-
@ d360efec:14907b5f
2025-02-14 05:21:58ภาพรวม XRPUSDT (OKX):
XRPUSDT กำลังแสดงสัญญาณที่น่าสนใจและมีความซับซ้อน แนวโน้มใน Timeframe ใหญ่ (Day) เริ่มเป็นขาขึ้น แต่ Timeframe กลาง (4H) เริ่มอ่อนแรง และ Timeframe เล็ก (15m) เป็นขาลง ทำให้เกิดความขัดแย้งที่ต้องระมัดระวัง
วิเคราะห์ทีละ Timeframe:
(1) TF Day (รายวัน): https://www.tradingview.com/x/3EbxjOgV/
- แนวโน้ม: เริ่มเป็นขาขึ้น (Early Uptrend) หลังจากราคา Breakout EMA 50 ขึ้นมาได้
- SMC:
- Break of Structure (BOS): มี BOS ด้านบน (Breakout EMA 50)
- Change of Character (CHoCH): ยังไม่ชัดเจน
- Higher High (HH) & Higher Low (HL): เพิ่งเริ่มก่อตัว (ยังไม่ชัดเจน)
- EMA:
- ราคาอยู่เหนือ EMA 50 (สีเหลือง) และ EMA 200 (สีขาว)
- EMA 50 และ EMA 200 กำลังจะเกิด Golden Cross
- Money Flow (LuxAlgo):
- สีเขียวเป็นส่วนใหญ่ แสดงถึงแรงซื้อที่ยังคงมีอยู่
- มีแท่งสีแดงแทรกบ้าง แสดงถึงการขายทำกำไร
- Volume Profile:
- Volume หนาแน่นบริเวณ EMA 50
- แท่งเทียน:
- แท่งเทียนล่าสุดเป็นสีเขียว แสดงถึงแรงซื้อ
- แนวรับ: EMA 50, EMA 200
- แนวต้าน: 0.6448 (High ก่อนหน้า)
- สรุป: แนวโน้มเริ่มเป็นขาขึ้น แต่ยังอยู่ในช่วงเริ่มต้น
(2) TF4H (4 ชั่วโมง): https://www.tradingview.com/x/nARcdWWp/
- แนวโน้ม: เริ่มไม่แน่นอน (พักตัว, ทดสอบแนวรับ) หลังจากเป็นขาขึ้นระยะสั้น
- SMC:
- Break of Structure (BOS): มี BOS ด้านบน (ก่อนหน้านี้)
- Change of Character (CHoCH): ไม่ชัดเจน
- Higher High (HH) & Higher Low (HL): เริ่มไม่ชัดเจน
- มี Equal Highs (EQH)
- EMA:
- EMA 50 กำลังถูกทดสอบ
- EMA 200 เป็นแนวรับถัดไป
- Money Flow (LuxAlgo):
- เขียวและแดงผสมกัน แสดงถึงความไม่แน่นอน
- แท่งสีแดงเริ่มยาวขึ้น แสดงถึงแรงขายที่เข้ามา
- Volume Profile:
- Volume หนาแน่นบริเวณ EMA 50
- แท่งเทียน:
- แท่งเทียนล่าสุด เป็น Doji
- แนวรับ: EMA 50, EMA 200, บริเวณ 0.50-0.52
- แนวต้าน: บริเวณ High ก่อนหน้า
- สรุป: แนวโน้มเริ่มไม่แน่นอน, มีแรงขายเข้ามา, EMA 50 เป็นจุดสำคัญ
(3) TF15 (15 นาที): https://www.tradingview.com/x/NI2wqamj/
- แนวโน้ม: ขาลง (Downtrend) ระยะสั้น
- SMC:
- Break of Structure (BOS): มี BOS ด้านล่าง
- Change of Character (CHoCH): มีทั้งด้านบนและด้านล่าง
- Lower Highs (LH) และ Lower Lows (LL)
- EMA:
- EMA 50 และ EMA 200 กลายเป็นแนวต้าน
- Money Flow (LuxAlgo):
- สีแดงเป็นส่วนใหญ่ แสดงถึงแรงขาย
- Volume Profile:
- Volume สูง
- แนวรับ: บริเวณ Low ล่าสุด
- แนวต้าน: EMA 50, EMA 200, บริเวณ 0.54
- สรุป: แนวโน้มขาลง, แรงขายมีอิทธิพล
สรุปภาพรวมและกลยุทธ์ (XRPUSDT):
- แนวโน้มหลัก (Day): เริ่มเป็นขาขึ้น
- แนวโน้มรอง (4H): เริ่มไม่แน่นอน, พักตัว
- แนวโน้มระยะสั้น (15m): ขาลง
- Money Flow:
- Day: แรงซื้อยังคงมี
- 4H: แรงซื้อและแรงขายผสมกัน, แรงขายเริ่มเข้ามา
- 15m: แรงขายมีอิทธิพล
- กลยุทธ์:
- Wait & See (ดีที่สุด): รอความชัดเจน
- Buy on Dip (Day, 4H) - เสี่ยงสูงมาก: ต้องรอสัญญาณกลับตัวใน TF15
- Short (15m, เสี่ยงสูง): ถ้าไม่สามารถ Breakout EMA/แนวต้านได้
คำแนะนำ:
- ความขัดแย้งของ Timeframes: ยังคงมีอยู่
- Money Flow: Day เป็นบวก, 4H เริ่มไม่แน่นอน, 15m เป็นลบ
- EMA 50 (TF4H): จุดสำคัญ
- ถ้าไม่แน่ใจ อย่าเพิ่งเข้าเทรด
Disclaimer:* การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-
@ d360efec:14907b5f
2025-02-14 04:13:06Bitcoin (BTCUSDT) กำลังแสดงสัญญาณที่น่าสนใจ โดยรวมแล้วแนวโน้มระยะยาวยังเป็นขาขึ้น แต่ระยะสั้นมีความผันผวนและมีการปรับฐานลงมา
วิเคราะห์ทีละ Timeframe:
(1) TF Day (รายวัน): https://www.tradingview.com/x/s9CAaSKQ/
- แนวโน้ม: ขาขึ้น (Uptrend) แข็งแกร่ง
- SMC:
- Higher Highs (HH) และ Higher Lows (HL) อย่างต่อเนื่อง
- Break of Structure (BOS) ด้านบนหลายครั้ง
- ไม่มีสัญญาณการกลับตัวเป็นขาลง
- EMA:
- ราคาอยู่เหนือ EMA 50 (เส้นสีเหลือง) และ EMA 200 (เส้นสีขาว)
- EMA 50 และ EMA 200 เรียงตัวแบบ Golden Cross (EMA 50 ตัด EMA 200 ขึ้น)
- Money Flow (LuxAlgo):
- โดยรวมเป็นสีเขียว แสดงถึงแรงซื้อที่ยังคงมีอิทธิพลเหนือกว่า
- มีแท่งสีแดงแทรกบ้าง แสดงถึงการขายทำกำไร
- Volume Profile:
- Volume หนาแน่นที่บริเวณ 96,000 - 98,000 (ซึ่งตอนนี้กลายเป็นแนวรับไปแล้ว)
- แท่งเทียน:
- แท่งเทียนล่าสุดเป็นสีแดง แสดงถึงแรงขาย แต่ไส้เทียนด้านล่างยาว แสดงว่ามีแรงซื้อกลับเข้ามาบ้าง
- แนวรับ: EMA 50, EMA 200, บริเวณ 96,000 - 98,000
- แนวต้าน: 109,998.9 (High เดิม)
- สรุป: แนวโน้มขาขึ้นยังคงแข็งแกร่ง Buy on Dip ยังคงเป็นกลยุทธ์หลัก
(2) TF4H (4 ชั่วโมง): https://www.tradingview.com/x/KsuVdl2e/
- แนวโน้ม: ขาขึ้น (Uptrend) แต่มีการพักตัวลงมา (Pullback)
- SMC:
- Higher Highs (HH) และ Higher Lows (HL)
- Break of Structure (BOS) ด้านบน
- ราคาพักตัวลงมา แต่ยังไม่เสียโครงสร้างขาขึ้น
- มี Equal Highs (EQH) บริเวณ 109,998.9
- EMA:
- EMA 50 กำลังถูกทดสอบ
- EMA 200 เป็นแนวรับถัดไป
- Money Flow (LuxAlgo):
- โดยรวมเป็นสีเขียว แต่เริ่มมีแท่งสีเขียวสั้นลง และมีแท่งสีแดงยาวขึ้น แสดงว่าแรงซื้อเริ่มอ่อนแรง และมีแรงขายเข้ามา
- Volume Profile:
- Volume หนาแน่นที่บริเวณ 96,000 - 98,000
- แท่งเทียน:
- แท่งเทียนล่าสุดเป็นสีแดง แสดงถึงแรงขาย
- แนวรับ: EMA 50, EMA 200, บริเวณ 96,000 - 98,000
- แนวต้าน: 109,998.9 (EQH, High เดิม)
- สรุป: แนวโน้มขาขึ้นยังไม่เสีย แต่เริ่มมีสัญญาณเตือน (Money Flow อ่อนแรง, ราคาพักตัว)
(3) TF15 (15 นาที): https://www.tradingview.com/x/DSrpSjn6/
- แนวโน้ม: Sideways Down (แกว่งตัวลง) หลังจากพยายาม Breakout แต่ไม่สำเร็จ
- SMC:
- Break of Structure (BOS) ด้านล่าง (หลุดแนวรับย่อยๆ)
- Change of Character (CHoCH) ทั้งด้านบนและด้านล่าง
- Lower Highs (LH) และ Lower Lows (LL) เริ่มก่อตัว
- Equal Highs (EQH) หลายจุด
- EMA:
- EMA 50 และ EMA 200 กลายเป็นแนวต้าน
- Money Flow (LuxAlgo):
- สีแดงมีอิทธิพลเหนือกว่า แสดงถึงแรงขาย
- Volume Profile:
- Volume หนาแน่นที่บริเวณ 97,000-97,200 (กลายเป็นแนวต้าน)
- แนวรับ: บริเวณ Low ล่าสุด
- แนวต้าน: EMA 50, EMA 200, บริเวณ 96,000, 96,800, 97,000-97,200
- สรุป: แนวโน้มระยะสั้นเป็นขาลง, แรงขายยังมีอยู่
สรุปภาพรวมและกลยุทธ์ (BTCUSDT):
- แนวโน้มหลัก (Day, 4H): ขาขึ้น (Uptrend)
- แนวโน้มระยะสั้น (15m): ขาลง (Downtrend) / Sideways Down
- Money Flow:
- Day: แรงซื้อยังแข็งแกร่ง
- 4H: แรงซื้อเริ่มอ่อนแรง, แรงขายเริ่มเข้ามา
- 15m: แรงขายมีอิทธิพลเหนือกว่า
- กลยุทธ์:
- Wait & See (ดีที่สุด): รอความชัดเจน เนื่องจากความขัดแย้งระหว่าง Timeframes
- Buy on Dip (Day, 4H) - ความเสี่ยงสูงมาก: ต้องรอสัญญาณกลับตัวใน TF15
- Short (15m, ความเสี่ยงสูงมาก): ถ้าไม่สามารถ Breakout EMA/แนวต้านได้
คำแนะนำ:
- ความขัดแย้งของ Timeframes: ยังคงมีอยู่
- Money Flow: Day เป็นบวก, 4H เริ่มเป็นลบ, 15m เป็นลบ
- EMA 50 (TF4H): จุดสำคัญ
- ถ้าไม่แน่ใจ อย่าเพิ่งเข้าเทรด
Disclaimer:* การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-
@ 3eba5ef4:751f23ae
2025-02-14 03:52:48🍨Your weekly byte of the latest updates from the Bitcoin ecosystem!
Crypto Insights
Solving the Optimal Cluster Linearization Problem With DeepSeek
Stefan Richter (stefanwouldgo) found a 1989 paper through DeepSeek R1 that provides a solid solution to the problem of optimal cluster linearization. The paper presents a proven algorithm that efficiently finds the subset of transactions with the highest fees; if this subset is included in a block, it is topologically valid.
New Class in Cluster Mempool Improves Transaction Handling and Performance
The introduction of the
TxGraph
class in Cluster Mempool enhances transaction handling by encapsulating the transaction graph, focusing on effective fees, sizes, and dependencies. It enables batched and lazy updates for more efficient mempool operations, with improvements in transaction prioritization, incentive compatibility, and performance. This design simplifies the code by abstracting graph management, allowing for easier validation and future optimizations.More details in this pull request.
Independent Mining Still Feasible
Two independent miners recently mined Bitcoin blocks:
-
Block 881432 by 256 Foundation, a public organization promoting open-source Bitcoin mining. The group combined the hash rate from over 300 participants with the goal of breaking up the mining patent monopolies of large pools, making Bitcoin and free technology more accessible to all.
-
Block 881676 by the open-source home mining hardware solo.ckpool, using hash rate equivalent to thousands of BitAxe devices.
This demonstrates that independent miners can still compete, reinforcing Bitcoin’s decentralization and censorship resistance.
6-Block Confirmation No Longer Enough, Mining Centralization Impacts Bitcoin Security
Bitcoin Core developer Luke Dashjr posted that he intended to update the 6-blocks-to-confirm target in the Knots wallet GUI. However, he found that due to Antpool controlling around 48% of the network's hash rate, more than 800 block confirmations would be required to achieve 95% security. He also noted that many pools, like Braiins and ViaBTC, are actually Antpool under different names.
Payjoin Development Progress Review
Spiral reviewed the development progress of Payjoin, which allows for including an additional input in a payment transaction to enhance privacy. The article also mentions that by using joint batching to optimize fees, Payjoin reduces transaction costs and increases network efficiency. Moreover, when both parties contribute inputs, Payjoin helps protect privacy by breaking common blockchain monitoring assumptions, making it harder for third parties to track payment amounts and private spending behaviors.
Block Size Report Reveals: Growth Partly Limited by Miner Policies and Bitcoin Core Defaults
The Block Size Report, published by Mempool research, uses data-driven analysis to examine the evolution of block size in Bitcoin from its inception to February 2025. It discusses changes in block size post-SegWit upgrade and reveals how growth has been partly limited by miner policies and Bitcoin Core defaults over the years. The report concludes with predictions about the growth of Bitcoin’s blockchain in the coming years.
Tutorial on Becoming an Advanced Nostr User With Sats Cashback
Rizful published a guide on how to become an advanced Nostr user and set up the self-owned Lightning node. After completing the tutorial, users can receive 5,000 sats via zap cashback.
Build a Smart Card for Bitcoin and Nostr Event Signing for Under $25
The 100% open-source smart card Satochip allows users to build their own signing device in just 10 minutes under 25 USD. Satochip's advantages include:
-
Affordable and widely available
-
Dual interface: supports both NFC (contactless) and Chip (contact) modes
-
Minimal electronics, reducing the attack surface
-
Enhanced security based in Secure Element
Bitcoin at the Crossroads of AI Revolution and Sovereign Evolution
CKBEcoFund shared their insights from the talk at The Satoshi Roundtable, discussing several macro issues including the dominance of artificial intelligence, Bitcoin's security, scalability, sovereignty, and national Bitcoin strategic reserves. He explored how CKB, as a Bitcoin Layer 2, is positioning itself for high-frequency micropayments, smart contracts, and cross-chain asset management.
Top Reads on Blockchain and Beyond
Pod: An Optimal-Latency, Censorship-Free, and Accountable Generalized Consensus Layer
This paper introduces a new consensus concept pod, aiming to achieve physically optimal latency for one round-trip—just one write of a new transaction and one read. This work solves inherent problems of high latency in blockchain and low scalability in traditional consensus protocols.
Grigore Rosu commented: "It can lead to the end of blockchains as we know them today. It shows how we can still achieve all the benefits of blockchains, but dropping the tyranny of sequentiality (and all the value exploiters that come with it).”
Tracking and Surveillance In-App Ads
The author learned of a massive location data breach revealing that over 2,000 apps in the App Store and Google Play were secretly collecting geographic location data without users' consent, and developers were unaware.
He then began tracking himself through location data leaked by some apps and made the following discoveries:
-
Regardless of whether users choose "Allow" or "Ask not to track" in phone settings, the combination of "IP + location + user agent + geography" is still leaked to hundreds of third parties.
-
The phone sends requests with location and leaked IP. These can be converted to geographic locations through reverse DNS.
-
Data collection pathway: stack → o.isx.unity3d.com → molocoads → bwin
-
Unity is an SSP (supply-side platform) that collects app data via its SDK
-
Moloco Ads is a DSP network that resells data from multiple SSPs like Unity, Applovin, Chartboost
-
bwin is the advertiser that users see ads for in games
-
More discoveries in this post.
Potential DAO 2.0 Product Ideas
The author believes that the development of on-chain AI agents will lead to new forms of DAO, giving true autonomy to the "A" in DAO. New product ideas include:
-
DAO 2.0 launcher: platform enables launching new community/governance tokens tied to an agent, agent responds to tokenholder votes, reads discussion forums and generates proposals
-
Quality assessment for token distribution: agent assesses contribution quality to determine payouts/token distributions for DAOs/airdrops/etc.
-
ZachZBT: agent monitors for hacks or other fraudulent activity and publishes research as well as tries to get funds back for people
-
Due diligence agent: agent verifies contract integrity, dev reputations, on-chain behavior, and potential rug risks; allows users to interact with the agent to ask questions about risks
-
-
@ 19220736:7578e0e9
2025-02-14 03:44:21While Zelle promotes itself as a quick and easy way to send money, its instant, irreversible transactions have made it a prime target for fraudsters. Despite mounting reports of consumer losses, banks continue to deny reimbursement for many fraud victims, citing narrow legal loopholes. Meanwhile, Early Warning Services, the company behind Zelle, profits from the vast consumer data it collects, fueling concerns about privacy and corporate exploitation. With government investigations ramping up and public pressure mounting, Zelle and their bank owners have teamed up with the Aspen Institute, forming a new task force with corporate and government players.
In 2017, Early Warning Services, owned by Bank of America, Capital One, JPMorgan Chase, PNC Bank, Trust, U.S. Bank, and Wells Fargo, released the Zelle payment system. It was a fast way to send and receive funds peer to peer between different bank accounts by only needing either the other person's email address or their U.S. mobile phone number.
By 2018, there were growing concerns about fraud on Zelle. Despite its convenience, Zelle's design allows funds to transfer instantly and irreversibly, making it a target for scammers. Victims reported being defrauded through tactics like fake online sales or impersonation schemes, and many struggled to recover lost funds due to inconsistent fraud policies among banks. Consumer advocates criticized the platform for inadequate protections, urging banks to implement stronger safeguards to prevent fraud and better support affected customers.
In 2022, a Senate report criticized major U.S. banks, including JPMorgan Chase, Bank of America, and Wells Fargo, for failing to adequately protect consumers from fraud on the Zelle payment platform. The investigation revealed that these banks often deny reimbursement for scams where victims are tricked into transferring funds, citing a narrow interpretation of liability under the Electronic Fund Transfer Act. ("While banks bear responsibility for unauthorized transactions to scammers, consumer-authorized transactions made to fraudsters are another matter”.) Jamie Dimon, CEO of JPMorgan Chase, explained, “Anything unauthorized, we do cover”
On June 16, 2023, the United States Senate Committee on Homeland Security and Governmental Affairs subcommittee, the Permanent Subcommittee on Investigations, launched an inquiry into Early Warning Services and the three largest banks that co-own EWS: JPMorgan Chase, Bank of America, and Wells Fargo.
After a 15-month investigation, the Senate Permanent Subcommittee on Investigations released a report on July 23, 2024, highlighting consumer fraud issues tied to the Zelle payment network. The report noted significant drops in the percentage of fraud disputes reimbursed—from 62% in 2019 to just 38% in 2023. Between 2021 and 2023 Zelle refused to reimburse $880 million to customers who fell victim to fraud on their payment network. Bank employees were found to have broad discretion in deciding whether to reimburse fraud claims, often denying compensation without clear justification. This has raised questions about whether banks are meeting legal obligations under the Electronic Fund Transfer Act (Regulation E)
Early Warning Services (EWS) runs the payment network Zelle at a financial loss but generates revenue by selling data-based services to financial institutions. EWS collects extensive consumer and bank data through its operation of Zelle and daily data-sharing agreements with its member banks. This data is used to develop fraud and risk management products, which EWS sells to financial institutions as its primary profit source. While EWS asserts it has not commercialized this data beyond these financial products, the sale of such services remains its main revenue driver.
On August 4, 2024, Senator Richard Blumenthal sent a letter to CFPB Director Rohit Chopra urging immediate action to address fraud concerns tied to the Zelle payment platform. The letter calls for the Consumer Financial Protection Bureau (CFPB) to investigate their dispute resolution practices and ensure that they fully and promptly address consumer fraud reports. On August 7, 2024, it was reported that the Consumer Financial Protection Bureau was investigating several banks due to their handling of Zelle.
On December 20, 2024, The Consumer Financial Protection Bureau (CFPB) responded by filing a lawsuit against Early Warning Services, LLC and the major banks including Bank of America, JPMorgan Chase, and Wells Fargo. The CFPB alleges that these institutions prioritized the rapid deployment of Zelle over implementing effective anti-fraud measures, resulting in significant consumer losses. The lawsuit contends that the defendants failed to adequately address these issues, often denying relief to defrauded consumers. The CFPB seeks injunctive relief, monetary compensation for affected consumers, and civil penalties.
Just 5 days before the Senate Permanent Subcommittee on Investigations released its report, the Aspen Institute Financial Security Program (Aspen FSP) announced the formation of a National Task Force for Fraud & Scam Prevention with their founding sponsor JPMorganChase and executive sponsor Zelle. The stated purpose of the Task Force is to develop a unified national strategy to help the U.S. government and private sector companies work together to stop fraud and scams. Members of this private/public task force include: JPMorgan Chase, Bank of America, Wells Fargo, Google, Meta, Amazon, Visa, Mastercard, Verizon, the Federal Trade Commission, the FBI Criminal Investigation Unit, US Department of the Treasury, Homeland Security, and many others.
The Aspen Institute is a 501(c)(3) nonprofit located in Washington DC. In 2023 they had revenue of $232M and total assets of $519M with the primary source of income coming from donations and federal grants. Per their mission statement, their goal is "realizing a free, just, and equitable society." The Institute works to achieve this through creating and driving policy as well as training future policy leaders.
Recently on November 25, 2024, FinCen announced they are also joining the National Task Force that "brings together key stakeholders including the financial services sector, technology companies, consumer advocacy groups, information sharing and analysis centers, and federal government agencies to develop a comprehensive national strategy for combating fraud and scams." In The Case for a Coordinated National Strategy to Prevent Fraud and Scams, the Task Force lists key components of a national strategy to include improved education of consumers to identify fraud, enhanced information sharing across industry, law enforcement, and regulatory agencies by use of data exchanges and legal mechanisms for sharing information. As well as empowering law enforcement with additional authority and resources. The document cites the recent UK action as an example of recent amendments to law enforcement powers which in England means police will no longer be required to arrest seizing crypto from a suspect, can seize written passwords or memory sticks, as well as transfer "crypto assets" to a law enforcement wallet.
In an August 2024 interview with Fortune, Ben Chance, the Chief Fraud Risk Management Officer for Early Warning Services reportedly "told the outlet that the best way to prevent scams on money-sharing apps is better user education, sound policy and more funding for law enforcement." This sounds very similar to the National Strategy to Prevent Fraud and Scams being crafted by the National Task Force for Fraud & Scam Prevention, with more user education and law enforcement. No mention of standardized reimbursement policies or enhancing transparency around fraud investigations which are the primary accusations aimed at Zelle and its owners by the US Senate and the subject of the current investigation by the Consumer Financial Protection Bureau.
-
@ 0000065e:9b5b4c75
2025-02-14 01:55:12En el ámbito bitcoiner es muy habitual que el Estado sea el blanco de las principales críticas, que se ve convertido así en el muñeco de paja al que dirigir nuestros palos. Pero no, en realidad es una piñata que está a punto de desmoronarse de los golpes que le pegan. Cada vez tengo más claro que gran parte de los movimientos "antiestatales", si no todos, están contribuyendo, consciente o inconscientemente, a los intereses de los políticos que nos han llevado a esta situación.
El Estado, con todos sus defectos, sigue siendo la principal unidad de ejercicio de la violencia organizada. Señalando al Estado como el origen de todos los males, no hacemos otra cosa que pegarnos un tiro en el pie, haciendo el caldo gordo a quienes trabajan para cercenar nuestras libertades.
Lo que está claro es que los políticos actuales, de boquilla firmes defensores del Estado, lo que están haciendo es provocar su colapso. Puede que estos políticos, o algunos de ellos, incluso no sean conscientes del todo, pero da igual, pues simplemente priman sus intereses personales, como hacemos todos, intentando aprovechar los incentivos que están encima de la mesa, con las reglas de juego que hemos ido asumiendo. No es que quieran más Estado o que pretendan dinamitarlo, tanto una cosa como otra no son más que las consecuencias de los incentivos que subyacen a nuestra forma de organizarnos en sociedad en el contexto actual. Albert Rivera, en una reciente charla con Iván Espinosa de los Monteros, aludía a esta idea criticando las redes clientelares y de dependencia del Estado que generan las actuales dinámicas políticas y adulteran el sistema democrático. Aunque, cabría dudar sobre si el propio “sistema democrático” tiene o no algo que ver con esta situación.
En cualquier caso, no es que la mayoría de políticos sean malvados por naturaleza, aunque algunos puedan realmente serlo; es irrelevante. Sus acciones no están motivadas por su maldad, ni por su ideología o su estupidez, sino, simple y llanamente, por sus intereses personales y los del grupo con el que los comparten.
Las ideologías que manejan los políticos se han convertido en nichos de mercado, en caladeros donde echar la caña a ver si pescan suficientes votos como para asegurarse su porvenir y el de los suyos. Es del todo irrelevante si se creen o no esas ideas que defienden con tanta vehemencia como ausencia de plausabilidad, o incluso si están a sueldo de intereses espurios. De cualquier forma, actuarán en función de lo que crean más conveniente para sus intereses personales y para que más peces caigan en sus redes. Véase, por ejemplo, como Albert Rivera, ahora que está fuera de la política, manifiesta que resulta evidente que el sistema de pensiones es una estafa piramidal, mientras que cuando estaba en política defendía lo contrario. O a Errejón, que sostenía la tesis de que no había denuncias falsas hasta que lo denunciaron a él.
Como digo, los políticos no son malvados o estúpidos (aunque haya algunos, o muchos, que entren en esas categorías), simplemente velan por sus intereses con las armas que tienen a su alcance y, como diría Vito Corleone, me es indiferente lo que un hombre haga para vivir. El problema es que esta dinámica está generando unas tendencias que se oponen al progreso que hemos generado como sociedad. Esas reglas de juego en la actualidad, convendremos, son inmorales, en el sentido de que actúan como una fuerza contraria a nuestra supervivencia y potencia de actuar y obrar.
Este artículo forma parte de un trabajo más extenso en elaboración sobre las relaciones de Bitcoin con el Estado.
-
@ 7d33ba57:1b82db35
2025-02-14 01:46:37The short answer is YES—but the more honest answer is that it’s much harder than when I started. I’ve been in the travel stock media industry for over 13 years, creating a vast archive of stock photos and videos from around the world. You can check out my portfolio on https://www.shutterstock.com/g/traveltelly. My work is also available on Pond5, Videoblocks, and Adobe Stock. Other big agencies where I don’t have my media are Getty Images and iStock.
My media has been featured on TV channels and even in feature films. However, most of the time, contributors don’t know exactly where their content is used—stock agencies (the middlemen) keep that information to themselves. While stock media can still generate income, it requires persistence, a large portfolio, and an understanding of the ever-changing market.
When I started filming stock footage, most people didn’t even have a phone capable of taking good photos or videos—can you imagine? Now, everyone is a (travel) content creator. Technology has evolved, but creating a well-composed photo or video is still an art. However, the combination of improved tech and the increasing centralization of the stock media market has made it much harder to earn a decent income from stock media compared to 10 years ago.
Centralization & Declining Royalties Over the years, I’ve watched stock media royalties decline year after year. In the beginning, I couldn't understand why I wasn’t able to recoup the cost of my expensive camera—one I specifically bought to shoot high-quality 4K footage.
As the stock media industry became more centralized, agencies took a larger cut while contributors earned less, despite creating higher-quality content. The market became saturated, and with more competition and lower payouts, making a sustainable income from stock media became increasingly difficult.
The Reality of Centralization in Stock Media Every year, stock agencies announced yet another royalty downgrade for contributors. They always framed it as something beneficial for content creators, but in reality, it only served the big companies and their shareholders.
As content creators, we had no say in the matter. These agencies grew too big and powerful, and they knew it. Leaving one platform wasn’t really an option—doing so would only mean an even greater loss of income.
In recent years, the industry has become even more centralized, with only a handful of major agencies buying out smaller competitors. This consolidation further reduces competition, giving contributors even less control over pricing, royalties, and where their content is used.
The Bitcoin Standard: A Wake-Up Call I couldn’t understand why I was struggling to pay off my expensive camera investment, despite working hard and producing high-quality content. Until then, I had never really thought about how money worked. That changed in 2018 when I read The Bitcoin Standard—an absolute eye-opener.
That book sparked my curiosity about Bitcoin. Like many, I initially got distracted by shitcoins, thinking I could multiply my holdings faster—after all, Bitcoin seemed “too expensive.” It was a hard but valuable lesson. Just like in a casino, you can win and lose a lot with altcoins, but that has nothing to do with Bitcoin itself. After those first few years of learning, I realized that for me, Bitcoin—not crypto—was the only way forward.
From Centralization to Decentralization When people ask me if they should start selling stock footage, my answer is always the same: It’s much harder now than when I started. Sure, you can make a few bucks, but is all the time and effort really worth it? If I had to start today, I simply wouldn’t—it’s way more work than what you’ll earn.
Instead of spending years building content for centralized platforms that take the biggest cut, I believe it’s better to focus on decentralized media like Nostr. In my opinion, that’s where the future lies.
Nostr: A New Protocol for Socializing (and More) Nostr is a revolutionary protocol that goes beyond just social networking. You can read all about it at Nostr.org. As a content creator, one of the most exciting aspects of Nostr is the ability to earn directly through Zaps—small payments made in Satoshis (the smallest unit of Bitcoin). * 1 Bitcoin = 100 million Satoshis * By receiving Zaps, you’re not just earning—you’re stacking the hardest money (Bitcoin) directly on Nostr. This shift toward decentralized earning is a game changer, giving creators more control and financial sovereignty compared to traditional, centralized platforms.
Join Nostr and Create Your Freedom Content
On Nostr, no one can stop you. No one can deplatform you. You can be truly free.Whether you're a content creator, artist, or thinker, Nostr empowers you to share your work without censorship or gatekeepers. It’s a place where you control your content, connect directly with your audience, and even earn Bitcoin through Zaps.Embrace decentralization.
Join Nostr and take back your freedom 🚀
-
@ 9e69e420:d12360c2
2025-02-13 23:01:36Robert F. Kennedy Jr. has been confirmed as the next Secretary of Health and Human Services with a Senate vote of 52-48. Senator Mitch McConnell opposed the confirmation. Kennedy's nomination faced hurdles but gained support from the Senate Finance Committee.
During the confirmation hearing, Senator Rand Paul criticized the oversimplification of vaccine discussions. He stated, "Discussion over vaccines is so oversimplified and dumbed down." Kennedy asserted his support for vaccines like measles and polio, promising not to discourage vaccinations as HHS Secretary. Previously, he switched from the Democratic Party to run as an independent and endorsed Trump
-
@ 85bdb587:7339d672
2025-02-13 22:56:08Marty's Bent
I must admit, I have been thoroughly impressed with the work the Trump administration has done since taking the reins from the Biden admin 23 days ago. Over the course of the first eight years of this newsletter there were multiple books-worth of words written about the rampant government corruption in the United States and the negative effects it was having on the economy, freedom and the psyche of the American people. The emergence of DOGE, its rag-tag team of autistic Gen Z'ers and the blatant fraud that has been surfaced is equally gratifying and infuriating.
For the longest time any American taxpayer with the smallest shred of common sense has known that they've been getting screwed by the federal government. We've said it for many years; taxes are a humiliation ritual in which the Common Man works his ass off for a meager wage, the government takes one third of it, and then lines their own pockets. We were reaching levels of corruption that rivaled Soviet Russia.
“We know that they are lying, they know that they are lying, they even know that we know they are lying, we also know that they know we know they are lying too, they of course know that we certainly know they know we know they are lying too as well, but they are still lying. In our country, the lie has become not just moral category, but the pillar industry of this country.” - Aleksandr Solzhenitsyn
The fact that all of the corruption that has been building up for decades in the United States is being brought to the light is extremely encouraging. We're not out of the woods yet, but it looks like we're actually making material progress to unveil the parasites in Washington DC. Hopefully DOGE's actions will lead to their eradication from American politics and a shrinking of the federal government to its smallest viable form. Nothing proves that DOGE is over the target more than the pearl clutching and screeching that is coming from the halls of Congress. FEED ME the crocodile tears of Elizabeth Warren, Maxine Waters and Mitch McConnell. These people are criminals and deserve nothing but the utmost contempt from the American people. The louder the screams coming from these individuals and others in similar positions should only be seen as confirmation that they are scared and are attempting to evade justice by screaming "CoNsTiTuTiOnAl CrIsIs" as many times as is humanly possible.
With all of that being said, DOGE should be seen as a mechanism to identify corruption, root it out, and salvage what they can of the American taxpayers' money. It's an admirable endeavor that should be lauded, but it only goes so far. Unfortunately for the United States, you can't DOGE the debt. via TFTC
What you are looking at is a block of 10-year US Treasuries that need to be rolled over in a couple of days. Particularly, $66B 10Ys that were issued in February 2015 when interest rates were 2.00%. They'll be rolling over in a few days at 4.55%, representing an additional $1.67B in interest expense on the debt per year. While that may not seem a lot in a world where governments and central banks throw trillions around like their going out of style, it is important to realize that this is just one block of bonds that needs to be rolled over this year. If my memory serves me correctly, the Treasury needs to roll over ~$6 TRILLION in debt in the first half of this year. Using some back of the napkin Marty math skills, if all that debt rolled over at the same interest rate, that would add another ~$150B to the annual expense we pay on the interest on that debt. And in case you missed it, earlier this week the United States surpassed an incredible milestone; we are now paying $100B a MONTH in interest expense on the debt and $1.2T per year.
If all of the debt that needs to be rolled over in the first half of the year is rolled over where interest rates stand today, it will increase the annual debt expense by more than 10%. Not great, Bob!
The actions of DOGE are incredible to see, but you simply can't eliminate debt that has already been accrued by raiding the Treasury and ousting corrupt bureaucrats. The United States has an obligation to pay back those who hold our debt and the only way to do that is to produce a surplus that allows the government to pay down what has been accrued or issue new debt at wherever rates find themselves at the time of roll over to pay it back. While spending cuts are being made we, unfortunately do not find ourselves reaping the benefits of a government surplus at the moment, so we'll have to roll over the debt. With interest rates where they are, the increase on the debt expense may put the United States government in a position where it becomes impossible to take care of the debt issue without printing their way out of it or getting all of the world's leaders around the table for a Bretton Woods-like monetary reset. We'll see how it plays out.
One thing I know for damn sure is that no matter how the US decides to deal with the debt issue, bitcoin is going to benefit massively. If they print their way out people are going to flee to scarce assets, and bitcoin is the scarcest asset on the planet outside of time. If they reset the monetary order people are going to flee to bitcoin due to the certainty of its monetary policy and its relative inability to be corrupted.
Now for...
An Incredibly Simple Yet Powerful Quote
As discussed in my recent conversation with Porter Stansberry, the mounting U.S. government debt problem has created an intriguing dynamic for Bitcoin holders. Porter articulated a compelling perspective: government debt, which threatens most people's savings and financial security, actually becomes an asset for Bitcoin owners. The logic is straightforward – as debt levels become unsustainable, more people will be forced to flee the traditional financial system, driving demand for alternative stores of value like Bitcoin.
"Their debt is your problem until you own Bitcoin. And then the moment you own bitcoin their debt is your greatest asset." - Porter Stansberry
This thesis becomes even more relevant when considering the staggering numbers we discussed. The U.S. currently faces $37 trillion in on-balance-sheet debt, plus an additional $190 trillion in unfunded liabilities from Medicare, Medicaid, and Social Security. These obligations, as Porter and I agreed, are mathematically impossible to fulfill without significant monetary debasement. This reality creates a powerful tailwind for Bitcoin adoption, as it positions the asset as one of the few viable escape hatches from a system drowning in debt.
Check out the full podcast here for more on Trump's economic strategy, the commercial real estate crisis, and the future of energy markets in America.
Headlines of the Day
Bitcoin's Realized Cap Reaches Record High - via X
Texas Bill Removes $500M Cap on State Bitcoin Purchases - via X
ETF Demand Outpaces Mining Production - via X
U.S. Interest Expense on the National Debt Hits $1.2T - via X
Bitcoin Lesson of the Day
Bitcoin transactions work by sending entire "outputs" (batches of bitcoin) rather than spending partial amounts. When spending bitcoin, the entire output must be used and split into new outputs. For example, if you have a 25 BTC output and want to spend 1 BTC, you'd create two new outputs: 1 BTC to the recipient and 24 BTC back to yourself as change. The original 25 BTC output becomes spent and unusable.
When making a payment that exceeds any single output you own, multiple outputs can be combined as inputs in a transaction. For instance, to spend 4.2 BTC, you might combine outputs of 1 + 0.5 + 2 + 1 BTC as inputs, creating new outputs of 4.2 BTC (payment) and 0.3 BTC (change).
Transaction fees are created by making the total output amount slightly less than the input amount. The difference becomes the fee, which miners collect when including the transaction in a block. The balance of a bitcoin address is the sum of all its unspent transaction outputs (UTXOs).
ICYMI Fold opened the waiting list for the new Bitcoin Rewards Credit Card. Fold cardholders will get unlimited 2% cash back in sats.
Get on the waiting list now before it fills up!
$200k worth of prizes are up for grabs.
Ten31, the largest bitcoin-focused investor, has deployed $150M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at ten31.vc/funds.
-
@ e3ba5e1a:5e433365
2025-02-13 06:16:49My favorite line in any Marvel movie ever is in “Captain America.” After Captain America launches seemingly a hopeless assault on Red Skull’s base and is captured, we get this line:
“Arrogance may not be a uniquely American trait, but I must say, you do it better than anyone.”
Yesterday, I came across a comment on the song Devil Went Down to Georgia that had a very similar feel to it:
America has seemingly always been arrogant, in a uniquely American way. Manifest Destiny, for instance. The rest of the world is aware of this arrogance, and mocks Americans for it. A central point in modern US politics is the deriding of racist, nationalist, supremacist Americans.
That’s not what I see. I see American Arrogance as not only a beautiful statement about what it means to be American. I see it as an ode to the greatness of humanity in its purest form.
For most countries, saying “our nation is the greatest” is, in fact, twinged with some level of racism. I still don’t have a problem with it. Every group of people should be allowed to feel pride in their accomplishments. The destruction of the human spirit since the end of World War 2, where greatness has become a sin and weakness a virtue, has crushed the ability of people worldwide to strive for excellence.
But I digress. The fears of racism and nationalism at least have a grain of truth when applied to other nations on the planet. But not to America.
That’s because the definition of America, and the prototype of an American, has nothing to do with race. The definition of Americanism is freedom. The founding of America is based purely on liberty. On the God-given rights of every person to live life the way they see fit.
American Arrogance is not a statement of racial superiority. It’s barely a statement of national superiority (though it absolutely is). To me, when an American comments on the greatness of America, it’s a statement about freedom. Freedom will always unlock the greatness inherent in any group of people. Americans are definitionally better than everyone else, because Americans are freer than everyone else. (Or, at least, that’s how it should be.)
In Devil Went Down to Georgia, Johnny is approached by the devil himself. He is challenged to a ridiculously lopsided bet: a golden fiddle versus his immortal soul. He acknowledges the sin in accepting such a proposal. And yet he says, “God, I know you told me not to do this. But I can’t stand the affront to my honor. I am the greatest. The devil has nothing on me. So God, I’m gonna sin, but I’m also gonna win.”
Libertas magnitudo est
-
@ daa41bed:88f54153
2025-02-09 16:50:04There has been a good bit of discussion on Nostr over the past few days about the merits of zaps as a method of engaging with notes, so after writing a rather lengthy article on the pros of a strategic Bitcoin reserve, I wanted to take some time to chime in on the much more fun topic of digital engagement.
Let's begin by defining a couple of things:
Nostr is a decentralized, censorship-resistance protocol whose current biggest use case is social media (think Twitter/X). Instead of relying on company servers, it relies on relays that anyone can spin up and own their own content. Its use cases are much bigger, though, and this article is hosted on my own relay, using my own Nostr relay as an example.
Zap is a tip or donation denominated in sats (small units of Bitcoin) sent from one user to another. This is generally done directly over the Lightning Network but is increasingly using Cashu tokens. For the sake of this discussion, how you transmit/receive zaps will be irrelevant, so don't worry if you don't know what Lightning or Cashu are.
If we look at how users engage with posts and follows/followers on platforms like Twitter, Facebook, etc., it becomes evident that traditional social media thrives on engagement farming. The more outrageous a post, the more likely it will get a reaction. We see a version of this on more visual social platforms like YouTube and TikTok that use carefully crafted thumbnail images to grab the user's attention to click the video. If you'd like to dive deep into the psychology and science behind social media engagement, let me know, and I'd be happy to follow up with another article.
In this user engagement model, a user is given the option to comment or like the original post, or share it among their followers to increase its signal. They receive no value from engaging with the content aside from the dopamine hit of the original experience or having their comment liked back by whatever influencer they provide value to. Ad revenue flows to the content creator. Clout flows to the content creator. Sales revenue from merch and content placement flows to the content creator. We call this a linear economy -- the idea that resources get created, used up, then thrown away. Users create content and farm as much engagement as possible, then the content is forgotten within a few hours as they move on to the next piece of content to be farmed.
What if there were a simple way to give value back to those who engage with your content? By implementing some value-for-value model -- a circular economy. Enter zaps.
Unlike traditional social media platforms, Nostr does not actively use algorithms to determine what content is popular, nor does it push content created for active user engagement to the top of a user's timeline. Yes, there are "trending" and "most zapped" timelines that users can choose to use as their default, but these use relatively straightforward engagement metrics to rank posts for these timelines.
That is not to say that we may not see clients actively seeking to refine timeline algorithms for specific metrics. Still, the beauty of having an open protocol with media that is controlled solely by its users is that users who begin to see their timeline gamed towards specific algorithms can choose to move to another client, and for those who are more tech-savvy, they can opt to run their own relays or create their own clients with personalized algorithms and web of trust scoring systems.
Zaps enable the means to create a new type of social media economy in which creators can earn for creating content and users can earn by actively engaging with it. Like and reposting content is relatively frictionless and costs nothing but a simple button tap. Zaps provide active engagement because they signal to your followers and those of the content creator that this post has genuine value, quite literally in the form of money—sats.
I have seen some comments on Nostr claiming that removing likes and reactions is for wealthy people who can afford to send zaps and that the majority of people in the US and around the world do not have the time or money to zap because they have better things to spend their money like feeding their families and paying their bills. While at face value, these may seem like valid arguments, they, unfortunately, represent the brainwashed, defeatist attitude that our current economic (and, by extension, social media) systems aim to instill in all of us to continue extracting value from our lives.
Imagine now, if those people dedicating their own time (time = money) to mine pity points on social media would instead spend that time with genuine value creation by posting content that is meaningful to cultural discussions. Imagine if, instead of complaining that their posts get no zaps and going on a tirade about how much of a victim they are, they would empower themselves to take control of their content and give value back to the world; where would that leave us? How much value could be created on a nascent platform such as Nostr, and how quickly could it overtake other platforms?
Other users argue about user experience and that additional friction (i.e., zaps) leads to lower engagement, as proven by decades of studies on user interaction. While the added friction may turn some users away, does that necessarily provide less value? I argue quite the opposite. You haven't made a few sats from zaps with your content? Can't afford to send some sats to a wallet for zapping? How about using the most excellent available resource and spending 10 seconds of your time to leave a comment? Likes and reactions are valueless transactions. Social media's real value derives from providing monetary compensation and actively engaging in a conversation with posts you find interesting or thought-provoking. Remember when humans thrived on conversation and discussion for entertainment instead of simply being an onlooker of someone else's life?
If you've made it this far, my only request is this: try only zapping and commenting as a method of engagement for two weeks. Sure, you may end up liking a post here and there, but be more mindful of how you interact with the world and break yourself from blind instinct. You'll thank me later.
-
@ e3ba5e1a:5e433365
2025-02-05 17:47:16I got into a friendly discussion on X regarding health insurance. The specific question was how to deal with health insurance companies (presumably unfairly) denying claims? My answer, as usual: get government out of it!
The US healthcare system is essentially the worst of both worlds:
- Unlike full single payer, individuals incur high costs
- Unlike a true free market, regulation causes increases in costs and decreases competition among insurers
I'm firmly on the side of moving towards the free market. (And I say that as someone living under a single payer system now.) Here's what I would do:
- Get rid of tax incentives that make health insurance tied to your employer, giving individuals back proper freedom of choice.
- Reduce regulations significantly.
-
In the short term, some people will still get rejected claims and other obnoxious behavior from insurance companies. We address that in two ways:
- Due to reduced regulations, new insurance companies will be able to enter the market offering more reliable coverage and better rates, and people will flock to them because they have the freedom to make their own choices.
- Sue the asses off of companies that reject claims unfairly. And ideally, as one of the few legitimate roles of government in all this, institute new laws that limit the ability of fine print to allow insurers to escape their responsibilities. (I'm hesitant that the latter will happen due to the incestuous relationship between Congress/regulators and insurers, but I can hope.)
Will this magically fix everything overnight like politicians normally promise? No. But it will allow the market to return to a healthy state. And I don't think it will take long (order of magnitude: 5-10 years) for it to come together, but that's just speculation.
And since there's a high correlation between those who believe government can fix problems by taking more control and demanding that only credentialed experts weigh in on a topic (both points I strongly disagree with BTW): I'm a trained actuary and worked in the insurance industry, and have directly seen how government regulation reduces competition, raises prices, and harms consumers.
And my final point: I don't think any prior art would be a good comparison for deregulation in the US, it's such a different market than any other country in the world for so many reasons that lessons wouldn't really translate. Nonetheless, I asked Grok for some empirical data on this, and at best the results of deregulation could be called "mixed," but likely more accurately "uncertain, confused, and subject to whatever interpretation anyone wants to apply."
https://x.com/i/grok/share/Zc8yOdrN8lS275hXJ92uwq98M
-
@ 21db9b8a:2a94c796
2025-02-14 03:37:49Fair warning: This is an explicit and erotic story involving extremely taboo themes that would prevent it from being published on most sites that host erotic stories. All characters in this story are fictional only. It is not in any way based on true events.
This is also not your average stroke story. It will be released in chapters, and while there is sexual content in each chapter, there is no full-on sex until late in chapter 4. It is a story of sexual discovery and exploration between young people who have few resources to educate them, but also few inhibitions to hold them back.
I hope you enjoy it. If not… Well… You don’t have to host it on your relay, and you can always mute me so you don’t see any more.
Dani barreled through the dining room in pursuit of her younger brother, Jake, who sped out the sliding glass door onto the back deck, making a feeble and unsuccessful attempt to close the door behind him as he ran. He had always been faster than Dani over short distances, and his recent growth spurt, just before turning thirteen, had made it that much more difficult to catch him.
"Give them back, you thief!" she shouted after him, taking just enough time to open and fully slide the door closed behind her, in order to avoid incurring her mother's wrath.
It was all the lead her brother needed. He leaped off the deck into the sunlit back yard and sprinted over to one of the tall maple trees at the edge of the lawn. By the time Dani had made it to the yard, her brother was already scurrying up the trunk with her sunglasses gripped between his teeth. Jake was younger than Dani by seventeen months, but he had recently grown to be two full inches taller than her, and he had begun to develop muscle tone to compliment his athleticism. It also helped him climb trees with frustrating ease.
Dani jogged to the base of the maple, which had no limbs for at least the first ten to twelve feet, and glared up at her brother lounging across two of the branches. He was now wearing her sunglasses to further taunt her. The twerp took his role as the annoying younger brother seriously, despite their age difference being relatively small. Dani's other two brothers, ages ten and seven, had thankfully not learned Jake's bad habits and generally left Dani alone, but her oldest brother seemed to make it his mission to infuriate her. It was just for sport, Dani knew, and Jake really was alright to be around most of the time, but let him get bored and it always seemed like she was the one who paid for it.
"Give me a break, Jacob William Hansen!" she demanded, using his full name like their mother often did when she wanted him to know he was in trouble. She shaded her eyes from the early summer sun as she continued to glare up at him. It did not seem to have the same effect as when her mother used it. "When you come down from there, I'll have your hide!"
"You may have my hide, Danielle Elizabeth Hansen,” he mocked, “but you won't have your glasses." With that, he plucked them from his face and hooked them over a smaller branch above him.
"You wouldn't dare leave them up there!" she asserted, not really sure whether he would or not. Jake knew better than to push things too far, but he might not consider abandoning her sunglasses in the limbs of a tree to count as 'too far'.
"What are you going to do? Go tell on me?" Of course, he knew she would not. They had long since stopped tattling on one another. In their household, the tattler often brought as much punishment upon him or herself as the one tattled on, and sometimes more. Instead, Jake and Dani had agreed to settle most matters between themselves, and only bring their parents in when it was more serious, like when Jake had planned to jump off the garage roof onto his skateboard, and Dani just knew he would have cracked open his skull if he had tried it.
"If you want your sunglasses back, you are just going to have to come up here and get them."
"How did you even make it up there?" she demanded. Dani was no slouch at climbing trees most of the time. She liked to play in the woods and didn't mind getting dirty, but the trees she climbed at least had branches close enough to the ground that she could jump up and grab hold of them. This maple had nothing but bare trunk for several feet above her head.
"You didn't see how I did it?" Jake asked. "You just have to wrap your legs around it and use them to hold on. Then grab as high as you can with your arms and pull your legs up higher."
Dani cocked an eyebrow at him dubiously, unsure whether she could mimic the technique. For one, her brother didn't have breasts to contend with, and Dani had been a bit of an early bloomer in that department. At fourteen, she already would have filled out a B-cup bra, if she ever wore anything other than sports bras. The lumps of fatty flesh sticking out from her chest were horribly annoying and always getting in the way. It seemed more than likely that her breasts would do just that while trying to shimmy up the tree as well.
Shrugging to herself she decided to give it a shot. She approached the trunk and wrapped her arms around it as high up as she could reach. She could just barely touch her fingers together on the other side when hugging as closely as her chest would allow. Supporting herself with her arms, she jumped and wrapped her legs around the trunk as well and felt the bark lightly scratching the inside of her thighs and back of her calves. It probably wasn't the best idea to be doing this in her cutoff jeans and a tank top, but it was far too warm out to wear her usual jeans and a hoodie. She would just have to tough her way through it.
Gritting her teeth she pushed her body upward with her legs, which invariably tugged the front of her tank top downward to expose part of her sports bra underneath, then she reached as high as she could with her arms and let her weight settle on them to pull her legs up again. This caused Dani's breasts, which were being crushed between her and the tree, to push upward, partially spilling out of the top of her sports bra and tank top. As predicted, they were getting in the way of things once again.
Dani was far too distracted to think about what kind of display she was putting on for her brother above her, though. As her weight had settled, her crotch had slid against the trunk and caused a pleasurable sensation to well up in her nether-regions. It was a shock to Dani, and she nearly let go of the tree. She'd never felt anything quite like that from “down there” before, and it was distractingly pleasant. She sat frozen in place for a moment, trying to make sense of the feeling.
"Well?" her brother voiced his impatience. "Are you just going to hang there like a koala or are you going to come get your shades?"
Letting out a low, frustrated growl, Dani continued upward, the pleasant sensation in her groin returning each time she slid it against the trunk. What on earth was going on? This was not a situation that should be causing her pleasure whatsoever, let alone down there. Her legs and arms felt like they had several new scrapes from the rough trunk, but her crotch was alight with a dull pleasurable throbbing that Dani had never experienced before. Then again, she'd never thought to rub it against anything before.
As she finally shimmied her way high enough to grab hold of the lower-most branch, Dani was panting from more than the sun's heat and her exertion. Pulling herself up onto the sturdy limb, she hoped her brother didn't notice the flush in her face or the way she self-consciously adjusted her tank top so that it properly covered what it was meant to. Then she looked up to see him holding her sunglasses out to her from the branch he was seated on.
"Not cool, Jake!" she chided, snatching her sunglasses from his hand and inspecting them for damage. Satisfied they were none the worse for wear, she slid them into her dark hair, which was pulled back into a loose ponytail that hung just past her shoulders, so that they rested securely atop her head.
"Oh stop your whining," he brushed off her anger. "You know you needed some motivation to get out of the kitchen. Mom has had you cooped up in there all morning."
"Yeah, that's because it gets too hot to bake in the afternoon, doofus! Don't you want fresh bread for the monstrous sandwich I'm sure you will somehow manage to stuff down your throat for lunch?"
"Fair point," Jake acknowledged. "But aren't you glad to get out and get your blood pumping?"
"No!" Dani retorted. "Look at me!" She held her scraped-up arms out for his inspection. "I blame you for this!"
"Oh come on! You love it!" Jake insisted. "I have seen you laughing off far worse war-wounds than that."
Dani sighed and shook her head at him. He was right, of course. She was known for playing hard. Hard enough to keep up with the boys in the neighborhood, who often used to wrestle her like she was one of them. At least, they had until recently. Since she'd developed breasts they all seemed scared of her. All except Jake, but he was her brother. They had never been awkward with one another, and he still didn't seem to notice that she was a girl, let alone growing into a woman.
For most of their childhood, Jake was the only playmate Dani had, so she had adapted to playing like a boy. Instead of Barbies and tea sets, it had been Legos and Nerf guns, and she had loved every minute of it, even if it did tend to come with a fair share of bruises and scrapes. And sure, Jake could be an absolute pest, but it was mutual antagonism born out of playful sibling affection.
"Fine," she admitted. "It was a welcome rescue from mom's home ec class. But you're still going to owe me for all the scrapes I have from climbing this tree. My legs are even worse than my arms!"
"I'm sure you'll think of some way to get sweet revenge," Jake laughed. "You always do."
