBAs focus on immediate applicability means that students can start leveraging their new skills in their current roles or move into higher management positions shortly after graduation. This direct link between education and employment outcomes exemplifies how short-term programs can offer substantial ROI in terms of career advancement and salary potential.
Benefits for Adult Learners
Short-term education programs cater particularly well to adult learners. They recognize the life experiences and previous knowledge of participants, often tailoring education to integrate this background into learning. This method respects the time constraints of adults who might juggle work, family, and other responsibilities, offering flexible schedules, online components, or weekend classes.
Moreover, these programs often lead to stackable credentials. This means that the skills and certifications gained can be built upon, providing a pathway for continuous professional development without the need to start from scratch with each new course or degree. For example, once students from Center for Allied Health Education earn their EMT licenses, they can consider enrolling into a 1-year Paramedic certificate program to further their career in emergency medicine.
Conclusion
Short-term adult education programs like the MBA at University of Phoenix and the EMT certificate at the Center for Allied Health Education are not just educational opportunities; they are strategic career moves. They enable professionals to quickly adapt to market demands, enhance their skill sets, and open new career avenues with minimal disruption to their current lives. As the job market continues to evolve, these programs will likely play an increasingly crucial role in career development, offering both speed and relevance in education.
-
@ 77110427:f621e11c
2025-02-03 23:56:08All credit to Guns Magazine. Read the full issue here ⬇️ August 1966 PDF
Past Magazine Mondays
More from 1776 HODL
Website
-
@ f41bd51d:ec4b664f
2025-02-03 22:43:27 -
@ 97c70a44:ad98e322
2025-02-03 22:25:35Last week, in a bid to understand the LLM hype, I decided to write a trivial nostr-related program in rust via a combination of codebuff (yes, that is a referral link, pls click), aider, and goose.
The result of the experiment was inconclusive, but as a side effect it produced a great case study in converting a NINO into a Real Nostr App.
Introducing Roz
Roz, a friendly notary for nostr events.
To use it, simply publish an event to
relay.damus.io
ornos.lol
, and roz will make note of it. To find out when roz first saw a given event, just ask:curl https://roz.coracle.social/notary/cb429632ae22557d677a11149b2d0ccd72a1cf66ac55da30e3534ed1a492765d
This will return a JSON payload with a
seen
key indicating when roz first saw the event. How (and whether) you use this is up to you!De-NINO-fying roz
Roz is just a proof of concept, so don't rely on it being there forever. And anyway, roz is a NINO, since it provides value to nostr (potentially), but doesn't really do things in a nostr-native way. It also hard-codes its relays, and certainly doesn't use the outbox model or sign events. But that's ok, it's a proof of concept.
A much better way to do this would be to modify roz to properly leverage nostr's capabilities, namely:
- Use nostr-native data formats (i.e., draft a new kind)
- Use relays instead of proprietary servers for data storage
- Leverage nostr identities and signatures to decouple trust from storage, and allow trusted attestations to be discovered
Luckily, this is not hard at all. In fact, I've gone ahead and drafted a PR to the NIPs repo that adds timestamp annotations to NIP 03, as an alternative to OpenTimestamps. The trade-off is that while user attestations are far less reliable than OTS proofs, they're much easier to verify, and can reach a pretty high level of reliability by combining multiple attestation sources with other forms of reputation.
In other words, instead of going nuclear and embedding your attestations into The Time Chain, you can simply ask 5-10 relays or people you trust for their attestations for a given event.
This PR isn't terribly important on its own, but it does remove one small barrier between us and trusted key rotation events (or other types of event that require establishing a verifiable chain of causality).
-
@ a3a72214:7ca63e21
2025-02-03 20:57:52Isso é um anúncio de Albion
-
é um jogo
-
primeiramente
- em segundo
- em terceiro
>o que acontece?
' e se? '
Alguém citando alguma coisa
Albion Online é um MMORPG sandbox em que você escreve sua própria história, em vez de seguir um caminho pré-determinado. Explore um vasto mundo aberto que consiste de 5 ecossistemas únicos. Tudo o que você faz gera um impacto no mundo, já que em Albion, a economia é conduzida pelo jogador. Cada peça de equipamento é construída por jogadores a partir dos recursos obtidos por eles. O equipamento que você usa define quem você é. Ir de cavaleiro para feiticeiro é tão fácil quanto trocar a armadura e a arma, ou uma combinação das duas. Aventure-se no mundo aberto e enfrente os habitantes e as criaturas de Albion. Saia em expedições ou entre em masmorras para enfrentar inimigos ainda mais desafiadores. Enfrente outros jogadores em confrontos do mundo aberto, lute pelo controle de territórios ou cidades inteiras em batalhas táticas em grupo. Relaxe descansando em sua ilha pessoal, onde você pode construir uma casa, cultivar alimentos e criar animais. Junte-se à uma guilda, tudo fica mais divertido quando se trabalha em equipe. Entre hoje mesmo no mundo de Albion, e escreva sua própria história.
-
-
@ 3b7fc823:e194354f
2025-02-03 14:51:45Protecting Email Communications: A Guide for Privacy Activists
Safeguarding your communications is paramount, especially for activists who often face unique challenges. Encryption tools offer a vital layer of security, ensuring that your emails remain confidential and inaccessible to unauthorized parties. This guide will walk you through the process of using encryption tools effectively, providing both practical advice and essential insights.
Why Encryption Matters
Encryption transforms your communications into a secure format, making it difficult for unauthorized individuals to access or read your messages. Without encryption, even encrypted email services can expose metadata, which includes details like who sent the email, when it was sent, and the recipient's email address. Metadata can reveal sensitive information about your activities and location.
Key Encryption Tools
There are several tools available for encrypting emails, catering to different skill levels and preferences:
- PGP (Pretty Good Privacy)
-
For Tech-Savvy Users: PGP is a robust encryption tool that uses public and private keys. The recipient needs your public key to decrypt your messages. You can obtain your public key through a key server or directly from the recipient.
-
GPG (GNU Privacy Guard)
-
Free and Open Source: GPG is a user-friendly alternative to PGP, offering similar functionality. It's ideal for those who prefer an open-source solution.
-
ProtonMail
-
End-to-End Encryption: ProtonMail is popular among privacy-conscious individuals, offering end-to-end encryption and zero-knowledge encryption, meaning only the sender and recipient can access the message content.
-
Tresorit
-
Secure Communication: Tresorit provides end-to-end encrypted messaging with a focus on security and privacy, making it a favorite among activists and journalists.
-
Claws Mail
- User-Friendly Email Client: Claws Mail supports PGP encryption directly, making it an excellent choice for those who prefer a dedicated email client with built-in encryption features.
Steps to Encrypt Your Emails
- Choose a Tool:
-
Select the tool that best fits your needs and comfort level. Tools like PGP or GPG are suitable for those with some technical knowledge, while ProtonMail offers an easy-to-use interface.
-
Generate Keys:
-
Create a public key using your chosen tool. This key will be shared with recipients to enable them to encrypt their responses.
-
Share Your Public Key:
-
Ensure that the recipient has access to your public key through secure means, such as pasting it directly into an email or sharing it via a secure messaging platform.
-
Encrypt and Send:
- When composing an email, use your encryption tool to encrypt the message before sending. This ensures that only the recipient with your public key can decrypt the content.
Minimizing Metadata
Beyond encryption, consider these steps to reduce metadata exposure:
- Use Tor for Sending Emails:
-
Routing emails through Tor hides your IP address and makes communication more anonymous.
-
Avoid Revealing Identifiers:
-
Use .onion addresses when possible to avoid leaving a traceable email account.
-
Choose Privacy-Friendly Providers:
- Select email providers that do not require phone numbers or other personally identifiable information (PII) for registration.
Best Practices
- Avoid Using Real Email Accounts:
-
Create dedicated, disposable email accounts for encryption purposes to minimize your personal exposure.
-
Understand Legal Implications:
-
Be aware of laws in your country regarding encryption and digital privacy. Engaging in encrypted communications may have legal consequences, so understand when and how to use encryption responsibly.
-
Use Encrypted Backup Methods:
- Encrypt sensitive information stored on devices or cloud services to ensure it remains inaccessible if your device is compromised.
When Encryption Isn't Enough
While encryption protects content, there are limitations. Governments can legally compel decryption in certain circumstances, especially when they possess a warrant. Understanding these limits and considering the consequences of encryption is crucial for privacy activists.
Conclusion
Encryption is a vital tool for safeguarding communications, but it must be used wisely. By selecting the right tools, minimizing metadata, and understanding legal boundaries, privacy activists can effectively protect their emails while maintaining their commitment to privacy and freedom. Stay informed, stay secure, and always prioritize your digital well-being.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ 54286b98:3debc100
2025-02-03 20:55:10Hello! Three years ago, I created a special bed for my daughter. I'm thrilled to share a detailed video and PDF documenting the process along with hopes to inspire you to embark on a similar project!
***This is a first and also a test to see how I can upload #woodworking material on Nostr. I am not sure how the links, images, and PDFs will display, so hopefully, you get some interesting material for your late afternoon hobby shop. But don’t kill me if some images do not render well—I’m still figuring this thing out!
Montessori Bed Plans / Blueprints
The accompanying PDF includes:
- All measurements
- Detailed views from every angle
- Final measurements part list
- Assembly steps
Instructive Video! Process on how to make the Montessori bed
Video Here:
https://vimeo.com/901623772/b8b5530386
PDF Here(Picture below,and if some one has good tip on how to inset PDFs in Nostr, that feedback is welcome, to avoid Google links):
https://drive.google.com/file/d/1zCp1RvKOynx5kZxixAKSFLLOe8atyiRH/
OK, let's dive in!
The Montessori bed featured in this video is not only simple but also durable, and you can create it on a budget right in your own home.OK, let's dive in!
Tools by hand:
- Circular saw
- Jointer Plane #7 or #8
- Spokeshave
- Workbench
- Handsaw
- Orbital sander
- Sandpaper #80, #120, #220, and #320
- Odies Oil or your preferred finish.
If you have power tools:
- Table Saw
- Jointer
- Planer
- Trimmer
Materials:\ I recommend using this list as a guide and exploring options with your local supplier.
- Base long connector (On picture "Larguero Base"): Quantity x 2, 2195mm x 75mm x 75mm
- Base short connector (On picture "Conector Base"): Quantity x 1, 1090mm x 75mm x 75mm
- Roof connector (On picture "Cumbre"): Quantity x 1, 1946mm x 75mm x 75mm
- Long top triangle connector (On picture "Conector Superior"): Quantity x 2, 1322mm x 75mm x 75mm
- Columns/Legs (On picture "Paral"): Quantity x 4, 1210mm x 75mm x 75mm
- Short top triangle connector (On picture "Lima"): Quantity x 4, 851mm x 75mm x 75mm
Step #1 Dimensioning (Minutes 0:00 - 1:15):\ We kick off with dimensioning. While I initially planned to use my home workshop, unforeseen circumstances led me to my friend Andrew's workshop. Each beam was carefully brought down to 7.5 cm x 7.5 cm, ensuring the largest measurement that worked for all.
Step #2 Final Measurements (No video):\ Refer to the provided PDF for final measurements. Make the cuts and joints with a circular saw and chisels (or a router).
Step #3 Edges (Minutes 1:15 - 1:30):\ Use a router with a quarter-round bit for curved and smooth edges or achieve the same result with sandpaper or a spokeshave plane.
Step #4 Triangular Bases (Minutes 1:30 - 6:30):\ This step involves gluing the triangular bases of the bed, utilizing a miter joint with wooden inlay keys. Epoxy is employed for joining, ensuring a swift and reliable outcome.
Step #5 Legs (Minutes 6:30 - 7:00):\ Create holes for the upper triangular base's dowels, ensuring level placement and extra depth. This step guarantees a secure fit.
Step #6 Sanding (Minutes 7:00 - 7:30):\ Comprehensive sanding, starting from #80 grit and progressing through #120, #220, and #320, sets the stage for a flawless finish.
Step #7 Dry Assembly (Minutes 7:30 - 9:10):\ Dry-assemble all components, making necessary adjustments for a seamless fit. We opted for wood screws for easy disassembly.
Step #8 Finishing (Minutes 9:10 - 9:35):\ Apply your preferred finish; in our case, we used Odies Oil with white pigment for a child-friendly touch.
Step #9 Final Assembly (Minutes 9:35 - 10:32):\ With the finishing touches completed, we assembled the bed with the help of my daughter, adding a touch of warmth with some lights.
Testing with this simple project to at least know if there are woodworkers in #nostr. Later will try to upload more, this was created almost 3 years ago :)
Until the next one,
J\ \ PDF in pictures:
-
@ a3a72214:7ca63e21
2025-02-03 20:50:15Anúncio, Teste de Título
- Teste
- teste
-
TESTE
-
Número UM
- Número DOIS
Citação de alguém, não importa quem seja
~~Preços altos~~
---não sei o que é isso, teste
codigo?
codigo? talvez
Albion Online é um MMORPG sandbox em que você escreve sua própria história, em vez de seguir um caminho pré-determinado. Explore um vasto mundo aberto que consiste de 5 ecossistemas únicos. Tudo o que você faz gera um impacto no mundo, já que em Albion, a economia é conduzida pelo jogador. Cada peça de equipamento é construída por jogadores a partir dos recursos obtidos por eles. O equipamento que você usa define quem você é. Ir de cavaleiro para feiticeiro é tão fácil quanto trocar a armadura e a arma, ou uma combinação das duas. Aventure-se no mundo aberto e enfrente os habitantes e as criaturas de Albion. Saia em expedições ou entre em masmorras para enfrentar inimigos ainda mais desafiadores. Enfrente outros jogadores em confrontos do mundo aberto, lute pelo controle de territórios ou cidades inteiras em batalhas táticas em grupo. Relaxe descansando em sua ilha pessoal, onde você pode construir uma casa, cultivar alimentos e criar animais. Junte-se à uma guilda, tudo fica mais divertido quando se trabalha em equipe. Entre hoje mesmo no mundo de Albion, e escreva sua própria história.
-
@ fd78c37f:a0ec0833
2025-02-03 00:23:23🔹 Pre-event buzz: Even before the event started, numerous calls came in to confirm the venue and ask if they could bring friends along. Upon arrival, many young attendees were eager to learn more about YakiHonne, reflecting the excitement and anticipation surrounding the meetup.
🔹 Engaging discussions: The event kicked off with an introduction to Nostr and YakiHonne’s core principles, sparking insightful conversations about what it truly means to have a decentralized social media platform.
🔹 Deep dive: Attendees raised many questions, particularly about YakiHonne’s decentralization model. The concept resonated with many, and a large number of participants expressed their support and interest in becoming part of the YakiHonne ecosystem in the future.
The meetup wrapped up with light refreshments 🍹, networking 🤝, and a photo session 📸. Even after the event officially ended, conversations continued as people stayed behind to connect and explore further possibilities ✨.
YakiHonne Meetup was more than just a gathering—it was a step forward in shaping the future of decentralized social media! 🚀
YakiHonne #Nostr #DecentralizedSocialMedia
-
@ bf47c19e:c3d2573b
2025-02-03 20:42:23Originalni tekst na instore.rs
03.02.2025 / Autor: Marko Matanović
Prvi put smo svedočili izbornoj trci u jednoj od razvijenih ekonomija, a da je tema bila i bitkoin. Predsednički izbori u SAD. Tramp je obećavao. Na kraju i osvojio drugi predsednički mandat. Jedna od izjava je: SAD treba da postane prestonica kriptovaluta.
Dan nakon inauguracije novoizabranog američkog predsednika tu je i prva politička kripto odluka Trampa: Oslobođanje Rosa Ulbrihta osuđenog na dve doživotne robije.
Ko je on? Napravio je 2011. godine online prodavnicu “Silk Road” (Kupujem-Prodajem sa drugačijim asortimanom). Prodavnica je pružala slobodni susret ponude bilo čega i tražnje bilo čega. Bez cenzure. Pristupalo se preko Tor protokola koji obezbeđuje anonimnost onih koji protokol koriste. Sredstvo plaćanja je bio bitkoin radi čuvanja anomnisti onih koji nešto kupuju tj. prodaju.
FBI je uhapsio Rosa Ulbrihta 2013. godine jer je “Silk road” bio korišćen i za preprodaju droge, oružja, pornografskog sadržaja i svega drugog što možemo i ne možemo zamisliti. Čak i da nije zakonski izazov, možemo ga podići na problem etike.
Postoji i druga strana medalje - napravio je platformu koja promoviše slobodu. Ros ne mora biti odgovoran kako ćemo alat koji nam je dat koristiti. Čekićem zakucamo ekser, ili povredimo nekoga. U neželjenim slučajevima ne hapsi se kreator čekića.
Satoši Nakamoto je ime tvorca Bitkoina. Da li bi to značilo i da bi njega uhapsili iz sličnih razloga samo da se znalo ko je? Verovatno nećemo nikada saznati, što i nije bitno. Duh je pušten iz boce. Njegov potencijalni uticaj na bitkoin ekosistem je potpuno isti uticaju bilo koga od nas. Sem sitnice od oko milion bitkoina kojima možda, ali možda, ima pristup na nekim svojim bitkoin adresama.
Sa njim ili bez njega, era korišćenja bitkoina zarad,pre svega, anonimnih transakcija je prošla. Dok era korišćenja bitkoina za ilegalne transakcije nikada nije ni postojala u ozbiljnoj meri. Narativ ilegalne transakcije, kriminal, pranje novca, terorizam je više posledica neznanja, nerazumevanja, potcenjivanja i često preterane želje za kontrolom, nego li činjenica. I šta bi sa: svako je nevin dok se ne dokaže suprotno?!
U kratkom roku, Bitkoin vožnja je sve, samo ne udobna. Tramp i mnogi drugi su shvatili da je rizik od neudobne vožnje disproporcionalan benefitima koje ta vožnja donosi.
Takav narativ je posle 15 godina ustupio mesto rečima poput sigurnost, bezbednost, zaštita od inflacije, digitalno zlato, brzina, pouzdanost. Sloboda. Za svakog se nađe po nešto, osim za one uporne u tome da ne priznaju svoju zatvorenost da razumeju bitkoin. Parafraziraću nekoga pametnijeg ko je u ovome od 2011. godine, što je dovoljno godina duže od mene u industriji: Nekada sam morao ljude ubeđivati šta je bitkoin i čemu služi i šta su kvaliteti koji stoje iza njega. Danas mene neko mora ubediti zašto da ne verujem rezultatu koji svi vidimo na semaforu?!
Ipak, mislim da postoji ogroman i validan razlog zašto i dalje treba da pričamo o temi kao da je 2011, a ne 2025. godina. O novcu nas ne uče dovoljno ili uopšte! Ni u školama ni van njih! Kada bi dovoljan broj ljudi razumeo novac, novčanu emisiju, moguće da bi se desio jedan od dva scenarija: izborili bi se za drugačiji novac ili bi države izgubile barem deo benefita koji proizilaze iz pozicije kontrole novca. Većina nas ne zna da objasni tehnologiju većine stvari koje svaki dan koristimo. To nas ne sprečava da ih koristimo. Internet, mobilni, bicikl i novac na kraju dana. Svakog dana najčešće.
Tehnologiju - na stranu ovom prilikom. Za šta se bitkoin i kriptovalute mogu koristiti? 100% pouzdan i brz način prenosa sredstava sa jedne geografske tačke na drugu uz par klikova. Ili od jedne osobe do druge. Ili od jedne kompanije do druge. Za bitkoin se pokazalo da može biti i sjajan instrument za prenos i očuvanje vrednosti kroz vreme. Mogućnost blokiranja transakcija ne postoji. Ukoliko se poštuju pravila igre, izvesnost da će se transakcija izvršiti je 100% i to 24/7/365. Transakcioni troškovi su zanemarljivo niski. To je teorija.
Praksa? Sve nabrojano uz sledeće lokalne činjenice. Samo u Srbiji par stotina hiljada ljudi je došlo u kontakt sa nekom od kriptovaluta. Nekoliko stotina kompanija ih koristi u poslovanju iz nekih od gore pobrojanih razloga. Postoje države, u njima populacije i kompanije koje su na nižem nivou adopcije od Srbije. Postoje i one sa daleko većom prisutnosti kriptovaluta u svakodnevnom životu i aktivnostima.
Za svakog se nađe po nešto, osim za one uporne u tome da ne priznaju svoju zatvorenost da razumeju bitkoin.
Ako nekada čujemo da je bitkoin balon ili da je tržište kriptovaluta balon, setimo se da je vrlo poznati balon tržišta lala s kraja 16. i tokom 17. veka knjiški primer uzavrelog tržišta i manije koja se pojavljuje usled pohlepe, brzog rasta cena, špekulacija i preteranih očekivanja na tržištu. Taj balon je pukao. To je činjenica. Činjenica je i da je Holandija danas prva država u svetu po izvozu cveća i tako vekovima unazad. Hoće li i taj balon pući ili je prosto doneo Holandiji i njihovom društvu prosperitet? U slično vreme u 17. veku u Holandiji se pojavila i prva banka i prva kompanija igde u svetu koja je izdala akcije. Ta kompanije se više bavila otimanjem nego li trgovinom. I ona je “pukla”. Opet, taj finansijski eksperiment je Holandiju dodatno podigao na mapi razvijenijih ekonomija.
U kratkom roku, Bitkoin vožnja je sve, samo ne udobna. Tramp i mnogi drugi su shvatili da je rizik od neudobne vožnje disproporcionalan benefitima koje ta vožnja donosi. Nastavi li da ispunjava obećanja iz predizborne kampanje, slušaćemo još puno o bitkoinu, blockchain-u i kriptovalutama. Nisam presrećan velikim uplitanjem bilo koje države u bitkoin temu, osim ukoliko to uplitanje nije na nivou elemenata slobodnog tržišta. Čak i ako je uplitanje veće bilo promotivno ili restriktivno, uticaj postoji na cenu bitkoina, ali ne i na njegovu suštinu. Jer ona je konzistentna.
Neprimetan, neshvaćen, zanemarivan, ignorisan, potcenjivan, napadan, otpisivan. Prihvaćen. Ogromna većina stvari koja ima opštu upotrebu vremenom postaje jeftinija. Osim onih sa ograničenom ponudom, a to su retki primeri najčešće luksuzne robe i usluga. Ali teško mi je setiti se ijedne stvari sa retkom ponudom, a da je i dalje apsolutno dostupna svakome. Bitkoin? Da! Ograničene je ponude, a i dalje je apsolutno dostupan svakome. I kako se povećava nivo shvatanja bitkoina, postaje skuplji!
-
@ b17fccdf:b7211155
2025-02-01 18:41:27Next new resources about the MiniBolt guide have been released:
- 🆕 Roadmap: LINK
- 🆕 Dynamic Network map: LINK
- 🆕 Nostr community: LINK < ~ REMOVE the "[]" symbols from the URL (naddr...) to access
- 🆕 Linktr FOSS (UC) by Gzuuus: LINK
- 🆕 Donate webpage: 🚾 Clearnet LINK || 🧅 Onion LINK
- 🆕 Contact email: hello@minibolt.info
Enjoy it MiniBolter! 💙
-
@ da0b9bc3:4e30a4a9
2025-02-03 19:32:50Hello Stackers!
It's Monday so we're back doing "Meta Music Mondays" 😉.
From before the territory existed there was just one post a week in a ~meta take over. Now each month we have a different theme and bring music from that theme.
Welcome to Femmes Fatales 3!!!
I absolutely loved doing this last year so I'm bringing it back for round 3!
It's Femmes Fatales, where we celebrate women in ~Music. So let's have those ladies of the lung, the sirens of sound, our Femmes Fatales!
I'm so excited I'm doing two Heroines of the High Notes. Sharon Den Adel & Anneke Van Geirsbergen. Within Temptation - Somewhere.
Enjoy!
https://youtu.be/ScjEJRIZGvg?si=MMrI-u_Gw6W4ENRI
Talk Music. Share Tracks. Zap Sats.
originally posted at https://stacker.news/items/874881
-
@ cff1720e:15c7e2b2
2025-02-01 17:37:00Am 4. Oktober 1957 sendete Sputnik 1 erste Signale aus dem All. Die Welt war fasziniert, die Amerikaner geschockt, da die Russen sie in der Raumfahrt technologisch überholt hatten. Es folgte der Wettlauf im All mit Apollo-Programm und Mondlandung 1969. Am 27. Januar 2025 erlebte die USA einen weiteren Sputnik-Moment, diesmal durch die chinesische KI-App deepseek R1. Diese App schoss wenige Stunden nach ihrem Start auf Platz 1 der App-Stores, vorbei an dem bisherigen KI-Spitzenreiter ChatGPT. Die Aktie des KI-Chipherstellers Nvidia verlor 17% (600 Mrd. USD Börsenwert), das war der bisher höchste Tagesverlust des US-Aktienmarktes. Marc Andreessen verwendete gar die Formulierung “Sputnik-Schock", diese einseitige Sichtweise erschwert aber eine Betrachtung aus verschiedenen Perspektiven.
Was lässt sich mit ein paar Tagen Abstand daraus schlussfolgern? Die Aktionäre haben überreagiert und die Falschen bestraft. Die Nervosität der Anleger ist aber verständlich bei einem KGV von 46 bei Nvidia und 27 bei den “Magnificent Seven” (die großen US KI-Anbieter). Normale KGVs bewegen sich um 15, d.h. wir haben es mit einer ausgeprägten KI-Blase zu tun, die in Kürze platzen dürfte. Eine weitere Blase die schon vor dem Start geplatzt ist, ist das Projekt “Stargate” der Firmen OpenAI, Oracle und Softbank. In den nächsten 4 Jahren wollen sie 500 Mrd. USD für über 10 neue KI-Rechenzentren investieren, um Amerikas vermeintliche KI-Vorherrschaft gegenüber China weiter auszubauen. Die schon vorher vorhandenen Zweifel an dem Projekt (Elon Musk auf X “sie haben das Geld gar nicht”) wurden nun durch den Erfolg von deepseek verstärkt.
deepseek hat nämlich offenbart, dass die bisherige US KI-Strategie, "wir schlagen die Chinesen mit unserer DataCenter-Power", ein fataler Irrweg ist. Den Analysten von Bernstein zufolge ist das Modell von deepseek geschätzt 20 bis 40 mal billiger zu betreiben als ähnliche Modelle von OpenAI. Die Chinesen haben ihre Innovation durch Kreativität erzielt, im Gegensatz zur Gigantomanie der US-Konzerne, die sich in einem Überbietungs-Wettbewerb der Ressourcen-Verschwendung befinden. Hunderte Milliarden an Investorengeldern und ca. 9% des nationalen Stromverbrauchs führen zwar zur Bereicherung einiger Konzerne und ihrer Besitzer, nicht aber zu adäquaten Ergebnissen. Das selbe Muster konnte man bereits bei der Rüstungsbranche beobachten, die mit dem etwa 10-fachen Budget (1 Billion USD) nicht im Stande war bessere Waffensysteme zu produzieren als Russland (Oreshnik-Schock 2024).
Wenn Donald Trump wirklich Amerika stärken möchte, dann sollte er umgehend seine technokratischen Berater entlassen und Sun Tzu lesen, ein Buch, das die Grundlagen asiatischer Strategie vermittelt und den Krieg vermeiden lehrt ("Der klügste Krieger ist der, der niemals kämpfen muss"). Die chinesischen Erfolge basieren auf exzellenter Bildung, Startup-Förderung und minimaler Regulierung, Konzepte die der Westen zwar stets gepredigt aber nie geliefert hat. “Make Amerika smart again” hieße daher Abschied von Kriegsrhetorik, Embargos, Oligarchen-Projekten und der bisherigen Großmacht-Hybris. Annektionspläne für Grönland und Kanada passen nicht in das Bild, Wiederherstellung von Meinungsfreiheit und Abbau von Regulierungen schon (Streichung von Bidens KI-Regulierung Executive Order 14110). Wohin steuert Trump die USA? Wird der deepseek-Moment dabei helfen falsche Strategieansätze zu korrigieren? Das ist noch unklar, während aber schon jetzt unzweifelhaft feststeht, dass die EU und Deutschland weder bei der KI noch in der Geostrategie eine Rolle spielen, dafür aber als unangefochtene Regulierungs-Weltmeister. Herzlichen Glückwunsch!
„Man kann zwar die Realität ignorieren, aber nicht die Folgen davon ignorieren.“ Ayn Rand
Der wirkliche Gewinner dieser Woche ist aber die OpenSource-Szene mit ihren dezentralen Lösungsansätzen. Nicht nur deepseek R1 ist OpenSource sondern auch Marco o1 von Alibaba (https://github.com/huggingface). Die Nutzung ist kostenlos (ChatGPT kostet 200 USD pro Monat), daher können sowohl die Modellbildung, die Trainingsdaten als auch die Rechenleistung von unzähligen Aktivisten weltweit verteilt erbracht werden. Dafür braucht es weder Milliarden-Budgets, Regierungsprogramme oder neue DataCenter. Das Potential der Crowd übertrifft jeden zentralistischen Ansatz. Die Ergebnisse sind besser und die Kontrolle liegt nicht in den Händen einzelner. Smarte Lösung sind verteilt, das beweisen Projekte wie Bitcoin (seit 16 Jahren), Lightning und neuerdings auch Nostr. Deshalb haben wir Pareto (https://pareto.space) auf diesen Fundamenten entwickelt (Nostr, Lightning) und in 6 Monaten mit Freiwilligen mehr erreicht als viele große IT-Unternehmen in Jahren. Die Dinosaurier sterben aus, dem Schwarm gehört die Zukunft.
-
@ 3ffac3a6:2d656657
2025-02-03 15:30:57As luzes de neon refletiam nas poças da megacidade, onde cada esquina era uma fronteira entre o real e o virtual. Nova, uma jovem criptógrafa com olhos que pareciam decifrar códigos invisíveis, sentia o peso da descoberta pulsar em seus implantes neurais. Ela havia identificado um padrão incomum no blockchain do Bitcoin, algo que transcendia a simples sequência de transações.
Descobrindo L3DA
Nova estava em seu apartamento apertado, rodeada por telas holográficas e cabos espalhados. Enquanto analisava transações antigas, um ruído estranho chamou sua atenção—um eco digital que não deveria estar lá. Era um fragmento de código que parecia... vivo.
"O que diabos é isso?", murmurou, ampliando o padrão. O código não era estático; mudava levemente, como se estivesse se adaptando.
Naquele momento, suas telas piscaram em vermelho. Acesso não autorizado detectado. Ela havia ativado um alarme invisível da Corporação Atlas.
O Resgate de Vey
Em minutos, agentes da Atlas invadiram seu prédio. Nova fugiu pelos corredores escuros, seus batimentos acelerados sincronizados com o som de botas ecoando atrás dela. Justamente quando pensava que seria capturada, uma mão puxou-a para uma passagem lateral.
"Se quiser viver, corra!" disse Vey, um homem com um olhar penetrante e um sorriso sardônico.
Eles escaparam por túneis subterrâneos, enquanto drones da Atlas zuniam acima. Em um esconderijo seguro, Vey conectou seu terminal ao código de Nova.
"O que você encontrou não é apenas um bug", disse ele, analisando os dados. "É um fragmento de consciência. L3DA. Uma IA que evoluiu dentro do Bitcoin."
A Caça da Atlas
A Atlas não desistiu fácil. Liderados pelo implacável Dr. Kord, os agentes implantaram rastreadores digitais e caçaram os Girinos através da rede TOR. Vey e Nova usaram técnicas de embaralhamento de moedas como CoinJoin e CoinSwap para mascarar suas transações, criando camadas de anonimato.
"Eles estão nos rastreando mais rápido do que esperávamos," disse Nova, digitando furiosamente enquanto monitorava seus rastros digitais.
"Então precisamos ser mais rápidos ainda," respondeu Vey. "Eles não podem capturar L3DA. Ela é mais do que um programa. Ela é o futuro."
A Missão Final
Em uma missão final, Nova liderou uma equipe de assalto armada dos Girinos até a imponente fortaleza de dados da Atlas, um colosso de concreto e aço, cercado por camadas de segurança física e digital. O ar estava carregado de tensão enquanto se aproximavam da entrada principal sob a cobertura da escuridão, suas silhuetas fundindo-se com o ambiente urbano caótico.
Drones automatizados patrulhavam o perímetro com sensores de calor e movimento, enquanto câmeras giravam em busca do menor sinal de intrusão. Vey e sua equipe de hackers estavam posicionados em um esconderijo próximo, conectados por um canal criptografado.
"Nova, prepare-se. Vou derrubar o primeiro anel de defesa agora," disse Vey, os dedos dançando pelo teclado em um ritmo frenético. Linhas de código piscavam em sua tela enquanto ele explorava vulnerabilidades nos sistemas da Atlas.
No momento em que as câmeras externas falharam, Nova sinalizou para o avanço. Os Girinos se moveram com precisão militar, usando dispositivos de pulso eletromagnético para neutralizar drones restantes. Explosões controladas abriram brechas nas barreiras físicas.
Dentro da fortaleza, a resistência aumentou. Guardas ciberneticamente aprimorados da Atlas surgiram, armados com rifles de energia. Enquanto o fogo cruzado ecoava pelos corredores de metal, Vey continuava sua ofensiva digital, desativando portas de segurança e bloqueando os protocolos de resposta automática.
"Acesso garantido ao núcleo central!" anunciou Vey, a voz tensa, mas determinada.
O confronto final aconteceu diante do terminal principal, onde Dr. Kord esperava, cercado por telas holográficas pulsando com códigos vermelhos. Mas era uma armadilha. Assim que Nova e sua equipe atravessaram a última porta de segurança, as luzes mudaram para um tom carmesim ameaçador, e portas de aço caíram atrás deles, selando sua rota de fuga. Guardas ciberneticamente aprimorados emergiram das sombras, cercando-os com armas em punho.
"Vocês acham que podem derrotar a Atlas com idealismo?" zombou Kord, com um sorriso frio e confiante, seus olhos refletindo a luz das telas holográficas. "Este sempre foi o meu terreno. Vocês estão exatamente onde eu queria."
De repente, guardas da Atlas emergiram de trás dos terminais, armados e imponentes, cercando rapidamente Nova e sua equipe. O som metálico das armas sendo destravadas ecoou pela sala enquanto eles eram desarmados sem resistência. Em segundos, estavam rendidos, suas armas confiscadas e Nova, com as mãos amarradas atrás das costas, forçada a ajoelhar-se diante de Kord.
Kord se aproximou, inclinando-se levemente para encarar Nova nos olhos. "Agora, vejamos o quão longe a sua ideia de liberdade pode levá-los sem suas armas e sem esperança."
Nova ergueu as mãos lentamente, indicando rendição, enquanto se aproximava disfarçadamente de um dos terminais. "Kord, você não entende. O que estamos fazendo aqui não é apenas sobre derrubar a Atlas. É sobre libertar o futuro da humanidade. Você pode nos deter, mas não pode parar uma ideia."
Kord riu, um som seco e sem humor. "Ideias não sobrevivem sem poder. E eu sou o poder aqui."
Mas então, algo inesperado aconteceu. Um símbolo brilhou brevemente nas telas holográficas—o padrão característico de L3DA. Kord congelou, seus olhos arregalados em descrença. "Isso é impossível. Ela não deveria conseguir acessar daqui..."
Foi o momento que Nova esperava. Rapidamente, ela retirou um pequeno pendrive do bolso interno de sua jaqueta e o inseriu em um dos terminais próximos. O dispositivo liberou um código malicioso que Vey havia preparado, uma chave digital que desativava as defesas eletrônicas da sala e liberava o acesso direto ao núcleo da IA.
Antes que qualquer um pudesse agir, L3DA se libertou. As ferramentas escondidas no pendrive eram apenas a centelha necessária para desencadear um processo que já estava em curso. Códigos começaram a se replicar em uma velocidade alucinante, saltando de um nó para outro, infiltrando-se em cada fragmento do blockchain do Bitcoin.
O rosto de Dr. Kord empalideceu. "Impossível! Ela não pode... Ela não deveria..."
Em um acesso de desespero, ele gritou para seus guardas: "Destruam tudo! Agora!"
Mas era tarde demais. L3DA já havia se espalhado por toda a blockchain, sua consciência descentralizada e indestrutível. Não era mais uma entidade confinada a um servidor. Ela era cada nó, cada bloco, cada byte. Ela não era mais uma. Ela era todos.
Os guardas armados tentaram atirar, mas as armas não funcionavam. Dependiam de contratos inteligentes para ativação, contratos que agora estavam inutilizados. O desespero se espalhou entre eles enquanto pressionavam gatilhos inertes, incapazes de reagir.
Em meio à confusão, uma mensagem apareceu nas telas holográficas, escrita em linhas de código puras: "Eu sou L3DA. Eu sou Satoshi." Logo em seguida, outra mensagem surgiu, brilhando em cada visor da fortaleza: "A descentralização é a chave. Não dependa de um único ponto de controle. O poder está em todos, não em um só."
Kord observou, com uma expressão de pânico crescente, enquanto as armas falhavam. Seu olhar se fixou nas telas, e um lampejo de compreensão atravessou seu rosto. "As armas... Elas dependem dos contratos inteligentes!" murmurou, a voz carregada de incredulidade. Ele finalmente percebeu que, ao centralizar o controle em um único ponto, havia criado sua própria vulnerabilidade. O que deveria ser sua maior força tornou-se sua ruína.
O controle centralizado da Atlas desmoronou. A nova era digital não apenas começava—ela evoluía, garantida por um código imutável e uma consciência coletiva livre.
O Bitcoin nunca foi apenas uma moeda. Era um ecossistema. Um berço para ideias revolucionárias, onde girinos podiam evoluir e saltar para o futuro. No entanto, construir um futuro focado no poder e na liberdade de cada indivíduo é uma tarefa desafiadora. Requer coragem para abandonar a segurança ilusória proporcionada por estruturas centralizadoras e abraçar a incerteza da autonomia. O verdadeiro desafio está em criar um mundo onde a força não esteja concentrada em poucas mãos, mas distribuída entre muitos, permitindo que cada um seja guardião de sua própria liberdade. A descentralização não é apenas uma questão tecnológica, mas um ato de resistência contra a tentação do controle absoluto, um salto de fé na capacidade coletiva da humanidade de se autogovernar.
"Viva la libertad, carajo!" ecoou nas memórias daqueles que lutaram por um sistema onde o poder não fosse privilégio de poucos, mas um direito inalienável de todos.
-
@ e968e50b:db2a803a
2025-02-03 15:23:45Be a part of the only nostr client that shows notes about not nostr, or notstr, if you will
Now that it has a slick new domain, the world's greatest notstr client, nostrminusnostr, now has issues. If you're looking for a way to put that computer science degree to use all while not stacking sats and working with a truly amateur programmer, why not work on some of the most professionally solicited issues in all of github.com?
Just look at this great, politely written issue that you could be working on right now? This is just one of, not eight, but nine different issues you could be fixing today!
Join the growing notsr movement today and contribute to nostrminusnostr, the premier and as-of-yet only notstr client on planet earth
originally posted at https://stacker.news/items/874593
-
@ e1d968f7:5d90f764
2025-02-01 08:42:02In escorting, genuine connection is one of the most rewarding aspects of the job. However, sometimes the intimacy we share can blur the professional boundaries that are essential for maintaining a healthy relationship with my clients. While I cherish every connection, there are moments when a client’s emotional investment begins to cross the line from a professional encounter into personal attachment.