Again, he was right. As much as Jake infuriated her with his taunting, teasing, and pranks, Dani could dish it right back at him. That was part of their strange sibling relationship that made it look to all on the outside like they couldn't stand one another, when in reality they were best friends and would do anything for the other when it really mattered.
"Alright, meat-brain," Dani changed the subject, using her favorite pet name for her brother. "Now that we're free of mom's clutches for the afternoon, what should we do with ourselves?"
"I don't know what you're going to do, but when Finn gets home from school, we're going fishing."
Finn was Jake's best friend who lived just a few houses down from them. While Jake, Dani, and their siblings were homeschooled by their mother, Finn went to public school and wouldn't be getting home until mid afternoon. Soon school would be out for the summer, making Jake and Finn nearly inseparable during daylight hours, but that was still a week and a half away, despite the heat wave they were getting in early June, and then Finn's family would be going to summer camp for three weeks, so the boys were taking advantage of as much time as they could get to hang out while they had the chance. Dani knew that she only had a short time while Finn was at camp to have her brother to herself before he would be all but lost to her for three months, since Jake and Finn usually didn't like having her along with them anymore. They had played together for years, but over the last several months, the two boys had started excluding her from their activities.
That left Dani feeling quite alone when Jake and Finn rode their bikes off to wherever they hung out these days. She had no friends of her own in the neighborhood. Her closest female friend, Audrey, lived almost a half-hour away, in a small town to the north, so they only really got to see each other at church, and the occasional planned sleepover.
"Fine, ditch your sister, as usual," Dani complained, rolling her eyes at her brother.
"Don't be like that, Dani," Jake protested. "It's just awkward talking about girls with your sister around, ya know?"
"Like you actually have any girls to talk about!" she teased.
"Maybe not, but a guy can live vicariously through his best friend, can't he?"
"Ha!" Dani scoffed. "I seriously doubt Finley O'Connor has a lineup of girls to give you all the juicy details about, either. At least not any that aren't figments of his imagination."
"You might be surprised."
Was that a blush that suddenly appeared on Jake's face? Had she misjudged Finn? Jake's best friend was not what she would think of as a chick-magnet. He was a bean-pole of a boy with an unkempt mop of red hair topping his head. He had a mouth that was too large for his face that always seemed to be twisted in a mischievous grin, and an over-abundance of freckles that covered every inch of him that Dani had ever seen, which was most of him since he often accompanied their family to go swimming at the river. He did not fit into Dani's definition of attractive, nor any other girl she knew. Not that she knew many other girls well enough to talk about boys with them.
"Whatever you say, meat brain," Dani said, shifting on the branch and dropping to hang beneath it before letting go to allow herself to fall the three or four feet down to the ground. She landed on her feet, bending her legs deeply to absorb the impact, then stood up straight and defiant. Brushing her hands off on the sides of her cutoffs and looking back up at her brother. "I'll just have to figure out how to keep myself occupied, as always."
There was more disappointment in her voice than she had intended. She didn't really want to make him feel bad for leaving her without anyone to hang out with for the afternoon. She could find things to do to keep herself busy. For one, she could help her younger brothers finish up their school work, though that would likely only get her through the first hour after lunchtime or so. The benefit of being homeschooled was that you could easily get all your work done for the day in just a few short hours, instead of being cooped up in a classroom the whole day like the public-schoolers had to endure. Of course, that was also the downside, because you then had to figure out what you would do with all the extra time you had.
Then Dani remembered the pleasurable sensation she had experienced while climbing the tree. That was certainly something she could investigate this afternoon while Jake was off gallivanting with Finn. She wanted to see if that feeling could be repeated, or if it was just some kind of fluke. She wasn't about to go rub her crotch against trees where anyone might see her, though. Perhaps she could find somewhere more discreet to experiment and see if that sensation returned. It had felt SO GOOD! Surely she could find a way to make it happen again.
Jake watched as his sister strolled away from the tree back toward the house, her round bottom framed enticingly in her cutoff jeans. He couldn't believe he was looking at her that way; she was his sister after all, not some random girl like the ones Finn liked to show him. Yet, after watching her climb the tree to retrieve her stolen sunglasses from him, Jake could not deny that she possessed every quality that made those girls on Finn's tablet so appealing.
Finn had been sharing pictures of naked and nearly-naked girls with Jake almost since he had gotten the tablet as a Christmas present last year. Well, Jake supposed they were actually women, not girls, since they all looked much older than Dani, and most had more pronounced curves. Then again, that could just be because he was seeing them without their clothes on, while Dani's curves were usually covered up. And Dani definitely did have some curves that Jake could no longer help but notice, especially after the display he had just seen.
From his perch in the branches of the maple tree, Jake had a perfect view down the front of his sister's tank top as she had shimmied her way up the trunk. No, he had not seen her nipples - her sports bra had done it's job of holding them in - but her round breasts pressing up prominently every time she let her weight rest on her arms made it clear that she was no longer the flat-chested little girl he somehow had still thought of her as. He should not have been so naive. He knew his own body had changed drastically, but had not even considered that his sister's was changing as well, let alone that she might just look a lot like the women in those pictures when she took her clothes off.
Jake frowned, noticing that his thoughts had made his dick stiffen in his pants. These were not thoughts he should be having about his sister! Hopefully Finn would have some new pictures to distract him away from thinking of Dani in that context. For that reason and more, Jake looked forward to his friend getting home from school, when the two of them could head out to do some "fishing". Oh, they might do a bit of actual fishing as well, but most of their time would likely be spent at their fort in the woods, well away from any prying eyes, while Finn shared his latest photographic acquisitions.
It would still be a few hours before the bus dropped his friend off where their street connected to the main road, so Jake resigned himself to finding something else to distract him from thoughts of his sister until then. It was too nice a day to expect that he could get away with playing Xbox in the basement game room. His brother, Travis, should be done with his school work by now, though, and always enjoyed tinkering with bikes in the garage with him, so Jake dropped out of the tree and headed toward the house to seek his brother out.
He crossed the back lawn and their dog, Dozer, ran to meet him. He was a massive brute of a dog, being a full-bred Rottweiler, but he was as gentle and loyal as anyone could ask for with the Hansen children. Jake patted the dog's blocky head and rubbed his ears as he strode toward the back deck. He skirted around the left side of the deck and down the concrete stairs to an exterior door that led directly to the basement where he expected he would find his brother.
All of the Hansen boys had rooms in the basement. Jake, as the oldest boy, had his own, while Travis and Aaron shared a room on the opposite end, next to the bathroom, with the game room and stairs up to the front entryway situated conveniently in-between. At age ten, Travis was three years younger than Jake, though he would be turning eleven in the fall, so it was more like two and a half years. Aaron was another three years younger than that, at age seven. The two of them were very close, just like Jake and Dani had always been, but lately Travis had been wanting to spend more time with Jake, whenever the older boy would allow it.
The last of the Hansen children was their adopted sister, Rebecca, who was only two years old. Everyone called her Bec, and she lived in the nursery upstairs next to their parents' master bedroom. Their family had fostered her as an infant, and finally adopted her just last year. Dani had been thrilled to finally have a sister, despite the massive age difference, and couldn't wait to teach the child all about being a girl. Not that Dani really had any clue how to be a girl herself, having grown up with three brothers.
As expected, when Jake opened the door into the basement, which opened into their game room, his younger brother was seated facing him on the couch with an Xbox controller in hand, transfixed by the large flat screen television on the wall. He looked quite a lot like Jake, with his short, brown hair and blue eyes. The younger boy hadn’t yet started to fill out with muscle tone, though, making him look scrawny, with a head too large for his stringy limbs. The effect was particularly humorous when he stood next to Jake.
"You'd better not let mom or dad catch you on that when the sun's out," Jake warned his brother.
"Mom's still busy helping Aaron with his math, and Dad's working on tonight's sermon," Travis assured him. "Besides, I was going to get off in just a few minutes anyway."
"Oh trust me," Jake began, crossing to the couch and sitting next to his brother, to see that he was playing Minecraft. "I know how 'just a few minutes' can turn into several hours without even realizing it. Why don't you come hang out in the garage and we'll get that chain tightened on your bike so it's not always falling off on you."
"Really!?" Travis exclaimed, putting the controller down and turning to Jake with an excited look on his face.
"Of course, runt!" Jake had continued to call his brother the pet name even after Aaron was born, much to Travis' chagrin. "What are big brother's for?"
He wasn't about to tell him that the reason he was suddenly so willing to help his little brother out was to take his mind off of thinking about Dani. Seeing her round breasts pressing out of the top of her tank top had shattered Jake's ability to think of her in practically the same terms as his brothers, or one of his male friends. Now he found himself remembering her long, smooth legs, and round bottom swaying back and forth hypnotically as she had walked back toward the house, and it seemed the more he told himself he shouldn't think of her that way, the harder it was not to.
Travis shut off the Xbox and the two boys marched up the stairs toward the door to the garage. As Jake pulled it open, he heard his mom call out from the dining room. "You boys don't go far! Lunchtime is coming in thirty minutes!"
"Don't worry mom!" Jake called back. "Travis and I will just be in the garage working on his bike!"
He didn't wait for a response before disappearing into the dark and hitting the button on the wall to open the massive roll up door on the two-car garage, allowing the sunlight to flood in. Then he and Travis went to work on the bike, not only tightening the chain, but straightening the handlebars that had been twisted to one side when Travis had crashed into a tree, and replacing one of the pedals that had nearly fallen apart since it was a hand-me-down bike from someone at their church. Travis was thrilled and rode the bike up and down their short driveway and around the cul-de-sac until their mother called them in for lunch.
After scarfing down a massive sandwich, as Dani had predicted, a bag of chips, and a banana, Jake offered to take Travis and Aaron on bike ride to the park and back to pass the time until Finn got home from school. He worried that Dani might want to come, too, but she had disappeared as soon as she was done with lunch without a word. That was highly unusual for her, but not unwelcome since Jake wasn't sure how he would keep himself from ogling her body if she came along.
Thankfully, the bike ride with his younger brothers ate up a fair amount of the afternoon. When the time finally came for Finn to be dropped off, Jake let his mom know where he was going then grabbed his fishing pole and tackle box and hopped on his bike once again to pedal down to the corner where the bus dropped off all the kids that lived on their street. He arrived just as the bus was pulling away, and saw his friend, backpack slung casually across one shoulder, strolling toward him among four other kids from the neighborhood of various ages.
"Jeez Jake!" Finn exclaimed. "You must have been bored out of your mind to meet me right as I got dropped off!"
"Let's just say I'm glad you're finally home," Jake responded, swinging his leg across the back of his bike to dismount and turning it around to walk along side his friend back the direction he had come.
"Yeah, I'm finally free from that prison, even if it is only until tomorrow," Finn joked. "Seriously, though, you usually come find me at home, after I've had a chance to ditch my bag and pack us some snacks. What gives?"
Jake sighed. He certainly wasn't going to tell his friend the real reason he was so eager to hang out with him. What would Finn think of him if he knew he was having dirty thoughts about his own sister?
"It's been a long day, is all," he said finally, and that was partially true. It had felt exceptionally long. "And we won't be able to stay out long tonight, since I have church."
"Oh that's right, it's Wednesday, so you have to go be an altar boy tonight," Finn teased. "No wonder you want to get your debauchery in ahead of time."
"It's not like that..." Jake protested halfheartedly. "But now that you mention it, do you have any new pictures to share?"
Finn glanced around them to see if any of the other kids who had gotten off the bus were still walking close by, but they had all split off to head to their own homes.
"Dude... I've found us some good ones. You'll have jerk-off material for the next month! Or you would if you had a photographic memory."
"Oh shut it!" Jake said, punching his friend's shoulder. "It's not like your memory is any better."
"Doesn't have to be. I'm the one with the tablet," Finn pointed out as they turned into his driveway and Jake laid his bike down carefully on the front lawn, making sure the fishing gear didn't get damaged.
"You say that now, but just make sure your parents don't catch you with those pictures saved on it," Jake warned.
"Oh, don't worry about that," Finn assured him. "My parent's don't check what I've been doing on it. They only got it for me because they figure it will keep me from being too noisy and disturbing their peace. I doubt they could even figure out how to turn it on."
Finn wasn't exaggerating. His parents were much older than Jake's, and had not grown up with computers. They had both been married before and had adult children from their previous marriages, some of whom had their own kids already. They got together and had Finn and his older brother Scott when they were both in their forties. Now they were in their late fifties and far from being computer literate. The only reason they had an internet connection at all was because it had come with their cable TV plan and Scott had set it up.
"Wait here for a minute," Finn instructed. "I just have to drop off my bag and grab my gear." With that the red head disappeared inside his front door, appearing a few short minutes later with his own fishing pole and tackle box. He'd also changed into shorts and a t-shirt. As he approached, he popped open his tackle box and showed Jake that his tablet was tucked inside, then he retrieved his own bike from the side of the garage and the two boys headed out.
They rode through the park and out of the back of the neighborhood, where it was bordered by logging company land, serviced by a bumpy dirt road. Nearly a mile down the dirt road, they cut into the woods, stowing their bikes in some bushes. The forest was thick here, and full of fallen logs that the boys deftly maneuvered over and around to reach their destination. Barely visible in the undergrowth ahead was a short, vaguely unnaturally shaped structure that was the fort the two of them had constructed the previous summer, and had continued to improve upon since then. It was made entirely of natural materials, a fact that Jake was particularly proud of, and only large enough for three or four to sit in comfortably. They had constructed it by lashing logs together using roots and vines and anything else that would work as cordage, then taking evergreen boughs to create a roof and walls that did a fair job of blocking the wind, though a less fair job of keeping out the rain, as they had discovered the hard way.
The important thing was, the fort was a place they could reasonably expect to be left alone. Even in hunting season, not many people were wandering these woods, since they were too close to residential neighborhoods to safely shoot a rifle. The logging company that owned the land didn't even seem to have any intention of logging it anytime soon. They might have in years past, but that was before the city had grown so much that all the neighborhoods had sprung up around it. Indeed, the most likely event would be that the logging company would sell the land to a developer and yet another neighborhood would be built. Until then, Jake and his friend could use their fort to hide away and look at dirty pictures on Finn's tablet.
The two of them crawled through the small opening that served as a doorway and Jake was immediately enveloped by the scent of pine and spruce from the boughs laid on the walls, roof, and even the floor of their fort, to make it more comfortable to sit inside. The interior was not tall enough for him to stand, though he could move around on his knees without his head brushing against the roof, and the evergreen boughs were so thickly piled on the walls and roof that the only light within was the meager amount that filtered through the doorway. Jake took a seat with his back to one of the walls while Finn sat beside him and powered up his tablet.
"I have some real babes to show you today, my friend," Finn bragged, punching in his security code so that the tablet allowed him access to his home screen. Then he tapped the icon for the photos app and turned the screen so Jake could see it better.
Inside the dim fort, the tablet seemed to blaze with light as an image filled its screen. The picture was of a stunning blonde with wavy hair hanging loose to her shoulders. She was facing toward the camera as though looking past it into the distance while standing in a mostly empty room, though the background was too blurry to pick out any details. The shot only showed her from the waist up, and she was unbuttoning a pair of white jeans, though it was impossible to tell if they were pants or shorts. The top half of her body was completely bare, and her large breasts stood out proudly above her toned stomach. She was absolutely magnificent! She didn't have the biggest tits out of all the girls Finn had shown him before, but they were more than adequately large, perfectly round, and had similarly rounded areolas tipped with eraser shaped nipples. Her skin was the perfect shade of tan, with no tan-lines whatsoever.
"She's a stunner, right?" Finn asked, seeing Jake's reaction. "Her name's Nata Lee, or at least that's what she calls herself. She's got loads of pictures with her clothes on, but this is one of the only ones I could find where she shows her tits."
"She's a babe, for sure," Jake agreed, still staring at the photo. Finn swiped his finger across the screen and a new photo took the place of the stunning blonde.
Pictured was a young woman with dark blonde hair with a hint of red, tied back in a short ponytail. She was laying completely naked on a white couch with the photo taken from above looking down on her. She was staring straight into the camera, a mischievous smile on her face, with one hand caressing her shoulder and the other pressing in on an ample breast. Her breasts were easily as large as the first girl's, but they seemed to sag more. Her areolas were more oval in shape, and didn't contrast with her skin tone as much. The main attraction, though, was the bottom half of her body, with her legs spread wide to reveal her shaved pussy, it's pink inner folds poking out from between the soft outer lips. She was equally as gorgeous as the first girl, though in a decidedly different way. This girl looked like more fun, while the first looked more serious. The way her hair was tied back in a ponytail made her look younger, too, though there was no way she was anywhere near his age with tits like those. Something about her smile made Jake's cock twitch even more than looking at her naked body. It held the promise of delights he had never dreamed of.
"Another one you approve of, I take it?" Finn asked with a laugh. "Just wait. They get even better."
Swiping the screen again, a close-up image of a shaven pussy and the woman's inner thighs filled the screen. The inner folds of the pussy glistened with moisture and they were parted, revealing an oblong opening into her depths.
"Why is she wet down there?" Jake asked, transfixed by the high resolution close-up that showed her every fold and goose-bump.
"I don't know, maybe she just went pee," Finn replied. "But that's where you stick your dick in." He pointed to the opening.
"Wow..." Jake breathed. "That's crazy..."
Finn swiped the screen again, much to Jake's dismay, but his disappointment at not getting more time to inspect such a detailed image of a pussy evaporated as the next image filled the screen. It was of a brunette with long, dark hair hanging loosely over her shoulder as she leaned against a wall. The shot was taken from an angle to her left side, though not fully a profile shot, and only showed her from the chest up. What was visible was completely exposed, and she had slightly tanned skin and perky breasts that were nowhere near as big as the previous girls’, though they were adequately round, with erect nipples and round areolas that contrasted nicely with her skin tone. Somehow, those breasts were even more alluring to Jake, even though they weren't as large. What shocked and captivated him, though, was her face. Her round nose, full lips with just the hint of a smile, and thin, dark eyebrows hanging just above her sultry eyes, made her look uncannily like an older version of Dani. His sister still possessed a bit more girlish roundness to her cheeks and innocence in her eyes, and usually kept her long hair tied back and out of the way, but there was no denying the strong resemblance. Was this what she would look like with her hair down and a few more years of growing up? This girl's breasts were probably closer to the same size as Dani's, too. Was that what his sister's tits looked like under her shirt and sports bra?
The image had only been on the screen for a few seconds when Finn suddenly swiped it away saying, "Sorry, I thought I had deleted that one."
"What? Why?" Jake asked, looking up from the tablet, which now had a busty redhead filling the screen.
"Because..." Finn hesitated. "That one looks a lot like your sister, and I thought that might be weird."
"Oh..." Jake said, feeling his face turn crimson and suddenly glad that it was too dark in the fort for his friend to see. "I... I hadn't really noticed."
Finn chuckled nervously and said, "I suppose you wouldn't if your attention was on her tits the whole time."
"Right?" Jake agreed, adding his own nervous laugh. Then it suddenly hit him that his friend had been looking at pictures of someone who looked like his sister. "Hey! Why did you have that picture in the first place if you know it looks like Dani?"
"Chill bro!" Finn started, setting the tablet down on the opposite side of him from Jake and putting his hands up defensively. "I am sure that all of these girls look like the sisters of someone we know."
"That's probably true, but this one looks like my sister, and you knew it did when you saved it to your tablet!" The heat in Jake's face was growing and he wasn't sure if it was because of his embarrassment or his anger at his friend.
"Look, I can understand why you're mad. You have every right to be the protective brother." Finn edged away from Jake a few inches as he spoke. "But before you pummel me, you have to admit that Dani is hot as fuck, and I am not going to be the only guy to notice."
Jake certainly did not want to admit that his sister was hot, but then hadn't that been his issue all afternoon? He'd never thought of her in those terms before, but he'd suddenly had her femininity thrust in his face and he had to admit that it was really messing with his perception of her. Now, after seeing a picture of a naked woman who looked uncannily similar to her, it was even harder not to think of Dani as incredibly attractive, or as Finn had put it, "hot as fuck".
The steam had been taken out of his anger, but Jake still wasn't in any mood to hang out with his friend, knowing that Finn had thought of Dani in similar terms as he was reluctantly having to admit he now did as well. Finn was right, of course, and there would probably be loads of guys who would think of his sister that way, but Jake simply wasn't prepared to find her attractive himself, let alone for anyone else to have the same opinion.
"Whatever, man..." Jake said, crawling to the doorway. "I'm going home to get dinner before church tonight. Maybe we can go fishing tomorrow." The tone of his voice made it plain that he didn't plan on it. He emerged from the fort and retrieved his bike from the bushes without even waiting for Finn's reply. How on earth was he going to make sense of his friend's dirty thoughts about his sister if he couldn't even make sense of his own?
As Dani rode home from church that night, she thought back on the events of the day. After chasing Jake out of the house to retrieve her sunglasses, and discovering the pleasant sensation in her groin when she rubbed it against the tree while climbing up after him, she had looked forward to finding herself some alone time to see if she could make it happen again. First, though, she had helped tutor her youngest brother, Aaron, with his math, his least favorite subject because he struggled with it so much. Then it had been lunch time and Dani had started to wonder how she could possibly find any time to herself for the afternoon. In a household of five children, there wasn't a lot of alone time to be had, and since her bedroom was right next to the living room on the ground level, she could not expect to get away with hiding in there; certainly not with the sun shining outside. Her mother would ensure that all the children spent ample time outdoors as long as the weather was good, and June had been unseasonably clear and hot so far.
As much as Dani wanted to investigate whether she could reproduce that warm and pleasurable feeling, she couldn't just go rubbing her crotch against objects where anyone might see her. With the privacy of her own room out of the question until later that evening, that left only the tree-house in the back yard, but that was Travis and Aaron's favorite hang-out spot most afternoons. Fortunately, Jake had unwittingly come to the rescue by taking the other boys with him on a bike ride. That in itself was odd. Usually Jake would spend most of the day until Finn got home from school hanging out with her. Yet, today he seemed to have avoided her like the plague after stealing her sunglasses that morning. She decided she would need to find out what that was all about if it continued, but for today it had worked to her advantage, affording her the alone time she craved.
Dani had gone out to the tree-house immediately after her brothers left for their bike ride. It was situated at the back of their property, built around the trunk of another of the massive maple trees, with a ladder leading up to a trap door in its floor. It was not terribly high off the ground, only ten to twelve feet or so, but that was high enough that no one standing on the ground could see inside the small windows. Once inside, Dani knew she could expect near complete privacy, especially since the branches of the tree hid the tree house windows from anyone on the second floor of their home looking toward the back of the property.
Hesitantly, Dani had gone to the trunk of the tree sticking up through the middle of the tree-house floor. It had a slightly larger circumference than the one she had climbed that morning, but she could still wrap her legs all the way around it. She could not do the same with her arms, however, so she leaned back and supported her weight with her hands on the rough planks beneath her. This didn't allow her to move her hips nearly enough to rub herself against the tree, so she let her feet fall to the floor as well. This gave her the freedom of motion she needed, and also allowed her to control how much pressure she exerted as she slid her cutoff jean clad crotch against the tree. The sensation was nearly immediate; a dull, warm pleasure welling up from between her legs. She continued to move her hips up and down, sliding herself against the tree's firm girth, the roughness of the bark dulled by the layers of cloth between it and her skin. The sensation seemed to build with each repeated grinding of her hips, but so did her fatigue. It was hard work to hold her whole body suspended in the air with just her arms and legs while she pumped and ground her groin against the trunk. Soon she was forced to collapse to the floor in exhaustion, despite how good it felt and how much she wanted to keep going.
She needed to find something else she could rub herself against. Something that didn't require her to hold herself up the whole time, but the inside of the tree-house was pretty sparse. There were a couple of beanbag chairs and a small table between them acting as the only furniture, but that was about all, aside from a few action figures and Lego bricks her brothers had left strewn across the floor. She wondered if she might be able to use her own hand instead, and went over to recline in one of the beanbag chairs. Spreading her legs, she placed the palm of her hand on the crotch of her cutoffs and gently rubbed downward and back up. The sensation was pleasant, but not as strong as it had been while rubbing against the tree trunk. She continued to rub herself for several minutes, but the sensation just stayed a dull, pleasurable ache, rather than building upon itself as it had when grinding against something more firm and solid, not to mention more textured, than the palm of her own hand.
Frustrated, Dani had spent the rest of the afternoon playing with their dog and then helped her mother prepare for dinner. Now that she had a bit more time to think about what had happened, though, she wondered if the sensation with her hand might have been stronger if she didn't have the thick fabric of her cutoffs in the way. She would have the perfect opportunity to test that theory not long after getting home, since Wednesday night was her turn to take a shower. Dani liked to take her showers late in the evening, if possible. It always felt good to go to bed fresh and clean, and it was relaxing to brush and dry her long hair, which usually helped her wind down for sleep. The shower would also be the perfect opportunity to be alone and try rubbing herself without any clothing in-between her hand and her vagina, which seemed to be the source of the pleasant sensation.
When their minivan pulled into the garage, the whole family piled out, filed into the house through the door to the main entryway, and split off in various directions. Dani's mother and father went upstairs to put Bec down for bed, her brothers went downstairs to get their pajamas on and brush their teeth, and Dani went through the kitchen and living room to get all the way around to her own bedroom. Once there, she retrieved her shower supplies from atop her vanity across from her bed. Her bathroom doubled as the family and guest bathroom, and was too small for Dani to leave all of her things laying around on the counter like her brothers could in their larger bathroom downstairs. She was allowed to leave her shampoo and body wash in the shower, because it was hidden from guests by the closed shower door. She was also permitted to leave her toothbrush and toothpaste inside the medicine cabinet behind the over-sink mirror. But she had to keep her razor, shaving gel, deodorant, and towels in her own room and take anything she needed with her to use the shower. This resulted in Dani doing as little of her hygiene in the bathroom as she could get away with, using her vanity in her bedroom instead.
Dani brought a towel for her hair, another for her body, and her bathrobe with her as she exited her room and crossed behind the living room couch to the small bathroom beyond. Closing and locking the door behind her, she crossed the room and locked the opposite door as well. Whoever had designed their home had thought it would be convenient to have access to the bathroom from both the living room and the kitchen. In reality it had just been more hassle remembering to lock and unlock both doors instead of just one. Indeed, it had led to more than one awkward encounter when she had forgotten to lock one door or the other before using the toilet, only to have her father or one of her brothers barge in on her by mistake. Having ensured a similarly embarrassing event would not occur this evening, Dani set her things on the small counter next to the sink and began to disrobe, letting each article of clothing fall to the floor. Then she pulled out the hair tie holding her ponytail back and strode naked over to the shower stall. The bathroom was too small to fit a tub, but Dani didn't mind most of the time. If she really wanted to take a bath, her parents would often let her use the massive tub in their master bathroom upstairs, rather than make her use the one in her brothers' bathroom in the basement. Most of the time she just wanted to get clean and be done with it, though, so a shower suited her fine.
She turned on the water and waited for it to get warm enough to step in, then turned it up until it was just this side of scalding, the way she liked it. When the steaming hot water poured over her skin, she let out a deep and relaxed sigh of pleasure, then got her hair thoroughly wet before sudsing it up with shampoo and rinsing it out, enjoying every second of the cleansing heat. Her plans of trying to give herself pleasure again were nearly forgotten as she lost herself in the soothing waters, until she started soaping up her body and she got to washing her more sensitive regions. As her fingers moved through the tuft of hair on the mound above her vagina she remembered that she was going to try to use her hand to rub against her bare skin and see if that made any difference. Dipping her hand lower, she put pressure against her mound and the outer lips of her vagina with her palm of her hand, the water and soap allowing it to slide smoothly along without any noticeable friction. Her body responded with a slight pleasurable ache, encouraging her to continue.
As she slowly rubbed the palm of her hand up and down against her sex, she felt the sensation begin to build upon itself, growing in strength and demand for more. Her hips had begun pressing into the motions of her hand almost of their own accord and Dani was surprised to feel something between the outer folds of her vagina that had grown firm. It was like a shallow ridge with a round nub, protected beneath the folds of skin. Experimentally, she let her palm drift higher over her mound, and ran two of her fingers to either side of the nub. The resulting shudder of pleasure was almost overwhelming, making her legs feel weak so that she had to lean against the shower wall to remain upright. Whatever that was, it felt AMAZING, and was most certainly the source of the pleasurable sensations.
Dani focused her attention on that nub, running her fingers up and down, around, and across it, enjoying every spark of more and more intense pleasure that erupted as a result. She was not prepared for what happened next, as her whole body suddenly went tense involuntarily, and pleasure exploded inside her, pulsing and throbbing through her whole core. She gasped in surprise and bit her lip hard to keep herself from calling out, since she knew her parents were likely watching TV just beyond the bathroom wall. Her legs could not hold her anymore, and she let herself slide down the smooth side of the shower stall, her fingers still gently teasing the center of her pleasure as wave after wave of sensation wracked her body. Each wave eventually seemed smaller and less intense than the last until it finally subsided, leaving behind a satisfied hum of pleasure as Dani's breath came in desperate heaves.
She had no idea what had just happened, but it had been utterly fantastic! She knew instantly that this would be her new shower-time routine, maybe even nightly bedtime routine, from now on. She had no idea she could give herself such pure and intense bliss! Absently, she wondered if her friend Audrey was aware of it. Maybe it was just something unique to Dani, and Audrey would look at her like a weirdo when she asked, but she decided she must find out for sure the next time she had opportunity to hang out with her friend.
When her breathing finally returned to normal, Dani collected herself from the shower floor and finished washing before shutting off the water and grabbing one of her towels. She hoped that her parents hadn't noticed how much longer of a shower she had taken than normal, as she didn't want to try and explain why. She could probably come up with an excuse if she thought about it, but her brain wasn't firing on all cylinders after that incredible experience. As she tied a second towel around her still soaking wet hair, she thought to herself that even though she'd just moments ago enjoyed the deepest pleasure she’d ever felt, she couldn't wait to try it again.
Jake lay in his bed trying to focus on reading a book, but found that he could not keep his mind on the task at hand. His brothers had already gone to bed, and he could hear the water running upstairs where his sister still taking a shower. Meanwhile, his parents were probably watching TV in the living room, unless Bec had given them trouble trying to put her down for the night. As one of the oldest two Hansen children, Jake was allowed to stay up later than his younger brothers, but because they were trying to sleep, he was restricted to having quiet time in his room. Normally he'd be fine with that. He enjoyed reading, or drawing, or whittling with his pocketknife, but tonight was different.
All through church, Jake had been distracted from the youth pastor’s message by the image he'd seen on Finn's tablet screen that afternoon. He had nearly forgotten the other pictures, but the one of the woman who looked so much like Dani was firmly lodged in his brain, even though he'd only seen it for a few seconds. The perky breasts with erect nipples jutting out below elegant collar bones and satin smooth skin were burned into his memory, along with that slight, knowing smile and seductive eyes. It was his sister's face, even if obviously more mature and angular. Was there a similar resemblance to his sister's body? He'd probably never know. Dani was just one floor above him, completely naked in the shower, but beyond his gaze. He'd have no excuse to go anywhere near that bathroom to even attempt to catch a glimpse of her. Even if he tried, his sister was always good about locking the door since she lived with three brothers.
Then a thought occurred to him: Dani wouldn't just be undressed in the bathroom for her shower. He'd sat in the living room watching a movie with his parents before and seen her come out of the bathroom wrapped in her robe to scurry across to her bedroom to change into pajamas. That meant she would be naked in her bedroom, too, at least for a short time. Moreover, her bedroom had a window that she always complained was pointless because the only thing she could see out of it was the overgrown rhododendron bush planted outside. It was so big and thick with foliage that she could not even see through it to the side fence between their yard and the forest beyond. For his part, Jake had always retorted that at least she had a window, since his basement bedroom had none. The only thing on that side of the house outside Dani's window was a completely unused space intended for parking an RV, which the Hansens could never afford on their father’s pastor salary. If Jake was quiet about it, he could sneak out the basement door into the back yard, and around to Dani's window. By now it was dark enough that he probably would not be seen, if he was careful. He would have to hurry, though, because he had just heard the shower water stop.
Not wasting any more time thinking about it, he sat up, closed his book, and set it on the bed before throwing on some shoes and a light jacket, since the night air would likely be cool. Then he crept out of his room as quietly as he could to avoid alerting his brothers, in case they were still awake in their bedroom on the opposite side of the game room. The basement was dark, but Jake could easily navigate past the couch and coffee table on his left to the basement's exterior door. He eased it open, stepped outside, and closed it again just as silently, then crept up the concrete stairs to the back lawn.
Alerted to his presence, Dozer gave a low bark of alarm, then noticed it was him and trotted over from his dog house by the fence. Jake gave the big dog a pat then commanded him to go lie down in a stern whisper. The dog obeyed, returning the way he had come to plop down in front of his dog house. Jake let out a sigh of relief and continued around the corner of the house to the side where the rhododendron bush grew in front of Dani's window. The window itself was dark as Jake made his way toward it and he worried that he might have been too slow; that his sister might have already dressed in her pajamas and tucked herself into bed. Determined to confirm if that was the case, he crept closer, easing himself behind the massive bush and resting on his knees before inching his head up to the bottom corner of his sister's window. As his eyes peeked up to peer inside her room, he found that it was too dark to see anything but her window blinds, which were open to allow the sunlight in during the day. Between the blinds, all he could make out was the vague shape of her bed to his right, and her vanity on the opposite wall to his left. Beyond her bed he could make out the strong right angle of her closet door, but no details at all. Not enough to confirm whether his sister was in bed already or not.
Suddenly, a long, vertical sliver of light appeared at the back left end of the room and grew wider as the door was opened, then light flooded his eyes as Dani turned on her bedroom light. Instinctively, Jake ducked below the window, blinking away his light-blindness, then set his resolve and peeked back into his sister's room.
Dani had closed her door and was tossing an armload of her clothes into a hamper next to her vanity. She then hung a towel from the post at the foot of her bed that was farthest from the window and began to unwrap the towel on her head from around her hair, using it to tousle the long locks and help them dry. She then moved closer to the window in order to place this towel on the other post on the opposite corner of the foot of her bed. At last she moved on to what Jake had been waiting for: she undid the tie at the waist of her robe and casually let it fall to the floor.
Jake nearly gasped at the sight of his sister's suddenly naked form. She was absolutely exquisite! Unlike the girl in the photo, she had obvious, though light, tan lines on her legs and shoulders from her cutoffs and tank top that she wore on particularly warm days. Her wet hair hung heavily past her shoulders, brushing against her skin as she moved, bumping enticingly against her breasts. And Dani's breasts were mesmerizing as they jiggled slightly on her chest while she ran her fingers through her wet hair, tossing it behind her. They definitely were not as big as the tits on the first two girls Finn had shown him that afternoon - maybe not even as big as the woman who was Dani's lookalike - but they were perky, round, and firm like only a teenage girl's tits could be, with cute nipples standing out proudly from being exposed to the air.
Jake didn't get a chance to let his gaze drift lower before Dani turned to go take a seat at her vanity, revealing a round, bubble butt for a few precious seconds before she sat down. From his angle at the window, he couldn't see Dani's reflection in her vanity's mirror, but he did get a delicious view of the side of her left breast as she grabbed her hairbrush and began working tangles out of her long hair, causing the round breast to bounce playfully and sway slightly.
He was rooted to the spot as surely as the rhododendron bush beside him as he watched his naked sister brush and dry her hair. Her skin was so perfect, and her proportions so petite, and yet toned and athletic at the same time. He could see the muscles of her arms and shoulders moving beneath her smooth skin, and the graceful slope where her neck met with her torso. How had he never noticed this before? It wasn't as if all of these things had been hidden under her clothing. He had just never paid attention until now.
Finished with her hair, Dani got up from the vanity and strode over to her closet, giving Jake his first look at her pussy with it's clump of bush on the mound above it. That was something he hadn't seen before. All of the vaginas he had seen on Finn's tablet had been bare, but Dani's had hair similar to the fuzz surrounding Jake’s own dick. Her breasts bounced with each step across the room until she turned her back to the window and opened her closet door. Jake enjoyed another glorious viewing of her round ass while she fished clothing out, then she turned and tossed her pajamas onto her bed and bent down facing him, her breasts hanging enticingly in his view for a moment before she straightened, pulling a pair of panties up her legs and over her pussy, hiding it from his gaze. Then she snagged her pajama pants off the bed and pulled them on over her panties, and Jake knew what would be next so he savored a last look at her perfect tits. Dani slipped each of her arms into the sleeves of her pajama top in turn, causing her breasts to sway and jiggle even more before she began to button up the front of the garment. Fully clothed, she turned to close her closet door and Jake could just make out the roundness of her ass from the way the light pajama material clung to her skin.
Her evening routine now concluded, Dani turned on her bedside lamp, crossed toward the door to turn off the ceiling light and returned to her bed in the half darkness. She flung aside the covers and flopped onto her mattress before snuggling in for the night, and Jake knew that was his cue to leave. He wasn't going to get any more of a show, and he'd already gotten more than he had hoped for.
Quietly as he could, he pushed his way out of the rhododendron bush and crept around to the back yard then down the stairs into the basement and across the game room to his own bedroom door, conscious that his wildly attractive sister had just settled in for the night directly above him. He slipped out of his shoes and tossed his jacket to the floor before crawling into his bed, picking up the book he couldn't focus on earlier and placing it on his nightstand. He let himself flop onto his back, his head hitting his pillow, and he stared up at the ceiling re-living every detail of what he had just seen.
He'd just watched his older sister as she went about her evening routine completely naked, and she was drop dead gorgeous! As he thought about her lithe form, his hand naturally wandered down to his dick and began gently stroking it. Soon he was jerking off in earnest and the only images in his head were of Dani. He needed very little imagination to picture her, since her body was so freshly burned into his mind, and it took no time at all before he was ejaculating pulse after pulse of thick cum into a sock that he kept nearby for that purpose.
When he was done, he felt that slight sense of guilt that always followed a jerk-off session, tinged with additional guilt for spying on his sister in the privacy of her room. Yet he already knew that since he'd gotten away with it this time, he would be back again for more. His sister generally showered Monday, Wednesday, and Friday evenings, and that meant he only had two days to wait before he would have another opportunity to see her naked. It was an opportunity he doubted he would ever pass up again.
-
@ e373ca41:b82abcc5
2025-02-13 22:27:58This article has been written with the Pareto client. (read it there for the full experience). It was first published in German by Milosz Matuschek on "Freischwebende Intelligenz".
It is unmistakable. The hydra of the Deep State is losing a few heads - and this time it's the turn of the media heads. Anyone can look at USASpending to see how much taxpayers' money has gone to whom in the USA.
When the state pays its advocates
The mainstream media were also among the beneficiaries: Politico (100% Axel Springer) received over USD 7 million; the New York Times received over USD 40 million. Thousands of (probably not always necessary) government subscriptions flowed to large media houses - paid for with taxpayers' money. A form of covert press financing by the state. At what point can or should we speak of state media?
However, this is only the tip of the iceberg. The CIA front organization USAID (known for its funding of virus research in Wuhan and other questionable activities) - pumped USD 472.6 million directly into the media landscape via the “Internews Network”. FAZ journalist Udo Ulfkotte once called this “bought journalists” in a very clear and media-effective way, which was not good for his health. There is ample evidence of the CIA-USAID connections, for example here, here and here.
But this is now over for the time being: USD 268 million, which was to go to “independent media for the free flow of information” (according to the Columbia Journalism Review) in 2025, has been frozen. The largest media influence machine in the Western world is bleeding a little. One has to admit: part of the media-deepstate swamp is actually being drained dry financially. The fact that the Columbia Journalism Review doesn't even seem to notice that “free international journalism”, which, as it writes, is largely funded by USAID, ceases to be “free journalism” speaks volumes about this “hotbed of journalism”. Matt Taibbi of Racket News rightly finds, “The legacy media system is dead. They just don't know it yet.”
ADVERTISEMENT:
Looking for the easiest way to buy Bitcoin and store it yourself? The Relai app is the No. 1 crypto start-up and No. 2 of all fintech start-ups in Switzerland. Here you can buy Bitcoin in just a few steps and also set up savings plans. Nobody has access to your Bitcoin except you. With the referral code MILOSZ you save on fees (no financial advice). Disclaimer due to regulatory issues: The services of the Relai App are hereby only recommended to inhabitants of Switzerland or Italy.
Need more security? The Trezor wallets are recommended and easy to use, others are available in the store. Need more advice? Book an introductory meeting with a wallet expert.
Large-scale media manipulation has become visible. The propaganda matrix, if you will. The disastrous thing about it: if the Overton window is infiltrated, so to speak, the entire institution of journalism cannot be trusted. Every day, readers must expect to be pulled through the nose ring of intelligence service narratives and public agendas by mainstream journalists who pretend to be objective (and are often simply clueless and unsuspecting). The panorama of what we are supposed to see and believe, so to speak.
How many mainstream journalists today are basically mouthpieces for the services? Every mainstream reader must now ask themselves: Is my favorite journalist at NZZ, Welt, SZ, ZEIT or FAZ perhaps just a CIA-IM? There were no major dissenters among them: EU criticism? Vaccination criticism? Criticism of NATO? Criticism of Biden and America? Criticism of Nord Stream? There were brief moments on television when questions about journalists' ties to lobby organizations were still part of the German satire program.
https://x.com/Spitze_Zunge_/status/1887915509988876786
The cards in the media are being reshuffled
The watchdog of the powerful has been infiltrated by the powerful. This means that the Fourth Power is not a power at all, but part of the executive branch, a mouthpiece of the government. The claim that the mainstream is quality journalism, the gold standard for trustworthy information, is therefore the real fake news. It is the last, now crumbling dogma of an infiltrated press sect that has formed a cartel and is subjecting citizens to a permanent psy-op with intelligence-controlled taxpayers' money. A troupe of spokespeople at the work of mental synchronization.
https://x.com/TopherField/status/1887962959072149989
The fight against independent media
But they not only give to one, they also take from the other. While government agencies use taxpayers' money to promote a certain type of journalism, the juice is actively being cut off from the critical part. All it takes is to be classified as a “PEP” (politically exposed person) and the bank account is gone. This is what has just happened to swiss Radio Kontrafunk. The critical Swiss author Stefan Millius was canceled by his publisher. Others have had their monetization via YouTube cut off (Snicklink). Others are harassed by the state media authority (Multipolar, Alexander Wallasch). The next one has a house search. It has been known since the Twitter files that the government and services also intervened massively in social media communication. This is no longer the Cold War. But it is the cold information war.
https://www.youtube.com/watch?v=kmgWAGDFCZI
Is this all so outrageous and new? During the Cold War, the CIA systematically infiltrated media outlets in the US. Thousands of agents were deployed as journalists - and wrote what they were told. This “Operation Mockingbird”, which the Church Committee also investigated, never ended, so to speak. It lives on as Operation Mockingbird 2.0.
Intelligence payments to media outlets continue to exist. USAID distributes millions for “pro-democratic” reporting. Government subscriptions keep uncritical media alive. Media control of public opinion is the most important tool of power in a modern “democracy”. The difference to back then? Today, the manipulation is global. However, these revelations come at a time when trust in the media is already at an all-time low. The fear of being lied to by the powerful is currently the majority opinion at 70%. They are currently in the process of convincing the remaining 30% of their own incompetence.
Update on the Pareto project
“Half the victory”, says Sun Tsu, ‘lies in the impregnable defense’. Free media now have the opportunity to build their own impregnable bastion and the Pareto Project invites them to do just that: become uncensorable, be able to scale infinitely and not depend on third parties for all processes of journalistic work. It's all possible now. Everyone has to realize that: With other platforms, you build your house on someone else's property. With Nostr/Pareto, there is nothing and no one between author and reader, both in terms of communication and payment (via Bitcoin/Lightning).
A brief update on the project, January was very busy.
- We have about 35 journalists, publications, substackers, bloggers, memers onboarded who publish texts via the Pareto client, and the number is growing all the time.
- The first Telepolis authors, such as Mathias Bröckers and Alexander Unzicker, will soon be able to re-publish their deleted texts with us in a censorship-proof manner, and we are helping with the migration of content.
- We recently successfully tested the newsletter function! We will soon be able to offer all authors and readers the functions of Substack, Steady, Ghost etc. without having to entrust their readers' sensitive data to a platform or expose them to platform tracking.
- We are delighted to have more high-caliber additions to our development team, which now comprises around ten wonderful people, almost all of whom come from this group of readers.
- Our open source code is now also public.
-
We have opened a crowdfunding on Geyser!
-
Our editor will soon be available to everyone free of charge (atm you have to drop us your npub: team@pareto.space)
What's next?
This opens up a new window of unimagined possibilities: On a strong basis such as that offered by decentralized technology, many critical authors can now publish securely or new publications can be created - worldwide and uncensorable. What kind of publications would you like to see? Where do you see gaps (also in the critical spectrum) that need to be filled, both in terms of formats and topics? What does the journalism of the future look like to you? Feel free to write to me: milosz@pareto.space
One last thing
Our funds are coming to an end. If you would like to support us: We have started a crowdfunding on Geyser, where you can help us with Bitcoin/Lightning donations.
For traditional donations, you can find our bank account on our landingpage.
Join the marketplace of ideas! We are building a publishing ecosystem on Nostr for citizen-journalism, starting with a client for blogging and newsletter distribution. Sound money and sound information should finally be in the hands of the people, right? Want to learn more about the Pareto Project? Zap me, if you want to contribute (all Zaps go to the project).
Are you a publication or journalist and want to be part of it, test us, migrate your content to Nostr? Write to team@pareto.space**
Not yet on Nostr and want the full experience? Easy onboarding via Start.
-
@ dbb19ae0:c3f22d5a
2025-02-13 20:42:08Installation:
bash python3 -venv nostr-sdk source nostr-sdk/bin/activate pip install nostr_sdk requests
Python program: ``` pythonUsage example: python ns_read_metadata.py nostr:npub1mwce4c8qa2zn9zw9f372syrc9dsnqmyy3jkcmpqkzaze0slj94dqu6nmwy
Compatible with version 0.39
ns_read_metadata.py
version 3
import asyncio, argparse, json from nostr_sdk import Metadata, Client, NostrSigner, Keys, Filter, PublicKey, Kind from datetime import timedelta
async def main(npub): client = Client() await client.add_relay("wss://relay.damus.io") await client.connect() pk = PublicKey.parse(npub) print(f"\nGetting profile metadata for {npub}:") metadata = await client.fetch_metadata(pk, timedelta(seconds=15)) print(metadata)
if name == 'main': parser = argparse.ArgumentParser(description='Fetch all metadata for a given npub') parser.add_argument('npub', type=str, help='The npub of the user') args = parser.parse_args() asyncio.run(main(args.npub))
```
-
@ 19220736:7578e0e9
2025-02-13 20:39:52The U.S. economy is facing a double whammy of challenges as housing prices skyrocket and trade tensions escalate, creating a perfect storm of economic strain for everyday Americans.
First-time homebuyers are bearing the brunt of the housing crisis, with median home prices rising by nearly 15% in major cities over the past year [1]. While wages have remained stagnant, the cost of living continues to climb. This has left many young families and individuals struggling to afford homes, forcing some to delay homeownership or take on risky levels of debt.
Meanwhile, trade tensions between the U.S., Canada, and Mexico have added another layer of uncertainty for businesses and workers. The Trump administration's tariffs [2] on goods imported from these countries will lead to higher costs for industries ranging from agriculture to manufacturing. Companies reliant on imports will see profit margins shrink, with some forced to lay off workers or pass the added costs onto consumers.
The interplay between these two experts warn that they could feed into each other. Rising housing costs can limit the availability of skilled labor, as workers may need to take on more demanding jobs to afford rising rents or home prices. This, in turn, could impact industries already struggling with reduced productivity due to trade disruptions.
The long-term effects of trade tensions remain unclear, but the uncertainty caused by the threat of tariffs has already led to reduced investment in Mexico, with businesses hesitant to expand operations for fear of retaliatory measures from other countries [3]. While some argue that stronger trade agreements could benefit all parties involved, others fear that continued tension could lead to reciprocal measures that harm global markets.
The cumulative effect of these challenges is leaving many Americans feeling vulnerable. From the first-time homebuyer struggling to save for a down payment to the worker worried about job security, the combination of rising housing costs and trade tariffs creates a perfect storm of economic instability.
In cities across the U.S., local leaders are calling for more affordable housing [4] options and better wage protections as immediate solutions. Advocates argue that without addressing these issues, the economic strain on families will only worsen, potentially leading to long-term social and economic consequences.
While both issues are complex and multifaceted, the need for a coordinated response has never been more urgent. Policymakers at all levels of government must work together to mitigate the negative impacts of rising housing costs and trade tariffs, ensuring that no one is left behind in this challenging economic landscape.
Reference links:
[1] Past year
[2] Tariffs
[3]
[4] Housing
-
@ 3ad01248:962d8a07
2025-02-13 20:03:40I feel like this is go to be a common phrase over the next four years. While I generally like most of the policies that he is in favor of, I for the life of me can't understand his position on Gaza. It sounds like nothing like the Trump for the campaign trail whatsoever.
When he ran for president last year he ran on a platform of not starting any new wars. Having a US solider set foot in Gaza is a recipe for disaster and chaos. Sending in the military is not "America First". Gaza has no national security implication for the United States so obviously there is a different reason why President Trump is proposing this idea.
We have to look at who funded his campaign to understand his motives by wanting to clear out Gaza and rebuild it like it some real estate deal.
Miriam Adelson
Miriam Adelson the wife of late casino magnate Sheldon Adelson gave Trump $100 million to help get Trump elected. Mrs. Adelson is a pro-Israel and supports a variety of Jewish causes. $100 million buys you a lot of political favors if you ask me. Mrs. Adelson and her husband were the power behind the scene of the first Trump administration to get them to move the US embassy to Jerusalem.
She also own the largest newspaper in Israel which means she has the ability to impact public opinion inside the country. As you can see this is person with a tremendous amount money and social capital to spend and she is undoubtedly using it to get Trump to purge Gaza of the native Palestinians.
Who else is in Trump's ear that influence him to come up with crazy idea?
Jared Kushner
We all know that Trump values family and loyalty above all else so it is no surprise that Trump would listen to someone in his family for guidance on what to do in Gaza. Jared Kushner is that guy for Trump. As the son-in-law of is favorite daughter you can bet that he is going to listen to what he has to say. Funny you listen to Trump and I swear that you hear Jared come out of his mouth.
Back in March 2024 Kushner suggest the very idea that Trump is talking about right now! Almost verbatim to be honest. Here is a link to a talk where Kushner laid out what he thought should happen to Gaza and the Palestinians.
https://www.youtube.com/watch?v=nneWrllngAU
When you listen to it, you see that Trump basically took this idea from Kushner and made it his own.
Who is exactly is running the show in the White House? Trump seems to be doing the bidding of everyone else except the American people. Who else is Trump listening to on the Gaza issue?
Bibi Netanyahu/Israeli Far-Right
Last but not least is the persons behind all the death and mayhem in Gaza. Trump absolutely sides with the Israeli narrative spun by Bibi Netanyahu and the Israeli far right characters such as Itamar Ben-Gvir and Bezalel Smotrich. This trio have a distinct hatred of Palestinians and do not want to see the creation of a Palestinian state.
They want to see occupied West Bank annexed by Israel and all of the Palestinians there to leave or be subjugated to Israeli rule.
Just take a look at the worldview of these people and they have power within the halls of the Israeli government.
https://www.jpost.com/Israel-News/Politics-And-Diplomacy/Bayit-Yehudi-MK-causes-uproar-by-saying-God-commanded-Jews-not-to-sell-homes-to-Arabs-409241
https://hashiloach.org.il/israels-decisive-plan/
https://www.reuters.com/article/idUSKBN0MC1I7/
When you have this world view how is peace even possible? It's not because they don't want peace and quite frankly I don't know if its possible at this point. Israelis and Palestinians have diametrically opposing views of what the land should be.
Israeli believe that the land should be exclusively governed by Jewish people whereas the Palestinian view from what I understand just want to return to the lands they were kicked out from and deal with governance later.
There are elements on both side that want this conflict to go on forever because it gives the outsized power, namely Hamas on the Palestinian side and the Israeli Far Right on the Jewish side. I would guess that a majority of people in the middle would have no problem living side by side with each other as long as rights and freedoms were respected.
A one state solution looks like the most reasonable solution to me but the odds of that happening are slim to none right now.
President Trump has the power to change the middle east for the better if he had the backbone do to what is right but it looks like he is going to listen to people the want war, genocide and ethnic cleansing.
-
@ 21ffd29c:518a8ff5
2025-02-13 20:03:17Introduction: Self sovereignty is a pivotal concept in understanding personal autonomy across various ideologies, including, libertarianism, socialism and individualism. This article explores how the statement "I own myself" by the Ole Voyager in the 1600's encapsulates this principle, emphasizing empowerment and self-management.
Article:
- What is Self Sovereignty?
- Definition: It refers to the ability of an individual or group to govern themselves without external imposition.
- Core Principles:
- Autonomy: The right to manage one's own affairs independently.
- Equality: Recognition of equal rights and responsibilities among individuals.
-
Historical Context: Rooted in ideas from liberalism, socialism, and feminism, advocating for personal freedom and equality.
-
The Significance of 'I Own Myself'
- Statement Explanation: The Ole Voyager's quote highlights personal ownership over one's life, values, and destiny.
- Contrast with Traditional Views: Shifts from societal control to individual responsibility, advocating for personal agency.
- Implications: Encourages owning health, relationships, knowledge, and cultural identity, promoting a holistic view of self-worth.
Conclusion: Understanding self sovereignty through the Ole Voyager's statement is crucial. It empowers individuals by asserting their right to manage their lives autonomously. This concept not only enhances personal freedom but also challenges societal structures, fostering inclusive governance that respects individual rights and equality.
Not everyone has the capacity to be a sovereign and self govern themselves. Some are quite content to be told what to do and how to do it. Others are very happy to be on the dole and get free things in exchange for trinkets.
This empowerment can lead to more equitable societies where individuals thrive within their own means, emphasizing empowerment and collective responsibility.