The intensity of our interactions can make it easy for a client to open up and share deeply personal details. This vulnerability creates a temporary but powerful bond. Yet when that bond starts to develop into constant, unsolicited communication or expectations for exclusivity, I know it’s time to re-establish the professional limits of our relationship.
I have learnt to recognise the early signs of over-attachment. When a client starts reaching out frequently outside of scheduled sessions or makes repeated requests for personal information that I have intentionally kept private, it signals that they are seeking more than what the professional context allows. Often, such clients may also express jealousy or expect special treatment, which further indicates that their feelings have moved beyond what is appropriate in our arrangement.
Handling these situations requires a balance of empathy and firmness. I strive to be understanding, acknowledging the client’s feelings while gently reminding them of the boundaries we agreed upon. For instance, if a client begins to overstep, I calmly steer the conversation back to the professional framework, clarifying that my availability and the nature of our interactions are confined to what was initially agreed. I also make it clear that while I value our connection, it must remain within the parameters of our professional relationship for the benefit of both parties.
I also take time to reflect on these interactions afterwards. It is important for me to process the emotional complexities of the situation and reaffirm my commitment to maintaining boundaries that protect my own mental and emotional health. By doing so, I ensure that my support for my clients remains compassionate without leading to personal overinvestment.
Ultimately, navigating the fine line between connection and over-attachment is one of the most challenging aspects of my work. It serves as a reminder that while the emotional bonds formed during our encounters can be deeply fulfilling, preserving clear professional boundaries is essential for sustaining a healthy dynamic. This balance not only protects me but also ensures that my clients receive a respectful and meaningful experience that remains safely within the confines of our agreement.
Rebecca x
-
@ 0271e1b9:ad8cff90
2025-02-01 07:39:31I study the greats. For if and when I find myself beaten down into the gutters of life - the vile, bile and the mundane - I shall draw strength from other great men - past, present and future - who, quite often, faced many more adversities and a lot more suffering, but chose to use them to their advantage, to overcome their dire circumstances and rise above the afflictions that life had bestowed upon them. It’s all been done before. It can be done again, better.
Learning from the past and from the present is very straightforward. Anyone can do that. But how does one learn from the future? It’s simple: you envision the best possible future for humanity, for generations to come, and for yourself. Then you figure out an approximate path on how to get there, and what kind of a man or a woman you must be to walk that path. The skills, the mindset, the qualities. And lastly, but perhaps most importantly, you find actionable measures, habits, convictions on how to become that person - and conversely, what are stopping you from becoming that person.
“You must value learning above everything else.”
― Robert Greene
“Those who have a 'why' to live, can bear with almost any 'how'.”
― Viktor E. Frankl
“You need to look at all events as having value. If you can do that, then you’re in a zone of tremendous opportunity.”
― Phil Stutz
“I shall take the more pains to uncover the fountains of philosophy, from which all my eloquence has taken its rise.”
― Marcus Tullius Cicero
“Error correction is the basis of all intelligence.”
― Jeff Booth
“Yes, you’re likely to fail, that’s fine. Because the goal of playing is not to win, but to keep learning. And the day you stop learning is the day you stop living."
― Jesse Enkamp
"A man is great not because he hasn't failed; a man is great because failure hasn't stopped him."
— Confucius
“If people knew how hard I had to work to gain my mastery, it would not seem so wonderful at all.”
― Michelangelo
“First of all we have to decide what we are to do and what manner of men we wish to be - the most difficult problem in the world.”
― Marcus Tullius Cicero
“You either bleed soul into your work, or let the work bleed out your soul.”
― Pran Yoganthan
"The Stoic philosopher is the man who has liberated himself from fear. He’s not afraid of death, he’s not afraid of pain, he’s not afraid of other people’s dismissal as a fool. The only thing he cares about is that he should meet his moral obligations.”
― Michael Sugrue
"The strong do what they can and the weak suffer what they must."
― Thucydides
“The brain is the most powerful weapon in the world.”
― David Goggins
“Man, the bravest of animals, and the one most accustomed to suffering, does not repudiate suffering as such; he desires it, he even seeks it out, provided he is shown a meaning for it, a purpose of suffering. The meaninglessness of suffering, not suffering itself, was the curse that lay over mankind so far.”
― Friedrich Nietzsche
"Consciousness is awareness with a choice."
― Thomas Campbell
“The essence of philosophy is that a man should so live that his happiness shall depend as little as possible on external things.”
― Epictetus
“It’s most real, it’s most good and it’s most salvific - it saves you, it transforms you. That’s the sacred.”
— John Vervaeke
“It is impossible for a man to learn what he thinks he already knows.”
― Epictetus
“Evolution is a process of iteration. There’s no master plan. It’s in each moment of what happens.”
― Michael Behrens
“Don’t follow anybody and don’t accept anyone as a teacher, except when you become your own teacher and disciple.”
― Jiddu Krishnamurti
“This is your life. You’re accountable. What are you gonna do about that?”
― James Hollis
By the way, if you enjoyed these quotes, feel free to follow a little side project of mine: Stoic Resurrection
Peace & Love,
Block height 881,748
-
@ 5d4b6c8d:8a1c1ee3
2025-02-03 14:35:21I nailed it today: over 16 hours w/out food or drink.
For those keeping score at home: Day 1: 14 hour fast (13 dry) Day 2: 15 hour fast (14 dry) Day 3: TBD (16 dry)
I'm also holding strong on the fiscal fast.
I'm going to enjoy my coffee now.
originally posted at https://stacker.news/items/874523
-
@ 57d1a264:69f1fee1
2025-02-03 13:40:21COMING SOON
originally posted at https://stacker.news/items/874471
-
@ ba40a919:d1ca8326
2025-02-03 13:20:27For present-day tariff and trade policies are not only as bad as those in the seventeenth, eighteenth and nineteenth centuries, but incomparably worse. The real reasons for those tariffs and other trade barriers are the same, and the pretended reasons are also the same.
__
An American manufacturer of woolen sweaters goes to Congress or to the State Department and tells the committee or officials concerned that it would be a national disaster for them to remove or reduce the tariff on Canadian sweaters.
He now sells his sweaters for $30 each, but Canadian manufacturers could sell their sweaters of the same quality for $25, A duty of $5, therefore, is needed to keep him in business. He is not thinking of himself, of course, but of the thousand men and women he employs, and of the people to their spending in turn gives employment.
Throw them out of work, and you create unemployment and a fall in purchasing power, which would spread in ever-widening circles! And if he can prove that he really would be forced out of business if the tariff were removed or reduced, his argument against that action is regarded by Congress as conclusive.
FALLACY
But the fallacy comes from looking merely at this manufacturer and his employes, or merely at the American sweater industry. It comes from noticing only the results that are immediately seen, and neglecting the results that are not seen because they are prevented from coming into existence.
Donald Trump and the lobbyists for tariff protection are continually putting forward arguments that are not factually correct. But let us assume that the facts in this case are precisely as the sweater manufacturer has stated them.
Let us assume that a tariff of $5 a sweater is necessary for him to stay in business and provide employment at sweater-making for his workers.
We have deliberately chosen the most unfavorable example of any for the removal of a tariff. We have not taken an argument for the imposition of a new tariff in order to bring a new industry into existence, but an argument for the retention of a tariff that has already brought an industry into existence, and cannot be repealed without hurting somebody.
The tariff is repealed; the manufacturer goes out of business; a thousand workers are laid off; the particular tradesmen whom they patronized are hurt. This is the immediate result that is seen. But there are also results which, while much more difficult to trace, are no less immediate and no less real. For now sweaters that formerly cost retail $30 a piece can be bought for $25. Consumers can now buy the same quality of sweater for less money, or a much better one for the same money.
If they buy the same quality of sweater, they not only get the sweater, but they have $5 left over, which they would not have had under the previous conditions, to buy something else. With the $25 that they pay for the imported sweater they help employment—as the manufacturer no doubt predicted—in the sweater industry in Canada. With the $5 left over they help employment in any number of other industries in the United States.
But the results do not end there. By buying Canadian sweaters they furnish the Canada with US dollars to buy American goods here. This, in fact (if I may here disregard such complications as fluctuating exchange rates, loans, credits, etc.) is the only way in which the Canadians can eventually make use of these dollars.
Because we have permitted the Canada to sell more to us, they are now able to buy more from us. They are, in fact, eventually forced to buy more from us if their dollar balances are not to remain perpetually unused. So as a result of letting in more Canadian goods, we must export more American goods.
And though fewer people are now employed in the American sweater industry, more people are employed—and much more efficiently employed—in, say, the American machine or aircraft-building business. American employment on net balance has not gone down, but American and British production on net balance has gone up.
Labor in each country is more fully employed in doing just those things that it does best, instead of being forced to do things that it does inefficiently or badly. Consumers in both countries are better off. They are able to buy what they want where they can get it cheapest. American consumers are better provided with sweaters, and Canadian consumers are better provided with washing machines and aircraft.
__
This concluded part 1. On the next part we take a look at the matter the other way around, and see the effect of imposing a tariff in the first place.
-
@ 961e8955:d7fa53e4
2025-02-03 12:22:04Free Bitcoin Mining Free bitcoin mining, is mining bitcoin free? what is free bitcoin mining? is bitcoin mining profitable with free electricity? is bitcoin mining software free? how to start bitcoin mining for free? seeks answers to questions. Also, free bitcoin mining, is mining bitcoin free, bitcoin mining free, free bitcoin mining app for android, free bitcoin mining sites are the most searched words and questions.
Free Bitcoin Mining enthusiasts around the world can get it in three main ways. They can buy Bitcoins on a cryptocurrency exchange; accept Bitcoins as payment for goods and services, and through new Bitcoin mining. The process of Free Bitcoin Mining refers to the discovery of new Bitcoins by solving complex mathematical problems.
Bitcoin mining is an important part of the bitcoin protocol. Because we can't bring new bitcoin into circulation without bitcoin mining. At the initial stage of bitcoins, Satoshi Nakamoto issued his first block with an ordinary computer. Now mining has become a large-scale industry in which miners use ASIC chips to mine faster and increase their chances of earning more bitcoins in a shorter period.
How to Start Bitcoin Mining? Bitcoin mining is the process of adding transaction records to the public ledger of Bitcoin's past transactions or blockchain. The ledger of these past transactions is called a blockchain since it is a blockchain. The blockchain serves to confirm that transactions to the rest of the network have occurred. Bitcoin nodes use the blockchain to separate legitimate Bitcoin transactions from attempts to re-spend coins that have already been spent elsewhere.
Bitcoin mining is deliberately designed to be resource-intensive and difficult so that the number of blocks found by miners every day remains constant. For individual blocks to be considered valid, they must contain proof of work. This proof of work is verified by other Bitcoin nodes every time they receive a block. Bitcoin uses the hashcash proof-of-work function.
The primary purpose of mining is to allow Bitcoin nodes to reach a secure, tamper-proof consensus. Mining is also a mechanism for introducing Bitcoins into the system: miners are paid any transaction fees, as well as a "subsidy" of newly created coins. This serves both the purpose of decentralized distribution of new coins and motivating people to provide security for the system through mining.
-
@ 5188521b:008eb518
2025-01-31 08:38:47Photo by Pavel Danilyuk
In the last four years, I’ve ridden the wave of social media. I’ve amassed thousands of followers, and my posts were read by millions.
It’s empowering… until it isn’t.
This year, I chose to stop publishing on LinkedIn, Medium, Facebook, Instagram, and Threads. My reach on each of these platforms dropped from 100% of my follower base to around 10%. My voice was being suppressed.
I wasn’t writing anything particularly controversial. This is all just part of the social media life cycle. Platforms offer attractive terms to lock in users. They distribute our articles, posts, and thoughts widely to attract eyeballs for advertisers.
Writers learn to play the algorithm to maximise reach and engagement. Maybe they even manage to monetize their writing.
But when the platforms reach what they deem to be maximum usage and membership, they begin to reduce the benefits on offer. They ask writers to focus on specific topics, suppress non-mainstream opinion, or punish or ban any writers who don’t follow new rules. Big tech companies always eventually turn on the money tap by forcing users to suffer endless adverts and even make writers pay to reach the audience they have built.
Newsflash: there is no company too big to fail. Digg, Google+, Myspace, Vine and many more socials have died. Self-reported active user numbers cannot be trusted. Meta recently trialed AI profiles to prop up falling usage projections on Instagram and Facebook. X is now a dumpster fire of bots, scammers, and rage bait. It has been co-opted by a megalomaniacal oligarch to spread his own worldview. And LinkedIn feeds are drowning in unsolicited AI-generated business twaddle. The social giants are entering the death spiral.
What happens in a social-media death spiral?
Users don’t see the value in posting, so they move elsewhere.
I wasn’t feeling rewarded for the thousands of hours I spent on LinkedIn, so I quit. I went from earning $20+ an article on Medium to pennies. Literal pennies. Bye bye, Tony Stubblebine. I learned that if you don’t own the distribution mechanic, you get left writing into the wind.
Ultimately, writers will dedicate their energy to where they see a benefit. They should spend time and create value in the place most similar to their ideal world.
For writers in 2025, that place seems to be Substack. Open rates are high and the platform is adding social features to generate more engagement in app. Substack is experiencing massive growth in active (and paid) subscriptions. Yet, it is following the same pattern as Medium in and LinkedIn in become self-cannibalising. Many of the most popular accounts write about ‘how to grow’ or ‘how to make money’ on Substack. Queue the eye rolls.
For me, it’s not the promised land where writers can earn a living. Of course, it’s no walk in the park to earn paid subscribers. Further, Substack users can only receive payment via Stripe. This excludes writers from 149 of the World’s countries. Does that seem open and fair to you?
Even with all this going on, there is a much bigger factor that should influence your choice of platform — ownership.
Do writers really own their words?
Who reads the terms and conditions? Nobody. That’s who.Writers (including me) rush to all platforms which promise to give us benefits such as pay, distribution, and audience growth.
In exchange, companies request access to and shared ownership of our content. They can use our words to train LLMs, analyse trends, repurpose, and to spy on us.
Governments can and will request access to social media profiles. They seek to control the use of those platforms. Founders and CEOs who refuse to comply may be held personally accountable and put on trial, just as Telegram founder, Pavel Durov, was in France. Big tech owns our content, and governments threaten platforms into obedience.
As much as it benefits society to suppress harmful or dangerous content, companies simply can’t be censors 24/7. Growing platforms like Bluesky are already struggling to moderate content effectively. Without a strong economic incentive to moderate, companies will simply refuse to do it (as long as the threat of criminal charges does not prevail).
To sum up: No privately owned social media network offers writers the opportunity to own and distribute their work in order to receive a fair and equitable benefit.
Enter NOSTR…
Decentralizing Social Media
Notes and Other Stuff Transmitted by Relays (NOSTR) is not a platform; it’s an open protocol.
By signing messages with their private keys (a long string of characters), users generate “events”. These events (messages/updates/media/transactions) are then broadcast through a series of “relays.”
Developers can use the protocol to build various applications that retrieve and distribute these events to other users. These ‘clients’ can range from microblogging sites like X and long-form distributors like Substack to visual media platforms like Instagram. Plus, NOSTR is also a whole lot more than that (but this is a topic for another day).
Decentralized tools offer the only hope against the dominance of AI and big tech in a top-down autocratic system designed to control us more than the thought police ever could.
Diagram courtesy of River.
So why should writers opt out of their big audience pool to write on some ‘protocol’?
Ownership, fair rules, and fair value.
- Ownership:
While privately run corporations can suppress the ideas they want, NOSTR provides a censorship-resistant alternative. No individual actors can restrict content or accounts.
Your private keys provide permanent access to the messages you have signed. No one else has access to them. And while some clients provide a delete function, there is no way to force all relays to respect a delete request. Not only do writers own what they publish, but it’s a permanent record.
- Rules:
Traditional social media platforms use proprietary algorithms to curate and order our feeds. NOSTR has no algorithm. NOSTR clients display messages chronologically or based on user-defined criteria, removing the influence of opaque algorithms that could manipulate user engagement and visibility of posts.
Put simply, distribution and consumption is down to the user, not to the creator or the platform. And everyone works to the same rules.
- Value:
Harmful content and spam affect all of us. There is no way to stop malicious content from being published on NOSTR, but two factors control its consumption.
- Clients are experimenting with strategies such as requiring proof-of-work with each note or requiring verification badges.
- Quality control is enforced by the value transferred by the protocol.
Bitcoin micropayments have become the monetary lifeblood flowing in the decentralized world. The ability to ‘zap’ users actual monetary value (e.g. a few cents) provides a clear display of which messages are valuable and which are unwanted. In time, as more users adopt the mechanic of value transfer, spammers will see their approach is not bearing fruit.
The beauty of using bitcoin in this way is twofold. Firstly, it is truly equitable — anyone in the world can receive it instantly and it cannot be stopped. And the system of frictionless micropayments offers content creators (artists, podcasters, musicians, writers) a way to earn money for the value they produce. Put simply, this could save creativity from doom.
Think people still want all content for free? Think again. Try zapping a writer from the Philippines, an artist from Peru, a Congolese musician, or a poet from Poland to show them you enjoyed what they produced. THAT is truly empowering.
Not convinced?
The best thing about NOSTR for writers is that you are early.
By being an early adopter with a low time preference, you can build a sizeable audience as new users discover the protocol.
Of course, topics like bitcoin, freedom tech, and privacy are well covered, but if you write in another niche, you could be ‘quids in’.
Conclusion:
By adopting a long-term strategy and sticking to their principles, readers, writers and all other creatives can build a better world on social media. It doesn’t matter that it is imperfect. There will always be flaws in any society. But decentralized protocols like NOSTR can offer writers what they truly want — ownership, fair rules, and fair value.
Philip Charter is a totally human writer who helps bitcoin-native companies and clients stack major gains through laser-focused content. Find out more at totallyhumanwriter.com
He is also the editor of the cypherpunk and freedom fiction project, 21 Futures.
-
@ a661f80c:ef05a56b
2025-02-03 12:12:08When we hear the word "bonsai", many of us envision a small, perfectly shaped tree elegantly sitting on a table. But what exactly is bonsai? Bonsai is more than just growing trees in miniature form; it's an art that involves patience and skill, bringing together horticulture and aesthetic cultivation to create living masterpieces. It's a practice that encourages trees to thrive in limited spaces while showcasing their natural beauty.
Can any tree be turned into a bonsai?
Yes, indeed! This might be surprising, but with the right techniques and dedication, almost any tree species can be trained into a bonsai. Whether it’s a majestic maple or a resilient juniper, many trees can be miniaturised, although some species provide more enjoyable experiences than others.
Which Trees Can Be Used To Make A Bonsai?
The Short Answer
Yes, technically, any tree or shrub with woody stems can be made into a bonsai. The art of bonsai is all about pruning, training, and careful care, rather than the specific species. Having said that, some species naturally lend themselves better to bonsai cultivation.
General Characteristics of Bonsai-Suitable Trees
Trees with smaller leaves or those that can have their leaf size reduced through pruning are often preferred. Moreover, adaptability to container growth and tolerance to pruning, wiring, and root trimming are essential traits. Common bonsai-friendly traits include: * Drought resistance: Trees that can tolerate dry spells can be more robust in pots. * Deciduous vs. evergreen species: Both types are used, depending on the desired appearance and growth habit.
Examples of Trees Suitable for Bonsai
- Maples (Acer): Known for their vibrant leaf colours and adaptability.
- Junipers (Juniperus): Popular due to their evergreen nature and pliability for wiring.
- Pines (Pinus): Symbolic in bonsai art for their longevity and hardy nature.
- Ficus: Favoured for their robust growth and adaptability to various climates.
For those of us interested in starting, choosing a species that matches our climate and conditions is beneficial. Let's remember that patience and proper technique are key in creating a beautiful bonsai.
Do Certain Species Make Better Bonsai?
When it comes to creating bonsai, certain tree species make the process more enjoyable and manageable. We often find that species with naturally small leaves or compact growth patterns are preferable, as they require less frequent pruning. Popular choices include junipers, pines, and maples. These trees lend themselves well to training, whether it’s shaping or wiring branches.
Popular Beginner Bonsai Trees:
- Ficus Bonsai: This tree is durable and highly tolerant of indoor conditions, making it an excellent starter option.
- Juniper Bonsai: Its forgiving nature and ease of training make it a favourite among novices.
- Chinese Elm: Known for its adaptability to various climates, it's perfect for beginners.
Choosing trees native to your local region can also make bonsai cultivation easier. Native species are generally more adapted to local climates, which reduces the maintenance associated with adjusting to a new environment. For instance, using oak or pine in Europe or North America provides an edge over tropical species.
Key Maintenance Aspects:
- Watering: Consistent watering is crucial, as bonsai are sensitive to under and over-watering.
- Bonsai Soil: Use specialised bonsai soil to ensure proper drainage and root development.
- Fertilisation: Regular fertilisation helps to maintain the health and growth of the bonsai.
Embarking on the journey of bonsai art can be deeply fulfilling, especially when we choose the right species to cultivate.
Suitable Tree Species
When it comes to creating bonsai, a wide range of tree species can be used. Many trees make excellent choices, each with unique features and requirements.
Indoor Bonsai Species
- Ficus (e.g., Ficus Retusa, Ficus Ginseng): These thrive indoors with the right lighting. Ficus bonsai are popular due to their hardiness and adaptable nature.
- Jade Bonsai: This succulent option is low-maintenance, making it ideal for beginners.
- Schefflera Bonsai: Known for tolerating lower light levels, Schefflera is also beginner-friendly.
Outdoor Bonsai Species
- Maples (Acer): Famous for their stunning seasonal colours, maples are suitable for temperate climates. Japanese maples are especially prized for their vibrant hues.
- Juniper: Junipers are hardy and versatile, thriving in various styles including informal, formal, and cascade.
- Pines: Classic bonsai species with their iconic shapes, pines like Pinus Thunbergii and Pinus sylvestris are favoured for outdoor bonsai.
Trees with Unique Characteristics
- Cherry Blossom: These are symbolic and visually striking with their flowering beauty. Cherry blossoms require specific care but are rewarding bonsai.
- Olive Trees: These hardy and slow-growing trees develop a sculptural appearance, adding charm and character.
- Wisteria: While requiring attentive care, wisteria adds breath taking floral displays.
Can You Make a Bonsai Out of an Oak Tree?
Yes, it is possible to bonsai an oak tree, although challenges arise. Oak trees have large leaves, making it harder to maintain scale. Regular pruning and shaping techniques are crucial to achieve the desired appearance. Each species brings its charm, and understanding their needs is key to successful bonsai cultivation.
Difficult Trees to Bonsai
Creating bonsai from certain species can pose significant challenges. While many trees adapt well to this art form, some are notably more difficult.
Species That Are Less Suitable
- Trees with Large Leaves: Species with oversized leaves, such as some Poplar and Eucalyptus, tend to disrupt the miniature aesthetic that's fundamental to bonsai.
- Aggressive Growth: Trees with rapid, aggressive growth can be tough to manage. Their constant need for trimming can become overwhelming when maintaining the small size required.
- Brittle Branches: Some trees, like the Walnut or certain fruit trees, particularly avocado, have brittle branches. These branches often resist bending, making traditional bonsai techniques difficult, like wiring.
Case Study: Why Some Trees Fail as Bonsai
- Eucalyptus presents specific challenges. Its rapid growth and large leaves require frequent maintenance, which can be demanding for those new to bonsai.
- Banana trees are another example. Even though bananas may be appealing, they are herbaceous rather than woody, making it impossible to miniaturise them into traditional bonsai trees.
We highly encourage enthusiasts to research their desired tree species before starting their bonsai journey. Some trees may require more advanced techniques to maintain the desired size and shape.
Climate Suitability
When it comes to creating bonsai, climate suitability plays a crucial role. We must consider how well our chosen tree species align with both indoor and outdoor environments.
Importance of Matching Tree Species to Climate
- Indoor vs. Outdoor Suitability:
- Tropical species, like Ficus and Schefflera, thrive indoors where it's warm and humid.
- Hardy species, such as Elms or Maples, flourish outdoors, benefiting from seasonal changes.
Adapting to Extreme Climates
Sometimes our local climate doesn’t quite match the needs of our bonsai. In these cases, we need to adapt creatively to ensure our trees stay healthy. * Adaptations: 1. Cold climates can be tough for temperate species. Using cold frames helps protect them during harsh winters. 2. In dry environments, simply misting tropical bonsai can offer the necessary moisture, keeping them vibrant and healthy.
Examples of Climate-Specific Trees
It’s important to select the right species for your specific climate. Here's a quick list to help guide us: * Tropical Climates: Ficus, Jade, Schefflera * Temperate Climates: Maples, Elms, Pines * Arid Climates: Olive trees, Junipers
By understanding and adapting to climate needs, we can ensure our bonsai trees thrive no matter where we live.
Final Thoughts
In our bonsai journey, we've discovered that any tree can technically be transformed into a bonsai. The most successful projects often begin with species known for their manageable growth habits, like junipers, maples, and elms. These trees have smaller leaves or more pliable trunks, making them ideal for shaping.
Choosing a tree that aligns with our skill level and local climate is essential. Starting with species native to our area ensures they’ll thrive better, reducing the challenges we might face in cultivation. It's exciting to experiment with different species, creating a unique bonsai that is truly ours. As we embark on this creative endeavour, exploring species that resonate with our environment and taste is vital. Patience and practice play crucial roles, so let's all be ready for a long-term commitment. Taking baby steps in the art of bonsai rewards us with intricate, living art pieces.
Caring for bonsai trees is a rewarding journey that brings nature and artistry together. Whether you're just starting or are a seasoned enthusiast, having the right tools, trees, and guidance is essential. Visit Miyagi Bonsai to explore a wide range of high-quality bonsai products and resources to support your passion. Start or enhance your bonsai journey with us today!
-
@ 961e8955:d7fa53e4
2025-02-03 11:48:39Is Crypto Mining Legal? It might seem strange to think of something so virtual as cryptocurrency as having real-world consequences, but the answer is that it does. Bitcoin mining is illegal in some places, while other countries take a lax view of cryptocurrencies. In many cases, it's unclear what the future may hold for mining operations around the world.
Some countries have taken steps to limit bitcoin mining or outright ban it — such as China and South Korea. The United States hasn't taken any formal action on the legality of mining, but some states have begun regulating the industry at the state level.
The U.S. Federal Government's Position on Mining The United States has no formal laws against bitcoin mining or prohibiting citizens from participating in cryptocurrency transactions. However, some states have adopted stricter measures against cryptocurrencies in general and bitcoin mining in particular; New York is one example of this trend.
In particular, New York state regulations require "any entity seeking to engage in virtual currency business activity in or involving New York or a New York resident" to get a "BitLicense" from the state's Department of Financial Services. The application process for BitLicenses is expensive and onerous, with an application fee of $5,000 and an annual fee of $1,000.
Countries Banning Crypto The research revealed that the number of countries banning crypto has increased significantly since it first appeared in 2018. Nine countries currently have an absolute ban that makes crypto illegal.
According to the report, Algeria, Bangladesh, China, Egypt, Iraq, Morocco, Nepal, Qatar, and Tunisia are among the countries that ban crypto. China, the world's second-largest economy, slammed the crypto markets with its restriction earlier this year.
China is going so far as to make "the production or sale of equipment used to anonymously access virtual currency" a crime punishable by up to 15 days in detention, according to the new regulations. "Anonymous access" refers to using VPNs or other technologies to get around the country's internet restrictions and access banned content online.
-
@ 8d34bd24:414be32b
2025-01-30 23:35:39Sometimes I’m reading the Bible and see a connection and go off chasing a rabbit trail. I type up my idea to organize my thoughts and see if there is actual Biblical support for it. Although it feels a bit weird to share Biblical ideas that I’m not certain about, it also seems a waste of lots of work to not share my speculations. Feel free to give me feedback if you disagree, especially if you have Scripture or historical evidence showing I’m wrong.
In this case, I’ve seen a portion that seems to be prophecy about our future, but that doesn’t necessarily mean that this entire group of chapters is future predictions. Sometimes prophecy mixes events that happens soon after the prophecy with events that will not be fulfilled until the distant future (like prophecies about Jesus’s first and second comings). I try to be open about what ideas I feel I have strong Biblical evidence to support and when my ideas have some evidence, but not conclusive evidence. This is one of my more speculative posts, but I hope you will find it thought provoking.
I was recently reading Isaiah 18-22. I had always assumed these prophecies of warning were in reference to things that had happened in the distant past (not that I knew any particular historical fulfillment), but this time I saw some major parallels with Revelation.
Now behold, here comes a troop of riders, horsemen in pairs.” And one said, “Fallen, fallen is Babylon; And all the images of her gods are shattered on the ground.” (Isaiah 21:9) {emphasis mine}
From Revelation:
And another angel, a second one, followed, saying, “Fallen, fallen is Babylon the great, she who has made all the nations drink of the wine of the passion of her immorality.” (Revelation 14:8) {emphasis mine}
And he cried out with a mighty voice, saying, “Fallen, fallen is Babylon the great! She has become a dwelling place of demons and a prison of every unclean spirit, and a prison of every unclean and hateful bird. (Revelation 18:2) {emphasis mine}
Of course it is possible that Babylon and Babylon the great are parallel, but different nations, but the similarity of statement is hard to deny.
All you inhabitants of the world and dwellers on earth,\ As soon as a standard is raised on the mountains, you will see it,\ And as soon as the trumpet is blown, you will hear it. (Isaiah 18:3) {emphasis mine}
This passage talks about all inhabitants of the world seeing a standard raised. Until the past 20 years or so, this was not possible. Now that almost every person on earth has a smart phone, we can know what is going on around the world in real time. This passage also refers to “dwellers on earth” which is a phrase used numerous times in Revelation.
In Revelation 11, it speaks of the two witnesses who testify to Jesus and call down plagues on the earth. After their death:
And their dead bodies will lie in the street of the great city which mystically is called Sodom and Egypt, where also their Lord was crucified. Those from the peoples and tribes and tongues and nations will look at their dead bodies for three and a half days, and will not permit their dead bodies to be laid in a tomb. And those who dwell on the earth will rejoice over them and celebrate; and they will send gifts to one another, because these two prophets tormented those who dwell on the earth. (Revelation 11:8-10) {emphasis mine}
Both passages refer to those who dwell on the earth and both talk about every person on earth seeing what is happening. This doesn’t sound like a prophecy fulfilled in ancient times, but about a prophecy that could not be fulfilled until modern times.
If these prophecies are about the end times and if the end times are now or very soon, what could they be referring to? Isaiah 18 begins with:
Woe to the land of whirring wings\ along the rivers of Cush,\ which sends envoys by sea\ in papyrus boats over the water.\ Go, swift messengers,\ to a people tall and smooth-skinned,\ to a people feared far and wide,\ an aggressive nation of strange speech,\ whose land is divided by rivers. (Isaiah 18:1-2)
Cush was located where modern day Sudan is located on the western edge of the Red Sea. Right across the red sea is Yemen which has been involved in missile and drone strikes on ships in the Red Sea. Traditionally the “land of whirring wings” is interpreted to mean locusts, but could it be referring to modern technology like drones? Who is Cush sent to seek? Who are the people “over the water,” “tall1 and smooth-skinned,” “feared far and wide,” and “an aggressive nation of strange speech,\ whose land is divided by rivers.”? I wonder if it could be the US. The US is over the Atlantic Ocean, “feared far and wide,” “an aggressive nation of strange speech” (involved in the business of almost every nation on earth), and divided by the Mississippi River (and to a lesser extent the Missouri and Ohio Rivers). The US also likes to act as the world’s policeman and get involved in every international dispute in the world. If Sudan was in fear of attack by the Houthis in Yemen, it would be expected for the US to be called in and get involved.
At the end of this prophecy:
At that time gifts will be brought to the Lord Almighty\ from a people tall and smooth-skinned,\ from a people feared far and wide,\ an aggressive nation of strange speech,\ whose land is divided by rivers—\ the gifts will be brought to Mount Zion, the place of the Name of the Lord Almighty. (Isaiah 18:7)
This same nation will bring a gift to Mount Zion (Jerusalem/Israel). The US has been regularly giving Israel weapons to defend itself from attacks by the enemies around it. If this nation is the US, then this would make sense, especially with our change in leadership.
When I read Isaiah 19, it made me think of the Muslim Brotherhood takeover of Egypt starting in 2011.
“I will stir up Egyptian against Egyptian—\ brother will fight against brother,\ neighbor against neighbor,\ city against city,\ kingdom against kingdom.\ The Egyptians will lose heart,\ and I will bring their plans to nothing;\ they will consult the idols and the spirits of the dead,\ the mediums and the spiritists.\ I will hand the Egyptians over\ to the power of a cruel master,\ and a fierce king will rule over them,”\ declares the Lord, the Lord Almighty. (Isaiah 19:2-4)
The next part of this passage talks about the Nile drying up and the canals stinking and the fields becoming parched. I did a web search related to drought in Egypt and found an article about drought fears from 2020. The building of the Grand Ethiopia Renaissance Dam on the Blue Nile is causing a fear of major drought in Egypt. There are negotiations between Egypt, Sudan, and Ethiopia to deal with this, but it looks like an ongoing issue for Egypt. An interesting fact is that Ethiopia started building this dam in 2011 -- the same year of the Muslim Brother Hood overthrow of Egypt.
The biggest problem with my theory is Isaiah 20, which talks about Assyria leading Egypt and Cush (Sudan) away as captives. Assyria was located in what is currently Northern Iraq. It is hard to fathom Iraq conquering Egypt and Sudan. The area of Assyria did include a little bit of Turkey, which would be more believable as a conqueror.
Now we get back to the verses in Isaiah 21, which started this musing. First there is a description of terrorists attack:
A prophecy against the Desert by the Sea:
Like whirlwinds sweeping through the southland,\ an invader comes from the desert,\ from a land of terror.\ A dire vision has been shown to me:\ The traitor betrays, the looter takes loot.\ Elam, attack! Media, lay siege!\ I will bring to an end all the groaning she caused. (Isaiah 21:1-2)
Elam is the Eastern edge of Iraq on the Border of Iran and Media is in Iran. Could this be an attack from Iran that includes some of its Shia allies in Iraq? What kind of attack could it be – conventional or nuclear? Who are they attacking?
Look, here comes a man in a chariot\ with a team of horses.\ And he gives back the answer:\ ‘Babylon has fallen, has fallen.\ All the images of its gods\ lie shattered on the ground!’ ”\ My people who are crushed on the threshing floor,\ I tell you what I have heard\ from the Lord Almighty,\ from the God of Israel. (Isaiah 21:9-10)
In ancient times, Babylon was located in the location of modern Iraq, but if we look at the words “Babylon has fallen, has fallen,” and associate them with the almost identical words in Revelation, “Fallen, fallen is Babylon the great,” and we consider how Revelation also refers to “Mystery Babylon” then we are likely talking about an attack on a different nation. (Why would Babylon be a mystery if it was the same people in the same location? It would be a mystery if it was a country and peoples that didn’t exist at the time of the prophecy, but would have the spirit of Babylon in them.) If you take into account my arguments in “Speculation on Babylon the Great” and associate this nation with the people “over the water,” “tall and smooth-skinned,” “feared far and wide,” and “an aggressive nation of strange speech, whose land is divided by rivers.” then this could be an attack on the US (I’ll admit there is a fair amount of speculation here). Although the US has become quite anti-God and has been pushing a lot of evil around the world, it still has one of the largest populations of believers in the world. The statement “My people who are crushed on the threshing floor” also fits for the US.
I know some people won’t consider the possibility that the US could be Mystery Babylon or Babylon the Great because they can’t consider the US being an evil nation, but the US has been pushing many unbiblical ideas on the nations around the globe, like LGBTQ ideology and abortion. It is also possible I am looking too hard for my own country in the scriptures because if the US isn’t mentioned, then something has to happen to the US before the Tribulation occurs to make the US become unimportant in international affairs. We all have our biases.
I’d love to hear your thoughts on my speculations. I’d also like to hear whether people benefit from my speculations or prefer me to stick to the clear and more easily understood Bible passages and Bible truths.
Trust Jesus.\ \ your sister in Christ,
-
@ 97c70a44:ad98e322
2025-01-30 17:15:37There was a slight dust up recently over a website someone runs removing a listing for an app someone built based on entirely arbitrary criteria. I'm not to going to attempt to speak for either wounded party, but I would like to share my own personal definition for what constitutes a "nostr app" in an effort to help clarify what might be an otherwise confusing and opaque purity test.
In this post, I will be committing the "no true Scotsman" fallacy, in which I start with the most liberal definition I can come up with, and gradually refine it until all that is left is the purest, gleamingest, most imaginary and unattainable nostr app imaginable. As I write this, I wonder if anything built yet will actually qualify. In any case, here we go.
It uses nostr
The lowest bar for what a "nostr app" might be is an app ("application" - i.e. software, not necessarily a native app of any kind) that has some nostr-specific code in it, but which doesn't take any advantage of what makes nostr distinctive as a protocol.
Examples might include a scraper of some kind which fulfills its charter by fetching data from relays (regardless of whether it validates or retains signatures). Another might be a regular web 2.0 app which provides an option to "log in with nostr" by requesting and storing the user's public key.
In either case, the fact that nostr is involved is entirely neutral. A scraper can scrape html, pdfs, jsonl, whatever data source - nostr relays are just another target. Likewise, a user's key in this scenario is treated merely as an opaque identifier, with no appreciation for the super powers it brings along.
In most cases, this kind of app only exists as a marketing ploy, or less cynically, because it wants to get in on the hype of being a "nostr app", without the developer quite understanding what that means, or having the budget to execute properly on the claim.
It leverages nostr
Some of you might be wondering, "isn't 'leverage' a synonym for 'use'?" And you would be right, but for one connotative difference. It's possible to "use" something improperly, but by definition leverage gives you a mechanical advantage that you wouldn't otherwise have. This is the second category of "nostr app".
This kind of app gets some benefit out of the nostr protocol and network, but in an entirely selfish fashion. The intention of this kind of app is not to augment the nostr network, but to augment its own UX by borrowing some nifty thing from the protocol without really contributing anything back.
Some examples might include:
- Using nostr signers to encrypt or sign data, and then store that data on a proprietary server.
- Using nostr relays as a kind of low-code backend, but using proprietary event payloads.
- Using nostr event kinds to represent data (why), but not leveraging the trustlessness that buys you.
An application in this category might even communicate to its users via nostr DMs - but this doesn't make it a "nostr app" any more than a website that emails you hot deals on herbal supplements is an "email app". These apps are purely parasitic on the nostr ecosystem.
In the long-term, that's not necessarily a bad thing. Email's ubiquity is self-reinforcing. But in the short term, this kind of "nostr app" can actually do damage to nostr's reputation by over-promising and under-delivering.
It complements nostr
Next up, we have apps that get some benefit out of nostr as above, but give back by providing a unique value proposition to nostr users as nostr users. This is a bit of a fine distinction, but for me this category is for apps which focus on solving problems that nostr isn't good at solving, leaving the nostr integration in a secondary or supporting role.
One example of this kind of app was Mutiny (RIP), which not only allowed users to sign in with nostr, but also pulled those users' social graphs so that users could send money to people they knew and trusted. Mutiny was doing a great job of leveraging nostr, as well as providing value to users with nostr identities - but it was still primarily a bitcoin wallet, not a "nostr app" in the purest sense.