-
@ 30b99916:3cc6e3fe
2025-02-13 18:56:37Upgrade Details
Download current release and manifest files ```shell Navigate to https://github.com/getAlby/hub/releases/tag/v1.13.0/
Download albyhub-Server-Linux-x86_64.tar.bz2 manifest.txt manifext.txt.asc
Copy the downloaded files to $HOME mv $HOME/Downloads/albyhub-Server-Linux-x86_64.tar.bz2 $HOME mv $HOME/Downloads/manifest.txt $HOME mv $HOME/Downloads/manifest.txt.asc $HOME
Verify manifest signature & Checksum
sh Only need to import oncecurl https://raw.githubusercontent.com/getalby/hub/master/scripts/keys/rolznz.asc | gpg --import
gpg --verify manifest.txt.asc manifest.txt gpg: Signature made Tue 07 Jan 2025 08:56:42 PM PST gpg: using RSA key 5D92185938E6DBF893DCCC5BA5EABD8835092B08 gpg: Good signature from "Roland Bewick roland.bewick@gmail.com" [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: 5D92 1859 38E6 DBF8 93DC CC5B A5EA BD88 3509 2B08
shasum -a 256 server-linux-x86_64.tar.bz2 a75c03d241921611dfc428c413c4a2c2cef35bc6d1974839b688ef462604058d server-linux-x86_64.tar.bz2
The above checksum should be referenced in the manifest.txt file
cat manifest.txt ```
Stop AlbyHub & Backup existing data directory & Binaries ```shell systemctl stop albyhub
cp -r $HOME/.local/share/albyhub /media/veracrypt1/albyhub cp $HOME/bin/albyhub $HOME/bin/albyhub172 cp -r $HOME/lib $HOME/lib172
Extract new release Binaries & Start AlbyHub
sh tar -xvjf albyhub-Server-Linux-x86_64.tar.bz2./ ./lib/ ./lib/libglalby_bindings.so ./lib/libldk_node.so ./lib/libbreez_sdk_bindings.so ./bin/ ./bin/albyhub
systemctl start albyhub ```
Navigate to http://localhost:9090
-
@ dbb19ae0:c3f22d5a
2025-02-13 17:46:41This code below works with nostr_sdk 0.32.2
``` python import asyncio, argparse, json from nostr_sdk import Metadata, Client, NostrSigner, Keys, Filter, PublicKey, Kind from datetime import timedelta
async def main(npub): client = Client() await client.add_relay("wss://relay.damus.io") await client.connect() pk = PublicKey.from_bech32(npub) print(f"Getting profile metadata for {npub}:") f = Filter().kind(Kind(0)).author(pk).limit(1) events = await client.get_events_of([f], timedelta(seconds=15)) if events: event = events[0] metadata_dict = json.loads(event.content()) for key, value in metadata_dict.items(): print(f"{key}: {value}") else: print("Could not retrieve metadata for the given public key.")
if name == 'main': parser = argparse.ArgumentParser(description='Fetch all metadata for a given npub') parser.add_argument('npub', type=str, help='The npub of the user') args = parser.parse_args() asyncio.run(main(args.npub)) ``` but with nostr_sdk 0.39 the program no longer worked and crash with error:
AttributeError: type object 'PublicKey' has no attribute 'from_bech32'. Did you mean: 'to_bech32'?
why?
source: - https://github.com/ev3rst/nostr_sdk_examples - https://alashazam.wordpress.com/2024/07/07/python-nostr_sdk-fetching-all-metadata/
-
@ 8e56fde2:bb433b31
2025-02-13 17:41:41Let us introduce you to “DoShit!”: the oracle that three friends created in order to combat creative block. A self-produced card game made possible by the investment of a generous patreon who believed in us from the start, and in empowering people to Do their Shit.
What is DoShit! ?
DoShit! is a card game that guides you in the process of building a creative life. It’s a self-reflection tool when used individually, and also a great conversation starter when played with friends or strangers.
84 oracle cards that will help you question your fears, your strengths, doubts, excuses…
DoShit! is a great companion to bring along when meeting your friends or potential collaborators. Both individually as well as collectively, the game can become very addictive once you start asking about your projects and aspirations. Sometimes the cards even lay on you hard truths necessary on the journey to self-discovery
The cards are very intuitive to understand accompanied by a language that sparks profound conversations in a lightweight manner.
Learning how to play takes less than 5 minutes and anyone can attempt to interpret the cards without any previous knowledge (even if it may feel scary at first). In fact, the card readings always benefit from people sharing their own interpretation of the cards.
Link to video
Why DoShit! ?
As creators, we are very aware of the struggles of building a creative life and also of how easy it can be to limit ourselves, hide behind excuses, let fear win and quit. Our philosophy in response is “Do Shit”, yes, simply do shit, even if it ends up being shit… The important thing is to do it! Because when you Do Shit the project no longer dies in idea valley. And the more Shit you do the better you get at doing it, shortening the Gap between your expectations and your Shit.
That is why we created this tool, to accompany every DoShitter in the world on their journey (DoShitters being those who take responsibility for their Shit).
These cards were born at a moment of creative block and search for answers, and we can guarantee this game has helped unstuck many people. It is also a great companion to unleash your creativity and reach beyond your comfort zone!
How did it get started?
The three of us (Mar, Elisabet & Marta) have known each other for years and we’ve always had a shared admiration for each other’s work as well as the desire to do a project together someday.
One afternoon, with no specific expectations, simply wanting to enjoy ourselves without pressure, we started searching for an idea. Elisabet had some blank cards and Mar had been reading about tarot, and the idea simply sparked: we would do an oracle about the creative process with the structure of the Hero’s Journey (a concept that had followed us since we studied film school together) as a backbone. That afternoon, the first prototype of DoShit! was made.
The artistic process
The 84 unique cards were illustrated by Mar Delmar.
Each card is created manually with cut paper and gouache, creating first the different pieces that compose each card, and then placing them together in 3D to take the photo that becomes the final illustration.
The whole process took more than 8 months. Cards were painted and cut up in different locations (Barcelona, Tarragona, Castellar de n'Hug, Porrera y L'Argentera (Catalunya) y Castelo (Galicia)) where Mar attended artistic residencies along with a big box filled with the many octopuses in their envelopes, one for each card… (Video of the process)
Where to buy this awesome Shit?
- You can buy directly from our online store, but depending where you are in the world, shipping costs may showcase the literal cost of supporting small sellers. If you do buy it there use the promo code SATOSHI and get a small discount in return for your generosity <3
- You can also buy it with bitcoin , the best money in the world, in Plebeian Market . Since you'd be using the best money in the world, we shaved off a bit from the price and shipping in comparison to our online store since we appreciate being paid in sound money :D
- You can temporarily buy this Shit on the A****** giant with FREE Shipping depending of your location or prime subscription status, but we are going to be removing our beloved DoShitS from there soon due to our very negative experience with them portrayed in our article that you can find the link to at the bottom.
In any case, if you read this far, THANK YOU.
You can support our Shit by gifting this deck (to someone else, or to yourself :P) , zapping this article or simply sharing it around in the hopes that THE PEOPLE WHO NEED THIS SHIT, FIND THIS SHIT <3
And if you want to know more about this inspiring product, don’t hesitate to get in touch with us.
We wish you the best on you creative adventures!
Join the #artMy
ARTICLE ON OUR HORRID EXPERIENCE TRYING TO MAKE "doShit!" CHEAPER TO GET FOR YOU:
naddr1qvzqqqr4gupzprjklh3rdmxhj60knvpel0uk03vq3kyh4x3dlu2m7pgkcxa5xwe3qq247635g4v553t329e9x4rhvajhwvmrxahhgxv3ddc
-
@ 89ccea93:df4e00b7
2025-02-13 17:34:06Core Philosophy
- Privacy ≠ Optional: Prevents mass data collection by design
- Security > Convenience: Sacrifices "smart" features for exploit resistance
- Transparency: Every line of code auditable
- Device Sanity: Removes 2M+ lines of Google telemetry code
- Proactive Hardening: Replaces reactive "vulnerability whack-a-mole" with systemic memory safety improvements. 73% of Android CVEs prevented via Scudo++ allocator and Rust integration.
- Hardware Paradox: Uses Google Pixels because of their Titan M2 secure enclave (physically separate from main CPU, Verified Boot with user-defined root of trust, Firmware-level MAC randomization (prevents Wi-Fi tracking)).
- Support Superiority: GrapheneOS support for Pixel phones is 2 years longer Google's.
"We're eliminating entire vulnerability classes - not just patching holes."
History
- Born in 2014 as CopperheadOS
- 2016: First Pixel support (Google's hardware + de-Googled OS)
- Rebranded in 2019 after a developer split. Focuses exclusively on Pixel phones.
- 2021: Scudo++ with quarantines (NSA-grade exploit mitigation)
- 2023: Full Rust integration (prevents buffer overflows in core OS)
- 2023: Controversial lead dev, Daniel Micay, stepped down but remains director
- 2024: Quantum-resistant encryption prototypes
"Our Auditor app detects hardware tampering better than Apple's T2 chip."
Installation
- Minimum: Pixel 4a
- Recommended: Pixel 7a (5-year update guarantee)
- Backup data first: unlocking bootloader wipes device
Beginners: Web Installer
- Enable OEM Unlock:
Settings → About → Tap Build Number 7x → Developer Options → OEM Unlocking
- Visit grapheneos.org/install
- Connect phone → Follow prompts (20 minutes)
Advanced: CLI install
- Full CLI guide: grapheneos.org/install/cli (8 minutes)
"We're proving iPhones aren't the only secure option - just better marketed."
Post-Install Checklist
[ ] Deny all "convenience" permissions
[ ] Enable Sensors Off toggle
[ ] Install Auditor app
[ ] Sensors Killswitch:Quick Settings → Toggle Off
[ ] Network Restrictions:
markdown Settings → Network & Internet → Firewall - Enable per-connection MAC randomization - Block local network discovery
[ ] Auditor Validation: Daily automated checks against Google's hardware certsSetting up
Priority Sources
- Accrescent (Pre-installed)
- Molly (Signal fork)
- Aves Gallery (EXIF stripping)
-
AppVerifier (APK validation)
-
Obtainium (GitHub)
```markdown - Search "[App] GitHub releases"
- Copy releases page URL
- Paste into Obtainium → Auto-updates enabled
``` -
Example: NewPipe →
https://github.com/TeamNewPipe/NewPipe/releases
-
Google Play (Last Resort)
- Use separate profile
- Burner account: Fake name + NO phone number
FOSS Apps
- Accrescent - Privacy-focused app store
- Aegis - 2FA authenticator
- Amethyst - Nostr decentralized social client
- AndBible - Offline Bible study
- Antennapod - Podcast manager
- AppVerifier - APK signature validation
- Ashigaru - Bitcoin wallet with Ricochet
- Aves Gallery - Gallery with EXIF stripping
- Brave - Anti-fingerprinting browser
- Easy Noise - Offline white noise generator
- Easy Note - Minimalist notes
- Envoy - Bitcoin wallet
- IronFox - Hardened Firefox fork
- KeePassDX - Offline password manager
- Léon - URL tracking stripper
- LocalSend - AirDrop alternative
- Material Files - File manager
- Molly - Signal fork with local encyption
- Monero.com - Official Monero wallet
- NetGuard - No-root firewall
- NewPipe - YouTube client with SponsorBlock
- Nextcloud - Self-hosted cloud suite
- OpenKeychain - PGP encryption
- Organic Maps - Offline navigation
- Orbot - Tor proxy
- Proton Drive - E2E encrypted storage
- Proton Mail - Zero-access email
- RedReader - Privacy-first Reddit client
- Simple Calendar Pro - Telemetry-free calendar
- Telegram FOSS - Decentralized messaging
- Tor Browser - Onion-routed browsing
- Twidere - Twitter/Fediverse client
- Tuta - Encrypted email
- Tuta Calendar - Encrypted calendar
- Vanadium - Hardened Chromium
- Zeus - Bitcoin Lightning node
"Your phone is a corporate surveillance device that happens to make calls. GrapheneOS removes the spyware OS while keeping the secure hardware."
Silent.Link eSIM: Anonymous Connectivity
No Phone Number Required
Visit Silent.Link → Select data plus eSIM plan (with NO phone number).
I've used this successfully in many countries. It even gives me unfettered and free internet in China. Be sure to pick the telecom company based on what they charge per GB of data. The difference can be 100x!
Support the Project:
- Donate: grapheneos.org/donate
- Community: grapheneos.org/contact
"GrapheneOS isn't about becoming a privacy expert overnight. It's about systematically removing corporate surveillance hooks - one app, one permission, one profile at a time."
Moar Halp
originally posted at https://stacker.news/items/884965
-
@ 91bea5cd:1df4451c
2025-02-04 17:24:50Definição de ULID:
Timestamp 48 bits, Aleatoriedade 80 bits Sendo Timestamp 48 bits inteiro, tempo UNIX em milissegundos, Não ficará sem espaço até o ano 10889 d.C. e Aleatoriedade 80 bits, Fonte criptograficamente segura de aleatoriedade, se possível.
Gerar ULID
```sql
CREATE EXTENSION IF NOT EXISTS pgcrypto;
CREATE FUNCTION generate_ulid() RETURNS TEXT AS $$ DECLARE -- Crockford's Base32 encoding BYTEA = '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; timestamp BYTEA = E'\000\000\000\000\000\000'; output TEXT = '';
unix_time BIGINT; ulid BYTEA; BEGIN -- 6 timestamp bytes unix_time = (EXTRACT(EPOCH FROM CLOCK_TIMESTAMP()) * 1000)::BIGINT; timestamp = SET_BYTE(timestamp, 0, (unix_time >> 40)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 1, (unix_time >> 32)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 2, (unix_time >> 24)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 3, (unix_time >> 16)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 4, (unix_time >> 8)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 5, unix_time::BIT(8)::INTEGER);
-- 10 entropy bytes ulid = timestamp || gen_random_bytes(10);
-- Encode the timestamp output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 224) >> 5)); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 1) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 1) & 7) << 2) | ((GET_BYTE(ulid, 2) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 2) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 2) & 1) << 4) | ((GET_BYTE(ulid, 3) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 3) & 15) << 1) | ((GET_BYTE(ulid, 4) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 4) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 4) & 3) << 3) | ((GET_BYTE(ulid, 5) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 5) & 31)));
-- Encode the entropy output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 6) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 6) & 7) << 2) | ((GET_BYTE(ulid, 7) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 7) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 7) & 1) << 4) | ((GET_BYTE(ulid, 8) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 8) & 15) << 1) | ((GET_BYTE(ulid, 9) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 9) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 9) & 3) << 3) | ((GET_BYTE(ulid, 10) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 10) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 11) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 11) & 7) << 2) | ((GET_BYTE(ulid, 12) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 12) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 12) & 1) << 4) | ((GET_BYTE(ulid, 13) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 13) & 15) << 1) | ((GET_BYTE(ulid, 14) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 14) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 14) & 3) << 3) | ((GET_BYTE(ulid, 15) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 15) & 31)));
RETURN output; END $$ LANGUAGE plpgsql VOLATILE; ```
ULID TO UUID
```sql CREATE OR REPLACE FUNCTION parse_ulid(ulid text) RETURNS bytea AS $$ DECLARE -- 16byte bytes bytea = E'\x00000000 00000000 00000000 00000000'; v char[]; -- Allow for O(1) lookup of index values dec integer[] = ARRAY[ 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 255, 255, 255, 255, 255, 255, 255, 10, 11, 12, 13, 14, 15, 16, 17, 1, 18, 19, 1, 20, 21, 0, 22, 23, 24, 25, 26, 255, 27, 28, 29, 30, 31, 255, 255, 255, 255, 255, 255, 10, 11, 12, 13, 14, 15, 16, 17, 1, 18, 19, 1, 20, 21, 0, 22, 23, 24, 25, 26, 255, 27, 28, 29, 30, 31 ]; BEGIN IF NOT ulid ~* '^[0-7][0-9ABCDEFGHJKMNPQRSTVWXYZ]{25}$' THEN RAISE EXCEPTION 'Invalid ULID: %', ulid; END IF;
v = regexp_split_to_array(ulid, '');
-- 6 bytes timestamp (48 bits) bytes = SET_BYTE(bytes, 0, (dec[ASCII(v[1])] << 5) | dec[ASCII(v[2])]); bytes = SET_BYTE(bytes, 1, (dec[ASCII(v[3])] << 3) | (dec[ASCII(v[4])] >> 2)); bytes = SET_BYTE(bytes, 2, (dec[ASCII(v[4])] << 6) | (dec[ASCII(v[5])] << 1) | (dec[ASCII(v[6])] >> 4)); bytes = SET_BYTE(bytes, 3, (dec[ASCII(v[6])] << 4) | (dec[ASCII(v[7])] >> 1)); bytes = SET_BYTE(bytes, 4, (dec[ASCII(v[7])] << 7) | (dec[ASCII(v[8])] << 2) | (dec[ASCII(v[9])] >> 3)); bytes = SET_BYTE(bytes, 5, (dec[ASCII(v[9])] << 5) | dec[ASCII(v[10])]);
-- 10 bytes of entropy (80 bits); bytes = SET_BYTE(bytes, 6, (dec[ASCII(v[11])] << 3) | (dec[ASCII(v[12])] >> 2)); bytes = SET_BYTE(bytes, 7, (dec[ASCII(v[12])] << 6) | (dec[ASCII(v[13])] << 1) | (dec[ASCII(v[14])] >> 4)); bytes = SET_BYTE(bytes, 8, (dec[ASCII(v[14])] << 4) | (dec[ASCII(v[15])] >> 1)); bytes = SET_BYTE(bytes, 9, (dec[ASCII(v[15])] << 7) | (dec[ASCII(v[16])] << 2) | (dec[ASCII(v[17])] >> 3)); bytes = SET_BYTE(bytes, 10, (dec[ASCII(v[17])] << 5) | dec[ASCII(v[18])]); bytes = SET_BYTE(bytes, 11, (dec[ASCII(v[19])] << 3) | (dec[ASCII(v[20])] >> 2)); bytes = SET_BYTE(bytes, 12, (dec[ASCII(v[20])] << 6) | (dec[ASCII(v[21])] << 1) | (dec[ASCII(v[22])] >> 4)); bytes = SET_BYTE(bytes, 13, (dec[ASCII(v[22])] << 4) | (dec[ASCII(v[23])] >> 1)); bytes = SET_BYTE(bytes, 14, (dec[ASCII(v[23])] << 7) | (dec[ASCII(v[24])] << 2) | (dec[ASCII(v[25])] >> 3)); bytes = SET_BYTE(bytes, 15, (dec[ASCII(v[25])] << 5) | dec[ASCII(v[26])]);
RETURN bytes; END $$ LANGUAGE plpgsql IMMUTABLE;
CREATE OR REPLACE FUNCTION ulid_to_uuid(ulid text) RETURNS uuid AS $$ BEGIN RETURN encode(parse_ulid(ulid), 'hex')::uuid; END $$ LANGUAGE plpgsql IMMUTABLE; ```
UUID to ULID
```sql CREATE OR REPLACE FUNCTION uuid_to_ulid(id uuid) RETURNS text AS $$ DECLARE encoding bytea = '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; output text = ''; uuid_bytes bytea = uuid_send(id); BEGIN
-- Encode the timestamp output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 224) >> 5)); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 1) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 1) & 7) << 2) | ((GET_BYTE(uuid_bytes, 2) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 2) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 2) & 1) << 4) | ((GET_BYTE(uuid_bytes, 3) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 3) & 15) << 1) | ((GET_BYTE(uuid_bytes, 4) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 4) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 4) & 3) << 3) | ((GET_BYTE(uuid_bytes, 5) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 5) & 31)));
-- Encode the entropy output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 6) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 6) & 7) << 2) | ((GET_BYTE(uuid_bytes, 7) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 7) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 7) & 1) << 4) | ((GET_BYTE(uuid_bytes, 8) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 8) & 15) << 1) | ((GET_BYTE(uuid_bytes, 9) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 9) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 9) & 3) << 3) | ((GET_BYTE(uuid_bytes, 10) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 10) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 11) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 11) & 7) << 2) | ((GET_BYTE(uuid_bytes, 12) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 12) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 12) & 1) << 4) | ((GET_BYTE(uuid_bytes, 13) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 13) & 15) << 1) | ((GET_BYTE(uuid_bytes, 14) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 14) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 14) & 3) << 3) | ((GET_BYTE(uuid_bytes, 15) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 15) & 31)));
RETURN output; END $$ LANGUAGE plpgsql IMMUTABLE; ```
Gera 11 Digitos aleatórios: YBKXG0CKTH4
```sql -- Cria a extensão pgcrypto para gerar uuid CREATE EXTENSION IF NOT EXISTS pgcrypto;
-- Cria a função para gerar ULID CREATE OR REPLACE FUNCTION gen_lrandom() RETURNS TEXT AS $$ DECLARE ts_millis BIGINT; ts_chars TEXT; random_bytes BYTEA; random_chars TEXT; base32_chars TEXT := '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; i INT; BEGIN -- Pega o timestamp em milissegundos ts_millis := FLOOR(EXTRACT(EPOCH FROM clock_timestamp()) * 1000)::BIGINT;
-- Converte o timestamp para base32 ts_chars := ''; FOR i IN REVERSE 0..11 LOOP ts_chars := ts_chars || substr(base32_chars, ((ts_millis >> (5 * i)) & 31) + 1, 1); END LOOP; -- Gera 10 bytes aleatórios e converte para base32 random_bytes := gen_random_bytes(10); random_chars := ''; FOR i IN 0..9 LOOP random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) >> 3) & 31) + 1, 1); IF i < 9 THEN random_chars := random_chars || substr(base32_chars, (((get_byte(random_bytes, i) & 7) << 2) | (get_byte(random_bytes, i + 1) >> 6)) & 31 + 1, 1); ELSE random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) & 7) << 2) + 1, 1); END IF; END LOOP; -- Concatena o timestamp e os caracteres aleatórios RETURN ts_chars || random_chars;
END; $$ LANGUAGE plpgsql; ```
Exemplo de USO
```sql -- Criação da extensão caso não exista CREATE EXTENSION IF NOT EXISTS pgcrypto; -- Criação da tabela pessoas CREATE TABLE pessoas ( ID UUID DEFAULT gen_random_uuid ( ) PRIMARY KEY, nome TEXT NOT NULL );
-- Busca Pessoa na tabela SELECT * FROM "pessoas" WHERE uuid_to_ulid ( ID ) = '252FAC9F3V8EF80SSDK8PXW02F'; ```
Fontes
- https://github.com/scoville/pgsql-ulid
- https://github.com/geckoboard/pgulid
-
@ dbb19ae0:c3f22d5a
2025-02-13 17:32:36pip cache will show how much space is taken from past download
bash (nostr) ever3st@Alashazam:~/Documents/dev/python/$ pip cache info Package index page cache location: /home/ever3st/.cache/pip/http Package index page cache size: 2437.7 MB Number of HTTP files: 271 Wheels location: /home/ever3st/.cache/pip/wheels Wheels size: 2.2 MB Number of wheels: 2
About 2GB if space is needed it can be cleared ``` bash (nostr) ever3st@Alashazam:~/Documents/dev/python/$ pip cache purge Files removed: 273 (nostr) ever3st@Alashazam:~/Documents/dev/python/bots/nostr$ pip cache info Package index page cache location: /home/ever3st/.cache/pip/http Package index page cache size: 0 bytes Number of HTTP files: 0 Wheels location: /home/ever3st/.cache/pip/wheels Wheels size: 326 bytes Number of wheels: 0```
-
@ 6538925e:571e55c3
2025-02-13 16:05:42\ Nostr Live Streams (Beta)
If you follow shows like Rabbit Hole Recap, THE Bitcoin Podcast or Simply Bitcoin on Nostr, you can now watch the video in Fountain and hang out in the live chat as it’s being recorded. You'll find livestreams from people who follow on Nostr at the top of the home screen.
As well and live podcasts, you will also find live music events from PhantomPowerMedia, radio stations like NoGood and Noderunners, as well as channels dedicated to gaming, art, coding and much more.
Bringing creators and fans together through live experiences enables audience participation and creates a special feeling of community, so we’re really excited to get this into your hands.
Nostr livestreams are a beta feature - i.e. we still have a lot more work to do! We will continue to make improvements to livestreams over the coming months - so we would love to hear your feedback.
\ Storage Manager
We’ve added a storage manager in the app’s settings so that you can view file storage size for audio downloads, video downloads, transcripts, image cache, feed cache, and temp files. You can delete all files in any of these folders to free up storage on your device so that Fountain continues to run optimally.
There are other performance and stability improvements that we are working on too. For example, in the next couple of weeks we will be rolling out an image proxy service, which should reduce mobile data usage and optimise storage.
Stay tuned for further updates and, as always, thanks for your support.
-
@ f1989a96:bcaaf2c1
2025-02-13 14:24:32Good morning, readers!
This week, we highlight how authoritarian regimes are manipulating digital assets. The Central African Republic launched a government-backed meme coin that crashed spectacularly within a day of launch as regime insiders cashed out for profits, leaving the public with worthless tokens.
Meanwhile, the Nigerian regime introduced its first official stablecoin, cNGN. It is issued by the African Stablecoin Consortium and is backed 1:1 with the naira. Still, it operates under the direct oversight of the Nigerian Securities and Exchange Commission, allowing further surveillance of Nigerians’ financial activity alongside the struggling eNaira CBDC.
On the freedom tech front, Mullad VPN now supports Bitcoin payments via the Lightning Network, offering activists, journalists, and individuals under oppressive regimes a censorship-resistant and permissionless way to pay for their privacy. Additionally, SeedSigner, an open-source hardware wallet for Bitcoin self-custody, rolled out multilingual support, expanding accessibility to Spanish-speaking activists and human rights defenders.\ \ Finally, journalist Frank Corva explores Africa’s grassroots Bitcoin movement, where open-source tools and circular economies are empowering communities inside authoritarian regimes with financial freedom. For those who doubt Bitcoin’s real-world impact, this article is a must-read.
Now, let’s get right to it!
Subscribe Here
GLOBAL NEWS
Central African Republic | Launches Meme Coin Experiment
The Central African Republic (CAR) debuted a government-backed meme coin, $CAR, which President Faustin-Archange Touadéra claims will “unite people” and “support national development.” In reality, meme coins are speculative assets that often serve as vehicles for insider profit. This scheme follows CAR’s failed Sango Coin project, which promised citizenship and land in exchange for locked investments but sold only 7.5% of its supply. Those who did “buy in” did not receive what was promised. In 2022, CAR briefly made Bitcoin legal tender, calling it a path to sovereignty — only to abandon it shortly after. Instead of supporting open and neutral money like Bitcoin, the government has turned to dubious crypto schemes. The real beneficiaries of $CAR appear to be regime insiders who reportedly cashed out $40 million while the public holds worthless tokens.
Nigeria | Debuts Naira Stablecoin
The Nigerian state launched its first regulated stablecoin, cNGN. Similar to US dollar-pegged stablecoins like USDT and USDC, cNGN is pegged 1:1 to its local currency (the naira). It is issued by the African Stablecoin Consortium (ASC), a private coalition of Nigerian financial institutions and blockchain companies. Positioned as a bridge between fiat and digital assets, cNGN aims to facilitate remittances and trade but comes with strict verification requirements that limit financial privacy. The Nigerian SEC also tightly regulates the stablecoin and it is only available on government-approved exchanges, Busha and Quidax. As Nigeria expands its control over digital transactions — through both cNGN and its struggling eNaira CBDC — more and more Nigerians are turning to Bitcoin as a censorship-resistant alternative.
Russia | Proposes Registry to Track Bitcoin Mining Hardware
Russia’s deputy energy minister, Yevgeny Grabchak, has proposed a centralized registry of Bitcoin mining equipment and wallet addresses to “identify mining activities and ensure stricter enforcement of bans in restricted regions,” such as Russian-occupied Ukraine territories. Meanwhile, the Chairman of the State Duma Committee on Energy, Nikolai Shulginov, warned that last year’s mining ban in several Russian and occupied regions may not be enough to eliminate mining fully. As an authoritarian state with an egregious human rights record and a long history of financial repression, Russia appears intent on tightening surveillance of economic activity — especially that of Bitcoin. By registering, tracking, and restricting mining, the Kremlin expands its financial control, undermines economic autonomy, and limits access to permissionless money.
Turkey | Erdoğan Targets Opposition as Inflation Forecast Rises
Turkish President Recep Tayyip Erdoğan sentenced Istanbul Mayor Ekrem Imamoglu — a key political rival — to seven years in prison on charges widely seen as politically motivated. If upheld, the conviction will bar Imamoglu from office, further clearing Erdoğan’s path to dominance ahead of the 2028 elections. At the same time, Turkey’s economic crisis is worsening. Accelerating inflation forced the central bank to raise its 2025 forecast from 21% to 24%, exacerbating the lira’s decline and eroding purchasing power. As both political and financial repression deepen, more Turks are turning to alternatives to sidestep Erdoğan’s expanding control over the economic and political sphere.
Georgia | Regime to Pass Censorship Law
Georgia’s ruling Georgian Dream party is set to introduce a media censorship law aimed at enforcing government-defined standards for journalistic objectivity and ethics, while also restricting foreign funding for media outlets. MP Mamuka Mdinaradze claims the law will establish monitoring mechanisms and is modeled after UK regulations, though critics compare it to Belarusian-style repression. Georgian Dream Prime Minister Irakli Kobakhidze defended the move as necessary to close legislative “loopholes” and strengthen state control. Journalists and activists warn that the law is part of a broader crackdown on press freedom and dissent. Decentralized social networks like Nostr will become increasingly vital for journalists and activists to communicate freely, resist censorship, and ensure the flow of independent information.
____________
Webinar Series for Nonprofits: Become Unstoppable
HRF will host a free, three-day webinar from March 17-19, teaching human rights defenders and nonprofits how to use Bitcoin to counter state censorship and confiscation. Sessions run daily from 10:30 a.m. to 12:00 p.m. EDT and are beginner-friendly. The webinar will be led by Anna Chekhovich, HRF’s Bitcoin nonprofit adoption lead and financial manager at Alexei Navalny’s Anti-Corruption Foundation.
Register Here
SXSW | The Human Rights Risks of Central Bank Digital Currencies (CBDCs)
Join HRF at SXSW 2025 in Austin from March 9-12 to explore how CBDCs threaten financial freedom. Experts Roger Huang, Charlene Fadirepo, and Nick Anthony will discuss how authoritarian regimes use CBDCs for surveillance and control on March 9. Attendees can also visit HRF’s CBDC Tracker booth to explore an interactive map of CBDC developments worldwide.
Get Tickets
____________
BITCOIN AND FREEDOM TECH NEWS
Mullvad VPN | Testing Lightning Network Payments
Mullvad VPN is experimenting with Bitcoin for payments via the Lightning Network, a second-layer payment protocol built on Bitcoin that enables faster, cheaper, and more private transactions. This integration lets Mullvad VPN users pay for their services in bitcoin while enhancing their privacy and bypassing payment networks that track or censor financial activity. VPNs protect users by masking IP addresses and encrypting traffic. Accepting Bitcoin over Lightning strengthens this protection with a censorship-resistant payment option. For activists, journalists, and individuals in authoritarian regimes, this combination provides a shield against surveillance.
SeedSigner | Releases Multilingual Support
SeedSigner, an open-source and customizable Bitcoin hardware wallet and HRF grantee, introduced multilingual support for Spanish. This update makes secure Bitcoin self-custody more accessible to Spanish-speaking activists and human rights defenders who may rely on Bitcoin for transactional freedom. By expanding access to secure self-custody, SeedSigner helps reduce dependence on restrictive financial systems and allows more people in Nicaragua, Venezuela, Cuba, and beyond to “be their own bank.”
Iris | Implements Private Bitcoin Payments with Cashu
Iris, a Nostr client, has added support for a Cashu wallet to allow users to send and receive ecash. Cashu is an open-source Chaumian ecash protocol built for Bitcoin and integrated with the Lightning Network. It lets users make fast, low-cost, and extremely private transactions using Bitcoin-backed ecash. While it requires a trusted custodian, it helps users spend Bitcoin anonymously without revealing their identity or transaction activity. This ability provides activists and nonprofits a different way to make private Bitcoin payments alongside nostr’s censorship-resistant communications.
Sparrow Wallet | Supports Lark for USB Hardware Wallets
Sparrow Wallet, a popular open-source Bitcoin wallet, has added support for Lark, a new tool for USB hardware wallet communication. Lark works alongside the existing Hardware Wallet Interface (HWI), giving users an alternative way to connect their hardware wallets via USB. This update improves reliability, reduces dependence on a single software interface, and strengthens Bitcoin self-custody.
Bitcoin Dada | Opens Applications for Second Cohort of Dada Devs
Bitcoin Dada, an HRF-supported nonprofit initiative empowering African women through Bitcoin and financial education, is now accepting applications for the second cohort of Dada Devs. This developer program provides hands-on training, mentorship, and a collaborative community to help African women under authoritarian regimes contribute to Bitcoin development. If you’re an aspiring female developer, apply now to join a network of African women shaping the future of finance. Applications close Feb. 13.
Summer of Bitcoin | Applications for Summer 2025 Cohort Now Open
Summer of Bitcoin, an HRF-supported Bitcoin internship program, is now accepting applications for its summer 2025 cohort. This program introduces students from anywhere, including from authoritarian regimes, to Bitcoin open-source development and design, giving interns the option to choose between a developer or designer track based on their interests. Participants will gain hands-on work experience, contribute to real-world Bitcoin projects, and receive mentorship from industry leaders. You can learn more and apply here.
Spiral | Announces Grant Renewals for the Bitcoin Design Community and BDK
Spiral, a Bitcoin company building and funding open-source projects, announced renewed grants for critical initiatives, including the Bitcoin Design Community and Bitcoin Dev Kit (BDK). The Bitcoin Design Community is a free and open-source resource for designers, developers, and others working on non-custodial Bitcoin products. This grant will support designers who push the user experience and adoption of Bitcoin forward. Meanwhile, BDK is a software library that helps developers in building cross-platform Bitcoin wallets. Its grant will support the project’s continued refinement and development.
RECOMMENDED CONTENT
The Bitcoin and Cypherpunk Spirit Is Alive and Well in Africa by Frank Corva
In this article for Bitcoin Magazine, journalist Frank Corva spotlights Bitcoin's growing presence across Africa. Across the continent, people are building Bitcoin circular economies, open-source financial tools, and educational initiatives. From Bitcoin Ekasi in South Africa to AfriBit Kibera in Kenya and Bitcoin Dua in Ghana, these grassroots initiatives drive financial inclusion and education for individuals and communities. Meanwhile, tools like Tando and Machankura are expanding access to transactional freedom, and conferences like Adopting Bitcoin Captetown and the Africa Bitcoin Conference nurture ongoing collaboration between individuals, developers, and activists to advance financial freedom on a continent that otherwise has very little liberal democracy. Read the full article here.
Using Bitcoin Without Internet! Here’s How Machankura Makes It Happen with Anita Posch
In this short interview, Bitcoin educator and host of the Bitcoin for Fairness channel, Anita Posch, speaks with Mary Imasuen, a Machankura team member, about how this technology makes Bitcoin accessible to Africans without Internet access. Machankura is an app that allows feature phones to send and receive Bitcoin using the Unstructured Supplementary Service Data (USSD) protocol, a mobile communications system similar to SMS. This means people can transact in Bitcoin without needing a smartphone or data connection, a situation common to many living under autocratic regimes in sub-Saharan Africa. By removing Internet barriers, Machankura helps millions of Africans overcome high data costs and unreliable networks, offering a practical solution to financial inclusion.
If this article was forwarded to you and you enjoyed reading it, please consider subscribing to the Financial Freedom Report here.
Support the newsletter by donating bitcoin to HRF’s Financial Freedom program via BTCPay.\ Want to contribute to the newsletter? Submit tips, stories, news, and ideas by emailing us at ffreport @ hrf.org
The Bitcoin Development Fund (BDF) is accepting grant proposals on an ongoing basis. The Bitcoin Development Fund is looking to support Bitcoin developers, community builders, and educators. Submit proposals here.
-
@ c2827524:5f45b2f7
2025-02-13 11:54:16innèsto s. m. [der. di innestare]. – 1. In agraria: a. Operazione con cui si fa concrescere sopra una pianta (detta portainnesto o soggetto) una parte di un altro della stessa specie o di specie differenti (detto nesto o oggetto), al fine di formare un nuovo individuo più pregiato o più produttivo o più giovane: fare, operare, praticare un innesto.
Le collaborazioni sono di una potenza micidiale.
Quelle che si sviluppano nello spazio #Bitcoin ancora di più.
Non è più una collaborazione, è un #innesto: rami di alberi diversi, destinati da soli a dare grandi frutti, si fondono per donare ad un intero ecosistema sapori ancora più deliziosi. Contributi e suggerimenti vanno e vengono alla velocità della luce, col sorriso, senza sacrificio e sempre con la volontà di migliorarsi e crescere.
Lo spazio #Bitcoin è una fabbrica magica, che accoglie minuscoli semini() da chiunque voglia partecipare, volontariamente, alla crescita della cultura Bitcoin. Ma li trasforma in un incanto*.
In solitaria i semini sarebbero destinati comunque a grandi cose e questo è già, di per sé, meraviglioso. La fabbrica magica, invece, li fa germogliare, fiorire e fruttare in maniera ancora più potente.
Quando la magia è totale, avviene l’innesto, la generazione di una nuova creatura più pregiata.
Sta succedendo davanti ai miei occhi. Sono onorata di poter assistere a questo mini miracolo della vita e, manco a dirlo, felice di farne parte.
Non è solo cambiare atteggiamento, smussare frizioni e rigidità o correggere la propria visione, è proprio ampliare sé stessi accogliendo gli altri.
Grazie nostr:npub1uhj92lnwh8rrhhuvulfqstk4g0ayx0zx35wj2d62jueqheknkxks5m4zj6 nostr:npub1au23c73cpaq2whtazjf6cdrmvam6nkd4lg928nwmgl78374kn29sq9t53j nostr:npub1awnu9vg352863e7tqlc6urlw7jgdf8vf00tmr76uuhflp4nnn68sjmnnl3 e nostr:npub1lrurmgmlfl4u72258fc4q5ke7tr82kw5xct5vchdmzr9uhmx6j4qn3t72a
(1) Semini, non #seed [non chiamatelo seed, si dice mnemonica (cit.)] Siccome in italiano la parola seme porta alla mente anche giochini di parole fiat, se siete qui per perculare fate pure. -> H.F.S.P. 🤣
-
@ d360efec:14907b5f
2025-02-13 11:15:12Top-Down Analysis: กลยุทธ์การเทรดเพื่อมองภาพรวมและจับจังหวะทำกำไร
ในโลกของการเทรดที่เต็มไปด้วยความผันผวน การมีเครื่องมือวิเคราะห์ที่แข็งแกร่งเป็นสิ่งสำคัญอย่างยิ่งที่จะช่วยนำทางให้เทรดเดอร์สามารถตัดสินใจได้อย่างมีหลักการและเพิ่มโอกาสในการทำกำไร หนึ่งในเครื่องมือที่ได้รับความนิยมและมีประสิทธิภาพคือ "Top-Down Analysis" หรือการวิเคราะห์จากบนลงล่าง ซึ่งเป็นวิธีการมองภาพรวมของตลาดก่อนที่จะเจาะจงไปที่สินทรัพย์ที่เราสนใจ บทความนี้จะพาคุณไปทำความเข้าใจกับ Top-Down Analysis อย่างละเอียด พร้อมทั้งแนะนำกลยุทธ์การเทรดที่สามารถนำไปปรับใช้ได้จริง
Top-Down Analysis คืออะไร?
Top-Down Analysis เป็นกระบวนการวิเคราะห์ตลาดที่เริ่มต้นจากการพิจารณาภาพรวมในกรอบเวลาที่ใหญ่ขึ้น ก่อนที่จะค่อยๆ ย่อยลงไปในกรอบเวลาที่เล็กลง เพื่อทำความเข้าใจบริบทของตลาดและหาจังหวะการเทรดที่เหมาะสม วิธีการนี้ช่วยให้เทรดเดอร์สามารถมองเห็นทิศทางหลักของตลาด, แนวโน้มที่กำลังเกิดขึ้น, ระดับราคาสำคัญ, และความสมดุลระหว่างอุปสงค์และอุปทาน ก่อนที่จะตัดสินใจเข้าเทรดในกรอบเวลาที่เล็กลง
องค์ประกอบสำคัญของ Top-Down Analysis (อ้างอิงจากภาพ)
ภาพ "Top-Down Analysis" ได้สรุปองค์ประกอบสำคัญของการวิเคราะห์นี้ไว้อย่างชัดเจน โดยแบ่งการวิเคราะห์ออกเป็น 3 กรอบเวลาหลัก: 4 ชั่วโมง (4H), 1 ชั่วโมง (1H), และ 15 นาที (15min) แต่ละกรอบเวลามีองค์ประกอบที่ต้องพิจารณาดังนี้:
-
กรอบเวลา 4 ชั่วโมง (4H): ภาพรวมตลาดและทิศทางหลัก ในกรอบเวลา 4 ชั่วโมง เราจะเน้นการวิเคราะห์ภาพรวมของตลาด เพื่อกำหนดทิศทางหลักและแนวโน้มในระยะกลาง องค์ประกอบสำคัญในกรอบเวลานี้คือ:
- Direction (ทิศทาง): ประเมินทิศทางที่ตลาดกำลังเคลื่อนที่ไป โดยพิจารณาจากแนวโน้มและโครงสร้างราคาในภาพรวม ตลาดกำลังเป็นขาขึ้น, ขาลง หรืออยู่ในช่วง Sideways?
- Trend (แนวโน้ม): ระบุแนวโน้มหลักของตลาด ไม่ว่าจะเป็นแนวโน้มขาขึ้น (Uptrend), แนวโน้มขาลง (Downtrend) หรือ Sideways การเข้าใจแนวโน้มช่วยในการกำหนดกลยุทธ์การเทรดที่เหมาะสม
- Key levels (ระดับราคาสำคัญ): หาระดับราคาแนวรับและแนวต้านที่สำคัญในกรอบเวลา 4 ชั่วโมง ระดับเหล่านี้มักเป็นจุดที่ราคาเคยมีการกลับตัวหรือพักตัวในอดีต และอาจเป็นบริเวณที่ราคาจะตอบสนองอีกครั้งในอนาคต
- Supply & Demand (อุปทานและอุปสงค์): วิเคราะห์ความสมดุลระหว่างแรงซื้อ (Demand) และแรงขาย (Supply) ในตลาด โดยพิจารณาจากพฤติกรรมราคาบริเวณแนวรับแนวต้าน และสัญญาณจากเครื่องมือวิเคราะห์อื่นๆ (ถ้าใช้)
-
กรอบเวลา 1 ชั่วโมง (1H): หาจังหวะและบริเวณที่น่าสนใจ เมื่อได้ภาพรวมและทิศทางหลักจากกรอบ 4H แล้ว เราจะย่อยลงมาในกรอบ 1 ชั่วโมง เพื่อหาจังหวะการเทรดที่สอดคล้องกับทิศทางหลัก และมองหารูปแบบราคาที่น่าสนใจ องค์ประกอบสำคัญในกรอบเวลานี้คือ:
- Breaks (การทะลุ): สังเกตการทะลุแนวรับแนวต้าน หรือระดับราคาสำคัญในกรอบ 1H ที่สอดคล้องกับทิศทางหลักใน 4H การทะลุเหล่านี้อาจเป็นสัญญาณของการเคลื่อนไหวครั้งใหญ่ของราคา
- Reversals (การกลับตัว): มองหารูปแบบการกลับตัวของราคาที่อาจเกิดขึ้นบริเวณระดับราคาสำคัญในกรอบ 1H ซึ่งบ่งบอกถึงจุดสิ้นสุดของแนวโน้มปัจจุบันและเริ่มต้นแนวโน้มใหม่
- OB (Order Blocks): ระบุบริเวณ Order Blocks ในกรอบ 1H ซึ่งเป็นพื้นที่ที่มีการสั่งซื้อขายจำนวนมากในอดีต Order Blocks เหล่านี้มักจะทำหน้าที่เป็นแนวรับแนวต้านในอนาคต
- FVG (Fair Value Gaps): มองหา Fair Value Gaps ในกรอบ 1H ซึ่งเป็นช่องว่างของราคาที่เกิดจากการเคลื่อนไหวอย่างรวดเร็ว FVG มักจะเป็นเป้าหมายของราคาในอนาคต เนื่องจากราคาอาจจะกลับมาปิดช่องว่างเหล่านี้
- Liquidity (สภาพคล่อง): ประเมินสภาพคล่องบริเวณระดับราคาที่เราสนใจในกรอบ 1H บริเวณที่มีสภาพคล่องสูงมักจะดึงดูดนักลงทุนรายใหญ่ และอาจทำให้เกิดการเคลื่อนไหวของราคาที่รุนแรง
-
กรอบเวลา 15 นาที (15min): ยืนยันสัญญาณและหาจุดเข้าเทรด ในกรอบเวลา 15 นาที เราจะเน้นการยืนยันสัญญาณการเทรด และหาจุดเข้าเทรดที่แม่นยำ เพื่อลดความเสี่ยงในการเข้าเทรดเร็วเกินไป องค์ประกอบสำคัญในกรอบเวลานี้คือ:
-
Confirmation (การยืนยัน): รอสัญญาณยืนยันการเคลื่อนไหวของราคาในกรอบ 15 นาที ที่สอดคล้องกับการวิเคราะห์ในกรอบ 1H และ 4H สัญญาณยืนยันอาจมาในรูปแบบของแท่งเทียนกลับตัว, รูปแบบ Chart Patterns, หรือสัญญาณจาก Indicators
- จุดเข้าเทรด: เมื่อมีสัญญาณยืนยันที่ชัดเจนในกรอบ 15 นาที และสอดคล้องกับการวิเคราะห์ในกรอบเวลาที่ใหญ่ขึ้น จึงตัดสินใจเข้าเทรด โดยกำหนด Stop Loss เพื่อจำกัดความเสี่ยง และ Take Profit เพื่อตั้งเป้าหมายในการทำกำไร
กลยุทธ์การเทรด Top-Down Analysis: ขั้นตอนสู่ความสำเร็จ
เพื่อนำ Top-Down Analysis ไปใช้ในการเทรดอย่างมีประสิทธิภาพ เราสามารถทำตามขั้นตอนต่อไปนี้:
-
เริ่มต้นที่ 4H: กำหนดทิศทางและแนวโน้มหลัก วิเคราะห์กราฟ 4H เพื่อระบุทิศทางหลักของตลาด แนวโน้ม และระดับราคาสำคัญ ประเมินความสมดุลของ Supply & Demand เพื่อกำหนด Bias การเทรด (เน้นซื้อหรือขาย)
-
เจาะลึก 1H: หาจังหวะและบริเวณที่น่าสนใจ เมื่อได้ทิศทางหลักจาก 4H แล้ว ให้ย่อยลงมาดูกราฟ 1H เพื่อหารูปแบบราคาที่น่าสนใจ เช่น การทะลุแนวรับแนวต้าน, รูปแบบการกลับตัว, Order Blocks, Fair Value Gaps และบริเวณที่มีสภาพคล่องสูง
-
ยืนยันใน 15min: หาจุดเข้าเทรดที่แม่นยำ รอสัญญาณยืนยันในกรอบ 15 นาที ที่สอดคล้องกับการวิเคราะห์ในกรอบเวลาที่ใหญ่ขึ้น ใช้ Price Action, แท่งเทียน, หรือ Indicators เพื่อยืนยันสัญญาณ และหาจุดเข้าเทรดที่แม่นยำ พร้อมกำหนด Stop Loss และ Take Profit ที่เหมาะสม
ประโยชน์ของการใช้ Top-Down Analysis * มองเห็นภาพรวมตลาด: ช่วยให้เทรดเดอร์เข้าใจบริบทของตลาดในภาพรวม ไม่หลงทางในรายละเอียดเล็กๆ น้อยๆ * ตัดสินใจเทรดอย่างมีหลักการ: ทำให้การตัดสินใจเทรดมีเหตุผลและมีข้อมูลสนับสนุนมากขึ้น ไม่ใช่แค่การคาดเดา * เพิ่มความแม่นยำในการเทรด: การวิเคราะห์หลายกรอบเวลาช่วยกรองสัญญาณรบกวน และเพิ่มโอกาสในการเข้าเทรดในทิศทางที่ถูกต้อง * ลดความเสี่ยง: ช่วยลดโอกาสในการเทรดสวนทางแนวโน้มหลักของตลาด และช่วยในการกำหนด Stop Loss ที่เหมาะสม
ข้อควรจำและข้อควรระวัง * ฝึกฝนและสังเกต: Top-Down Analysis ต้องอาศัยการฝึกฝนและการสังเกตกราฟราคาอย่างสม่ำเสมอ เพื่อพัฒนาความเข้าใจและทักษะในการวิเคราะห์ * ปรับใช้ให้เข้ากับสไตล์: ปรับกลยุทธ์ให้เข้ากับสไตล์การเทรดของคุณ และสินทรัพย์ที่คุณเทรด * บริหารความเสี่ยง: ให้ความสำคัญกับการบริหารความเสี่ยงเสมอ กำหนดขนาด Position ที่เหมาะสม และใช้ Stop Loss ทุกครั้ง * ไม่มีกลยุทธ์ใดสมบูรณ์แบบ: Top-Down Analysis เป็นเครื่องมือที่มีประสิทธิภาพ แต่ไม่มีกลยุทธ์ใดที่รับประกันผลกำไร 100% การเทรดมีความเสี่ยง โปรดศึกษาและทำความเข้าใจความเสี่ยงก่อนตัดสินใจลงทุน
สรุป Top-Down Analysis เป็นกลยุทธ์การเทรดที่ทรงพลัง ซึ่งช่วยให้เทรดเดอร์สามารถวิเคราะห์ตลาดอย่างเป็นระบบ มองภาพรวม และจับจังหวะการเทรดได้อย่างแม่นยำ การนำหลักการของ Top-Down Analysis ไปปรับใช้ในการเทรด จะช่วยเพิ่มประสิทธิภาพในการตัดสินใจ และเพิ่มโอกาสในการประสบความสำเร็จในตลาดการเงินได้อย่างยั่งยืน
-
-
@ 9673b322:1b75ee9e
2025-02-13 14:15:38This is test content
-
@ 91bea5cd:1df4451c
2025-02-04 17:15:57Definição de ULID:
Timestamp 48 bits, Aleatoriedade 80 bits Sendo Timestamp 48 bits inteiro, tempo UNIX em milissegundos, Não ficará sem espaço até o ano 10889 d.C. e Aleatoriedade 80 bits, Fonte criptograficamente segura de aleatoriedade, se possível.
Gerar ULID
```sql
CREATE EXTENSION IF NOT EXISTS pgcrypto;
CREATE FUNCTION generate_ulid() RETURNS TEXT AS $$ DECLARE -- Crockford's Base32 encoding BYTEA = '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; timestamp BYTEA = E'\000\000\000\000\000\000'; output TEXT = '';
unix_time BIGINT; ulid BYTEA; BEGIN -- 6 timestamp bytes unix_time = (EXTRACT(EPOCH FROM CLOCK_TIMESTAMP()) * 1000)::BIGINT; timestamp = SET_BYTE(timestamp, 0, (unix_time >> 40)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 1, (unix_time >> 32)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 2, (unix_time >> 24)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 3, (unix_time >> 16)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 4, (unix_time >> 8)::BIT(8)::INTEGER); timestamp = SET_BYTE(timestamp, 5, unix_time::BIT(8)::INTEGER);
-- 10 entropy bytes ulid = timestamp || gen_random_bytes(10);
-- Encode the timestamp output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 224) >> 5)); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 1) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 1) & 7) << 2) | ((GET_BYTE(ulid, 2) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 2) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 2) & 1) << 4) | ((GET_BYTE(ulid, 3) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 3) & 15) << 1) | ((GET_BYTE(ulid, 4) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 4) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 4) & 3) << 3) | ((GET_BYTE(ulid, 5) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 5) & 31)));
-- Encode the entropy output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 6) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 6) & 7) << 2) | ((GET_BYTE(ulid, 7) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 7) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 7) & 1) << 4) | ((GET_BYTE(ulid, 8) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 8) & 15) << 1) | ((GET_BYTE(ulid, 9) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 9) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 9) & 3) << 3) | ((GET_BYTE(ulid, 10) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 10) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 11) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 11) & 7) << 2) | ((GET_BYTE(ulid, 12) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 12) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 12) & 1) << 4) | ((GET_BYTE(ulid, 13) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 13) & 15) << 1) | ((GET_BYTE(ulid, 14) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 14) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 14) & 3) << 3) | ((GET_BYTE(ulid, 15) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 15) & 31)));
RETURN output; END $$ LANGUAGE plpgsql VOLATILE; ```
ULID TO UUID
```sql CREATE OR REPLACE FUNCTION parse_ulid(ulid text) RETURNS bytea AS $$ DECLARE -- 16byte bytes bytea = E'\x00000000 00000000 00000000 00000000'; v char[]; -- Allow for O(1) lookup of index values dec integer[] = ARRAY[ 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 255, 255, 255, 255, 255, 255, 255, 10, 11, 12, 13, 14, 15, 16, 17, 1, 18, 19, 1, 20, 21, 0, 22, 23, 24, 25, 26, 255, 27, 28, 29, 30, 31, 255, 255, 255, 255, 255, 255, 10, 11, 12, 13, 14, 15, 16, 17, 1, 18, 19, 1, 20, 21, 0, 22, 23, 24, 25, 26, 255, 27, 28, 29, 30, 31 ]; BEGIN IF NOT ulid ~* '^[0-7][0-9ABCDEFGHJKMNPQRSTVWXYZ]{25}$' THEN RAISE EXCEPTION 'Invalid ULID: %', ulid; END IF;
v = regexp_split_to_array(ulid, '');
-- 6 bytes timestamp (48 bits) bytes = SET_BYTE(bytes, 0, (dec[ASCII(v[1])] << 5) | dec[ASCII(v[2])]); bytes = SET_BYTE(bytes, 1, (dec[ASCII(v[3])] << 3) | (dec[ASCII(v[4])] >> 2)); bytes = SET_BYTE(bytes, 2, (dec[ASCII(v[4])] << 6) | (dec[ASCII(v[5])] << 1) | (dec[ASCII(v[6])] >> 4)); bytes = SET_BYTE(bytes, 3, (dec[ASCII(v[6])] << 4) | (dec[ASCII(v[7])] >> 1)); bytes = SET_BYTE(bytes, 4, (dec[ASCII(v[7])] << 7) | (dec[ASCII(v[8])] << 2) | (dec[ASCII(v[9])] >> 3)); bytes = SET_BYTE(bytes, 5, (dec[ASCII(v[9])] << 5) | dec[ASCII(v[10])]);
-- 10 bytes of entropy (80 bits); bytes = SET_BYTE(bytes, 6, (dec[ASCII(v[11])] << 3) | (dec[ASCII(v[12])] >> 2)); bytes = SET_BYTE(bytes, 7, (dec[ASCII(v[12])] << 6) | (dec[ASCII(v[13])] << 1) | (dec[ASCII(v[14])] >> 4)); bytes = SET_BYTE(bytes, 8, (dec[ASCII(v[14])] << 4) | (dec[ASCII(v[15])] >> 1)); bytes = SET_BYTE(bytes, 9, (dec[ASCII(v[15])] << 7) | (dec[ASCII(v[16])] << 2) | (dec[ASCII(v[17])] >> 3)); bytes = SET_BYTE(bytes, 10, (dec[ASCII(v[17])] << 5) | dec[ASCII(v[18])]); bytes = SET_BYTE(bytes, 11, (dec[ASCII(v[19])] << 3) | (dec[ASCII(v[20])] >> 2)); bytes = SET_BYTE(bytes, 12, (dec[ASCII(v[20])] << 6) | (dec[ASCII(v[21])] << 1) | (dec[ASCII(v[22])] >> 4)); bytes = SET_BYTE(bytes, 13, (dec[ASCII(v[22])] << 4) | (dec[ASCII(v[23])] >> 1)); bytes = SET_BYTE(bytes, 14, (dec[ASCII(v[23])] << 7) | (dec[ASCII(v[24])] << 2) | (dec[ASCII(v[25])] >> 3)); bytes = SET_BYTE(bytes, 15, (dec[ASCII(v[25])] << 5) | dec[ASCII(v[26])]);
RETURN bytes; END $$ LANGUAGE plpgsql IMMUTABLE;
CREATE OR REPLACE FUNCTION ulid_to_uuid(ulid text) RETURNS uuid AS $$ BEGIN RETURN encode(parse_ulid(ulid), 'hex')::uuid; END $$ LANGUAGE plpgsql IMMUTABLE; ```
UUID to ULID
```sql CREATE OR REPLACE FUNCTION uuid_to_ulid(id uuid) RETURNS text AS $$ DECLARE encoding bytea = '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; output text = ''; uuid_bytes bytea = uuid_send(id); BEGIN
-- Encode the timestamp output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 224) >> 5)); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 1) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 1) & 7) << 2) | ((GET_BYTE(uuid_bytes, 2) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 2) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 2) & 1) << 4) | ((GET_BYTE(uuid_bytes, 3) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 3) & 15) << 1) | ((GET_BYTE(uuid_bytes, 4) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 4) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 4) & 3) << 3) | ((GET_BYTE(uuid_bytes, 5) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 5) & 31)));
-- Encode the entropy output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 6) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 6) & 7) << 2) | ((GET_BYTE(uuid_bytes, 7) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 7) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 7) & 1) << 4) | ((GET_BYTE(uuid_bytes, 8) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 8) & 15) << 1) | ((GET_BYTE(uuid_bytes, 9) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 9) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 9) & 3) << 3) | ((GET_BYTE(uuid_bytes, 10) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 10) & 31))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 11) & 248) >> 3)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 11) & 7) << 2) | ((GET_BYTE(uuid_bytes, 12) & 192) >> 6))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 12) & 62) >> 1)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 12) & 1) << 4) | ((GET_BYTE(uuid_bytes, 13) & 240) >> 4))); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 13) & 15) << 1) | ((GET_BYTE(uuid_bytes, 14) & 128) >> 7))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 14) & 124) >> 2)); output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 14) & 3) << 3) | ((GET_BYTE(uuid_bytes, 15) & 224) >> 5))); output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 15) & 31)));
RETURN output; END $$ LANGUAGE plpgsql IMMUTABLE; ```
Gera 11 Digitos aleatórios: YBKXG0CKTH4
```sql -- Cria a extensão pgcrypto para gerar uuid CREATE EXTENSION IF NOT EXISTS pgcrypto;
-- Cria a função para gerar ULID CREATE OR REPLACE FUNCTION gen_lrandom() RETURNS TEXT AS $$ DECLARE ts_millis BIGINT; ts_chars TEXT; random_bytes BYTEA; random_chars TEXT; base32_chars TEXT := '0123456789ABCDEFGHJKMNPQRSTVWXYZ'; i INT; BEGIN -- Pega o timestamp em milissegundos ts_millis := FLOOR(EXTRACT(EPOCH FROM clock_timestamp()) * 1000)::BIGINT;
-- Converte o timestamp para base32 ts_chars := ''; FOR i IN REVERSE 0..11 LOOP ts_chars := ts_chars || substr(base32_chars, ((ts_millis >> (5 * i)) & 31) + 1, 1); END LOOP; -- Gera 10 bytes aleatórios e converte para base32 random_bytes := gen_random_bytes(10); random_chars := ''; FOR i IN 0..9 LOOP random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) >> 3) & 31) + 1, 1); IF i < 9 THEN random_chars := random_chars || substr(base32_chars, (((get_byte(random_bytes, i) & 7) << 2) | (get_byte(random_bytes, i + 1) >> 6)) & 31 + 1, 1); ELSE random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) & 7) << 2) + 1, 1); END IF; END LOOP; -- Concatena o timestamp e os caracteres aleatórios RETURN ts_chars || random_chars;
END; $$ LANGUAGE plpgsql; ```
Exemplo de USO
```sql -- Criação da extensão caso não exista CREATE EXTENSION IF NOT EXISTS pgcrypto; -- Criação da tabela pessoas CREATE TABLE pessoas ( ID UUID DEFAULT gen_random_uuid ( ) PRIMARY KEY, nome TEXT NOT NULL );
-- Busca Pessoa na tabela SELECT * FROM "pessoas" WHERE uuid_to_ulid ( ID ) = '252FAC9F3V8EF80SSDK8PXW02F'; ```
Fontes
- https://github.com/scoville/pgsql-ulid
- https://github.com/geckoboard/pgulid
-
@ 9673b322:1b75ee9e
2025-02-13 14:10:06This is some test content
Adding a Sample Image
-
@ 2e8970de:63345c7a
2025-02-13 13:39:35We measure gender differences using the Cross-Gender Friending Ratio, the ratio of female friends in men's networks to the share of female friends in women's networks in a given place.
Men almost always have a lower share of female friends than women do, but the degree varies:Across countries, the CGFR is strongly predictive of gender differences in labor force participation.
Within countries, we also find a strong correlation with gender attitudes in the World Values Survey, such as beliefs about women's suitability for politics.https://x.com/drew_m_johnston/status/1889794718004826288
originally posted at https://stacker.news/items/884660
-
@ bf47c19e:c3d2573b
2025-02-13 07:56:50Originalni tekst na dvadesetjedan.com
Autor: Parker Lewis / Prevod na srpski: Plumsky
Ideja da država može nekako zabraniti bitcoin je jedna od poslednjih faza tuge, tačno pred prihvatanje realnosti. Posledica ove rečenice je priznanje da bitcoin “funkcioniše”. U stvari, ona predstavlja činjenicu da bitcoin funkcioniše toliko dobro da on preti postojećim državnim monopolima nad novcem i da će zbog toga države da ga unište kroz regulativne prepreke da bi eliminisale tu pretnju. Gledajte na tvrdnju da će države zabraniti bitcoin kao kondicionalnu logiku. Da li bitcoin funkcioniše kao novac? Ako je odgovor „ne“, onda države nemaju šta da zabrane. Ako je odgovor „da“, onda će države da probaju da ga zabrane. Znači, glavna poenta ovog razmišljanja je pretpostavka da bitcoin funkcioiniše kao novac. Onda je sledeće logično pitanje da li intervencija od strane države može uspešno da uništi upravo taj funkcionalan bitcoin.
Za početak, svako ko pokušava da razume kako, zašto, ili da li bitcoin funkcioniše mora da proceni ta pitanja potpuno nezavisno od prouzrekovanja državne regulacije ili intervencije. Iako je nesumnjivo da bitcoin mora da postoji uzgred državnih regulativa, zamislite na momenat da države ne postoje. Sam od sebe, da li bi bitcoin funkcionisao kao novac, kad bi se prepustio slobodnom tržištu? Ovo pitanje se širi u dodatna pitanja i ubrzo se pretvara u bunar bez dna. Šta je novac? Šta su svojstva koja čine jednu vrstu novca bolje od druge? Da li bitcoin poseduje ta svojstva? Da li je bitcoin bolja verzija novca po takvim osobinama? Ako je finalni zaključak da bitcoin ne funkcioniše kao novac, implikacije državne intervencije su nebitne. Ali, ako je bitcoin funkcionalan kao novac, ta pitanja onda postaju bitna u ovoj debati, i svako ko o tome razmišlja bi morao imati taj početnički kontekst da bi mogao proceniti da li je uopšte moguće zabraniti. Po svom dizajnu, bitcoin postoji van države. Ali bitcoin nije samo van kontrole države, on u stvari funkcioniše bez bilo kakve saradnje centralizovanih identiteta. On je globalan i decentralizovan. Svako može pristupiti bitcoinu bez potrebe saglasnosti bilo koga i što se više širi sve je teže cenzurisati celokupnu mrežu. Arhitektura bitcoina je namerno izmišljena da bude otporna na bilo koje pokušaje države da ga zabrane. Ovo ne znači da države širom sveta neće pokušavati da ga regulišu, oporezuju ili čak da potpuno zabrane njegovo korišćenje. Naravno da će biti puno bitki i otpora protiv usvajanja bitcoina među građanima. Federal Reserve i Američki Treasury (i njihovi globalni suparnici) se neće ležeći predati dok bitcoin sve više i više ugrožava njihove monopole prihvatljivog novca. Doduše, pre nego što se odbaci ideja da države mogu potpuno zabraniti bitcoin, mora se prvo razumeti posledice tog stava i njegovog glasnika.
Progresija poricanja i stepeni tuge
Pripovesti skeptičara se neprestano menjaju kroz vreme. Prvi stepen tuge: bitcoin nikad ne može funkcionisati-njegova vrednost je osnovana ni na čemu. On je moderna verzija tulip manije. Sa svakim ciklusom uzbuđenja, vrednost bitcoina skače i onda vrlo brzo se vraća na dole. Često nazvano kao kraj njegove vrednosti, bitcoin svaki put odbija da umre i njegova vrednost pronađe nivo koji je uvek viši od prethodnih ciklusa globalne usvajanja. Tulip pripovetka postaje stara i dosadna i skeptičari pređu na više nijansirane teme, i time menjaju bazu debate. Drugi stepen tuge predstoji: bitcoin je manjkav kao novac. On je previše volatilan da bi bio valuta, ili je suviše spor da bi se koristio kao sistem plaćanja, ili se ne može proširiti dovoljno da zadovolji sve promete plaćanja na svetu, ili troši isuviše struje. Taj niz kritike ide sve dalje i dalje. Ovaj drugi stepen je progresija poricanja i dosta je udaljen od ideje da je bitcoin ništa više od bukvalno bezvrednog ničega.
Uprkos tim pretpostavnim manjcima, vrednost bitcoin mreže nastavje da raste vremenom. Svaki put, ona ne umire, nasuprot, ona postaje sve veća i jača. Dok se skeptičari bave ukazivanjem na manjke, bitcoin ne prestaje. Rast u vrednosti je prouzrokovan jednostavnom dinamikom tržišta: postoji više kupca nego prodavca. To je sve i to je razlog rasta u adopciji. Sve više i više ljudi shvata zašto postoji fundamentalna potražnja za bitcoinom i zašto/kako on funkcioniše. To je razlog njegovog dugotrajnog rasta. Dokle god ga sve više ljudi koristi za čuvanje vrednosti, neće pasti cena snabdevanja. Zauvek će postojati samo 21 milion bitcoina. Nebitno je koliko ljudi zahtevaju bitcoin, njegova cela količina je uvek ista i neelastična. Dok skeptičari nastavljaju sa svojom starom pričom, mase ljudi nastavljaju da eliminišu zabludu i zahtevaju bitcoin zbog njegovih prednosti u smislu novčanih svojstva. Između ostalog, ne postoji grupa ljudi koja je više upoznata sa svim argumentima protiv bitcoina od samih bitcoinera.
Očajanje počinje da se stvara i onda se debata još jedanput pomera. Sada nije više činjenica je vrednost bitcoina osnovana ni na čemu niti da ima manjke kao valuta; sada se debata centrira na regulaciji državnih autoriteta. U ovom zadnjem stepenu tuge, bitcoin se predstavlja kao u stvari isuviše uspešnom alatkom i zbog toga države ne smeju dozvoliti da on postoji. Zaista? Znači da je genijalnost čoveka ponovo ostvarila funkcionalan novac u tehnološko superiornoj formi, čije su posledice zaista neshvatljive, i da će države upravo taj izum nekako zabraniti. Primetite da tom izjavom skeptičari praktično priznaju svoj poraz. Ovo su poslednji pokušaji u seriji promašenih argumenata. Skeptičari u isto vreme prihvataju da postoji fundamentalna potražnja za bitcoinom a onda se premeštaju na neosnovan stav da ga države mogu zabraniti.
Ajde da se poigramo i tim pitanjem. Kada bih zapravo razvijene države nastupile na scenu i pokušale da zabrane bitcoin? Trenutno, Federal Reserve i Treasury ne smatraju bitcoin kao ozbiljnu pretnju superiornosti dolara. Po njihovom celokupnom mišljenju, bitcoin je slatka mala igračka i ne može da funkcioniše kao novac. Sadašnja kompletna kupovna moć bitcoina je manja od $200 milijardi. Sa druge strane, zlato ima celokupnu vrednost od $8 triliona (40X veću od bitcoina) i količina odštampanog novca (M2) je otprilike 15 triliona (75X veličine bitcoinove vrednosti). Kada će Federal Reserve i Treasury da počne da smatra bitcoin kao ozbiljnu pretnju? Kad bitcoin poraste na $1, $2 ili $3 triliona? Možete i sami da izaberete nivo, ali implikacija je da će bitcoin biti mnogo vredniji, i posedovaće ga sve više ljudi širom sveta, pre nego što će ga državne vlasti shvatiti kao obiljnog protivnika.
Predsednik Tramp & Treasury Sekretar Mnučin o Bitcoinu (2019):
„Ja neću pričati o bitcoinu za 10 godina, u to možete biti sigurni {…} Ja bi se kladio da čak za 5 ili 6 godina neću više pričati o bitcoinu kao sekretar Trusury-a. Imaću preča posla {…} Mogu vam obećati da ja lično neću biti pun bitcoina.“ – Sekretar Treasury-a Stiv Mnučin
„Ja nisam ljubitelj bitcoina {…}, koji nije novac i čija vrednost je jako volatilna i osnovana na praznom vazduhu.“ – Predsednik Donald J. Tramp
Znači, logika skeptika ide ovako: bitcoin ne funkcioniše, ali ako funkcioniše, onda će ga država zabraniti. Ali, države slobodnog sveta neće pokušati da ga zabrane dokle god se on ne pokaže kao ozbiljna pretnja. U tom trenutku, bitcoin će biti vredniji i sigurno teži da se zabrani, pošto će ga više ljudi posedovati na mnogo širem geografskom prostoru. Ignorišite fundamentalne činjenice i asimetriju koja je urođena u globalnom dešavanju monetizacije zato što u slučaju da ste u pravu, države će taj proces zabraniti. Na kojoj strani tog argumenta bi radije stajao racionalan ekonomski učesnik? Posedovanje finansijske imovine kojoj vrednost toliko raste da preti globalnoj rezervnoj valuti, ili nasuprot – nemati tu imovinu? Sa pretpostavkom da individualci razumeju zašto je mogućnost (a sve više i verovatnoća) ove realnosti, koji stav je logičniji u ovom scenariju? Asimetrija dve strane ovog argumenta sama od sebe zahteva da je prvi stav onaj istinit i da fundamentalno razumevanje potražnje bitcoina samo još više ojačava to mišljenje.
Niko ne moze zabraniti bitcoin
Razmislite šta bitcoin u stvari predstavlja pa onda šta bi predstavljala njegova zabrana. Bitcoin je konverzija subjektivne vrednosti, stvorena i razmenjena u realnošću, u digitalne potpise. Jednostavno rečeno, to je konverzija ljudskog vremena u novac. Kad neko zahteva bitcoin, oni u isto vreme ne zahtevaju neki drugi posed, nek to bio dolar, kuća, auto ili hrana itd. Bitcoin predstavlja novčanu štednju koja sa sobom žrtvuje druge imovine i servise. Zabrana bitcoina bi bio napad na najosnovnije ljudske slobode koje je on upravo stvoren da brani. Zamislite reakciju svih onih koji su prihvatili bitcoin: „Bilo je zabavno, alatka za koju su svi eksperti tvrdili da neće nikad funkcionisati, sada toliko dobro radi i sad ti isti eksperti i autoriteti kažu da mi to nemožemo koristiti. Svi idite kući, predstava je gotova.“verovanje da će svi ljudi koji su učestvovali u bitcoin usvajanju, suverenitetu koji nudi i finansiskoj slobodi, odjednom samo da se predaju osnovnom rušenju njihovih prava je potpuno iracionalna pozicija.
Novac je jedan od najbitnijih instrumenata za slobodu koji je ikad izmišljen. Novac je to što u postojećem društvu ostvaruje mogućnosti siromašnom čoveku – čiji je domet veći nego onaj koji je bio dostižan bogatim ljudima pre ne toliko puno generacija.“ – F. A. Hajek
Države nisu uspele da zabrane konzumiranje alkohola, droga, kupovinu vatrenog oružja, pa ni posedovanje zlata. Država može samo pomalo da uspori pristup ili da deklariše posedovanje ilegalnim, ali ne može da uništi nešto što veliki broj raznovrsnih ljudi smatra vrednim. Kada je SAD zabranila privatno posedovanje zlata 1933., zlato nije palo u vrednosti ili nestalo sa finansijskog tržišta. Ono je u stvari poraslo u vrednosti u poređenju sa dolarom, i samo trideset godina kasnije, zabrana je bila ukinuta. Ne samo da bitcoin nudi veću vrednosno obećanje od bilo kog drugog dobra koje su države pokušale da zabrane (uključujući i zlato); nego po svojim osobinama, njega je mnogo teže zabraniti. Bitcoin je globalan i decentralizovan. On ne poštuje granice i osiguran je mnoštvom nodova i kriptografskim potpisima. Sam postupak zabrane bi zahtevao da se u isto vreme zaustavi „open source“ softver koji emituje i izvršava slanje i potvrđivanje digitalno enkriptovanih ključeva i potpisa. Ta zabrana bi morala biti koordinisana između velikog broja zemalja, sa tim da je nemoguće znati gde se ti nodovi i softver nalazi ili da se zaustavi instaliranje novih nodova u drugim pravnim nadležnostima. Da ne pominjemo i ustavske pitanja, bilo bi tehnički neizvodljivo da se takva zabrana primeni na bilo kakav značajan način.
Čak kada bih sve zemlje iz G-20 grupe koordinisale takvu zabranu u isto vreme, to ne bi uništilo bitcoin. U stvari, to bi bilo samoubistvo za fiat novčani sistem. To bi još više prikazalo masama da je bitcoin u stvari novac koji treba shvatiti ozbiljno, i to bi samo od sebe započelo globalnu igru vatanje mačke za rep. Bitcoin nema centralnu tačku za napad; bitcoin rudari, nodovi i digitalni potpisi su rasejani po celom svetu. Svaki aspekt bitcoina je decentralizovan, zato su glavni stubovi njegove arhitekture da učesnici uvek treba kontrolisati svoje potpise i upravljati svojim nodom. Što više digitalnih potpisa i nodova koji postoje, to je više bitcoin decentralizovan, i to je više odbranjiva njegova mreža od strane neprijatelja. Što je više zemalja gde rudari izvršavaju svoj posao, to je manji rizik da jedan nadležni identitet može uticati na njegov bezbednosni sistem. Koordinisan internacionalni napad na bitcoin bi samo koristio da bitcoin još više ojača svoj imuni sistem. Na kraju krajeva, to bi ubrzalo seobu iz tradicionalnog finansijskog sistema (i njegovih valuta) a i inovaciju koja postoji u bitcoin ekosistemu. Sa svakom bivšom pretnjom, bitcoin je maštovito pronalazio način da ih neutrališe pa i koordinisan napad od strane država ne bi bio ništa drugačiji.
Inovacija u ovoj oblasti koja se odlikuje svojom „permissionless“ (bez dozvole centralnih identiteta) osobinom, omogućava odbranu od svakojakih napada. Sve varijante napada koje su bile predvidjene je upravo to što zahteva konstantnu inovaciju bitcoina. To je ona Adam Smitova nevidljiva ruka, ali dopingovana. Pojedinačni učesnici mogu da veruju da su motivisani nekim većim uzrokom, ali u stvari, korisnost kaja je ugrađena u bitcoin stvara kod učesnika dovoljno snažan podsticaj da omogući svoje preživljavanje. Sopstveni interes milione, ako ne milijarde, nekoordinisanih ljudi koji se jedino slažu u svojom međusobnom potrebom za funkcionalnim novcem podstiče inovacije u bitcoinu. Danas, možda to izgleda kao neka kul nova tehnologija ili neki dobar investment u finansijskom portfoliju, ali čak i ako to mnogi ne razumeju, bitcoin je apsolutna nužnost u svetu. To je tako zato što je novac nužnost a historijski priznate valute se fundamentalno raspadaju. Pre dva meseca, tržište američkih državnih obveznica je doživeo kolaps na šta je Federal Reserve reagovao time što je povećao celokupnu količinu dolara u postojanju za $250 milijardi, a još više u bliskoj budućnosti. Tačno ovo je razlog zašto je bitcoin nužnost a ne samo luksuzni dodatak. Kada inovacija omogućava bazično funkcionisanje ekonomije ne postoji ni jedna država na svetu koja može da zaustavi njenu adopciju i rast. Novac je nužnost a bitcoin znatno poboljšava sistem novca koji je ikada postojao pre njega.
Sa više praktične strane, pokušaj zabranjivanja bitcoina ili njegove velike regulacije od nadležnosti bi direktno bilo u korist susedne nadležnih organa. Podsticaj da se odustane od koordinisanog napada na bitcoin bi bio isuviše veliki da bi takvi dogovori bili uspešni. Kada bi SAD deklarisovale posed bitcoina ilegalnim sutra, da li bi to zaustavilo njegov rast, razvoj i adopciji i da li bi to smanjilo vrednost celokupne mreže? Verovatno. Da li bi to uništilo bitcoin? Ne bi. Bitcoin predstavlja najpokretljivije kapitalno sredstvo na svetu. Zemlje i nadležne strukture koje kreiraju regulativnu strukturu koja najmanje ustručava korišćenje bitcoina će biti dobitnici velike količine uliva kapitala u svoje države.
Zabrana Bitcoinove Zatvoreničke Dileme
U praksi, zatvorenička dilema nije igra jedan na jedan. Ona je multidimenzijska i uključuje mnoštvo nadležnosti, čiji se interesi nadmeću međusobno, i to uskraćuje mogućnosti bilo kakve mogućnosti zabrane. Ljudski kapital, fizički kapital i novčani kapital će sav ići u pravcu država i nadležnosti koje najmanje ustručuju bitcoin. To se možda neće desiti sve odjednom, ali pokušaji zabrane su isto za badava koliko bi bilo odseći sebi nos u inat svom licu. To ne znači da države to neće pokušati. India je već probala da zabrani bitcoin. Kina je uvela puno restrikcija. Drugi će da prate njihove tragove. Ali svaki put kada država preduzme takve korake, to ima nepredvidljive efekte povećanja bitcoin adopcije. Pokušaji zabranjivanja bitcoina su jako efektivne marketing kampanje. Bitcoin postoji kao sistem nevezan za jednu suverenu državu i kao novac je otporan na cenzuru. On je dizajniran da postoji van državne kontrole. Pokušaji da se taj koncept zabrani samo još više daje njemu razlog i logiku za postojanje.
Jedini Pobednički Potez je da se Uključiš u Igru
Zabrana bitcoina je trošenje vremena. Neki će to pokušati; ali svi će biti neuspešni. Sami ti pokušaji će još više ubrzati njegovu adopciju i širenje. Biće to vetar od 100 km/h koji raspaljuje vatru. To će ojačati bitcoin sve više i doprineće njegovoj pouzdanosti. U svakom slučaju, verovanje da će države zabraniti bitcoin u momentu kada on postane dovoljno velika pretnja rezervnim valutam sveta, je iracionalan razlog da se on no poseduje kao instrument štednje novca. To ne samo da podrazumeva da je bitcoin novac, ali u isto vreme i ignoriše glavne razloge zašto je to tako: on je decentralizovan i otporan na cenzure. Zamislite da razumete jednu od nojvećih tajni današnjice i da u isto vreme tu tajnu asimetrije koju bitcoin nudi ne primenjujete u svoju korist zbog straha od države. Pre će biti, neko ko razume zašto bitcoin funkcioniše i da ga država ne može zaustaviti, ili nepuno znanje postoji u razumevanju kako bitcoin uopšte funckioniše. Počnite sa razmatranjem fundamentalnih pitanja, a onda primenite to kao temelj da bi procenili bilo koji potencijalan rizik od strane budućih regulacija ili restrikcija državnih organa. I nikad nemojte da zaboravite na vrednost asimetrije između dve strane ovde prezentiranih argumenata. Jedini pobednički potez je da se uključite u igru.
Stavovi ovde prezentirani su samo moji i ne predstavljaju Unchained Capital ili moje kolege. Zahvaljujem se Fil Gajgeru za razmatranje teksta i primedbe.
-
@ e5de231a:958477f6
2025-02-13 11:32:41Market Insights:
Advanced Semiconductor Packaging Market Size was valued at USD 37.90 Billion in 2024. The Advanced Semiconductor Packaging Market industry is projected to grow from USD 40.94 Billion in 2025 to USD 81.85 Billion by 2034, exhibiting a compound annual growth rate (CAGR) of 8.0% during the forecast period (2025 - 2034). The integration of semiconductor components in vehicles will fuel the global semiconductor advanced packaging market growth. The electrification of automobiles as well as the rising demand for automation in vehicles are expected to be a significant market driver for the Advanced Semiconductor Packaging Market.
In the dynamic landscape of technological advancements, the semiconductor industry stands at the forefront, steering innovation and progress. The Advanced Semiconductor Packaging Market, a crucial facet of this realm, plays a pivotal role in shaping the future of electronic devices. In this comprehensive exploration, we delve into the intricacies of this market, unraveling its complexities and forecasting its trajectory.
Understanding the Essence of Advanced Semiconductor Packaging
What Sets Advanced Semiconductor Packaging Apart?
Semiconductor packaging is the art and science of protecting and enhancing semiconductor devices, ensuring optimal performance in electronic applications. As technology evolves, the demand for more efficient, compact, and powerful semiconductor packaging solutions has surged. This is where the 'advanced' in Advanced Semiconductor Packaging becomes a game-changer.
Miniaturization and Integration: The driving force behind advanced packaging lies in the quest for smaller, yet more potent, electronic components. The market is witnessing a paradigm shift towards compact designs without compromising on functionality. Heterogeneous Integration: Combining diverse materials and technologies into a single package is the hallmark of advanced semiconductor packaging. This amalgamation fosters improved performance, energy efficiency, and overall system reliability. Enhanced Thermal Management: As electronic devices become more powerful, managing heat dissipation becomes a critical challenge. Advanced packaging solutions incorporate innovative thermal management techniques to ensure sustained high performance. Market Trends and Projections
Riding the Waves of Innovation
5G Integration: The advent of 5G technology has propelled the need for advanced semiconductor packaging to new heights. The market is witnessing a surge in demand for packaging solutions that can support the high-frequency requirements of 5G-enabled devices. Artificial Intelligence (AI) Integration: AI-driven applications demand robust semiconductor solutions. Advanced packaging, with its focus on efficient power delivery and heat dissipation, aligns perfectly with the requirements of AI-powered devices. Automotive Electronics: The automotive industry's shift towards electric and autonomous vehicles has fueled the demand for advanced semiconductor packaging. These packages need to withstand harsh environments while delivering exceptional performance. Market Dynamics and Key Players
The Advanced Semiconductor Packaging Market is characterized by intense competition and rapid technological advancements. Key players in this landscape include:
Intel Corporation: A pioneer in semiconductor technology, Intel continues to lead the market with innovations in packaging solutions. Advanced Micro Devices (AMD): Renowned for its cutting-edge processors, AMD's foray into advanced packaging has added a new dimension to the market. Taiwan Semiconductor Manufacturing Company (TSMC): As a global semiconductor manufacturing giant, TSMC's influence on the market is undeniable, shaping the industry's future through advanced packaging technologies. Challenges and Future Prospects
Navigating the Road Ahead
While the Advanced Semiconductor Packaging Market is poised for growth, it is not without its challenges:
Complexity of Integration: As technologies converge, integrating diverse components into a single package poses significant technical challenges. Supply Chain Disruptions: The global semiconductor shortage has underscored the vulnerability of the supply chain. Addressing these disruptions is crucial for sustained market growth. Environmental Considerations: The semiconductor industry is under increasing scrutiny for its environmental impact. Sustainable packaging solutions and responsible manufacturing practices are becoming paramount.
Related Reports:
Super Capacitors Energy Storage System Market
Conclusion
In conclusion, the Advanced Semiconductor Packaging Market is a dynamic arena where innovation converges with necessity. As we navigate the complexities of an interconnected world, the role of advanced packaging in shaping the future of electronics cannot be overstated. The market's trajectory is marked by challenges, but also by unprecedented opportunities for those at the forefront of technological evolution.
-
@ da0b9bc3:4e30a4a9
2025-02-13 06:36:12Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/884478
-
@ 3eba5ef4:751f23ae
2025-02-13 09:00:41Security is fundamental to any blockchain. It ensures that all tokens are secure. When talking about a virtual machine and the smart contract platform it forms, security comes in two main aspects: * The code running on the virtual machine must be secure * The virtual machine itself should also be designed to facilitate safer code execution
The first aspect often gets sufficient attention. When it comes to CKB, we now encourage developers to write scripts in Rust for maximum security, reserving pure C code only for those who fully understand its risks. Additionally, higher-level languages have been introduced in CKB to strike a better balance between productivity and security.
Virtual machine security was a major focus when CKB-VM was originally designed. Many potential risks were addressed at the architectural level, though some—despite thorough research—were still left open. One such issue is Return-Oriented Programming (ROP)—a rather ingenious attack. It exploits executable code that has been legitimately loaded into memory, making widely effective protections (e.g., W^X) futile. It spans multiple architectures and is constantly evolving. Although we’ve spent a great deal of effort in the early days on ROP, we did not implement specific countermeasures to prevent it. Now, with new RISC-V extensions now available, it is the perfect time to introduce design-level protections against ROP.
Acknowledgments
Before diving deeper, we would like to acknowledge Todd Mortimer from the OpenBSD team. His work on ROP mitigations at the OpenBSD kernel in 2018-2019 significantly inspired our research and this article. We highly recommend his talk, slide decks from AsiaBSDCon 2019 and EuroBSD 2018, and this paper for a deeper understanding of ROP. Several examples on x64 ROP attacks in this post are also drawn from his research.
Typical Attack Workflow
While there are many sophisticated ways of attacks, a common attack on a program typically follows this process:
Prepare a shellcode— a piece of binary code to perform specific actions (e.g., running a shell or other programs on the target computer).
Exploit one possible vulnerability in the target system, most commonly a buffer overflow attack. The attack could be initiated via a network protocol (such as HTTP) against a remote system, or via command line input to a target program;
As the result of the attack, the shellcode is inserted to a designated memory region of the target system and gets executed, allowing the attacker to achieve their goal. The consequences vary, like gaining unauthorized access to sensitive data, destroying certain data/machine, planting malicious programs onto the target for further actions, manipulating control flow.
While traditional systems face a wide range of attacks, blockchains run in their own limited and unique runtime environment, rendering many conventional attacks irrelevant. Major blockchain security threats includes:
-
Private key security: Blockchain wallets rely on private keys, which are prime targets for various attacks.
-
Smart contract vulnerability: Poorly written smart contracts contain logic flaws that lead to security risks.
-
Virtual machine security: Attacker may send malicious inputs to a smart contract, causing it to terminate unexpectedly with a success status—despite lacking proper credentials.
This post focuses specifically on attacks targeting the blockchain’s virtual machine—in our case—CKB Virtual Machine (CKB-VM) specifically.
CKB’s Early Approach
While it is impossible to predict every attack, disrupting the typical attack workflow is an effective defense strategy. From its inception, CKB-VM has implemented W^X protection: at any given time, any memory location in CKB-VM is either writable (allowing data modification) or executable (allowing data execution)—but never both. Once a memory region is marked as executable, it cannot be reverted to writable throughout the lifecycle of the current CKB-VM instance. Only writable memory location can be frozen to executable.
This design significantly disrupts the typical attack workflow. For shellcode to execute on CKB-VM, it must reside in executable memory. However, an attacker can only provide shellcode as part of program inputs, which are loaded into writable memory. As long as a CKB script does not voluntarily mark input data as executable (a highly unlikely scenario), the shellcode remains inert. Additionally, attempting to overwrite existing executable shellcode is also futile, since executable memory region is unwritable, and cannot be converted back to writable.
This way, W^X is a well-established security technique widely used in modern hardwares, operating systems, and virtual machines. Although it cannot prevent all possible attacks, W^X effectively shields many by breaking the standard attack workflow. Even if an attacker successfully injects shellcode into a target machine, the attack is incomplete due to the inability to execute it.
Understanding ROP
While W^X is effective, it does not solve all our problems. This leads to the topic of this post: Return-oriented Programming (ROP). Instead of explicitly injecting new code, ROP exploits executable code that already resides in the target machine’s memory. Essentially, ROP builds a shellcode by chaining existing code snippets together that were never intended to function as such. It may sound like a fantasy, but as we shall see from the following examples, ROP is a practical and effective attack technique.
To understand ROP, we must first examine modern CPU architecture and memory layout. While assembly instructions vary in representations and lengths, they are put together in memory one after another as a stream of bytes:
Image Source
As seen in the above example, different assembly instructions come in different lengths. For x86-64 ISA, an instruction can range from 1 to 7 bytes (RISC ISAs such as ARM or RISC-V have more uniform instruction lengths—we will discuss it later). But in memory, instructions are stored sequentially without gaps.
This means that with a stream of bytes alone, we really don’t know what instructions the stream of bytes consist of. In the above example, meaningful assembly instructions emerge only when we start decoding from the
B8
byte. In a different occasion, assuming we know elsewhere thatB8 22 11
bytes at the front are for certain magic flags, the decoding would start from00
byte, yielding a totally different instruction set.Image Source
It is really the combination of a special program counter (
PC
) register from the CPU and the current memory stream, jointly determine the instructions the CPU executes. Depending on each different ISA or hardware, a booting process initializes a CPU’sPC
register to a pre-defined value, then loads up instructions from this pre-defined address, and initializes everything related to the operating system. When a user launches a new program, the metadata for each program will contain anentrypoint
address, where OS sets the CPU’sPC
register to, in order to start executing the program. It is suffice to say that maintaining a properPC
value is a critical job to ensure a computer’s proper function. An invalidPC
value might lead to a CPU malfunction at best, or at worst, leaking sensitive information or granting attackers unauthorized access.Forming an ROP Attack Via ROP Gadgets
Let’s look at the following byte instruction stream in a x86-64 CPU:
8a 5d c3 movb -61(%rbp), %bl
This 3-byte represents a
mov
instruction: it takes the address ofrbp
register, adds an offset of-61
, then uses the result as a memory address to load 1 byte data, and finally sets the loaded data tobl
register. However, if we ignore8a
and only look at5b c3
here, it actually represents a different instruction set:5d popq %rbp c3 retq
This byte sequence contains two instructions:
-
Pop 8-byte value from stack, and use it to set
rbp
register -
Pop 8-byte value from stack, and use it to set
PC
register, so we continue executing from the new location
We've briefly discussed that shellcode only fulfills a certain task required by the attacker. In fact, the most common type of shellcode simply construct a new shell, where the attacker can execute more operations. Such shellcode can be represented in the following C pseudocode to run a new command via the
execve
syscall:execve(“/bin/sh”, NULL, NULL);
To execute this on an x86-64 CPU, the following actions are needed for a syscall:-
rax
register: must contain the syscall number, forexecve
, it is59
-
rdi
,rsi
,rdx
registers: hold the first 3 arguments to the syscall. In this case,rdi
holds a pointer to the C string/bin/sh
;rsi
andrdx
must be zero. -
The
syscall
instruction (or typicallyint 80h
on x64) shall be executed
A typical shellcode would be a packed assembly sequence directly doing all of the above instructions. In contrast, ROP attack looks for the following sequences: ```
Those can set the value of different registers from values on the stack
pop %rax; ret pop %rdi; ret pop %rsi; ret pop %rdx; ret
Finally, trigger the syscall
syscall ``` Each of these small code sequences, are conventionally callled ROP gadgets. An attacker searches for these gadgets in the target program or system libraries (such as libc). Once these required gadgets are obtained, the attacker pieces together a sequence of data, much like the following:
With the prepared data sequence, the attacker can exploit a vulnerability in the target computer or program, such as typical buffer overflow attack. During this process, the attacker performs three key actions:
-
Pushes (or overwrites existing data) the crafted data sequence to the stack
-
Sets the stack pointer (top of the stack) to
X + 64
-
Sets the
PC
register to the address of a code sequence,pop %rax; ret
in the existing program or libc memory space
Now the attack proceeds step by step as follows:
-
The CPU runs
pop %rax; ret
. With the stack pointer pointing toX + 64
, the CPU pops59
from the stack and setsrax
register to59
. It then pops the address to code sequencepop %rdi; ret
from the stack, and setsPC
to this value; -
The CPU runs
pop %rdi; ret
. With the stack pointer pointing toX + 48
, the CPU pops valueX
, pointing to the C string/bin/sh
from the stack, and setsrdi
register toX
. It then pops the address to code sequencepop %rsi; ret
from the stack, and setsPC
to this value; -
The CPU runs
pop %rsi; ret
. With the stack pointer pointing toX + 32
, the CPU pops0
from the stack and setsrsi
register to0
. It then pops the address to code sequencepop %rdx; ret
from the stack, and setsPC
to this value; -
The CPU runs
pop %rdx; ret
. With the stack pointer pointing toX + 16
, the CPU pops0
from the stack and setsrdx
register to0
. It then pops the address to code sequencesyscall
from the stack, and setsP
C to this value; -
The CPU runs
syscall
. At this point,rax
holds59
,rdi
points to/bin/sh
, and bothrsi
andrdx
are zero, the CPU invokesexecve("/bin/sh, NULL, NULL);
, granting the attacker a shell for further manipulations.
This sequence of ROP gadgets, referred to as ROP chains, demonstrates how a complete ROP attack works. Two key takeaways are:
-
ROP does not inject new code. Instead, it injects data into the stack and leverages the existing code loaded in memory and marked them as executable. W^X protections hence cannot prevent ROP attacks.
-
Attackers can mine ROP gadgets from the libc library. This is because modern computers employs protection rings as a way for privilege encapsulations: on x86-64 computers, programs normally run at ring level 3, while libc runs at ring level 1. Lower ring levels have higher privileges, meaning that even if a program misbehaves, its capacities are limited at ring level 3. However, by using ROP gadgets in the libc library which runs at ring level 1, ROP attacks can have higher privileges and execute more damaging operations then normal shellcodes.
Note that the above examples simply show the most basic ROP gadgets. In reality, ROP gadgets come in all kinds of forms. Since they come from compiler outputs, they can be combined in the least expected way, and can vary the forms as new compiler optimizations come out. Numerous tools (e.g., ropper, ropr) and research papers (e.g., Experiments on ROP Attack with Various Instruction Set Architectures, ROPGMN, Detecting and Preventing ROP Attacks using Machine Learning on ARM, KROP ) keep coming out, making it almost impossible to enumerate all possible ROP gadget combinations.
ROP on ARM & RISC-V
ROP attacks are not limited to CISC architectures, where instructions vary in length. They also affect RISC designs, such as ARM and RISC-V. Take the following sequence for example:
13 4f 83 23 0b 00
Decoding from the start, the first four bytes representxori t5,t1,568
following the RISC-V ISA. But if we skip the first two, the latter four representlw t2,0(s6)
. This illustrates that a byte stream interpretation also requiresPC
register in a RISC design such as RISC-V. As a result, one can find ROP gadgets from a RISC-V program as well.ROP on CKB-VM
CKB’s RISC-V machine operates in a more restricted environment: for programs running on CKB, there are no
execve
syscalls to hijack a running shell, and all runtime states are publicly visible on a public blockchain like CKB. However, ROP attacks can still occur on CKB: one could construct an ROP chain that setsa0
to0
,a7
to93
, then executesecall
. This causes CKB-VM to immediately return with a success code (0
), potentially allowing a script to pass validation when it should have failed—such as a lock script succeeding without a valid signature.Short Recap
Let’s briefly recap what we’ve learned so far:
-
ROP attacks utilize existing executable code for malicious purposes. W^X cannot prevent ROP.
-
ROP is possible across multiple architecture, including x86-64, ARM, RISC-V, and CKB.
-
The landscape of ROP is constantly evolving. With new tools, techniques, and research emerging regularly, it’s impossible to foresee all ROP gadgets.
ROP has been extensively studied over the years, leading to various mitigation strategies, which can be broadly categorized into two main approaches:
-
Software Solutions: Covering techniques like rewriting code sequences and implementing Retguard to prevent the creation of ROP gadgets
-
Hardware Solutions: Introducing additional CPU instructions with Control Flow Integrity (CFI) checks to safeguard control flow.
I’ll explore these strategies in greater detail in the following sections.
Software Solutions to Mitigate ROP
Rewriting Sequence
Certain instruction sequences are often targeted to form ROP gadgets. To prevent ROP, one approach is to alter the compiler, so that such sequences can never be generated. Take the following example:
89 c3 mov %eax,%ebx 90.
In x86-64,c3
represents theret
instruction, making it a potential target for ROP gadgets. We can rewrite it into the following equivalent sequence:48 87 d8 xchgq %rbx, %rax 89 d8 movl %ebx, %eax 48 87 d8 xchgq %rbx, %rax
The new sequence lacksc3
byte at the expense of more bytes and more executed instructions. However, it is really up to real benchmarks to see if this causes noticeable overhead.Further analysis has revealed that the
rbx
register in x86-64 is often the source of ROP gadgets, due to the way Intel encodes x86-64 instructions. Hence, the OpenBSD team decided to avoidrbx
register wherever possible, reducing the number of potential ROP gadgets.Again, this approach comes at the cost of having bigger code fragments, more instructions to execute, and an additional patched compiler. While OpenBSD has integrated these changes into its distribution, other environments must weigh the benefits against the costs.
For a deeper dive, I would strongly recommend Todd Mortimer’s work.
Retguard’s Solution: Prologue and Epilogue
Todd Mortimer also introduced Retguard in this work for securing OpenBSD known. ROP attacks typically occur when you enter a function
foo
, but the stack was manipulated, so the CPU exits to another code fragment that is notfoo
. What if to verify that, at each function exit, it is the same function for exiting and entering?Retguard introduces two components to perform this task:
-
Prologue: A prologue is inserted to each function’s entry, taking two inputs:
-
- A
cookie
value, a random data assigned for this particular function.
- A
-
- The return address, where to jump to when current function exits—as inputs.
The prologue computes the XOR value of these two, and stores the result into the current function’s frame section, a dedicated memory region designated to the current function to hold data, separated from the stack.
-
Epilogue: An epilogue is inserted to the location where a function might exit. It takes two inputs:
-
- The saved XOR value from the prologue in the frame section
-
- The return address it now can access to (most likely popped from the stack in x64 machine, or read from a special
RA
register in RISC design)
- The return address it now can access to (most likely popped from the stack in x64 machine, or read from a special
The epilogue computes the XOR of these two. If the result matches the original
cookie
, execution proceeds. Otherwise, the epilogue halts the program, signaling an error.This prologue-epilogue mechanism in Retguard guards the call stack from tampering. At a noticeable but acceptable cost (both in performance and code size), Retguard eliminates a significant number of ROP gadgets from the OpenBSD kernel. Like other software-based mitigations, it requires a patched compiler, and it is up to each environment to decide if such technique shall be employed.
Hardware Advancements to Mitigate ROP
In addition to software solutions, hardware-based defenses have also been developed. For instance, Intel has introduced Indirect Branch Tracking feature starting with its 12th generation core processors, using a new instruction
endbr32
orendbr64
added at every location the program might jump to or call into. When the CPU executes a jump/call, it asserts that the target location is a properendbr32
/endbr64
instruction, before updating the program counterPC
register to proper values. Otherwise, the CPU halts to terminate the program. This ensures that all control flows will follow the intended way, preventing ROP attacks from redirecting execution arbitrary locations.Modern OSes have already extensively leveraged
endbr32
/endbr64
instructions. Ubuntu 24.04, for instance, has included these instructions in its packages: ``` $ objdump -d /bin/bash | head -n 50/bin/bash: file format elf64-x86-64
Disassembly of section .init:
0000000000030000 <.init>: 30000: f3 0f 1e fa endbr64 30004: 48 83 ec 08 sub $0x8,%rsp 30008: 48 8b 05 d9 7e 12 00 mov 0x127ed9(%rip),%rax # 157ee8 __gmon_start__@Base 3000f: 48 85 c0 test %rax,%rax 30012: 74 02 je 30016 unlink@plt-0xe1a 30014: ff d0 call *%rax 30016: 48 83 c4 08 add $0x8,%rsp 3001a: c3 ret
Disassembly of section .plt:
0000000000030020 <.plt>: 30020: ff 35 a2 76 12 00 push 0x1276a2(%rip) # 1576c8 o_options@@Base+0x1cc8 30026: ff 25 a4 76 12 00 jmp *0x1276a4(%rip) # 1576d0 o_options@@Base+0x1cd0 3002c: 0f 1f 40 00 nopl 0x0(%rax) 30030: f3 0f 1e fa endbr64 30034: 68 00 00 00 00 push $0x0 30039: e9 e2 ff ff ff jmp 30020 unlink@plt-0xe10 3003e: 66 90 xchg %ax,%ax 30040: f3 0f 1e fa endbr64 30044: 68 01 00 00 00 push $0x1 30049: e9 d2 ff ff ff jmp 30020 unlink@plt-0xe10 3004e: 66 90 xchg %ax,%ax 30050: f3 0f 1e fa endbr64 30054: 68 02 00 00 00 push $0x2 30059: e9 c2 ff ff ff jmp 30020 unlink@plt-0xe10 3005e: 66 90 xchg %ax,%ax 30060: f3 0f 1e fa endbr64 30064: 68 03 00 00 00 push $0x3 30069: e9 b2 ff ff ff jmp 30020 unlink@plt-0xe10 3006e: 66 90 xchg %ax,%ax 30070: f3 0f 1e fa endbr64 30074: 68 04 00 00 00 push $0x4 30079: e9 a2 ff ff ff jmp 30020 unlink@plt-0xe10 3007e: 66 90 xchg %ax,%ax 30080: f3 0f 1e fa endbr64 30084: 68 05 00 00 00 push $0x5 30089: e9 92 ff ff ff jmp 30020 unlink@plt-0xe10 3008e: 66 90 xchg %ax,%ax 30090: f3 0f 1e fa endbr64 30094: 68 06 00 00 00 push $0x6 30099: e9 82 ff ff ff jmp 30020 unlink@plt-0xe10 3009e: 66 90 xchg %ax,%ax
`` The
endbr32/
endbr64instructions has been carefully designed, so they are
nop` instructions—meaning they can do nothing at all—on CPUs prior to their introductions. Having them doesn't have any effect on older CPUs but enhances security on supported hardware.RISC-V’s Latest Achievements: CFI Extension
The above mitigations against ROP fall into two categories:
-
Compiler Modifications: Can generate more secure binary assembly code.
-
Additional CPU instructions: Coming with Control Flow Integrity (CFI) checks to prevent exploitation
Back to the beginning of designing CKB-VM, we throughly studied ROP and recognized that a vulnerability in a CKB script could potentially open the door to ROP attacks. However, we eventually did not introduce any specific mitigation against ROP in CKB-VM. Our decision was to stay aligned with the RISC-V ecosystem, avoiding shipping any custom RISC-V spec with additional instructions that would require a patched compiler. Nor do we want to maintain our own compiler set, eliminating the potential that any RISC-V-compliant compiler shall be able to produce CKB script. As the result, we shipped the first version of CKB-VM without ROP mitigations, but that does not mean we’ve ignore this issue:
-
We’ve reached out to the RISC-V community for possible extension similar to Intel’s solution, and kept monitoring advancements in this field;
-
We’ve been watching over progress and writing secure CKB scripts. Since ROP relies on existing vulnerabilities, secure CKB scripts can kept ROP purely theoretical.
We were thrilled when the RISC-V CFI (Control-Flow Integrity) Extension was officialy ratified in July 2024. Designed by the brilliant minds from the RISC-V Foundation, this extension directly addresses ROP attacks with two key features:
-
Zicfilp
extension introduces landing pad: Resembles Intel’sendbr32
/endbr64
to ensure that the CPU can only jump to valid, permitted targets. -
Zicfiss
extension introduces shadow stack with a series of instructions:. Offers a hardware solution similar to Retguard, where CPU ensures the control flow integrity or simply puts the call stack, preventing tampering throughout execution.
Together, these features offer the state-of-the-art mitigations against ROP. More importantly, RISC-V CFI is now an official extension, meaning all future RISC-V CPUs, compilers, and tools will support this extension. In fact, LLVM 19 has already supported, and I believe other compilers and tools will follow soon.
Once fully adopted, CKB script developers can simply turn them on like a switch during code compilation. Without modifying the code, they can enjoy the security provided by RISC-V CFI extensions. Even if a vulnerability exists in a CKB script, these built-in enforcements can prevent it from being exploited.
Final Words
Security is complex. While we strive for maximum security, certain design principles might get in the way from introducing specific mitigations. ROP is a prime example: while we did learn much about it early on, implementing the best mitigations needs proper timing. Now the time has come. We are happy to introduce RISC-V CFI in CKB’s next hardfork, bringing stronger security for everyone.
✍🏻 Written by Xuejie Xiao
His previous posts include:
-
A Journey Optimizing CKB Smart Contract: Porting Bitcoin as an Example
-
Optimizing C++ Code for CKB-VM: Porting Bitcoin as an Example
Find more in his personal website Less is More.