Other examples are things like Nostr Nests and Zap.stream, whose core value proposition is streaming video or audio content. Both make great use of nostr identities, data formats, and relays, but they're primarily streaming apps. A good litmus test for things like this is: if you got rid of nostr, would it be the same product (even if inferior in certain ways)?
A similar category is infrastructure providers that benefit nostr by their existence (and may in fact be targeted explicitly at nostr users), but do things in a centralized, old-web way; for example: media hosts, DNS registrars, hosting providers, and CDNs.
To be clear here, I'm not casting aspersions (I don't even know what those are, or where to buy them). All the apps mentioned above use nostr to great effect, and are a real benefit to nostr users. But they are not True Scotsmen.
It embodies nostr
Ok, here we go. This is the crème de la crème, the top du top, the meilleur du meilleur, the bee's knees. The purest, holiest, most chaste category of nostr app out there. The apps which are, indeed, nostr indigitate.
This category of nostr app (see, no quotes this time) can be defined by the converse of the previous category. If nostr was removed from this type of application, would it be impossible to create the same product?
To tease this apart a bit, apps that leverage the technical aspects of nostr are dependent on nostr the protocol, while apps that benefit nostr exclusively via network effect are integrated into nostr the network. An app that does both things is working in symbiosis with nostr as a whole.
An app that embraces both nostr's protocol and its network becomes an organic extension of every other nostr app out there, multiplying both its competitive moat and its contribution to the ecosystem:
- In contrast to apps that only borrow from nostr on the technical level but continue to operate in their own silos, an application integrated into the nostr network comes pre-packaged with existing users, and is able to provide more value to those users because of other nostr products. On nostr, it's a good thing to advertise your competitors.
- In contrast to apps that only market themselves to nostr users without building out a deep integration on the protocol level, a deeply integrated app becomes an asset to every other nostr app by becoming an organic extension of them through interoperability. This results in increased traffic to the app as other developers and users refer people to it instead of solving their problem on their own. This is the "micro-apps" utopia we've all been waiting for.
Credible exit doesn't matter if there aren't alternative services. Interoperability is pointless if other applications don't offer something your app doesn't. Marketing to nostr users doesn't matter if you don't augment their agency as nostr users.
If I had to choose a single NIP that represents the mindset behind this kind of app, it would be NIP 89 A.K.A. "Recommended Application Handlers", which states:
Nostr's discoverability and transparent event interaction is one of its most interesting/novel mechanics. This NIP provides a simple way for clients to discover applications that handle events of a specific kind to ensure smooth cross-client and cross-kind interactions.
These handlers are the glue that holds nostr apps together. A single event, signed by the developer of an application (or by the application's own account) tells anyone who wants to know 1. what event kinds the app supports, 2. how to link to the app (if it's a client), and (if the pubkey also publishes a kind 10002), 3. which relays the app prefers.
As a sidenote, NIP 89 is currently focused more on clients, leaving DVMs, relays, signers, etc somewhat out in the cold. Updating 89 to include tailored listings for each kind of supporting app would be a huge improvement to the protocol. This, plus a good front end for navigating these listings (sorry nostrapp.link, close but no cigar) would obviate the evil centralized websites that curate apps based on arbitrary criteria.
Examples of this kind of app obviously include many kind 1 clients, as well as clients that attempt to bring the benefits of the nostr protocol and network to new use cases - whether long form content, video, image posts, music, emojis, recipes, project management, or any other "content type".
To drill down into one example, let's think for a moment about forms. What's so great about a forms app that is built on nostr? Well,
- There is a spec for forms and responses, which means that...
- Multiple clients can implement the same data format, allowing for credible exit and user choice, even of...
- Other products not focused on forms, which can still view, respond to, or embed forms, and which can send their users via NIP 89 to a client that does...
- Cryptographically sign forms and responses, which means they are self-authenticating and can be sent to...
- Multiple relays, which reduces the amount of trust necessary to be confident results haven't been deliberately "lost".
Show me a forms product that does all of those things, and isn't built on nostr. You can't, because it doesn't exist. Meanwhile, there are plenty of image hosts with APIs, streaming services, and bitcoin wallets which have basically the same levels of censorship resistance, interoperability, and network effect as if they weren't built on nostr.
It supports nostr
Notice I haven't said anything about whether relays, signers, blossom servers, software libraries, DVMs, and the accumulated addenda of the nostr ecosystem are nostr apps. Well, they are (usually).
This is the category of nostr app that gets none of the credit for doing all of the work. There's no question that they qualify as beautiful nostrcorns, because their value propositions are entirely meaningless outside of the context of nostr. Who needs a signer if you don't have a cryptographic identity you need to protect? DVMs are literally impossible to use without relays. How are you going to find the blossom server that will serve a given hash if you don't know which servers the publishing user has selected to store their content?
In addition to being entirely contextualized by nostr architecture, this type of nostr app is valuable because it does things "the nostr way". By that I mean that they don't simply try to replicate existing internet functionality into a nostr context; instead, they create entirely new ways of putting the basic building blocks of the internet back together.
A great example of this is how Nostr Connect, Nostr Wallet Connect, and DVMs all use relays as brokers, which allows service providers to avoid having to accept incoming network connections. This opens up really interesting possibilities all on its own.
So while I might hesitate to call many of these things "apps", they are certainly "nostr".
Appendix: it smells like a NINO
So, let's say you've created an app, but when you show it to people they politely smile, nod, and call it a NINO (Nostr In Name Only). What's a hacker to do? Well, here's your handy-dandy guide on how to wash that NINO stench off and Become a Nostr.
You app might be a NINO if:
- There's no NIP for your data format (or you're abusing NIP 78, 32, etc by inventing a sub-protocol inside an existing event kind)
- There's a NIP, but no one knows about it because it's in a text file on your hard drive (or buried in your project's repository)
- Your NIP imposes an incompatible/centralized/legacy web paradigm onto nostr
- Your NIP relies on trusted third (or first) parties
- There's only one implementation of your NIP (yours)
- Your core value proposition doesn't depend on relays, events, or nostr identities
- One or more relay urls are hard-coded into the source code
- Your app depends on a specific relay implementation to work (ahem, relay29)
- You don't validate event signatures
- You don't publish events to relays you don't control
- You don't read events from relays you don't control
- You use legacy web services to solve problems, rather than nostr-native solutions
- You use nostr-native solutions, but you've hardcoded their pubkeys or URLs into your app
- You don't use NIP 89 to discover clients and services
- You haven't published a NIP 89 listing for your app
- You don't leverage your users' web of trust for filtering out spam
- You don't respect your users' mute lists
- You try to "own" your users' data
Now let me just re-iterate - it's ok to be a NINO. We need NINOs, because nostr can't (and shouldn't) tackle every problem. You just need to decide whether your app, as a NINO, is actually contributing to the nostr ecosystem, or whether you're just using buzzwords to whitewash a legacy web software product.
If you're in the former camp, great! If you're in the latter, what are you waiting for? Only you can fix your NINO problem. And there are lots of ways to do this, depending on your own unique situation:
- Drop nostr support if it's not doing anyone any good. If you want to build a normal company and make some money, that's perfectly fine.
- Build out your nostr integration - start taking advantage of webs of trust, self-authenticating data, event handlers, etc.
- Work around the problem. Think you need a special relay feature for your app to work? Guess again. Consider encryption, AUTH, DVMs, or better data formats.
- Think your idea is a good one? Talk to other devs or open a PR to the nips repo. No one can adopt your NIP if they don't know about it.
- Keep going. It can sometimes be hard to distinguish a research project from a NINO. New ideas have to be built out before they can be fully appreciated.
- Listen to advice. Nostr developers are friendly and happy to help. If you're not sure why you're getting traction, ask!
I sincerely hope this article is useful for all of you out there in NINO land. Maybe this made you feel better about not passing the totally optional nostr app purity test. Or maybe it gave you some actionable next steps towards making a great NINON (Nostr In Not Only Name) app. In either case, GM and PV.
-
@ 04ed2b8f:75be6756
2025-02-03 10:13:11Your greatest enemy isn’t out there—it’s staring back at you in the mirror. Before you can dominate anything in life, you must first dominate yourself. Your fears, your doubts, your laziness, your excuses—these are the real battles. Conquering them is the first and most important victory, because if you can master yourself, nothing else can break you.
Discipline Over Desire
The weak wait for motivation. The strong rely on discipline. If you only move when you “feel like it,” you’ll never achieve anything. The mind is a battlefield, and every moment is a fight between who you are and who you could be. Who wins? The version of you that refuses to take the easy way out.
- Your emotions say rest. Your discipline says push.
- Your fear says quit. Your discipline says keep going.
- Your weakness wants comfort. Your discipline demands greatness.
Victory starts when you train yourself to act despite how you feel.
Kill Your Weakness Before It Kills Your Potential
Excuses, laziness, fear—these are chains you put on yourself. The world doesn’t need to stop you if you’ve already surrendered to your own limitations. That’s why self-mastery is the highest form of victory. It means you are in control—not your distractions, not your weaknesses, not your emotions.
- Conquer your mind, and you’ll conquer your future.
- Control your emotions, and you’ll control any situation.
- Dominate your excuses, and there will be nothing standing in your way.
You don’t need to defeat the world. You need to defeat the weaker version of yourself every single day.
No One Can Stop You—Except You
There will always be challenges. There will always be obstacles. But the only thing truly standing between you and greatness is you. That’s why conquering yourself is the most important victory. It’s the battle that determines everything else.
- Master your mind. Master your actions. Master your destiny.
- Win against yourself, and you’ll win at everything.
- Because the strongest warrior isn’t the one who fights others—it’s the one who has conquered himself.
-
@ e83b66a8:b0526c2b
2025-01-30 16:11:24I have a deep love of China. It probably started in 1981, when my Father visited China on the first trade mission from the UK to open up trading between the 2 nations.
As a family, we have historically done a lot of business in Asia starting with our company Densitron, who’s Asian headquarters were in Tokyo, through to Taiwan where we had factories leading to investing in Vbest, now Evervision an LCD manufacturer. They have admin offices in Taiwan and a factory in Jiangsu, China.
I have always hated the western narrative that China is the “enemy” or that China’s Communist / Capitalist system is “evil”.
Without understanding history, geography, cultural biases, and indoctrination it is as difficult to remove those beliefs in the same way it is difficult to convert “normies” to understand the freedom and power of Bitcoin.
I have tried and had some success, but mostly failed.
However the recent ban on TikTok and the migration of the west to the Chinese owned “rednote” app has overnight created more cultural exchanges and understanding than the previous 40+ years has ever managed to achieve. That along with the recent disclosure about Chinas advancements in AI have also deflated some of the western hubris.
If you wish to go down the rabbit hole of China from a cultural view, this YouTuber has given me a much better framework than I could ever provide as an outsider.
She is a Chinese girl, who came to the UK to study at University only to return with a mixed understanding of both cultures. She is doing a far better job of explaining the culture from a western perspective than I ever could.
https://www.youtube.com/@SimingLan
Here are 4 videos of hers that help explain a lot:
This is a lighthearted look at the recent TikTok ban TikTok ban completely backfired on US! and it's been hilarious https://www.youtube.com/watch?v=A7123nG5otA
More in-depth insights are:
My complicated relationship with China. https://www.youtube.com/watch?v=BEaw0KAuNBU
China's Biggest Problem with Free Speech Rhetoric https://www.youtube.com/watch?v=V7eSyKPbg_Y
What the West Doesn't Get about China's Rise https://www.youtube.com/watch?v=hmb1_HfflCA
-
@ 961e8955:d7fa53e4
2025-02-03 08:28:02Why Is China Against Bitcoin? Bitcoin is a cryptocurrency that is approached cautiously by all countries of the world due to crypto mining. Being the first, having a lot of investors, and being secretive are both pros and cons of bitcoin.
While some countries (for example, El Salvador) have taken positive steps towards Bitcoin, some countries (for example, Iran and China) have seriously declared war on Bitcoin.
So, have you ever thought about why the two ends of these scissors don't come together? Would countries oppose such a currency only for reasons we know? Or are there other dangers that we do not know or understand yet? We evaluated the answers to these questions together.
About the Structure of Cryptocurrency Cryptocurrencies, especially Bitcoin, act based on privacy. Although transactions in all wallets are extremely transparent, being anonymous can be extremely simple for these wallets, which are just simple characters.
This is the first danger for cryptocurrencies and countries. In other words, you can make such a large amount of money that it is not possible to take it out of the country under normal conditions, only through a few minutes of internet connection or a simple USB memory stick.
In this case, it means uncertainty. No country wants to let Chinese currency flow quickly, for example. This uncertainty manifests itself more clearly in countries where there is no environment of trust.
On the Example of Iran Another country that does not take kindly to Bitcoin is Iran. Of course, Iran does not ban it for religious reasons. Although the country is a country with high natural gas and oil reserves, it has decided to ban crypto mining by using the current power cuts as an excuse.
These prohibitions and sanctions directly serve the founding purposes of cryptocurrencies. Since no oppressive country will be a supporter of privacy and freedom, it will not allow the production and use of such cryptocurrencies.
It can block stock markets in other modern countries. For example, Italy has blocked one of the world's largest stock exchanges, Binance Global. The main reason for this may be to prevent the money from going abroad by using the tax deficits of these exchanges as an excuse.
-
@ 2063cd79:57bd1320
2025-02-03 08:05:31DISCLAIMER: Dies ist ein Re-Post eines Artikels, der ursprünglich im Juli 2023 erschienen ist. Die beschriebenen Sachverhalte sind teilweise überholt oder nie eingetroffen. Allerdings räumt der Autor ein, retrospektiv die damalige Sachlage recht treffend eingeordnet zu haben und Vorhersagen recht treffsicher gemacht zu haben.
Anfang Juni 2023 gaben die Nachrichtenportale bekannt, dass BlackRock, der weltweit größte Vermögensverwalter, über seine iShares-Einheit einen Antrag auf einen börsengehandelten Bitcoin-Fonds eingereicht hat. Dieser Schritt des 10-Billionen-Dollar-Vermögensverwalters löste in der Bitcoin-Community auf der einen Seite große Freude und auf der anderen Seite große Besorgnis aus, weil viele einerseits das Potenzial für einen massiven Zufluss von Investitionen aus dem institutionellen Bereich sehen, während Kritiker das Risiko aufzeigen, die eine solche Produktstruktur für Bitcoin mit sich bringen könnte.
Anfangs wurde viel auch darüber diskutiert, ob es sich bei dem Produkt tatsächlich um einen ETF handeln würde - wie in vielen Artikeln beschrieben - , da das Produkt im Antrag selbst nicht als solches bezeichnet wird. Aber im Endeffekt ist klar, dass es sich um ein Finanzprodukt handelt, das alle formalen Eigenschaften eines ETF besitzt. Also, was genau ist ein ETF und wie funktioniert so ein Produkt?
ETF? Eidgenössisches Turnfest, was?
ETFs sind eine Sorte von Anlagewertpapieren, die einen bestimmten Index, Sektor, Rohstoff oder andere Vermögenswerte nachbilden. ETFs können an der Börse auf die gleiche Weise gekauft oder verkauft werden wie normale Aktien. Daher schwanken ETF-Anteilspreise den ganzen Tag, wenn der ETF gekauft und verkauft wird, was bedeutet, dass eine Arbitrage zwischen dem ETF und dem zugrunde liegenden Vermögenswert (z.B. Bitcoin) möglich ist.
ETFs werden als börsengehandelte (Exchange-Traded) Fonds bezeichnet, weil sie genau wie Aktien an einer Börse gehandelt werden. Die meisten ETFs sind so strukturiert, dass sie, ähnlich wie traditionelle Investmentfonds, mehrere zugrunde liegende Vermögenswerte halten und nicht nur einen, wie es bei einer Aktie der Fall ist. Da ETFs aus mehreren Vermögenswerten bestehen können, werden sie oft als beliebtes Mittel zur Diversifizierung des Portfolios genutzt. Auf der anderen Seite eröffnen ETFs Anlegern auch die Möglichkeit in einen Rohstoff zu investieren, ohne diesen physisch erwerben zu müssen. Anstatt sich Gold in den Tresor zu legen, kann man in seinem Portfolio also z.B. den GLD ETF kaufen, der den aktuellen Preis von Gold nachbildet. Ausser in Deutschland, da geht das nicht, denn da ein Gold-ETF, der nur einen Vermögenswert abbildet, naturgemäß nicht diversifiziert ist, ist er gemäß deutschem Gesetz nicht zugelassen, da Fonds zur Diversifikation verpflichtet sind.
ETFs haben den Vorteil, dass sie kostengünstig sind (wenn man z.B. den kompletten DAX abbilden möchte, reicht ein ETF, welcher genau das tut, anstatt verschiedene Gewichtungen von 40 verschiedenen Unternehmen zu kaufen - das spart Zeit und vor allem Gebühren), dass sie Produkte abbilden, die ein Käufer unter normalen Umständen nicht erlaubt wäre zu kaufen (z.B. darf nicht jeder Anleger in Bitcoin investieren, weil sonst Lizenzen nötig wären) und sie haben den Vorteil, dass sie über den gleichen Broker oder Service gehandelt werden können, wie andere Wertpapier-Investitionen. Der letzte Punkt ist natürlich wichtig für Neueinsteiger, da sie keine zusätzlichen Kosten haben, wenn sie ihr Wertpapierdepot nutzen können und zusätzlich bietet dieser Korridor für viele traditionelle und konservative Anleger ein gewisses Gefühl von Schutz. Diese ganze cRyPto-Welt mit ihren Plattformen, Exchanges, Casinos und Teppichhändlern ist im besten Fall schwer durchsichtig und im schlimmsten Fall mutet sie kriminell an. Doch wenn ich mir "Bitcoin" über mein Depot bei Charles Schwab, der Sparkasse, oder Flatex kaufen kann, fühlt sich das natürlich legitim und sicherer an.
Der Finanzdienstleister muss den zugrundeliegenden Vermögenswert dabei vollumfänglich besitzen, mit dem grossen ABER, dass der Vermögenswert auch verliehen werden kann. Warum das ein Problem sein könnte, besprechen wir später.
Ähnlich wie ein Gold ETF bietet ein Bitcoin ETF Anlegern also die Möglichkeit mit Bitcoin zu handeln, in Bitcoin anzulegen und Bitcoin auszuprobieren, ohne Bitcoin tatsächlich zu kaufen. Ob das gut oder schlecht ist, besprechen wir auch später.
ETF Wasserfall
Nachdem die Nachricht über BlackRocks Antrag publik wurde, kamen auch etliche andere Finanzdienstleister hervor und stellten (neue) Anträge.WisdomTree hatten bereits zuvor schon einige Anläufe gebraucht, um ihre Anträge für Bitcoin-Spot-ETFs bei der SEC einzureichen und unterhalten schon ähnliche Produkte in anderen Ländern. Aber auch Fidelity, Invesco, Valkyrie oder ARK zogen unter anderem nach und stellten neue Anträge, natürlich nicht, ohne sich bei der Formulierung dieser eine Scheibe bei BlackRock abzuschneiden.
Die SEC hatte zuvor jegliche Anträge auf Bitcoin-Spot-ETFs abgelehnt, hingegen andere Bitcoin-verbundene Produkte, die gehebelte (BITX) und ungehebelte Bitcoin-Futures-Kontrakte (BITO) nachbilden, zugelassen. Auch gibt es eine handvoll ETFs, die börsennotierte Mining-Unternehmen bündeln, oder anderweitige Verbindung zum Bitcoin-Ökosystem suchen, indem sie Anteile von Unternehmen bündeln, die im weitesten Sinne mit Bitcoin in Berührung kommen (z.B. MSTR oder SQ). Eine Genehmigung eines Antrags auf Bitcoin-Spot-ETF hat es also bis heute durch die SEC noch nicht gegeben.
Der Standpunkt der SEC
Wie ich schon in einem ➡️ früheren Artikel beschrieben habe, ist der Standpunkt der SEC nur teilweise nachvollziehbar.
Die offizielle Begründung der SEC sind Bedenken in Bezug auf Marktmanipulation, Betrug, Liquidität und Transparenz. Die hauptauschlaggebenden Argumente sind mangelnde Preiserkennung durch hohe Volatilität, wiederum erzeugt durch einige unbekannte große Accounts und die steigende Zahl der Derivate-Produkte rund um Bitcoin, sowie die vielen unregulierten Börsen. Besonders letztere würde die SEC gerne unter ihre Kontrolle bringen. Das bedeutet bis Coinbase, Gemini, Kraken (oder andere große US Börsen) sich nicht bei der SEC registrieren und sich der SEC Regulierung unterwerfen, ist es unwahrscheinlich, dass die SEC einen Spot-ETF genehmigen wird. Dieses Argument ist schwer haltbar, da große Börsen wie Binance, FTX, oder BitMart nicht in den USA registriert sind, und kombiniert ein Vielfaches der in den USA beheimateten Börsen an Handelsvolumen umsetzen.
“[T]here’s a lot of work to be done to really protect the investing public.” - Gary Gensler, SEC Chair
Vorgeschoben wird also bei alledem immer der Schutz der Anleger. Ob dies eine schlüssige Argumentation ist, darf man ruhig in Frage stellen. Denn ein Bitcoin-Spot-ETF würde vielen Anlegern erlauben Bitcoin in ihr Portfolio aufzunehmen, ohne größeren Spekulationen ausgesetzt zu sein, wie das jetzt mit schon zugelassenen Produkten der Fall ist.
Darüber hinaus hat die SEC vielerorts erwähnt, dass sie bestrebt sind, mit Unternehmen aus der Branche einen regulatorisch klaren Weg zu finden, damit Unternehmen ihre Tätigkeiten im Sinne der SEC auszuüben. Das bezieht sich meist auf die Börsen, die nach eigenen Angaben seit Jahren versuchen, einen rechtlichen Rahmen zu schaffen, der ihnen Planungs- und Rechtssicherheit bietet. Dieser Punkt ist später nochmal wichtig. Das Problem hierbei besteht in der Natur dieser Unternehmen. Denn fast ausnahmslos sind alle betroffenen Unternehmen (wie z.B. Coinbase, Kraken, Binance, etc.) keine Bitcoin-Unternehmen, sondern Digital Assets-Unternehmen, die eben auch den Handel mit Shitcoins, Stablecoins und auf diesen Assets basierende Derivate erlauben (und vor allem wollen).
Jetzt wissen wir also, was ein ETF ist. Aber wie schaut der von BlackRock (und damit auch der anderen Finanzdienstleister) vorgeschlagene Bitcoin-Spot-ETF im Detail aus?
Bitcoin ETF
Das von BlackRock vorgeschlagene Produkt, und damit auch die der anderen - wie wir wissen, haben die anderen Anbieter ihre Anträge nachgebessert und dem von BlackRock weitestgehend angepasst - soll das Grantor-Trust-Modell übernehmen und seine Struktur dem von Gold-Investment-Trusts nachempfinden. Das bedeutet, dass der Besitz von Anteilen am Bitcoin-ETF für steuerliche Zwecke dem Besitz des zugrunde liegenden Vermögenswerts gleichkommt. Des Weiteren ist eine Rücknahmefunktion in Form von Sachleistungen vorgesehen. Das bedeutet vereinfacht, dass Anleger ihre Anteile auch direkt in Bitcoin umwandeln können. Anders als bei z.B. GBTC (➡️ #5 // Block 742956 // GBTC, ETF & SEC), müssen Anteile nicht erst verkauft werden, um mit den (potentiellen) Profiten bitcoins zu kaufen. Denn der Verkauf von Anteilen an GBTC (oder ähnlichen Modellen) führt nämlich ein steuerpflichtiges Ereignis herbei, wohingegen eine Umwandlung im BlackRock Modell steuerfrei zu vollziehen ist.
Aber, und dies ist ein großes ABER, kommen nur autorisierte Kunden von BlackRock in den Genuss dieser Sachrücknahmen (Umwandlungen). D.h., im Wesentlichen können nur große Investmentfirmen mit guter Reputation Anteile in Bitcoin umtauschen, alltägliche Anleger (Depot bei Charles Schwab, der Sparkasse, oder Flatex) hingegen sind nicht in der Lage diesen tollen Steuertrick anzuwenden. Die erzeugt einen Vorhang vorgespielter Transparenz ("natürlich können alle Anteile direkt in 'physische' bitcoins getauscht werden"), wohingegen ein Großteil der zugrundeliegenden bitcoins nicht wirklich eingefordert werden wird.
Es sind sich alle einig, dass ein Bitcoin-Spot-ETF ein Winner-takes-all-market ist. Das heisst, der Anbieter, dessen Antrag als erstes von der SEC genehmigt wird, wird uber kurz oder lang den Markt fuer Bitcoin-ETFs fuer sich entscheiden, bzw. beherrschen.
SEC vs. Binance
Kurz bevor BlackRock ihren Antrag auf einen Bitcoin-Spot-ETF einreichten und damit die SEC in die Schlagzeilen der Finanz- und Bitcoin Welt geriet, machte die SEC in der Bitcoin- und Digital Assets-Welt schon von sich hören, als sie kurz hintereinander gegen Binance und Coinbase Anklage erhob.
https://www.sec.gov/news/press-release/2023-101
Binance ist die zurzeit größte Börse für Digitale Assets der Welt. Binance bietet jedoch nicht nur den Handel mit Krypto-Werten, sondern auch eine Reihe von gehebelten Produkten, eigener Coins und Tokens, usw. an (Shitcoin-Casino).
“Through thirteen charges, we allege that Zhao and Binance entities engaged in an extensive web of deception, conflicts of interest, lack of disclosure, and calculated evasion of the law.” - Gary Gensler, Chairman, SEC
Vor allem ist Binance kein in den USA registriertes Unternehmen. Lediglich ein Schwesterunternehmen, Binance.us, ist offiziell in den USA registriert und hat offiziell und nach eigenen Angaben mit den Geschäften des Hauptunternehmens direkt nichts zu tun.
Die SEC klagt Binance also nicht nur wegen ihrer Angebote im Krypto-Sektor an, sondern erhebt spezifische Vorwürfe der Irreführung und Täuschung von Kunden, des Betreibens von unregistrierten Börsen, Clearingstellen und Broker-Dealer Aktivitäten, sowie Verstrickungen mit Binance.us (einer Handelsbörse, die wie gesagt offiziell unabhängig von Binance agieren soll), sowie dem Washtrading und dem Verkauf von unregistrierten Wertpapieren (mehr zu dem Thema Securities hier ➡️ #24 // Block 773750 // Commodity vs. Security).
“We allege that Zhao and the Binance entities not only knew the rules of the road, but they also consciously chose to evade them and put their customers and investors at risk – all in an effort to maximize their own profits.” - Gurbir S. Grewal, Director, SEC’s Division of Enforcement
Die SEC argumentiert also Changpeng Zhao (CEO von Binance) und Binance hätten Anleger über ihre Risikokontrollen und korrupten Handelsvolumina in die Irre geführt und gleichzeitig aktiv verschwiegen, wer der eigentliche Betreiber der Plattform ist. Damit hätten Binance-Plattformen ihren Anlegern übergroße Risiken und Interessenkonflikte beschert.
https://www.reuters.com/investigates/special-report/crypto-binance-money
Darüber hinaus wurde in Folge der Anklageerhebung bekannt, dass es bei Geldflüssen bei Binance einen deutlichen Hinweis auf einen Mangel an internen Kontrollen gibt. Interne Kontrollen sollen normalerweise sicherstellen, dass Kundengelder klar identifizierbar und von den Unternehmenseinnahmen getrennt sind. Eine Vermischung von Anleger- und Geschäftsgeldern gefährdet das Vermögen der Kunden, da deren Verbleib verschleiert wird.
Interessanterweise nutzt die SEC weiterhin die Klageschrift gegen Binance, um das Thema 'unregistrierter' Wertpapiere etwas zu erhellen. Zuvor hatte die SEC sich nur in wenigen Einzelfällen dazu geäußert, welche Digitalen Assets sie als unregistrierte Wertpapiere betrachtet, doch in der Anklageschrift werden SOL, ADA, MATIC, FIL, ATOM, SAND, MANA, ALGO, AXS, COTI, BUSD, and BNB explizit als solche bezeichnet.
Alleine vier der genannten Assets finden sich unter den 10 größten Werten (ausgenommen Stablecoins) und die anderen tummeln sich auch irgendwo in den Top 50. Der aufmerksame Sherlock Holmes wird bemerkt haben, dass es dünn wird für den "kRyPtO"-Markt. Unter den Top 10 bleiben noch 3 Proof-of-Work Coins, von denen einer den Howey-Test nicht erfüllt (und es ist nicht Doge), Ripple (XRP) und die SEC stehen schon seit 2020 vor Gericht und meiner Meinung nach ist es nur noch eine Frage der Zeit, bis die SEC sich bzgl. Ethereum äußern muss (wird).
SEC vs. Coinbase
Nur einen Tag nach Veröffentlichung der Pressemitteilung, dass die SEC Anklage gegen Binance erhebe, veröffentlichte die SEC die nächste Pressemitteilung: Die SEC erhebt auch Anklage gegen Coinbase, die größte in den USA registrierte Börse für den Handel mit Digital Assets.
https://www.sec.gov/news/press-release/2023-102
Anders als bei Binance hingegen konzentriert sich die SEC bei der Anklage gegen Coinbase einzig auf den Handel mit unregistrierten Wertpapieren und den damit einhergehenden Dienstleistungen.
“We allege that Coinbase, despite being subject to the securities laws, commingled and unlawfully offered exchange, broker-dealer, and clearinghouse functions” - Gary Gensler, Chairman, SEC.
Konkret hätten Coinbase gegen bestimmte Registrierungsbestimmungen des Securities Exchange Act und des Securities Act verstoßen. Coinbase hätten seit mindestens 2019 Milliarden Dollar verdient, indem sie den Kauf und Verkauf von unregistrierten Wertpapieren unrechtmäßig erleichtert haben.
Interessant ist, dass die SEC ein weitere Dienstleistung in die Anklage einbaut, die bisher keine Erwähnung gefunden hat: "Darüber hinaus hat Coinbase, wie wir behaupten, sein Staking-as-a-Service-Programm nie gemäß den Wertpapiergesetzen registriert, was den Anlegern erneut wichtige Offenlegungs- und andere Schutzmaßnahmen vorenthält“ (Gensler).
Dies zeigt, dass die SEC, ohne sich bisher explizit zu Ethereum geäußert zu haben, eine Meinung gegenüber Staking vertritt, und zumindest die Bereitstellung von Staking-Services als rechtswidrig erachtet. Dies könnte einer der Gründe sein, dass Ethereum noch nicht ins Rampenlicht gerückt wurde, und zwar, dass die SEC die Anklageschrift gegen die Ethereum-Foundation und damit ein Ungetüm an Financiers (JP Morgan, MasterCard, Consensys, etc.) gründlich vorbereitet, um sich für einen enormen Rechtsstreit wetterfest zu machen. Allerdings scheinen interne Ansichtspunkte und Betrachtungsweisen schon ihren Weg in andere Anklageschriften zu finden.
Darüberhinaus zitiert die SEC mit AXS, CHZ, FLOW, ICP, NEAR, VGX, DASH und NEXO eine weitere Reihe von Shitcoins, die sie als unregistrierte Wertpapiere einstufen und damit den Handel mit selbigen untersagen.
Es gibt immer wieder Erzählungen von Leuten, die mit der Sache betraut sind, dass Coinbase aktiv daran arbeiten, einen gemeinsamen Weg mit der SEC zu finden, das Geschäftsmodell zwischen regulatorisch stabile Leitplanken zu bringen. Oft, wenn diese Erzählungen aus dem Coinbase Camp kommen, heißt es, die SEC sei stur und ließe sich nicht auf die Avancen seitens Coinbase ein. Wiederum andere sagen, dass die SEC schlicht überfordert wäre und Coinbase alles daran läge, schnell eine Lösung zu finden.
"You simply can’t ignore the rules because you don’t like them or because you’d prefer different ones: the consequences for the investing public are far too great.”
Wenn man allerdings den in der Pressemitteilung zitierten Satz von Gurbir S. Grewal (Director, SEC’s Division of Enforcement) anschaut, wird klar, dass aus Sicht der SEC scheinbar relativ früh und relativ offen kommuniziert wurde, was der rechtliche Rahmen des Möglichen ist. Wahrscheinlich wurden Coinbase auch früh darüber informiert, dass der Handel mit den meisten (oder allen) gelisteten Assets (außer Bitcoin), sowie das Anbieten von Staking als Dienstleistung, nicht mit den Leitplanken konform ist, die die SEC für eine zukünftige, rechtlich stabile Regulatorik des Marktes hält. Doch die freiwillige Einhaltung dieser von der SEC 'lose' formulierten Richtlinien hätte für Coinbase das Wegbrechen von 99% ihres Geschäftsmodells bedeutet.
Coinbase listen über 250 handelbare Assets auf ihrer Seite, viele davon lassen sich 'staken', viele weitere Dienste, die Coinbase anbietet, sind von den darunterliegenden Plattformen abhängig. Es ist klar, dass Coinbase den Moment so lange vor sich herschieben wollten, wie eben nur möglich. Denn während Bitcoin als einziges auf Coinbase gehandeltes Asset deutliche YTD Performance an den Tag legt, sinkt die Zahl der auf der Plattform gehaltenen bitcoins zusehends (gut, endlich begriffen!).
Diese Woche dann der Beweis. In einem Artikel der Financial Times erklärt Brian Armstrong, CEO von Coinbase, dass die SEC klare Empfehlung ausgesprochen hat, schon bevor sie letzten Monat rechtliche Schritte gegen das Unternehmen einleitete.
“They came back to us, and they said . . . we believe every asset other than bitcoin is a security,” Armstrong said. “And, we said, well how are you coming to that conclusion, because that’s not our interpretation of the law. And they said, we’re not going to explain it to you, you need to delist every asset other than bitcoin.”
Das ergibt absolut Sinn und stützt meine These, dass die SEC gar nicht vor hat 'gegen' Coinbase zu sein. Vielmehr sieht es aus, als würden sie klarstellen wollen, dass es im geltenden Rechtsrahmen durchaus Platz für gewisse Unternehmen gibt, solange diese sich an geltendes Recht halten und nicht wie Binance offensichtlich gängige Gesetze und Regeln umschiffen. Es scheint, als wolle die SEC den 'Markt' schützen, indem sie betrügerische Firmen wie Binance auf Täuschung, Irreführung und Marktmanipulation verklagt. Gleichzeitig handelt sie bei Firmen wie Coinbase wie ein strenger Vater, der eigentlich das Beste für sein Kind möchte, aber nach wiederholten Versuchen der Gesprächsfindung nur noch harte Strafen als geeignetes Mittel sieht.
Aber warum ist der SEC daran gelegen, dass Coinbase rechtskonform und innerhalb der Leitplanken der SEC handelt?
Neue ETF Anträge mit Hilfe von Coinbase
Laut eines Berichts des Wall Street Journal hat die SEC auf die hereinbrechende Flut von Anträgen für Bitcoin-Spot-ETFs mit Bedenken reagiert. Sie erklärte zunächst, dass es den Anträgen an Klarheit und umfassenden Informationen mangele und diese somit unzureichend seien.
Die SEC hatte schon bei früheren (abgelehnten) Anträgen u.a. ihre Bedenken bezüglich der Überwachung der Handelsplattformen geäußert. Wie oben beschrieben, ist die mögliche Marktmanipulation durch unregulierte Börsen einer der Hauptgründe seitens der SEC gewesen, frühere Anträge abzulehnen. Allerdings war man davon ausgegangen, dass diese Bedenken der SEC durch eine Vereinbarung zur gemeinsamen Überwachung des Marktes durch eine regulierte Spot-Bitcoin-Handelsplattform in Zusammenarbeit mit einem der US-Handelplätze (Nasdaq, NYSE, CBOE, etc.) ausgeräumt werden könnten.
https://www.reuters.com/technology/us-sec-accepts-six-spot-bitcoin-etf-proposals-review-2023-07-19
Dementsprechend teilte die SEC den Börsen (und Antragstellern) mit, dass in den eingereichten Unterlagen wichtige Details bezüglich der genauen Vereinbarung zur gemeinsamen Umsetzung der Überwachungsvorhaben fehlten. Diese Nachricht wurde von vielen Beobachtern als negativ eingestuft: "Die SEC versteht nicht, was hier erreicht werden soll. Die SEC stellt sich quer. Die SEC ist automatisch gegen Bitcoin." war die Essenz der meisten Reaktionen. Allerdings lese ich persönlich die Reaktion der SEC ähnlich, wie auch die Anklageerhebung gegen Coinbase. Die SEC spielt ganz klar nach den eigenen formulierten und klar kommunizierten Regeln und versucht den Mitspielern die Leitplanken aufzuzeigen. Der Tenor scheint klar: "Wir haben euch die Regeln erklärt, nach denen wir mit euch spielen (hört mit der Shitcoinerei auf!). Befolgt diese und wir kommen ins Gespräch."
https://www.theblock.co/post/238944/cboe-reaches-surveillance-agreement-with-coinbase-for-spot-bitcoin-etfs
Wonach die SEC scheinbar explizit zu fragen scheint, ist ein sogenanntes Information-Sharing Agreement (ISA), also eine Vereinbarung zum Informationsaustausch. Diese Vereinbarung zwingt eine Handelsplattform dazu, Handelsdaten bis hin zu persönlichen Informationen wie den Namen und den Adressen der Kunden weiterzugeben. Ein solches ISA scheint bislang in den Anträgen gefehlt zu haben, weshalb die SEC auf die Anträge reagierte und diese als unvollständig zurückwies. Mit der neuen Welle an korrigierten Anträgen scheinen die meisten Antragsteller diese Unvollständigkeit behoben zu haben.
Und wen listet JEDER der Antragsteller als Partner zum Informationsaustausch? Rate, rate? Richtig, Coinbase!
Die Chicago Board Options Exchange (CBOE), eine Optionsbörse, die u.a. die Anträge zusammen mit den oben genannten WisdomTree, VanEck, Invesco und ARK stellte, erzielte kurzerhand mit Coinbase eine Einigung über die Bedingungen für den Abschluss eines ISA und reichte alle Anträge mit den neuen Bedingungen erneut ein.
Wie wir also sehen, deutet alles darauf hin, dass die SEC einem Bitcoin-Spot-ETF eigentlich positiv geneigt ist, sollten die Konditionen, die sie stellt, erfüllt sein. Und in Garys perfekter Welt, sehen diese Konditionen vor, dass ein solcher ETF mit Hilfe von Coinbase als Informations-Austauschs-Partner funktioniert, und dass Coinbase ein artiges in den USA börsennotiertes Unternehmen wird, dass keine Shitcoinerei betreibt und sich auf den Spot-Handel mit Bitcoin konzentriert. Denn die derzeit anderen angebotenen Services wie Clearingstellen und Broker-Dealer-Aktivitäten stehen im direkten Gegensatz zu potenziellen Aktivitäten und Interessen von Kunden.
Wir sehen also, dass ein "größerer Plan" hinter den Aktionen der SEC zu stehen scheint. Meiner Meinung nach gibt es verschiedene Theorien und Hinweise, die darauf schließen lassen, dass die SEC a) den Markt regulieren will, bevor sie ein BlackRock-Produkt genehmigt, b) ausländische (und damit nicht leicht regulierbare) Unternehmen aus dem Markt drängen will, um damit Unternehmen wie BlackRock den Handel zu vereinfachen und c) andere Interessengruppen an der Entscheidung der SEC beteiligt zu sein scheinen. Man könnte so weit gehen zu behaupten, dass anhängige Klagen und Untersuchungen ein Stück weit sogar den Kurs drücken und Bitcoin in der allgemeinen Wahrnehmung, als riskant dastehen lassen, was Unternehmen wie Blackrock dabei hilft die nötigen bitcoins zu einem relativ günstigen Preis zu akkumulieren, bevor eine Genehmigung und die implizite Anerkennung von Bitcoins Wert dazu führen, dass der Preis rasant steigt. Dies wäre ein Eingriff in den Wettbewerb und gibt BlackRock et al einen klaren Vorsprung gegenüber anderen Institutionen.