-
-
@ d360efec:14907b5f
2025-02-13 05:54:17ภาพรวม LUNCUSDT (OKX):
LUNCUSDT กำลังอยู่ในช่วงที่ มีความผันผวนสูงและมีความไม่แน่นอนมาก แม้ว่าในอดีต (TF Day) จะเคยมีสัญญาณของการพยายามกลับตัวเป็นขาขึ้น (Breakout EMA 50 และเกิด Golden Cross) แต่ปัจจุบันแรงซื้อเหล่านั้นเริ่มอ่อนแรงลง และมีแรงขายเข้ามาในตลาดมากขึ้น ทำให้เกิดความขัดแย้งระหว่าง Timeframes ต่างๆ
สถานะปัจจุบัน:
- แนวโน้ม:
- TF Day: เริ่มไม่แน่นอน (จากเดิมที่เป็น Early Uptrend) - แม้ว่าราคาจะยังอยู่เหนือ EMA 50/200 แต่ Money Flow เริ่มแสดงสัญญาณเตือน
- TF4H: เริ่มไม่แน่นอน (พักตัว, ทดสอบแนวรับ EMA 50) - Money Flow บ่งบอกถึงแรงขายที่เข้ามา
- TF15: ผันผวนสูง, ไม่มีทิศทางชัดเจน (Sideways) - Money Flow แสดงถึงแรงขาย แต่ก็มีแรงซื้อกลับเข้ามาบ้าง
- Money Flow (LuxAlgo):
- TF Day: แรงซื้อเริ่มอ่อนแรงลงอย่างมีนัยสำคัญ, มีแรงขายเข้ามา
- TF4H: แรงขายมีมากกว่าแรงซื้อ
- TF15: แรงขายและแรงซื้อผสมกัน, โดยรวมแรงขายยังมากกว่า
- EMA:
- TF Day: EMA 50/200 เป็นแนวรับ/แนวต้าน
- TF4H: EMA 50 กำลังถูกทดสอบ, EMA 200 เป็นแนวต้าน
- TF15: EMA 50/200 เป็นแนวต้าน
โครงสร้างราคา (SMC):
| Timeframe | Break of Structure (BOS) | Change of Character (CHoCH) | Higher High (HH) & Higher Low (HL) | Equal Highs (EQH) / Equal Lows (EQL) | | :-------- | :----------------------- | :--------------------------- | :----------------------------------- | :------------------------------------- | | Day | ด้านบนและล่าง | ด้านบน | เริ่มก่อตัว (แต่ไม่แข็งแกร่ง) | - | | 4H | ด้านบน | ด้านบน | เริ่มก่อตัว (แต่ไม่ชัดเจน) | มี EQH หลายจุด | | 15m | ด้านบนและล่าง | มีทั้งบนและล่าง | Lower Highs (LH) & Lower Lows (LL) | มี EQH และ EQL หลายจุด |
แนวรับ-แนวต้านสำคัญ:
| Timeframe | แนวรับ | แนวต้าน | | :-------- | :----------------------------------------------------------- | :--------------------------------------------------------------------- | | Day | EMA 50 (≈0.00010000), EMA 200 (≈0.00008000), 0.00006000-0.00007000 | 0.00017953 (High ล่าสุด), 0.00014000 (Volume Profile) | | 4H | EMA 50 (≈0.00007000), 0.00006000-0.00007000 | EMA 200 (≈0.00008000), 0.00008132, บริเวณ 0.00010000-0.00012000 (EQH) | | 15m | บริเวณ Low ล่าสุด | EMA 50, EMA 200, บริเวณ 0.000075-0.000076 (EQH) |
กลยุทธ์ (LUNCUSDT):
- Wait & See (ทางเลือกที่ดีที่สุด):
- เหตุผล: ความขัดแย้งระหว่าง Timeframes สูงมาก, แนวโน้มไม่ชัดเจน, Money Flow ใน TF4H และ TF15 เป็นลบ
- รอให้ราคาแสดงทิศทางที่ชัดเจนกว่านี้ (ยืนเหนือ EMA 50 ใน TF4H ได้, Breakout แนวต้านใน TF15)
- Buy on Dip (Day, 4H) - ความเสี่ยงสูงมาก ไม่แนะนำ:
- เหตุผล: แนวโน้มระยะยาวอาจจะยังเป็นขาขึ้นได้ (ถ้าไม่หลุดแนวรับสำคัญ)
- เงื่อนไข: ต้อง รอสัญญาณการกลับตัวใน TF15 ก่อน
- จุดเข้า: พิจารณาเฉพาะบริเวณแนวรับที่แข็งแกร่งมากๆ (EMA ของ Day/4H) และต้องดู TF15 ประกอบ
- Stop Loss: ต่ำกว่า Low ล่าสุดของ TF15
- Short (15, ความเสี่ยงสูงมาก):
- เหตุผล: แนวโน้ม TF15 เป็นขาลง, Money Flow เป็นลบ
- เงื่อนไข: ราคาไม่สามารถ Breakout EMA หรือแนวต้านอื่นๆ ใน TF15 ได้
- จุดเข้า: บริเวณ EMA หรือแนวต้านของ TF15
- Stop Loss: เหนือ High ล่าสุดของ TF15
คำแนะนำ (เน้นย้ำ):
- LUNC เป็นเหรียญที่มีความเสี่ยงสูงมาก (High Risk): มีความผันผวนสูง และอาจมีการเปลี่ยนแปลงอย่างรวดเร็ว
- ความขัดแย้งของ Timeframes: สถานการณ์ของ LUNCUSDT มีความขัดแย้งสูงมาก และมีความเสี่ยงสูง
- Money Flow: บ่งบอกถึงแรงขายที่เริ่มเข้ามา และแนวโน้มขาขึ้น (ระยะกลาง-ยาว) ที่อ่อนแอลง
- ถ้าไม่แน่ใจ อย่าเพิ่งเข้าเทรด: "รอ" เป็นกลยุทธ์ที่ดีที่สุด
- Risk Management: สำคัญที่สุด ไม่ว่าจะเลือกกลยุทธ์ใด ต้องมีการบริหารความเสี่ยงที่ดี
สรุป: LUNCUSDT กำลังอยู่ในช่วงเวลาที่ยากลำบากและมีความเสี่ยงสูงมากที่สุดในบรรดา 3 เหรียญที่เราวิเคราะห์กันมา การตัดสินใจที่ผิดพลาดอาจนำไปสู่การขาดทุนได้ ควรพิจารณาอย่างรอบคอบก่อนเข้าเทรดทุกครั้ง และ "รอ" จนกว่าจะมีสัญญาณที่ชัดเจนกว่านี้ เป็นทางเลือกที่ปลอดภัยที่สุดสำหรับนักลงทุนส่วนใหญ่ค่ะ
Disclaimer: การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
- แนวโน้ม:
-
@ d360efec:14907b5f
2025-02-13 05:27:39ภาพรวม XRPUSDT (OKX):
XRPUSDT กำลังอยู่ในช่วงสำคัญ แนวโน้มระยะยาว (TF Day) เริ่มมีสัญญาณบวกของการเป็นขาขึ้น (Early Uptrend) หลังราคา Breakout EMA 50 และ Money Flow สนับสนุน อย่างไรก็ตาม แนวโน้มระยะกลาง (TF4H) เริ่มแสดงความอ่อนแอลง โดยราคาพักตัวลงมาทดสอบแนวรับสำคัญ และ Money Flow บ่งชี้ถึงแรงซื้อที่ลดลงและแรงขายที่เพิ่มขึ้น ส่วนแนวโน้มระยะสั้นมาก (TF15) เป็นขาลงชัดเจน
แนวโน้ม:
- TF Day: เริ่มเป็นขาขึ้น (Early Uptrend) - Breakout EMA 50, Money Flow เป็นบวก
- TF4H: เริ่มไม่แน่นอน (พักตัว, ทดสอบแนวรับ EMA 50 และ EQL) - Money Flow เริ่มเป็นลบ
- TF15: ขาลง (Downtrend) ระยะสั้นมาก - ราคาหลุด EMA, โครงสร้างราคาเป็น Lower Highs/Lows, Money Flow เป็นลบ
โครงสร้างราคา (SMC):
| Timeframe | Break of Structure (BOS) | Change of Character (CHoCH) | Higher High (HH) & Higher Low (HL) | Equal Highs (EQH) / Equal Lows (EQL) | | :-------- | :----------------------- | :--------------------------- | :----------------------------------- | :------------------------------------- | | Day | ด้านบน (Breakout EMA 50) | ไม่ชัดเจน | เริ่มก่อตัว (แต่ยังไม่ชัดเจน) | - | | 4H | ด้านบน | ไม่ชัดเจน | เริ่มก่อตัว (แต่ไม่ชัดเจน) | EQH: 3.00-3.20, EQL: 2.2667 | | 15m | ด้านล่าง | มีทั้งบนและล่าง | Lower Highs (LH) & Lower Lows (LL) | EQH: 2.48-2.50, EQL: 2.38 |
Money Flow (LuxAlgo):
- TF Day: แรงซื้อแข็งแกร่ง
- TF4H: แรงซื้อเริ่มอ่อนแรงลง, แรงขายเริ่มเข้ามา
- TF15: แรงขายมีอิทธิพลเหนือกว่า
EMA (Exponential Moving Average):
- TF Day: EMA 50 & 200 เป็นแนวรับ
- TF4H: EMA 50 กำลังถูกทดสอบ, EMA 200 เป็นแนวรับถัดไป
- TF15: EMA 50 & 200 เป็นแนวต้าน
แนวรับ-แนวต้านสำคัญ:
| Timeframe | แนวรับ | แนวต้าน | | :-------- | :----------------------------------------------------- | :----------------------------------------------------------------------- | | Day | EMA 50 (≈1.56), EMA 200 (≈1.08) | 3.4049 (High), 3.00-3.20 (EQH) | | 4H | EMA 50 (≈2.20), 2.2667 (EQL), EMA 200, 1.7820 | 3.4049, 2.3987 (Volume Profile), 3.00-3.20 (EQH) | | 15m | 2.38 (EQL, Volume Profile), 2.3274 | EMA 50, EMA 200, 2.4196, Equilibrium (≈2.44), 2.48-2.50 (EQH) |
กลยุทธ์ (XRPUSDT):
- Wait & See (ทางเลือกที่ดีที่สุด):
- เหตุผล: ความขัดแย้งระหว่าง Timeframes สูง, TF4H กำลังทดสอบแนวรับสำคัญ, Money Flow ใน TF4H และ TF15 เป็นลบ
- รอให้ราคาแสดงทิศทางที่ชัดเจน (ยืนเหนือ EMA 50 ใน TF4H ได้ หรือ Breakout แนวต้านใน TF15)
- Buy on Dip (Day, 4H) - ความเสี่ยงสูงมาก:
- เหตุผล: แนวโน้มระยะยาวยังมีโอกาสเป็นขาขึ้น, Money Flow ใน TF Day เป็นบวก
- เงื่อนไข (สำคัญมาก): ต้อง รอสัญญาณการกลับตัวใน TF15 ก่อน เช่น:
- Breakout แนวต้านย่อยๆ พร้อม Volume
- Money Flow (TF15) เปลี่ยนเป็นสีเขียว
- Bullish Candlestick Patterns
- จุดเข้า (Day): EMA 50, EMA 200 (ดู TF15 ประกอบ)
- จุดเข้า (4H): EMA 50, 2.2667 (EQL) (ดู TF15 ประกอบ)
- Stop Loss: ต่ำกว่า Low ล่าสุดของ TF15 หรือต่ำกว่าแนวรับที่เข้าซื้อ
- Short (15, ความเสี่ยงสูงมาก):
- เหตุผล: แนวโน้ม TF15 เป็นขาลง, Money Flow เป็นลบ
- เงื่อนไข: ราคาไม่สามารถกลับขึ้นไปยืนเหนือ EMA ของ TF15 ได้
- จุดเข้า: บริเวณ EMA ของ TF15 หรือแนวต้านอื่นๆ
- Stop Loss: เหนือ High ล่าสุดของ TF15
คำแนะนำ:
- ความขัดแย้งของ Timeframes: XRPUSDT มีความขัดแย้งสูงมาก และมีความเสี่ยงสูง
- Money Flow: Day เป็นบวก, 4H เริ่มเป็นลบ, 15m เป็นลบ
- EMA 50 (TF4H) & EQL 2.2667: จุดชี้ชะตา
- ถ้าไม่แน่ใจ อย่าเพิ่งเข้าเทรด: "รอ" ดีที่สุด
- Risk Management: สำคัญที่สุด
สรุป: สถานการณ์ของ XRPUSDT ตอนนี้มีความเสี่ยงสูงมาก และไม่เหมาะกับนักลงทุนที่รับความเสี่ยงได้ต่ำ การ "รอ" จนกว่าจะมีสัญญาณที่ชัดเจนกว่านี้ เป็นทางเลือกที่ปลอดภัยที่สุดค่ะ
Disclaimer: การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-
@ 34c964ef:82a60fa4
2025-02-13 08:25:18The Bond Clean Experts: Your Ultimate Solution for End-of-Lease Cleaning
Moving out of a rental property can be stressful, especially when it comes to meeting the landlord’s cleanliness expectations. That’s where The Bond Clean Experts come in! With professional experience and a commitment to excellence, we ensure your property is spotless, helping you secure your full bond refund without hassle.
Why Choose The Bond Clean Experts?
✅ Experienced Professionals: Our team is trained in industry-standard cleaning techniques to deliver impeccable results.✅ Guaranteed Satisfaction: We offer a bond-back guarantee, ensuring your property meets inspection requirements.✅ Eco-Friendly Products: We use non-toxic, eco-friendly cleaning solutions to protect your health and the environment.✅ Comprehensive Cleaning Services: From kitchens and bathrooms to carpets and windows, we cover every inch of your property.✅ Affordable Pricing: Quality service at competitive rates with no hidden fees.
Our Services Include:
Deep Carpet Cleaning – Removing stubborn stains and odors.
Kitchen & Appliance Cleaning – Ensuring spotless ovens, stovetops, and countertops.
Bathroom Sanitization – Eliminating grime, mold, and bacteria.
Wall & Window Cleaning – Removing marks, dust, and streaks.
Floor & Tile Scrubbing – Bringing back the shine to your flooring.
The Bond Cleaning Process
Inspection & Quote: We assess your property’s cleaning needs and provide a transparent quote.
Thorough Cleaning: Our experts deep clean every area to meet landlord expectations.
Final Touches: We double-check all details and ensure nothing is overlooked.
Satisfaction Guarantee: If needed, we offer a free re-clean to ensure compliance with lease requirements.
Book Your Bond Clean Today!
Don’t risk losing your bond due to subpar cleaning. Let The Bond Clean Experts handle the job with precision and care.
📞 Call us at 0485971499 Serving https://www.bondcleaners.au/bond-cleaning-brisbane/💬 Message us for a free quote!
Make your move-out hassle-free with The Bond Clean Experts! ✨
-
@ 04ed2b8f:75be6756
2025-02-13 08:02:39Freedom. It’s the word on everyone’s lips, the dream of every soul. We long for it, we chase it, we believe that if we can break free from this chain or that constraint, we will finally be free. But true freedom is not about external circumstances—it’s about control.
The truth is, the most powerful chains are the ones we place on ourselves. The world can throw its challenges at you, life can dish out its unfair blows, but if you cannot control yourself, your thoughts, your emotions, your reactions, then you are no different than a prisoner.
There is no freedom in chaos. There is no freedom in losing control. Freedom is mastery—mastery of the self.
Freedom Begins Within
You can have all the money in the world, live in the most luxurious place, and have every material possession your heart desires, but if you cannot control your impulses, your habits, your desires—none of that will matter. You are still a slave to your cravings. You are still a puppet to your own emotions, and that is no real freedom.
What does freedom look like?
- It’s the power to act with purpose, not to react out of emotion.
- It’s the strength to stay disciplined when every part of you wants to quit.
- It’s the courage to say ‘no’ to distractions, to temptation, to things that steer you off course.
- It’s the clarity to make choices that serve your growth, not your immediate desires.
True freedom is the ability to say, “I am in control of myself. I do not let my circumstances control me, nor my emotions rule me. I dictate my actions, my thoughts, my destiny.”
Self-Control: The Ultimate Weapon
The power to control yourself is your greatest weapon. Without it, you are at the mercy of every challenge, every temptation, and every fleeting emotion. You may feel like you are “free,” but without self-discipline, you are just a puppet swaying in the wind, vulnerable to every whim that blows your way.
- The impulse to procrastinate? You overcome it.
- The desire to give up? You push through it.
- The craving for comfort? You choose growth.
In the face of any storm, a man with self-control remains grounded, focused, and clear. He doesn’t react in anger or fear—he acts with purpose, with precision, and with vision.
A man who cannot control himself is a man who is owned by his emotions, his desires, his distractions. But the man who conquers his mind, his body, his impulses—he is the one who owns his life.
The Price of Freedom
It’s not easy to control yourself. It requires constant effort, relentless discipline, and the courage to face yourself head-on. It means saying ‘no’ to what feels good now, to invest in what will make you stronger later. It means constantly improving, constantly fighting the urge to quit, to give in, to indulge in comfort.
But the price of freedom is worth it. For when you have control over yourself, no one can take your power. You become the master of your fate. You become unshakable.
Freedom Through Discipline
So, ask yourself: Are you truly free, or are you simply a slave to your impulses?
- Do you control your actions, or do your actions control you?
- Are you the master of your emotions, or are they the masters of you?
Freedom isn’t just about having no chains; it’s about not letting anything control you—least of all yourself. And when you control yourself, there’s nothing you can’t accomplish.
A man who cannot control himself is never truly free. But a man who conquers his mind, his habits, his emotions—he is unstoppable. Now go and choose to control yourself, and unlock the freedom that’s waiting for you. Or remain a prisoner to your impulses, forever shackled by the chains of your own making. The choice is yours.
-
@ d360efec:14907b5f
2025-02-13 04:47:20ภาพรวม BTCUSDT :
Bitcoin (BTCUSDT) กำลังอยู่ในช่วงสำคัญ แม้ว่าแนวโน้มหลักในระยะกลางถึงยาว (TF Day & 4H) จะยังคงเป็นขาขึ้นที่แข็งแกร่ง แต่ในระยะสั้นมาก (TF15) กลับแสดงสัญญาณของความอ่อนแอและการปรับฐานลงมา ทำให้เกิดความไม่แน่นอนในทิศทางของราคา อย่างไรก็ตาม Money Flow ใน TF Day บ่งชี้ว่าแรงซื้อโดยรวมยังคงแข็งแกร่ง
แนวโน้ม:
- TF Day: ขาขึ้น (Uptrend) แข็งแกร่ง – ราคาอยู่เหนือ EMA 50 และ EMA 200, โครงสร้างราคาเป็น Higher Highs (HH) และ Higher Lows (HL), Money Flow เป็นบวก (แรงซื้อ)
- TF4H: ขาขึ้น (Uptrend) – ราคาอยู่เหนือ EMA, มีการพักตัวลงมา (Pullback) แต่ยังไม่เสียโครงสร้างขาขึ้น, Money Flow เริ่มอ่อนแรง (แรงซื้อลดลง, แรงขายเพิ่มขึ้น)
- TF15: ขาลง (Downtrend) ระยะสั้นมาก – ราคาหลุด EMA และแนวรับย่อย, โครงสร้างราคาเป็น Lower Highs (LH) และ Lower Lows (LL), Money Flow เป็นลบ (แรงขาย)
โครงสร้างราคา (SMC):
- TF Day: ยืนยันแนวโน้มขาขึ้น (HH, HL, BOS)
- TF4H: ยืนยันแนวโน้มขาขึ้น (HH, HL, BOS), มี Equal Highs (EQH) ที่เป็นแนวต้าน
- TF15: บ่งบอกถึงแนวโน้มขาลงระยะสั้น (BOS ด้านล่าง, LH, LL), มี EQH เป็นแนวต้าน
Money Flow (LuxAlgo) - สรุป:
- TF Day: แรงซื้อยังคงแข็งแกร่งอย่างชัดเจน
- TF4H: แรงซื้อเริ่มอ่อนแรงลง, มีแรงขายเข้ามา
- TF15: แรงขายมีอิทธิพลเหนือกว่า
EMA (Exponential Moving Average):
- TF Day & 4H: EMA 50 & 200 เป็นแนวรับสำคัญ
- TF15: EMA 50 & 200 กลายเป็นแนวต้าน
แนวรับ-แนวต้านสำคัญ:
| Timeframe | แนวรับ | แนวต้าน | | :-------- | :------------------------------------------------------------------------- | :-------------------------------------------------------------- | | Day | EMA 50, EMA 200, 96,000-98,000, 85,724.7 | 109,998.9 (High เดิม) | | 4H | EMA 50, EMA 200, 96,000-98,000, 89,037.0 | 109,998.9 (EQH, High เดิม) | | 15m | 95,200 (Low ล่าสุด), 94,707.4 (Low ก่อนหน้า) | EMA 50, EMA 200, บริเวณ 96,000, 96,807.8, 97,000-97,200 |
กลยุทธ์ (BTCUSDT):
- Buy on Dip (Day, 4H) - มีความน่าเชื่อถือมากขึ้น แต่ยังคงต้องระมัดระวัง:
- เหตุผล: แนวโน้มหลักยังเป็นขาขึ้น, Money Flow ใน TF Day แข็งแกร่ง
- เงื่อนไข: ยังคงต้องรอสัญญาณการกลับตัวของราคาใน TF15 ก่อน (Breakout แนวต้านย่อย, Money Flow TF15 เป็นบวก, Bullish Candlestick Patterns)
- จุดเข้า (Day): EMA 50, EMA 200, บริเวณ 96,000-98,000
- จุดเข้า (4H): EMA 50
- Stop Loss: ต่ำกว่า Low ล่าสุดของ TF15 หรือต่ำกว่าแนวรับที่เข้าซื้อ
- Short (15, ความเสี่ยงสูงมาก):
- เหตุผล: แนวโน้ม TF15 เป็นขาลง, Money Flow TF15 เป็นลบ
- เงื่อนไข: ราคาไม่สามารถกลับขึ้นไปยืนเหนือ EMA ของ TF15 ได้
- จุดเข้า: บริเวณ EMA ของ TF15 หรือแนวต้านอื่นๆ
- Stop Loss: เหนือ High ล่าสุดของ TF15
- Wait & See (ทางเลือกที่ปลอดภัย):
- เหตุผล: ความขัดแย้งระหว่าง Timeframes ยังคงมีอยู่
- รอให้ตลาดเฉลยทิศทางที่ชัดเจนกว่านี้
คำแนะนำ (เน้นย้ำ):
- Money Flow ใน TF Day: เป็นปัจจัยบวกที่สำคัญ ทำให้กลยุทธ์ Buy on Dip มีน้ำหนักมากขึ้น
- ความขัดแย้งของ Timeframes: ยังคงต้องระวัง TF15 ที่เป็นขาลง
- Volume: การ Breakout/Breakdown ใดๆ ควรมี Volume สนับสนุน
- Risk Management: สำคัญที่สุด
สรุป:
สถานการณ์ของ BTCUSDT โดยรวมยังคงเป็นบวก (ขาขึ้น) แต่มีความเสี่ยงในระยะสั้นจาก TF15 การตัดสินใจลงทุนควรพิจารณาจาก Timeframe ที่เหมาะสมกับสไตล์การเทรดของคุณ และอย่าลืมบริหารความเสี่ยงเสมอค่ะ
Disclaimer: การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-
@ 2183e947:f497b975
2025-02-13 04:44:45How Coinpools Improve Bitcoin
Problems with bitcoin
UX problems with base layer payments include:
- Mining fees are sometimes high
- Confirmations usually take several minutes
- Using it privately requires running a coinjoin server
UX problems with lightning payments include:
- Setup fees are sometimes high
- Payments frequently fail
- Payments aren't asynchronous (the recipient has to stand there with their device open waiting to do a revoke_and_ack on their old state -- unless they use a custodian)
- Payments that do succeed occasionally take more than 30 seconds (due to stuck payments, automatic retries, and no ability to say "stop retrying" in any existing wallets that I'm aware of)
- Using it privately requires manual channel management
Solutions
A lot of my recent work focuses on non-interactive coinpools. I figured out a way to do them on bitcoin if we had CTV + CSFS, and then, with a bit more thought, I figured out that my model didn't actually require those things, so I am now working on an implementation. But my model does benefit a lot from CTV (less sure about CSFS at this point) so let me outline how non-interactive coinpools fix the above problems and along the way I will share how CTV specifically improves coinpools.
"Mining fees are sometimes high"
Coinpools improve the problem of "mining fees are sometimes high" by letting you bypass them in more cases. If you're in a coinpool and pay someone else in the same coinpool, your payment does not show up on the base layer, it just involves modifying some unilateral withdrawal transactions such that the sender can withdraw less and the recipient can withdraw more. The transactions are off-chain, like LN transactions, so you can do that without paying a base layer fee.
"Confirmations usually take several minutes"
Coinpools improve the problem of "confirmations usually take several minutes" in a similar manner. Payments inside a coinpool (i.e. to another pool user) merely involve modifying off-chain data (and revoking an old state), so they can be as fast as lightning. In most cases I expect them to be a bit faster because there's less need for pathfinding or negotiating with a variety of routing nodes. If the sender and the recipient are in the same pool, they only need to talk to each other and, in my model, a coordinator.
"Using the base layer privately requires running a coinjoin server"
Coinpools improve the problem of "using the base layer privately requires running a coinjoin server" in two ways: first, if you're in a coinpool and you send money to a bitcoin address, the blockchain doesn't know which coinpool user sent that payment. Analysts might be able to trace the payment to the coinpool, but from the blockchain's perspective, that's just a multisig; the actual person inside the multisig who sent the money is not revealed. However, my model uses a coordinator, and the coordinator probably knows which user sent the payment. Still, only 1 person knowing is better than having everyone on the blockchain know.
Second, if you send money to someone inside the coinpool, in my model, the only people who know about your payment are the sender, the recipient, and the coordinator, and the recipient does not know who the sender is. Moreover, my model allows users to act as bridges from LN to other pool users, so even the coordinator doesn't know if the person who looks like the sender was the real sender or just a bridge node, with the real sender being someone on lightning.
"Setup fees on lightning are sometimes high"
Coinpools improve the problem of "setup fees are sometimes high" by having multiple users share the setup cost. My model allows a single bitcoin transaction to fund a coinpool with a number of members between 1 and probably about 100. (The max I've actually successfully tested is 11.) If the users share the cost of that transaction, then even in a high fee scenario, where bitcoin transactions cost $50, each user only has to pay a fraction of that, where the fraction is determined by how many users are joining the pool. If 10 people are joining, each user would pay $5 instead of $50. If 50 people are joining, each user would pay $1. If 100 people are joining, each user would pay 50¢.
Sidebar: how CTV improves my coinpool model
The setup is also where CTV greatly improves my model. For my model to work, the users have to coordinate to create the pool in something I call a "signing ceremony," which is very similar to a coinjoin. The signing ceremony has to be scheduled and each user has to show up for it or they won't get into the pool. With CTV, you could fix this: instead of a signing ceremony, an exchange could autosend your money into a coinpool on e.g. a monthly basis and email you the data you need to perform your unilateral exit. All they need from you is a pubkey, and they can do everything else.
"Lightning payments frequently fail"
Coinpools improve the problem of "payments frequently fail" by reducing the need for pathfinding, which is a typical cause of failure on lightning. If you are paying someone in the same pool as you, you always know an exact path: it will be you -> coordinator -> recipient. These short paths also reduce the likelihood of routing nodes having insufficient capacity to forward the payment. You've only got one "routing node" to worry about -- the coordinator.
"Lightning payments aren't asynchronous"
Coinpools in general don't improve the problem of "payments aren't asynchronous" but my model in particular does improve that problem because I am combining it with my hedgehog protocol from last year, which does allow for asynchronous lightning-like payments. Relatedly, my coinpool model technically has a network model, it's just a hub-and-spoke network: the coordinator is connected to every user of the pool and can forward asynchronous hedgehog payments to them. This means you can send money to someone when they are offline; they'll get it whenever they do get online, even if you went offline in the meantime.
"Lightning payments sometimes take too long"
Coinpools improve the problem of "stuck" lightning payments by reducing the number of hops along the route. As above, a payment inside the pool (per my model) is always just sender -> coordinator -> recipient. Due to only having 1 hop, there are fewer opportunities for a node to have a network issue and cause a delay.
"Channel management is a pain"
Coinpools have multiple ways of improving the problem of manual channel management. In particular, not all coinpool models have channels, so channel management is not always needed in a coinpool. My model, however, does have channels, so channel management is still a thing.
Nonetheless, my model improves channel management in two ways: first, the setup costs are lower for the reasons given above. Second, payment asynchronicity helps for the following reason:
The worst pain point in channel management today occurs when someone sends you a payment but it fails because you didn't have enough inbound capacity. That doesn't happen in my coinpool model because payments are asynchronous. If you don't have enough inbound capacity, the payment doesn't fail, it just remains pending. So all you have to do is open a new channel (i.e. enter a new pool) and then finalize the payment.
Zap me
I hope this essay clarifies why coinpools improve the problems I outlined and why CTV improves coinpools. I also hope this gets you a bit excited for my latest coinpool invention, which I hope to release soon :D (It really is very close to demo-ready.) If you liked this essay, consider zapping me: supertestnet@coinos.io
-
@ a012dc82:6458a70d
2025-02-13 04:00:01In the dynamic world of global finance, the interplay between traditional monetary policy and the burgeoning digital asset market is becoming increasingly prominent. The U.S. Federal Reserve's recent pivot towards a more accommodative monetary policy has sparked intense discussion among investors, economists, and cryptocurrency enthusiasts. This shift, characterized by an expected reduction in interest rates, is not just a routine adjustment but a significant move that could have far-reaching implications for various asset classes, including cryptocurrencies like Bitcoin. As we delve into this topic, we aim to unravel the complexities of the Fed's policy change and its potential ripple effects on Bitcoin, a digital asset that has been a subject of much intrigue and speculation.
Table Of Content
-
Understanding the Fed's Policy Shift
-
Impact on Traditional Financial Markets
-
Bitcoin's Response to Monetary Easing
-
Analyzing the Economic Backdrop
-
Bitcoin: A Safe Haven or Risk Asset?
-
Risks and Opportunities
-
Conclusion
-
FAQs
Understanding the Fed's Policy Shift
The Federal Reserve, the guardian of the U.S. monetary system, wields immense influence over global financial markets. Its recent signaling of a dovish turn – an expectation of 75 basis points in rate cuts by 2024 – marks a significant departure from its previous stance. This change is reflective of the Fed's response to a confluence of macroeconomic factors, such as fluctuating inflation rates, global economic uncertainties, and domestic financial stability concerns. The Fed's decisions are closely monitored as they set the tone for economic growth, inflation control, and financial market stability. In this context, the anticipated rate cuts suggest a strategic move to stimulate economic activity by making borrowing cheaper, thereby potentially boosting investment and consumption. However, this policy shift is not without its complexities and nuances, as it must balance the fine line between stimulating growth and controlling inflation.
Impact on Traditional Financial Markets
The ripple effects of the Fed's policy announcement were immediately felt across traditional financial markets. Stock markets, often seen as a barometer of economic sentiment, reacted positively, with indices like the Dow Jones Industrial Average reaching new heights. This surge reflects investors' optimism about the potential for increased corporate profits and economic growth in a lower interest rate environment. Similarly, the bond market experienced a significant rally, with yields on government securities falling as bond prices rose. This movement in the bond market is indicative of investors' expectations of a more accommodative monetary policy, which typically leads to lower yields on fixed-income securities. These market reactions underscore the pivotal role of central bank policies in shaping investor sentiment and the direction of financial markets. They also highlight the interconnectedness of various asset classes, as changes in monetary policy can have cascading effects across different sectors of the economy.
Bitcoin's Response to Monetary Easing
Bitcoin's reaction to the Fed's dovish turn has been a subject of keen interest. The cryptocurrency, which had been experiencing volatility, showed signs of recovery following the Fed's announcement. This response is indicative of Bitcoin's increasing correlation with broader financial market trends, a significant development given its history as an uncorrelated asset. Bitcoin's sensitivity to macroeconomic factors like central bank policies points to its growing integration into the mainstream financial ecosystem. However, this integration also means that Bitcoin is increasingly exposed to the same macroeconomic risks and uncertainties that affect traditional assets. The Fed's policy shift could potentially make Bitcoin more attractive to investors seeking non-traditional assets in a low-interest-rate environment. However, Bitcoin's complex dynamics, including its decentralized nature, limited supply, and regulatory landscape, add layers of complexity to its response to monetary policy changes.
Analyzing the Economic Backdrop
The economic backdrop against which the Fed's policy shift occurs is multifaceted and dynamic. On one hand, the U.S. economy has demonstrated resilience, with robust GDP growth and positive retail sales figures suggesting underlying strength. On the other hand, inflation, though moderated from its peak, remains a concern, hovering above the Fed's target. This economic duality presents a challenging scenario for policymakers, who must navigate the delicate balance between stimulating growth and containing inflation. For investors and market participants, this creates an environment of uncertainty, as they must decipher mixed signals from economic data and policy announcements. In this context, Bitcoin's role and response become even more intriguing, as it operates at the intersection of technology, finance, and macroeconomics.
Bitcoin: A Safe Haven or Risk Asset?
The debate over Bitcoin's classification as a safe haven or a risk asset is intensified by the Fed's easing stance. Traditionally, in a low-interest-rate environment, investors seek assets that can serve as hedges against inflation and currency devaluation. Gold has historically played this role, and Bitcoin, with its fixed supply and digital scarcity, has drawn comparisons to gold. However, Bitcoin's relatively short history and high volatility make it a more complex and potentially riskier asset. The Fed's dovish policy could enhance Bitcoin's appeal as an alternative investment, especially if traditional assets like bonds offer lower returns. However, Bitcoin's classification as a safe haven is still a matter of debate, with opinions divided on its long-term stability and value retention capabilities.
Risks and Opportunities
Investors considering Bitcoin in light of the Fed's policy change face a landscape filled with both risks and opportunities. The potential for a Bitcoin rally in a low-interest-rate environment is counterbalanced by the cryptocurrency's inherent volatility and regulatory uncertainties. Bitcoin's price movements can be dramatic and unpredictable, influenced by a range of factors from technological developments to geopolitical events. Additionally, the regulatory environment for cryptocurrencies is still evolving, with potential changes posing risks to Bitcoin's accessibility and value. Investors must also consider the broader global economic context, including actions by other central banks and international trade dynamics, which can impact Bitcoin's market movement.
Conclusion
The Federal Reserve's shift towards a more accommodative monetary policy in 2024 presents a fascinating scenario for Bitcoin and the broader cryptocurrency market. This development underscores the increasing relevance of digital assets in the global financial landscape and highlights the complex interplay between traditional monetary policies and emerging financial technologies. As Bitcoin continues to evolve and gain acceptance, its response to macroeconomic factors like central bank policies will be a critical area of focus for investors. In navigating this dynamic and uncertain environment, a cautious and well-informed approach is essential for those looking to explore the opportunities and navigate the challenges of cryptocurrency investments. The coming years promise to be a pivotal period in the maturation of Bitcoin as it responds to the shifting tides of global finance.
FAQs
How does the Federal Reserve's easing stance impact Bitcoin? The Fed's shift towards lower interest rates can make riskier assets like Bitcoin more attractive to investors. This is because lower rates often lead to reduced yields on traditional investments, prompting investors to seek higher returns elsewhere.
What is the significance of the Fed's 'dot plot' for Bitcoin investors? The 'dot plot' is a projection of interest rate movements by Federal Reserve members. A shift towards lower rates, as indicated in the recent dot plot, can signal a more accommodative monetary policy, potentially impacting Bitcoin's market as investors adjust their portfolios.
Can Bitcoin be considered a safe haven asset in light of the Fed's policy? Bitcoin's role as a safe haven asset is debated. While its fixed supply and digital nature offer some safe haven characteristics, its volatility and regulatory uncertainties make it a complex choice compared to traditional safe havens like gold.
What risks should Bitcoin investors consider in the context of the Fed's easing policy? Investors should be aware of Bitcoin's volatility, regulatory changes, and its sensitivity to macroeconomic factors. Additionally, global economic conditions and actions by other central banks can also influence Bitcoin's market.
How does the economic backdrop influence Bitcoin's response to the Fed's policy? Economic factors like GDP growth, inflation rates, and retail sales impact investor sentiment and risk appetite, which in turn can affect Bitcoin's market. A strong economy might reduce the appeal of risk assets like Bitcoin, while economic uncertainties can increase their attractiveness.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
X: @croxroadnews.co
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ e3ba5e1a:5e433365
2025-02-04 08:29:00President Trump has started rolling out his tariffs, something I blogged about in November. People are talking about these tariffs a lot right now, with many people (correctly) commenting on how consumers will end up with higher prices as a result of these tariffs. While that part is true, I’ve seen a lot of people taking it to the next, incorrect step: that consumers will pay the entirety of the tax. I put up a poll on X to see what people thought, and while the right answer got a lot of votes, it wasn't the winner.
For purposes of this blog post, our ultimate question will be the following:
- Suppose apples currently sell for $1 each in the entire United States.
- There are domestic sellers and foreign sellers of apples, all receiving the same price.
- There are no taxes or tariffs on the purchase of apples.
- The question is: if the US federal government puts a $0.50 import tariff per apple, what will be the change in the following:
- Number of apples bought in the US
- Price paid by buyers for apples in the US
- Post-tax price received by domestic apple producers
- Post-tax price received by foreign apple producers
Before we can answer that question, we need to ask an easier, first question: before instituting the tariff, why do apples cost $1?
And finally, before we dive into the details, let me provide you with the answers to the ultimate question. I recommend you try to guess these answers before reading this, and if you get it wrong, try to understand why:
- The number of apples bought will go down
- The buyers will pay more for each apple they buy, but not the full amount of the tariff
- Domestic apple sellers will receive a higher price per apple
- Foreign apple sellers will receive a lower price per apple, but not lowered by the full amount of the tariff
In other words, regardless of who sends the payment to the government, both taxed parties (domestic buyers and foreign sellers) will absorb some of the costs of the tariff, while domestic sellers will benefit from the protectionism provided by tariffs and be able to sell at a higher price per unit.
Marginal benefit
All of the numbers discussed below are part of a helper Google Sheet I put together for this analysis. Also, apologies about the jagged lines in the charts below, I hadn’t realized before starting on this that there are some difficulties with creating supply and demand charts in Google Sheets.
Let’s say I absolutely love apples, they’re my favorite food. How much would I be willing to pay for a single apple? You might say “$1, that’s the price in the supermarket,” and in many ways you’d be right. If I walk into supermarket A, see apples on sale for $50, and know that I can buy them at supermarket B for $1, I’ll almost certainly leave A and go buy at B.
But that’s not what I mean. What I mean is: how high would the price of apples have to go everywhere so that I’d no longer be willing to buy a single apple? This is a purely personal, subjective opinion. It’s impacted by how much money I have available, other expenses I need to cover, and how much I like apples. But let’s say the number is $5.
How much would I be willing to pay for another apple? Maybe another $5. But how much am I willing to pay for the 1,000th apple? 10,000th? At some point, I’ll get sick of apples, or run out of space to keep the apples, or not be able to eat, cook, and otherwise preserve all those apples before they rot.
The point being: I’ll be progressively willing to spend less and less money for each apple. This form of analysis is called marginal benefit: how much benefit (expressed as dollars I’m willing to spend) will I receive from each apple? This is a downward sloping function: for each additional apple I buy (quantity demanded), the price I’m willing to pay goes down. This is what gives my personal demand curve. And if we aggregate demand curves across all market participants (meaning: everyone interested in buying apples), we end up with something like this:
Assuming no changes in people’s behavior and other conditions in the market, this chart tells us how many apples will be purchased by our buyers at each price point between $0.50 and $5. And ceteris paribus (all else being equal), this will continue to be the demand curve for apples.
Marginal cost
Demand is half the story of economics. The other half is supply, or: how many apples will I sell at each price point? Supply curves are upward sloping: the higher the price, the more a person or company is willing and able to sell a product.
Let’s understand why. Suppose I have an apple orchard. It’s a large property right next to my house. With about 2 minutes of effort, I can walk out of my house, find the nearest tree, pick 5 apples off the tree, and call it a day. 5 apples for 2 minutes of effort is pretty good, right?
Yes, there was all the effort necessary to buy the land, and plant the trees, and water them… and a bunch more than I likely can’t even guess at. We’re going to ignore all of that for our analysis, because for short-term supply-and-demand movement, we can ignore these kinds of sunk costs. One other simplification: in reality, supply curves often start descending before ascending. This accounts for achieving efficiencies of scale after the first number of units purchased. But since both these topics are unneeded for understanding taxes, I won’t go any further.
Anyway, back to my apple orchard. If someone offers me $0.50 per apple, I can do 2 minutes of effort and get $2.50 in revenue, which equates to a $75/hour wage for me. I’m more than happy to pick apples at that price!
However, let’s say someone comes to buy 10,000 apples from me instead. I no longer just walk out to my nearest tree. I’m going to need to get in my truck, drive around, spend the day in the sun, pay for gas, take a day off of my day job (let’s say it pays me $70/hour). The costs go up significantly. Let’s say it takes 5 days to harvest all those apples myself, it costs me $100 in fuel and other expenses, and I lose out on my $70/hour job for 5 days. We end up with:
- Total expenditure: $100 + $70 * 8 hours a day * 5 days \== $2900
- Total revenue: $5000 (10,000 apples at $0.50 each)
- Total profit: $2100
So I’m still willing to sell the apples at this price, but it’s not as attractive as before. And as the number of apples purchased goes up, my costs keep increasing. I’ll need to spend more money on fuel to travel more of my property. At some point I won’t be able to do the work myself anymore, so I’ll need to pay others to work on the farm, and they’ll be slower at picking apples than me (less familiar with the property, less direct motivation, etc.). The point being: at some point, the number of apples can go high enough that the $0.50 price point no longer makes me any money.
This kind of analysis is called marginal cost. It refers to the additional amount of expenditure a seller has to spend in order to produce each additional unit of the good. Marginal costs go up as quantity sold goes up. And like demand curves, if you aggregate this data across all sellers, you get a supply curve like this:
Equilibrium price
We now know, for every price point, how many apples buyers will purchase, and how many apples sellers will sell. Now we find the equilibrium: where the supply and demand curves meet. This point represents where the marginal benefit a buyer would receive from the next buyer would be less than the cost it would take the next seller to make it. Let’s see it in a chart:
You’ll notice that these two graphs cross at the $1 price point, where 63 apples are both demanded (bought by consumers) and supplied (sold by producers). This is our equilibrium price. We also have a visualization of the surplus created by these trades. Everything to the left of the equilibrium point and between the supply and demand curves represents surplus: an area where someone is receiving something of more value than they give. For example:
- When I bought my first apple for $1, but I was willing to spend $5, I made $4 of consumer surplus. The consumer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and above the equilibrium price point.
- When a seller sells his first apple for $1, but it only cost $0.50 to produce it, the seller made $0.50 of producer surplus. The producer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and below the equilibrium price point.
Another way of thinking of surplus is “every time someone got a better price than they would have been willing to take.”
OK, with this in place, we now have enough information to figure out how to price in the tariff, which we’ll treat as a negative externality.
Modeling taxes
Alright, the government has now instituted a $0.50 tariff on every apple sold within the US by a foreign producer. We can generally model taxes by either increasing the marginal cost of each unit sold (shifting the supply curve up), or by decreasing the marginal benefit of each unit bought (shifting the demand curve down). In this case, since only some of the producers will pay the tax, it makes more sense to modify the supply curve.
First, let’s see what happens to the foreign seller-only supply curve when you add in the tariff:
With the tariff in place, for each quantity level, the price at which the seller will sell is $0.50 higher than before the tariff. That makes sense: if I was previously willing to sell my 82nd apple for $3, I would now need to charge $3.50 for that apple to cover the cost of the tariff. We see this as the tariff “pushing up” or “pushing left” the original supply curve.
We can add this new supply curve to our existing (unchanged) supply curve for domestic-only sellers, and we end up with a result like this:
The total supply curve adds up the individual foreign and domestic supply curves. At each price point, we add up the total quantity each group would be willing to sell to determine the total quantity supplied for each price point. Once we have that cumulative supply curve defined, we can produce an updated supply-and-demand chart including the tariff:
As we can see, the equilibrium has shifted:
- The equilibrium price paid by consumers has risen from $1 to $1.20.
- The total number of apples purchased has dropped from 63 apples to 60 apples.
- Consumers therefore received 3 less apples. They spent $72 for these 60 apples, whereas previously they spent $63 for 3 more apples, a definite decrease in consumer surplus.
- Foreign producers sold 36 of those apples (see the raw data in the linked Google Sheet), for a gross revenue of $43.20. However, they also need to pay the tariff to the US government, which accounts for $18, meaning they only receive $25.20 post-tariff. Previously, they sold 42 apples at $1 each with no tariff to be paid, meaning they took home $42.
- Domestic producers sold the remaining 24 apples at $1.20, giving them a revenue of $28.80. Since they don’t pay the tariff, they take home all of that money. By contrast, previously, they sold 21 apples at $1, for a take-home of $21.
- The government receives $0.50 for each of the 60 apples sold, or in other words receives $30 in revenue it wouldn’t have received otherwise.
We could be more specific about the surpluses, and calculate the actual areas for consumer surplus, producer surplus, inefficiency from the tariff, and government revenue from the tariff. But I won’t bother, as those calculations get slightly more involved. Instead, let’s just look at the aggregate outcomes:
- Consumers were unquestionably hurt. Their price paid went up by $0.20 per apple, and received less apples.
- Foreign producers were also hurt. Their price received went down from the original $1 to the new post-tariff price of $1.20, minus the $0.50 tariff. In other words: foreign producers only receive $0.70 per apple now. This hurt can be mitigated by shifting sales to other countries without a tariff, but the pain will exist regardless.
- Domestic producers scored. They can sell less apples and make more revenue doing it.
- And the government walked away with an extra $30.
Hopefully you now see the answer to the original questions. Importantly, while the government imposed a $0.50 tariff, neither side fully absorbed that cost. Consumers paid a bit more, foreign producers received a bit less. The exact details of how that tariff was split across the groups is mediated by the relevant supply and demand curves of each group. If you want to learn more about this, the relevant search term is “price elasticity,” or how much a group’s quantity supplied or demanded will change based on changes in the price.
Other taxes
Most taxes are some kind of a tax on trade. Tariffs on apples is an obvious one. But the same applies to income tax (taxing the worker for the trade of labor for money) or payroll tax (same thing, just taxing the employer instead). Interestingly, you can use the same model for analyzing things like tax incentives. For example, if the government decided to subsidize domestic apple production by giving the domestic producers a $0.50 bonus for each apple they sell, we would end up with a similar kind of analysis, except instead of the foreign supply curve shifting up, we’d see the domestic supply curve shifting down.
And generally speaking, this is what you’ll always see with government involvement in the economy. It will result in disrupting an existing equilibrium, letting the market readjust to a new equilibrium, and incentivization of some behavior, causing some people to benefit and others to lose out. We saw with the apple tariff, domestic producers and the government benefited while others lost.
You can see the reverse though with tax incentives. If I give a tax incentive of providing a deduction (not paying income tax) for preschool, we would end up with:
- Government needs to make up the difference in tax revenue, either by raising taxes on others or printing more money (leading to inflation). Either way, those paying the tax or those holding government debased currency will pay a price.
- Those people who don’t use the preschool deduction will receive no benefit, so they simply pay a cost.
- Those who do use the preschool deduction will end up paying less on tax+preschool than they would have otherwise.
This analysis is fully amoral. It’s not saying whether providing subsidized preschool is a good thing or not, it simply tells you where the costs will be felt, and points out that such government interference in free economic choice does result in inefficiencies in the system. Once you have that knowledge, you’re more well educated on making a decision about whether the costs of government intervention are worth the benefits.
-
@ 9e69e420:d12360c2
2025-02-01 11:16:04Federal employees must remove pronouns from email signatures by the end of the day. This directive comes from internal memos tied to two executive orders signed by Donald Trump. The orders target diversity and equity programs within the government.
CDC, Department of Transportation, and Department of Energy employees were affected. Staff were instructed to make changes in line with revised policy prohibiting certain language.
One CDC employee shared frustration, stating, “In my decade-plus years at CDC, I've never been told what I can and can't put in my email signature.” The directive is part of a broader effort to eliminate DEI initiatives from federal discourse.
-
@ 57d1a264:69f1fee1
2025-02-13 03:45:23What You Will Learn: - Understanding the concept of cybersecurity - Networking Basics - Operating Systems Overview - Introduction to Kali Linux - Threat Actors and Cyber Threats - Ethical Hacking Techniques and Tools.
How to Register: Use this link to Register. https://forms.gle/L8AGLCWU4djwUXxz9
originally posted at https://stacker.news/items/884407
-
@ 97c70a44:ad98e322
2025-01-30 17:15:37There was a slight dust up recently over a website someone runs removing a listing for an app someone built based on entirely arbitrary criteria. I'm not to going to attempt to speak for either wounded party, but I would like to share my own personal definition for what constitutes a "nostr app" in an effort to help clarify what might be an otherwise confusing and opaque purity test.
In this post, I will be committing the "no true Scotsman" fallacy, in which I start with the most liberal definition I can come up with, and gradually refine it until all that is left is the purest, gleamingest, most imaginary and unattainable nostr app imaginable. As I write this, I wonder if anything built yet will actually qualify. In any case, here we go.
It uses nostr
The lowest bar for what a "nostr app" might be is an app ("application" - i.e. software, not necessarily a native app of any kind) that has some nostr-specific code in it, but which doesn't take any advantage of what makes nostr distinctive as a protocol.
Examples might include a scraper of some kind which fulfills its charter by fetching data from relays (regardless of whether it validates or retains signatures). Another might be a regular web 2.0 app which provides an option to "log in with nostr" by requesting and storing the user's public key.
In either case, the fact that nostr is involved is entirely neutral. A scraper can scrape html, pdfs, jsonl, whatever data source - nostr relays are just another target. Likewise, a user's key in this scenario is treated merely as an opaque identifier, with no appreciation for the super powers it brings along.
In most cases, this kind of app only exists as a marketing ploy, or less cynically, because it wants to get in on the hype of being a "nostr app", without the developer quite understanding what that means, or having the budget to execute properly on the claim.
It leverages nostr
Some of you might be wondering, "isn't 'leverage' a synonym for 'use'?" And you would be right, but for one connotative difference. It's possible to "use" something improperly, but by definition leverage gives you a mechanical advantage that you wouldn't otherwise have. This is the second category of "nostr app".
This kind of app gets some benefit out of the nostr protocol and network, but in an entirely selfish fashion. The intention of this kind of app is not to augment the nostr network, but to augment its own UX by borrowing some nifty thing from the protocol without really contributing anything back.
Some examples might include:
- Using nostr signers to encrypt or sign data, and then store that data on a proprietary server.
- Using nostr relays as a kind of low-code backend, but using proprietary event payloads.
- Using nostr event kinds to represent data (why), but not leveraging the trustlessness that buys you.
An application in this category might even communicate to its users via nostr DMs - but this doesn't make it a "nostr app" any more than a website that emails you hot deals on herbal supplements is an "email app". These apps are purely parasitic on the nostr ecosystem.
In the long-term, that's not necessarily a bad thing. Email's ubiquity is self-reinforcing. But in the short term, this kind of "nostr app" can actually do damage to nostr's reputation by over-promising and under-delivering.
It complements nostr
Next up, we have apps that get some benefit out of nostr as above, but give back by providing a unique value proposition to nostr users as nostr users. This is a bit of a fine distinction, but for me this category is for apps which focus on solving problems that nostr isn't good at solving, leaving the nostr integration in a secondary or supporting role.
One example of this kind of app was Mutiny (RIP), which not only allowed users to sign in with nostr, but also pulled those users' social graphs so that users could send money to people they knew and trusted. Mutiny was doing a great job of leveraging nostr, as well as providing value to users with nostr identities - but it was still primarily a bitcoin wallet, not a "nostr app" in the purest sense.
Other examples are things like Nostr Nests and Zap.stream, whose core value proposition is streaming video or audio content. Both make great use of nostr identities, data formats, and relays, but they're primarily streaming apps. A good litmus test for things like this is: if you got rid of nostr, would it be the same product (even if inferior in certain ways)?
A similar category is infrastructure providers that benefit nostr by their existence (and may in fact be targeted explicitly at nostr users), but do things in a centralized, old-web way; for example: media hosts, DNS registrars, hosting providers, and CDNs.
To be clear here, I'm not casting aspersions (I don't even know what those are, or where to buy them). All the apps mentioned above use nostr to great effect, and are a real benefit to nostr users. But they are not True Scotsmen.
It embodies nostr
Ok, here we go. This is the crème de la crème, the top du top, the meilleur du meilleur, the bee's knees. The purest, holiest, most chaste category of nostr app out there. The apps which are, indeed, nostr indigitate.
This category of nostr app (see, no quotes this time) can be defined by the converse of the previous category. If nostr was removed from this type of application, would it be impossible to create the same product?
To tease this apart a bit, apps that leverage the technical aspects of nostr are dependent on nostr the protocol, while apps that benefit nostr exclusively via network effect are integrated into nostr the network. An app that does both things is working in symbiosis with nostr as a whole.
An app that embraces both nostr's protocol and its network becomes an organic extension of every other nostr app out there, multiplying both its competitive moat and its contribution to the ecosystem:
- In contrast to apps that only borrow from nostr on the technical level but continue to operate in their own silos, an application integrated into the nostr network comes pre-packaged with existing users, and is able to provide more value to those users because of other nostr products. On nostr, it's a good thing to advertise your competitors.
- In contrast to apps that only market themselves to nostr users without building out a deep integration on the protocol level, a deeply integrated app becomes an asset to every other nostr app by becoming an organic extension of them through interoperability. This results in increased traffic to the app as other developers and users refer people to it instead of solving their problem on their own. This is the "micro-apps" utopia we've all been waiting for.
Credible exit doesn't matter if there aren't alternative services. Interoperability is pointless if other applications don't offer something your app doesn't. Marketing to nostr users doesn't matter if you don't augment their agency as nostr users.
If I had to choose a single NIP that represents the mindset behind this kind of app, it would be NIP 89 A.K.A. "Recommended Application Handlers", which states:
Nostr's discoverability and transparent event interaction is one of its most interesting/novel mechanics. This NIP provides a simple way for clients to discover applications that handle events of a specific kind to ensure smooth cross-client and cross-kind interactions.
These handlers are the glue that holds nostr apps together. A single event, signed by the developer of an application (or by the application's own account) tells anyone who wants to know 1. what event kinds the app supports, 2. how to link to the app (if it's a client), and (if the pubkey also publishes a kind 10002), 3. which relays the app prefers.
As a sidenote, NIP 89 is currently focused more on clients, leaving DVMs, relays, signers, etc somewhat out in the cold. Updating 89 to include tailored listings for each kind of supporting app would be a huge improvement to the protocol. This, plus a good front end for navigating these listings (sorry nostrapp.link, close but no cigar) would obviate the evil centralized websites that curate apps based on arbitrary criteria.
Examples of this kind of app obviously include many kind 1 clients, as well as clients that attempt to bring the benefits of the nostr protocol and network to new use cases - whether long form content, video, image posts, music, emojis, recipes, project management, or any other "content type".
To drill down into one example, let's think for a moment about forms. What's so great about a forms app that is built on nostr? Well,
- There is a spec for forms and responses, which means that...
- Multiple clients can implement the same data format, allowing for credible exit and user choice, even of...
- Other products not focused on forms, which can still view, respond to, or embed forms, and which can send their users via NIP 89 to a client that does...
- Cryptographically sign forms and responses, which means they are self-authenticating and can be sent to...
- Multiple relays, which reduces the amount of trust necessary to be confident results haven't been deliberately "lost".
Show me a forms product that does all of those things, and isn't built on nostr. You can't, because it doesn't exist. Meanwhile, there are plenty of image hosts with APIs, streaming services, and bitcoin wallets which have basically the same levels of censorship resistance, interoperability, and network effect as if they weren't built on nostr.
It supports nostr
Notice I haven't said anything about whether relays, signers, blossom servers, software libraries, DVMs, and the accumulated addenda of the nostr ecosystem are nostr apps. Well, they are (usually).
This is the category of nostr app that gets none of the credit for doing all of the work. There's no question that they qualify as beautiful nostrcorns, because their value propositions are entirely meaningless outside of the context of nostr. Who needs a signer if you don't have a cryptographic identity you need to protect? DVMs are literally impossible to use without relays. How are you going to find the blossom server that will serve a given hash if you don't know which servers the publishing user has selected to store their content?
In addition to being entirely contextualized by nostr architecture, this type of nostr app is valuable because it does things "the nostr way". By that I mean that they don't simply try to replicate existing internet functionality into a nostr context; instead, they create entirely new ways of putting the basic building blocks of the internet back together.
A great example of this is how Nostr Connect, Nostr Wallet Connect, and DVMs all use relays as brokers, which allows service providers to avoid having to accept incoming network connections. This opens up really interesting possibilities all on its own.
So while I might hesitate to call many of these things "apps", they are certainly "nostr".
Appendix: it smells like a NINO
So, let's say you've created an app, but when you show it to people they politely smile, nod, and call it a NINO (Nostr In Name Only). What's a hacker to do? Well, here's your handy-dandy guide on how to wash that NINO stench off and Become a Nostr.
You app might be a NINO if:
- There's no NIP for your data format (or you're abusing NIP 78, 32, etc by inventing a sub-protocol inside an existing event kind)
- There's a NIP, but no one knows about it because it's in a text file on your hard drive (or buried in your project's repository)
- Your NIP imposes an incompatible/centralized/legacy web paradigm onto nostr
- Your NIP relies on trusted third (or first) parties
- There's only one implementation of your NIP (yours)
- Your core value proposition doesn't depend on relays, events, or nostr identities
- One or more relay urls are hard-coded into the source code
- Your app depends on a specific relay implementation to work (ahem, relay29)
- You don't validate event signatures
- You don't publish events to relays you don't control
- You don't read events from relays you don't control
- You use legacy web services to solve problems, rather than nostr-native solutions
- You use nostr-native solutions, but you've hardcoded their pubkeys or URLs into your app
- You don't use NIP 89 to discover clients and services
- You haven't published a NIP 89 listing for your app
- You don't leverage your users' web of trust for filtering out spam
- You don't respect your users' mute lists
- You try to "own" your users' data
Now let me just re-iterate - it's ok to be a NINO. We need NINOs, because nostr can't (and shouldn't) tackle every problem. You just need to decide whether your app, as a NINO, is actually contributing to the nostr ecosystem, or whether you're just using buzzwords to whitewash a legacy web software product.
If you're in the former camp, great! If you're in the latter, what are you waiting for? Only you can fix your NINO problem. And there are lots of ways to do this, depending on your own unique situation:
- Drop nostr support if it's not doing anyone any good. If you want to build a normal company and make some money, that's perfectly fine.
- Build out your nostr integration - start taking advantage of webs of trust, self-authenticating data, event handlers, etc.
- Work around the problem. Think you need a special relay feature for your app to work? Guess again. Consider encryption, AUTH, DVMs, or better data formats.
- Think your idea is a good one? Talk to other devs or open a PR to the nips repo. No one can adopt your NIP if they don't know about it.
- Keep going. It can sometimes be hard to distinguish a research project from a NINO. New ideas have to be built out before they can be fully appreciated.
- Listen to advice. Nostr developers are friendly and happy to help. If you're not sure why you're getting traction, ask!
I sincerely hope this article is useful for all of you out there in NINO land. Maybe this made you feel better about not passing the totally optional nostr app purity test. Or maybe it gave you some actionable next steps towards making a great NINON (Nostr In Not Only Name) app. In either case, GM and PV.
-
@ 9e69e420:d12360c2
2025-01-30 12:23:04Tech stocks have taken a hit globally after China's DeepSeek launched a competitive AI chatbot at a much lower cost than US counterparts. This has stirred market fears of a $1.2 trillion loss across tech companies when trading opens in New York.
DeepSeek’s chatbot quickly topped download charts and surprised experts with its capabilities, developed for only $5.6 million.
The Nasdaq dropped over 3% in premarket trading, with major firms like Nvidia falling more than 10%. SoftBank also saw losses shortly after investing in a significant US AI venture.
Venture capitalist Marc Andreessen called it “AI’s Sputnik moment,” highlighting its potential impact on the industry.
![] (https://www.telegraph.co.uk/content/dam/business/2025/01/27/TELEMMGLPICT000409807198_17379939060750_trans_NvBQzQNjv4BqgsaO8O78rhmZrDxTlQBjdGLvJF5WfpqnBZShRL_tOZw.jpeg)
-
@ 9e69e420:d12360c2
2025-01-30 12:13:39Salwan Momika, a Christian Iraqi known for burning the Koran in Sweden, was shot dead during a TikTok livestream in an apartment in Sodertalje. The 38-year-old sparked outrage in the Muslim community for his demonstrations, leading to global condemnation. After being rushed to the hospital, he was pronounced dead.
Authorities arrested five individuals in connection with the incident. Momika's death comes days before a court ruling on his possible incitement of ethnic hatred. The incident highlights the tensions surrounding free speech and religious sentiments, intensifying after his controversial protests in 2023.
-
@ 3b7fc823:e194354f
2025-02-13 02:25:42site:example.com intitle:"index of" inurl:admin intext:"password"
site:example.com site:.gov site:.edu site:*.mil
inurl:login inurl:admin inurl:dashboard inurl:portal intitle:"admin login"
intitle:"index of /" intitle:"index of" "parent directory" intitle:"index of" "backup"
filetype:pdf "confidential" filetype:xls "username | password" filetype:doc "top secret" filetype:sql "database"
intext:"username" intext:"password" intext:"login" intext:"password" filetype:txt "passwords"
inurl:"viewerframe?mode=" inurl:"/view.shtml" inurl:"/view/index.shtml"
intitle:"index of" "wp-config.php" inurl:".git"
filetype:xls intext:"email" filetype:csv intext:"email"
inurl:"/setup.cgi?next_file=netgear.cfg" inurl:"/wificonf.html"
-
@ 0fa80bd3:ea7325de
2025-01-30 04:28:30"Degeneration" or "Вырождение" ![[photo_2025-01-29 23.23.15.jpeg]]
A once-functional object, now eroded by time and human intervention, stripped of its original purpose. Layers of presence accumulate—marks, alterations, traces of intent—until the very essence is obscured. Restoration is paradoxical: to reclaim, one must erase. Yet erasure is an impossibility, for to remove these imprints is to deny the existence of those who shaped them.
The work stands as a meditation on entropy, memory, and the irreversible dialogue between creation and decay.
-
@ fd78c37f:a0ec0833
2025-02-13 02:24:48In this edition, we invited Rafael from Bitcoin É Aqui to share the development of his community and its efforts in promoting Bitcoin adoption. From establishing a Bitcoin-friendly environment in Rolante to organizing and supporting events like the Bitcoin Spring Festival and KuchenFest, Rafael highlighted Bitcoin's impact on the local economy and tourism industry.
YakiHonne: Today, we are honored to invite Rafael from Bitcoin é Aqui to join us. Before we dive in, I'd like to take a moment to introduce YakiHonne and share a bit about what we do. YakiHonne is a decentralized media client built on the Nostr protocol that enables freedom of speech through technology. It empowers creators to create their own voice, assets, and features. It also allows features like smart widgets, verified notes, and focuses on long-form articles. Now today we'll be exploring more about the Bitcoin community. Rafael, could you please briefly introduce what sparked your interest in Bitcoin, and what motivated you to create this community?
Rafael:Like many, Stim's and his wife Camila's initial interest was in technology— a completely new way to transfer money with full self-custody. From the beginning, the project focused on the payment network, and at the time, they didn’t realize it would evolve into “A Project.”
YakiHonne: Could you share how your community got started, the strategies you used to attract members, and the early challenges you encountered?
Rafael:From the start, we were all about building a payment network. We began by paying our barber, gardener, and other service providers with Bitcoin. After a few close friends joined, word started to spread—even though some were worried about scams and Bitcoin's legality. To address these concerns, we held a talk at the City's Trade Association on how merchants could legally accept Bitcoin. We expected 5 to 10 friends, but over 60 merchants attended! Today, we’re proud to say that our city is the most Bitcoin-friendly in the world, with more than 40% of stores accepting it. From plumbers to supermarkets, it’s amazing to see our community featured on the BitcoinMap website.
YakiHonne: What principles guide the community, and how do you maintain trust and reliability in discussions?
Rafael:Like Bitcoin itself, decentralization is our core principle. The project "Bitcoin É Aqui" (loosely translated as "Bitcoin is Here") assists merchants in setting up Lightning wallets and offers best practices. However, every merchant is free to operate as they see fit—choosing whether to follow our advice or to use any wallet they prefer. Moreover, many experienced merchants help onboard newcomers, building trust through established networks and reinforcing our decentralized approach.
YakiHonne: How do you educate members and keep them updated on Bitcoin developments?
Rafael:We have a group chat where we post some news, but in Brazil, almost everyone already uses WhatsApp for communication, and news usually spreads through these groups, again highlighting the decentralized nature of the Project.
YakiHonne: What initiatives has the community undertaken to promote Bitcoin adoption, and what results have you seen?
Rafael:Of course, the rising coin value draws attention, but the main attraction is tourists coming to Rolante to learn about the project. Rolante was already famed for its natural wonders—majestic mountains and breathtaking waterfalls. Combined with Bitcoin’s innovative acceptance as a payment method, it has become an even stronger magnet for visitors. Rafael:In Rolante, living completely on Bitcoin is a reality. Here, you'll find travel agencies, professional tour guides, and a variety of services—from department stores and opticians to real estate agents, construction companies, architects, furniture stores, building materials suppliers, and solar energy providers. In the healthcare sector, you can rely on pharmacies, massage therapists, physiotherapists, and advanced dental services; even the city hospital accepts Bitcoin as payment.
YakiHonne: What are the community’s goals for the next 6-12 months, and how do you see it evolving with Bitcoin’s growth?
Rafael:As a project, Bitcoin É Aqui doesn’t dictate what the community should do, but we support many events like Pizza Day, Bitcoin Spring Festival, Bier Rock, KuchenFest. One major event is the biennial Bitcoin Spring Festival (BSF). The Bitcoin Spring Festival (BSF) is a key event in the Rolante Bitcoin community, aimed at promoting Bitcoin adoption and circular economy development. This year, the festival focuses on "Bitcoinization," bringing together notable figures in the Bitcoin space to showcase a real Bitcoin economic ecosystem. During the event, all transactions will be conducted via the Lightning Network, with Coinos.io and Wallet Of Satoshi recommended. BSF is not just a celebration but a movement toward financial freedom.
Rafael:This March, Rolante will host its most traditional event, KuchenFest, celebrating the local traditional bread delicacy. The event centers around the sweet bread Cuca, bringing together candy makers and Cuca enthusiasts to share recipes, techniques, and stories. Additionally, the festival features live music, folk dances, and family activities, showcasing rich cultural traditions. We will help the event accept and promote the use of Bitcoin.
-
@ df478568:2a951e67
2025-02-13 02:04:30In the very early days, Nostr was pretty much troll-free. It was one of my favorite things about it, but I suspected this was only the case because only hardcore bitcoiners were on there. Now that the network is growing, there is more diversity of ideas. Ideology tends to make people mean. Mean people suck, so I try to remain respectful even when I disagree with others. I am not a fan of communism, but enjoy reading other perspectives. I do not wish to censor any speech at all, especially speech I do not agree with. The freedom of speech is not about the First Amendment to me. It's about creating a space that is safe for free speech. Platforms are not a safe space for free speech. The safety of free speech is in peril on platforms. Nostr is a space where people can speak freely in an open Internet-connected society. There is some speech I would rather not see. I wish some people did not say certain things, but I do not want to stop them. If we censor the worst speech, the speech does not go away. It merely goes underground and creates bad speech silos where people hide their true selves and go only speak to people just like them. Censorship is like prison for ideas. Prisoners improve their robbery skills because they exchange ideas with other criminals. It's like a conference for criminals. Fascists get more fascist when they only have permission to talk to fellow fascists. Communists get more communist when they can only talk to other communists. Ideas are a marketplace. May the best ideas win. Nostr allows me to speak with people about topics I might not otherwise get a chance to speak about. I never see any pro-communist posts on Twitter. That's a problem because communists also don't see me. I also never saw sex workers talk about anything other than kinky-boinky talk on Twitter. Nostr brings the humanity back to sex workers. Sex workers are people too. They have interesting ideas and take interesting photos On the What is Money Show, Rabble says he wants to have Christians have a Christian-only Nostr network and sex workers to have a sex worker-only network. It's a fun idea, but I'm not convinced this would be a good thing. What if Jesus was on the Christian Nostr, but Mary Magdalen was on sex worker Nostr? I suspect Christians talking to sex workers is not such a bad thing. What would Jesus do? Here is a conversation I had with a stripper on nostr. You can read the original here but I have reprinted it on the Habla and Substack.
I don't believe it's possible for a community or state to abolish private property when the private property can be distilled into 12 secret random words. Ironically, bitcoin does give the means of monetary production to the people, but this is a moot point given that individual people do not have equal ability. Very few people had sufficient knowledge to mine bitcoin when the block reward was 50 bitcoin every 10 minutes. Therefore, even though anybody could technically produce bitcoin blocks, very few people can. The same is true for saving. Even if we could defy human nature with schemes such as this, it would not solve wealth inequality. Most people spend money like drunken sailors. If everyone had the same income that could not be debased or stolen, broke people would still exist because people do not have equal money management skills. That is why I prefer capitalism with a non-socialist monetary system. The United States, contrary to popular belief, is not a capitalist economic system. It's a mixed economy where some people (banks and government) get money without doing any work aside from fudging numbers. A bank does not save capital to buy a house. Banks print money to buy homes and collect rent from homeowners. It's an accounting trick, not capitalism. Here's how capitalism works according to economist, Russ Roberts.
https://youtu.be/ljULutAUL7o?si=bLPY5IvwwMQvfXJK
npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
https://mempool.marc26z.com/block/00000000000000000001fa33d3d7750ed315d94e3c1def6512281b33bece333b
-
@ 0fa80bd3:ea7325de
2025-01-29 15:43:42Lyn Alden - биткойн евангелист или евангелистка, я пока не понял
npub1a2cww4kn9wqte4ry70vyfwqyqvpswksna27rtxd8vty6c74era8sdcw83a
Thomas Pacchia - PubKey owner - X - @tpacchia
npub1xy6exlg37pw84cpyj05c2pdgv86hr25cxn0g7aa8g8a6v97mhduqeuhgpl
calvadev - Shopstr
npub16dhgpql60vmd4mnydjut87vla23a38j689jssaqlqqlzrtqtd0kqex0nkq
Calle - Cashu founder
npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg
Джек Дорси
npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m
21 ideas
npub1lm3f47nzyf0rjp6fsl4qlnkmzed4uj4h2gnf2vhe3l3mrj85vqks6z3c7l
Много адресов. Хз кто надо сортировать
https://github.com/aitechguy/nostr-address-book
ФиатДжеф - создатель Ностр - https://github.com/fiatjaf
npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6
EVAN KALOUDIS Zues wallet
npub19kv88vjm7tw6v9qksn2y6h4hdt6e79nh3zjcud36k9n3lmlwsleqwte2qd
Программер Коди https://github.com/CodyTseng/nostr-relay
npub1syjmjy0dp62dhccq3g97fr87tngvpvzey08llyt6ul58m2zqpzps9wf6wl
Anna Chekhovich - Managing Bitcoin at The Anti-Corruption Foundation https://x.com/AnyaChekhovich
npub1y2st7rp54277hyd2usw6shy3kxprnmpvhkezmldp7vhl7hp920aq9cfyr7
-
@ 0fa80bd3:ea7325de
2025-01-29 14:44:48![[yedinaya-rossiya-bear.png]]
1️⃣ Be where the bear roams. Stay in its territory, where it hunts for food. No point setting a trap in your backyard if the bear’s chilling in the forest.
2️⃣ Set a well-hidden trap. Bury it, disguise it, and place the bait right in the center. Bears are omnivores—just like secret police KGB agents. And what’s the tastiest bait for them? Money.
3️⃣ Wait for the bear to take the bait. When it reaches in, the trap will snap shut around its paw. It’ll be alive, but stuck. No escape.
Now, what you do with a trapped bear is another question... 😏
-
@ 1cb14ab3:95d52462
2025-02-13 01:30:00Dirt, body weight. [125' x 2']
This project was exhibited in 2015 in Boulder, Colorado.
Artist Statement
“A Line Made By Walking” (2015) is a site-specific piece created in Boulder, CO, where my body weight etched a temporary line into the earth. This work pays homage to Richard Long’s seminal 1967 piece, where a simple act of walking through the landscape left a profound trace. In my version, the line created by my movement forces the viewer to engage with the impermanence of human intervention on the land. The project prompts a reflection on the subtle yet lasting impacts we have on the environment, even through seemingly minimal actions.
As part of my larger “Rockway” project, this case study explores the concept of ‘line’ in both literal and metaphorical ways. The line is not just a physical mark, but also a representation of time, movement, and the dialogue between the body and the land. Walking, in this context, becomes a way of marking time—an act that is as ephemeral as the mark it leaves behind. The work questions the tension between permanence and transience, asking the viewer to consider how we interact with the land, both intentionally and unknowingly, and how those interactions leave traces that may soon fade but never completely disappear.
Photos
More Land Art:
More from Hes
All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.
-
@ 0fa80bd3:ea7325de
2025-01-29 05:55:02The land that belongs to the indigenous peoples of Russia has been seized by a gang of killers who have unleashed a war of extermination. They wipe out anyone who refuses to conform to their rules. Those who disagree and stay behind are tortured and killed in prisons and labor camps. Those who flee lose their homeland, dissolve into foreign cultures, and fade away. And those who stand up to protect their people are attacked by the misled and deceived. The deceived die for the unchecked greed of a single dictator—thousands from both sides, people who just wanted to live, raise their kids, and build a future.
Now, they are forced to make an impossible choice: abandon their homeland or die. Some perish on the battlefield, others lose themselves in exile, stripped of their identity, scattered in a world that isn’t theirs.
There’s been endless debate about how to fix this, how to clear the field of the weeds that choke out every new sprout, every attempt at change. But the real problem? We can’t play by their rules. We can’t speak their language or use their weapons. We stand for humanity, and no matter how righteous our cause, we will not multiply suffering. Victory doesn’t come from matching the enemy—it comes from staying ahead, from using tools they haven’t mastered yet. That’s how wars are won.
Our only resource is the will of the people to rewrite the order of things. Historian Timothy Snyder once said that a nation cannot exist without a city. A city is where the most active part of a nation thrives. But the cities are occupied. The streets are watched. Gatherings are impossible. They control the money. They control the mail. They control the media. And any dissent is crushed before it can take root.
So I started asking myself: How do we stop this fragmentation? How do we create a space where people can rebuild their connections when they’re ready? How do we build a self-sustaining network, where everyone contributes and benefits proportionally, while keeping their freedom to leave intact? And more importantly—how do we make it spread, even in occupied territory?
In 2009, something historic happened: the internet got its own money. Thanks to Satoshi Nakamoto, the world took a massive leap forward. Bitcoin and decentralized ledgers shattered the idea that money must be controlled by the state. Now, to move or store value, all you need is an address and a key. A tiny string of text, easy to carry, impossible to seize.
That was the year money broke free. The state lost its grip. Its biggest weapon—physical currency—became irrelevant. Money became purely digital.
The internet was already a sanctuary for information, a place where people could connect and organize. But with Bitcoin, it evolved. Now, value itself could flow freely, beyond the reach of authorities.
Think about it: when seedlings are grown in controlled environments before being planted outside, they get stronger, survive longer, and bear fruit faster. That’s how we handle crops in harsh climates—nurture them until they’re ready for the wild.
Now, picture the internet as that controlled environment for ideas. Bitcoin? It’s the fertile soil that lets them grow. A testing ground for new models of interaction, where concepts can take root before they move into the real world. If nation-states are a battlefield, locked in a brutal war for territory, the internet is boundless. It can absorb any number of ideas, any number of people, and it doesn’t run out of space.
But for this ecosystem to thrive, people need safe ways to communicate, to share ideas, to build something real—without surveillance, without censorship, without the constant fear of being erased.
This is where Nostr comes in.
Nostr—"Notes and Other Stuff Transmitted by Relays"—is more than just a messaging protocol. It’s a new kind of city. One that no dictator can seize, no corporation can own, no government can shut down.
It’s built on decentralization, encryption, and individual control. Messages don’t pass through central servers—they are relayed through independent nodes, and users choose which ones to trust. There’s no master switch to shut it all down. Every person owns their identity, their data, their connections. And no one—no state, no tech giant, no algorithm—can silence them.
In a world where cities fall and governments fail, Nostr is a city that cannot be occupied. A place for ideas, for networks, for freedom. A city that grows stronger the more people build within it.
-
@ 9e69e420:d12360c2
2025-01-26 15:26:44Secretary of State Marco Rubio issued new guidance halting spending on most foreign aid grants for 90 days, including military assistance to Ukraine. This immediate order shocked State Department officials and mandates “stop-work orders” on nearly all existing foreign assistance awards.
While it allows exceptions for military financing to Egypt and Israel, as well as emergency food assistance, it restricts aid to key allies like Ukraine, Jordan, and Taiwan. The guidance raises potential liability risks for the government due to unfulfilled contracts.
A report will be prepared within 85 days to recommend which programs to continue or discontinue.
-
@ 20e7c953:3b8bcb21
2025-02-13 01:15:42Biggest takeaway? We needed more hands to cover key roles - something to improve for next time, if there is any! That said, the strongest point was the organic networking and building, which set this apart from more structured, commercial conferences.
For future events - if any! - Hackathons will need dedicated time slots in the future, given the time constraints. The art side of things isn’t over yet—the exhibition will keep going for another month.
The event started a bit messy, but the quality of people made it flow naturally, creating a unique and engaging atmosphere. Overall, a great experience, and we’ll keep iterating for the next one.
We’ll send out a survey soon to gather more feedback. Huge thanks to our sponsors and media partners for making this happen - appreciate the support.
On Communities:
Lastly, while both commercial and less commercial events are needed there is something that doesn't beat Bitcoin Culture which are Bitcoin-only Meetups.
If we are in a position to give some advice: Make sure you engage with your local community since people behind it are most likely the ones who can able to bootstrap new comers while keeping trust and accountability in place. Luckily today we have most tools to filter out those who are leeching off others PoW and the genuine ones trailblazing on their own terms. On our side definitely one of the biggest lessons learnt was to work with the local Communities for future events - regardless - this time we managed to get it done with our hands, will and not much else since most tools used have been FOSS and that's why we are here for !
With that said and while continuously gathering more feedback these coming days....
WHAT DID YOU ENJOYED THE MOST?
ANYTHING YOU DISLIKED?
WHERE SHOULD WE HOST SATS N FACTS NEXT ?👀
SUGGESTIONS AND FEEDBACK MAILBOX IS OPEN 📬
Onwards 🫡
-
@ 9e69e420:d12360c2
2025-01-26 01:31:31Chef's notes
arbitray
- test
- of
- chefs notes
hedding 2
Details
- ⏲️ Prep time: 20
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 5
Ingredients
- Test ingredient
- 2nd test ingredient
Directions
- Bake
- Cool
-
@ c582af78:698069cc
2025-02-13 01:04:26The Nine Orders of Angels: A Guide to the Celestial Hierarchy
When we think of angels, we often picture winged figures in flowing robes, guiding and protecting humanity. But the biblical and theological reality is far more complex—and often stranger—than these familiar depictions.
The word angel comes from the Greek angelos, meaning “messenger,” but in scripture, angels serve a wide range of roles beyond delivering divine messages. Some are warriors wielding swords and leading celestial armies, others uphold the very throne of God, and some appear as multi-winged, multi-eyed beings beyond human comprehension.
To bring order to this celestial realm, theologians—most notably Thomas Aquinas—classified angels into a hierarchy of nine types, divided into three orders based on their function and proximity to God.
- The lowest order interacts with humanity.
- The middle order governs spiritual and cosmic forces.
- The highest order exists solely to serve and glorify God.
Today, we explore these nine ranks of angels—from the familiar to the truly otherworldly.
I. The Third Order: Angels Who Interact with Humanity
(The lowest tier of angels, closest to humans, acting as messengers and protectors.)
1. Angels – The Messengers
https://image.nostr.build/b6462b67e14c8780896f465b664a521cdcdef7eb4b4314669b8d219aa36964c5.jpg
These are the angels most commonly associated with divine guidance. According to Aquinas, every person has a guardian angel—an unseen protector guiding them through life.
In Genesis 28:12, Jacob’s vision of a ladder stretching to Heaven shows angels ascending and descending, delivering messages and fulfilling divine commands. Some, like those who visited Abraham, even appeared as ordinary men, without wings or supernatural radiance.
2. Archangels – The Divine Enforcers
https://image.nostr.build/af8799efb61c5a64e958450bcd5aee55d2cade931cfc5ca7f0ae8745ccd4c45a.jpg
Archangels carry out the most crucial missions in scripture. Gabriel announced the birth of Jesus to Mary, while Michael led the charge against Satan in the war for Heaven.
Though only Michael is explicitly called an archangel in the Bible, tradition assigns this title to others, including Raphael and Uriel. Archangels serve as warriors and heralds, executing God’s most urgent decrees.
3. Principalities – Guardians of Nations
https://image.nostr.build/bc7cd78acb656be6c946da32244bfb9ecdfe9a7d1bd80e47eca764cae4a88b95.jpg
Principalities oversee nations, cities, and communities, influencing their spiritual well-being. While they are not explicitly named in scripture, Colossians 1:16 references “thrones, dominions, principalities, and powers.”
Tradition suggests that Principalities guide earthly leaders, strengthening them in times of crisis—and perhaps even aiding biblical figures like King David in battle.
II. The Second Order: The Heavenly Governors
(These angels reside in Heaven but influence earthly affairs, ensuring divine order is maintained.)
4. Powers – The Celestial Warriors
https://image.nostr.build/1768abcbaefb2d1d21654a869b356d86a45d76a82197b9568528d4d4b9f0ef69.jpg
Powers act as Heaven’s military defenders, guarding the spiritual realm from demonic forces. They are often depicted in armor, wielding weapons as they engage in cosmic battles.
According to Christian tradition, Powers also escort souls to Heaven, ensuring their safe passage after death. Some believe that the battle between good and evil plays out, in part, through these celestial warriors.
5. Virtues – The Miracle Workers
https://image.nostr.build/b9a1e52f1dd4ef0f7e7dd198d81e7cd171eede8a64a40cac8176e12a5419aeba.jpg
Virtues are associated with miracles and nature, regulating celestial phenomena and assisting in divine interventions.
In Christian tradition, the two angels present at Christ’s Ascension are often considered Virtues, manifesting God’s power on Earth.
6. Dominions – The Angelic Rulers
https://image.nostr.build/0900d97bf545736e5edc1521f46a8afbf0e93fd81e472c88a56744ff0f56ce48.jpg
Dominions do not typically interact with humans directly. Instead, they act as commanders, overseeing lower angels and ensuring divine order is maintained.
They are described as serene, wise beings, often depicted holding golden staffs and orbs, symbolizing their authority and their close relationship with God.
III. The First Order: The Angels Closest to God
(These angels exist solely to worship and serve God, residing in the highest realms of Heaven.)
7. Thrones – The Wheels of God’s Chariot
https://image.nostr.build/d9f1e465129b138f4f960ee43ee9e06ceb3fd6f57e9658cd275e1ac1576b3c02.jpg
Among the most mysterious angelic beings, Thrones are described in Ezekiel’s vision as wheels covered in eyes, spinning within wheels:
“As I looked, I saw a wheel on the ground beside each creature with its four faces... Their rims were full of eyes all around. Wherever the spirit would go, they would go, because the spirit of the living creatures was in the wheels.”
— Ezekiel 1:15-21Thrones serve as God’s chariot, supporting His throne and executing divine justice. Their strange, abstract form symbolizes stability and divine order.
8. Cherubim – The Guardians of Glory
https://image.nostr.build/e921ad4c32f56ebbb8f1bcb1ca2bc6eed1c736ec896429e008fc5b71cf2fd151.jpg
Cherubim have been drastically misrepresented in art. Far from the plump, childlike figures seen in Renaissance paintings, the biblical Cherubim are fearsome beings.
In Ezekiel 10, they are described as having four faces—a man, a lion, an ox, and an eagle—along with four wings.
They also appear in Genesis 3:24, where they guard the entrance to Eden with flaming swords after Adam and Eve’s expulsion.
https://image.nostr.build/f51286d4f35d9d6e85d8559600188ecc89a0969c3985814cae56cd230ea5db00.jpg
Aquinas even suggested that Satan himself was a fallen Cherub. This theory is supported by Ezekiel 28, which describes an angelic being cast down from God’s presence:
“You were anointed as a guardian cherub... You were blameless in your ways until wickedness was found in you... So I drove you in disgrace from the mount of God, and I expelled you, guardian cherub.”
— Ezekiel 28:14-179. Seraphim – The Highest & Holiest
Seraphim stand at the very throne of God, continuously worshiping Him.
In Isaiah’s vision (Isaiah 6:1-7), they are described as having six wings—two to fly, two to cover their feet, and two to cover their faces, symbolizing their humility before God. They sing:
“Holy, holy, holy is the Lord of hosts; the whole earth is full of His glory.”
When Seraphim reappear in Revelation, their wings are now covered in eyes, representing divine omniscience. Their song shifts slightly:
“Holy, holy, holy is the Lord God Almighty, who was and is and is to come!”
— Revelation 4:8
https://image.nostr.build/3495ccf6c0ba26b42d3e2b438ec19232cca148f6fbf29e5edd4129f5a198d05b.jpgUnlike other angelic beings, Seraphim do not interact with humans—they exist purely to glorify God.
“Be Not Afraid”
The angelic hierarchy provides a glimpse into the vast celestial order governing God’s universe. From the lowest messengers to the highest divine worshippers, each angelic being plays a unique role in the unfolding story of creation and salvation.
Yet, despite their differences, there is one striking similarity across biblical encounters with angels:
They often begin with a single phrase—
“Be not afraid.”
-
@ c582af78:698069cc
2025-02-13 01:03:50How to Be Happy: Aristotle’s Blueprint for a Flourishing Life
Everyone wants happiness. The problem? Most people don’t actually know what happiness is.
Ask someone what would make them happy, and they’ll likely mention wealth, pleasure, success, or recognition. Over 2,000 years ago, Aristotle heard the same answers—and he rejected them.
According to Aristotle, happiness isn’t something you have, but something you do. True happiness—what he called eudaimonia—isn’t about fleeting pleasures or external rewards. It’s about living well, cultivating virtue, and engaging deeply in life’s highest pursuits.
So, what’s Aristotle’s formula for happiness? It comes down to three essential steps.
The False Paths to Happiness
Aristotle observed that most people chase happiness in three common ways: wealth, pleasure, and honor. While each has its appeal, none can sustain true fulfillment.
Take wealth, for example. Money provides security and opportunity, but it doesn’t guarantee satisfaction. Aristotle noted that many people who seek wealth become obsessed with accumulating it rather than using it wisely. The result? An endless chase with no real contentment.
Pleasure is even trickier. Aristotle acknowledged that pleasure is a natural good, but he warned against making it life’s ultimate goal. Living only for pleasure leads to a cycle of chasing temporary highs without ever achieving deeper fulfillment. As Aristotle put it, this is the life of “fatted cattle”—comfortable, but lacking excellence.
Then there’s honor. Recognition feels good, but it depends on the approval of others. If you live solely for status, you risk valuing recognition over real achievement. Honor for its own sake is empty unless it’s tied to genuine virtue.
Aristotle’s conclusion? These paths don’t lead to true happiness. They are distractions, not destinations.
The True Meaning of Happiness
If wealth, pleasure, and honor aren’t enough, then what is happiness?
To answer that, we need to understand Aristotle’s term eudaimonia. Unlike our modern idea of happiness as a feeling, eudaimonia means flourishing—a life of purpose, virtue, and excellence.
The key difference is that wealth, pleasure, and honor are passive—they happen to you. But eudaimonia is active—it’s something you cultivate through action.
In his Nicomachean Ethics, Aristotle defines happiness as “the activity of the soul in accordance with virtue.” It’s not a prize to be won, but a way of living.
A great example comes from sports. A skilled athlete doesn’t just sit around feeling happy—his joy comes from being in motion: training, competing, improving, and fully engaging in his craft.
For Aristotle, happiness works the same way. It comes from actively developing your best qualities, not passively indulging in comfort.
But how do you put this into practice?
Aristotle’s 3-Step Blueprint for a Good Life
Aristotle’s guide to happiness is surprisingly practical. Here’s how to apply it:
1. Cultivate Virtue Through Habit
Virtue isn’t something you’re born with—it’s something you practice.
Just as an athlete trains for competition, you develop virtue by repeatedly choosing good actions. Courage, patience, and wisdom don’t just appear; they become part of you through habit.
As Aristotle famously said:
“We are what we repeatedly do. Excellence, then, is not an act, but a habit.”
Want to be generous? Give more often.
Want to be disciplined? Practice restraint.Over time, these actions shape your character—and character shapes happiness.
2. Engage Fully in Meaningful Work
Happiness isn’t found in passivity, but in action.
Aristotle believed that true fulfillment comes from using your talents to their fullest extent. This applies to everything from philosophy to craftsmanship to leadership. The key is engagement.
Think of the satisfaction a musician feels while playing at their best, or the pride of a craftsman perfecting their work. These moments—where skill, effort, and purpose align—are true happiness in action.
Contrary to popular belief, happiness isn’t about doing less. It’s about doing the right things, with full commitment.
3. Seek the Right Kind of Pleasure
Aristotle didn’t reject pleasure—he just emphasized choosing the right kind.
Lower pleasures—like eating, drinking, or binge-watching TV—may feel good in the moment but often leave you feeling empty afterward. Higher pleasures—such as learning, mastering a craft, or cultivating meaningful relationships—lead to lasting fulfillment.
The goal isn’t to reject pleasure, but to align it with virtue. Instead of chasing immediate gratification, seek pleasures that contribute to long-term flourishing.
Happiness as a Way of Life
It’s important to understand that happiness isn’t a destination—it’s a practice. It’s something cultivated daily by engaging in meaningful work, growing in virtue, and living with purpose.
But most importantly, happiness isn’t about what happens to you—it’s about who you become.
By cultivating eudaimonia, you change the essence of your being—just as a farmer who nurtures his crops becomes stronger through his labor.
True happiness isn’t a fleeting emotion, but the natural result of a life well lived. The more you nurture virtue through action, the more deeply happiness takes root—until it becomes not just something you seek, but something you embody.
-
@ ec42c765:328c0600
2025-01-26 00:08:54カスタム絵文字とは
任意のオリジナル画像を絵文字のように文中に挿入できる機能です。
また、リアクション(Twitterの いいね のような機能)にもカスタム絵文字を使えます。
カスタム絵文字の対応状況(2024/02/05)
カスタム絵文字を使うためにはカスタム絵文字に対応したクライアントを使う必要があります。
※表は一例です。クライアントは他にもたくさんあります。
使っているクライアントが対応していない場合は、クライアントを変更する、対応するまで待つ、開発者に要望を送る(または自分で実装する)などしましょう。
対応クライアント
ここではnostterを使って説明していきます。
準備
カスタム絵文字を使うための準備です。
- Nostrエクステンション(NIP-07)を導入する
- 使いたいカスタム絵文字をリストに登録する
Nostrエクステンション(NIP-07)を導入する
Nostrエクステンションは使いたいカスタム絵文字を登録する時に必要になります。
また、環境(パソコン、iPhone、androidなど)によって導入方法が違います。
Nostrエクステンションを導入する端末は、実際にNostrを閲覧する端末と違っても構いません(リスト登録はPC、Nostr閲覧はiPhoneなど)。
Nostrエクステンション(NIP-07)の導入方法は以下のページを参照してください。
ログイン拡張機能 (NIP-07)を使ってみよう | Welcome to Nostr! ~ Nostrをはじめよう! ~
少し面倒ですが、これを導入しておくとNostr上の様々な場面で役立つのでより快適になります。
使いたいカスタム絵文字をリストに登録する
以下のサイトで行います。
右上のGet startedからNostrエクステンションでログインしてください。
例として以下のカスタム絵文字を導入してみます。
実際より絵文字が少なく表示されることがありますが、古い状態のデータを取得してしまっているためです。その場合はブラウザの更新ボタンを押してください。
- 右側のOptionsからBookmarkを選択
これでカスタム絵文字を使用するためのリストに登録できます。
カスタム絵文字を使用する
例としてブラウザから使えるクライアント nostter から使用してみます。
nostterにNostrエクステンションでログイン、もしくは秘密鍵を入れてログインしてください。
文章中に使用
- 投稿ボタンを押して投稿ウィンドウを表示
- 顔😀のボタンを押し、絵文字ウィンドウを表示
- *タブを押し、カスタム絵文字一覧を表示
- カスタム絵文字を選択
- : 記号に挟まれたアルファベットのショートコードとして挿入される
この状態で投稿するとカスタム絵文字として表示されます。
カスタム絵文字対応クライアントを使っている他ユーザーにもカスタム絵文字として表示されます。
対応していないクライアントの場合、ショートコードのまま表示されます。
ショートコードを直接入力することでカスタム絵文字の候補が表示されるのでそこから選択することもできます。
リアクションに使用
- 任意の投稿の顔😀のボタンを押し、絵文字ウィンドウを表示
- *タブを押し、カスタム絵文字一覧を表示
- カスタム絵文字を選択
カスタム絵文字リアクションを送ることができます。
カスタム絵文字を探す
先述したemojitoからカスタム絵文字を探せます。
例えば任意のユーザーのページ emojito ロクヨウ から探したり、 emojito Browse all からnostr全体で最近作成、更新された絵文字を見たりできます。
また、以下のリンクは日本語圏ユーザーが作ったカスタム絵文字を集めたリストです(2024/06/30)
※漏れがあるかもしれません
各絵文字セットにあるOpen in emojitoのリンクからemojitoに飛び、使用リストに追加できます。
以上です。
次:Nostrのカスタム絵文字の作り方
Yakihonneリンク Nostrのカスタム絵文字の作り方
Nostrリンク nostr:naddr1qqxnzdesxuunzv358ycrgveeqgswcsk8v4qck0deepdtluag3a9rh0jh2d0wh0w9g53qg8a9x2xqvqqrqsqqqa28r5psx3
仕様
-
@ 57d1a264:69f1fee1
2025-02-13 00:28:45This past week, @erik_ and @Sushant have been working on improving the onboarding flow for Sovran bitcoin wallet. First revision on thee figma file below, would appreciate any feedback.
https://www.figma.com/design/inNLo6AaPMX26D3GumcXGC/UI%2FUX-Audit--Onboarding-User-Flow?node-id=0-1&t=Wl0EVhH5fJgYYSJI-1
If you want to review the UX audit of the current flow, see the feedback provided, and check Sushant's initial suggestions, you can do so here:
https://www.figma.com/board/Jfo4nLIKyR6lacokXze4Mv/Sovran-Onboarding-UX-Audit?node-id=0-1&t=gOZyo57zfeqxFXeB-1
originally posted at https://stacker.news/items/884272
-
@ f6488c62:c929299d
2025-02-13 02:39:41Lowering interest rates is one of the tools that central banks use to manage the economy, especially during periods of inflation, which causes the prices of goods and services to rise. Lowering interest rates not only helps stimulate spending but can also foster sustainable growth in businesses and labor markets.
Access to Capital and Economic Stimulation When interest rates are lowered, the public can access capital more easily. With lower interest rates, borrowing becomes less burdensome, giving individuals and businesses the opportunity to start new ventures or expand existing businesses. This leads to increased investment and spending, which in turn keeps the economy circulating and growing.
For instance, when people can easily borrow money to start a new business—such as an online store or a product manufacturing business—the increase in entrepreneurs and the availability of goods in the market will ensure that the supply is sufficient to meet consumer demand. This, in turn, prevents prices from rising too much due to a lack of supply.
Reducing Inflation by Increasing Supply Increasing the supply of goods and services in the market can significantly help in controlling inflation. When there are more goods or services available to meet market demand, competition among producers will naturally drive prices down. This is the basic principle of market dynamics: when there’s enough supply, prices are less likely to increase, even in times of high demand.
In addition, increasing supply helps address shortages, which are one of the key drivers of rising prices. When there is enough product available to satisfy demand, inflationary pressures can be relieved, and prices can stabilize.
Redistributing Income and Reducing Inequality Lower interest rates also play a crucial role in redistributing income within society. By making access to capital easier, especially for those with lower or middle incomes, the public’s purchasing power increases, which can stimulate spending on essential goods and services.
When people have more money in hand, they are better able to access necessary products. This boosts demand in the market. However, alongside this increased demand, sufficient supply is needed to prevent prices from rising uncontrollably, which can lead to inflation.
Moreover, supporting the population through welfare programs or initiatives that allow everyone to access education and investment opportunities helps individuals create products and value in the market. A diverse market with a variety of products increases production efficiency and helps mitigate economic inequality, ensuring a more balanced and inclusive economy.
Conclusion Lowering interest rates and redistributing income effectively can stimulate economic growth and reduce inflation. This works by ensuring there is sufficient supply to meet market demand, while also providing capital that allows the public to start new businesses and generate new products in the market.
For sustainable long-term economic growth, managing inflation should go hand in hand with investing in infrastructure and ensuring wealth distribution. This ensures that everyone has equal access to opportunities, leading to steady economic growth without negatively impacting the majority of society.
In summary, lowering interest rates is a key tool in stimulating the economy and reducing inflation, especially when the economy faces imbalances. It not only increases supply, but also promotes income redistribution and the creation of an economy that is more equitable in the long run.
-
@ 5579d5c0:db104ded
2025-02-12 23:41:09Most people think their metabolism is "broken" because they can't lose weight, feel sluggish, or gain fat easily.
The truth? Your metabolism isn’t broken, it’s just out of sync.
Your body doesn’t just burn calories randomly.
It follows a natural 24-hour rhythm, dictated by light exposure, movement, meal timing, and sleep.
When these cues are off, your metabolism becomes dysfunctional.
The good news?
You don’t need to diet harder or exercise more.
You need to realign your metabolism with your body’s natural rhythm.
Why your metabolism feels “broken”
Your body is designed to run on timing signals, when to eat, when to move, when to rest. Modern life disrupts these natural rhythms, leading to:
→ Low energy & afternoon crashes: Skipping morning sunlight and staying indoors all day.
→ Stubborn belly fat & slow fat loss: Eating at the wrong times, late-night snacking, and chronic stress.
→ Constant cravings & hunger: Poor meal timing and eating foods that spike blood sugar too often.
→ Poor sleep & recovery: Late night screen use, artificial light, and erratic bedtimes.
The problem isn’t your metabolism, it’s your environment and habits.
How to reset your metabolism naturally
You don’t need extreme diets, calorie counting, or hours in the gym.
Instead, align your metabolism with your body’s natural timing signals by focusing on these fundamentals:
1. Get natural light first thing in the morning
Light in the first 30 minutes after waking sets your circadian rhythm (body clock), kickstarts hormone production, and improves insulin sensitivity.
This simple habit helps to regulate hunger, energy, and fat-burning.
Action step: Step outside for at least 5–10 minutes within 30 minutes of waking, no sunglasses, no contacts, only natural light exposure and take regular outdoor breaks during the day.
2. Stop eating late at night
Eating late, especially high-carb/high-fat meals, signals your body to store fat instead of burning it.
Late-night eating also disrupts sleep, which further impairs fat loss.
Action step: Keep meals within a 10-12 hour eating window, preferably between sunrise and sunset. No snacking. Finish your last meal at least 3 hours before bed.
3. Move throughout the day (Not just at the gym)
Your metabolism isn’t just about burning calories, it’s about how efficiently your body uses energy.
Sitting for long hours disrupts metabolic function, even if you work out later.
Action step: Take a 5-minute movement break every 1–2 hours. Stand, stretch, or better still go for a quick walk outside.
4. Prioritise deep, uninterrupted sleep
Your body burns fat and repairs muscle while you sleep.
Poor sleep increases hunger hormones (Ghrelin), prevents Leptin from working properly, and makes you crave junk food the next day.
Action step: Dim lights after sunset, wear blue light blocking glasses, avoid screens 30-60 minutes before bed, and aim for 7.5-9 hours of quality sleep.
5. Eat nutrient-dense foods
What you eat matters, but when you eat it matters just as much.
Front-loading protein and nutrients earlier in the day supports fat-burning and stabilises energy.
Action step: Eat a high-protein, nutrient-dense breakfast and avoid refined carbs & sugar, especially in the morning, to prevent cravings later.
Your metabolism isn’t broken, it’s just out of sync.
Instead of obsessing over calories, focus on realigning your body with its natural rhythms:
→ Morning sunlight to set your metabolism for the day.
→ Aligned meal timing by eating during daylight & avoiding late-night eating.
→ Frequent movement to prevents metabolic slowdown from sitting.
→ Quality sleep which regulates fat-burning and hunger hormones.
→ Nutrient-dense eating giving your body what it needs.
Fix your metabolism without dieting harder, just live in sync with how your body is designed to function.
-Chris
If you want a simple methodical approach to fixing your metabolism, Let’s talk.
Book a free call here: https://calendly.com/hello-chrispatrick
Follow me on Nostr: https://primal.net/chrispatrick or
nostr:npub124uatsq6pv74trzwvt34y4sx2z0uflhse7tkrv0pl69e8kcsfhkse30zsu
-
@ 9e69e420:d12360c2
2025-01-25 22:16:54President Trump plans to withdraw 20,000 U.S. troops from Europe and expects European allies to contribute financially to the remaining military presence. Reported by ANSA, Trump aims to deliver this message to European leaders since taking office. A European diplomat noted, “the costs cannot be borne solely by American taxpayers.”
The Pentagon hasn't commented yet. Trump has previously sought lower troop levels in Europe and had ordered cuts during his first term. The U.S. currently maintains around 65,000 troops in Europe, with total forces reaching 100,000 since the Ukraine invasion. Trump's new approach may shift military focus to the Pacific amid growing concerns about China.
-
@ 9e69e420:d12360c2
2025-01-25 14:32:21| Parameters | Dry Mead | Medium Mead | Sweet Mead | |------------|-----------|-------------|------------| | Honey | 2 lbs (900 grams) | 3 lbs (1.36 kg) | 4 lbs (1.81 kg) | | Yeast | ~0.07 oz (2 grams) | ~0.08 oz (2.5 grams) | ~0.10 oz (3 grams) | | Fermentation | ~4 weeks | 4 to 6 weeks | 6 to 8 weeks | | Racking | Fortnight or later | 1 month or after | ~2 months and after | | Specific Gravity | <1.010 | ~1.01 to ~1.025 | >1.025 |
-
@ 3b7fc823:e194354f
2025-02-12 23:13:57Staying Digitally Safe in Airports: A Comprehensive Guide
Airports are hubs of activity, but they’re also places where your digital security can be at risk. From public Wi-Fi to potential device thefts, staying safe while traveling can feel overwhelming. However, with the right knowledge and precautions, you can protect yourself and enjoy your journey stress-free. Let’s dive into how to stay digitally safe in airports while traveling.
Understanding the Risks
- Public Wi-Fi Vulnerabilities:
- Airports often offer free Wi-Fi, but these networks can be unsecured or insecure. Hackers may use these networks to intercept sensitive data.
-
Avoid using public Wi-Fi for personal banking, shopping, or handling sensitive information.
-
Device Theft:
-
High-traffic areas like security checkpoints, gates, and lounges are hotspots for device thefts. Always keep your devices in secure locations, such as carry-on bags or locked briefcases.
-
Malware and Phishing Attacks:
-
Some airports may have phishing attempts or malware distributed via pop-ups, email, or malicious websites.
-
Physical Surveillance:
- In some cases, law enforcement or security personnel may monitor your activities. Always be mindful of your surroundings to avoid unintended data exposure.
Best Practices for Staying Digitally Safe in Airports
- Use a VPN for Extra Security:
- Even secure airport Wi-Fi can expose your data if not encrypted. Use a reputable Virtual Private Network (VPN) to encrypt your internet traffic and protect your privacy.
-
Always ensure your VPN is active when using public Wi-Fi.
-
Minimize Sensitive Data on Public Devices:
-
Avoid carrying devices with sensitive information like passwords, credit card details, or personal identification numbers (PIIs).
-
Encrypt Your Data:
-
Enable encryption for all your devices to protect data stored locally or in the cloud. Ensure your operating system and apps are updated with the latest security patches.
-
Secure Your Devices:
- Use cable locks or secure cases to lock down laptops, tablets, and smartphones when not in use.
-
Remove screensavers that display your device passcode to prevent unauthorized access.
-
Keep Antivirus Software Updated:
-
Install and maintain up-to-date antivirus software on all devices. This helps detect and remove malicious software (malware) that may be installed through compromised networks or phishing attempts.
-
Avoid Plugging Into Public USB charging stations:
-
Refrain from using public USB ports or charging stations unless you know they’re secure. Malware can spread via these points.
-
Use Caution With Lost and Found:
-
If you find a device or drop one accidentally, avoid using lost and found kiosks to pick it up. Instead, contact airport security for assistance in safely retrieving your property without exposing it to potential thieves.
-
Stay Alert to Security Alerts:
-
Pay attention to announcements over the airport’s PA system regarding suspicious activity or security alerts. Follow any instructions provided by airport staff.
-
Monitor Your Accounts Remotely:
- If you suspect something is wrong (e.g., unusual transactions on your credit card), check your financial accounts immediately upon arriving at your destination. Notify your bank of potential fraudulent activity and report it to the authorities if necessary.
Additional Tips for Airport Safety
- Use a Portable Power Bank:
-
Keep your devices charged so you don’t rely on public charging stations, which may be compromised.
-
Travel with Backup Devices:
-
Always bring an extra SIM card, USB drive, or cloud storage to backup important data. This ensures you can access critical information even if your primary device is lost or damaged.
-
Avoid Sharing Personal Information Over Earphone Rentals:
-
Refrain from using earphones rented from airport kiosks that may record or intercept your conversations. Stick to your own headphones or those provided by the airline.
-
Use Airport Lounges Wisely:
-
If you’re using an airline lounge, avoid discussing sensitive information in public areas where it could be overheard.
-
Keep Your Luggage in Sight:
-
Never leave your checked luggage unattended, as it may contain devices or documents with sensitive information.
-
Plan for Data Loss:
- Before leaving home, make a backup of all important files and photos on an external drive or cloud storage. This way, you can restore them if something goes wrong during your trip.
What to Do If Something Goes Wrong
- Report Suspected Security Incidents:
-
If you notice unusual activity on your devices or suspect a security breach, inform airport security immediately.
-
Contact Your Financial Institutions:
-
If you believe your financial information has been compromised, contact your bank or credit card provider to freeze your account and monitor for fraudulent charges.
-
File a Police Report:
-
In cases of theft or suspected unauthorized access, file a report with local authorities and provide evidence (if available).
-
Use Travel Insurance:
- Check if your travel insurance covers theft, fraud, or data breaches. Submit a claim if you’re covered.
Extra Security Measures forTech-Savvy Travelers
- Two-Factor Authentication (2FA): Enable 2FA for all your critical accounts before leaving home.
- Biometric Locks: Use biometric locks on your devices to add an extra layer of security.
- Incident Response Plan: Create a plan in advance for what to do if your devices are lost or compromised.
Final Tips
- Always prioritize secure practices, even in seemingly safe environments like airports.
- Travel light but keep your important documents and devices close at hand.
- Remember that staying digitally safe is just as important as physical safety during your travels.
By following these tips, you can enjoy your trip with peace of mind, knowing your data and devices are protected. Happy traveling!
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
@ 6be5cc06:5259daf0
2025-01-21 20:58:37A seguir, veja como instalar e configurar o Privoxy no Pop!_OS.
1. Instalar o Tor e o Privoxy
Abra o terminal e execute:
bash sudo apt update sudo apt install tor privoxy
Explicação:
- Tor: Roteia o tráfego pela rede Tor.
- Privoxy: Proxy avançado que intermedia a conexão entre aplicativos e o Tor.
2. Configurar o Privoxy
Abra o arquivo de configuração do Privoxy:
bash sudo nano /etc/privoxy/config
Navegue até a última linha (atalho:
Ctrl
+/
depoisCtrl
+V
para navegar diretamente até a última linha) e insira:bash forward-socks5 / 127.0.0.1:9050 .
Isso faz com que o Privoxy envie todo o tráfego para o Tor através da porta 9050.
Salve (
CTRL
+O
eEnter
) e feche (CTRL
+X
) o arquivo.
3. Iniciar o Tor e o Privoxy
Agora, inicie e habilite os serviços:
bash sudo systemctl start tor sudo systemctl start privoxy sudo systemctl enable tor sudo systemctl enable privoxy
Explicação:
- start: Inicia os serviços.
- enable: Faz com que iniciem automaticamente ao ligar o PC.
4. Configurar o Navegador Firefox
Para usar a rede Tor com o Firefox:
- Abra o Firefox.
- Acesse Configurações → Configurar conexão.
- Selecione Configuração manual de proxy.
- Configure assim:
- Proxy HTTP:
127.0.0.1
- Porta:
8118
(porta padrão do Privoxy) - Domínio SOCKS (v5):
127.0.0.1
- Porta:
9050
- Proxy HTTP:
- Marque a opção "Usar este proxy também em HTTPS".
- Clique em OK.
5. Verificar a Conexão com o Tor
Abra o navegador e acesse:
text https://check.torproject.org/
Se aparecer a mensagem "Congratulations. This browser is configured to use Tor.", a configuração está correta.
Dicas Extras
- Privoxy pode ser ajustado para bloquear anúncios e rastreadores.
- Outros aplicativos também podem ser configurados para usar o Privoxy.
-
@ ac6f9572:8a6853dd
2025-02-13 02:05:22I attended Sats ‘n’ Facts to share my art, joining other Nostr artists in exhibiting our work at the event’s very first venue. It was a great opportunity to connect with fellow creatives, including Siritravelsketch, whose work I’ve admired on Nostr for some time. Meeting other artists in real life is always inspiring—there’s an undeniable creative bond that comes from sharing our passion in person.
Sats ‘n’ Facts is an Unconference, meaning there’s no strict schedule—everything is open for participants. It’s all about the connections made, the synergy shared, and, for the developers attending, the excitement of a hackathon. (A hackathon is an event where people collaborate intensively on engineering projects, often within 24 to 48 hours.)
My goal as an artist is to become a bridge between the Bitcoin tech world and the Bitcoin art and design space. Bitcoin empowers us by providing greater (financial) freedom, and with that freedom comes more time to pursue what we truly love—so in a way, you never have to “work” again. 😊
Nostr is a great example of how bubbles 🫧 POP, leading to new collaborations. Without tech, artists wouldn’t have a way to share their work, and without artists, creatives, and plebs, developers would have no one to build for. Both sides are essential for organic growth. This kind of synergy can only thrive in a decentralized system—otherwise, it risks being captured by big corporations. And that single point of failure is one of the biggest challenges we face in the world today.
Decentralization is freedom. Events like Sats ‘n’ Facts give us the opportunity to collaborate, create, and contribute to a more decentralized world—one where more people can truly become free.
Can’t wait to join the next Sats’n’facts. Maybe Barcelona!?
Originally article published by @BitPopArt on @YakiHonne: https://yakihonne.com/article/naddr1qvzqqqr4gupzqsa64uxz3ek0kx2mzlhqs0seavay4l06c4xek6a0zup8pmge8c6vqq242en0tukk7u2fwe8kkjrpv3ykgjtzwfsk5hmmfyp
art #nostr #ThaiNostrich #artonnostr #artstr
originally posted at https://stacker.news/items/884327
-
@ 000002de:c05780a7
2025-02-12 22:41:17The absolute embarrassment the Chiefs were subjected to... is the end of the their dominance? Of course they have a ton of talent and will win and maybe get back the Super Bowl this game really exposed them.
Its one thing to lose to a great team like the Eagles. Its another to be destroyed so fully. When I think about this game its not just on one person. Its coaching and players. I'm just wondering about the impact on the league watching this. Anyone who has played sports knows that a ton of it is mental. Teams can defeat themselves mentally. Does this defeat tell the league, yeah they aren't that good.
What do you think?