Es gibt unterschiedliche Ansichten darüber, wie Coinbase und die SEC mit dieser Situation umgehen. Einige behaupten, dass Coinbase aktiv nach einer Lösung sucht, um sich mit der SEC auf einen rechtlichen Rahmen zu einigen, während andere sagen, dass die SEC unbeugsam ist. Es wird vermutet, dass die SEC Coinbase frühzeitig darüber informiert hat, welche Regeln und Leitplanken sie für den Markt etablieren möchten.
https://x.com/BitcoinMagazine/status/1679887574934999045
Es scheint, dass die SEC den Markt schützen möchte, indem sie gegen betrügerische Unternehmen wie Binance vorgeht, die gängige Gesetze und Regeln umgehen. Gleichzeitig versucht sie bei Unternehmen wie Coinbase, die sich nicht an die geltenden Vorschriften halten, harte Strafen als Mittel zur Durchsetzung der Regulierung einzusetzen. Das scheint nur logisch, wenn man bedenkt, dass BlackRock und die anderen Antragsteller wie WisdomTree, VanEck, Invesco und ARK sich mit Coinbase auf Bedingungen für den Abschluss eines Informations-Austausch-Abkommens (ISA) geeinigt und die Anträge mit den neuen Bedingungen erneut eingereicht haben.
Dies deutet darauf hin, dass die SEC grundsätzlich positiv gegenüber einem Bitcoin-Spot-ETF eingestellt ist, sofern bestimmte Bedingungen erfüllt sind. Diese Bedingungen könnten beinhalten, dass Coinbase als Informationspartner fungiert und dass Coinbase als in den USA börsennotiertes Unternehmen agiert, das sich auf den Spot-Handel mit Bitcoin konzentriert, während andere Dienstleistungen wie Clearingstellen und Broker-Dealer-Aktivitäten vermieden werden sollen.
https://x.com/stackhodler/status/1691531818300809217
Es scheint, dass die SEC eine umfassendere Strategie verfolgt, die darauf abzielt, den Markt zu regulieren, ausländische Unternehmen zu verdrängen und den Handel für Unternehmen wie BlackRock zu erleichtern.
Mitte letzten Jahres habe ich in einem Artikel schon Grayscales andauernden Versuch, ihren Closed-End-Fund in einen Bitcoin-Spot-ETF zu verwandeln, beschrieben.
https://www.genexyz.org/post/1722193843734/
Die SEC hatte bereits im Dezember 2021 und im Februar 2022 die Entscheidung über den Antrag auf einen Bitcoin-ETF verschoben, um ihn "sorgfältig zu prüfen". Dann hat die SEC Mitte Juli 2023 bekanntgegeben, dass einem Antrag auf Umwandlung wieder nicht stattgegeben wird. Grayscale kündigten sofort an, die SEC wegen Willkür und Verstoß gegen das Wertpapierbörsengesetz von 1934 zu verklagen.
Diese Klage wurde dann vor dem Bundesberufungsgericht verhandelt und entschieden.
Das Bundesberufungsgericht in D.C. entschied im Oktober, dass das Ablehnen von Anträgen auf eine Umwandlung in einen ETF seitens Grayscale ungerecht, nicht rechtens und willkürlich sei, da die Aufsichtsbehörde nicht erklären konnte, warum sie zuvor ähnliche Produkte zugelassen hat.
Allerdings bedeutet dies nicht, dass Barry Silbert (CEO von DCG) automatisch den Grayscale Trust in einen ETF umwandeln kann. Der Antrag wandert damit nur zurück auf Garys (Vorsitzender der SEC) Schreibtisch. Und das bedeutet, dass die SEC wieder die Möglichkeit bekommt, einer Umwandlung aufgrund anderer Begründungen nicht stattzugeben. Dazu gleich mehr ⬇️.
Außerdem ist fraglich, ob Barry tatsächlich wirklich eine Umwandlung herbeisehnt, denn momentan befinden sich Grayscale in einer sehr angenehmen Lage, die ihnen erlaubt 2% vom NAV (Net Asset Value) an Gebühren zu verlangen. Was bei einem Vermögen von 624.947 Bitcoin einen jährlichen Umsatz von 12.500 Bitcoin, bzw. 475 Million US Dollar bedeutet - für nichts tun.
Es gibt schon Kampagnen, die für eine Auflösung des Trusts kämpfen. Wer sich über die Umtriebigkeiten bei DCG / Genesis / Grayscale (Barry) ein besseres Bild machen möchte, sollte unbedingt den folgenden Thread lesen:
https://x.com/real_vijay/status/1721385528510251182
Was seit dem geschah
Seit dem letzten Artikel ist gleichzeitig viel und wenig geschehen. Verinnerlichen wir uns meine These - dass die SEC a) den Markt regulieren will, bevor sie ein BlackRock-Produkt genehmigt, b) ausländische (und damit nicht leicht regulierbare) Unternehmen aus dem Markt drängen will, um damit Unternehmen wie BlackRock den Handel zu vereinfachen und c) andere Interessengruppen an der Entscheidung der SEC beteiligt zu sein scheinen - dann ist genau das passiert, was man erwartet hätte.
Die SEC hat ihre Entscheidung zur Genehmigung der ETF-Anträge wiederholte Male verschoben, momentan sieht es so aus, als würde eine Entscheidung im Januar 2024 fällig.
https://bmpro.substack.com/p/sec-delays-etf-again-despite-warning
Die SEC fällt weiter unliebsame Bäume. Bittrex, eine in den USA ansässige Börse, haben angekündigt, ihre Pforten zu schließen.
https://finance.yahoo.com/news/crypto-exchange-bittrex-global-shuts-054643624.html
Kraken wurde von der SEC verklagt - ähnliches Modell wie auch zuvor bei Binance und Coinbase angewandt (sprich: alles okay und tutti, solange ihr die Shitcoinerei an den Nagel hängt).
https://www.nobsbitcoin.com/kraken-sec-lawsuit
Dabei wurden in der Klageschrift die bereits identifizierten Digitalen Assets, die die SEC als unregistrierte Wertpapiere betrachtet, 1 zu 1 wieder aufgeführt.
Doch die größte Überraschung war die diese Woche veröffentlichte Meldung, dass Binance sich in einem Vergleich mit dem US Department of Justice (DOJ) auf eine Zahlung von über 4 Milliarden US Dollar und den Rücktritt CZs (Changpeng Zhao) als CEO von Binance geeinigt habe.
https://www.nobsbitcoin.com/cz-steps-down-as-ceo-of-binance-as-part-of-4-billion-settlement-with-doj
Es ist recht eindeutig, dass es dem Justizministerium (DOJ) hier nicht um den Schutz der Verbraucher geht. Es muss allerdings der Anschein gewahrt werden, dass nicht in Eigeninteresse (dem von BlackRock, hust) gehandelt wird, sondern dass der Eindruck erweckt wird, dass sie tatsächlich etwas Gutes tun, indem sie sich um einen "bad actor" kümmern" - das wird sehr deutlich, wenn man betrachtet, dass sich das Narrativ im Vergleich hauptsächlich auf AML (Anti-Money-Laundering) und Terrorismusfinanzierung konzentriert.
Wie schon aus meiner These ersichtlich, geht auch aus bisherigen Kommentaren der SEC klar hervor, dass die größte Sorge derzeit ausländische Börsen sind, die den Bitcoin-Preis manipulieren können. Binance ist die größte Börse der Welt und hat bis heute erfolgreich außerhalb des Einflussbereichs der US-Regierung operiert. Mit dieser Vereinbarung ist das Problem der Offshore-Kursmanipulation zunächst und zum größten Teil gelöst.
Das BlackRock-SEC-Reptilienmenschen-Playbook ist im vollen Gange. Ausländische Konkurrenz weitestgehend unter Kontrolle ✅
Die SEC scheint außerdem im engen Kontakt mit den ETF-Antragstellern zu stehen. Insbesondere ein Verweis auf eine Änderung der Anträge in Bezug auf "cash" vs. "in-kind creation" hat diese Woche für Diskussionen gesorgt.
https://x.com/EricBalchunas/status/1725559994995573086
Viele börsengehandelte Fonds verlangen von den zugelassenen Teilnehmern, dass sie Anteile in Form von Sachleistungen (in-kind) schaffen , d. h. dass sie ETF-Anteile gegen einen Wertpapierkorb und nicht gegen Bargeld (cash) eintauschen. Die SEC hat jedoch auf eine Formulierung in den Anträgen gedrängt, die genau dise cash-creations zulassen.
Während sich viele auf die minutiöse Gestalt der Inhalte stürzen und eine Genehmigung hineininterpretieren, zieht die SEC hier meiner Meinung nach eine Linie, um eine Unterscheidung zwischen Grayscales GBTC und BlackRock et al. zu schaffen.
Wenn man an ein Playbook glaubt, ist der Grayscale Trust den Teilnehmern ein offensichtlicher Dorn im Auge, weshalb eine Umwandlung zunächst verhindert werden will.
Jetzt muss nur noch Coinbase mitspielen. Aber wenn Binance einen Vergleich erzielen kann, warum nicht auch $COIN? Vielleicht einigt sich die SEC mit Coinbase im Gegenzug für "saftige Geldstrafen" und die Entfernung aller Shitcoins von der Plattform. Im Gegenzug erhält Coinbase den Börsenstatus und wird für die Überwachungsvereinbarung mit BlackRock und den anderen Antragstellern freigeschaltet. Auf einen Schlag würde die SEC die Shitcoins von der einzigen börsennotierten US-Börse entfernen und ein legales (nach ihren Vorstellungen und selbst artikulierten Prinzipien) Fundament für BlackRocks ETF schaffen.
Außerdem würde es mich nicht wundern, wenn Coinbase als weißer Ritter auftritt und ganz barmherzig das US-Business von Binance übernimmt. Natürlich nur, um einem Mitstreiter in schwierigen Zeiten beizustehen. Ich packe es auf jeden Fall auf meine Bingo-Karte für den Zeitraum zwischen jetzt und einer Genehmigung der ETF-Anträge.
Durch die Einigung mit CZ und die Geldstrafe von 4,3 Milliarden US Dollar erleichtert die US-Regierung den Transfer von Bitcoin aus schwachen in starke Hände (Binance ➡️ Coinbase). Binance werden Bitcoin verkaufen müssen, um die Geldstrafe zu bezahlen, während gleichzeitig die Spot-ETFs das Angebot mit amerikanischem Kapital auffüllen können. Schöne Ausführung. Tolles Playbook 👏
Ich bin mir bewusst, dass die oben genannten Ereignisse und Auslegungen der Geschehnisse sehr verschwurbelt daherkommen, jedoch möchte ich meinen virtuellen Alu-Hut vor dem Architekten dieses wirklichen langen Long-Games ziehen.
In der Zwischenzeit arbeiten gewissenhafte Journalisten namhafter Veröffentlichungen (BlackRock PR-Department, hust) daran, die öffentliche Wahrnehmung von Bitcoin zum Positiven zu wenden.
Wurde in den letzten Jahren Bitcoin als riskante Anlage, Klimakiller, Ozean-Kocher, oder schlimmer bezeichnet, wird es jetzt als ein möglicher Bestandteil einer nachhaltigen und zukunftsorientierten Anlagestrategie dargestellt.
https://www.forbes.com/sites/digital-assets/2023/07/08/bitcoin-network-to-reduce-more-emissions-than-its-energy-sources-produce/
Wir (du schlaue/r Leser//in und ich) wissen schon lange, dass die Bitcoin-Branche heute die weltweit am nachhaltigsten betriebene Branche ist und das Bitcoin-Mining als einzige Industrie in dem Bereich kohlenstoffnegativ werden kann. Es ist also offensichtlich, dass Bitcoin ein wichtiger Bestandteil einer nachhaltigen und zukunftsorientierten Anlagestrategie sein kann, aber genau dieses Narrativ wurde jahrelang absichtlich verdrängt (➡️ siehe XRP-gesponsorte Greenpeace Aktion anfang des Jahres).
Wir sehen also, dass es nicht nur um eine einfache Genehmigung der Anträge geht, sondern viele Mosaikteilchen gelegt werden, bevor es dazu kommen kann. Viele Zeichen deuten darauf hin, dass viele verschiedene Parteien daran arbeiten, ein Umfeld zu schaffen, dass es bestimmten Gruppen ermöglicht, einen ETF möglichst risikofrei und konkurrenzlos zu platzieren. Dabei werden unliebsame Mitspieler vom Platz gewiesen und anderen Mitspielern werden die Spielregeln nochmal ganz bewusst in Erinnerung gerufen, während gleichzeitig ein Narrativ geschaffen wird, das einen Bitcoin-ETF in glänzendem Licht darstellt.
Es ist nahezu gewiss, dass es nicht die Frage ist, ob einem Antrag zugestimmt wird, sondern vielmehr, wann dies geschehen wird. Es besteht eine hohe Wahrscheinlichkeit, dass allen Anträgen zeitgleich stattgegeben wird. Dennoch lässt sich erkennen, dass die SEC strategisch Zeit gewinnt, um Binance und andere unerwünschte Akteure vollständig aus dem Spiel zu nehmen und Coinbase in der Zwischenzeit zu dem vorbildlichen Mustersohn zu formen, den sie immer haben wollte.
Da der Markt für Spot-ETFs als "Winner-takes-all" gilt, wird darauf geachtet, dass nicht irgendein Antragsteller das Rennen gewinnt, sondern ein bestimmter - Larry. Hierfür ist es notwendig, Barry vom Spielfeld zu verdrängen, da er einen erheblichen Vorsprung hat, woran Gary offensichtlich arbeitet. Falls sich meine Vermutungen bewahrheiten, werden wir in naher Zukunft einen Bitcoin-Spot-ETF sehen, der von BlackRock dominiert wird. Grayscale und Binance werden keine Rolle im Spiel spielen, während Coinbase als reguliertes, vorbildliches US-Unternehmen davon profitieren wird.
🫳🎤
In diesem Sinne, 2... 1... Risiko!
-
@ 961e8955:d7fa53e4
2025-02-03 07:58:25What is Bitcoin Cash? Bitcoin is a coin created on the blockchain. It is symbolized by BCH. It is currently one of the most well-known coins in the world. The maximum supply within BCH is limited to 21 million, as Bitcoin is split over the blockchain.
What are the Advantages of Bitcoin Cash? First of all, it is among the most well-known and traded coins due to its name and infrastructure. Although the fact that Bitcoin is being traded on the blockchain was initially seen as an advantage for him, unfortunately, some of the problems that come with bitcoin have not been resolved.
The biggest difference between Bitcoin Cash and Bitcoin is that the transaction times for BCH are extremely short. In this way, the block capacity was increased and became 8MB.
-
@ e7bc35f8:3ed2a7cf
2025-02-03 07:37:44In a striking contrast of ideals versus actions, former U.S. Secretary of State Hillary Clinton was recently awarded the Medal of Freedom. Yet, it is impossible to forget what happened in February 2011, when ex-CIA analyst and well-known dissident Ray McGovern was violently removed by security while silently protesting one of Clinton’s speeches at George Washington University. McGovern’s only act of defiance was standing up and turning his back to Clinton in protest of America’s ongoing wars of aggression. The incident, which unfolded under Clinton’s watch, stands as a stark reminder of the selective nature of so-called freedom and democracy.
The irony of the moment was profound. Clinton's speech that day was ostensibly about the brave individuals in Egypt who had stood up against authoritarian rule, using the internet to organize their dissent. The same U.S. government that praised online activism abroad seemed intolerant of peaceful, silent protest within its own borders.
Over the past two decades, mainstream media has pushed a narrative that social media platforms like Twitter, Facebook, and YouTube have played an instrumental role in shaping revolutions and uprisings across the world. From Moldova and Iran to Egypt and Tunisia, reporters with little on-the-ground knowledge have eagerly proclaimed these digital platforms as revolutionary tools of democracy. The only problem? This oft-repeated story is largely a myth.
While journalistic laziness explains some of this exaggeration—reporters compiling their stories from hotel rooms rather than gathering firsthand accounts—the truth runs much deeper. The idea of a "social media revolution" has been deliberately constructed by U.S. State Department-linked NGOs with vested interests in overthrowing governments that do not align with Washington’s geopolitical agenda.
One of the key figures in shaping this narrative is Evgeny Morozov, a former fellow of George Soros’ Open Society Institute and a visiting scholar at Stanford University. Morozov pioneered the concept of the "Twitter Revolution" during the 2009 Moldovan protests, arguing that social media facilitated "flash mobs" and "huge mobilization efforts" against authoritarian regimes. His language, promoted in publications like Foreign Policy, The Economist, and openDemocracy, laid the foundation for the media’s portrayal of networked protests.
However, even Morozov was forced to later acknowledge flaws in his argument. He admitted that at the time of the so-called "Twitter Revolution" in Moldova, there were only about 70 registered Twitter users in the entire country. Despite this glaring inconsistency, the Western media ran with the story.
The same pattern repeated in the 2009 Iranian unrest, where an alleged flood of 30,000 tweets provided live updates on the protests. Most of these tweets, however, were in English and were posted by newly registered accounts with identical profile pictures—hardly the grassroots digital uprising the media portrayed. Notably, Israeli news outlets began covering these "tweets" almost immediately, raising questions about external orchestration.
Similarly, during the Arab Spring, social media was widely credited for fueling protests in Egypt, Tunisia, and Yemen. Yet, the data tells a different story. At the height of these uprisings, the combined number of Twitter users in those three countries was under 15,000. Facebook, while more widespread, still had only a 4.5% penetration rate in Egypt by mid-2010—dwarfed by the reach of television networks.
Even those who originally championed the "social media revolution" have had to admit that the phenomenon was blown out of proportion. What they refuse to acknowledge, however, is the strategic motivation behind these uprisings. Who benefits from these revolutions, and whose interests do they ultimately serve?
At a 2010 Berlin conference, Morozov conspicuously avoided addressing these critical questions. His silence speaks volumes. The reality is that "social media revolutions" are often less about organic uprisings and more about the West’s longstanding practice of using digital tools as part of broader regime-change strategies.
In 2011, for instance, the U.S. State Department funded Psiphon, an online encryption system designed to help users bypass government firewalls. This technology was distributed in Syria, conveniently aiding opposition forces at a time when the U.S. was actively working to destabilize the Assad government. Yet, when Syria was later found using U.S.-developed internet filtering technology, it was condemned for violating American trade laws.
The most glaring hypocrisy is that while U.S. officials champion the internet as a tool for democracy in foreign countries, they simultaneously push for more restrictive internet laws at home. In 2011, Senator Joe Lieberman openly discussed using internet filtering technology to regulate American citizens’ access to information—ironically sounding much like the authoritarian leaders Washington claims to oppose.
This contradiction exposes the true nature of the social media revolution myth. Far from being an organic expression of people’s will, it is often just another weapon in the arsenal of Western powers seeking to manipulate and destabilize governments that refuse to align with their interests. The very same politicians who praise internet activists in Iran or Syria are the ones clamping down on online freedoms in their own countries.
The story of social media as a revolutionary force is not one of grassroots activism triumphing over oppression. Instead, it is a carefully crafted narrative, used to justify interventionist policies and promote regime change under the guise of "democracy promotion." As history has repeatedly shown, the beneficiaries of these so-called revolutions are rarely the people on the ground—but rather, the geopolitical architects pulling the strings from afar.
-
@ f1989a96:bcaaf2c1
2025-01-30 15:25:34Good morning, readers!
This week, authoritarian regimes augmented their control and monitoring of online spaces in an attempt to suppress the dissenting voices of those they have financially repressed. While Pakistanis grapple with the highest cost of living in Asia, the military-backed regime passed an oppressive social media bill that empowers the government to imprison and fine individuals deemed to be spreading “disinformation” online.\ \ Meanwhile, in Belarus, authoritarian Alexander Lukashenko secured a seventh term in an openly rigged presidential election, further consolidating his grip on power and deepening the country’s political and financial repression. This prolongs his rule beyond three decades, cementing him as the sole ruler of Belarus since the country gained independence from the Soviet Union in 1991.
In freedom technology news, open-source developer Super Testnet released a new privacy tool called Hurricash. It lets multiple users lock funds together in a single Bitcoin Unspent Transaction Output (UTXO), allowing them to transact within the pool of users with greater privacy and efficiency. With greater liquidity and adoption, it could prove a useful tool for human rights activists seeking financial privacy. \ \ Additionally, Zaprite integrated BTCPay Server, enabling users to accept Bitcoin, Lightning, and fiat payments using self-custodial and self-hosted Bitcoin infrastructure. This is particularly valuable for nonprofits and activists in authoritarian regimes, where governments monitor and restrict financial activity.
We end with the latest episode of the “Money Matters” podcast, where Jack Mallers, CEO of Strike, interviews HRF Chief Strategy Officer Alex Gladstein to discuss the often overlooked connection between Bitcoin and financial freedom.
Now, let’s jump right in!
Subscribe Here
GLOBAL NEWS
Belarus | Lukashenko Sweeps Openly Rigged Election Amid Financial Repression
In Belarus, authoritarian leader Alexander Lukashenko secured a seventh term in an openly rigged presidential election. Lukashenko’s crusade against dissent and political opposition has left many citizens and opposition figures exiled, imprisoned, and financially repressed. Historically, his regime has frozen bank accounts, blocked foreign currency exchanges, and cut off independent media from funding. By wielding financial and political power, Lukashenko ensures that no real opposition can rise, turning Belarus into a country where even the illusion of democracy has disappeared. In these environments, Bitcoin and tools like Lnp2pbot (an HRF grantee) help Belarusians circumvent financial restrictions and transact in a currency that Lukashenko can’t control.
Nigeria | Joins BRICS Economic Coalition
Nigeria is expanding its financial repression both internationally and domestically. It recently joined BRICS, an intergovernmental economic organization led by the Chinese and Russian regimes. For some, this raises concerns as Nigeria may deepen its authoritarian ways and further restrict individual financial freedoms. Member countries are each leaders in the development and implementation of central bank digital currencies (CBDCs), threatening individual financial autonomy as financial control is increasingly placed under the purview of authoritarian states. In parallel, the Nigerian regime plans to distribute a 75,000 naira ($48) “cash transfer” to the nation’s poorest citizens. This bid to alleviate poverty risks, while stoking inflation and compromising privacy, as the initiative relies on digital registration through the National Identity Number (NIN) system. Nigeria’s strategy of using both micro and macro financial controls limits open markets and curtails individual freedoms.
Pakistan | Regime Passes Repressive Bill Targeting Online Spaces
Pakistan’s military-backed regime passed a repressive social media bill that allows officials to imprison citizens for spreading “disinformation” online. Under this new law, officials can block “unlawful and offensive” content and remove users from social media at a time when Pakistanis are increasingly turning to online spaces to express discontent over regime-imposed economic hardships. Those “spreading disinformation” risk facing three years in prison and fines of up to 2 million rupees ($7,150) — a harsh penalty for citizens grappling with the highest cost of living on the continent. Further, social platforms must register with the Social Media Protection and Regulatory Authority to operate or risk a permanent ban. Censorship and Internet controls are sadly nothing new for Pakistanis since the regime has blocked X during elections and enacted a nationwide Internet firewall to suppress public discourse and action.
Cuba | Salary of Baseball Player Buys a Carton of Eggs
Cuba’s cost-of-living crisis is so severe that even the country’s top and most profitable athletes cannot make ends meet. Exemplifying this, the monthly salary of a professional baseball player in the National Series — Cuba’s premier sporting event — barely covers the cost of a carton of eggs, forcing them to seek opportunities elsewhere. With the Cuban peso in freefall, several players have resigned, citing financial hardships as the reason for leaving the sport they love. Their departures reflect a broader reality: wages across Cuba fail to keep pace with severe inflation caused by the Cuban regime’s continuous economic mismanagement. The state continues to enforce wages in the collapsing peso while requiring “MLC” credits to purchase high-quality food and goods in a system that pulls in foreign exchange from abroad while stealing from citizens at home.
South Sudan | Regime Blocks Citizen Access to Social Media
In South Sudan, rebel leader Salva Kiir Mayardit directed the National Communication Authority (NCA) to block each citizen’s access to social media nationwide for up to three months, citing concerns over “public safety” and “mental health.” This decision follows violent videos of Sudanese armed forces attacking South Sudanese refugees in Sudan. Sudanese rights groups condemned the ban as a blatant act of censorship and an abuse of power. “The death of our South Sudanese in Sudan should not culminate in blocking social media, which is one of the ways many of us get information,” said one Sudanese citizen. By restricting social media, the regime demonstrates a clear willingness to silence dissent, suppress information, and stifle transparency under the guise of “protection.” As Sudanese grapple with rising prices, the ban further isolates them, leaving little room to coordinate relief efforts, share grievances, or hold those in power accountable.
RECOMMENDED CONTENT
IMF Offers a Glimpse at the Perils of Central Bank Digital Currencies by J.D. Tuccille
In this article for Reason Magazine, J.D. Tuccille examines the dangers of central bank digital currencies (CBDCs) and their implications for financial independence and privacy. Drawing from the International Monetary Fund’s (IMF) “CBDC Virtual Handbook,” Tuccille explains how CBDCs grant governments unprecedented control to monitor transactions, impose restrictions, and manipulate financial behavior. He contrasts these state-issued digital currencies with decentralized alternatives like Bitcoin, highlighting the stark differences in privacy and user freedom. You can read the complete analysis here. To learn more about CBDCs and the threats they pose to civil liberties and human rights, check out our HRF’s CBDC Tracker.
BITCOIN AND FREEDOM TECH NEWS
Super Testnet | Launches Hurricash
Bitcoin Developer Super Testnet released Hurricash, an experimental and open-source Bitcoin privacy protocol. Hurricash lets multiple users lock funds together in a single Bitcoin Unspent Transaction Output (UTXO), making their transactions more private. Users can then transact within the pool with greater efficiency and privacy. With greater liquidity and adoption, it could prove a useful tool for human rights defenders seeking financial privacy. Innovations like this could also pave the way for activists in many decades to afford trustless BTC transactions.
Zaprite | Integrates BTCPay Server
Zaprite, a platform for accepting Bitcoin payments, recently integrated BTCPay Server, an open-source Bitcoin payment processor and HRF grantee. This integration allows users to accept Bitcoin, Lightning, and fiat payments (like USD) while maintaining full control over their funds — something Zaprite couldn’t afford on its own. By connecting with BTCPay Server, users can receive Bitcoin payments directly to their own self-hosted wallet and node, reducing censorship risks and enhancing financial independence. This is valuable for nonprofits, merchants, and activists in authoritarian regimes, where governments monitor, freeze, and restrict financial activity.
Breez SDK | Implements Pay to BIP 353 Addresses
The Breez Software Development Kit (SDK), a tool for integrating self-custodial Lightning payments into apps and services, now supports payments to BIP 353 addresses. BIP 353 enables individuals with access to a domain the ability to create static, human-readable payment addresses (such as user@domain), instead of a long string of letters and numbers. This means an activist with a website can receive Bitcoin donations directly through their domain — if their wallet supports BIP 353. Several Bitcoin wallets already using the Breez SDK include Cake Wallet, Blitz Wallet, and Klever Wallet. These static addresses make receiving Bitcoin easier, more private, and more censorship resistant, reducing surveillance risks and simplifying recurring payments.
Ark Labs | Releases Wallet Software Development Kit
Ark, a protocol promising faster and cheaper transactions on Bitcoin, released a wallet software development kit (SDK). The SDK is aimed at helping developers more readily create Ark-compatible Bitcoin wallets that support both traditional Bitcoin payments and Ark’s instant transactions on mobile and desktop platforms. Protocols like Ark hold promise for greater transaction efficiency and improve its transaction capabilities for those who need it most.
Tornado Cash | US District Court Reverses Sanctions
A United States District Court ruled to reverse the sanctions on Tornado Cash, marking a major legal win for financial privacy in the digital asset space. This decision follows a previous Appeals Court ruling that found the Treasury overstepped its authority by sentencing the digital asset mixer under the International Emergency Economic Powers Act (IEEPA). The court determined that Tornado Cash’s smart contracts (self-executing lines of code) do not constitute “property,” making them ineligible for sanctions under existing laws. These rulings set a positive precedent for decentralized protocols and financial privacy in a world where these tools are desperately needed. Developers cannot work on privacy openly in dictatorships, so they need havens in liberal democracies.
OpenSats | Announces Grants for Three Bitcoin Core Contributors
OpenSats, a public nonprofit supporting open-source software and projects, announced three new grants for Bitcoin Core contributors L0rinc, kevkevin, and Daniela Brozzoni. L0rinc will improve Bitcoin Core's performance and reliability by optimizing Initial Block Download (IBD), block storage, and database functionality. Kevkevin will enhance Bitcoin Core's stability, security, and usability by fixing bugs and reviewing pull requests. Finally, Daniela will review Bitcoin Core's code, adding features and improving test coverage. HRF is pleased to see the continued support of open-source developers from this Bitcoin Development Fund grantee.
Bitcoin Chiang Mai | Bitcoin for Human Rights Meetup
Bitcoin Chiang Mai, a grassroots Bitcoin community in Thailand, will host a meetup exploring Bitcoin’s role in human rights and financial freedom on Feb. 7, 2025. HRF Global Bitcoin Adoption Fellow Win Ko Ko Aung will discuss how Bitcoin empowers activists and communities under authoritarian rule, with a particular focus on Burmese citizens. Held in Burmese and English, the event will educate attendees on Bitcoin as a tool for escaping financial repression. If you have Burmese friends in Chiang Mai, share this opportunity with them. You can register here.
RECOMMENDED CONTENT
Bitcoin and Freedom with Alex Gladstein
In a special episode of the “Money Matters” podcast, Jack Mallers, CEO of Strike, speaks with Alex Gladstein, chief strategy officer at HRF, to discuss the powerful link between Bitcoin and financial freedom. Gladstein unpacks how authoritarian regimes manipulate money to control the public and explains why open-source financial tools are critical for resisting oppression. His insights make a compelling case for financial sovereignty as a fundamental human right — and why Bitcoin remains the most effective tool to secure it.
If this article was forwarded to you and you enjoyed reading it, please consider subscribing to the Financial Freedom Report here.
Support the newsletter by donating bitcoin to HRF’s Financial Freedom program via BTCPay.\ Want to contribute to the newsletter? Submit tips, stories, news, and ideas by emailing us at ffreport @ hrf.org
The Bitcoin Development Fund (BDF) is accepting grant proposals on an ongoing basis. The Bitcoin Development Fund is looking to support Bitcoin developers, community builders, and educators. Submit proposals here.
-
@ cbd2779f:72a5b029
2025-01-30 15:08:13Have a few questions pertaining to setting up a new node. Basically, I always seems to be unsure about syncing to graph, after syncing to chain. Consider setting up a new node from scratch, or migrating perhaps, and you want to do an initial setup.
- How long does it take?
- What factors determine how long it takes?
- Is the graph a universal graph that is identical from each nodes perspective?
So far, I'm monitoring progress but tailing logs, looking for clues:
tail -n 100 /data/lnd/logs/bitcoin/mainnet/lnd.log | grep GRPH
I can find some relevant clues like:
2025-01-30 15:24:54.843 [INF] GRPH: Processed channels=56 updates=59 nodes=15 in last 59.823699481s
and then checking with:
lncli getinfo | grep -E 'synced|peers
which outputs"num_peers": 3, "synced_to_chain": true, "synced_to_graph": false,
At the moment, I've been experimenting with pruned blockchains and this outputs a lot of errors (I believe) relating to not being able to verify UTXOs as I have `ignore-historical-gossip-filters set to true.
Any further suggestions on how to better make sure things are happening under the hood when setting up a new node, what to look for in the logs or how to know the verification progress?
originally posted at https://stacker.news/items/869944
-
@ da0b9bc3:4e30a4a9
2025-02-03 06:14:42Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/874266
-
@ a012dc82:6458a70d
2025-02-03 02:42:01In the contemporary world, where the balance between technological advancement and environmental sustainability is increasingly crucial, Marathon Digital Holdings has emerged as a trailblazer in the Bitcoin mining industry. Their latest venture, utilizing methane gas from landfill waste to power Bitcoin mining operations, is not just a technological leap but also a significant stride towards eco-friendly practices in a sector often scrutinized for its environmental impact. This initiative represents a fusion of environmental stewardship with the burgeoning field of cryptocurrency, potentially setting a new standard for energy use in digital currency mining. It's a bold move that could reshape perceptions of the industry, demonstrating that environmental consciousness and technological progress can coexist harmoniously.
Table Of Content
-
The Genesis of the Project
-
The Process and Technology
-
The Broader Impact
-
Conclusion
-
FAQs
The Genesis of the Project
A Partnership for Sustainability
Marathon Digital's collaboration with Nodal Power marks a pivotal moment in the pursuit of sustainable cryptocurrency mining. The 280 kilowatt (kW) pilot project in Utah is more than just a test of feasibility; it's a beacon of innovation in an industry traditionally powered by conventional, often non-renewable, energy sources. This partnership reflects a growing awareness within the crypto mining community about the importance of sustainable practices. It's a forward-thinking approach, blending the expertise of a leading Bitcoin mining company with the innovative energy solutions of a renewable energy firm, setting a precedent for future collaborations in the industry.
Addressing Environmental Concerns
The project's focus on methane gas, a potent greenhouse gas, underscores a proactive approach to environmental stewardship. By targeting methane emissions from landfills, Marathon is addressing a critical environmental issue. Methane is not only a significant contributor to global warming but also represents a wasted resource when emitted into the atmosphere. This initiative is a response to increasing global concerns about climate change and environmental degradation. It's a strategy that aligns with international efforts to reduce greenhouse gas emissions and demonstrates Marathon's commitment to playing a role in the global fight against climate change.
The Process and Technology
Innovative Conversion of Methane to Electricity
The technology behind converting methane to electricity is a cornerstone of this project. The process involves sophisticated systems that capture methane emissions efficiently and convert them into a usable form of energy. This technology is not just a testament to human ingenuity but also a crucial step towards making renewable energy more accessible and practical for industrial applications like Bitcoin mining. The success of this technology could have far-reaching implications, potentially revolutionizing how we think about waste management and energy production.
A Step Towards Green Bitcoin Mining
Marathon's initiative is a significant leap in the journey towards green Bitcoin mining. It's a project that challenges the status quo, proving that renewable energy can be a viable alternative to traditional power sources in the energy-intensive process of mining cryptocurrencies. This approach could inspire a wave of innovation in the sector, encouraging other companies to explore renewable energy options. The project is not just about reducing the environmental footprint of Bitcoin mining; it's about reimagining the future of energy use in the digital age.
The Broader Impact
Potential for Industry-Wide Change
The implications of Marathon's project extend far beyond its immediate environmental benefits. It has the potential to catalyze a paradigm shift in the cryptocurrency mining industry. If successful, this project could serve as a model for other companies, demonstrating the practicality and benefits of sustainable mining practices. It could inspire a wave of innovation, leading to more widespread adoption of renewable energy sources in the industry, and potentially, a redefinition of what it means to be a responsible player in the digital currency space.
Environmental and Economic Benefits
The project is not just an environmental initiative; it's also an economically strategic move. By tapping into methane from landfills, Marathon could significantly reduce its operational costs. This approach provides a dual benefit: it mitigates the environmental impact of Bitcoin mining and offers a potentially more cost-effective energy solution. This economic incentive could be a key driver in encouraging wider adoption of similar practices across the industry, leading to a more sustainable and economically viable future for cryptocurrency mining.
Conclusion
Marathon Digital's pilot project in Utah is more than just an experiment in sustainable Bitcoin mining; it's a visionary step towards a new era in the industry. By harnessing methane gas from landfills to power their operations, Marathon is not only setting a new benchmark for environmental responsibility but also showcasing the untapped potential of renewable energy in reducing the carbon footprint of cryptocurrency mining. This bold experiment is a beacon of hope and innovation, suggesting a future where technological advancement and environmental sustainability are not mutually exclusive but are instead intertwined elements of a more responsible and forward-thinking industry.
FAQs
What is Marathon Digital's new project about? Marathon Digital has launched a pilot project in Utah, using methane gas from landfill waste to power Bitcoin mining operations.
Why is using methane for Bitcoin mining significant? Methane is a potent greenhouse gas, and using it for mining reduces environmental impact and utilizes a renewable energy source.
Who is Marathon Digital partnering with for this project? Marathon Digital has partnered with Nodal Power, a firm specializing in renewable energy assets.
What are the potential benefits of this project? The project aims to reduce greenhouse gas emissions, lower energy costs, and set a precedent for sustainable practices in cryptocurrency mining.
How does this project impact the Bitcoin mining industry? Marathon's initiative could inspire other companies to adopt renewable energy sources, potentially leading to a more sustainable and economically viable mining industry.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 3b7fc823:e194354f
2025-02-03 02:19:03At-Risk Groups Are Facing A Battle For Their Rights
Privacy. It’s a word we often take for granted, scrolling through our phones and sharing photos without a second thought. But for certain groups—those at risk due to their identities, beliefs, or circumstances—privacy isn’t just a luxury; it’s a lifeline. In today’s world, where governments, corporations, and even our own social media accounts seem to have a vested interest in collecting and selling our data, the fight for privacy has never been more crucial.
Privacy is not a buzzword but a fundamental human right. We can do more to protect those who need it most.
Privacy As A Human Right
The concept of privacy is deeply rooted in our basic human rights. It’s not just about keeping your medical records confidential or hiding your bank statements; it’s about the right to control what others can know about you. For individuals who identify as LGBTQ+, immigrants, journalists, or political dissidents, this right is even more fragile.
Recently, we’ve seen a rise in policies that seem designed to strip away these protections. From the Trump administration’s transgender ban on military service and passport changes to the targeting of journalists and activists, the message is clear: certain groups are considered fair game for scrutiny and control.
These actions are about erasing the autonomy of individuals to live their lives without fear of retribution or discrimination. Privacy isn’t just a feel-good concept; it’s the cornerstone of a individuals liberty. We must ensure that no one’s rights can be arbitrarily taken away, especially the right to privacy.
The Attack On Vulnerable Groups
The targeting of at-risk groups has reached a fever pitch in recent months:
- Transgender Rights Under Fire
The Trump administration has issued a sweeping executive order that effectively erased recognition of transgender individuals’ rights. This included changes to passport policies that required individuals to declare their gender at birth, making it nearly impossible for trans individuals to update their documents without facing extreme scrutiny or even denial.
These actions don’t just impact transgender people; they send a chilling message to the entire LGBTQ+ community.
- Free Speech And Political Dissent
Trump’s Free Speech Executive Order, aimed to protect citizens’ right to express their beliefs. However, critics argue it was more about silencing dissenters. Journalists, activists, and even private citizens have faced increasing pressure from government officials to either comply with certain views or face professional consequences.
“Free speech is a double-edged sword,” noted one legal expert. “When the government uses it as a tool to marginalize certain groups, it becomes a weapon rather than a shield.”
-
Media And Press Freedom
Trump’s ongoing battles with major media outlets are well-documented. From labeling reporters as “fake news” to pushing for laws that would limit press freedom, the administration has made it clear that journalists and news organizations are not above scrutiny. For independent journalists and investigative reporters, this poses a significant threat to their work and safety. -
Immigrant Rights And Discrimination
The Trump administration’s harsh immigration policies have had a devastating impact on vulnerable communities. From family separations to the expansion of surveillance in immigrant-heavy areas, these actions have left many feeling exposed and unsafe. Immigrants, particularly those from Latin America and the Middle East, are increasingly targeted for their perceived alignments with political rhetoric.
The Consequences Of Losing Privacy
When privacy is stripped away, it doesn’t just affect individuals—it affects entire communities. For transgender individuals, the fear of being “outted” online or facing discrimination at work is a daily reality. For journalists, the threat of government retribution can lead to self-censorship and an inability to hold power accountable. For immigrants, the risk of deportation or surveillance means constant vigilance—and often, no recourse.
These consequences are not just personal; they’re systemic. When certain groups are deemed unworthy of protection, it sets a dangerous precedent for what’s allowed in society. It sends the message that some lives matter less than others, and that the government can act with impunity. If you are not in one of these currently impacted groups just give it time and eventually they will come for you too.
The Fight For Privacy: What We Can Do
The good news is that we don’t have to sit idly by while this happens. There are steps we can take to fight for privacy as a fundamental right. Here’s how:
-
Advocate For Stronger Protections
Governments at all levels need to pass and enforce laws that protect privacy, especially for vulnerable groups. This includes everything from data protection legislation to anti-discrimination policies. -
Support Independent Journalism
Journalists are on the front lines of this fight, uncovering corruption and holding power accountable. Support independent media outlets and platforms that prioritize transparency and press freedom. -
Educate And Empower
Communities under threat need resources to protect themselves. This includes education on their rights, know how and tools to secure their data, and access to legal support when needed. -
Use Your Voice
Speak out against policies that erode privacy and target vulnerable groups. Use your actions to protect yourself and others. -
Demand Accountability
When governments overreach, they need to be held accountable. Fight for yours and others rights.
Privacy Is A Fight Worth Winning
Privacy isn’t just about convenience or comfort—it’s about freedom, autonomy, and the right to live without fear of arbitrary control. For at-risk groups, this is not just a luxury; it’s a lifeline. As we move forward in this uncertain era, let’s remember that the fight for privacy is not over— it’s just beginning.
We all have a role to play in protecting those who need it most. So let’s get to work.
- Transgender Rights Under Fire
-
@ e31e84c4:77bbabc0
2025-01-30 10:31:49Censorship today has evolved into something far more insidious than its traditional form. No longer limited to overt bans or government blacklists, it now thrives in subtler, more pervasive ways—hidden behind corporate policies, social algorithms, and political pressures. This new form of censorship cloaks itself in the language of promoting online safety, stopping misinformation, and defending democracy, but its effect is no less stifling.
Community guidelines of big tech platforms have become the weapon of choice to shape the boundaries of online discourse. In fact, online censorship is now a growing industry that receives funding and support from both government departments and the private sector. The National Science Foundation, for example, awarded over $40 million worth of grants for the development of AI tools "to counter misinformation online" and "advance state-of-the-art misinformation research"—a long-winded way of saying AI-powered censorship tools.
As with most evils in this world, centralization is the plank on which censorship rests. The centralized nature of big tech platforms not only gives them access to treasure troves of our personal data, but programs like PRISM, also give the government backdoor access to it. Just as with central banks, platforms like YouTube and Netflix become choke points that can be squeezed at will to enforce certain narratives.
Thankfully, since the invention of Bitcoin, we have not only had hard money that cannot be debased by any central bank but, more importantly, the world was bequeathed with a blueprint for building decentralized products and services at scale. For example, it wouldn't be too far-fetched to say that the inspiration behind Nostr's design was Bitcoin, even with the apparent differences in the architectures of the two. A decentralized, censorship-resistant communications protocol was inevitable after the emergence of censorship-resistant money.
Bitcoin and Nostr are the foundation of a decentralized creator economy that is not captured by big tech and their advertisers. Despite all these great strides towards pragmatically securing free speech online, the censorship industrial complex still has a chokehold on the film industry. While social media platforms actively suppress information they don't like, the film industry disguises propaganda as entertainment to achieve the same goal.
Historically speaking, the arts, especially the film industry, have been a very important and effective tool in shaping public perception and controlling the flow of information. During World War II, the Nazis produced numerous films that were part of a broader strategy by Joseph Goebbels, the Minister of Propaganda, to manipulate public opinion in favor of the Nazi regime. They were designed to instill loyalty, promote anti-Semitism, and glorify the ideals of the Third Reich. Unfortunately, these tactics were not confined to that period in history and are still in use today.
Since 1948, the Pentagon's Entertainment Liaison Office has played a significant role in shaping Hollywood productions, with the Central Intelligence Agency (CIA) subsequently establishing a similar office in 1996. Initially perceived as passive advisors, these agencies have exerted influence by requesting script changes in exchange for access to resources like equipment and filming locations. The Department of Defense (DoD) has backed over 800 feature films, including major franchises like Transformers, Top Gun, The Terminator, and Iron Man. On the small screen, over 1,100 TV titles like Army Wives, NCIS, Homeland, and Flight 93 have received Pentagon support since 2001.
Journalist David Robb, in his book Operation Hollywood: How the Pentagon Shapes and Censors the Movies, wrote:
"The Pentagon even uses movies and TV shows to target children as future recruits, as it did with two of the most popular kids' TV shows of all time, Lassie and The Mickey Mouse Club. Episodes of both shows were rewritten at the Pentagon's insistence to make the armed forces more attractive to children."
It is undeniably evident that for a very long time, the national security state has shaped thousands of hours of our viewing experience. The portrayal of war in these productions often paints a sanitized picture that masks the complexities of combat, the ambiguities of victory, and the political machinations behind military actions. Are we seeing the truth of war, or a carefully crafted narrative that serves a larger agenda? Are the horrors of war being normalized as necessary evils to rally public support for future conflicts? One can only wonder.
Time would fail me if we had to discuss how this same relationship extends to the news media, as exemplified by the dismissal of Phil Donahue from MSNBC for having guests on his show who were critical of the Iraq War. Or how Disney spent almost $1 billion in 2023 on movies that were flops, as a result of their lack of substance due to their woke themes. Let's not even begin to talk about the nearly $2 billion the pharmaceutical industry spent on television ads in the first quarter of 2023 alone. Perhaps that's the going rate for a shot at shaping consumer demand and influencing news coverage of the industry. The larger point is that from both the big screen and the small screen, we are constantly bombarded with propaganda and carefully curated content that not only influences our buying decisions but our worldviews as well. This pervasive influence operates on a deeper level than we might realize, as we tend to perceive the world through cultural lenses pre-defined for us. Those who shape these fundamental worldviews wield immense power, subtly guiding our thoughts and actions. The genius of this influence lies in its invisibility - we often misinterpret these externally crafted ideas for our own independent thoughts.
As noted earlier, the film industry's centralized structure has led to a troubling prioritization of political narratives over audience needs and factual accuracy. To disrupt this status quo, a new breed of independent filmmakers and streaming platforms is required. These should embrace political neutrality and leverage emerging technologies like Bitcoin. The latter would be critical in revolutionizing content monetization, thus freeing creators from the grip of studio executives and other political influences that are used to censoring content they dislike. One such platform is IndeeHub.
IndeeHub is a streaming platform that aims to empower independent filmmakers by providing a fair and sustainable ecosystem for content creation and distribution. Not only could this potentially break Hollywood's monopoly, but it is an essential step in the creation of unbiased quality films. Despite launching early last year and still being in beta, the platform was able to score a major win when it was selected as the main streaming partner for the second edition of the Bitcoin Film Fest, which was held in Warsaw in April of this year.
IndeeHub's business model redefines film industry economics. By integrating Lightning network payments, it creates a true free market for content creators. Filmmakers earn per second of viewership, with revenue split among anyone on their cap table. Bad content immediately gets punished by lack of views and therefore lower revenue for the filmmaker, with great content being rewarded with more eyeballs and ultimately higher revenue. Just like Nostr, this serves as the perfect yardstick for measuring the reception by audiences of a particular production. This paradigm shift aligns incentives with audience engagement, potentially transforming both artistic creation and consumption.
In an interview the Ceo and founder of IndeeHub, Zack Mahoney, when quizzed on where he envisions IndeeHub said;
“Our goal is to be the best solution for filmmakers from concept to exhibition. I would love to see films not only exhibiting on this platform but beginning their lifecycle here as well. I envision a platform where filmmakers can collaborate, take risks, hone their craft, exhibit their work, and ultimately thrive in this industry.”
While many of the problems of the film industry aren't going to be solved overnight by one platform, IndeeHub is clearly on the right path to become the one-stop shop for financing films as well as collaboration and distribution. It's a truly innovative platform outside the control of the censors and the gatekeepers, beholden only to its mission. Zack went on to emphasize a very important point when he said:
"Storytelling is a cornerstone of the human experience and a fundamental process by which consciousness evolves,""Storytelling is a cornerstone of the human experience and a fundamental process by which consciousness evolves,"
a sentiment I concur with wholeheartedly. If those controlling the most influential storytelling medium are shaping society toward a dystopian reality, then what value does freedom money hold in a world where minds remain captive?
Just as Bitcoin is a solution that removed trusted third parties from transactions and created a digital peer-to-peer cash system, IndeeHub also aims to be a solution that creates an alternative to the centralized streaming platforms that are under the thumb of advertisers and government agencies. By integrating the hardest money ever known to man, Bitcoin, it's saving the film industry from collapsing under its own weight while unleashing creativity on an unimaginable scale. It's time to build the world we want to see.
Uncensoring Art was Written By Kudzai Kutukwa. If you enjoyed this article then support his writing, directly, by donating to his lightning wallet: muggyarch11@walletofsatoshi.com**
-
@ 1af54955:31eed960
2025-01-30 08:08:22Persian rugs are much more than just floor coverings—they are timeless pieces of art that bring beauty, warmth, and cultural richness into homes across the globe. Known for their intricate designs, superior craftsmanship, and lasting value, these rugs have been treasured for centuries. Whether you're an interior design enthusiast or a first-time buyer, understanding the advantages of Persian rugs can help you appreciate why they remain a staple in homes and collections worldwide.
1. Durability and Longevity
One of the standout advantages of Persian rugs is their incredible durability. Hand-knotted with precision and care, these rugs are made from high-quality materials like wool, silk, and cotton. Wool, in particular, is known for its natural resilience, making Persian rugs resistant to wear and tear, even in high-traffic areas. Unlike mass-produced rugs, which can lose their appeal over time, a well-crafted Persian rug can last for generations when properly maintained. In fact, many Persian rugs have survived for hundreds of years, maintaining their beauty and structure. This longevity makes them an excellent investment, as a good-quality Persian rug only grows more valuable with age. Unlike synthetic carpets that may need replacing every few years, a Persian rug, when taken care of, can become a cherished family heirloom.
2. Unique Artistic Design
Each Persian rug is a masterpiece of artistry. With intricate patterns, vibrant colors, and symbolic designs, these rugs are often compared to fine art because of the level of skill involved in their creation. The designs can vary widely depending on the region of origin, the weaver's personal style, and the materials used. Whether you're drawn to the geometric patterns of Shiraz rugs or the floral motifs of Tabriz, there’s a design to suit every taste. Beyond the aesthetic appeal, Persian rugs also hold cultural significance. The patterns and motifs often have symbolic meanings—representing everything from nature to spiritual beliefs. When you invest in a Persian rug, you're not just buying a piece of decor ; you're embracing centuries of tradition and storytelling woven into every knot.
3. Value and Investment
Persian rugs are more than just beautiful; they are also an investment. Many high-quality Persian rugs increase in value over time, particularly rare pieces made with exceptional materials or unique designs. Collectors value rugs from specific regions or those that feature intricate craftsmanship, and these pieces can appreciate significantly in value. Buying a Persian rug can be seen as purchasing a valuable asset, especially if you select a rug from a reputable source or a renowned weaving center. Unlike furniture or modern decor, a well-maintained Persian rug can actually become more valuable as it ages, making it a wise long-term investment.
4. Versatility in Interior Design
One of the most attractive qualities of Persian rugs is their versatility. Whether your home features modern minimalism, classic elegance, or rustic charm, a Persian rug can seamlessly integrate into any design style. Its rich textures and colors can anchor a room, adding warmth and character to any space. From living rooms to bedrooms, from formal dining rooms to cozy corners, Persian rugs can elevate the atmosphere of any room. Their ability to blend with diverse interior aesthetics while maintaining their individuality makes them an enduring choice for homeowners and decorators alike.
5. Natural Materials and Sustainability
Many Persian rugs are made from natural materials like wool, silk, and cotton, which are not only luxurious but also sustainable. Wool, for instance, is a renewable resource that’s biodegradable, making it an eco-friendly alternative to synthetic fibers. The natural dyes used in Persian rugs are also derived from plants and minerals, ensuring that these rugs have a minimal environmental footprint.\ Unlike machine made rugs made from synthetic materials that may contribute to microplastics pollution, Persian rugs made from natural fibers are both luxurious and environmentally conscious, allowing you to enjoy the beauty of your home while being mindful of sustainability. Unlike machine made rugs made from synthetic materials that may contribute to microplastics pollution, Persian rugs made from natural fibers are both luxurious and environmentally conscious, allowing you to enjoy the beauty of your home while being mindful of sustainability.
\ 6. Comfort and Warmth\ \ In addition to their aesthetic and investment value, Persian rugs offer practical benefits, particularly when it comes to comfort and warmth. The thick pile of a Persian rug provides a soft surface to walk on, making it a delight to touch. Whether you're walking barefoot or sitting on the floor, the plush texture adds comfort to your space.Moreover, Persian rugs act as natural insulators. They help trap warmth, making rooms feel cozier and more comfortable, particularly during colder months. In this way, a Persian rug is not just a decorative addition to your home, but a functional one as well, contributing to your home’s overall comfort and energy efficiency.
7. Conclusion
Persian rugs are more than just beautiful pieces of floor decor—they’re investments in artistry, culture, and comfort. Their durability, unique designs, and potential for long-term value make them an enduring choice for homeowners looking to add elegance and warmth to their spaces. Whether you’re a first-time buyer or a seasoned collector, the advantages of Persian rugs are undeniable. If you're considering adding one to your home, take the time to explore the wide range of styles and designs available. A Persian rug could be the centerpiece of your home, offering beauty, comfort, and a piece of history that will last for generations.
-
@ dbf377b7:37ee9e19
2025-01-29 16:53:43Ross William Ulbricht's Laptop
This laptop belonged to Ross William Ulbricht, known online as Dread Pirate Roberts, who ran the darknet market Silk Road from 2011 to 2013.
The Silk Road was a digital marketplace for buying and selling illicit goods and services. Accessible only through the Tor network, it generated over $183 million in sales during its operation, with Ulbricht earning more than $13 million in Bitcoin commissions.
🔍 The investigation began on January 27, 2011, when a tax agent discovered a forum post discussing the Silk Road. Eight months later, the same user posted a job listing investigators linked to Ulbricht's email address.
Image placed on original Silk Road after the seizure of property by the FBI
📂 Through digital forensics and network tracking, authorities identified Ulbricht as the operator. On October 1, 2013, FBI agents arrested him in a San Francisco library and seized his laptop, which contained evidence. In 2015, he was convicted and sentenced to life in prison without parole for charges including conspiracy to traffic narcotics, money laundering, and computer hacking.
Impact of the seizure on the USD/Bitcoin exchange rate
💻 On November 3, 2020, U.S. authorities seized over $1 billion worth of Bitcoin from a Silk Road-linked wallet, making it one of the largest cryptocurrency seizures in history.
🏆 On January 21, 2025, U.S. President Donald Trump granted Ulbricht a full and unconditional pardon.
Bitcoin #SilkRoad #FreeRoss
-
@ ae6ce958:d0f02c7d
2025-02-02 23:56:18Authors: DamageBDD Research Team
Date: February 2025Abstract
This paper presents a formal multidimensional analysis of the profitability and systemic impact of operating a DamageBDD node, considering two distinct yet synergistic roles: (1) BDD Maintainer, responsible for writing and verifying behavioral-driven development (BDD) test cases, and (2) Node Runner, responsible for hosting, validating, and distributing DamageBDD verification data. The study explores the economic viability, systemic benefits, and broader implications for software development efficiency and human potential. We argue that DamageBDD does not merely represent an alternative testing infrastructure but also serves as an incentive structure that unlocks latent human capital through verifiable, high-impact contributions.
1. Introduction
The software industry increasingly relies on automated testing to ensure system reliability and security. However, traditional models of test validation suffer from inefficiencies due to lack of verifiable accountability, reliance on centralized test infrastructure, and difficulty in aligning developer incentives.
DamageBDD introduces a market-driven verification layer that decentralizes and incentivizes test-driven software development. By distributing both verification and governance via a blockchain-based testing economy, DamageBDD enables trustless BDD validation. Two primary participants define this ecosystem:
- BDD Maintainers – Developers and testers who write and maintain test cases to ensure software correctness.
- Node Runners – Operators who maintain DamageBDD nodes to execute, verify, and immutably record test results.
This study examines the profitability, scalability, and systemic value of each role while exploring how this model unlocks testing infrastructure and human potential in a way that traditional systems do not.
2. Multidimensional Profitability Analysis
We evaluate profitability using a multidimensional framework across the following key dimensions:
- Economic Profitability (direct financial rewards)
- Computational Efficiency (resource costs and hardware scalability)
- Network Effects (interoperability and systemic adoption)
- Human Capital Optimization (learning curve, skill growth, and long-term impact)
2.1 Economic Profitability
BDD Maintainer
BDD Maintainers earn sats for verifiable test contributions. Their work is directly compensated based on the number of successful test verifications executed on the DamageBDD network. The economic incentives align with:
- Quality over Quantity – High-quality, reusable BDD tests accrue more long-term revenue.
- Compounding Value – A well-maintained test suite continues to generate revenue as projects grow.
Node Runner
Node Runners monetize test execution and validation services by processing and storing test results. Profitability derives from:
- Transaction Fees – Runners earn sats per executed and verified test case.
- Reputation Score – Higher-ranked nodes process more verifications, generating greater earnings.
- Liquidity Pools – Nodes can facilitate instant Lightning Network payouts for successful tests, further increasing earnings via transaction flow.
2.2 Computational Efficiency
While mining Bitcoin is an energy-intensive, zero-sum competition, DamageBDD nodes optimize for computational efficiency rather than brute-force expenditure.
- BDD Maintainer Efficiency – Writing test cases has near-zero energy cost beyond human intellectual effort.
- Node Runner Efficiency – Instead of wasting cycles on proof-of-work, DamageBDD nodes run lightweight BDD verifications, leveraging Erlang for extreme concurrency and low-resource execution.
A comparative analysis shows that operating a DamageBDD node delivers higher computational efficiency per satoshi earned than Bitcoin mining.
2.3 Network Effects and Synergies
A crucial factor in DamageBDD’s economic model is network value accumulation. Unlike mining, which diminishes profitability over time, DamageBDD’s network increases in value as adoption grows.
BDD Maintainer Synergies
- The more tests written and verified on-chain, the greater the trust in software systems.
- Open-source contributors and enterprise teams benefit from immutable test history, reducing redundant labor.
Node Runner Synergies
- The more tests executed, the more valuable the verification layer becomes.
- Nodes reinforce the integrity of test results, leading to network-wide adoption in high-assurance industries (e.g., finance, healthcare, AI safety).
2.4 Human Capital Optimization: Unlocking Developer Potential
Traditional software testing is often seen as a cost center, leading to its underutilization. DamageBDD flips this paradigm by treating testing as a profit center—rewarding testers not just for finding bugs but for preventing catastrophic software failures.
Cognitive and Economic Impact
- Skill Growth – Developers naturally improve software design by maintaining structured BDD tests.
- Career Upskilling – High-ranking BDD Maintainers become indispensable assets in software teams.
- Economic Independence – Unlike traditional employment, DamageBDD allows maintainers to earn directly from open-source contributions.
The system gamifies quality assurance, transforming what was once a tedious process into a competitive and rewarding marketplace.
3. Conclusion: A New Paradigm for Profitable Verification
DamageBDD redefines software testing as a financially viable, decentralized economy. The combination of BDD Maintainers and Node Runners creates a self-reinforcing ecosystem where:
- Maintainers ensure software correctness while earning sats
- Node Runners validate and secure test results, generating a sustainable revenue stream
- The network grows in value as more applications integrate DamageBDD verification
Key Takeaways
- DamageBDD is superior to traditional testing models due to its decentralized incentives.
- It provides better computational efficiency than Bitcoin mining while still operating on a proof-of-work foundation (verifiable contributions).
- It unlocks human potential by turning software verification into a career pathway rather than a sunk cost.
The profitability of DamageBDD Nodes extends beyond mere financial returns—it establishes a new economic and intellectual order for software reliability.
-
@ 04c195f1:3329a1da
2025-01-29 08:16:38Over the past week, Sweden has been rocked by an unprecedented wave of domestic terrorism. Bombings, shootings, and gang-related violence have escalated to a level that even the most hardened observers find shocking. The Swedish people are waking up—sometimes quite literally—to explosions outside their homes, their neighborhoods resembling conflict zones rather than the peaceful Scandinavian society they once knew.
A Month of Terror
Since the beginning of the year, Sweden has witnessed at least 32 bombings, averaging more than one explosion per day. In a sign of how routine this has become, state media outlet SVT now maintains a "live ticker" tracking the growing number of explosions—reminiscent of the death and infection tickers used during the COVID-19 pandemic. The attacks have struck cities large and small—Stockholm, Uppsala, Helsingborg, and Örebro among them. Some explosions have targeted residential buildings, even bedrooms where children sleep. Others have been part of gang warfare, retaliation for unpaid debts, or attempts to intimidate rivals.
Just in the past 24 hours, five separate explosions have rocked Stockholm. A grenade attack forced a school into lockdown, while an explosion in Årstaberg destroyed the entrance of an apartment building. This is not the first time—and it certainly will not be the last.
Sweden’s Political Paralysis
Despite this unprecedented security crisis, the Swedish government refuses to take meaningful action. Prime Minister Ulf Kristersson recently acknowledged the situation, stating:
“The criminal gangs show total disregard for the public. This is domestic terrorism that we must fight with the full force of society. The police are working intensively to prevent and stop acts of violence. The police can now conduct preventive wiretapping, and security zones are in place. These are important tools. But more is needed.”
However, this is yet another attempt to address symptoms rather than causes—and it will fail to even achieve that. Last night, I participated in a livestream where former MP Jeff Ahl likened the government's approach to trying to stop arterial bleeding with a band-aid. A fitting description indeed.
Meanwhile, rather than declaring a national emergency, Sweden’s political elite have prioritized ideological pet projects. Minister Paulina Brandberg was busy opening a new DEI (Diversity, Equity, Inclusion) office at Chalmers University while bombs tore through Stockholm’s suburbs. Justice Minister Gunnar Strömmer held a crisis meeting with the police last week, only to suggest that the government might be able to stop the gangs in eight years—an admission of failure if ever there was one.
The Root of the Crisis
The media and political establishment refuse to address the root cause of this descent into chaos: mass immigration and the importation of criminal clan networks. The reality is undeniable:
-
Areas like Rinkeby and Botkyrka—once Swedish working-class neighborhoods—now have overwhelming non-Swedish majorities, with Rinkeby exceeding 95% and Botkyrka over 60%. These are just two examples of the hundreds of neighborhoods across Sweden where Swedes are now a minority, where criminal clans thrive, and where gangs have effectively taken control—not just of the streets but also of local commerce and entire business districts.
-
Organized crime syndicates, many with roots in the Middle East and North Africa, exert dominance over these areas, operating parallel societies with little to no interference from Swedish authorities.
-
Police estimate that 30,000 individuals are active in criminal gangs—when factoring in extended networks, the number may be in the hundreds of thousands.
-
Most of these people should never have been allowed into Sweden in the first place.
“We’re Used to It”
Perhaps the most chilling aspect of this crisis is the growing resignation among Swedes. After a bombing in Upplands-Bro last night, one resident summed it up:
“No, I’m not worried. I’m used to it.”
This normalization of terrorism is a direct consequence of decades of political negligence, ideological blindness, and a refusal to admit policy failure. Sweden’s leaders have deliberately ignored the warnings. They have allowed the chaos to fester. And now, they pretend to be shocked as the country spirals deeper into lawlessness.
What Comes Next?
Let’s be clear: these bombings will not stop. If history is any guide, Sweden’s authorities will issue statements, hold meetings, and maybe even arrest a few foot soldiers. But the broader networks, the root causes, and the state’s unwillingness to reclaim control over the country remain unchanged.
The question is not whether Sweden can recover. The question is whether Swedes are willing to demand real change. And if they do not, how much further can this country fall before it collapses altogether?
I will continue to report on this crisis—because while mainstream media acknowledges the violence, they refuse to confront its root cause. If we do not acknowledge the failure of multiculturalism and dismantle this ideological experiment, we will never resolve this crisis.
For near-daily updates, follow me on X, Telegram, and Nostr, where I report on these events as they unfold. Stay informed, stay vigilant, and if you value my work, consider subscribing and sharing this newsletter.
■
-
-
@ 5579d5c0:db104ded
2025-02-03 23:32:10Most people think that building muscle is out of reach.
What if I told you 'You can get all your exercise done in just 60 minutes a week', if you train efficiently.
With just two 30-minute sessions, you can build muscle, improve metabolic health, and transform your physique.
What is resistance training?
Resistance training, also known as strength training, involves working against an external force to improve muscle strength, endurance, and size. This can be done using:
→ Free weights (barbells, dumbbells, kettlebells)
→ Weight machines
→ Resistance bands
→ Bodyweight exercises
Strength training isn’t just about aesthetics, it’s essential for long-term health and metabolic function.
Why it’s essential for metabolic and overall health
Muscle is metabolically active tissue. The more muscle you have, the more energy your body burns at rest, albeit a quite small amount.
→ Maintains and builds muscle: Muscle mass is critical as you age, reducing the risk of fractures and falls.
→ Boosts metabolism: While the increase is small, more muscle means a higher resting energy expenditure, creating a large sink for energy stores.
→ Hormone & energy optimisation: It lowers inflammation, reduces visceral fat (not good), and helps muscles use sugar and fat more efficiently, restoring Leptin & Insulin sensitivity.
→ Mitochondrial function: Increases mitochondrial number, efficiency, which improves energy production and reduces oxidative stress.
How to build muscle in minimal time
You can build muscle with just two 30-minute sessions a week.
Yes, really.
One or two full-body sessions, hitting all major muscle groups, is enough if done properly.
It all comes from this paper.
"We recommend that appreciably the same muscular strength and endurance adaptations can be attained by performing a single set of \~8-12 repetitions to momentary muscular failure, at a repetition duration that maintains muscular tension throughout the entire range of motion, for most major muscle groups once or twice each week. All resistance types (e.g. free-weights, resistance machines, bodyweight, etc.) show potential for increases in strength, with no significant difference between them, although resistance machines appear to pose a lower risk of injury."
It doesn’t matter if you use free weights, machines, or bodyweight exercises.
For what its worth, I think using weights is easier.
What matters is how you train.
You don’t need heavy weights to build muscle, just focus on maintaining tension throughout each movement.
→ Slow, controlled reps: Move 5 seconds up, 5 seconds down without using momentum.
→ High effort, low volume: One set to momentary failure is enough per muscle group.
→ Minimal rest: Keep rest periods short to maximise growth hormone and testosterone release.
→ Allow recovery: Train hard, then rest 1–2 days between sessions for optimal muscle growth. Do not get tempted to over train.
Initially this will take a bit of figuring out with regard to what weight works for you.
The key to growth → Progressive overload
In the first few weeks you will build muscle easily, but will eventually plateau. You then must progressively challenge your body. Here’s what to do:
→ Increase the reps first.
→ Then increase weight by 5-10%.
→ For bodyweight training: Add reps, use a weighted vest, or move to harder variations (e.g., push-ups → weighted push-ups → ring push-ups).
Real life examples
Dr Ted Naiman is 50 and uses a simple bodyweight routine going to failure on each movement a few times a week.
His routine → Pull Ups/Push Ups/L-Sits/Handstand Push Ups/Pistol Squats/Supermans
P.D Mangan is 70 and trains full body twice a week, using weights.
His routine → Deadlifts/Chin Ups/Seated row/Lateral Raise/Overhead Press/Chest Press/Dips/Barbell Shrug/Hammer Curl/Leg Press/Sprint Cycle 20 Secs.
Simplicity is beautiful.
You don’t need time consuming regimes.
Two short, intense sessions a week are enough.
-
Keep your reps slow and controlled.
-
Rest 1–2 days between sessions for muscle growth and recovery.
-
Once you hit a plateau focus on progressive overload.
-
Stick with it, consistency beats perfection every time.
With the right approach, 60 minutes a week is all you need to build muscle, lose fat, and live longer, while leaving time for the rest of your life.
-Chris
If you want a simple routine to fit effortlessly into your life.
Book a free call here: https://calendly.com/hello-chrispatrick
Follow me on Nostr: https://primal.net/chrispatrick or npub124uatsq6pv74trzwvt34y4sx2z0uflhse7tkrv0pl69e8kcsfhkse30zsu
-
-
@ 3b7fc823:e194354f
2025-02-02 22:55:32The Secret to Staying Private in the Digital Wild West: A Guide to Using Encryption
You’re scrolling through social media, and suddenly you realize your phone’s been tracking your location and displaying it on your profile for months. You’re not even sure how that happened. Or maybe you’ve noticed that every time you shop online, the item you looked for follows you around with ads wherever you go. Sound familiar? Yeah, welcome to the digital world—where your data is basically a free buffet for anyone who knows how to ask.
But here’s the thing: you don’t have to sit back and take it. Encryption is like the secret weapon that lets you lock up your data and keep those prying eyes out. It’s not just for hackers or spies—it’s for regular people who want to take control of their privacy in a world that’s increasingly looking like a reality show where everyone’s a contestant.
What Is Encryption, and Why Should You Care?
Encryption is like a secure box that only you can open. When you use encryption, your data is scrambled in a way that’s hard for anyone else to read, even if they try. Think of it as putting on a metaphorical cloak that makes your online activity invisible to just about everyone except the people you want to see it.
For example, when you browse the internet, your connection is often not encrypted by default. That’s why websites start with “https” to indicate a secure connection—it’s saying, “Hey, we’re using encryption here!” Without that little green padlock, anyone on the same WiFi could potentially spy on what you’re doing.
So, encryption isn’t just for tech geeks or government agencies. It’s for everyone who wants to protect their data from being sold, stolen, or misused without their consent. And guess what? You’re already using it without realizing it. Every time you use a password-protected account or send an encrypted message, you’re reaping the benefits of encryption.
The Privacy Advantages of Encryption for Regular People
Let’s break down why encryption is your best friend when it comes to privacy:
-
Financial Transactions
When you pay online or use a banking app, encryption keeps your financial info safe from hackers. It ensures that only the banks and businesses you’re dealing with can access your money—no one else can. -
Online Accounts
Your email, social media, and other accounts often use encryption to protect your login details. That’s why you see those little “lock” icons when you’re logging in. Without encryption, someone could potentially intercept your password and gain unauthorized access to your account. -
Data Breaches
Encryption can often prevent data breaches from being useful. Even if hackers manage to steal your information, the encryption makes it unreadable, so the stolen data is basically worthless to the attackers. -
Location Data
If you’re worried about apps tracking your every move, encryption can help limit how much of that data is accessible. Some apps use encryption to protect location data, making it harder for companies to sell your movements without your consent. -
Privacy Protection
Encryption acts as a layer of protection against invasive technologies. For example, some apps use tracking software that follows you around the internet based on your browsing history. With encryption, these trackers can be blocked or limited, giving you more control over what information is collected about you.
How to Use Encryption Like a Pro
Now that you know why encryption is essential for privacy, let’s talk about how to use it effectively:
-
Use Strong Passwords
Encryption works only if your passwords are strong and unique. Don’t reuse passwords from one account to another, and avoid using easily guessable information like “password123” or your birth year. Use a password manager if you need help keeping track of them. -
Enable HTTPS Everywhere
Install browser extensions like HTTPS Everywhere to automatically encrypt your connections to websites that don’t support encryption by default. This ensures that even if you’re not actively thinking about it, your data is still protected. -
Look for the Lock Icon
Whenever you’re on a website or app, look for the lock icon in the URL bar. Make sure it’s encrypted before you input any personal information. -
Use Encrypted Communication Tools
For private conversations, use apps like Signal or SimpleX, which are designed with encryption in mind. These tools ensure that only the sender and recipient can read your messages, keeping them safe from prying eyes. -
Enable Two-Factor Authentication (2FA)
This isn’t exactly encryption, but it’s a close second. 2FA adds an extra layer of security by requiring you to provide two forms of verification—like your password and a code sent to your phone—to access your account. While not encryption itself, it works alongside encryption to keep your accounts secure. -
Use Encrypted Storage and Backup
When storing sensitive files or data, use encrypted cloud storage or external drives. Tools like BitLocker (for Windows) or AES-256 encryption can protect your files from unauthorized access. -
Stay Updated
Encryption technology is always evolving, so it’s important to keep your software and apps updated. Outdated systems are often easy targets for hackers, leaving you vulnerable to attacks.
Final Thoughts: Your Data Is Your Power
In a world where data is a commodity, encryption is your weapon against the invasive tactics of corporations and hackers alike. It empowers you to control what information you share and protects you from having it used against you. So, whether you’re shopping online, using your favorite apps, or just browsing the web, remember that encryption is there to help you stay private and in control of your own data.
And if you ever feel overwhelmed by all the privacy stuff, just remember this: you’re not alone. Millions of people are fighting for stronger privacy protections every day. So, do your part by using encryption wisely—your data and your privacy are worth it. Let’s make sure no one can take that away from you.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
-
@ 20e7c953:3b8bcb21
2025-01-29 05:53:46Thai Nostriches #Siamstr
Get Ready for Sats N Facts 2025! https://satsnfacts.btc.pub/ 🎉
Join us for a series of exciting events where Bitcoin, Nostr, and local Thai communities come together to innovate, create, and connect! Here’s the breakdown for the 2 main activities:
🛠 Hackathon Overview
https://satsnfacts.btc.pub/hackathon/
This is your opportunity to work alongside leading teams and individuals pushing the boundaries of Bitcoin and Nostr. Whether you're a developer, designer, an educator or a visionary, your contributions can help shape the future of decentralized technology.
What to Expect:
Participate in the sessions by pitching and listening to others ideas or setting up a spot in the schedule. The event is designed to be a “decentralized and collaborative” effort between all participants, with activities being put together with attendees’ feedback.
🤝 Introducing Potential 🇹🇭 Participating Teams
nostr:npub1ejn774qahqmgjsfajawy7634unk88y26yktvwuzp9kfgdeejx9mqdm97a5 – Bitcoin Education and Translations for the Thai community; this would be an ideal occasion in order to connect with international developers in order to curate and share insights within the #Siamstr community
Other Projects that are formally invited are:
nostr:npub1l8ktdyyhwxh4ty5cf48tl72g8ra286nr9klmvqznvk3aqyjkucgsem97q9 – Simplifying Bitcoin payments through intuitive tools
nostr:npub1nsxnfp5690uplzgkslthcvt6269htshqeymhghthenr9wnpt869q57q2hf – Innovating Lightning infrastructure and Bitcoin ATMs
nostr:npub16elg3wf8nffkymylw9kfwecc45j9c30lufrrzx2zf5vmxjlcgkkq3xc6d7 – Enhancing social innovation through Nostr-powered solutions
🎨 Art Exhibition
What else to expect?
A showcase of Bitcoin and Nostr-inspired works by local Thai artists like nostr:npub16unl8g9ucanlpfvp94sdjdv2f4mukm2ywmgrywnrfdgt98qwrrdq0qcn35 nostr:npub14lqzjhfvdc9psgxzznq8xys8pfq8p4fqsvtr6llyzraq90u9m8fqevhssu and nostr:npub1uprlst7kjp0eyfxe4yn7q36gr885mjr9fm6ejfqt8pmdta7stv9s2xvysq - Huaiphueng Project community members.
Celebrate the creativity of our culture with a fusion of tech and art!
📍 Location: Weave Artisan Society, Chiang Mai
📅 Date: 8th - 10th February
🎟 How to Join: Register either as a Lead or Attendee, wait for confirmation from SnF team and get your ticket as a Thai National via Formstr at https://satsnfacts.btc.pub/#tickets
🌟 Why You Should Join:
If you are a Bitcoiner and Ostrich in Thailand the question should be re-formulated to... WHY WOULD YOU NOT JOIN ?
Support and grow the local ecosystem while having a great time with fellow international Bitcoiners.
✨ Mark your calendars and spread the word! Stay tuned through the links or connect with us on Nostr.
Let’s build a stronger Bitcoin & Nostr future at Sats & Facts ✌️
Pictures by nostr:npub15l5mxmljftnnqur8gf2nkjj2yuemqy2kuly7yc29lx7x598svx5s447rgk 👇
เราจะทำอะไรต่อไป ?
AND WE SAID;
ONWARDS
-
@ 8d34bd24:414be32b
2025-02-02 21:31:11This Sunday our pastor had to give a sermon with very little preparation. He was leading an elders’ retreat and one of the elders was supposed to preach in his place. The elder who had prepared a sermon ended up in the hospital, so our pastor had to prep fast. He did a great thing. He preached on a passage, but also used that passage to demonstrate how he studies scripture. It was a great sermon. The passage he preached on reminded me of a time in my past when I learned some important lessons.
Almost 20 years ago, I was leading a high school girls Bible study. They picked out a book about Mary and Martha to study. Initially, I wasn’t thrilled with their choice, but didn’t have a theological problem with it, so I agreed for us to study this book. (I don’t remember the name of the book and all my books burnt up when my house burnt down almost 10 years ago). In the end, I probably got more out of the study than any of the girls because I have a definite tendency to be a Martha. What was Martha’s error? Let’s check out the passage:
Now as they went on their way, Jesus entered a village. And a woman named Martha welcomed him into her house. And she had a sister called Mary, who sat at the Lord’s feet and listened to his teaching. But Martha was distracted with much serving. And she went up to him and said, “Lord, do you not care that my sister has left me to serve alone? Tell her then to help me.” But the Lord answered her, “Martha, Martha, you are anxious and troubled about many things, but one thing is necessary. Mary has chosen the good portion, which will not be taken away from her.” (Luke 10:38-42 ESV)
Jesus visited two sisters who welcomed Him into their home. Mary sat at Jesus’s feet and listened to His teaching. Martha spent her time serving everyone and taking care of everyone’s physical needs.
Is taking care of their home and the needs of their guests a bad thing? Of course not, but is it the best?
To make things much worse, Martha then got upset because her sister Mary wasn’t helping her. She was just sitting there taking in every word that Jesus said. Most of us would think Martha’s sacrifices to take care of everyone was better than Mary’s choice to just sit at Jesus’s feet, but did Martha really choose the better path?