Edit: When I say "done", I mean the dynasty. I don't mean they are gonna have a losing record next year.
originally posted at https://stacker.news/items/884169
-
@ 000002de:c05780a7
2025-02-12 22:25:06Honest question. I think he's a great TE but... haven't watched him a ton. I get a feeling he's overrated. Maybe not though. I watched him during the big game and was kinda surprised by his lack luster performance. He really seemed different to me.
Since then I've seen video of him not blocking for his QB and not really playing hard. Like he gave up. Does he really have a rep of not blocking? He looks pretty terrible on film. Now, I know I'm a Kittle fan and he is famously great at blocking and takes pride in it. Maybe I'm just using Kittle as the ruler and maybe that's not fair.
Also, I loved watching KC get destroyed so factor that in :)
originally posted at https://stacker.news/items/884156
-
@ 16d11430:61640947
2025-01-21 20:40:22In a world drowning in Monopoly money, where people celebrate government-mandated inflation as "economic growth," it takes a special kind of clarity—nay, cynicism—to rise above the fiat circus. This is your guide to shedding your fiat f**ks and embracing the serene chaos of sound money, all while laughing at the absurdity of a world gone fiat-mad.
- Don’t Feed the Clowns
You know the clowns I’m talking about: central bankers in their tailored suits and smug smirks, wielding "tools" like interest rates and quantitative easing. Their tools are as real as a magician's wand, conjuring trillions of dollars out of thin air to keep their Ponzi economy afloat.
Rule #1: Don’t engage. If a clown offers you a hot take about the "strength of the dollar," smile, nod, and silently wonder how many cups of coffee their paycheck buys this month. Spoiler: fewer than last month.
- Turn Off the Fiat News
Do you really need another breathless headline about the next trillion-dollar deficit? Or the latest clickbait on why you should care about the stock market's emotional rollercoaster? Mainstream media exists to distract you, to keep you tethered to their illusion of importance.
Turn it off. Replace it with something sound, like the Bitcoin whitepaper. Or Nietzsche. At least Nietzsche knew we were doomed.
- Mock Their Inflationary Gospel
Fiat apologists will tell you that inflation is "necessary" and that 2% a year is a "healthy target." Sure, because a little robbery every year keeps society functioning, right? Ask them this: "If 2% is healthy, why not 20%? Why not 200%? Why not Venezuela?"
Fiat logic is like a bad acid trip: entertaining at first, but it quickly spirals into existential horror.
- Celebrate the Fiat Freakshow
Sometimes, the best way to resist the fiat clown show is to revel in its absurdity. Watch politicians print money like teenagers running up a credit card bill at Hot Topic, then watch the economists applaud it as "stimulus." It’s performance art, really. Andy Warhol could never.
- Build in the Chaos
While the fiat world burns, Bitcoiners build. This is the ultimate "not giving a fiat f**k" move: creating a parallel economy, one satoshi at a time. Run your Lightning node, stack sats, and laugh as the fiat circus consumes itself in a flaming pile of its own debt.
Let them argue about who gets to rearrange the deck chairs on the Titanic. You’re busy designing lifeboats.
- Adopt a Fiat-Free Lifestyle
Fiat-free living means minimizing your entanglement with their clown currency. Buy meat, not ETFs. Trade skills, not IOUs. Tip your barber in Bitcoin and ask if your landlord accepts Lightning. If they say no, chuckle and say, “You’ll learn soon enough.”
Every satoshi spent in the real economy is a slap in the face to the fiat overlords.
- Find the Humor in Collapse
Here’s the thing: the fiat system is unsustainable. You know it, I know it, even the clowns know it. The whole charade is destined to collapse under its own weight. When it does, find solace in the absurdity of it all.
Imagine the central bankers explaining hyperinflation to the public: "Turns out we can't print infinity after all." Pure comedy gold.
- Stay Ruthlessly Optimistic
Despite the doom and gloom, there’s hope. Bitcoin is hope. It’s the lifeboat for humanity, the cheat code to escape the fiat matrix. Cynicism doesn’t mean nihilism; it means seeing the rot for what it is and choosing to build something better.
So, don’t just reject the fiat clown show—replace it. Create a world where money is sound, transactions are sovereign, and wealth is measured in energy, not debt.
Final Thought: Burn the Tent Down
Aldous Huxley once envisioned a dystopia where people are so distracted by their own hedonistic consumption that they don’t realize they’re enslaved. Sound familiar? The fiat clown show is Brave New World on steroids, a spectacle designed to keep you pacified while your wealth evaporates.
But here’s the punchline: they can only enslave you if you care. By rejecting their system, you strip them of their power. So let them juggle their debts, inflate their bubbles, and print their trillions. You’ve got Bitcoin, and Bitcoin doesn’t give a fiat f**k.
Welcome to the satirical resistance. Now go stack some sats.
-
@ ac6f9572:8a6853dd
2025-02-13 01:56:23Date: 02/12/2025
One of the most efficient options to expand your knowledge and truly connect with people actively working in the space is through direct interactions, whether they’re happening at large conferences or smaller, semi-official meetups. But let’s be honest: finding all meaningful events can be a mess.
Take, for example, the 'BTC Events Map,’ which already lists over 550 Bitcoin-only gatherings worldwide. This simple but very useful resource, put together by Satlantis, can help many of us plan our trips throughout the year. However, if you don’t know about its existence and rely solely on a search engine—whether Google or Brave—you’ll likely end up frustrated (and unfortunately missing many great opportunities to meet with others and learn).
Search for 'bitcoin events,' and you’ll get a mix of irrelevant crypto, fintech, and Web3 results, with Bitcoin-related stuff buried somewhere in the middle, if at all.. Well, it’s really tough to find what you’re actually looking for.
That’s why word of mouth and trusted communities are so important. Sometimes, the best way to hear about an event is directly from people you know.
One of those that flew under my radar was SatsNFacts.
It wasn’t listed on many typical event aggregators or any big news-promo sites. It mostly spread peer-to-peer and through the main channels on Nostr.
I was ‘lucky’ enough to hear about it just in time to plan the trip from Europe to Thailand. Now, I’d like to briefly share my experience with you—everything that, in my opinion, made this event truly stand out.
A Journey to Southeast Asia: Where Builders and Artists Collide.
Approximately 10,176 kilometers, 14 hours of travel, and finally three days spent at SatsNFacts—"Thailand’s first Bitcoin Technical Unconference”.
The event ran from February 8 to 10 in Chiang Mai (the largest city in northern Thailand). Held at Weave Artisan Society, a 700 sq.m venue that used to be an ice factory, it smoothly combined pleasant outdoors with an industrial-style, two-floor indoor area, creating a unique and very practical setup.
While its was billed as a “Technical Unconference,” in practice it nicely connected the developer-based ecosystem with different aspects of culture and art.
Each day, from 10 am to 6 pm, the agenda—shaped directly by attendees—was packed with various presentations, group chats, learning session, hackathons, and actionable workshops.
With many options available (around 10-20 topics per day), I couldn’t attend everything, but here are a few more technical sessions I joined and found especially worthwhile:
- Liana Workshop (long-term security, recovery, and inheritance),
- TollGates (streaming sats for internet access),
- Open Vault (enterprise wallet interface),
- Yaki Honne (decentralized media),
- Nostr Proxies (Epoxy, WebSocket and relay monetization).
- Silent payments (simplified payment experiences without compromising privacy).
As mentioned earlier, SatsNFacts wasn’t just about Bitcoin tech. Some topics focused on community aspects as well. Two discussions I joined highlighted Bitcoin adoption ⚡ in for example Bali and Thailand, showing how sound money, integrity, and consistent work can solve real problems in these regions. Impressive stuff! Here you can learn more:
- HuaiPhueng on Geyser + "Bitcoin City" (their short video).
- Bitcoin Indonesia & Bitcoin House Bali (all in one on GitHub)
Now, the art gallery, to continue with less technical aspects of SatsNFacts 🎨
This nicely-organized space located on the ground floor, near cozy coworking and networking spots, was for me a real gem. Indeed, adding a creative vibe to the entire event.
Around 30 unique works from local and international artists were on display, all inspired by themes of freedom and privacy. Though I don’t see myself as a typical 'artist', I was honored to have some of my own pieces exhibited there as well (a short video below).
One of the highlights was meeting local Thai artists, especially Siritravelsketch, who travelled six hours by train just one way to attend two days of the event.
Her stunning paintings, created using just a bamboo stick and ink, are deeply inspired by Thai architecture and culture. While some of her pre-prepared pieces hung in the gallery, she also painted a few new works on the spot during her visit. Truly spectacular!
I also had the chance to reconnect with Satoshi Builds, who made many great sketches during this event, and with BitPopArt, a Dutch artist who, just like me, chosen a nomadic lifestyle yet has been clearly considering Thailand his 'second home' as well for several years now. By the way, ✍️ here's his short summary of the event, focusing more on the artistic side of SatsNFacts: "Art exhibition in Chiang Mai".
All in all, spending my time in many meaningful conversations and seeing so many deep artworks in one place filled me with hope and positive energy. THANK YOU, EVERYONE!
(presented artworks by for example: Agi Choote, Samhain, Zed Erwan, Existing Sprinkles, AZA 21m, BitPopArt.)
Mr. Rabbit in Thailand...
Monday, the final evening, and SatsNFacts got one more item on its agenda rooted in creative expression and independent art.
Representing Bitcoin FilmFest (a grassroots project created by an amazing group of freedom fighters and activists 🐇🧡), since I was the only one from our team in Thailand, in one of the rooms upstairs, I put together a mini cinematic experience.
Seven trailers and eleven shorts, including for example:
- NO MORE INFLATION, HUMMINGBIRD, PARALLEL SPACE, UNBANKABLE, THE LEGEND OF LANDI (🎬 some of the trailers).
- BITCOIN A NEW HOPE, SATOSHI NAKAMOTO - THE CREATOR OF BITCOIN, MAXIS CLUB SHOW - CHAPTER ONE, THE GREATEST HEIST IN HISTORY, HODL, THE ANATOMY OF BITCOIN – GENESIS BLOCK (📺 some of the presented shorts)
With around 10-15 participants, the response was positive, and we ended up spending an extra 10-maybe-20 minutes discussing the challenges and opportunities in Bitcoin-powered filmmaking, as well as the upcoming edition of BFF25 (the annual festival we're organizing this May in Warsaw, Poland).
Substance Over Hype. Gatherings That Matter.
SatsNFacts made a solid reminder that Bitcoin events can help build a truly sovereign future while bringing together developers and artistic souls alike.
The mix of technical depth and creative energy—free from the shiny gossip that floods many social channels—made it a truly meaningful experience.
SatsNFacts set a high standard, and I hope to see more events like it in the future. More unconferences, more cultural and community-driven gatherings.
Here's to more signal, less noise!!!
Big congrats to everyone who made the first SatsNFacts happen 👏 Respect especially to the organizers! You pulled off something truly special!
BTC Your Mind. Let it Beat.
Şela @AZA_21M
💡
Did you enjoy this article? Zap me some sats. No amount is small :) Lightning wallet:
aza21m@getalby.com
Original Article: https://europeanbitcoiners.com/sats-and-facts-short-coverage-of-the-first-bitcoin-unconference-in-thailand/
english #opinion #events #bitcoin #nostr #freedom #conference #siamstr #asia #thailand
-
@ 9e69e420:d12360c2
2025-01-21 19:31:48Oregano oil is a potent natural compound that offers numerous scientifically-supported health benefits.
Active Compounds
The oil's therapeutic properties stem from its key bioactive components: - Carvacrol and thymol (primary active compounds) - Polyphenols and other antioxidant
Antimicrobial Properties
Bacterial Protection The oil demonstrates powerful antibacterial effects, even against antibiotic-resistant strains like MRSA and other harmful bacteria. Studies show it effectively inactivates various pathogenic bacteria without developing resistance.
Antifungal Effects It effectively combats fungal infections, particularly Candida-related conditions like oral thrush, athlete's foot, and nail infections.
Digestive Health Benefits
Oregano oil supports digestive wellness by: - Promoting gastric juice secretion and enzyme production - Helping treat Small Intestinal Bacterial Overgrowth (SIBO) - Managing digestive discomfort, bloating, and IBS symptoms
Anti-inflammatory and Antioxidant Effects
The oil provides significant protective benefits through: - Powerful antioxidant activity that fights free radicals - Reduction of inflammatory markers in the body - Protection against oxidative stress-related conditions
Respiratory Support
It aids respiratory health by: - Loosening mucus and phlegm - Suppressing coughs and throat irritation - Supporting overall respiratory tract function
Additional Benefits
Skin Health - Improves conditions like psoriasis, acne, and eczema - Supports wound healing through antibacterial action - Provides anti-aging benefits through antioxidant properties
Cardiovascular Health Studies show oregano oil may help: - Reduce LDL (bad) cholesterol levels - Support overall heart health
Pain Management The oil demonstrates effectiveness in: - Reducing inflammation-related pain - Managing muscle discomfort - Providing topical pain relief
Safety Note
While oregano oil is generally safe, it's highly concentrated and should be properly diluted before use Consult a healthcare provider before starting supplementation, especially if taking other medications.
-
@ ac6f9572:8a6853dd
2025-02-13 01:55:20Freedom Tech, Privacy, Sound Money, and Culture: How to Find Your Tribe?
Keeping up with everything happening in Bitcoin isn’t easy, even if you’ve been around for a while. The pace is relentless: stream of events, discussions, projects, and updates, not to mention the noise on social media...
Date: 02/12/2025
One of the most efficient options to expand your knowledge and truly connect with people actively working in the space is through direct interactions, whether they’re happening at large conferences or smaller, semi-official meetups. But let’s be honest: finding all meaningful events can be a mess.
Take, for example, the 'BTC Events Map,’ which already lists over 550 Bitcoin-only gatherings worldwide. This simple but very useful resource, put together by Satlantis, can help many of us plan our trips throughout the year. However, if you don’t know about its existence and rely solely on a search engine—whether Google or Brave—you’ll likely end up frustrated (and unfortunately missing many great opportunities to meet with others and learn).
Search for 'bitcoin events,' and you’ll get a mix of irrelevant crypto, fintech, and Web3 results, with Bitcoin-related stuff buried somewhere in the middle, if at all.. Well, it’s really tough to find what you’re actually looking for.
That’s why word of mouth and trusted communities are so important. Sometimes, the best way to hear about an event is directly from people you know.
One of those that flew under my radar was SatsNFacts.
It wasn’t listed on many typical event aggregators or any big news-promo sites. It mostly spread peer-to-peer and through the main channels on Nostr.
I was ‘lucky’ enough to hear about it just in time to plan the trip from Europe to Thailand. Now, I’d like to briefly share my experience with you—everything that, in my opinion, made this event truly stand out.
A Journey to Southeast Asia: Where Builders and Artists Collide.
Approximately 10,176 kilometers, 14 hours of travel, and finally three days spent at SatsNFacts—"Thailand’s first Bitcoin Technical Unconference”.
The event ran from February 8 to 10 in Chiang Mai (the largest city in northern Thailand). Held at Weave Artisan Society, a 700 sq.m venue that used to be an ice factory, it smoothly combined pleasant outdoors with an industrial-style, two-floor indoor area, creating a unique and very practical setup.
While its was billed as a “Technical Unconference,” in practice it nicely connected the developer-based ecosystem with different aspects of culture and art.
Each day, from 10 am to 6 pm, the agenda—shaped directly by attendees—was packed with various presentations, group chats, learning session, hackathons, and actionable workshops.
With many options available (around 10-20 topics per day), I couldn’t attend everything, but here are a few more technical sessions I joined and found especially worthwhile:
- Liana Workshop (long-term security, recovery, and inheritance),
- TollGates (streaming sats for internet access),
- Open Vault (enterprise wallet interface),
- Yaki Honne (decentralized media),
- Nostr Proxies (Epoxy, WebSocket and relay monetization).
- Silent payments (simplified payment experiences without compromising privacy).
As mentioned earlier, SatsNFacts wasn’t just about Bitcoin tech. Some topics focused on community aspects as well. Two discussions I joined highlighted Bitcoin adoption ⚡ in for example Bali and Thailand, showing how sound money, integrity, and consistent work can solve real problems in these regions. Impressive stuff! Here you can learn more:
- HuaiPhueng on Geyser + "Bitcoin City" (their short video).
- Bitcoin Indonesia & Bitcoin House Bali (all in one on GitHub)
Now, the art gallery, to continue with less technical aspects of SatsNFacts 🎨
This nicely-organized space located on the ground floor, near cozy coworking and networking spots, was for me a real gem. Indeed, adding a creative vibe to the entire event.
Around 30 unique works from local and international artists were on display, all inspired by themes of freedom and privacy. Though I don’t see myself as a typical 'artist', I was honored to have some of my own pieces exhibited there as well (a short video below).
One of the highlights was meeting local Thai artists, especially Siritravelsketch, who travelled six hours by train just one way to attend two days of the event.
Her stunning paintings, created using just a bamboo stick and ink, are deeply inspired by Thai architecture and culture. While some of her pre-prepared pieces hung in the gallery, she also painted a few new works on the spot during her visit. Truly spectacular!
I also had the chance to reconnect with Satoshi Builds, who made many great sketches during this event, and with BitPopArt, a Dutch artist who, just like me, chosen a nomadic lifestyle yet has been clearly considering Thailand his 'second home' as well for several years now. By the way, ✍️ here's his short summary of the event, focusing more on the artistic side of SatsNFacts: "Art exhibition in Chiang Mai".
All in all, spending my time in many meaningful conversations and seeing so many deep artworks in one place filled me with hope and positive energy. THANK YOU, EVERYONE!
(presented artworks by for example: Agi Choote, Samhain, Zed Erwan, Existing Sprinkles, AZA 21m, BitPopArt.)
Mr. Rabbit in Thailand...
Monday, the final evening, and SatsNFacts got one more item on its agenda rooted in creative expression and independent art.
Representing Bitcoin FilmFest (a grassroots project created by an amazing group of freedom fighters and activists 🐇🧡), since I was the only one from our team in Thailand, in one of the rooms upstairs, I put together a mini cinematic experience.
Seven trailers and eleven shorts, including for example:
- NO MORE INFLATION, HUMMINGBIRD, PARALLEL SPACE, UNBANKABLE, THE LEGEND OF LANDI (🎬 some of the trailers).
- BITCOIN A NEW HOPE, SATOSHI NAKAMOTO - THE CREATOR OF BITCOIN, MAXIS CLUB SHOW - CHAPTER ONE, THE GREATEST HEIST IN HISTORY, HODL, THE ANATOMY OF BITCOIN – GENESIS BLOCK (📺 some of the presented shorts)
With around 10-15 participants, the response was positive, and we ended up spending an extra 10-maybe-20 minutes discussing the challenges and opportunities in Bitcoin-powered filmmaking, as well as the upcoming edition of BFF25 (the annual festival we're organizing this May in Warsaw, Poland).
Substance Over Hype. Gatherings That Matter.
SatsNFacts made a solid reminder that Bitcoin events can help build a truly sovereign future while bringing together developers and artistic souls alike.
The mix of technical depth and creative energy—free from the shiny gossip that floods many social channels—made it a truly meaningful experience.
SatsNFacts set a high standard, and I hope to see more events like it in the future. More unconferences, more cultural and community-driven gatherings.
Here's to more signal, less noise!!!
Big congrats to everyone who made the first SatsNFacts happen 👏 Respect especially to the organizers! You pulled off something truly special!
BTC Your Mind. Let it Beat.
Şela @AZA_21M
💡
Did you enjoy this article? Zap me some sats. No amount is small :) Lightning wallet:
aza21m@getalby.com
Original Article: https://europeanbitcoiners.com/sats-and-facts-short-coverage-of-the-first-bitcoin-unconference-in-thailand/
english #opinion #events #bitcoin #nostr #freedom #conference #siamstr #asia #thailand
originally posted at https://stacker.news/items/884317
-
@ b17fccdf:b7211155
2025-01-21 18:22:51😱 Did you recently find this signature verification error when you tried to update your MiniBolt repositories with ->
sudo apt update
? 💥🚨👇🔧 Don't worry, that's because Tor renewed its signing key since it expired last 07/15, just renew your keyring by following the next steps to solve this problem:
~ > CLICK HERE < ~
Enjoy it MiniBolter!💙
-
@ d57360cb:4fe7d935
2025-02-12 19:10:53What’s the difference between the mind that dreams and the mind that you experience reality with? This is a question that floored me when I first began to contemplate it. When I’m in my waking life going about my day to day, I have millions of thoughts flowing through my brain. These thoughts are creating the reality I inhabit. I follow them and live in my version of the world. These thoughts construct my world, they revolve around society, my place in it, the people around me, and the entire world. In that world are millions of stories that connect one structure to another.
This is how we live our lives, we create stories, fantasies, heroes, and villains. One person could paint someone as a hero and another can paint them as a villain. So what is the difference between my dreams and reality? When I dream I’m met with vivid images, structures and stories that seem as real as the life I live. I’ve experienced the same features in dreams as I have in reality. In Lucid dreaming a person has the ability to control a dream, they can alter it and mentally experience whatever their mind conjures up. What if it’s the same in ‘reality’. What if reality is as flimsy as dreams. What if the stories you currently told yourself about your life, or the world you live in were wrong. What if you pushed on the flimsy walls of this ‘reality’.
Maybe you should give them a push and see if they crumble or stand tall.
-
@ 5d4b6c8d:8a1c1ee3
2025-02-12 18:36:48Going off of memory, because I forgot to do this in the morning.
The last thing I ate were Costco samples yesterday afternoon and then I didn't eat again until lunch today. I'm pretty sure those two things were about 20 hours apart.
Score Card
Day 1: 14 hour fast (13 dry) Day 2: 15 hour fast (14 dry) Day 3: 17 hours (16 dry) Day 4: 18 hours (17 dry) Day 5: 18 hours (16 dry) Day 6: 19 hours (16 dry) Day 7: 16 hours (15 dry) Day 8: 18 hours (17 dry) Day 9: 17 hours (17 dry) Day 10: 15 hours (13 dry) Day 11: 20 hours (19 dry) Day 12: 20 hours (17 dry)
This winter storm is going to make getting my steps in a pain, but there's no way I'm letting myself lose the sats that I staked on the challenge.
originally posted at https://stacker.news/items/884000
-
@ b17fccdf:b7211155
2025-01-21 17:02:21The past 26 August, Tor introduced officially a proof-of-work (PoW) defense for onion services designed to prioritize verified network traffic as a deterrent against denial of service (DoS) attacks.
~ > This feature at the moment, is deactivate by default, so you need to follow these steps to activate this on a MiniBolt node:
- Make sure you have the latest version of Tor installed, at the time of writing this post, which is v0.4.8.6. Check your current version by typing
tor --version
Example of expected output:
Tor version 0.4.8.6. This build of Tor is covered by the GNU General Public License (https://www.gnu.org/licenses/gpl-3.0.en.html) Tor is running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.9, Zlib 1.2.13, Liblzma 5.4.1, Libzstd N/A and Glibc 2.36 as libc. Tor compiled with GCC version 12.2.0
~ > If you have v0.4.8.X, you are OK, if not, type
sudo apt update && sudo apt upgrade
and confirm to update.- Basic PoW support can be checked by running this command:
tor --list-modules
Expected output:
relay: yes dirauth: yes dircache: yes pow: **yes**
~ > If you have
pow: yes
, you are OK- Now go to the torrc file of your MiniBolt and add the parameter to enable PoW for each hidden service added
sudo nano /etc/tor/torrc
Example:
```
Hidden Service BTC RPC Explorer
HiddenServiceDir /var/lib/tor/hidden_service_btcrpcexplorer/ HiddenServiceVersion 3 HiddenServicePoWDefensesEnabled 1 HiddenServicePort 80 127.0.0.1:3002 ```
~ > Bitcoin Core and LND use the Tor control port to automatically create the hidden service, requiring no action from the user. We have submitted a feature request in the official GitHub repositories to explore the need for the integration of Tor's PoW defense into the automatic creation process of the hidden service. You can follow them at the following links:
- Bitcoin Core: https://github.com/lightningnetwork/lnd/issues/8002
- LND: https://github.com/bitcoin/bitcoin/issues/28499
More info:
- https://blog.torproject.org/introducing-proof-of-work-defense-for-onion-services/
- https://gitlab.torproject.org/tpo/onion-services/onion-support/-/wikis/Documentation/PoW-FAQ
Enjoy it MiniBolter! 💙
-
@ 6be5cc06:5259daf0
2025-01-21 01:51:46Bitcoin: Um sistema de dinheiro eletrônico direto entre pessoas.
Satoshi Nakamoto
satoshin@gmx.com
www.bitcoin.org
Resumo
O Bitcoin é uma forma de dinheiro digital que permite pagamentos diretos entre pessoas, sem a necessidade de um banco ou instituição financeira. Ele resolve um problema chamado gasto duplo, que ocorre quando alguém tenta gastar o mesmo dinheiro duas vezes. Para evitar isso, o Bitcoin usa uma rede descentralizada onde todos trabalham juntos para verificar e registrar as transações.
As transações são registradas em um livro público chamado blockchain, protegido por uma técnica chamada Prova de Trabalho. Essa técnica cria uma cadeia de registros que não pode ser alterada sem refazer todo o trabalho já feito. Essa cadeia é mantida pelos computadores que participam da rede, e a mais longa é considerada a verdadeira.
Enquanto a maior parte do poder computacional da rede for controlada por participantes honestos, o sistema continuará funcionando de forma segura. A rede é flexível, permitindo que qualquer pessoa entre ou saia a qualquer momento, sempre confiando na cadeia mais longa como prova do que aconteceu.
1. Introdução
Hoje, quase todos os pagamentos feitos pela internet dependem de bancos ou empresas como processadores de pagamento (cartões de crédito, por exemplo) para funcionar. Embora esse sistema seja útil, ele tem problemas importantes porque é baseado em confiança.
Primeiro, essas empresas podem reverter pagamentos, o que é útil em caso de erros, mas cria custos e incertezas. Isso faz com que pequenas transações, como pagar centavos por um serviço, se tornem inviáveis. Além disso, os comerciantes são obrigados a desconfiar dos clientes, pedindo informações extras e aceitando fraudes como algo inevitável.
Esses problemas não existem no dinheiro físico, como o papel-moeda, onde o pagamento é final e direto entre as partes. No entanto, não temos como enviar dinheiro físico pela internet sem depender de um intermediário confiável.
O que precisamos é de um sistema de pagamento eletrônico baseado em provas matemáticas, não em confiança. Esse sistema permitiria que qualquer pessoa enviasse dinheiro diretamente para outra, sem depender de bancos ou processadores de pagamento. Além disso, as transações seriam irreversíveis, protegendo vendedores contra fraudes, mas mantendo a possibilidade de soluções para disputas legítimas.
Neste documento, apresentamos o Bitcoin, que resolve o problema do gasto duplo usando uma rede descentralizada. Essa rede cria um registro público e protegido por cálculos matemáticos, que garante a ordem das transações. Enquanto a maior parte da rede for controlada por pessoas honestas, o sistema será seguro contra ataques.
2. Transações
Para entender como funciona o Bitcoin, é importante saber como as transações são realizadas. Imagine que você quer transferir uma "moeda digital" para outra pessoa. No sistema do Bitcoin, essa "moeda" é representada por uma sequência de registros que mostram quem é o atual dono. Para transferi-la, você adiciona um novo registro comprovando que agora ela pertence ao próximo dono. Esse registro é protegido por um tipo especial de assinatura digital.
O que é uma assinatura digital?
Uma assinatura digital é como uma senha secreta, mas muito mais segura. No Bitcoin, cada usuário tem duas chaves: uma "chave privada", que é secreta e serve para criar a assinatura, e uma "chave pública", que pode ser compartilhada com todos e é usada para verificar se a assinatura é válida. Quando você transfere uma moeda, usa sua chave privada para assinar a transação, provando que você é o dono. A próxima pessoa pode usar sua chave pública para confirmar isso.
Como funciona na prática?
Cada "moeda" no Bitcoin é, na verdade, uma cadeia de assinaturas digitais. Vamos imaginar o seguinte cenário:
- A moeda está com o Dono 0 (você). Para transferi-la ao Dono 1, você assina digitalmente a transação com sua chave privada. Essa assinatura inclui o código da transação anterior (chamado de "hash") e a chave pública do Dono 1.
- Quando o Dono 1 quiser transferir a moeda ao Dono 2, ele assinará a transação seguinte com sua própria chave privada, incluindo também o hash da transação anterior e a chave pública do Dono 2.
- Esse processo continua, formando uma "cadeia" de transações. Qualquer pessoa pode verificar essa cadeia para confirmar quem é o atual dono da moeda.
Resolvendo o problema do gasto duplo
Um grande desafio com moedas digitais é o "gasto duplo", que é quando uma mesma moeda é usada em mais de uma transação. Para evitar isso, muitos sistemas antigos dependiam de uma entidade central confiável, como uma casa da moeda, que verificava todas as transações. No entanto, isso criava um ponto único de falha e centralizava o controle do dinheiro.
O Bitcoin resolve esse problema de forma inovadora: ele usa uma rede descentralizada onde todos os participantes (os "nós") têm acesso a um registro completo de todas as transações. Cada nó verifica se as transações são válidas e se a moeda não foi gasta duas vezes. Quando a maioria dos nós concorda com a validade de uma transação, ela é registrada permanentemente na blockchain.
Por que isso é importante?
Essa solução elimina a necessidade de confiar em uma única entidade para gerenciar o dinheiro, permitindo que qualquer pessoa no mundo use o Bitcoin sem precisar de permissão de terceiros. Além disso, ela garante que o sistema seja seguro e resistente a fraudes.
3. Servidor Timestamp
Para assegurar que as transações sejam realizadas de forma segura e transparente, o sistema Bitcoin utiliza algo chamado de "servidor de registro de tempo" (timestamp). Esse servidor funciona como um registro público que organiza as transações em uma ordem específica.
Ele faz isso agrupando várias transações em blocos e criando um código único chamado "hash". Esse hash é como uma impressão digital que representa todo o conteúdo do bloco. O hash de cada bloco é amplamente divulgado, como se fosse publicado em um jornal ou em um fórum público.
Esse processo garante que cada bloco de transações tenha um registro de quando foi criado e que ele existia naquele momento. Além disso, cada novo bloco criado contém o hash do bloco anterior, formando uma cadeia contínua de blocos conectados — conhecida como blockchain.
Com isso, se alguém tentar alterar qualquer informação em um bloco anterior, o hash desse bloco mudará e não corresponderá ao hash armazenado no bloco seguinte. Essa característica torna a cadeia muito segura, pois qualquer tentativa de fraude seria imediatamente detectada.
O sistema de timestamps é essencial para provar a ordem cronológica das transações e garantir que cada uma delas seja única e autêntica. Dessa forma, ele reforça a segurança e a confiança na rede Bitcoin.
4. Prova-de-Trabalho
Para implementar o registro de tempo distribuído no sistema Bitcoin, utilizamos um mecanismo chamado prova-de-trabalho. Esse sistema é semelhante ao Hashcash, desenvolvido por Adam Back, e baseia-se na criação de um código único, o "hash", por meio de um processo computacionalmente exigente.
A prova-de-trabalho envolve encontrar um valor especial que, quando processado junto com as informações do bloco, gere um hash que comece com uma quantidade específica de zeros. Esse valor especial é chamado de "nonce". Encontrar o nonce correto exige um esforço significativo do computador, porque envolve tentativas repetidas até que a condição seja satisfeita.
Esse processo é importante porque torna extremamente difícil alterar qualquer informação registrada em um bloco. Se alguém tentar mudar algo em um bloco, seria necessário refazer o trabalho de computação não apenas para aquele bloco, mas também para todos os blocos que vêm depois dele. Isso garante a segurança e a imutabilidade da blockchain.
A prova-de-trabalho também resolve o problema de decidir qual cadeia de blocos é a válida quando há múltiplas cadeias competindo. A decisão é feita pela cadeia mais longa, pois ela representa o maior esforço computacional já realizado. Isso impede que qualquer indivíduo ou grupo controle a rede, desde que a maioria do poder de processamento seja mantida por participantes honestos.
Para garantir que o sistema permaneça eficiente e equilibrado, a dificuldade da prova-de-trabalho é ajustada automaticamente ao longo do tempo. Se novos blocos estiverem sendo gerados rapidamente, a dificuldade aumenta; se estiverem sendo gerados muito lentamente, a dificuldade diminui. Esse ajuste assegura que novos blocos sejam criados aproximadamente a cada 10 minutos, mantendo o sistema estável e funcional.
5. Rede
A rede Bitcoin é o coração do sistema e funciona de maneira distribuída, conectando vários participantes (ou nós) para garantir o registro e a validação das transações. Os passos para operar essa rede são:
-
Transmissão de Transações: Quando alguém realiza uma nova transação, ela é enviada para todos os nós da rede. Isso é feito para garantir que todos estejam cientes da operação e possam validá-la.
-
Coleta de Transações em Blocos: Cada nó agrupa as novas transações recebidas em um "bloco". Este bloco será preparado para ser adicionado à cadeia de blocos (a blockchain).
-
Prova-de-Trabalho: Os nós competem para resolver a prova-de-trabalho do bloco, utilizando poder computacional para encontrar um hash válido. Esse processo é como resolver um quebra-cabeça matemático difícil.
-
Envio do Bloco Resolvido: Quando um nó encontra a solução para o bloco (a prova-de-trabalho), ele compartilha esse bloco com todos os outros nós na rede.
-
Validação do Bloco: Cada nó verifica o bloco recebido para garantir que todas as transações nele contidas sejam válidas e que nenhuma moeda tenha sido gasta duas vezes. Apenas blocos válidos são aceitos.
-
Construção do Próximo Bloco: Os nós que aceitaram o bloco começam a trabalhar na criação do próximo bloco, utilizando o hash do bloco aceito como base (hash anterior). Isso mantém a continuidade da cadeia.
Resolução de Conflitos e Escolha da Cadeia Mais Longa
Os nós sempre priorizam a cadeia mais longa, pois ela representa o maior esforço computacional já realizado, garantindo maior segurança. Se dois blocos diferentes forem compartilhados simultaneamente, os nós trabalharão no primeiro bloco recebido, mas guardarão o outro como uma alternativa. Caso o segundo bloco eventualmente forme uma cadeia mais longa (ou seja, tenha mais blocos subsequentes), os nós mudarão para essa nova cadeia.
Tolerância a Falhas
A rede é robusta e pode lidar com mensagens que não chegam a todos os nós. Uma transação não precisa alcançar todos os nós de imediato; basta que chegue a um número suficiente deles para ser incluída em um bloco. Da mesma forma, se um nó não receber um bloco em tempo hábil, ele pode solicitá-lo ao perceber que está faltando quando o próximo bloco é recebido.
Esse mecanismo descentralizado permite que a rede Bitcoin funcione de maneira segura, confiável e resiliente, sem depender de uma autoridade central.
6. Incentivo
O incentivo é um dos pilares fundamentais que sustenta o funcionamento da rede Bitcoin, garantindo que os participantes (nós) continuem operando de forma honesta e contribuindo com recursos computacionais. Ele é estruturado em duas partes principais: a recompensa por mineração e as taxas de transação.
Recompensa por Mineração
Por convenção, o primeiro registro em cada bloco é uma transação especial que cria novas moedas e as atribui ao criador do bloco. Essa recompensa incentiva os mineradores a dedicarem poder computacional para apoiar a rede. Como não há uma autoridade central para emitir moedas, essa é a maneira pela qual novas moedas entram em circulação. Esse processo pode ser comparado ao trabalho de garimpeiros, que utilizam recursos para colocar mais ouro em circulação. No caso do Bitcoin, o "recurso" consiste no tempo de CPU e na energia elétrica consumida para resolver a prova-de-trabalho.
Taxas de Transação
Além da recompensa por mineração, os mineradores também podem ser incentivados pelas taxas de transação. Se uma transação utiliza menos valor de saída do que o valor de entrada, a diferença é tratada como uma taxa, que é adicionada à recompensa do bloco contendo essa transação. Com o passar do tempo e à medida que o número de moedas em circulação atinge o limite predeterminado, essas taxas de transação se tornam a principal fonte de incentivo, substituindo gradualmente a emissão de novas moedas. Isso permite que o sistema opere sem inflação, uma vez que o número total de moedas permanece fixo.
Incentivo à Honestidade
O design do incentivo também busca garantir que os participantes da rede mantenham um comportamento honesto. Para um atacante que consiga reunir mais poder computacional do que o restante da rede, ele enfrentaria duas escolhas:
- Usar esse poder para fraudar o sistema, como reverter transações e roubar pagamentos.
- Seguir as regras do sistema, criando novos blocos e recebendo recompensas legítimas.
A lógica econômica favorece a segunda opção, pois um comportamento desonesto prejudicaria a confiança no sistema, diminuindo o valor de todas as moedas, incluindo aquelas que o próprio atacante possui. Jogar dentro das regras não apenas maximiza o retorno financeiro, mas também preserva a validade e a integridade do sistema.
Esse mecanismo garante que os incentivos econômicos estejam alinhados com o objetivo de manter a rede segura, descentralizada e funcional ao longo do tempo.
7. Recuperação do Espaço em Disco
Depois que uma moeda passa a estar protegida por muitos blocos na cadeia, as informações sobre as transações antigas que a geraram podem ser descartadas para economizar espaço em disco. Para que isso seja possível sem comprometer a segurança, as transações são organizadas em uma estrutura chamada "árvore de Merkle". Essa árvore funciona como um resumo das transações: em vez de armazenar todas elas, guarda apenas um "hash raiz", que é como uma assinatura compacta que representa todo o grupo de transações.
Os blocos antigos podem, então, ser simplificados, removendo as partes desnecessárias dessa árvore. Apenas a raiz do hash precisa ser mantida no cabeçalho do bloco, garantindo que a integridade dos dados seja preservada, mesmo que detalhes específicos sejam descartados.
Para exemplificar: imagine que você tenha vários recibos de compra. Em vez de guardar todos os recibos, você cria um documento e lista apenas o valor total de cada um. Mesmo que os recibos originais sejam descartados, ainda é possível verificar a soma com base nos valores armazenados.
Além disso, o espaço ocupado pelos blocos em si é muito pequeno. Cada bloco sem transações ocupa apenas cerca de 80 bytes. Isso significa que, mesmo com blocos sendo gerados a cada 10 minutos, o crescimento anual em espaço necessário é insignificante: apenas 4,2 MB por ano. Com a capacidade de armazenamento dos computadores crescendo a cada ano, esse espaço continuará sendo trivial, garantindo que a rede possa operar de forma eficiente sem problemas de armazenamento, mesmo a longo prazo.
8. Verificação de Pagamento Simplificada
É possível confirmar pagamentos sem a necessidade de operar um nó completo da rede. Para isso, o usuário precisa apenas de uma cópia dos cabeçalhos dos blocos da cadeia mais longa (ou seja, a cadeia com maior esforço de trabalho acumulado). Ele pode verificar a validade de uma transação ao consultar os nós da rede até obter a confirmação de que tem a cadeia mais longa. Para isso, utiliza-se o ramo Merkle, que conecta a transação ao bloco em que ela foi registrada.
Entretanto, o método simplificado possui limitações: ele não pode confirmar uma transação isoladamente, mas sim assegurar que ela ocupa um lugar específico na cadeia mais longa. Dessa forma, se um nó da rede aprova a transação, os blocos subsequentes reforçam essa aceitação.
A verificação simplificada é confiável enquanto a maioria dos nós da rede for honesta. Contudo, ela se torna vulnerável caso a rede seja dominada por um invasor. Nesse cenário, um atacante poderia fabricar transações fraudulentas que enganariam o usuário temporariamente até que o invasor obtivesse controle completo da rede.
Uma estratégia para mitigar esse risco é configurar alertas nos softwares de nós completos. Esses alertas identificam blocos inválidos, sugerindo ao usuário baixar o bloco completo para confirmar qualquer inconsistência. Para maior segurança, empresas que realizam pagamentos frequentes podem preferir operar seus próprios nós, reduzindo riscos e permitindo uma verificação mais direta e confiável.
9. Combinando e Dividindo Valor
No sistema Bitcoin, cada unidade de valor é tratada como uma "moeda" individual, mas gerenciar cada centavo como uma transação separada seria impraticável. Para resolver isso, o Bitcoin permite que valores sejam combinados ou divididos em transações, facilitando pagamentos de qualquer valor.
Entradas e Saídas
Cada transação no Bitcoin é composta por:
- Entradas: Representam os valores recebidos em transações anteriores.
- Saídas: Correspondem aos valores enviados, divididos entre os destinatários e, eventualmente, o troco para o remetente.
Normalmente, uma transação contém:
- Uma única entrada com valor suficiente para cobrir o pagamento.
- Ou várias entradas combinadas para atingir o valor necessário.
O valor total das saídas nunca excede o das entradas, e a diferença (se houver) pode ser retornada ao remetente como troco.
Exemplo Prático
Imagine que você tem duas entradas:
- 0,03 BTC
- 0,07 BTC
Se deseja enviar 0,08 BTC para alguém, a transação terá:
- Entrada: As duas entradas combinadas (0,03 + 0,07 BTC = 0,10 BTC).
- Saídas: Uma para o destinatário (0,08 BTC) e outra como troco para você (0,02 BTC).
Essa flexibilidade permite que o sistema funcione sem precisar manipular cada unidade mínima individualmente.
Difusão e Simplificação
A difusão de transações, onde uma depende de várias anteriores e assim por diante, não representa um problema. Não é necessário armazenar ou verificar o histórico completo de uma transação para utilizá-la, já que o registro na blockchain garante sua integridade.
10. Privacidade
O modelo bancário tradicional oferece um certo nível de privacidade, limitando o acesso às informações financeiras apenas às partes envolvidas e a um terceiro confiável (como bancos ou instituições financeiras). No entanto, o Bitcoin opera de forma diferente, pois todas as transações são publicamente registradas na blockchain. Apesar disso, a privacidade pode ser mantida utilizando chaves públicas anônimas, que desvinculam diretamente as transações das identidades das partes envolvidas.
Fluxo de Informação
- No modelo tradicional, as transações passam por um terceiro confiável que conhece tanto o remetente quanto o destinatário.
- No Bitcoin, as transações são anunciadas publicamente, mas sem revelar diretamente as identidades das partes. Isso é comparável a dados divulgados por bolsas de valores, onde informações como o tempo e o tamanho das negociações (a "fita") são públicas, mas as identidades das partes não.
Protegendo a Privacidade
Para aumentar a privacidade no Bitcoin, são adotadas as seguintes práticas:
- Chaves Públicas Anônimas: Cada transação utiliza um par de chaves diferentes, dificultando a associação com um proprietário único.
- Prevenção de Ligação: Ao usar chaves novas para cada transação, reduz-se a possibilidade de links evidentes entre múltiplas transações realizadas pelo mesmo usuário.
Riscos de Ligação
Embora a privacidade seja fortalecida, alguns riscos permanecem:
- Transações multi-entrada podem revelar que todas as entradas pertencem ao mesmo proprietário, caso sejam necessárias para somar o valor total.
- O proprietário da chave pode ser identificado indiretamente por transações anteriores que estejam conectadas.
11. Cálculos
Imagine que temos um sistema onde as pessoas (ou computadores) competem para adicionar informações novas (blocos) a um grande registro público (a cadeia de blocos ou blockchain). Este registro é como um livro contábil compartilhado, onde todos podem verificar o que está escrito.
Agora, vamos pensar em um cenário: um atacante quer enganar o sistema. Ele quer mudar informações já registradas para beneficiar a si mesmo, por exemplo, desfazendo um pagamento que já fez. Para isso, ele precisa criar uma versão alternativa do livro contábil (a cadeia de blocos dele) e convencer todos os outros participantes de que essa versão é a verdadeira.
Mas isso é extremamente difícil.
Como o Ataque Funciona
Quando um novo bloco é adicionado à cadeia, ele depende de cálculos complexos que levam tempo e esforço. Esses cálculos são como um grande quebra-cabeça que precisa ser resolvido.
- Os “bons jogadores” (nós honestos) estão sempre trabalhando juntos para resolver esses quebra-cabeças e adicionar novos blocos à cadeia verdadeira.
- O atacante, por outro lado, precisa resolver quebra-cabeças sozinho, tentando “alcançar” a cadeia honesta para que sua versão alternativa pareça válida.
Se a cadeia honesta já está vários blocos à frente, o atacante começa em desvantagem, e o sistema está projetado para que a dificuldade de alcançá-los aumente rapidamente.
A Corrida Entre Cadeias
Você pode imaginar isso como uma corrida. A cada bloco novo que os jogadores honestos adicionam à cadeia verdadeira, eles se distanciam mais do atacante. Para vencer, o atacante teria que resolver os quebra-cabeças mais rápido que todos os outros jogadores honestos juntos.
Suponha que:
- A rede honesta tem 80% do poder computacional (ou seja, resolve 8 de cada 10 quebra-cabeças).
- O atacante tem 20% do poder computacional (ou seja, resolve 2 de cada 10 quebra-cabeças).
Cada vez que a rede honesta adiciona um bloco, o atacante tem que "correr atrás" e resolver mais quebra-cabeças para alcançar.
Por Que o Ataque Fica Cada Vez Mais Improvável?
Vamos usar uma fórmula simples para mostrar como as chances de sucesso do atacante diminuem conforme ele precisa "alcançar" mais blocos:
P = (q/p)^z
- q é o poder computacional do atacante (20%, ou 0,2).
- p é o poder computacional da rede honesta (80%, ou 0,8).
- z é a diferença de blocos entre a cadeia honesta e a cadeia do atacante.
Se o atacante está 5 blocos atrás (z = 5):
P = (0,2 / 0,8)^5 = (0,25)^5 = 0,00098, (ou, 0,098%)
Isso significa que o atacante tem menos de 0,1% de chance de sucesso — ou seja, é muito improvável.
Se ele estiver 10 blocos atrás (z = 10):
P = (0,2 / 0,8)^10 = (0,25)^10 = 0,000000095, (ou, 0,0000095%).
Neste caso, as chances de sucesso são praticamente nulas.
Um Exemplo Simples
Se você jogar uma moeda, a chance de cair “cara” é de 50%. Mas se precisar de 10 caras seguidas, sua chance já é bem menor. Se precisar de 20 caras seguidas, é quase impossível.
No caso do Bitcoin, o atacante precisa de muito mais do que 20 caras seguidas. Ele precisa resolver quebra-cabeças extremamente difíceis e alcançar os jogadores honestos que estão sempre à frente. Isso faz com que o ataque seja inviável na prática.
Por Que Tudo Isso é Seguro?
- A probabilidade de sucesso do atacante diminui exponencialmente. Isso significa que, quanto mais tempo passa, menor é a chance de ele conseguir enganar o sistema.
- A cadeia verdadeira (honesta) está protegida pela força da rede. Cada novo bloco que os jogadores honestos adicionam à cadeia torna mais difícil para o atacante alcançar.
E Se o Atacante Tentar Continuar?
O atacante poderia continuar tentando indefinidamente, mas ele estaria gastando muito tempo e energia sem conseguir nada. Enquanto isso, os jogadores honestos estão sempre adicionando novos blocos, tornando o trabalho do atacante ainda mais inútil.
Assim, o sistema garante que a cadeia verdadeira seja extremamente segura e que ataques sejam, na prática, impossíveis de ter sucesso.
12. Conclusão
Propusemos um sistema de transações eletrônicas que elimina a necessidade de confiança, baseando-se em assinaturas digitais e em uma rede peer-to-peer que utiliza prova de trabalho. Isso resolve o problema do gasto duplo, criando um histórico público de transações imutável, desde que a maioria do poder computacional permaneça sob controle dos participantes honestos. A rede funciona de forma simples e descentralizada, com nós independentes que não precisam de identificação ou coordenação direta. Eles entram e saem livremente, aceitando a cadeia de prova de trabalho como registro do que ocorreu durante sua ausência. As decisões são tomadas por meio do poder de CPU, validando blocos legítimos, estendendo a cadeia e rejeitando os inválidos. Com este mecanismo de consenso, todas as regras e incentivos necessários para o funcionamento seguro e eficiente do sistema são garantidos.
Faça o download do whitepaper original em português: https://bitcoin.org/files/bitcoin-paper/bitcoin_pt_br.pdf
-
@ 8d34bd24:414be32b
2025-02-12 17:38:19All of us who have truly put our faith in the Lord Jesus Christ want to serve Him, but we all live busy lives. We all get distracted by making a living, taking care of our families, and other good things, but too often we spend so much time on the good that we miss out on the best (see “Don’t Be Like Martha”). In this previous post, I wrote about how we don’t want to live. In this post, I’ll write about what the Bible says about living a life wholly devoted to God.
Many of us wonder, “Are we fully serving God if we aren’t in full time ministry, if we aren’t a pastor/priest, missionary, or if we don’t work for a Christian ministry?” There are many ways we can serve God. Sometimes we are called to a Christian “job,” but other times we serve God in other ways.
Let the word of Christ richly dwell within you, with all wisdom teaching and admonishing one another with psalms and hymns and spiritual songs, singing with thankfulness in your hearts to God. Whatever you do in word or deed, do all in the name of the Lord Jesus, giving thanks through Him to God the Father. (Colossians 3:16-17) {emphasis mine}
The most important thing is that everything we do has a godly focus. We should follow God’s design for marriage and family. We should disciple our children to know and grow in Jesus. We should witness to those with whom we come in contact. We should give to support those who are working in full-time ministry. Even our jobs can be done in service to the Lord, no matter how trivial or unrelated that job might seem.
Whatever you do, do your work heartily, as for the Lord rather than for men, knowing that from the Lord you will receive the reward of the inheritance. It is the Lord Christ whom you serve. (Colossians 3:23-24) {emphasis mine}
I’m an employer. I see the work ethic, or more often the lack of work ethic, in people. I notice those who work hard and always give their best versus those who do the minimum they need to do to keep their job. When a person lets everyone around them know that they are a Christian and then they work harder than everyone else and they are willing to do the undesirable tasks that need to be done, this is noticed and is a good witness. Sadly, too often Christians are known for not working as hard and not going the extra mile. These Christians give Jesus and all Christians a bad name. Whatever job God has given you, do it to the best of your ability. Do the extra task; do the undesirable task; do the task that should’ve been done by someone else. Put in the extra effort even if nobody seems to notice. In most case, even if you aren’t praised, appreciated, or appropriately rewarded, people do notice and your witness is enhanced. In all cases, Jesus notices and you will be rewarded in heaven for representing Him faithfully.
Whether, then, you eat or drink or whatever you do, do all to the glory of God. (1 Corinthians 10:31) {emphasis mine}
We are to do everything we do to the God’s glory. The way we work should glorify God. The way we eat and drink should glorify God. The way we do rest and entertainment should glorify God. The way we interact with others should glorify God. We were designed to glorify God.
Too often we get busy doing life and leave God out of it. It isn’t that we are doing some terrible sin, but it is always wrong to leave God out of our life. We can even do Christian ministry and get so busy doing “God’s work” that we leave God out of it. This can be disastrous and definitely will damage ministry effectiveness. In everything we do, we should listen to God’s leading, whether through Bible reading, prayer, or being still and listening.
The plans of the heart belong to man,\ But the answer of the tongue is from the Lord.\ All the ways of a man are clean in his own sight,\ But the Lord weighs the motives.\ **Commit your works to the Lord\ And your plans will be established. (Proverbs 16:1-3) {emphasis mine}
Part of doing everything in and to the Lord is changing our hearts and minds. Psalm 37 lists several actions we can take in serving the Lord and becoming more like Him.
Delight yourself in the Lord;\ And He will give you the desires of your heart.\ *Commit your way to the Lord*,\ Trust also in Him, and He will do it.\ He will bring forth your righteousness as the light\ And your judgment as the noonday.\ *Rest in the Lord and wait patiently for Him*;\ Do not fret because of him who prospers in his way,\ Because of the man who carries out wicked schemes.\ **Cease from anger and forsake wrath;\ Do not fret; it leads only to evildoing. (Psalm 37:4-8) {emphasis mine}
If we delight in the Lord, commit our way to the Lord, trust in Him, rest in the Lord, and wait patiently for the Lord, we will be in the right mind to serve Him in all that we do. It will also help us avoid the things that draw us away from the Lord. We are called to not fret, to cease from anger, and to forsake wrath. Fretting, anger, and wrath hurt our witness and draw us away from God. They are a sign that our hearts are not in tune with God and that we need to turn back to Him. They are a sign that we are not trusting in Him nor are we following His will.
Sometimes believers wonder if they are succeeding in doing anything for the Lord because they are shy and not good at witnessing or because they have personal circumstances (like sickness of themselves or their family members) that don’t allow them to do much. That doesn’t mean there is nothing these believers can do. We can support those doing the mission of God. We can give money to support missionaries, churches, and Christian ministries. We can house a missionary while they are on break. We can do behind the scenes tasks like cleaning, accounting, organizing, planning, etc.
Most importantly, we can all pray. Prayer should be a constant part of every day, whether we are infirm and unable to leave our bed, whether we are so busy we don’t have five minutes to sit and take a break, or whether we are in full time Christian ministry. We can’t faithfully serve God without prayer.
Beloved, you are acting faithfully in whatever you accomplish for the brethren, and especially when they are strangers; and they have testified to your love before the church. You will do well to send them on their way in a manner worthy of God. For they went out for the sake of the Name, accepting nothing from the Gentiles. Therefore we ought to support such men, so that we may be fellow workers with the truth. (3 John 1:5-8) {emphasis mine}
Anyone who supports those in ministry will receive similar rewards to those in ministry because they are all working together to fulfill God’s will.
He who receives a prophet in the name of a prophet shall receive a prophet’s reward; and he who receives a righteous man in the name of a righteous man shall receive a righteous man’s reward. (Matthew 10:41)
We often feel like we are failing God. We feel that we are making zero difference for the kingdom. If you are not growing in your faith, knowledge, and relationship with God, there may be some truth in this, but we also may be listening to the accuser, Satan. Keep in mind that every little thing you do for Jesus or for others, because of your faith in Jesus, is counted as faithful service to Him.
“Then the King will say to those on His right, ‘Come, you who are blessed of My Father, inherit the kingdom prepared for you from the foundation of the world. For I was hungry, and you gave Me something to eat; I was thirsty, and you gave Me something to drink; I was a stranger, and you invited Me in; naked, and you clothed Me; I was sick, and you visited Me; I was in prison, and you came to Me.’ Then the righteous will answer Him, ‘Lord, when did we see You hungry, and feed You, or thirsty, and give You something to drink? And when did we see You a stranger, and invite You in, or naked, and clothe You? When did we see You sick, or in prison, and come to You?’ The King will answer and say to them, ‘Truly I say to you, to the extent that you did it to one of these brothers of Mine, even the least of them, you did it to Me.’ (Matthew 25:34-40) {emphasis mine}
Turn to Jesus. Pray to Jesus. Read His word —the Bible. Make Him a part of everything you do. Follow His leading. Join God in what He is doing.