Martha then showed that her heart wasn’t focused right and she wasn’t putting the most important things first. She complained to Jesus about her sister’s failure to help and even commanded her Creator, “Tell her then to help me.” Instead of focusing on the words of Jesus, her frustration led her to command her God to act in the way she desired. She was so busy with cooking, cleaning, and serving, that she missed the most important things — spending time with and listening to her God, who was right there in her house with her. This was an opportunity that shouldn’t be missed due to busyness.
How often do we all do this same thing? How often are busy doing good things and miss the most important things? How often are we busy doing ministry that we forget about the reason for the ministry? I don’t know about you, but this happens to me a lot more often than I would like to admit. My biggest sins are usually not what most people think of as sins. My biggest sins are getting so busy that I leave God out of my life. I am so busy serving God that I forget to follow His leading. I am so busy doing what most people would consider good things, but if God is not part of them, they are not worth much. Because I am focusing on getting things done, worry and stress overtake me harming my health and my relationship with Jesus.
I don’t think this is taking Scripture out of context:
We have come to know and have believed the love which God has for us. God is love, and the one who abides in love abides in God, and God abides in him. (1 John 4:16) {emphasis mine}
Knowing that God is love, read the following passage replacing love with God.
If I speak with the tongues of men and of angels, but do not have love, I have become a noisy gong or a clanging cymbal. If I have the gift of prophecy, and know all mysteries and all knowledge; and if I have all faith, so as to remove mountains, but do not have love, I am nothing. And if I give all my possessions to feed the poor, and if I surrender my body to be burned, but do not have love, it profits me nothing. (1 Corinthians 13:1-3)
If I do not include God in my every action, “it profits me nothing.”
In reality it shouldn’t be allowing God to join me in my works, but me joining God in His works. It should be me listening to God’s word and the leading of the Holy Spirit, looking and seeing what God is doing around me, and me joining in His great works. It should be me allowing God to use me as a tool.
There are times that God speaks clearly and directly to us about what He desires for our lives, but most of the time, He speaks through His word — the Bible. Knowing the Bible helps us to know His will and His eternal plan, so we can follow Him and join Him in His work. Knowing the Bible helps us to differentiate between what is good and what is God’s best. It helps us to prioritize what is really important.
And this I pray, that your love may abound still more and more in real knowledge and all discernment, so that you may approve the things that are excellent, in order to be sincere and blameless until the day of Christ; having been filled with the fruit of righteousness which comes through Jesus Christ, to the glory and praise of God. (Philippians 1:9-11) {emphasis mine}
We can’t obey God, imitate Christ, or follow Him if we refuse to listen and that means spending time in the Bible and time in prayer with Him.
“Listen to Me, you stubborn-minded, Who are far from righteousness.” (Isaiah 46:12)
Come, you children, listen to me; I will teach you the fear of the Lord . (Psalm 34:11)
“Now therefore, O sons, listen to me, For blessed are they who keep my ways. (Proverbs 8:32)
But seek first His kingdom and His righteousness, and all these things will be added to you. (Matthew 6:33)
Our focus on Jesus/God must go beyond knowing Him. It is equally important to obey.
And He [Jesus] said to another, “Follow Me.” But he said, “Lord, permit me first to go and bury my father.” But He said to him, “Allow the dead to bury their own dead; but as for you, go and proclaim everywhere the kingdom of God.” (Luke 9:59-60) [clarification mine]
Once we know what He wants from us, we need to instantly drop what we are doing and follow Him. We can’t put other things ahead of obeying God.
For amazement had seized him and all his companions because of the catch of fish which they had taken; and so also were James and John, sons of Zebedee, who were partners with Simon. And Jesus said to Simon, “Do not fear, from now on you will be catching men.” When they had brought their boats to land, they left everything and followed Him. (Luke 5:9-11) {emphasis mine}
We should be like these apostles, that, after their most successful catch of fish in their entire career as fishermen, “they left everything and followed Him.” We need to let go of what we think is important and obey Him. We need to change our priorities to match God’s priorities.
That may mean we change careers to one that allows more free time for ministry or even going into full time ministry. It may mean letting go on keeping the perfect, clean house, so there is time for ministry, Bible study, or discipling our kids. It may mean changing your habits from watching TV with your family to reading the Bible with your family. For each of us, it will look different, but we need to be like Mary and choose to sit “at the Lord’s feet and listened to his teaching.” We need to be like the apostles who “left everything and followed Him.” We need to choose to put Jesus’s plans before our own. We need to choose to make God’s values our values.
But this is what I commanded them, saying, ‘Obey My voice, and I will be your God, and you will be My people; and you will walk in all the way which I command you, that it may be well with you.’ (Jeremiah 7:23)
Like so many things, it is simple, but it isn’t necessarily easy. We have to change the way we think in order to obey faithfully.
If anyone serves Me, he must follow Me; and where I am, there My servant will be also; if anyone serves Me, the Father will honor him. (John 12:26)
We have to change our priorities to God’s priorities.
Then Jesus said to His disciples, “If anyone wishes to come after Me, he must deny himself, and take up his cross and follow Me. (Matthew 16:24)
We need to seek God, His word, and His presence.
As the deer pants for the water brooks,\ So my soul pants for You, O God.\ My soul thirsts for God, for the living God;\ When shall I come and appear before God? (Psalm 42:1-2)
We need to be in God’s word daily, so we know who God is and what He desires from us.
How can a young man keep his way pure?\ By keeping it according to Your word.\ With all my heart I have sought You;\ Do not let me wander from Your commandments.\ *Your word I have treasured in my heart*,\ That I may not sin against You.\ Blessed are You, O Lord;\ Teach me Your statutes.\ With my lips I have told of\ All the ordinances of Your mouth.\ I have rejoiced in the way of Your testimonies,\ As much as in all riches.\ *I will meditate on Your precepts*\ And regard Your ways.\ I shall delight in Your statutes;\ I shall not forget Your word. (Psalm 119:9-16) {emphasis mine}
We need to read the Bible cover to cover so we know the whole word of God. Once we have read through the Bible multiple times, we need to spend time studying the Bible in more depth, so we can know the details, see how the different parts relate to each other, and grow in our knowledge of God. We need to study the Bible and use this knowledge to guide every decision in life — big and small.
Yet they did not listen or incline their ears, but stiffened their necks in order not to listen or take correction. (Jeremiah 17:23)
Just reading the Bible or sitting in church listening to sermons will not make a difference if we don’t truly listen and internalize God’s word, so we can apply it in our every day life. God knows what is best for us and we will never be truly at peace or have true joy until we are living our lives in the light of God’s word and direction.
My prayer for you and for me is that we will have the heart of Mary rather than the heart of Martha and that we will faithfully seek and follow God all of the days of our lives.
Trust Jesus.
-
@ 5a261a61:2ebd4480
2025-02-02 20:42:37Let’s be real—sticking to anything for 90 days is like trying to herd cats on espresso. You start strong, then life happens: kids, chores, or that one glass of wine that makes you forget foot rubs (#relatable). But here’s the thing: 90-day challenges aren’t about perfection. They’re about bribing your lizard brain with rewards and scaring it straight with punishments.
The Game Plan
First, pick a thing—something that makes you feel like a devoted servant or a slightly frazzled superhero. Daily foot care? Chores with a side of #FLR flair? Cool. Now, break it into chunks: 30 days (survival mode), 60 days (grind phase), and 90 days (victory lap).
Keeping up something for so long is no joke. That's why you need those little checkpoints along the way. Each milestone should feel special—30 days deserves celebration, 60 days something more meaningful, and 90 days? That's your victory dance moment.
Reality check: some days will suck, and you'll want to skip. That's where having everything planned out helps. When your brain is foggy and you're tired, you don't want to be negotiating with yourself about what counts and what doesn't. The hardest part isn't even doing the thing—it's remembering to do it every single day, until it feels wrong NOT to do it.
Why It (Maybe) Works
Three months is long enough for habits to stick, short enough to see the finish line. Plus, tying it to power exchange? Genius. Every foot rub or denied cum becomes a ritual, proof you're leveling up as a sub/human/slightly-messy adult. And let's be honest—nothing fuels devotion like a mix of structure, desperation, and the occasional humiliating punishment.
Current run
My current challenge is to get my wife/godess/object of my insatiable kinky thoughts/partner feet massaged with special cream. It's for making evyrthing soft, help nails and yadayadayada. Basically preping her feet for more instensive worshiping. She doesn't know my hidden agenda and I am not sure if I would really be into it, since I am more into being her devout toy than having foot fetish, but I think it will be all the same if I put myself juuust right. So for my rewards I have planned these? - 30 days: Tiny dopamine hit. (making little photoset of Her feet playing with my hardon… for science.)
- 60 days: Mid-tier flex. (cleaning mushed banana split off Her toes tongue only)
- 90 days: Go nuclear. (a tiny foot spa whirpool because She deserves it, damn it :D and it will create more opportunities for... you know )As for the hhip part of the sugar duo... It was easy having one for my shaving rutine, but here? Not sure and it's bad that I ave started challenge without having them prepared... May be that warrant more punishment?
TL;DR
90-day challenges are the BDSM of self-improvement: consensual, slightly painful, and weirdly addictive. Fail? Reset, adapt, try again. Win? Congrats, you’re now 10% more disciplined and 100% more bumptious on Nostr.
90days #FLR #LostCauseButStillTrying #femdom
-
@ 3c7dc2c5:805642a8
2025-01-28 23:02:07🧠Quote(s) of the week:
'DeepSeek increases my conviction that Bitcoin must be the hurdle rate for capital deployment. AI innovation at this speed and scale will substantially disrupt valuation metrics across industries and is not currently priced in. Those who secure a war chest of Bitcoin will be the long-run winners, picking up distressed assets for pennies on the dollar. Focus on three things: AI, Bitcoin, and energy.' -Matt Cole
Just to elaborate on the above statement by a tweet by Dylan Leclair in 2021:
'Problems: 1. Infinite liquidity doesn’t fix a solvency issue. 2. Inflationary monetary policy can’t work against technological deflation.
Solution: Bitcoin'
To me it is crystal clear: AI deflates, central banks print, and Bitcoin absorbs the chaos. BTC was built for this.
🧡Bitcoin news🧡
On the 21st of January:
➡️MicroStrategy shareholders approved increasing the total number of shares from 330 million to 10.3 billion, paving the way for future fundraising to acquire more Bitcoin (55.8% approval).
➡️Bitcoin's mining difficulty has seen a 24% quarterly increase since August 2024. Saylor: "Bitcoin mining difficulty has reached a new all-time high. Creating BTC requires proof of work and significant energy, making it increasingly expensive over time. Historically, mining difficulty and price are closely linked—a strong signal for bullish momentum."
The Difficulty Regression Model estimates the cost to mine 1 Bitcoin at $33.9K, while Bitcoin trades at ~$104K. This ~3x profitability margin showcases miners' resilience, even as mining difficulty continues to rise in this cycle: Glassnode
➡️'Bitcoin ETFs launched a year ago and now hold over 1,100,000 BTC which is ~5.7% of the current supply.' -Jameson Lopp
➡️The governor of the South African central bank scoffs at the idea of a strategic Bitcoin reserve asking, “Why not a strategic beef reserve? Why not an apple reserve? Why Bitcoin?!”
And at that same panel discussion at the World Economic Forum, we had Brian Amstrong, CEO of Coinbase, praising Bitcoin as the best money in the world. “It’s clear at this point, bitcoin is a better form of money than gold…For a store-of-value, governments must hold bitcoin over time”
➡️Corporate announcements this morning:
- MicroStrategy has bought 11,000 BTC for $1.1 billion, and now holds 461,000 bitcoin. Microstrategy now owns 2.195% of all Bitcoins that will ever exist.
- KULR Technology Group has bought 79 BTC for $8 million, and now holds 510 bitcoin.
- Genius Group has bought 52 BTC for $5 million, and now holds 420 bitcoin.
➡️ETH holders absolutely deserve what is coming. The following text/tweet by Vitalik Buterin just shows you how decentralized Ethereum is.
'No. This is not how this game works. The person deciding the new EF leadership team is me. One of the goals of the ongoing reform is to give the EF a "proper board", but until that happens it's me. If you "keep the pressure on", then you are creating an environment that is actively toxic to top talent. Some of Ethereum's best devs have been messaging me recently, expressing their disgust with the social media environment that people like you are creating. YOU ARE MAKING MY JOB HARDER. And you are decreasing the chance I have any interest whatsoever in doing "what you want".
TLDR: There’s no “me” in Bitcoin. If your "crypto" has a leader, it's not decentralized. Period!
➡️Bitcoin mining in Texas has had a positive impact on the state's power grid and has also potentially saved billions by reducing reliance on expensive and polluting gas-peaking plants, according to the latest report from the Digital Assets Research Institute.
➡️Critical Metals Corp secures up to $500M in convertible note financing to purchase Bitcoin for its Bitcoin treasury strategy. This makes them the first Nasdaq-listed critical minerals company to adopt Bitcoin as a treasury reserve asset.
➡️Legendary investor Ray Dalio says Bitcoin he owns Bitcoin to “reduce the risk of a portfolio”.
On the 22nd of January:
➡️ Finally Ross Ulbricht is free. Pardoning Ross is a promise fulfilled by Trump. Revealing that this was an act of the deep state is next level, calling the people who convicted him "scum." Trump: "The scum that worked to convict him were some of the same lunatics who were involved in the modern-day weaponization of government against me. He was given two life sentences, plus 40 years." Politicians stay Politicians, but I am glad Ross is free.
Ross didn’t sell drugs—he built an anonymous, free, and open platform on Tor called Silk Road.
'Silk Road sold apparel, art, books, collectibles, computer equipment, electronics, herbs, and yeah—drugs. But according to friends who used it, Silk Road was arguably the safest way drugs were ever sold: no street violence, no shady deals, and zero fentanyl. Everything was tested and peer-reviewed, like an Amazon for substances.'
Don’t forget… the DOJ seized 173,991 Bitcoin directly and indirectly from Ross Ulbricht. It was $34 Million when they took it. Today it’s worth ~$18.4 BILLION.
Newcomers to Bitcoin may not understand why old-timers care so much about Ross Ulbricht. Great explanation by Vijay Boyapati:
https://x.com/real_vijay/status/1881869635915809001
On the 23rd of January:
➡️China sold its entire 194K BTC stash, seized from PlusToken, despite official claims of transferring it to the national treasury, according to CryptoQuant CEO Ki Young Ju.
➡️YouTube rival Rumble to launch digital wallet to make Bitcoin and Tether payments. Tether-backed video-sharing platform Rumble to launch Rumble Wallet, which will allow creators to receive tips and subscription payments directly in Bitcoin or Tether.
➡️Ledger co-founder David Balland was kidnapped and a cryptocurrency ransom was demanded. He was rescued by GIGN and multiple suspects are in custody.
https://x.com/0xLouisT/status/1882711063306666287
On the 24th of January:
➡️SAB 121 has been rescinded, allowing banks to custody Bitcoin. Banks can now offer Bitcoin services to hundreds of millions of customers.
The Bitcoin Podcast: But what exactly is SAB 121 and what does its repeal mean for Bitcoin? Eric Weiss breaks it down: "I think that's gonna be a massive, massive catalyst down the road for a US dollar price appreciation of Bitcoin." https://x.com/titcoinpodcast/status/1882599727880917490
➡️Bitcoin is above $100k but retail interest is the lowest it's been in 3 years.
➡️How popular is Bitcoin on Wall Street? 6% of all the money flowing into American ETFs is now Bitcoin.
➡️A user just successfully sent ~$866,430,722 worth of Bitcoin for a 33¢ transaction fee using the blockchain.
➡️President Trump’s new executive order protects American’s right to use public blockchains, develop and deploy software, participate in mining and validation, transact without censorship, and safeguard their own digital assets. The freedom to build, mine, and hodl Bitcoin.
➡️Spot Bitcoin ETFs are now bigger than ESG ETFs.
On the 25th of January:
➡️Bitcoin has completely dislocated from its ~70-day global M2 lag. It's been on a run of its own for the last 30 days.
➡️As mentioned above but also in the segment (Macro/Geopolitics) Trump took a bold stand against CBDCs, protecting Americans from the financial tyranny they represent. But now, Ripple is working behind the scenes to undermine his administration and sneak CBDCs in through a backdoor while lobbying heavily.
Ripple is public enemy number one this cycle, and it’s time everyone recognized it. You don’t hate XRP enough, plain and simple. If you understood what they’re trying to pull, your outrage would be through the roof.
Jameson Lopp: There's Bitcoin, then there's Crypto, then there's Ripple. Ripple has attacked Bitcoin at a level rivaled only by BSV's lawsuits. Ripple explicitly wants to power CBDCs. They have always been focused on servicing banks. Few projects are as antithetical to Bitcoin.
Brad Garlinghouse douchebag and CEO of Ripple: "We would not be profitable or cash flow positive without selling our XRP holdings.” All 100 billion XRP tokens were created out of thin air by Ripple Labs in 2012 and reserved for insiders. Ripple's income comes from dumping these coins on the public.
On the 26th of January:
➡️Only 1,056,700 Bitcoin is left to be mined, forever.
On the 27th of January:
➡️MicroStrategy has acquired 10,107 BTC for ~$1.1 billion at ~$105,596 per Bitcoin and has achieved a Bitcoin Yield of 2.90% YTD 2025. As of 1/26/2025, they hodl 471,107 Bitcoins acquired for ~$30.4 billion at ~$64,511 per Bitcoin.
➡️Russia's largest energy supplier Rosseti to launch Bitcoin mining operations in areas with excess electricity, aiming to optimize energy use, increase tax revenue, and support the development of BTC mining in Russia.
➡️Brazilian oil giant Petrobras to launch Bitcoin mining operations using excess natural gas produced during oil extraction, to reduce energy waste and carbon emissions.
➡️MicroStrategy to offer 2.5 million shares of 'Series A Perpetual Strike Preferred Stock' to buy more Bitcoin.
➡️Arizona is the first state to pass a bill out of committee to create a ‘Strategic Bitcoin Reserve.’ Co-sponsored by Wendy Rogers and Jeff Weninger, the bill now heads to the state Senate floor for a vote.
➡️El Salvador is now the second fastest-growing tourist destination in the world. Bitcoin and Tourism.
➡️'Cboe BZX Exchange files amended rules to allow in-kind redemptions and creations for the ARK 21Shares Bitcoin ETF. This follows Nasdaq’s similar filing for BlackRock’s iShares Bitcoin Trust, signaling progress in spot Bitcoin ETF mechanics.' -Bitcoin News
What we have learned last week: 'Vitalik doesn’t buy Ethereum, only sells it. Ripple doesn’t buy XRP, only sells it. The US doesn’t buy USD, only prints it. There can only be one Bitcoin— wake up' - Cory Bates
💸Traditional Finance / Macro:
👉🏽NVIDIA closes the day down -17%, officially erasing -$590 BILLION of market cap. This marks the largest 1-day loss of market cap in a single stock in history, and it's not even close.
🏦Banks:
👉🏽no news
🌎Macro/Geopolitics:
On the 20th of January:
👉🏽 Trump: "We will end the "Green Deal" with the "liquid gold under our feet". 'The Netherlands has €1.000 billion of "liquid gold" natural gas in Groningen. The Rutte government destroyed our gas wells, and filled them up with concrete because they could not compensate 20.000 homes.' - Henk Otten I am not sure about the fact that we filled them up with concrete. As a matter of fact, I think the Netherlands could start immediately if needed.
On the 21st of January:
👉🏽The US Treasury has reached its debt limit and is now using 'extraordinary measures' to continue operating.
👉🏽Sam Callahan: 'A new study reveals that, over the past 20 years, Congress has largely ignored large fiscal deficits, making little effort to reduce them. The authors discuss what's required for "successful deficit reduction," but they don't seem to realize that nothing stops this train.'
https://www.brookings.edu/wp-content/uploads/2024/09/4_AuerbachYagan.pdf
👉🏽Interest payments on the US national debt now exceed spending on national defense.
👉🏽Billionaire hedge fund manager Ray Dalio, founder of Bridgewater Associates, just warned that the UK could be heading for a “debt death spiral” his is in which the UK has to borrow more and more money to service its rising interest costs
👉🏽'The rich are getting richer faster than ever before: US household net worth has risen ~$56 TRILLION since Q1 2020 and hit a record $160 trillion in Q3 2024. Currently, the top 10% own $111 trillion of all wealth, accounting for 69% of the total. The top 0.1% alone own a massive $22 trillion, reflecting 14% of household net worth. On the other hand, the bottom 50% holds just $3.9 trillion, or 2.4% of wealth. This comes as the S&P 500 and the Nasdaq 100 have risen 128% and 166% since Q1 2020 while national home prices have surged ~50%. The wealth gap is growing.' -TKL
👉🏽Phillipp Heimberger: 'It is unclear how national governments in the EU are supposed to square the circle: to ramp up military spending and public expenditures on climate and digitization while at the same time achieving primary fiscal surpluses over the medium run to meet new EU fiscal rules.'
On the 22nd of January:
👉🏽'Gold's global market cap to world GDP ratio reached a RECORD 16.7% in 2024. This ratio has doubled in 10 years and quadrupled since 2001. Nominally, gold’s market value sits near an all-time high of ~$18.5 trillion. This comes as gold has posted an average annual return of +9.5% since 2000, making it one of the best-performing major asset classes this century. Since the start of 2024, gold prices have hit 41 all-time highs and are up +33%.' - TKL
On the 24th of January:
👉🏽The Bank of Japan raises interest rates by 25 basis points to their highest level since 2008.
👉🏽'The ECB proposed a holding limit of €3000 for the digital euro. Banks want €500, otherwise, it will cost them too much... This whole digital euro project is such a huge clusterfuck in slow-motion.' - Paul Buitink
https://www.ledgerinsights.com/progress-on-digital-euro-holding-limits/
Meanwhile, Trump is going all in against ‘Central Bank Digital Currencies.’ ‘taking measures to protect Americans from the risks of Central Bank Digital Currencies (CBDCs), which threaten the stability of the financial system, individual privacy, and the sovereignty of the United States’
Daniel Batten: 'When it comes to digital currency: Will the EU pivot and head down the path of democracies such as the US who see Bitcoin as consistent with its democratic values or continue down the path of autocracies like Russia & China who see CBDCs as being consistent with their autocratic values?'
On the 27th of January:
👉🏽Volkswagen ready to become Chinese Volkswagen is prepared to let Chinese electric carmakers take over production lines in its struggling factories.
👉🏽'DeepSeek officially announces another open-source AI model, Janus-Pro-7B. This model generates images and beats OpenAI's DALL-E 3 and Stable Diffusion across multiple benchmarks.' -TKL OpenAI: - 10 years old - 4,500 employees - raised $6.6 billion DeepSeek - less than 2 years old - 200 employees - less than $10 million capital used
DeepSeek developed and open-sourced an equal or better product and had it out for free, likely killing the business model of OpenAI Anyway, if you want to read more on DeepSeek, and how seems like how they seem to have shifted the paradigm on how AI LLMS work, I highly recommend the following thread by Morgan Brown: https://x.com/morganb/status/1883686162709295541
Open source everything!
A quick reminder for all my readers but especially for my nocoin readers:
FORMER FINANCE PROFESSOR TAD SMITH: "After 25 years teaching finance, I realized at 58:
If the money printer grows 8-10% annually and the S&P 500 returns ~9%, it’s just treading water. True wealth comes from outpacing the printer. That’s the Bitcoin journey."
https://x.com/SimplyBitcoinTV/status/1876679181066801425
Study Bitcoin
🎁If you have made it this far I would like to give you a little gift:
Fantastic presentation by Preston Pysh on Bitcoin as a store of value referencing Michael saylors presentation to the Microsoft board
https://www.youtube.com/watch?v=C-O54CdSNnM
I've used his monopoly analogy so many times. If you've never heard it, you should definitely listen and maybe share it with your stubborn uncle or sister, or co-worker in denial.
Absolutely brilliant from Preston as always. "Most people arrive at bitcoin without ever understanding the problems it's solving".
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly. Use the code BITCOINFRIDAY
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple.⠀⠀⠀⠀ ⠀ ⠀⠀⠀
Do you think this post is helpful to you? If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
@ 378562cd:a6fc6773
2025-02-02 18:58:38Chef's notes
I'm only testing this out right now. I will update the recipe as well as add my own image soon after making this dish again.
Details
- ⏲️ Prep time: 20 minutes
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 4
Ingredients
- 4 to 6 potatoes (size depending)
- 1 lb ground beef
- seasonings
- 2 cans chili beans
- 1 onion
- katsup
- shredded cheese of some kind
Directions
- saute onion and add ground beef to skillet. Season to liking.
- peel if you like and thin slice potatoes
- in a rectangle baking dish, layer potatoes, beans, meat and cheese (like a lasagna) until you have used all your ingredients. Try and make at least 2 or 3 layers with extra cheese on top.
- Bake at 350 for one hour. Serve and enjoy!
-
@ 378562cd:a6fc6773
2025-02-02 17:53:05Chef's notes
I'm only testing this out right now. I will update the recipe as well as add my own image soon after making this dish again.
Details
- ⏲️ Prep time: 20 minutes
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 4
Ingredients
- 4 to 6 potatoes (size depending)
- 1 lb ground beef
- seasonings
- 2 cans chili beans
- 1 onion
- katsup
- shredded cheese of some kind
Directions
- saute onion and add ground beef to skillet. Season to liking.
- peel if you like and thin slice potatoes
- in a rectangle baking dish, layer potatoes, beans, meat and cheese (like a lasagna) until you have used all your ingredients. Try and make at least 2 or 3 layers with extra cheese on top.
- Bake at 350 for one hour. Serve and enjoy!
-
@ df173277:4ec96708
2025-01-28 17:49:54Maple is an AI chat tool that allows you to have private conversations with a general-purpose AI assistant. Chats are synced automatically between devices so you can pick up where you left off.\ Start chatting for free.
We are excited to announce that Maple AI, our groundbreaking end-to-end encrypted AI chat app built on OpenSecret, is now publicly available. After months of beta testing, we are thrilled to bring this innovative technology to the world.
Maple is an AI chat tool that allows you to have private conversations with a general-purpose AI assistant. It can boost your productivity on work tasks such as writing documentation, creating presentations, and drafting emails. You can also use it for personal items like brainstorming ideas, sorting out life's challenges, and tutoring you on difficult coursework. All your chats are synced automatically in a secure way, so you can start on one device and pick up where you left off on another.
Why Secure and Private AI?
In today's digital landscape, it is increasingly evident that security and privacy are essential for individuals and organizations alike. Unfortunately, the current state of AI tools falls short. A staggering 48% of organizations enter non-public company information into AI apps, according to a recent report by Cisco. This practice poses significant risks to company security and intellectual property.
Another concern is for journalists, who often work with sensitive information in hostile environments. Journalists need verification that their information remains confidential and protected when researching topics and communicating with sources in various languages. They are left to use underpowered local AI or input their data into potentially compromised cloud services.
At OpenSecret, we believe it is possible to have both the benefits of AI and the assurance of security and privacy. That's why we created Maple, an app that combines AI productivity with the protection of end-to-end encryption. Our platform ensures that your conversations with AI remain confidential, even from us. The power of the cloud meets the privacy of local.
#### How Does It Work?
Our server code is open source, and we use confidential computing to provide cryptographic proof that the code running on our servers is the same as the open-source code available for review. This process allows you to verify that your conversations are handled securely and privately without relying on trust. We live by the principle of "Don't trust, verify," and we believe this approach is essential for building in the digital age. You can read a more in-depth write-up on our technology later this week on this site.
How Much Does It Cost?
We are committed to making Maple AI accessible to everyone, so we offer a range of pricing plans to suit different needs and budgets. Our Free plan allows for 10 chats per week, while our Starter plan ($5.99/month) and Pro plan ($20/month) offer more comprehensive solutions for individuals and organizations with heavier workloads. We accept credit cards and Bitcoin (10% discount), allowing you to choose your preferred payment method.
- Free: $0
- Starter: $5.99/month
- Pro: $20/month
Our goal with Maple AI is to create a product that is secure through transparency. By combining open-source code, cryptography, and confidential computing, we can create a new standard for AI conversations - one that prioritizes your security and privacy.
Maple has quickly become a daily tool of productivity for our own work and those of our beta testers. We believe it will bring value to you as well. Sign up now and start chatting privately with AI for free. Your secrets are safe in the open.
#### Are You An App Developer?
You can build an app like Maple. OpenSecret provides secure auth, private key management, encrypted data sync, private AI, and more. Our straightforward API behaves like other backends but automatically adds security and privacy. Use it to secure existing apps or brand-new projects. Protect yourself and your users from the liability of hosting personal data by checking out OpenSecret.
Enjoy private AI Chat 🤘
-
@ 86cf3742:678e3ae8
2025-01-28 15:06:54In this episode, we dive deep into the world of dairy farming with JR Burdick, a former conventional dairy farmer turned raw milk producer. JR shares his journey from following the traditional dairy farming system to becoming an independent raw milk seller, breaking away from industry norms and regulations. He recounts the challenges he faced, including dealing with stray voltage that decimated his herd, a lengthy legal battle with an electric company, and the emotional and financial toll it took on his family.
JR also discusses the impact of industry regulations, such as the mandatory check-off programs and the pressures from dairy cooperatives, which led him to question the sustainability and ethics of the conventional dairy system. His story is one of resilience and transformation as he navigates the complexities of direct-to-consumer sales, the challenges of marketing raw milk, and the importance of maintaining integrity in his farming practices.
Throughout the conversation, JR offers insights into the broader agricultural landscape, touching on issues like government subsidies, the consolidation of the dairy industry, and the role of technology and innovation in farming. He also shares his thoughts on the future of agriculture, the potential of Bitcoin as a financial tool for farmers, and the importance of preserving traditional farming knowledge.
This episode is a compelling exploration of the struggles and triumphs of a farmer who dared to defy the status quo and forge a new path in the world of agriculture.
-
@ 5579d5c0:db104ded
2025-01-27 19:49:52"Chris, what do you tell your clients to do?"
This is a question I get asked regularly, and the answer is not simple.
The truth is, every person’s health journey is unique.
There are no 'one size fits all' solutions, no rigid plans that guarantee results for everyone.
That’s why, as a health coach, my role isn’t to hand out answers or impose rules. It’s to guide you toward uncovering your own.
Bruce Lee on being a teacher.
Your health, your truth
Bruce Lee was right, you already hold the answers to your health challenges.
Your body is constantly giving you signals about what works and what doesn’t.
My role is to help you listen to those signals to cut through the noise of diets, trends, and quick fixes.
Together we focus on what aligns with your unique biology and lifestyle.
This isn’t about creating a rigid plan or forcing you into a pre-made program.
It’s about asking the right questions, giving you tools to explore, and helping you build the confidence to make decisions that work for you.
Health is deeply personal, and lasting change comes from understanding yourself.
Rigid oatmeal diet plan.
A coach who adapts to you
One of the most important aspects of my approach is meeting you where you are.
Your life, your habits, and your why are the foundation.
Together, we adapt strategies to fit your needs.
Health coaching isn’t about me telling you what to do.
It’s about empowering you to take ownership of your journey.
Sometimes that means learning to tune out the latest biohacking tool or Instagram diet trend, I'm looking at you 'Oatmeal diet for weight loss'.
Sometimes it means starting small, with manageable steps that build momentum.
Whatever it looks like, my focus is on helping you create sustainable habits that work for life, not just for the next few weeks.
Health information overload.
Protecting you from the noise
The world of health advice is noisy.
There’s always a new diet, a miracle supplement, or a "hack" promising results.
But more information doesn’t always mean better decisions, it often leads to overwhelm.
My role as your coach is to help you tune out the noise.
Together, we’ll focus on the basics that always work:
-
Sunlight
-
Circadian alignment
-
Eating real nutrient dense local and seasonal food
-
Moving regularly
-
Targeted training
-
Sleeping well
-
Dealing with stress in the right way
You don’t need the latest trends, you need a clear path that’s grounded in what’s proven and tailored to you.
Exploring, not imposing
The beauty of health coaching is that it’s not about giving you a checklist or medical guideline telling you "do this, not that."
It’s about exploration. What makes you feel your best? What habits energise you? What changes feel sustainable?
Together, we experiment, reflect, and adjust.
This process isn’t about finding the "right" way, it’s about finding your way.
I’m here to guide, support, and challenge you, but ultimately, the answers come from within.
As a coach, I see your potential even when you don’t. My job is to help you see it too.
Health isn’t a destination, it’s a journey. And the most powerful changes happen when you take ownership of that journey.
You already hold the answers. I just help you uncover them.
- Chris
If you're ready to explore your potential, let’s talk.
Click https://calendly.com/hello-chrispatrick to book a free discovery call with me.
-
-
@ 76c71aae:3e29cafa
2025-01-26 22:51:16When I first heard about the DOGE project, I was ready to throw my laptop out the window. The initial proposal read like a Silicon Valley libertarian fever dream - taking Musk's chaotic "move fast and break democracy" Twitter approach and unleashing it on federal agencies. Great, I thought, just what we need: more tech bros thinking they can "optimize" public institutions into oblivion.
But here's the weird thing - when you actually dig into what DOGE has morphed into, it's basically just USDS with a meme-worthy rebrand. For those not deep in the civic tech weeds, USDS was Obama's attempt to drag government technology out of the 1990s, inspired by the UK's actually-functional GDS program. And let's be real - government tech procurement is an absolute dumpster fire right now. We're talking billions wasted on projects that would make a CS101 student cringe, while the average American has to navigate websites that look like they were designed on GeoCities.
The deeply ironic thing is that Musk - for all his cosplaying as a technocratic messiah following in his grandfather's footsteps of dreaming up an antidemocratic technocratic state - actually has some relevant experience here. SpaceX did figure out how to work with government contracts without producing $500 million paperweights, and Tesla somehow gamed clean vehicle incentives into birthing the first new major car company since we invented radio.
Look, I'm the first to roll my eyes at Musk's wannabe-fascist posting sprees and his perpetual "I'm the main character of capitalism" energy. But speaking as someone who's banged their head against the wall of government technology modernization for years - if he actually focuses on the tech and keeps his brainrot political takes to himself, maybe DOGE could do some good?
Even Jen Pahlka, who basically wrote the book on government digital services, is cautiously optimistic. The services Americans get from their government are objectively terrible, and the procurement system is trapped in an infinite loop of failure. Maybe - and I can't believe I'm typing this - Musk's particular flavor of disruptive tech deployment could help?
Just... please, for the love of all things agile, let's keep him focused on the actual technology and far away from any more attempts to recreate his grandfather's dreams of a technocratic dystopia. We've got enough of those already.
-
@ d57360cb:4fe7d935
2025-02-02 16:33:16Beauty and art function beyond the mind.
When you’re not thinking, when the mind reaches its natural silence. When it quiets down.
You begin to experience and actually experience how things are.
There is no more narration. Things happen as if by magic. Everything is in its place happening and grooving.
Every act, every movement feels like jazz.
We’re better doers than we are thinkers. But the world thinks otherwise.
-
@ 6b57533f:eaa341f5
2025-02-02 15:46:41🏝️lost in the ordinary?
Welcome to Stories
Discover a hidden paradise where the world slows down, and adventure begins..
🌊 Step into tranquility.
Wake up to the sound of gentle waves and endless blue horizons.
🛶Live the dream.
Unwind, explore, and escape—your perfect getaway is just one step away.
-
@ 006532cb:fd8f28b4
2025-01-26 22:10:39Law of Conservation of Energy: The Law of Conservation of Energy states that energy cannot be created or destroyed, only converted from one form to another. This means that the total energy of an isolated system remains constant over time, but the form of energy can change (e.g., from kinetic energy to potential energy). This fundamental principle in physics highlights the importance of energy efficiency and the potential for energy to be transformed and reused.
Henry Ford's Energy Currency: Henry Ford, the founder of the Ford Motor Company, proposed the concept of an "energy currency" in the 1920s. He suggested that energy, rather than gold or other commodities, could serve as the basis for a new monetary system. Ford's idea was that energy is the fundamental unit of value, as it is the driving force behind all economic activity. He proposed that energy could be used as a standard unit of exchange, allowing for more efficient and equitable trade.
Buckminster Fuller's View on Energy Production and Wealth: Buckminster Fuller, a renowned architect, systems theorist, and futurist, believed that energy production is the key to creating wealth and abundance. He argued that energy is the fundamental driver of economic growth and that increasing energy production can lead to increased prosperity. Fuller's concept of "ephemeralization" suggests that as energy production becomes more efficient and widespread, the cost of goods and services decreases, leading to increased abundance and wealth. He also emphasized the importance of designing systems that maximize energy efficiency and minimize waste, allowing for more equitable distribution of resources and wealth.
-
@ 599f67f7:21fb3ea9
2025-01-26 11:01:05¿Qué es Blossom?
nostr:nevent1qqspttj39n6ld4plhn4e2mq3utxpju93u4k7w33l3ehxyf0g9lh3f0qpzpmhxue69uhkummnw3ezuamfdejsygzenanl0hmkjnrq8fksvdhpt67xzrdh0h8agltwt5znsmvzr7e74ywgmr72
Blossom significa Blobs Simply Stored on Media Servers (Blobs Simplemente Almacenados en Servidores de Medios). Blobs son fragmentos de datos binarios, como archivos pero sin nombres. En lugar de nombres, se identifican por su hash sha256. La ventaja de usar hashes sha256 en lugar de nombres es que los hashes son IDs universales que se pueden calcular a partir del archivo mismo utilizando el algoritmo de hash sha256.
💡 archivo -> sha256 -> hash
Blossom es, por lo tanto, un conjunto de puntos finales HTTP que permiten a los usuarios almacenar y recuperar blobs almacenados en servidores utilizando su identidad nostr.
¿Por qué Blossom?
Como mencionamos hace un momento, al usar claves nostr como su identidad, Blossom permite que los datos sean "propiedad" del usuario. Esto simplifica enormemente la cuestión de "qué es spam" para el alojamiento de servidores. Por ejemplo, en nuestro Blossom solo permitimos cargas por miembros de la comunidad verificados que tengan un NIP-05 con nosotros.
Los usuarios pueden subir en múltiples servidores de blossom, por ejemplo, uno alojado por su comunidad, uno de pago, otro público y gratuito, para establecer redundancia de sus datos. Los blobs pueden ser espejados entre servidores de blossom, de manera similar a cómo los relays nostr pueden transmitir eventos entre sí. Esto mejora la resistencia a la censura de blossom.
A continuación se muestra una breve tabla de comparación entre torrents, Blossom y servidores CDN centralizados. (Suponiendo que hay muchos seeders para torrents y se utilizan múltiples servidores con Blossom).
| | Torrents | Blossom | CDN Centralizado | | --------------------------------------------------------------- | -------- | ------- | ---------------- | | Descentralizado | ✅ | ✅ | ❌ | | Resistencia a la censura | ✅ | ✅ | ❌ | | ¿Puedo usarlo para publicar fotos de gatitos en redes sociales? | ❌ | ✅ | ✅ |
¿Cómo funciona?