May God bless you and lead you in the path He designed you to take.
Trust Jesus.
-
@ 3f770d65:7a745b24
2025-01-19 21:48:49The recent shutdown of TikTok in the United States due to a potential government ban serves as a stark reminder how fragile centralized platforms truly are under the surface. While these platforms offer convenience, a more polished user experience, and connectivity, they are ultimately beholden to governments, corporations, and other authorities. This makes them vulnerable to censorship, regulation, and outright bans. In contrast, Nostr represents a shift in how we approach online communication and content sharing. Built on the principles of decentralization and user choice, Nostr cannot be banned, because it is not a platform—it is a protocol.
PROTOCOLS, NOT PLATFORMS.
At the heart of Nostr's philosophy is user choice, a feature that fundamentally sets it apart from legacy platforms. In centralized systems, the user experience is dictated by a single person or governing entity. If the platform decides to filter, censor, or ban specific users or content, individuals are left with little action to rectify the situation. They must either accept the changes or abandon the platform entirely, often at the cost of losing their social connections, their data, and their identity.
What's happening with TikTok could never happen on Nostr. With Nostr, the dynamics are completely different. Because it is a protocol, not a platform, no single entity controls the ecosystem. Instead, the protocol enables a network of applications and relays that users can freely choose from. If a particular application or relay implements policies that a user disagrees with, such as censorship, filtering, or even government enforced banning, they are not trapped or abandoned. They have the freedom to move to another application or relay with minimal effort.
THIS IS POWERFUL.
Take, for example, the case of a relay that decides to censor specific content. On a legacy platform, this would result in frustration and a loss of access for users. On Nostr, however, users can simply connect to a different relay that does not impose such restrictions. Similarly, if an application introduces features or policies that users dislike, they can migrate to a different application that better suits their preferences, all while retaining their identity and social connections.
The same principles apply to government bans and censorship. A government can ban a specific application or even multiple applications, just as it can block one relay or several relays. China has implemented both tactics, yet Chinese users continue to exist and actively participate on Nostr, demonstrating Nostr's ability to resistant censorship.
How? Simply, it turns into a game of whack-a-mole. When one relay is censored, another quickly takes its place. When one application is banned, another emerges. Users can also bypass these obstacles by running their own relays and applications directly from their homes or personal devices, eliminating reliance on larger entities or organizations and ensuring continuous access.
AGAIN, THIS IS POWERUFL.
Nostr's open and decentralized design makes it resistant to the kinds of government intervention that led to TikTok's outages this weekend and potential future ban in the next 90 days. There is no central server to target, no company to regulate, and no single point of failure. (Insert your CEO jokes here). As long as there are individuals running relays and applications, users continue creating notes and sending zaps.
Platforms like TikTok can be silenced with the stroke of a pen, leaving millions of users disconnected and abandoned. Social communication should not be silenced so incredibly easily. No one should have that much power over social interactions.
Will we on-board a massive wave of TikTokers in the coming hours or days? I don't know.
TikTokers may not be ready for Nostr yet, and honestly, Nostr may not be ready for them either. The ecosystem still lacks the completely polished applications, tools, and services they’re accustomed to. This is where we say "we're still early". They may not be early adopters like the current Nostr user base. Until we bridge that gap, they’ll likely move to the next centralized platform, only to face another government ban or round of censorship in the future. But eventually, there will come a tipping point, a moment when they’ve had enough. When that time comes, I hope we’re prepared. If we’re not, we risk missing a tremendous opportunity to onboard people who genuinely need Nostr’s freedom.
Until then, to all of the Nostr developers out there, keep up the great work and keep building. Your hard work and determination is needed.
-
@ 88cc134b:5ae99079
2025-02-12 17:23:02aaaaaa
-
@ d61f3bc5:0da6ef4a
2025-02-12 16:57:44Micropayments on the Internet have been theorized for decades. However, it wasn’t until the emergence of Nostr that we’ve finally seen them deployed at scale. Nostr is still in its infancy, yet we are already witnessing an explosion of apps built on top of this open protocol. And most of them are featuring zaps! With the recent Primal 2.1 release, Nostr developers now have the option to enhance the experience for their users by integrating a Nostr-powered bitcoin wallet.
There is no doubt that micropayments add a new dimension to consumer apps. The incumbents have realized this and are rushing to add payments to their closed platforms. It won't be long before apps that don’t include built-in payments feel dated or outright broken. The question is not if apps of the future will have built-in payments, but what kind of payments they will be. Given that open networks have a tendency to win, our bet is that apps of the future will be powered by Bitcoin. Let’s see how Primal can help.
Primal Wallet
Our vision for Primal Wallet is simple: deliver the smoothest transactional bitcoin wallet, endowed with expert Nostr skills. The wallet leverages Nostr’s open social graph as a de facto public lightning directory, while offering the highest level of user experience for Nostr’s rich content. For example, the user can scroll through the transaction list, select a zap, and drill straight into the conversation thread where the zap originated. The whole flow feels perfectly natural.
Since we launched Primal Wallet in December 2023, the user response has been incredibly positive. People love the idea of being able to post something on Nostr, get zaps from plebs around the world, then buy a coffee or a meal with those sats - all from the same app.
Having a bitcoin wallet with social skills resonated strongly with users, so Primal Wallet grew rapidly in popularity and usage. Since the launch, we have processed 1,338,460 transactions, with 238,916 just in the past month alone. This rivals some of the leading bitcoin wallets, and we are just getting started! We hear from many bitcoin OGs that they are using Primal Wallet as their transactional daily driver. Bullish.
All this is great, but something has been missing. Our users demanded the ability to connect Primal Wallet to other Nostr apps, so they can zap from anywhere in Nostr’s growing ecosystem.
Zapping from Any Nostr App
For an existing Primal user, connecting the wallet to a new Nostr app can now be done in two clicks. Let’s take a look at how this is done from Olas, one of the most exciting new apps on Nostr:
Yes. Click, click. And you can start zapping!
Such smooth integration of payments is not available in any competing technology stack. Tradfi, fintech, crypto, etc., have nothing on Bitcoin and Nostr. Two clicks and your external wallet is connected. I’ll give you a moment now to allow for this new reality to settle in.
Primal enables you to connect any number of external apps and manage them from wallet settings:
Note that you can set your daily spend budget for each app or revoke its access at any time.
How This Works
So, what is this sorcery? How does it work under the hood?
Connecting Nostr apps to external wallets is accomplished via the Nostr Wallet Connect protocol. It utilizes Nostr’s public relay infrastructure to enable communication between apps and wallets. You can learn more about this protocol here, and access developer docs here.
The smooth, two-click connection setup UX is implemented through deep links between Primal and the external app. Here’s the deep link that the external app needs to call to invoke this feature:
nostrnwc+primal://connect?appicon=[icon_url]&appname=[app_name]&callback=[callback_string]
After the user clicks “Create Wallet Connection” in Primal, the Primal app calls the deep link defined in the callback, and passes the NWC connection string. That's all that the external app needs to make the wallet connection.
What Comes Next?
The Nostr Wallet Connect protocol has been around for almost two years. Several bitcoin wallets implement it and many Nostr apps use it as their main way of enabling payments. What’s new with Primal 2.1 is the elevated user experience. Since Primal is a Nostr-powered wallet, it is aware of all the relevant metadata for each transaction: Nostr zaps, users, and the related events. Primal indexes the entire Nostr network, and now this is open to all Nostr apps that wish to integrate payments.
Nostr keeps expanding and getting better. Its openness enables us to build capabilities that lift all boats. The future is bright; I can’t wait to see how things evolve from here. 🍿🍿🍿
-
@ cff1720e:15c7e2b2
2025-01-19 17:48:02Einleitung\ \ Schwierige Dinge einfach zu erklären ist der Anspruch von ELI5 (explain me like I'm 5). Das ist in unserer hoch technisierten Welt dringend erforderlich, denn nur mit dem Verständnis der Technologien können wir sie richtig einsetzen und weiter entwickeln.\ Ich starte meine Serie mit Nostr, einem relativ neuen Internet-Protokoll. Was zum Teufel ist ein Internet-Protokoll? Formal beschrieben sind es internationale Standards, die dafür sorgen, dass das Internet seit über 30 Jahren ziemlich gut funktioniert. Es ist die Sprache, in der sich die Rechner miteinander unterhalten und die auch Sie täglich nutzen, vermutlich ohne es bewusst wahrzunehmen. http(s) transportiert ihre Anfrage an einen Server (z.B. Amazon), und html sorgt dafür, dass aus den gelieferten Daten eine schöne Seite auf ihrem Bildschirm entsteht. Eine Mail wird mit smtp an den Mailserver gesendet und mit imap von ihm abgerufen, und da alle den Standard verwenden, funktioniert das mit jeder App auf jedem Betriebssystem und mit jedem Mail-Provider. Und mit einer Mail-Adresse wie roland@pareto.space können sie sogar jederzeit umziehen, egal wohin. Cool, das ist state of the art! Aber warum funktioniert das z.B. bei Chat nicht, gibt es da kein Protokoll? Doch, es heißt IRC (Internet Relay Chat → merken sie sich den Namen), aber es wird so gut wie nicht verwendet. Die Gründe dafür sind nicht technischer Natur, vielmehr wurden mit Apps wie Facebook, Twitter, WhatsApp, Telegram, Instagram, TikTok u.a. bewusst Inkompatibilitäten und Nutzerabhängigkeiten geschaffen um Profite zu maximieren.
Warum Nostr?
Da das Standard-Protokoll nicht genutzt wird, hat jede App ihr eigenes, und wir brauchen eine handvoll Apps um uns mit allen Bekannten auszutauschen. Eine Mobilfunknummer ist Voraussetzung für jedes Konto, damit können die App-Hersteller die Nutzer umfassend tracken und mit dem Verkauf der Informationen bis zu 30 USD je Konto und Monat verdienen. Der Nutzer ist nicht mehr Kunde, er ist das Produkt! Der Werbe-SPAM ist noch das kleinste Problem bei diesem Geschäftsmodell. Server mit Millionen von Nutzerdaten sind ein “honey pot”, dementsprechend oft werden sie gehackt und die Zugangsdaten verkauft. 2024 wurde auch der Twitter-Account vom damaligen Präsidenten Joe Biden gehackt, niemand wusste mehr wer die Nachrichten verfasst hat (vorher auch nicht), d.h. die Authentizität der Inhalte ist bei keinem dieser Anbieter gewährleistet. Im selben Jahr wurde der Telegram-Gründer in Frankreich in Beugehaft genommen, weil er sich geweigert hatte Hintertüren in seine Software einzubauen. Nun kann zum Schutz "unserer Demokratie” praktisch jeder mitlesen, was sie mit wem an Informationen austauschen, z.B. darüber welches Shampoo bestimmte Politiker verwenden.
Und wer tatsächlich glaubt er könne Meinungsfreiheit auf sozialen Medien praktizieren, findet sich schnell in der Situation von Donald Trump wieder (seinerzeit amtierender Präsident), dem sein Twitter-Konto 2021 abgeschaltet wurde (Cancel-Culture). Die Nutzerdaten, also ihr Profil, ihre Kontakte, Dokumente, Bilder, Videos und Audiofiles - gehören ihnen ohnehin nicht mehr sondern sind Eigentum des Plattform-Betreibers; lesen sie sich mal die AGB's durch. Aber nein, keine gute Idee, das sind hunderte Seiten und sie werden permanent geändert. Alle nutzen also Apps, deren Technik sie nicht verstehen, deren Regeln sie nicht kennen, wo sie keine Rechte haben und die ihnen die Resultate ihres Handelns stehlen. Was würde wohl der Fünfjährige sagen, wenn ihm seine ältere Schwester anbieten würde, alle seine Spielzeuge zu “verwalten” und dann auszuhändigen wenn er brav ist? “Du spinnst wohl”, und damit beweist der Knirps mehr Vernunft als die Mehrzahl der Erwachsenen. \ \ Resümee: keine Standards, keine Daten, keine Rechte = keine Zukunft!
\ Wie funktioniert Nostr?
Die Entwickler von Nostr haben erkannt dass sich das Server-Client-Konzept in ein Master-Slave-Konzept verwandelt hatte. Der Master ist ein Synonym für Zentralisierung und wird zum “single point of failure”, der zwangsläufig Systeme dysfunktional macht. In einem verteilten Peer2Peer-System gibt es keine Master mehr sondern nur gleichberechtigte Knoten (Relays), auf denen die Informationen gespeichert werden. Indem man Informationen auf mehreren Relays redundant speichert, ist das System in jeglicher Hinsicht resilienter. Nicht nur die Natur verwendet dieses Prinzip seit Jahrmillionen erfolgreich, auch das Internet wurde so konzipiert (das ARPAnet wurde vom US-Militär für den Einsatz in Kriegsfällen unter massiven Störungen entwickelt). Alle Nostr-Daten liegen auf Relays und der Nutzer kann wählen zwischen öffentlichen (zumeist kostenlosen) und privaten Relays, z.B. für geschlossene Gruppen oder zum Zwecke von Daten-Archivierung. Da Dokumente auf mehreren Relays gespeichert sind, werden statt URL's (Locator) eindeutige Dokumentnamen (URI's = Identifier) verwendet, broken Links sind damit Vergangenheit und Löschungen / Verluste ebenfalls.\ \ Jedes Dokument (Event genannt) wird vom Besitzer signiert, es ist damit authentisch und fälschungssicher und kann nur vom Ersteller gelöscht werden. Dafür wird ein Schlüsselpaar verwendet bestehend aus privatem (nsec) und öffentlichem Schlüssel (npub) wie aus der Mailverschlüsselung (PGP) bekannt. Das repräsentiert eine Nostr-Identität, die um Bild, Namen, Bio und eine lesbare Nostr-Adresse ergänzt werden kann (z.B. roland@pareto.space ), mehr braucht es nicht um alle Ressourcen des Nostr-Ökosystems zu nutzen. Und das besteht inzwischen aus über hundert Apps mit unterschiedlichen Fokussierungen, z.B. für persönliche verschlüsselte Nachrichten (DM → OxChat), Kurznachrichten (Damus, Primal), Blogbeiträge (Pareto), Meetups (Joinstr), Gruppen (Groups), Bilder (Olas), Videos (Amethyst), Audio-Chat (Nostr Nests), Audio-Streams (Tunestr), Video-Streams (Zap.Stream), Marktplätze (Shopstr) u.v.a.m. Die Anmeldung erfolgt mit einem Klick (single sign on) und den Apps stehen ALLE Nutzerdaten zur Verfügung (Profil, Daten, Kontakte, Social Graph → Follower, Bookmarks, Comments, etc.), im Gegensatz zu den fragmentierten Datensilos der Gegenwart.\ \ Resümee: ein offener Standard, alle Daten, alle Rechte = große Zukunft!
\ Warum ist Nostr die Zukunft des Internet?
“Baue Dein Haus nicht auf einem fremden Grundstück” gilt auch im Internet - für alle App-Entwickler, Künstler, Journalisten und Nutzer, denn auch ihre Daten sind werthaltig. Nostr garantiert das Eigentum an den Daten, und überwindet ihre Fragmentierung. Weder die Nutzung noch die kreativen Freiheiten werden durch maßlose Lizenz- und Nutzungsbedingungen eingeschränkt. Aus passiven Nutzern werden durch Interaktion aktive Teilnehmer, Co-Creatoren in einer Sharing-Ökonomie (Value4Value). OpenSource schafft endlich wieder Vertrauen in die Software und ihre Anbieter. Offene Standards ermöglichen den Entwicklern mehr Kooperation und schnellere Entwicklung, für die Anwender garantieren sie Wahlfreiheit. Womit wir letztmalig zu unserem Fünfjährigen zurückkehren. Kinder lieben Lego über alles, am meisten die Maxi-Box “Classic”, weil sie damit ihre Phantasie im Kombinieren voll ausleben können. Erwachsene schenken ihnen dann die viel zu teuren Themenpakete, mit denen man nur eine Lösung nach Anleitung bauen kann. “Was stimmt nur mit meinen Eltern nicht, wann sind die denn falsch abgebogen?" fragt sich der Nachwuchs zu Recht. Das Image lässt sich aber wieder aufpolieren, wenn sie ihren Kindern Nostr zeigen, denn die Vorteile verstehen sogar Fünfjährige.
\ Das neue Internet ist dezentral. Das neue Internet ist selbstbestimmt. Nostr ist das neue Internet.
https://nostr.net/ \ https://start.njump.me/
Hier das Interview zum Thema mit Radio Berliner Morgenröte
-
@ 5670fa7a:760f1d70
2025-02-13 12:56:36Hello WSS Content
-
@ 85bdb587:7339d672
2025-02-12 15:24:11Chart of the Day
While this is a bitcoin focused rag, I think it is important for any of you who read this to begin paying attention to gold markets if you haven't already. There has been an ongoing exodus of physical gold from London vaults and a rapid acceleration of gold being moved to the three biggest vaults in the United States in recent weeks. More gold has flooded into the US vaults over the first two months of this year than at the peak of the flight to safety during the beginning of the COVID lock downs.
This is particularly perplexing considering the fact that equities are flat or up on the year, depending on the index you like to follow. Gold outperformed the S&P 500 significantly in 2024 and its momentum hasn't slowed down a bit in 2025 as the precious metal consistently hits new all time highs. The current correlation to the S&P 500 has only happened two times in history; right now and October of 2007.
Institutional investors and nation states are piling into gold at an unprecedented pace. This signals that they are preparing for something to break. The catalysts for the exodus of gold from London to the US and from paper gold to physical gold are fears over Trump's tariffs, institutions and governments preparing for a potential monetary reset, and fears of a looming liquidity crisis as liquidity in the reverse repo market dries up. Uncertainty and chaos rule the day and we are witnessing a flight to safety.
Many of you are probably asking, "Why isn't bitcoin moving?!" That's a good question. Considering everything mentioned above one would think that bitcoin would be on the move toward new all time highs as well. Having been following bitcoin for twelve years your Uncle Marty has developed some pattern recognition when it comes to this market. Upward bitcoin price movements typically happen in a staircase fashion. Meaning that it trends up and to the right over the long-run with quick bursts to higher levels followed by small corrections and consolidation periods. If I had to guess, we are currently in a consolidation period that should come to an end at some point in the next few months. In recent years, gold has moved higher first and bitcoin has followed. Typically outperforming gold significantly. I find it hard to believe that this relationship is going to end any time soon. Especially considering the geopolitical and economic backdrop.
Luke Gromen Warns Bitcoin Holders: Historical Currency Revaluations Show Speed Matters
During my recent conversation with Luke Gromen, he raised a sobering point about the velocity of monetary regime changes. Drawing from historical examples, including a Ukrainian family who saw their savings devalue from "five cars to one month's groceries" over a single weekend, Luke emphasized that Americans are uniquely blind to how quickly these transitions can occur. The current stress in our financial system - from Treasury market dynamics to global trade tensions - suggests we're approaching a similar inflection point.
*"What if they do it on Friday night like they did with Trump coin and you wake up and gold's up 1,000% by the time you're up on Saturday morning, what are you going to do? You're going to sell your bonds and buy gold on Saturday?"* - Luke Gromen
This warning shouldn't be taken lightly. Those waiting for clear signals before acquiring bitcoin may find themselves locked out of the transition entirely. Luke's analysis suggests that rather than a gradual shift, we're more likely to see a compressed timeframe where major monetary changes happen over days or weeks, not months or years. The recent Trump coin phenomenon, while different in nature, demonstrates how quickly markets can move when sentiment shifts dramatically.
TLDR: Major monetary changes happen fast - don't wait to stack sats.
Check out the full podcast here for more on DeepSeek's impact on AI markets, Colombia's trade negotiations, and Scott Percent's three arrows for economic reform.
Headlines of the Day
U.S. Faces $1.67B Annual Cost Spike on Single Bond Rollover - via X
BlackRock: Bitcoin is Monetary Hedge, Ethereum is Tech Play - via X
Lummis: SBR Could Slash U.S. Debt by 50% in Two Decades - via X
Fold Launches Bitcoin Rewards Visa Credit Card - via Business Wire
Obscura VPN launches with a MacOS product - via nobsbitcoin.com
Bitcoin Lesson of the Day
The SegWit (Segregated Witness) upgrade in August 2017 made two key changes to Bitcoin. First, it moved transaction signatures to a separate part of the data, fixing "transaction malleability" by preventing nodes from modifying transaction IDs. Second, it increased effective block capacity by introducing "weight units" that gave signature data a 75% discount, allowing blocks to grow from 1MB to about 1.8MB.
As a "soft fork," SegWit remained compatible with older Bitcoin software. The upgrade activated at block 481,824 after 95% of miners signaled support. This approach allowed Bitcoin to increase capacity and fix technical issues while maintaining network compatibility.
ICYMI Fold opened the waiting list for the new Bitcoin Rewards Credit Card. Fold cardholders will get unlimited 2% cash back in sats.
Get on the waiting list now before it fills up!
$200k worth of prizes are up for grabs . The Fold Bitcoin Rewards Credit Card waitlist is live!
Ten31, the largest bitcoin-focused investor, has deployed $150M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at ten31.vc/funds.
Subscribe to our YouTube channels and follow us on Nostr and X:
-
@ 9e69e420:d12360c2
2025-01-19 04:48:31A new report from the National Sports Shooting Foundation (NSSF) shows that civilian firearm possession exceeded 490 million in 2022. The total from 1990 to 2022 is estimated at 491.3 million firearms. In 2022, over ten million firearms were domestically produced, leading to a total of 16,045,911 firearms available in the U.S. market.
Of these, 9,873,136 were handguns, 4,195,192 were rifles, and 1,977,583 were shotguns. Handgun availability aligns with the concealed carry and self-defense market, as all states allow concealed carry, with 29 having constitutional carry laws.
-
@ 94a6a78a:0ddf320e
2025-02-12 15:05:48Azzamo is more than just a relay provider—it’s a high-performance network designed to make Nostr faster, smoother, and more reliable for everyone. Whether you're posting notes, zapping sats, sharing media, or sending DMs, Azzamo keeps your Nostr experience seamless and efficient.
Nostr is unstoppable, but not all relays are the same. Some are slow, unreliable, or disappear overnight, while others get overloaded, making message delivery inconsistent. Azzamo is built differently—offering fast, stable, and globally distributed relays to ensure low-latency, high-speed connections, no matter where you are.
🌍 Premium Relays for Maximum Performance
Azzamo Premium Relays are optimized for speed, reliability, and uptime, available exclusively to Premium users:
📡 Azzamo Premium Relays:
- Europe:
wss://relay.azzamo.net
- America:
wss://us.azzamo.net
- Asia:
wss://asia.azzamo.net
Add Azzamo Premium Time to unlock unlimited, high-speed access across these global relays.
🔗 Get Premium: azzamo.net/premium
🆓 Freemium Relays – Free for Everyone
Azzamo believes in keeping Nostr open and accessible to all. That’s why we offer free relays for everyone, with no rate limits for Premium members
📡 Freemium Relays:
- Free Relay:
wss://nostr.azzamo.net
– Open to all. - Inbox Relay:
wss://inbox.azzamo.net
– Reliable for DMs & group messages.
By offering both free and premium options, Azzamo ensures that anyone can use Nostr, while also funding the infrastructure that keeps it running smoothly.
🛡️ Minimal Moderation, Maximum Transparency
Nostr is about free speech, but that doesn’t mean zero moderation. Azzamo follows a minimal moderation policy to keep relays functional and spam-free while maintaining transparency in enforcement.\ \ 🚫 Spam & network abuse\ 🚫 Illegal content (CSAM, fraud, malware, scams)\ 🚫 Impersonation & identity abuse
We also maintain a public Ban API for transparent moderation decisions.
📖 More on our Ban API: azzamo.net/introducing-the-azzamo-ban-api
🚀 Get Started with Azzamo Relays Today!
🔗 Connect now:\ 📡
wss://nostr.azzamo.net
(Freemium Free Relay)\ 📬wss://inbox.azzamo.net
(Freemium Inbox Relay)\ 📡wss://relay.azzamo.net
(Premium Europe Relay)\ 📡wss://us.azzamo.net
(Premium Americas Relay)\ 📡wss://asia.azzamo.net
(Premium Asia Relay)Nostr is growing fast. Make sure your relays can keep up. 🚀
azzamo #grownostr #nostr #relay #relays #premiumrelay #paidrelay
- Europe:
-
@ 5d4b6c8d:8a1c1ee3
2025-02-12 14:36:40Here are today's picks using my proprietary betting strategy at Freebitcoin. For details about what Risk Balanced Odds Arbitrage is and why it works see https://stacker.news/items/342765/r/Undisciplined.
For a hypothetical 1k-ish wager on each match, distribute your sats as follows:
| Outcome 1 | Outcome 2 | Outcome 3 | Bet 1 | Bet 2 | Bet 3 | |--------------|-------------|--------------|-------|-------|-------| | Juventus| Inter Milan| Draw | 294| 435| 303| | Tottenham| Man United| Draw | 406| 357| 266| | Liverpool| Wolves| Draw | 833| 67| 125| | Valladolid| Sevilla| Draw | 222| 500| 289| | Real Betis| Real Sociedad| Draw | 393| 321| 313| | Osasuna| Real Madrid| Draw | 174| 619| 227| | Barcelona| Rayo Vallecano| Draw | 818| 80| 133| | Atletico Madrid| Celta Vigo| Draw | 692| 118| 217|
I'll be curious to see how @Coinsreporter does with his modified RBOA.
On the most recently completed sets of RBOA, I lost 700 sats on about 50k wagered. I'm not sure if that's just normal variance or if it's due to matches not being posted as far in advance, which reduces the early mover bonus.
I still haven't precisely identified where the threshold is, but it might be worth skipping any of these with a "time weight multiplier" lower than 90.
A note of caution about Freebitcoin: they recorded the wrong outcome for last week's Bills vs Ravens game and as of yet have not corrected it. I recall one other instance of something similar happening, so proceed with caution.
This RBOA strategy is largely immune from that problem, but be aware of it when just betting on one outcome.
originally posted at https://stacker.news/items/883708
-
@ c4b5369a:b812dbd6
2025-02-12 12:23:40Unidirectional payment channels revisited
Nodeless lightning - Reduce ecash mints custodial risk
Sats N Facts
The nostr:npub1yrnuj56rnen08zp2h9h7p74ghgjx6ma39spmpj6w9hzxywutevsst7k5cx unconference has just wrapped up. And what a blast it was. In the heart of northern Thailand, developers, researchers, content creators and more, came together to share ideas on how Bitcoin, Nostr and other free protocols are being used everyday to liberate people.
Not only were stories shared from different community leaders on how embracing bitcoin has empowered them and their communities, but a big goal of the unconference was to bring bitcoin engineers and developers from various domains together in one room, unstructured, chaotic, and let them do their thing.
At first, I thought not having a schedule might be boring, but oh boy was I wrong. There was so much stuff going on, it was hard to choose which session I would have to miss!
Luke's Spillman channel proposal
One of the sessions I definitely did not want to miss, was nostr:npub1htnhsay5dmq3r72tukdw72pduzfdcja0yylcajuvnc2uklkhxp8qnz3qac s proposal
Ecash mints funded with Spillman channels: The ultimate nodeless Lightning wallet
.
In true unconference fashion, he announced in the main room that the session was about to start, and that the people that are interested should meet him in the whiteboard corner in 10 minutes. The corner was packed, and Luke explained his proposal.
What's a "Spillman channel"?
Essentially when we are talking about Spillman channels, what is meant are unidirectional payment channels (or CLTV-style channels). An unidirectional payment channel means, only one party can send payments, but not receive, and the other party can only receive, but not send. They also expire after a predetermined amount of time, and must be closed.
At first glance, this might look kinda stupid. After all, we have Poon-Dryja channels that are powering the lightning network. They are bi-directional, do not expire, and can be used to shuffle coins back and forth theorethically an unlimited amount of times.
So, why bother with this stupid one-way channel?
Simplicity is king
People that have worked with lightning channels can sing you a song about complexity, state handling and risks about the current state of bidirectional payment channels. Essentially, There are a lot of requirements on both channel parties when it comes to Liveness (being online) and also state handling (continuous backups).
In some cases, especially when in the context of end-users wanting to perform payments on their mobile phone, they would appreciate it if there was not so much complexity and overhead involved.
The gist of the idea is to combine unidirectional channels and ecash mints to achieve the following:
A self custodial unidirectional payment channel to an ecash mint, massively reducing the senders liveness and state handling requirements when compared to a lightning channel. Sending payments through the mint will be done through swapping some of the channel balance for ecash tokens. At this point, the user is trusting the mint to honor the redemption of these tokens, while the remaining channel balance remains in self custody. This gives them better controll over their funds than just holding their entire balance custodied in the mint. The ecash tokens can then be redeemed to pay a lightning invoice, just the same as it is done now with normal cashu mints.
So this channel, that has no liveness or state management requirements for the sender, and must have a pre-defined close time, seems to be a perfect fit for the following usecase:
- A
sender
receives his salary once a month. He opens a channel that is valid for one month. - The
sender
then can do his daily spending over this channel. He only trusts themint
with the amount for the current outgoing payment while it is swapped for ecash, waiting for redemption. - If the
sender
must receive funds (a refund for example), he can do so into themints
custody, by receiving ecash. He can spend his ecash funds first when doing his next payment, to reduce his custodial exposure. - When the channel expires, or runs out of funds, the
mint
closes the channel.
From a consumer perspective, that just want to receive his salary and make frequent payments afterwards, this usecase seems to make a lot of sense. Obviously from a merchants perspective on the other hand, such a channel doesn't really work. But that's fine, it's not the problem we're trying to solve here.
What do you think of this idea? Be sure to let me know in the comments!
In the next article, we will dive into how such a system can be implemented today, using Bitcoin, Cashu and Lightning. We will also discover how the system can be improved, to make channels non-expiring (A collaborative idea between nostr:npub148jz5r9xujcjpqygk69yl4jqwjqmzgrqly26plktfjy8g4t7xaysj9xhgp and nostr:npub1htnhsay5dmq3r72tukdw72pduzfdcja0yylcajuvnc2uklkhxp8qnz3qac born at nostr:npub1yrnuj56rnen08zp2h9h7p74ghgjx6ma39spmpj6w9hzxywutevsst7k5cx ).
So stay tuned!
- A
-
@ c2827524:5f45b2f7
2025-02-12 12:22:11L’animo umano
Una delle entità più belle che esistono e che, a mio parere, rendono ancor più meraviglioso questo mondo, è l’animo degli esseri umani. È un cocktail fatto di sentimenti, intenzioni, azioni e logica. Quelli che preferisco sono gli animi gentili. Le azioni e le intenzioni devono convergere verso la delicatezza, senza una sbavatura, per essere gentili e io adoro la gentilezza, la riconosco al volo, forse perché non sono delicata. Per niente.
L’animo è forse uno dei più grandi segreti dell’umanità: in genere perché lo si tiene sempre privato, come è anche logico che sia.
C’è un solo fattore che fa rivelare l’animo alle persone, loro malgrado: uno stress test estremo.
Dal febbraio del 2020, lo stress test si è tramutato in un organismo multidimensionale, uscendo dalla fantasia distopica di George Orwell e – loro malgrado – tutti hanno dovuto manifestare l’animo segreto.
Fateci caso: è con il covid-1984 che avete scoperto la vera natura di amici, parenti, sconosciuti o conoscenti.
Stato di eccezione
La distopia non è mica fuoriuscita da un laboratorio di Wuhan, che ha infettato un pangolino, che ha infettato una papera, che al mercato mio padre comprò. Ha origini molto più antiche.
Profondi conoscitori dell’animo umano, in grado di prevedere le reazioni delle masse di fronte ad ogni tipo di evento, potrebbero progettare modelli catastrofici e predeterminare con una precisione disarmante la risposta delle persone comuni. Ad esempio di fronte alla probabilità che quattro aerei impazziscano nei cieli americani di una splendida mattina di settembre, oppure guardando i corpi smembrati di un attentato compiuto da una qualunque “sigla” islamica.
Infine, potrebbero decidere come e quando dare una sferzata finale allo stress test, ad esempio con il pangolino. O era il pipistrello?
È la «forma legale di ciò che non può avere forma legale», più in generale lo spirito disumano dei governanti di oggi, la consuetudine della guerra preventiva, la quale impone con forza che «lo stato di eccezione tende sempre più a presentarsi come il paradigma di governo dominante della politica contemporanea».
Così analizza magistralmente Giorgio Agamben nel II° volume della raccolta Homo Sacer, intitolato per l’appunto Stato di Eccezione.
Stato indegno
Gli esseri umani, fondamentalmente miti e pacifici, tendono a condurre vite “normali” in ogni condizione ambientale.
Un’unica variabile tende ad interferire per cambiare la condizione ambientale: la politica dello stato. E lo fa in maniera sempre negativa.
Lo stato crea emergenze, per poi sbattere il suo (piccolissimo) pene sul tavolo e imporre con forza la soluzione, che tenderà puntualmente a facilitare la propria vita rendendo impossibile quella dei ~~cittadini~~ sudditi.
Le disuguaglianze create hanno poi il solo scopo di mettere esseri miti e pacifici (ma sotto costante pressione) gli uni contro gli altri.
Pensateci: da quanti decenni siete sotto la pressione di una «forma legale di ciò che non può avere forma legale»? Sentendo il Marchese del Grillo «Io so’ io, voi siete un cazzo», probabilmente è qualche secolo che questo stato indegno esiste.
Vera natura o Nuda vita?
Il fatto, poi, che lo stato indegno venga accettato senza fiatare, fa parte di quella serie di reazioni delle masse e che i profondi conoscitori dell’animo umano sfruttano per mantenere il potere.
Si passa poi alle peggiori angherie che lo stato indegno e i suoi agenti perpetrano nei confronti dei ~~cittadini~~ sudditi, alle estreme disparità tra ~~cittadini~~ sudditi e i “servitori” dello stato, chiamati così perché servono lo stato indegno e non i ~~cittadini~~ sudditi.
Prima di arrivare alla sferzata finale dello stress test, persone miti e pacifiche hanno subito così tanti torti da non saperli più contare, ormai fanno parte della normalità. La loro esistenza è ormai ridotta a quello che Walter Benjamin prima e Giorgio Agamben poi definiscono la Nuda Vita, mettendo in analogia i sudditi con i detenuti di Guantanamo, giuridicamente innominabili e inclassificabili, ovvero «oggetto di una pura signoria di fatto».
Il sontuoso master
Nello stato di eccezione in cui viviamo da almeno 50 anni, a parte pochi dotati di un immenso spirito di osservazione (e i profondi conoscitori al potere, chiaro), nessuno di noi ha mai avuto veramente il piacere di conoscere la reale natura delle persone con cui abbiamo scelto di circondarci.
Magari c’era quel “piccolo tarlo”, quella “vocina” che ci ha fatto preferire alcuni piuttosto che altri, ma alla fine ha sempre prevalso l’attitudine mite e pacifica, che ha messo a tacere quella vocina.
covid-1984 ha il merito di aver messo a nudo tutti: vittime e carnefici. Si tratta verosimilmente di un sontuoso master che svelerà la vera natura di ognuno, nessuno escluso. Ahinoi, il master è decennale e siamo appena all'inizio del V° anno accademico.
Istruzioni, prima ancora che l’istruzione
Se c’è un consiglio che mi sento di dare a chi è ancora molto giovane, è proprio quello di non mettere mai a tacere quella “vocina”, per nessun motivo, seppure plausibile. Anche senza rovinare i rapporti, ma l’animo umano va sempre indagato, si deve fare chiarezza sulla vera natura delle persone con cui si decide di fare un percorso di vita.
La scoperta porterà ad evitare tutti quei “servitori” dello stato di cose indegno di essere definito umano. I compliant, gli asserviti, quelli senza spina dorsale o, peggio, che hanno un interesse personale a mantenere lo status quo devono essere evitati a tutti i costi.
È oltremodo doloroso, ma va fatto. Questi indegni devono essere isolati al più presto, in maniera da renderli innocui. Sono loro il vero esercito dello stato indegno, disposti a combattere qualunque guerra pur di rimediare un piccolissimo quanto ridicolo privilegio.
Oggi, i tempi in cui questo esercito si abbassava a tanto per il classico piatto di lenticchie riscaldate, sono un lontanissimo ricordo. covid-1984 ha ulteriormente abbattuto lo standard: ora gli indegni fiancheggiano qualsiasi assurdità in cambio di un piatto di lenticchie rimasticate dalla signoria di fatto.
L’unico risultato possibile è che l'infame stato rafforza il suo potere di controllo e rosicherà uno alla volta i (pochi) diritti e la libertà di chiunque.
Ecco perché bisogna spuntare le armi di questo spregevole stato di cose colpendo l’anello debole, isolandolo. Debole perché non ci crede (nello stato) ma agisce asservito solo per quel piatto di lenticchie (quelle rimasticate e sputate).
La prima volta che si incontrano, la vocina vi metterà di fronte alla sensazione di essere ai limiti di uno scontro frontale: capire da che parte andrà il rivale, per buttarsi in quella opposta ed evitare così uno schianto fatale.
Fatelo: buttatevi dall’altra parte. E scegliete la parte giusta.
-
@ f9cf4e94:96abc355
2025-01-18 06:09:50Para esse exemplo iremos usar: | Nome | Imagem | Descrição | | --------------- | ------------------------------------------------------------ | ------------------------------------------------------------ | | Raspberry PI B+ |
| Cortex-A53 (ARMv8) 64-bit a 1.4GHz e 1 GB de SDRAM LPDDR2, | | Pen drive |
| 16Gb |
Recomendo que use o Ubuntu Server para essa instalação. Você pode baixar o Ubuntu para Raspberry Pi aqui. O passo a passo para a instalação do Ubuntu no Raspberry Pi está disponível aqui. Não instale um desktop (como xubuntu, lubuntu, xfce, etc.).
Passo 1: Atualizar o Sistema 🖥️
Primeiro, atualize seu sistema e instale o Tor:
bash apt update apt install tor
Passo 2: Criar o Arquivo de Serviço
nrs.service
🔧Crie o arquivo de serviço que vai gerenciar o servidor Nostr. Você pode fazer isso com o seguinte conteúdo:
```unit [Unit] Description=Nostr Relay Server Service After=network.target
[Service] Type=simple WorkingDirectory=/opt/nrs ExecStart=/opt/nrs/nrs-arm64 Restart=on-failure
[Install] WantedBy=multi-user.target ```
Passo 3: Baixar o Binário do Nostr 🚀
Baixe o binário mais recente do Nostr aqui no GitHub.
Passo 4: Criar as Pastas Necessárias 📂
Agora, crie as pastas para o aplicativo e o pendrive:
bash mkdir -p /opt/nrs /mnt/edriver
Passo 5: Listar os Dispositivos Conectados 🔌
Para saber qual dispositivo você vai usar, liste todos os dispositivos conectados:
bash lsblk
Passo 6: Formatando o Pendrive 💾
Escolha o pendrive correto (por exemplo,
/dev/sda
) e formate-o:bash mkfs.vfat /dev/sda
Passo 7: Montar o Pendrive 💻
Monte o pendrive na pasta
/mnt/edriver
:bash mount /dev/sda /mnt/edriver
Passo 8: Verificar UUID dos Dispositivos 📋
Para garantir que o sistema monte o pendrive automaticamente, liste os UUID dos dispositivos conectados:
bash blkid
Passo 9: Alterar o
fstab
para Montar o Pendrive Automáticamente 📝Abra o arquivo
/etc/fstab
e adicione uma linha para o pendrive, com o UUID que você obteve no passo anterior. A linha deve ficar assim:fstab UUID=9c9008f8-f852 /mnt/edriver vfat defaults 0 0
Passo 10: Copiar o Binário para a Pasta Correta 📥
Agora, copie o binário baixado para a pasta
/opt/nrs
:bash cp nrs-arm64 /opt/nrs
Passo 11: Criar o Arquivo de Configuração 🛠️
Crie o arquivo de configuração com o seguinte conteúdo e salve-o em
/opt/nrs/config.yaml
:yaml app_env: production info: name: Nostr Relay Server description: Nostr Relay Server pub_key: "" contact: "" url: http://localhost:3334 icon: https://external-content.duckduckgo.com/iu/?u= https://public.bnbstatic.com/image/cms/crawler/COINCU_NEWS/image-495-1024x569.png base_path: /mnt/edriver negentropy: true
Passo 12: Copiar o Serviço para o Diretório de Systemd ⚙️
Agora, copie o arquivo
nrs.service
para o diretório/etc/systemd/system/
:bash cp nrs.service /etc/systemd/system/
Recarregue os serviços e inicie o serviço
nrs
:bash systemctl daemon-reload systemctl enable --now nrs.service
Passo 13: Configurar o Tor 🌐
Abra o arquivo de configuração do Tor
/var/lib/tor/torrc
e adicione a seguinte linha:torrc HiddenServiceDir /var/lib/tor/nostr_server/ HiddenServicePort 80 127.0.0.1:3334
Passo 14: Habilitar e Iniciar o Tor 🧅
Agora, ative e inicie o serviço Tor:
bash systemctl enable --now tor.service
O Tor irá gerar um endereço
.onion
para o seu servidor Nostr. Você pode encontrá-lo no arquivo/var/lib/tor/nostr_server/hostname
.
Observações ⚠️
- Com essa configuração, os dados serão salvos no pendrive, enquanto o binário ficará no cartão SD do Raspberry Pi.
- O endereço
.onion
do seu servidor Nostr será algo como:ws://y3t5t5wgwjif<exemplo>h42zy7ih6iwbyd.onion
.
Agora, seu servidor Nostr deve estar configurado e funcionando com Tor! 🥳
Se este artigo e as informações aqui contidas forem úteis para você, convidamos a considerar uma doação ao autor como forma de reconhecimento e incentivo à produção de novos conteúdos.
-
@ 9673b322:1b75ee9e
2025-02-12 21:50:25This is my test document for nostr publish
Although Sainsbury's was already in the midst of a plan to save £1bn over the next few years, the rise in employer's National Insurance contributions set out in the Budget has also been a factor in this latest restructuring plan.
Add some text
this is is a test
-
@ 8d5ba92c:c6c3ecd5
2025-02-12 09:48:19Keeping up with everything happening in Bitcoin isn’t easy, even if you’ve been around for a while. The pace is relentless: stream of events, discussions, projects, and updates, not to mention the noise on social media...
One of the most efficient options to expand your knowledge and truly connect with people actively working in the space is through direct interactions, whether they’re happening at large conferences or smaller, semi-official meetups. But let’s be honest: finding all meaningful events can be a mess.
Take, for example, the ''BTC Events Map,’ which already lists over 550 Bitcoin-only gatherings worldwide. This simple but very useful resource, put together by Satlantis, can help many of us plan our trips throughout the year. However, if you don’t know about its existence and rely solely on a search engine—whether Google or Brave—you’ll likely end up frustrated (and unfortunately missing many great opportunities to meet with others and learn).
Search for '[bitcoin events],' and you’ll get a mix of irrelevant crypto, fintech, and Web3 results, with Bitcoin-related stuff buried somewhere in the middle, if at all.. Well, it’s really tough to find what you’re actually looking for.
That’s why word of mouth and trusted communities are so important. Sometimes, the best way to hear about an event is directly from people you know.
One of those that flew under my radar was SatsNFacts. It wasn’t listed on many typical event aggregators or any big news-promo sites. It mostly spread peer-to-peer and through the main channels on Nostr.
I was ‘lucky’ enough to hear about it just in time to plan the trip from Europe to Thailand. Now, I’d like to briefly share my experience with you—everything that, in my opinion, made this event truly stand out.
A Journey to Southeast Asia...
Approximately 10,176 kilometers, 14 hours of travel, and finally three days spent at SatsNFacts—"Thailand’s first Bitcoin Technical Unconference”.
The event ran from February 8 to 10 in Chiang Mai (the largest city in northern Thailand). Held at Weave Artisan Society, a 700 sq.m venue that used to be an ice factory, it smoothly combined pleasant outdoors with an industrial-style, two-floor indoor area, creating a unique and very practical setup.
Where Builders and Artists Collide
While its was billed as a “Technical Unconference,” in practice it nicely connected the developer-based ecosystem with different aspects of culture and art.
Each day, from 10 am to 6 pm, the agenda—shaped directly by attendees—was packed with various presentations, group chats, learning session, hackathons, and actionable workshops.
With many options available (around 10-20 topics per day), I couldn’t attend everything, but here are a few more technical sessions I joined and found especially worthwhile:
- Liana Workshop (long-term security, recovery, and inheritance),
- TollGates (streaming sats for internet access),
- Open Vault (enterprise wallet interface),
- Yaki Honne (decentralized media),
- Nostr Proxies (Epoxy, WebSocket and relay monetization).
- Silent payments (simplified payment experiences without compromising privacy).
As mentioned earlier, SatsNFacts wasn’t just about Bitcoin tech. Some topics focused on community aspects as well. Two discussions I joined highlighted Bitcoin adoption ⚡ in for example Bali and Thailand, showing how sound money, integrity, and consistent work can solve real problems in these regions. Impressive stuff! Here you can learn more:
- HuaiPhueng on Geyser + "Bitcoin City" (their short video ).
- Bitcoin Indonesia & Bitcoin House Bali (all in one on GitHub )
Now, the art gallery, to continue with less technical aspects of SatsNFacts 🎨
This nicely-organized space located on the ground floor, near cozy coworking and networking spots, was for me a real gem. Indeed, adding a creative vibe to the entire event.
Around 30 unique works from local and international artists were on display, all inspired by themes of freedom and privacy. Though I don’t see myself as a typical 'artist', I was honored to have some of my own pieces exhibited there as well (a short video 👇).
One of the highlights was meeting local Thai artists, especially Siritravelsketch, who travelled six hours by train just one way to attend two days of the event.
Her stunning paintings, created using just a bamboo stick and ink, are deeply inspired by Thai architecture and culture. While some of her pre-prepared pieces hung in the gallery, she also painted a few new works on the spot during her visit.
Truly spectacular!
I also had the chance to reconnect with Satoshi Builds, who made many great sketches during this event, and with BitPopArt, a Dutch artist who, just like me, chosen a nomadic lifestyle yet has been clearly considering Thailand his 'second home' as well for several years now. By the way, ✍️ here's his short summary of the event, focusing more on the artistic side of SatsNFacts: "Art exhibition in Chiang Mai ".
All in all, spending my time in many meaningful conversations and seeing so many deep artworks in one place filled me with hope and positive energy. THANK YOU, EVERYONE!
https://v.nostr.build/Fy7J510ZaNyMktIX.mp4
(*** presented artworks by for example: Agi Choote, Samhain, Zed Erwan, Existing Sprinkles, AZA 21m , BitPopArt .)
Mr. Rabbit in Thailand...
Monday, the final evening, and SatsNFacts got one more item on its agenda rooted in creative expression and independent art.
Representing Bitcoin FilmFest (a grassroots project created by an amazing group of freedom fighters and activists 🐇🧡), since I was the only one from our team in Thailand, in one of the rooms upstairs, I put together a mini cinematic experience.
Seven trailers and eleven shorts, including for example:
-
NO MORE INFLATION, HUMMINGBIRD, PARALLEL SPACE, UNBANKABLE, THE LEGEND OF LANDI (🎬 some of the trailers).
-
BITCOIN A NEW HOPE, SATOSHI NAKAMOTO - THE CREATOR OF BITCOIN, MAXIS CLUB SHOW - CHAPTER ONE, THE GREATEST HEIST IN HISTORY, HODL, THE ANATOMY OF BITCOIN – GENESIS BLOCK (📺 some of the presented shorts)
With around 10-15 participants, the response was positive, and we ended up spending an extra 10-maybe-20 minutes discussing the challenges and opportunities in Bitcoin-powered filmmaking, as well as the upcoming edition of BFF25 (the annual festival we're organizing this May in Warsaw, Poland).
https://i.nostr.build/RE3mKJacw5vB23V6.png
Substance Over Hype.
SatsNFacts made a solid reminder that Bitcoin events can help build a truly sovereign future while bringing together developers and artistic souls alike.
The mix of technical depth and creative energy—free from the shiny gossip that floods many social channels—made it a truly meaningful experience.
SatsNFacts set a high standard, and I hope to see more events like it in the future. More unconferences, more cultural and community-driven gatherings.
Here's to more signal, less noise!!!
Big congrats to everyone who made the first SatsNFacts happen 👏 Respect especially to the organizers! You pulled off something truly special!
BTC Your Mind. Let it Beat.... Şela
-
@ 2e8970de:63345c7a
2025-02-12 17:50:27originally posted at https://stacker.news/items/883959
-
@ 9967f375:04f9a5e1
2025-02-13 08:39:58El día 13, primer viernes de Cuaresma asistió su Exc. y Real Audiencia en la Capilla Real del Palacio a la Misa, y Sermón, que predicó el Doctor Don Pedro Ramírez del Castillo, Canónigo Penitenciario de la Metropoltana.
GacetadeMéxico #Febrero
-
@ 6389be64:ef439d32
2025-01-16 15:44:06Black Locust can grow up to 170 ft tall
Grows 3-4 ft. per year
Native to North America
Cold hardy in zones 3 to 8
Firewood
- BLT wood, on a pound for pound basis is roughly half that of Anthracite Coal
- Since its growth is fast, firewood can be plentiful
Timber
- Rot resistant due to a naturally produced robinin in the wood
- 100 year life span in full soil contact! (better than cedar performance)
- Fence posts
- Outdoor furniture
- Outdoor decking
- Sustainable due to its fast growth and spread
- Can be coppiced (cut to the ground)
- Can be pollarded (cut above ground)
- Its dense wood makes durable tool handles, boxes (tool), and furniture
- The wood is tougher than hickory, which is tougher than hard maple, which is tougher than oak.
- A very low rate of expansion and contraction
- Hardwood flooring
- The highest tensile beam strength of any American tree
- The wood is beautiful
Legume
- Nitrogen fixer
- Fixes the same amount of nitrogen per acre as is needed for 200-bushel/acre corn
- Black walnuts inter-planted with locust as “nurse” trees were shown to rapidly increase their growth [[Clark, Paul M., and Robert D. Williams. (1978) Black walnut growth increased when interplanted with nitrogen-fixing shrubs and trees. Proceedings of the Indiana Academy of Science, vol. 88, pp. 88-91.]]
Bees
- The edible flower clusters are also a top food source for honey bees
Shade Provider
- Its light, airy overstory provides dappled shade
- Planted on the west side of a garden it provides relief during the hottest part of the day
- (nitrogen provider)
- Planted on the west side of a house, its quick growth soon shades that side from the sun
Wind-break
- Fast growth plus it's feathery foliage reduces wind for animals, crops, and shelters
Fodder
- Over 20% crude protein
- 4.1 kcal/g of energy
- Baertsche, S.R, M.T. Yokoyama, and J.W. Hanover (1986) Short rotation, hardwood tree biomass as potential ruminant feed-chemical composition, nylon bag ruminal degradation and ensilement of selected species. J. Animal Sci. 63 2028-2043
-
@ b8851a06:9b120ba1
2025-01-14 15:28:32It Begins with a Click
It starts with a click: “Do you agree to our terms and conditions?”\ You scroll, you click, you comply. A harmless act, right? But what if every click was a surrender? What if every "yes" was another link in the chain binding you to a life where freedom requires approval?
This is the age of permission. Every aspect of your life is mediated by gatekeepers. Governments demand forms, corporations demand clicks, and algorithms demand obedience. You’re free, of course, as long as you play by the rules. But who writes the rules? Who decides what’s allowed? Who owns your life?
Welcome to Digital Serfdom
We once imagined the internet as a digital frontier—a vast, open space where ideas could flow freely and innovation would know no bounds. But instead of creating a decentralized utopia, we built a new feudal system.
- Your data? Owned by the lords of Big Tech.
- Your money? Controlled by banks and bureaucrats who can freeze it on a whim.
- Your thoughts? Filtered by algorithms that reward conformity and punish dissent.
The modern internet is a land of serfs and lords, and guess who’s doing the farming? You. Every time you agree to the terms, accept the permissions, or let an algorithm decide for you, you till the fields of a system designed to control, not liberate.
They don’t call it control, of course. They call it “protection.” They say, “We’re keeping you safe,” as they build a cage so big you can’t see the bars.
Freedom in Chains
But let’s be honest: we’re not just victims of this system—we’re participants. We’ve traded freedom for convenience, sovereignty for security. It’s easier to click “I Agree” than to read the fine print. It’s easier to let someone else hold your money than to take responsibility for it yourself. It’s easier to live a life of quiet compliance than to risk the chaos of true independence.
We tell ourselves it’s no big deal. What’s one click? What’s one form? But the permissions pile up. The chains grow heavier. And one day, you wake up and realize you’re free to do exactly what the system allows—and nothing more.
The Great Unpermissioning
It doesn’t have to be this way. You don’t need their approval. You don’t need their systems. You don’t need their permission.
The Great Unpermissioning is not a movement—it’s a mindset. It’s the refusal to accept a life mediated by gatekeepers. It’s the quiet rebellion of saying, “No.” It’s the realization that the freedom you seek won’t be granted—it must be reclaimed.
- Stop asking. Permission is their tool. Refusal is your weapon.
- Start building. Embrace tools that decentralize power: Bitcoin, encryption, open-source software, decentralized communication. Build systems they can’t control.
- Stand firm. They’ll tell you it’s dangerous. They’ll call you a radical. But remember: the most dangerous thing you can do is comply.
The path won’t be easy. Freedom never is. But it will be worth it.
The New Frontier
The age of permission has turned us into digital serfs, but there’s a new frontier on the horizon. It’s a world where you control your money, your data, your decisions. It’s a world of encryption, anonymity, and sovereignty. It’s a world built not on permission but on principles.
This world won’t be given to you. You have to build it. You have to fight for it. And it starts with one simple act: refusing to comply.
A Final Word
They promised us safety, but what they delivered was submission. The age of permission has enslaved us to the mundane, the monitored, and the mediocre. The Great Unpermissioning isn’t about tearing down the old world—it’s about walking away from it.
You don’t need to wait for their approval. You don’t need to ask for their permission. The freedom you’re looking for is already yours. Permission is their power—refusal is yours.