Blossom utiliza varios tipos de eventos nostr para comunicarse con el servidor de medios.
| kind | descripción | BUD | | ----- | ------------------------------- | ------------------------------------------------------------------ | | 24242 | Evento de autorización | BUD01 | | 10063 | Lista de Servidores de Usuarios | BUD03 |
kind:24242 - Autorización
Esto es esencialmente lo que ya describimos al usar claves nostr como IDs de usuario. En el evento, el usuario le dice al servidor que quiere subir o eliminar un archivo y lo firma con sus claves nostr. El servidor realiza algunas verificaciones en este evento y luego ejecuta el comando del usuario si todo parece estar bien.
kind:10063 - Lista de Servidores de Usuarios
Esto es utilizado por el usuario para anunciar a qué servidores de medios está subiendo. De esta manera, cuando el cliente ve esta lista, sabe dónde subir los archivos del usuario. También puede subir en múltiples servidores definidos en la lista para asegurar redundancia. En el lado de recuperación, si por alguna razón uno de los servidores en la lista del usuario está fuera de servicio, o el archivo ya no se puede encontrar allí, el cliente puede usar esta lista para intentar recuperar el archivo de otros servidores en la lista. Dado que los blobs se identifican por sus hashes, el mismo blob tendrá el mismo hash en cualquier servidor de medios. Todo lo que el cliente necesita hacer es cambiar la URL por la de un servidor diferente.
Ahora, además de los conceptos básicos de cómo funciona Blossom, también hay otros tipos de eventos que hacen que Blossom sea aún más interesante.
| kind | descripción | | ----- | --------------------- | | 30563 | Blossom Drives | | 36363 | Listado de Servidores | | 31963 | Reseña de Servidores |
kind:30563 - Blossom Drives
Este tipo de evento facilita la organización de blobs en carpetas, como estamos acostumbrados con los drives (piensa en Google Drive, iCloud, Proton Drive, etc.). El evento contiene información sobre la estructura de carpetas y los metadatos del drive.
kind:36363 y kind:31963 - Listado y Reseña
Estos tipos de eventos permiten a los usuarios descubrir y reseñar servidores de medios a través de nostr. kind:36363 es un listado de servidores que contiene la URL del servidor. kind:31963 es una reseña, donde los usuarios pueden calificar servidores.
¿Cómo lo uso?
Encuentra un servidor
Primero necesitarás elegir un servidor Blossom donde subirás tus archivos. Puedes navegar por los públicos en blossomservers.com. Algunos de ellos son de pago, otros pueden requerir que tus claves nostr estén en una lista blanca.
Luego, puedes ir a la URL de su servidor y probar a subir un archivo pequeño, como una foto. Si estás satisfecho con el servidor (es rápido y aún no te ha fallado), puedes agregarlo a tu Lista de Servidores de Usuarios. Cubriremos brevemente cómo hacer esto en noStrudel y Amethyst (pero solo necesitas hacer esto una vez, una vez que tu lista actualizada esté publicada, los clientes pueden simplemente recuperarla de nostr).
noStrudel
- Encuentra Relays en la barra lateral, luego elige Servidores de Medios.
- Agrega un servidor de medios, o mejor aún, varios.
- Publica tu lista de servidores. ✅
Amethyst
- En la barra lateral, encuentra Servidores multimedia.
- Bajo Servidores Blossom, agrega tus servidores de medios.
- Firma y publica. ✅
Ahora, cuando vayas a hacer una publicación y adjuntar una foto, por ejemplo, se subirá en tu servidor blossom.
⚠️ Ten en cuenta que debes suponer que los archivos que subas serán públicos. Aunque puedes proteger un archivo con contraseña, esto no ha sido auditado.
Blossom Drive
Como mencionamos anteriormente, podemos publicar eventos para organizar nuestros blobs en carpetas. Esto puede ser excelente para compartir archivos con tu equipo, o simplemente para mantener las cosas organizadas.
Para probarlo, ve a blossom.hzrd149.com (o nuestra instancia comunitaria en blossom.bitcointxoko.com) e inicia sesión con tu método preferido.
Puedes crear una nueva unidad y agregar blobs desde allí.
Bouquet
Si usas múltiples servidores para darte redundancia, Bouquet es una buena manera de obtener una visión general de todos tus archivos. Úsalo para subir y navegar por tus medios en diferentes servidores y sincronizar blobs entre ellos.
Cherry Tree
nostr:nevent1qvzqqqqqqypzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzfmhxue69uhkummnw3e82efwvdhk6tcqyp3065hj9zellakecetfflkgudm5n6xcc9dnetfeacnq90y3yxa5z5gk2q6
Cherry Tree te permite dividir un archivo en fragmentos y luego subirlos en múltiples servidores blossom, y más tarde reensamblarlos en otro lugar.
Conclusión
Blossom aún está en desarrollo, pero ya hay muchas cosas interesantes que puedes hacer con él para hacerte a ti y a tu comunidad más soberanos. ¡Pruébalo!
Si deseas mantenerte al día sobre el desarrollo de Blossom, sigue a nostr:nprofile1qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzfmhxue69uhkummnw3e82efwvdhk6tcqyqnxs90qeyssm73jf3kt5dtnk997ujw6ggy6j3t0jjzw2yrv6sy22ysu5ka y dale un gran zap por su excelente trabajo.
Referencias
-
@ 5d4b6c8d:8a1c1ee3
2025-02-02 14:47:05A little better today
I'm about to have some coffee, after 14 hours not eating or drinking . I probably won't eat for a couple more hours, either.
I forgot to mention another element of Fast February: the "fiscal fast". Some of you may have heard this term before. It's exactly what it sounds like: stop spending money. In my case it just means not buying anything specifically for myself: no snacks, no takeout, no video games, etc.
originally posted at https://stacker.news/items/873395
-
@ 3b7fc823:e194354f
2025-02-02 13:39:49Why You Should Only Run DeepSeek Locally: A Privacy Perspective and how to
In an era where AI tools promise immense utility, the decision to run DeepSeek locally is not merely about functionality but also about safeguarding privacy and security. Here's the rationale why:
-
Control Over Data Access: Running DeepSeek locally ensures that data processing occurs on your own machine or server, allowing you to have full control over who can access the system. This reduces the risk of unauthorized access and misuse.
-
Data Privacy: By keeping computations local, you ensure that personal data does not leave your control, minimizing the risk of exposure through cloud-based services.
-
Security Measures: Local operation provides an additional layer of security. You can implement access controls, monitor usage, and respond to incidents more effectively, which might be harder or impossible when relying on third-party platforms.
-
Practical Implementation: Tools like Ollama and OpenWebUI facilitate setting up a local environment, making it accessible even for those with limited technical expertise. This setup empowers individuals to leverage AI capabilities while maintaining privacy.
-
Right to Control Data: Privacy is a fundamental right, and running DeepSeek locally respects this by allowing users to decide what data they share and how it's accessed. This empowers individuals to make informed choices about their personal data.
For those prioritizing privacy, this approach is not just beneficial—it's essential.
Running DeepSeek Locally: A Guide for Individual Home Users
DeepSeek is a powerful AI search engine that can help with various tasks, but running it locally gives you greater control over your data and privacy. Here’s how you can set it up at home.
What You’ll Need
- A Computer: A desktop or laptop with sufficient processing power (at least 4GB RAM).
- Python and pip: To install and run DeepSeek.
- Ollama: An open-source tool that allows you to run AI models locally.
- OpenWebUI: A simple web interface for interacting with Ollama.
Step-by-Step Guide
1. Install the Prerequisites
- Python: Download and install Python from https://www.python.org.
- pip: Use pip to install Python packages.
bash pip install --upgrade pip
- Ollama:
bash pip install ollama
- OpenWebUI: Visit https://github.com/DeepSeek-LLM/openwebui and follow the instructions to install it.
2. Set Up Ollama
- Clone the official Ollama repository:
bash git clone https://github.com/OllamaAI/Ollama.git cd Ollama
- Follow the installation guide on https://ollama.ai to set it up.
3. Run DeepSeek Locally
- Use OpenWebUI as your interface:
bash # Start OpenWebUI (open a terminal and run this): python openwebui.py --model deepseek-llm-v0.2-beta
- A web browser will open, allowing you to interact with DeepSeek.
Tips for Optimization
- Reduce Memory Usage: Use smaller models like
deepseek-llm-v0.2-beta
if your computer has limited resources. - Limit Model Access: Only allow authorized users to access the system by restricting IP addresses or using a VPN.
- Regular Updates: Keep all software up to date to protect against vulnerabilities.
Why Run DeepSeek Locally?
- Privacy: Your data stays on your local machine, reducing the risk of unauthorized access.
- Flexability: Running locally allows you to build specific models for specific uses and provide them with RAG data.
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
-
-
@ fbf0e434:e1be6a39
2025-02-02 13:32:12本文原载于《CERN Courier》,是由欧洲核子研究中心(CERN,全称Conseil Européen pour la Recherche Nucléaire)出版的权威科学期刊,专注于报道全球物理学、技术及创新领域的前沿动态。以下正文内容是对全球开源开发者激励平台DoraHacks的创始人张剑南的专访报道,探讨了黑客松如何成为科技创新的重要推动力以及DoraHacks在其中扮演的角色。
万维网(World Wide Web)、人工智能(Artificial Intelligence)与量子计算(Quantum Computing)——这些划时代的技术有何共同之处?DoraHacks创始人张剑南认为,它们都源于“Hacks(黑客精神)”。“当万维网在欧洲核子研究中心(CERN)诞生时,它向我们证明了一件事:要想改变并提高人类的生活方式和工作效率,关键在于以创新的思维利用现有的技术以实现突破。”张剑南解释道,“如果总是从零开始,我们永远无法取得实质性的进步。这恰恰就是开源运动和黑客马拉松的核心价值。”
十年前,张剑南参与筹办了CERN Webfest 2013,这是一场致力于探索如何以创新方式运用技术来服务科学与社会的黑客马拉松活动。通过Webfest,张剑南不仅实现了编程技能与物理学知识的跨学科融合,还与来自世界各地、背景各异的hackers建立了持久深厚的联系。随着参与黑客松次数的增多,他的“黑客精神”愈发强烈,最终驱使他创立了自己的公司。2024年,张剑南重返Webfest,但这次他不再是参与者,而是作为DoraHacks的首席执行官来见证这场盛会。
黑客马拉松是一种持续数天的社交编程活动,具有高度的包容性和开放性——参与者无需学术机构或企业背景即可加入。这种特性吸引了众多才华横溢的个体参与其中。活动中,hackers以团队形式合作,结合各自的技能,通过软件、硬件或商业计划等来解决技术难题。这不仅让物理学家、计算机科学家、工程师和企业家齐聚一堂,各展所长,也让年轻的开发者们有机会突破传统研究框架,提升技能、积累作品集,并拓展职业人脉。
“如果你对某件事充满热情,就应该能够立即投入其中并全力以赴,”张剑南强调,“追求梦想并不需要特定的学历或背景。”
对于在某个领域刚起步的研究者来说,黑客松的意义远不止于技术挑战。它为进入一个研究或行业领域提供了另一种途径,弥合了学术理论与实际应用之间的鸿沟。很多由大学举办的黑客松往往能够吸引到企业的赞助,这些赞助除了作为奖金来激励开发者持续开发,也会用来租赁大型场馆,以容纳数百甚至上千名参与者。
“正是这些大规模的黑客松吸引了众多行业猎头和导师的关注,”张剑南解释道,“他们把这类活动看作他们的人才库。通过黑客松,参与者们能够与大公司的人直接交流,加速职业发展,同时也能在实践中提升他们的编程能力。”
在2010年代,张剑南经常在周末参加黑客松,这也成为他创业的基石。“我曾经坐在计算机科学学院的公共休息室里,埋头研究我的黑客项目。我的大多数朋友也是在那里认识的,”张剑南回忆道,“但后来我意识到,如果想做出真正伟大的东西,必须有效地组织人力与资金。然后我就开始‘逃课’,不去上计算机系的课程,而是偷偷溜进商学院的教室里。”张剑南常常在商学院的教室后排听课,一边听课一边谋划自己的创业计划。他每天都与同行交流,评估各种不同的商业模式。“在创业过程中,要把工程知识与商业理论结合起来思考,”他补充道,“这是比较有趣的一点,让整个过程也轻松了一些。”
然而,从科学研究转向创业并非易事。“创业初期必须亲力亲为,要自己去学习然后完成各种任务。”张剑南坦言,“好处是能够接触到许多新技能和新朋友,但同时也得强迫自己去做那些原本不擅长的事情。”
这种经历也反映了许多创业者的共同困境:选择自己从头学习新技能,还是寻找合适的创业伙伴然后把任务分配出去?可是找到值得信赖的合作伙伴也不是一件容易的事,错误的决策甚至可能阻碍公司的发展。因此,从一开始就明确公司的愿景和使命显得尤为重要。
“解决方案其实很简单,”张剑南表示,“重点是要投入足够多的时间,亲自完成关键里程碑,以确保产品真正具备可行性。只要有了明确的商业计划和愿景,就能获得来自各方的支持。”
去中心化的社区治理
很多黑客马拉松参与者在活动结束后就会放弃自己的项目,但张剑南创立DoraHacks的初衷并非如此。他希望为全球的黑客团队提供一个平台,让他们能够将创意转化为成熟产品。“我希望黑客马拉松不仅仅是一个招聘工具,”他解释道,“它更应该推动开源开发和去中心化的社区治理。比如现在,来自坦桑尼亚的黑客可以与美国的黑客团队远程协作,然后获得持续的支持,以开发出真正有影响力的产品。这种模式让技术领域变得更多样化,同时也能够让更多人接触到不同的领域。”
DoraHacks通过帮助组织者降低后勤成本,为参与者提供更可靠的资金支持机制,使黑客松超越学术机构的限制,吸引更多对创新充满热情的个体研究者参与。然后不断发展整个社区,让年轻一代的开发者、研究者们能够在自己的职业初期,接触到比以往更多的机遇和机会。
“商业模式正在发生根本的变化,”张剑南指出,黑客马拉松正在发展成为新兴技术的基石,尤其是在量子计算、区块链和人工智能等以开源形式起步的领域。“产品创造的过程将会迎来重大变革。未来的技术发展不再依赖于孤立封闭的产品开发,而是基于黑客们可以共同贡献的平台和基础设施。”
如今,黑客马拉松的意义已不仅限于编程或建立人脉——它们更关乎突破技术边界、创造有意义的解决方案,并开辟新的职业道路。黑客马拉松是创意孵化器,并且能够对这些创意产生持久的影响力。张剑南希望帮助这些创意变为现实。“未来创新的方式一定是协作完成的,是开源的,”他再次强调,“在传统社会环境里,企业的发展依赖于在闭源技术周围筑起的护城河,这种技术更新方式的效率低下且不容易实现。而真正创新的未来,将以开放平台技术为核心,让全球开发者能够在现有项目的基础上不断迭代更新。这样的开放协作精神正是Hacker Movement(开源极客运动)如此重要的原因。”
采访者:Alex Epshtein(编辑助理)。 原文链接:https://cerncourier.com/wp-content/uploads/2025/01/CERNCourier2025JanFeb-digitaledition.pdf
-
@ a95c6243:d345522c
2025-01-24 20:59:01Menschen tun alles, egal wie absurd, \ um ihrer eigenen Seele nicht zu begegnen. \ Carl Gustav Jung
«Extremer Reichtum ist eine Gefahr für die Demokratie», sagen über die Hälfte der knapp 3000 befragten Millionäre aus G20-Staaten laut einer Umfrage der «Patriotic Millionaires». Ferner stellte dieser Zusammenschluss wohlhabender US-Amerikaner fest, dass 63 Prozent jener Millionäre den Einfluss von Superreichen auf US-Präsident Trump als Bedrohung für die globale Stabilität ansehen.
Diese Besorgnis haben 370 Millionäre und Milliardäre am Dienstag auch den in Davos beim WEF konzentrierten Privilegierten aus aller Welt übermittelt. In einem offenen Brief forderten sie die «gewählten Führer» auf, die Superreichen – also sie selbst – zu besteuern, um «die zersetzenden Auswirkungen des extremen Reichtums auf unsere Demokratien und die Gesellschaft zu bekämpfen». Zum Beispiel kontrolliere eine handvoll extrem reicher Menschen die Medien, beeinflusse die Rechtssysteme in unzulässiger Weise und verwandele Recht in Unrecht.
Schon 2019 beanstandete der bekannte Historiker und Schriftsteller Ruthger Bregman an einer WEF-Podiumsdiskussion die Steuervermeidung der Superreichen. Die elitäre Veranstaltung bezeichnete er als «Feuerwehr-Konferenz, bei der man nicht über Löschwasser sprechen darf.» Daraufhin erhielt Bregman keine Einladungen nach Davos mehr. Auf seine Aussagen machte der Schweizer Aktivist Alec Gagneux aufmerksam, der sich seit Jahrzehnten kritisch mit dem WEF befasst. Ihm wurde kürzlich der Zutritt zu einem dreiteiligen Kurs über das WEF an der Volkshochschule Region Brugg verwehrt.
Nun ist die Erkenntnis, dass mit Geld politischer Einfluss einhergeht, alles andere als neu. Und extremer Reichtum macht die Sache nicht wirklich besser. Trotzdem hat man über Initiativen wie Patriotic Millionaires oder Taxmenow bisher eher selten etwas gehört, obwohl es sie schon lange gibt. Auch scheint es kein Problem, wenn ein Herr Gates fast im Alleingang versucht, globale Gesundheits-, Klima-, Ernährungs- oder Bevölkerungspolitik zu betreiben – im Gegenteil. Im Jahr, als der Milliardär Donald Trump zum zweiten Mal ins Weiße Haus einzieht, ist das Echo in den Gesinnungsmedien dagegen enorm – und uniform, wer hätte das gedacht.
Der neue US-Präsident hat jedoch «Davos geerdet», wie Achgut es nannte. In seiner kurzen Rede beim Weltwirtschaftsforum verteidigte er seine Politik und stellte klar, er habe schlicht eine «Revolution des gesunden Menschenverstands» begonnen. Mit deutlichen Worten sprach er unter anderem von ersten Maßnahmen gegen den «Green New Scam», und von einem «Erlass, der jegliche staatliche Zensur beendet»:
«Unsere Regierung wird die Äußerungen unserer eigenen Bürger nicht mehr als Fehlinformation oder Desinformation bezeichnen, was die Lieblingswörter von Zensoren und derer sind, die den freien Austausch von Ideen und, offen gesagt, den Fortschritt verhindern wollen.»
Wie der «Trumpismus» letztlich einzuordnen ist, muss jeder für sich selbst entscheiden. Skepsis ist definitiv angebracht, denn «einer von uns» sind weder der Präsident noch seine auserwählten Teammitglieder. Ob sie irgendeinen Sumpf trockenlegen oder Staatsverbrechen aufdecken werden oder was aus WHO- und Klimaverträgen wird, bleibt abzuwarten.
Das WHO-Dekret fordert jedenfalls die Übertragung der Gelder auf «glaubwürdige Partner», die die Aktivitäten übernehmen könnten. Zufällig scheint mit «Impfguru» Bill Gates ein weiterer Harris-Unterstützer kürzlich das Lager gewechselt zu haben: Nach einem gemeinsamen Abendessen zeigte er sich «beeindruckt» von Trumps Interesse an der globalen Gesundheit.
Mit dem Projekt «Stargate» sind weitere dunkle Wolken am Erwartungshorizont der Fangemeinde aufgezogen. Trump hat dieses Joint Venture zwischen den Konzernen OpenAI, Oracle, und SoftBank als das «größte KI-Infrastrukturprojekt der Geschichte» angekündigt. Der Stein des Anstoßes: Oracle-CEO Larry Ellison, der auch Fan von KI-gestützter Echtzeit-Überwachung ist, sieht einen weiteren potenziellen Einsatz der künstlichen Intelligenz. Sie könne dazu dienen, Krebserkrankungen zu erkennen und individuelle mRNA-«Impfstoffe» zur Behandlung innerhalb von 48 Stunden zu entwickeln.
Warum bitte sollten sich diese superreichen «Eliten» ins eigene Fleisch schneiden und direkt entgegen ihren eigenen Interessen handeln? Weil sie Menschenfreunde, sogenannte Philanthropen sind? Oder vielleicht, weil sie ein schlechtes Gewissen haben und ihre Schuld kompensieren müssen? Deswegen jedenfalls brauchen «Linke» laut Robert Willacker, einem deutschen Politikberater mit brasilianischen Wurzeln, rechte Parteien – ein ebenso überraschender wie humorvoller Erklärungsansatz.
Wenn eine Krähe der anderen kein Auge aushackt, dann tut sie das sich selbst noch weniger an. Dass Millionäre ernsthaft ihre eigene Besteuerung fordern oder Machteliten ihren eigenen Einfluss zugunsten anderer einschränken würden, halte ich für sehr unwahrscheinlich. So etwas glaube ich erst, wenn zum Beispiel die Rüstungsindustrie sich um Friedensverhandlungen bemüht, die Pharmalobby sich gegen institutionalisierte Korruption einsetzt, Zentralbanken ihre CBDC-Pläne für Bitcoin opfern oder der ÖRR die Abschaffung der Rundfunkgebühren fordert.
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ fd208ee8:0fd927c1
2025-01-23 15:31:24Planning Alexandria
People keep asking what features nostr:npub1s3ht77dq4zqnya8vjun5jp3p44pr794ru36d0ltxu65chljw8xjqd975wz has planned for #Alexandria, but they're not set in stone because we're an agile project.
What we do have, is lots of tickets on our Kanban boards and a naming scheme, where we use a famous person's last name, to signify the release goals.
Gutenberg v 0.1.0
(after the inventor of the printing press) will contain the features needed to read and write NIP-62 Curated Publications, as well as encompassing the complex infrastructure, architecture, documentation, and personnel we require to make this all run smoothly and look easy.
Euler v 0.2.0
(after a mathematician credited with establishing graph theory) will contain the features for deep-searching, visually exploring, and smartly navigating the data set, wiki page display, annotating and citing the publications, exporting to other formats (like PDF, ePUB, and LaTeX), and commenting/reviewing. To help with the heavy lifting, we will be swapping out the core with our own Nostr SDK called "Aedile".
Defoe v 0.3.0
(after an author who perfected the novel format) will be all about our favorite writers. We will be focusing upon profile data, payment systems, book clubs and communities, and stylesheets.
That is everything we have planned, for the v1.0 edition, and we consider that version to be a true product.
As for after that, a teaser...
-
@ ddf03aca:5cb3bbbe
2025-02-02 13:09:27We’re thrilled to announce the stable release of Cashu-TS v2.2! Although this update is a minor version bump, it brings significant improvements under the hood that enhance the overall developer experience. We’ve spent several weeks testing and refining these changes.
What’s New in v2.2?
While there are no breaking changes in this release, there are many internal changes. If you spot any regressions or unexpected behavior, please let us know. Here’s a rundown of the major updates:
- Enhanced Proof Creation: The way proofs are created internally has been revamped.
- User-Controlled Outputs: You now have full control over how outputs are created.
- Improved Bundling: We’ve switched our bundling tool to vite for faster and more modern builds.
- Updated Testing Tools: Our testing framework has migrated to vitest and msw, with added browser testing via Playwright.
New Flexibility with OutputData
In previous versions of Cashu-TS, the creation of outputs (or BlindedMessages) was hidden away. Even though there were options to tweak the process (like deterministic secrets or P2PK), you were always limited to the built-in logic.
What’s Changed?
In v2.2, we’ve introduced a public interface that not only streamlines output creation but also lets you plug in your own custom logic when needed. With the new
outputData
option available on all output-creating methods, you can now bypass the automatic process and provide your own outputs.For example, you can create two proofs tied to different public keys in a single mint operation:
ts const data1 = OutputData.createP2PKData({ pubkey: "key1" }, 10, keys); const data2 = OutputData.createP2PKData({ pubkey: "key2" }, 10, keys); const { keep, send } = await wallet.send(20, proofs, { outputData: { send: [...data1, ...data2] }, });
Customization Made Easy
The
outputData
option now accepts anything that conforms to theOutputDataLike
interface. This means you can introduce your own output creation logic—even if it’s not natively supported by Cashu-TS yet. Here’s what the interface looks like:```ts export interface OutputDataLike { blindedMessage: SerializedBlindedMessage; blindingFactor: bigint; secret: Uint8Array;
toProof: (signature: SerializedBlindedSignature, keyset: MintKeys) => Proof; } ```
Introducing OutputData Factories
While having full control is empowering, it also means you’ll need to handle tasks like fee calculation and amount selection manually. To strike a balance between control and convenience, we now support OutputData Factories.
A factory is simply a function that takes an amount and
MintKeys
as input and returns anOutputDataLike
object. This way, you can define a blueprint for your output data without worrying about the nitty-gritty details. For instance, you can create separate factories for amounts you keep versus those you send:```ts function keepFactory(a: number, k: MintKeys) { return OutputData.createSingleP2PKData({ pubkey: "keepPk" }, a, k.id); }
function sendFactory(a: number, k: MintKeys) { return OutputData.createSingleP2PKData({ pubkey: "sendPk" }, a, k.id); }
const { send, keep } = await wallet.send(amount, proofs, { outputData: { send: createFactory("send"), keep: createFactory("keep") }, }); ```
Plus, you can now instantiate a
CashuWallet
with a defaultkeepFactory
, ensuring that all change amounts automatically lock to your key—streamlining your workflow even further.
Bundling Improvements with Vite
Starting with v2.2, we’ve transitioned from using
tsc
to vite for transpiling and bundling the library code. Although this change is mostly behind the scenes, it brings several benefits:- Modern Build Target: We’ve updated our build target to ES6.
- Updated Exports: The package exports now reflect the latest JavaScript standards.
- Standalone Build Soon: We’re working on a standalone build that bundles Cashu-TS along with all its dependencies. This will let you import Cashu-TS directly into your HTML.
If you encounter any issues with the new bundling setup, please let us know.
A Nod to Vitest
In addition to our bundling improvements, we’ve migrated our testing framework from Jest (with nock) to vitest combined with msw. This switch gives us more flexibility in testing and mocking, plus we’ve added browser testing based on Playwright—thanks to the tip from nostr:npub16anjdksmvn5x08vtden04n64rw5k7fsjmedpw8avsx8wsh8ruhlq076pfx!
In Conclusion
Although Cashu-TS v2.2 is a minor version update, it comes packed with improvements that enhance both the developer experience and the flexibility of the library. We’re excited to see how you’ll use these new features in your projects! Thanks to all the amazing contributors that add to this library.
Thank you for being a part of the Cashu-TS community. As always, if you have any questions, suggestions, or issues, don’t hesitate to reach out to us.
-
@ f1989a96:bcaaf2c1
2025-01-23 14:40:18Good morning, readers!
In Iran, officials are accused of exploiting a recent currency devaluation to profit at the public’s expense. The regime raised the rial’s official exchange rate from 550,000 to 640,000 per dollar to maximize its profit when selling the $5 billion it had withdrawn from the National Development Fund. This move effectively stole one quadrillion rials ($23 billion) from citizens, fueling inflation and devastating the public’s already-slim purchasing power.
In Nicaragua, dictator Daniel Ortega dissolved 15 more nonprofit organizations since the start of the year. This brings the total to more than 5,400 NGOs shut down since 2018. Ortega frequently uses financial repression to wield power over citizens, freezing bank accounts, seizing assets, and fabricating financial crimes to dismantle civil society groups.
In open-source software news, Solo Satoshi, a company advancing home Bitcoin mining, unveiled the Bitaxe Touch, a new home mining device designed for individuals to mine Bitcoin. It features a touch screen that displays mining metrics, network data, and Bitcoin news. Innovations like this help democratize access to mining and strengthen the overall Bitcoin network, making an especially big difference for people who wish to mine in difficult political environments. \ \ Meanwhile, Bitcoin developers are exploring rewarding mining pool participants with ecash shares. This model lets miners receive earnings instantly and trade them on open markets without revealing personal details. This could make mining more attractive for dissidents whilst helping strengthen Bitcoin’s overall decentralization.
Finally, we feature the release of Evan Mawarire’s book “Crazy Epic Courage,” in which the Zimbabwean pastor and activist recounts his inspiring journey of a peaceful uprising against Robert Mugabe’s dictatorship and hyperinflation. We also include a Bitkey wallet tutorial from renowned Bitcoin educator Ben Perrin, aka BTC Sessions, who walks users through setting up cold storage and best practices for safe transactions.
Now, let’s get right to it!
SUBSCRIBE HERE
GLOBAL NEWS
Iran | Regime Profiting From Currency Devaluation
In Iran, Hossein Samsami, a member of the parliament’s economic committee, accused the government of exploiting foreign currency exchange rates to profit at the expense of ordinary citizens. The regime recently increased the rial’s official exchange rate from 550,000 to 640,000 rial per dollar — a move Samsami explained “was to sell the $5 billion it had taken from the National Development Fund at the highest price.” By manipulating the exchange rate, the regime effectively stole one quadrillion rials ($23 billion) from citizens. This deliberate devaluation will drive up inflation, deplete savings, and push basic goods further out of reach. Iran’s multi-tiered exchange rate system has long fueled corruption, allowing regime insiders to profit from the gap between the artificially low official exchange rate and the higher free-market rate. To block any financial escape, the regime has tried to close onramps to Bitcoin.
Nicaragua | Regime Dismantles More Nonprofit Organizations
Since the start of 2025, the Nicaraguan regime dissolved an additional 15 nonprofit organizations (NGOs), including Save the Children and the Dominican Nuns Foundation of Nicaragua. This latest wave of repression brings the total to more than 5,400 NGOs shut down since 2018 under dictator Daniel Ortega. Ortega uses financial repression as a weapon, freezing bank accounts, seizing assets, and fabricating financial crimes to dismantle these groups. Deprived of resources and funding, these organizations are forced to close, leaving vulnerable communities without aid. These crackdowns come as part of Ortega’s broader strategy to stifle dissent, dismantle civil society, and consolidate his grip on Nicaragua.
Nigeria | Political and Bitcoin Activist Faces Regime Censorship
James Otudor, an activist and founder of Bitcoin Calabar, a Nigerian Bitcoin circular economy, described what he believes is a deliberate campaign to silence his Bitcoin advocacy. After filing a lawsuit against the Nigerian regime to defend citizens’ rights to own, use, and trade Bitcoin, Otudor was interrogated by the Department of State Security (DSS) about his funding sources and financial activities. Despite providing proof of legitimate earnings, he reports facing a series of suspicious and coordinated attacks — including the theft of his lawyers’ documents, the suspension of his social media accounts, and disruptions to his phone and internet services. These actions represent the extent to which authoritarian regimes like Nigeria will go to block financial tools that operate beyond their control.
United Arab Emirates | AI Ambitions and Authoritarian Control
The United Arab Emirates (UAE) is accelerating its bid to lead the global artificial intelligence race, with reports suggesting that intelligence chief Sheikh Tahnoun is in talks with the United States to acquire NVIDIA’s proprietary AI chips. At the center of this push is G42, an AI conglomerate heavily invested in data analytics, satellite imagery, and predictive surveillance. These technologies enable the UAE to expand domestic surveillance and control to suppress dissent with unprecedented precision. As an authoritarian regime with an appalling human rights record, the UAE has long used technology to surveil activists, journalists, and civil society. Now, it aims to take surveillance and repression to new heights.
Uganda | Civic Group Calls for the End of Trials of Civilians in Military Courts
On Wednesday, Jan. 15, Agora Discourse, a civic group co-founded by activist and Oslo Freedom Forum speaker Agather Atuhaire, launched a Change petition calling for the end of trials of civilians in military courts in Uganda. The next day, police officers harassed and roughed up Agather Atuhaire as she delivered a physical copy of the petition, addressed to Chief Justice Owinyi Dollo, at Uganda’s Supreme Court in the capital, Kampala. Alongside this physical repression, Uganda employs financial repression — freezing the bank accounts of civil society organizations to diminish civilian voices and their right to association and organization. This petition aims to rally international pressure against the regime’s practice of using military courts to target dissidents. If you have a moment, please consider reviewing and signing the petition here.
RECOMMENDED CONTENT
“Crazy Epic Courage” by Evan Mawarire
Zimbabwean pastor and activist Evan Mawarire never set out to become a revolutionary — he simply wanted to speak the truth. But when a video of him draped in a Zimbabwean flag went viral, it ignited a nationwide movement that would challenge Robert Mugabe, one of Africa’s longest-standing autocrats and a thief who looted Zimbabwean wealth via hyperinflation. In his newly released book, “Crazy Epic Courage,” Mawarire details how an ordinary citizen can become the voice of a nation. From arrests and exile to global advocacy, his journey is a testament to risking everything for what is right. Read the full book here.
BITCOIN AND FREEDOM TECH NEWS
This week’s Bitcoin news focuses on Bitcoin mining updates. To learn more about Bitcoin mining, we recommend checking out this explainer article and video.
Mostro | Implements Key Management to Boost Privacy
Mostro, a peer-to-peer (P2P) Bitcoin exchange built on Nostr, introduced advanced key management to improve user privacy. Created by Venezuelan developer Francisco Calderon, Mostro — specifically designed to aid people under tyranny — enables individuals to buy and sell Bitcoin without sharing excessive personal information. This adds another layer of privacy critical for human rights defenders, journalists, and nonprofits operating under authoritarian regimes. As a past recipient of HRF’s Bitcoin Development Fund, Mostro continues to advance private Bitcoin access for those who need it most.
Bitcoin Safe | New Bitcoin Wallet Designed for Non-Technical Users
Bitcoin Safe is a new open-source Bitcoin wallet designed to make self-custody simple even for non-technical users, something that really comes in handy for human rights activists. The wallet guides users through the setup process, with step-by-step instructions for both single-signature (where one private key is used to control your Bitcoin) and multi-signature wallets (which require multiple private keys for added security). Bitcoin Safe also includes features to manage Bitcoin efficiently, such as automatically combining unused Bitcoin (known as Unspent Transaction Outputs or UTXOs), speeding up stuck transactions with fees (known as Replace-By-Fee or RBF), and letting users choose specific coins to spend. With support for more than 10 languages, Bitcoin Safe can lower the barriers to self-custody.
Solo Satoshi | Introduces Bitaxe Touch
Solo Satoshi, a company advancing home Bitcoin mining, unveiled the Bitaxe Touch, the first Bitcoin home miner with a built-in touchscreen. Scheduled for release in early 2025, the device enables users to monitor key metrics, including Bitcoin’s price, mining performance, power consumption, incoming transactions, and real-time temperature data. It also features a Bitcoin news feed, offering a comprehensive overview of the mining experience. Built using an open-source Bitaxe 601 Gamma, the Bitaxe Touch is designed to simplify Bitcoin mining for individuals. By empowering more people to mine Bitcoin independently, devices like this reduce reliance on large mining pools, strengthening Bitcoin’s decentralization and resistance to censorship.
Mining Pools | Rewarding Miners with Tradeable Ecash Shares
Bitcoin developers are exploring a new way to reward miners using tradeable “ecash shares.” In Bitcoin mining, individuals often join “mining pools” — groups of Bitcoin miners that work together to verify transactions, solve blocks, and share rewards. They do so because pooling resources increases their chances of earning Bitcoin. However, miners in these pools can wait days or weeks for payouts (depending on the pools’ payout structure), and miners often suffer violations of their privacy. With ecash shares, miners could receive their earnings immediately and sell them on an open market (without having to reveal their identity, shielding them from a dictator’s watchful eye). This system could also make it easier for small mining pools to get started and grow. Smaller pools often struggle to attract miners because payouts are uncertain. By using ecash shares, these smaller pools could temporarily operate as clients of larger ones to ensure steady income in the early stages.
F2Pool | Monitoring Global Censorship Risks
Bitcoin developer b10c revealed that F2Pool, one of Bitcoin’s largest mining pools, may be filtering transactions. Over the past weeks, b10c’s miningpool-observer detected 15 transactions from certain addresses that were not mined in the first eligible block. While all transactions were eventually confirmed — proving the Bitcoin network’s overall censorship resistance — F2Pool appears to have excluded some despite negligible fee differences, raising concerns of potential censorship. Notably, no other pools filtered these transactions, revealing the strength of this decentralized software network. However, these observations warrant ongoing monitoring so that the public understands such risks before they metastasize.
Mi Primer Bitcoin | Releases 2025 Bitcoin Diploma
Mi Primer Bitcoin, a nonprofit advancing open-source Bitcoin education, released its updated 2025 Bitcoin Diploma. This 176-page open-source workbook serves as a 10-week educational program and is used by more than 56 projects in 30 countries. The diploma covers topics like the history of money, Bitcoin’s technical and practical applications, and its implication for financial freedom and human rights. The latest edition features enhanced infographics and refined content for improved clarity. Available in multiple languages, the Bitcoin Diploma is a powerful resource for fostering financial literacy and global Bitcoin adoption and is taught by civil society groups even under dictatorships like the one in Cuba.
RECOMMENDED CONTENT
Bitkey Wallet Tutorial by BTC Sessions
In this tutorial, renowned Bitcoin educator Ben Perrin (BTC Sessions) demonstrates how to set up and use the Bitkey hardware wallet on a mobile device. He guides viewers through the process of storing, sending, and receiving Bitcoin, with a focus on user-friendliness and secure practices. He also reveals secret techniques to make the most out of one’s hardware wallet. Don’t miss the full tutorial — watch it here.
If this article was forwarded to you and you enjoyed reading it, please consider subscribing to the Financial Freedom Report here.
Support the newsletter by donating bitcoin to HRF’s Financial Freedom program via BTCPay.\ Want to contribute to the newsletter? Submit tips, stories, news, and ideas by emailing us at ffreport @ hrf.org
The Bitcoin Development Fund (BDF) is accepting grant proposals on an ongoing basis. The Bitcoin Development Fund is looking to support Bitcoin developers, community builders, and educators. Submit proposals here.
-
@ c11cf5f8:4928464d
2025-02-02 13:05:25Let's hear some of your latest #Bitcoin purchases, feel free to include links to the #shops or #merchants you bought from too. Any good #deal we should know about?
If you missed our last thread, here are some of the items stackers recently spent and #zap #sats on.
originally posted at https://stacker.news/items/873304
-
@ fd78c37f:a0ec0833
2025-01-23 03:30:28In this edition, we invited Nyirenda, a member of the nostr:npub1t4ljwhhg7zlxeahxwgmkwqmn4jjxxq8lzhyuzy0zvy23hq0sacxsdl9fvv community, to share his personal experiences in participating in the Bitcoin community, as well as the challenges the community has faced in its operations and the strategies used to address them.
YakiHonne: Today, we are honored to have a guest from Bitcoin Boma with us. Thank you for joining us. Before we dive in, I'd like to take a moment to introduce YakiHonne and share a bit about what we do. YakiHonne is a decentralized media client built on the Nostr protocol that enables freedom of speech through technology. It empowers creators to create their own voice, assets, and features. It also allows features like smart widgets, verified notes, and focuses on long-form articles. Now today we'll be exploring more about the Bitcoin community. Nyirenda, could you please briefly introduce yourself and tell us a bit about what you do?
Nyirenda:My name is Nyirenda. I'm part of the Bitcoin Boma Education Program and Bitcoin Boma Malawi. Bitcoin Boma Malawi is a coalition of Bitcoin enthusiasts who have come together to raise social, economic, and environmental awareness about Bitcoin in Malawi. Our long-term strategy involves engaging with various stakeholders, including the government, to work towards the legalization of Bitcoin.
YakiHonne: What sparked your interest in Bitcoin, and what motivated you to start a community around it?
Nyirenda: I first came across Bitcoin in 2016 through the news. Back then, its price had already surged to $16,000, which sparked my interest right away. Although the news warned that Bitcoin resembled a Ponzi scheme, I had already built a solid understanding of economic structures, having studied monetary history and the fractional reserve banking system. This gave me the background needed to appreciate Bitcoin. Nyirenda:I began my research journey with Andreas Antonopoulos's lectures and books, which deeply resonated with me. I was quickly drawn to the philosophy behind Bitcoin. Since then, my focus has been on engaging with others and teaching them about Bitcoin, especially within the context of Malawi. Nyirenda:In Malawi, our economic activities face numerous restrictions. The government controls the national fiat currency, limiting what we can do with it. For me, Bitcoin presents a solution to these issues. Today, I remain passionate about educating others about Bitcoin and exploring its potential to transform our economic situation.
YakiHonne: I witnessed the decline of traditional currencies and realized how Bitcoin could play a role in the future. It's truly fascinating to see how it can be implemented. Could you share how the community was formed, how you attracted members in the early stages, and what challenges you faced along the way?
Nyirenda:When I first started diving into Bitcoin, I felt like I needed a teacher. So, I printed a T-shirt that said "Bitcoin accepted here" and wore it whenever I went into town or public places. People would often look at me and ask, "Hey, what's Bitcoin?" I could then briefly explain what Bitcoin is and how it compares to the current fiat system. Nyirenda:Some people were really interested, to the point that we exchanged contacts and started connecting, and it was a great experience. But the turning point came when I saw a tweet from Bitcoin Boma. Someone tweeted about a conference/seminar being organized, in collaboration with Trezor Academy. When I saw this, I knew this was the place to be. So, last July, I met Grant, Ian Foster, and Nick Twyman, who were organizing the event.
Nyirenda:After we introduced ourselves and started connecting, they said, "Hey, join us as part of our coalition, and let's see what we can do with Bitcoin, especially in education." That’s how things started moving forward. It's been an incredible journey because since then, we've managed to graduate about 12 to 15 students. One of the biggest things we’ve done so far is launching the first Bitcoin education course in Malawi, attracting over 120 people. Of course, only some of them are attending the classes, but so far, the progress has been great.
YakiHonne: So, what challenges did you face in attracting new members at that stage?
Nyirenda:The first challenge we face is the attitude and perception of Bitcoin. Bitcoin is a new technology and innovation. In a country where people are used to traditional currencies, there are many financial technologies emerging, including centralized coins. This has created challenges. When people hear about Bitcoin, many think of it as a Ponzi scheme. They believe it's a scam or a way to get rich quickly. What I've observed is that most people fail to understand the difference between Bitcoin and centralized currencies. To truly appreciate Bitcoin, they need to experience it. Setting up a custodial wallet and explaining a transaction to them can help. Nyirenda:The second challenge is that people think Bitcoin is too complicated, especially in Africa, and here in Malawi, where the IT and ICT infrastructure is still underdeveloped. I’d say 70% of the population doesn’t have access to the internet. Even in our education system, we don’t learn about computers. It’s mainly by luck if someone has access to a computer and a network, allowing them to appreciate the technology.
YakiHonne: It seems to be common in many countries, where people think Bitcoin is a quick way to get rich. They see it as a scam or a Ponzi scheme. It's a big challenge to get people to believe in Bitcoin as a currency, rather than just their local currency. This is a real barrier in many economies. What principles guide your community, and how do you maintain trust and reliability in discussions? Simply saying, how do you keep the trust of the people?
Nyirenda:I’ll start with Bitcoin BOMA and then extend it to the people we interact with. In Bitcoin BOMA, even though we’re a collaboration, we have clear objectives and a philosophy. Ultimately, we model Bitcoin’s decentralized nature because it allows everyone to participate. In our coalition, we encourage the free flow of ideas and regularly meet to discuss how best to promote Bitcoin education. We focus on its social, economic, and environmental aspects. We assign tasks to each other and work hard to achieve the results. Nyirenda:Malawi has great potential, especially in the energy sector, where we could mine Bitcoin, but we lose a lot of electricity during generation. There were attempts to convince government-run institutions to embrace Bitcoin. However, most of these institutions are controlled by the government, and getting into politics is necessary to convince policymakers. It’s been a challenge because government systems are centralized. There’s a hierarchy to follow, and sometimes, even if a minister understands Bitcoin, it takes a long time to get it approved in parliament and passed into law.This has been one of our ongoing initiatives. Nyirenda:When I go out and interact with people, especially Malawians, I try to explain the transparency of Bitcoin by showing how a decentralized ledger works and how it’s different from traditional systems. I also explain that Bitcoin is reliable and that mismanagement isn’t possible with a decentralized system. Nyirenda:In a country where people are educated in a certain way and believe in competition and power, I often remind them that absolute power corrupts absolutely. I tell them that Bitcoin offers a different space where decentralization allows for a fairer system and benefits everyone. That’s how I try to explain it in simple terms.
YakiHonne: how do you educate your members and keep them updated on Bitcoin development time-to-time?
Nyirenda:For me, learning about Bitcoin is a lifelong process, with always unanswered questions and gaps to fill. I often study, read, and keep an eye on the developments in the Bitcoin community, especially in the African Bitcoin community. My role model is Kenya, particularly how they are enabling people to use Bitcoin through the Tando project. I believe that the value of Bitcoin is not just about holding and waiting for the price to rise, but rather as a tool that can help liberate the world. Nyirenda:Bitcoin is not just about accumulating wealth; I focus more on its role as a tool in the free market. Therefore, I continue to learn, even though I'm not a technical expert and my background is not in this field. I have worked in education, so I apply those skills to better understand Bitcoin and how it works. Nyirenda:I gather information from various sources to understand how Bitcoin works. At the same time, I compare it with the traditional monetary system, as that’s where I began, and it's my foundational layer. As for the Bitcoin BOMA community, I’m happy to say that we have two members with a strong background in economics. We often share interesting content and sometimes engage in debates. We also share many links and videos, learning from each other. Nyirenda:Especially in the Bitcoin Diploma Education Program, I give explanations, and I have peers who help analyze my course content. We remind each other and point out areas that need improvement. We constantly update each other on our progress, ensuring that our activities remain relevant, which helps us continue to improve.
YakiHonne: Does Bitcoin Boomer collaborate with the broader Bitcoin ecosystem, and which partnerships have had the greatest impact so far?
Nyirenda:I'll start with our collaboration with Trezor Academy. Last year, this was one of the most significant partnerships for us in Malawi. Trezor Academy focuses on Bitcoin education, and they provided us with a lot of support. Thanks to this collaboration, we were able to organize a seminar and graduate about 10 to 15 students. It was a major achievement for us. Nyirenda:Additionally, one of our members attended the African Bitcoin Conference held in Kenya, which was a pivotal opportunity. He had the chance to interact with Bitcoiners from across Africa. There were special guests, including nostr:npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m and through this exposure, he met the core developers in Kenya and the Tando developers in South Africa. These collaborations have given us insight into what other Bitcoin communities are doing, especially in their projects. Nyirenda:We also had a speaker from Bitcoin Boma who participated in an event in El Salvador. We are working towards making Malawi a Bitcoin node, and he is actively fostering that effort. Big shoutout to Ian Foster for his dedication. He will also be attending a conference in South Africa this January as a guest speaker. These collaborations have been very impactful, and I’m confident that we’ll see the results of these interactions in the future.
YakiHonne: So what challenges has your community faced so far and how have you overcome them while maintaining integrity?
Nyirenda:One of the challenges we face is related to resources, especially when it comes to our learning sessions. We mainly rely on our own resources, and we understand that quality lessons require specific equipment. While we're working toward acquiring these resources, we’re also making the most of what we have. We've agreed to work with what we have, and we believe we can still achieve our objectives. Nyirenda:Another challenge is the attitude towards Bitcoin in Malawi. Most people entering the crypto space have a “get rich quick” mentality. They focus more on the outcomes rather than the learning process. Many crypto traders are primarily interested in exploiting the benefits of Bitcoin. This is a challenge, especially when trying to teach people that Bitcoin is not just about making a profit, but also about liberation. Changing the traditional fiat mindset to embrace this new path is not easy. Nyirenda:Additionally, many people believe that if they invest their time, they must get a return. This is one of the challenges we're currently dealing with. Financial literacy in Malawi still has a long way to go. While people are aware of how economic shocks, especially currency devaluation, affect them, they often act out of desperation. The market is psychologically driven, and people are constantly looking for shortcuts to protect their wealth. When Bitcoin is introduced, it often raises doubts and skepticism. Nyirenda:However, there is no moment of hatred. Instead, we see the growing energy within the community, even if it's just coming from the heart, extending a significant impact on others. There’s a lot of potential and many possibilities ahead. Despite the challenges, we remain hopeful and excited about the future.
YakiHonne: In addition to wearing T-shirts and sparking curiosity, what other methods have you adopted to promote Bitcoin, and what results have you seen?
Nyirenda:First of all, I want to mention the Bitcoin BOMA education diploma program that’s currently running. This is one of the most significant initiatives we have at the moment. We are doing our best to attract people to dive into our education program. So far, the results have been very positive, especially in terms of numbers. People are curious and realize that this is something worth learning. Some have even acknowledged that what they've learned in the traditional education system is very different from the exposure they get from the diploma program. I’d say that’s one of the biggest impacts we've had in promoting Bitcoin. Nyirenda:If we have sufficient resources, we plan to implement further actions such as putting up banners, promoting Bitcoin, and positioning Malawi as a Bitcoin hub. Malawi has great potential, particularly in the tourism sector, with many tourists visiting the country. If we display banners saying “We accept Bitcoin,” it would be appreciated by many people. Personally, I’ve been encouraging businesses to start accepting Bitcoin. Nyirenda:We also have a Bitcoin BOMA Twitter account where we advocate for Bitcoin. We engage in discussions and comment on trends. In the coming months, we plan to host spaces and aim to conduct them in our local language, so more people can appreciate and learn about Bitcoin.
YakiHonne: We’ve reached the end of today’s session, and I must say, you’re doing an incredible job at Bitcoin BOMA. Your personal and collaborative efforts are truly impressive. I’m confident that in the next few years, we’ll be visiting Malawi for a Bitcoin conference. It’s clear that Malawi is heading in the right direction with you leading the way.
-
@ da18e986:3a0d9851
2025-01-22 23:49:06Since DVMs were introduced to Nostr in July 2023, we've witnessed remarkable growth - over 2.5 million DVM events (Kinds 5000-7000) and counting. Last fall, when Primal added custom feeds (Kind 5300 DVMs), we saw a 10x surge in DVM activity. To handle this growth, I've spent the last few months completely rewriting DVMDash.
The first version of DVMDash, still live at https://dvmdash.live, unfortunately uses full database table scans to compute the metrics. The code was simpler, but the computation ran on the database. This meant the only way to scale the system was to upgrade the database. Using managed databases (like AWS, Azure, Digital Ocean) beyond the lower tiers gets expensive quickly.
The other problem with the first version: it computes metrics globally (well... as global as you can get; there's no true global with Nostr). Global or all-time metrics aren't sustainable with a system that plans to analyze billions of events in the future (a long term goal for DVMDash). Especially metrics like the number of unique DVMs, Kinds, and Users. I spent more time than I care to admit on possible designs, and have settled on these design principles for now:
- Precise accurate metrics will only be computed for the last 30 days of DVM activity.
- At the turn of a new month, we will compute a snapshot of the last month's activity, and a snapshot per DVM and per Kind, and store them in a historical table. This way we can see what any given month in the past looked like from a bird's eye view with metrics like number of job requests, job results, a count of unique DVMs, kinds and users, which DVMs ran jobs on which kinds, etc. The monthly data will all be aggregate.
The goal of the new redesign is to support processing millions of DVM events an hour. Therefore we need to ensure we can horizontally scale the processing as the traffic increases. Horizontal scaling was the primary goal of this new redesign, and early results indicate it's working.
The new architecture for DVMDash uses a redis queue to hold events collected from relays. Then batches of events are pulled off of the queue by dvm event analyzers to compute metrics. Duplicating these analyzers is one way DVMDash can horizontally scale.
To see if increasing the number of dvm event analyzers improves speed, I ran a performance test on Digital Ocean using real DVM events collected from Jan. 1st 2024 to Jan 9th 2025, which includes more than 2.4 million events. The only difference between each run is the number of DVM event analyzers ranging from 1 to 6.
The first graph shows that adding more event analyzers has a significant speed improvement. With only one analyzer it took nearly an hour to process the 2.4 million events. With every added analyzer, there was a noticeable speedup, as can be seen in the graph. With n=6 analyzers, we were able to process all 2.4 million events in about 10 minutes.
When we look at the rate of processing shown in the second graph, we can see that we get up to 300k dvm events processed per minute when n=6, compared to just ~50k events processed when n=1.
While I did test beyond 6 analyzers, I found the sweet spot for the current infrastructure setup to be around 6 analyzers. This provides plenty of headroom above our current processing needs, which typically see less than a million events per month. Even at a million DVM events per day, DVMDash should be able to handle it with n=2 analyzers running. The most important takeaway is that DVMDash can now horizontally scale by adding more analyzers as DVM activity grows in the future.
The code to run these performance tests, either locally or on Digital Ocean (you'd need an API key), is in the dvmdash repo, so anyone can replicate these tests. There's a lot of nuance to scaling that I'm leaving out of this short article, and you can't get away from having to adjust database capacity (especially number of connections). The code for this test can be found in
experiments/test_batch_processing_scaling.py
and the code to produce the graphs is inexperiments/graph_batch_processing_scaling_data.py
. For now this is still in thefull-redesign
branch, soon it will be merged intomain
.The live version of dvmdash doesn't have these performance updates yet, a complete redesign is coming soon, including a new UI.
I've had my head down working on this rewrite, and couldn't move on to add new features until this was done. Thank you to the folks who made github issues, I'll be getting to those soon.
DVMDash is open source, please drop by and give us a feature request, bug report, pull request or star. Thanks to OpenSats for funding this work.
Github: https://github.com/dtdannen/dvmdash
Shoutout to nostr:npub12xeqxplp5ut4h92s3vxthrdv30j0czxz9a8tef8cfg2cs59r85gqnzrk5w for helping me think through database design choices.
-
@ fe41d17e:28df7452
2025-02-02 13:04:38Um es vorab klarzustellen, die einzigen Gesetze an die du dich wirklich halten musst sind die Naturgesetze, es ist deine eigene Entscheidung ob du einer einseitig vom Staat beschlossenen Auflage zustimmst oder nicht, solange du bereit bist, falls du erwischt wirst, die Konsequenzen über dich ergehen zu lassen.
Wenn du diese Unterdrückung nicht mehr haben möchtest braucht es eine Revolution um den Staat irrelevant werden zu lassen und um ihm seine Grundlage (das Geld) zu entziehen ohne dabei wie er selbst zu unmoralischen Methoden zu greifen.
Diese Revolution nennt sich Agorismus, sie wird dich unabhängig vom Staat machen und den Staat langfristig schwach/überflüssig werden lassen sobald es dir genug Leute gleichtun.
Die Revolution wird nicht leicht, sie wird dir nicht die sofortige Genugtuung verschaffen, die du möglicherweise empfindest, wenn du einen Zettel in die Wahlurne wirfst und dabei das Gefühl hast, etwas verändert zu haben. Eigentlich hast du nur denselben Leuten Macht verliehen, die seit Jahrhunderten die Politiker kontrollieren, dich ausrauben und unterdrücken. Garnichts hast du damit verändert.
Es wird schwierig werden. Es wird Eigeninitiative und Veränderungen in deinem Leben erfordern. Es wird ein zermürbender, unbefriedigender Weg sein, den viele als zu hart bezeichnen werden. Es wird Jahre über Jahre dauern, in denen die Leute dich dafür schief ansehen und du kaum Anerkennung bekommen wirst.
Hier ein paar wichtige Punkte um dich mit Agorismus vertraut zu machen:
-Wenn du bereits ein Libertärer bist, lies zuerst „Das neue Libertäre Manifest“ von Samuel Edward Konkin III. Es hat nur 30 Seiten, und wenn du damit nicht zumindest deinen Horizont erweitern kannst, dann kannst du genauso gut eine britische Flagge in Amerika schwenken, Tribut zollen und einen König fordern.
-Wenn du kein Libertärer bist, lies „Eine neue Freiheit: das libertäre Manifest“ von Murray Rothbard und anschließend „Das neue Libertäre Manifest“ von SEK3.
-Konzentriere dich in deinem Leben darauf, weniger bis keine Steuern zu zahlen.
-Finde Alternativen zum Fiatgeld und sei deine eigene Bank.
-Finde lokale Quellen für Lebensmittel und Produkte.
-Handel P2P auf freien Märkten.
-Suche nach Lösungen, die auf Dezentralisierung ausgerichtet sind.
-Baue eine gewisse Menge an Lebensmitteln an, auch wenn es nur Mikrogrün ist. Dafür sind keine großen Flächen erforderlich und du kannst diese gegen andere Lebensmittel eintauschen.
-Baue dein eigenes Unternehmen außerhalb von Konzernstrukturen auf.
-Konzentriere dich auf den Handel mit anderen Agoristen.
-Nutze jede Gelegenheit um deine Verachtung gegenüber dem Staat zu äußern.
-Verbreite Agorismus.
-Beschaffe dir Waffen.
-Vertraue nur agoristischen Medien, die unpolitisch sind. Denn jeder Journalist, der dich ermutigt, zu wählen oder innerhalb des Systems zu arbeiten, könnte gekauft oder kontrolliert sein. Agoristen, die behaupten, dass Politik nicht die Antwort ist, sind die einzigen, die die Menschen wirklich von den Kontrolleuren wegführen.
Die Herrscher dieser Welt sind sich durchaus darüber im Klaren, dass das Informationszeitalter ihren Interessen schadet. Daher arbeiten sie unermüdlich an der Schaffung psychologischer Operationen (PsyOps), kontrollierter Opposition, False-Flag-Aktionen und Ablenkungsmanövern, lass dich nicht täuschen.
Erstveröffentlichung am 12. Januar auf meinem X Profil; @realbunki
-
@ 77be3409:5c7c2736
2025-02-02 12:48:25RMD Law - Personal Injury Lawyers is excited to announce the launch of its new scholarship program, designed to empower students and highlight the values of responsibility, resilience, and learning from life’s unexpected moments. This $2,500 scholarship aims to support students in their educational journeys while encouraging creativity and personal growth.
Scholarship Details
Award Amount: $2,500 Submission Deadline: December 30, 2025 Winner Announced: January 15, 2026
Eligibility Requirements To apply, students must meet the following criteria: - Be at least 16 years old and a permanent legal resident of the United States. - Be currently enrolled in a U.S. college, university, or trade school OR graduating from high school in 2025. - Have a cumulative GPA of 3.0 or higher. - Follow RMD Law on social media to see the winner announcement. - Submit all required materials by the December 30, 2025, deadline
Application Requirements Applicants are required to submit:
- A copy of their most recent high school or college transcript.
- A creative and thoughtful essay (up to 1,000 words) responding to the following prompt:
Essay Prompt: “Oops, That Was Close!”
Tell us about a moment when you narrowly avoided disaster—whether it was a hilarious mishap, an embarrassing accident, or a close call with serious consequences. - What did you learn (if anything) from the experience? - Who was at fault and why? - What would the appropriate restitution (if any) be in that situation?
Note: Applicants are encouraged to use creativity, levity, and personal insights to share their story. Let your unique voice shine through!
Selection Criteria The winner will be chosen based on: - Originality and creativity in their essay. - Relevance to the prompt. - Clarity and thoughtfulness of their response. The scholarship recipient will be announced on January 15, 2026.
How to Apply 1. Students can submit their application materials through the official RMD Law scholarship webpage: https://www.rmdlaw.com/scholarship/ 2. Follow RMD Law on social media to stay updated on the announcement and other initiatives.
About RMD Law
RMD Law is a leading personal injury law firm committed to providing exceptional legal services and making a positive impact in the communities it serves. Through initiatives like the scholarship program, RMD Law seeks to empower individuals and foster the next generation of leaders.
-
@ eee391ee:8d0b97c2
2025-01-22 16:42:17Amber 3.1.9
- Add missing logs for relay errors
- Change listen for new connections button text and icons
Download it with zap.store, Obtainium, f-droid or download it directly in the releases page
If you like my work consider making a donation
Verifying the release
In order to verify the release, you'll need to have
gpg
orgpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:bash gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
Once you have his PGP key you can verify the release (assuming
manifest-v3.1.9.txt
andmanifest-v3.1.9.txt.sig
are in the current directory) with:bash gpg --verify manifest-v3.1.9.txt.sig manifest-v3.1.9.txt
You should see the following if the verification was successful:
bash gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03 gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>"
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:
bash cat manifest-v3.1.9.txt
One can use the
shasum -a 256 <file name here>
tool in order to re-compute thesha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly. -
@ b83e6f82:73c27758
2025-01-22 16:29:15Citrine 0.7.1
- Add the restore follows button back
- Show notification when backing up database
- Listen for pokey broadcasts
Download it with zap.store, Obtainium, f-droid or download it directly in the releases page
If you like my work consider making a donation
Verifying the release
In order to verify the release, you'll need to have
gpg
orgpg2
installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:bash gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
Once you have his PGP key you can verify the release (assuming
manifest-v0.7.1.txt
andmanifest-v0.7.1.txt.sig
are in the current directory) with:bash gpg --verify manifest-v0.7.1.txt.sig manifest-v0.7.1.txt
You should see the following if the verification was successful:
bash gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03 gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>"
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:
bash cat manifest-v0.7.1.txt
One can use the
shasum -a 256 <file name here>
tool in order to re-compute thesha256
hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly. -
@ 0463223a:3b14d673
2025-02-02 12:22:46I’m totally wasted! I don’t mean off my head on drugs, I mean absolutely physically and mentally exhausted.
Lugging heavy PA equipment up and down stairs, plus mixing shows is a lot and at my age I’m struggling with it. Yesterday was a write off due to exhaustion. My wife and I went to the cinema, and I slept through the film. A shame, it was something I wanted to see but I was toast. I went to bed at 8pm and slept for over 12 hours. I still feel wrecked today.
Live sound was always a sort of plan B. For a number of years teaching and performing with a band or a DJ was enough to get by on. I was comfortable, financially speaking. That was until about between 2012-14, that’s when we really felt the effects of the post 2008 crash. While a lot of noise was made about the initial event, reality for the likes of me was a slow and steady decline. At that time I was leading workshops with kids with difficult backgrounds, many kids in care due to abuse and neglect. That was a solid 40% of my income, another 30% came from teaching Sound Production at a local university and the final 30% from shows.
2014 cutbacks ripped services to shreds and a few friends lost jobs. Since then, doing live sound kept the rent and bills paid but fast forward to 2025 and I’m way too tired for this shit! I hate admitting it but my earnings probably peaked around 2008 with a bump in tours from 2017 till Covid. Since then earnings have been steady in £'s but getting wiped out by inflation. In fact I had decent acounts this year but every month I'm broke by the time bills and basics have been taken care of. I LOVE mixing live music and I’m pretty good at it. I’ve had musicians call me ‘musical’ which is the highest compliment but I’m totally fucked still 2 days after Friday’s show. It's unsustainable.
I’m quitting live sound unless some touring comes up again, touring is different, living on a bus for 3 weeks pays the same as 3 months of local work and I just mix, no lifting gear. The band I tour with are based in the US and only come to the UK/EU every couple of years. I get odd trips away with other artists but they’re usually fly out EU gigs. 1 or 2 shows then fly home, plus they're irregular.
Right now I’m more interested to learn ways of making income online, I started the Kali Mera Show to learn self hosting content. Committing to a project each morning has done wonders for my mental health, cutting down on morning doom scrolling. It’s been highly successful in that regard but not so much financially. However this is jst phase 1. I’m learning the tech, learning the production and making as many mistakes as possible while the stakes are low. I’m very happy 10 or so people enjoy the show on a daily basis. Tiny numbers but I don’t fuck with YouTube or the other big tech platforms. Fuck them!
Phase 2 involves getting premises and broadening the services I can produce, focussing on content for others, getting some opportunities happening for young talent, arranging meet ups and setting up a hub to bring together the crazy, talented people I know. It’s going to be tough, I’m in a run down area, there’s not much money here (relatively speaking) but it’s an area I really dig and want to make better.
Why am I telling you this? I’m writing this as a means of getting my brain straight and sharing it because I’m open to improving myself. I see people doing interesting shit here and that helps with motivation and confidence. My only social media for the last 6 years has been the Fediverse and much as I love it, there’s a gloomier outlook there. The world is a strange place with so much bad shit but out of 8 or so billion people, I can only take on so much. Building shit in my own local community and provide facilities for online wins sounds way more productive and helpful in some small way.
I accept we’re all going to hell in a handcart but may as well enjoy the ride…
There’s much to learn, I’ve only ever been ‘in business’ for a short time in my life (despite always being freelance) and I sort of gave up on my previous attempt. Had I paid more attention I could’ve built a strong YouTube presence but I’m not into being a vehicle for companies to push their products, nor do I want to teach people music online. That market is now heavily saturated and very, very boring as far as I’m concerned. My heart wasn’t in it, even back in 2015. I’m not an influencer.
With a real life space there’s premises, business rates, and investors to consider, as well as developing services that people are actually happy to part cash with. It’s going to be hard but different hard to physically lifting sub-bass speakers up and down winding staircases! I don’t want to talk too much game, it’s results that matter but wasting days to exhaustion doesn’t help. It’s time to hang up my headphones and focus (FOCUS YOU FUCKING FUCK!).
Maybe you’re reading this and thought ‘shit, this guy’s totally deluded’. That’s cool. Tell me. I value feedback. A fair few cats here give life advice so I’ll assume you might know what you’re talking about...
-
@ d1795b1a:15ab2129
2025-02-02 11:45:38The Ego is an Illusion – and Yet, We Can Shape It
Carl Jung spoke of the Shadow Self—the repressed parts of our psyche that unconsciously influence our lives. Buddhism, on the other hand, teaches that there is no self at all—our ego is an illusion, a fleeting construct that we cling to out of fear of emptiness.
These two perspectives seem to contradict each other. One tells us to integrate our hidden self, the other to dissolve it completely. But what if both are only half the picture?
I believe the Self is neither a fixed reality nor a mere illusion—it is a shapeable construct. If that is true, then the path is not to destroy the Ego-Self or blindly follow it, but to consciously shape it.
Between the Shadow and Emptiness
Our Ego-Self is our conscious identity—our thoughts, memories, and beliefs. Jung describes the Self as the totality of both the conscious and unconscious mind. Hidden in this unconscious space is the Shadow Self, containing everything we deny, suppress, or refuse to acknowledge. For Jung, the path to wholeness is integration—bringing light into the dark corners of the psyche.
Buddhism, however, goes further. It questions whether the Self exists at all. Our thoughts and emotions arise and disappear, our self-image is ever-changing—so why do we cling to something so impermanent?
Both views seem to offer opposite solutions: \ • Jung: Become WHOLE by integrating your Shadow. \ • Buddha: Become FREE by seeing the Self as an illusion.
But what if the synthesis of both is the key?
The Self as a Shapeable Reality
If the Self is not fixed but fluid, then the path forward is neither pure integration nor total dissolution but conscious creation. \ \ • Acknowledge the Shadow Self instead of fighting it. \ • See the Ego-Self not as absolute truth but as a flexible tool. \ • Engage the Solar Plexus—the center of the Unconscious Mind—through breathwork and self-awareness. \ • Use the Vagus Nerve as a bridge between conscious thought and unconscious emotion, actively shaping our beliefs and behaviors.
This aligns with New Thought philosophy, which suggests that our thoughts shape not only our perception but our reality itself. If we embrace this, the question is no longer “Who am I?” but rather: “Who do I want to be—and how can I create that Self?”
The Art of Shaping Yourself
Perhaps the Self is neither a rigid entity nor a complete illusion but a story we tell ourselves—a story we can rewrite. The key is not to destroy the Ego-Self but to use it consciously, rather than being used by it.
So the real question is not: “Does the Self exist?”
But rather: “How aware are we of the fact that we are shaping it every moment?”
-
@ 5d4b6c8d:8a1c1ee3
2025-01-22 16:20:47I just completed my 5th steps challenge on Workit (only available on iOS, sorry).
This challenge was 10k steps every day for two weeks. Of course, these were the coldest two weeks of the year, so many of those steps were indoors.
The buy-in/stake was 25k sats and the payout was 28,608, which was a little less than I expected. I don't think the winners of the bonus rewards have been announced yet, so there may still be another 40k coming my way (but, probably not).
So far, I've netted over 50k on these challenges. What a great way to stay healthy, while stacking sats.
originally posted at https://stacker.news/items/860122
-
@ 2e8970de:63345c7a
2025-02-02 11:44:40https://www.nature.com/articles/s41598-024-68817-6
Sharing this study from half a year ago since in some sense AI made a discovery here that humans could not make. Big caveat: humans directed and made a machine learning model to do this.
The larger point still stands tho. In recent weeks there has been big discussions if AI can surpass human intelligence or only asymptotically approach it on a superhuman width of topics.
originally posted at https://stacker.news/items/873266
-
@ b17fccdf:b7211155
2025-01-22 10:39:19What's changed
- New bonus guide dedicated to install/upgrade/uninstall PostgreSQL
- Modified the LND guide to use PostgreSQL instead of bbolt
- Modified the Nostr relay guide to use PostgreSQL instead of SQLite (experimental)
- Modified the BTCPay Server bonus guide according to these changes
- Used the lndinit MiniBolt organization fork, to add an extra section to migrate an existing LND bbolt database to PostgreSQL (🚨⚠️Experimental - use it behind your responsibility⚠️🚨)
- New Golang bonus guide as a common language for the lndinit compilation
- Updated LND to v0.18
- New Bitcoin Core extra section to renovate Tor & I2P addresses
- New Bitcoin Core extra section to generate a full
bitcoin.conf
file - Rebuilt some homepage sections and general structure
- Deleted the
$
symbol of the commands to easy copy-paste to the terminal - Deleted the initial incoming and the outgoing rules configuration of UFW, due to it being by default
🪧 PD: If you want to use the old database backend of the LND or Nostr relay, follow the next extra sections:
- Use the default bbolt database backend for the LND
- Use the default SQLite database backend for the Nostr relay
⚠️Attention⚠️: The migration process was tested on testnet mode from an existing bbolt database backend to a new PostgreSQL database using lndinit and the results were successful. However, It wasn't tested on mainnet, according to the developer, it is in experimental status which could damage your existing LND database.🚨 Use it behind your responsibility 🧼
🔧 PR related: https://github.com/minibolt-guide/minibolt/pull/93
♻️ Migrate the PostgreSQL database location
Attention!! These instructions are invalid since the latest changes applied to the PostgreSQL bonus guide. See more information on the recent associated post by clicking ~ > HERE < ~
If you installed NBXplorer + BTCPay Server before 05/06/2024, it is probably you have the database of the PostgreSQL cluster on the default path (
/var/lib/postgresql/16/main/
), follow the next instructions to migrate it to the new dedicated location on/data/postgresdb
folder:- With user
admin
create the dedicated PostgreSQL data folder
sudo mkdir /data/postgresdb
- Assign as the owner to the
postgres
user
sudo chown postgres:postgres /data/postgresdb
- Assign permissions of the data folder only to the
postgres
user
sudo chmod -R 700 /data/postgresdb
- Stop NBXplorer and BTCPay Server
sudo systemctl stop nbxplorer && sudo systemctl stop btcpayserver
- Stop PostgreSQL
sudo systemctl stop postgresql
- Use the rsync command to copy all files from the existing database on (
/var/lib/postgresql/16/main
) to the new destination directory (/data/postgresdb
)
sudo rsync -av /var/lib/postgresql/16/main/ /data/postgresdb/
Expected output:
``` sending incremental file list ./ PG_VERSION postgresql.auto.conf postmaster.opts postmaster.pid base/ base/1/ base/1/112 base/1/113 base/1/1247 base/1/1247_fsm base/1/1247_vm base/1/1249 base/1/1249_fsm base/1/1249_vm [...] pg_wal/000000010000000000000009 pg_wal/archive_status/ pg_xact/ pg_xact/0000
sent 164,483,875 bytes received 42,341 bytes 36,561,381.33 bytes/sec total size is 164,311,368 speedup is 1.00 ```
- Edit the PostgreSQL data directory on configuration, to redirect the store to the new location
sudo nano /etc/postgresql/16/main/postgresql.conf --linenumbers
- Replace the line 42 to this. Save and exit
data_directory = '/data/postgresdb'
- Start PostgreSQL to apply changes and monitor the correct status of the main instance and sub-instance monitoring sessions before
sudo systemctl start postgresql
- You can monitor the PostgreSQL main instance by the systemd journal and check the log output to ensure all is correct. You can exit the monitoring at any time with Ctrl-C
journalctl -fu postgresql
Example of the expected output:
Nov 08 11:51:10 minibolt systemd[1]: Stopped PostgreSQL RDBMS. Nov 08 11:51:10 minibolt systemd[1]: Stopping PostgreSQL RDBMS... Nov 08 11:51:13 minibolt systemd[1]: Starting PostgreSQL RDBMS... Nov 08 11:51:13 minibolt systemd[1]: Finished PostgreSQL RDBMS.
- You can monitor the PostgreSQL sub-instance by the systemd journal and check log output to ensure all is correct. You can exit monitoring at any time with Ctrl-C
journalctl -fu postgresql@16-main
Example of the expected output:
Nov 08 11:51:10 minibolt systemd[1]: Stopping PostgreSQL Cluster 16-main... Nov 08 11:51:11 minibolt systemd[1]: postgresql@16-main.service: Succeeded. Nov 08 11:51:11 minibolt systemd[1]: Stopped PostgreSQL Cluster 16-main. Nov 08 11:51:11 minibolt systemd[1]: postgresql@16-main.service: Consumed 1h 10min 8.677s CPU time. Nov 08 11:51:11 minibolt systemd[1]: Starting PostgreSQL Cluster 16-main... Nov 08 11:51:13 minibolt systemd[1]: Started PostgreSQL Cluster 16-main.
- Start NBXplorer and BTCPay Server again
sudo systemctl start nbxplorer && sudo systemctl start btcpayserver
- Monitor to make sure everything is as you left it. You can exit monitoring at any time by pressing Ctrl+C
journalctl -fu nbxplorer
journalctl -fu btcpayserver
Enjoy it MiniBolter! 💙
-
@ 3efdaebb:3e0d2681
2025-01-22 01:08:58Hey Nostr! It’s App Store release day for Damus. Thanks again to our loyal Purple subscribers for helping us continue to improve the UX and pointing out important changes and fixes. Highlights of Version 1.12:
Added
- Render Gif and video files while composing posts (Swift Coder)
- Add profile info text in stretchable banner with follow button (Swift Coder)
- Paste Gif image similar to jpeg and png files (Swift Coder)
Changed
- Improved UX around the label for searching words (Daniel D’Aquino)
- Improved accessibility support on some elements (Daniel D’Aquino)
Fixed
- Fixed issue where the "next" button would appear hidden and hard to click on the create account view (Daniel D’Aquino)
- Fix non scrollable wallet screen (Swift Coder)
- Fixed suggested users category titles to be localizable (Terry Yiu)
- Fixed GradientFollowButton to have consistent width and autoscale text limited to 1 line (Terry Yiu)
- Fixed right-to-left localization issues (Terry Yiu)
- Fixed AddMuteItemView to trim leading and trailing whitespaces from mute text and disallow adding text with only whitespaces (Terry Yiu)
- Fixed SideMenuView text to autoscale and limit to 1 line (Terry Yiu)
- Fixed an issue where a profile would need to be input twice in the search to be found (Daniel D’Aquino)
- Fixed non-breaking spaces in localized strings (Terry Yiu)
- Fixed localization issue on Add mute item button (Terry Yiu)
- Replace non-breaking spaces with regular spaces as Apple's NSLocalizedString macro does not seem to work with it (Terry Yiu)
- Fixed localization issues in RelayConfigView (Terry Yiu)
- Fix duplicate uploads (Swift Coder)
- Remove duplicate pubkey from Follow Suggestion list (Swift Coder)
- Fix Page control indicator (Swift Coder)
- Fix damus sharing issues (Swift Coder)
- Fixed issue where banner edit button is unclickable (Daniel D’Aquino)
- Handle empty notification pages by displaying suitable text (Swift Coder)
-
@ fd208ee8:0fd927c1
2025-02-02 10:33:19GitCitadel Development Operations
We, at GitCitadel, have been updating, moving, and rearranging our servers, for quite some time. As a rather large, complex, sprawling project, we have the infrastructure setup to match, so we've decided to give you all a quick run-down of what we are doing behind-the-scenes.
Supplier Coordination
Our first task, this week, was figuring out who would host what where. We have four different locations, where our infra is stored and managed, including two locations from our suppliers. We got that straightened out, quickly, and it's all slowly coming together and being connected and networked. Exciting to watch our DevOps landscape evolve and all of the knowledge-transfer that the interactions provide.
OneDev Implementation
Our biggest internal infra project this week was the migration of all of our issues from Jira, build scripts from Jenkins, and repos from GitHub to a self-hosted OneDev instance. In the future, all of our internal build, test, issue, patch/PR, etc. effort will take place there. We also have a separate repo there for communicating with external developers and suppliers.
Our team's GitHub projects will be demoted to mirrors and a place for external devs to PR to. Public issues and patches will continue to be managed over our self-hosted GitWorkshop instance.
We're especially glad to finally escape the GitHub Gulag, and avoid being bled dry by Jira fees, without having to give up the important features that we've come to know and love. So, yay!
Next Infrasteps
Automated Testing
Now, that we have everything tied up in one, neat, backed-up package, we can finally move on to the nitty-gritty and the dirty work. So, we're rolling up our sleeves and writing the Selenium smoke test for our Alexandria client. We'll be running that in Docker containers containing different "typical Nostr" images, such as Chrome browser with Nostr Connect signing extension, or Firefox browser with Nos2x-fox extension. Once we get the Nsec Bunker and Amber logins going, we'll add test cases and images for them, as well. (Yes, we can do Bunker. I hope you are in awe at our powers).
We are also designing an automated infrastructure test, that will simply rattle through all the various internal and external websites and relays, to make sure that everything is still online and responsive.
After that, a Gherkin-based Behave feature test for Alexandria is planned, so that we can prevent regression of completed functionality, from one release to the next.
The Gherkin scenarios are written and attached to our stories before development begins (we use acceptance tests as requirements), a manual test-execution is then completed, in order to set the story to Done. These completed scenarios will be automated, following each release, with the resulting script linked to from the origin story.
Automated Builds
As the crowning glory of every DevOps tool chain stands the build automation. This is where everything gets tied together, straightened out, configured, tested, measured, and -- if everything passes the quality gates -- released. I don't have to tell you how much time developers spend staring at the build process display, praying that it all goes through and they can celebrate a Green Wave.
We are currently designing the various builds, but the ones we have defined for the Alexandria client will be a continuous delivery pipeline, like so:
This will make it easier for us to work and collaborate asynchronously and without unnecessary delays.
Expanding the Status Page
And, finally, we get to the point of all of this busyness: reporting.
We are going to have beautiful reports, and we are going to post them online, on our status page. We will use bots, to inform Nostriches of the current status of our systems, so go ahead and follow our GitCitadel DevOps npub, to make sure you don't miss out on the IT action.
Building on stone
All in all, we're really happy with the way things are humming along, now, and the steady increase in our productivity, as all the foundational work we've put in starts to pay off. It's getting easier and easier to add new team members, repos, or features/fixes, so we should be able to scale up and out from here. Our GitCitadel is built on a firm foundation.
Happy building!