-

@ df173277:4ec96708
2025-02-07 00:41:34
## **Building Our Confidential Backend on Secure Enclaves**
With our newly released [private and confidential **Maple AI**](https://trymaple.ai/?ref=blog.opensecret.cloud) and the open sourcing of our [**OpenSecret** platform](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud) code, I'm excited to present this technical primer on how we built our confidential compute platform leveraging **secure enclaves**. By combining AWS Nitro enclaves with end-to-end encryption and reproducible builds, our platform gives developers and end users the confidence that user data is protected, even at runtime, and that the code operating on their data has not been tampered with.
## **Auth and Databases Today**
As developers, we live in an era where protecting user data means "encryption at rest," plus some access policies and procedures. Developers typically run servers that:
1. Need to register users (authentication).
2. Collect and process user data in business-specific ways, often on the backend.
Even if data is encrypted at rest, it's commonly unlocked with a single master key or credentials the server holds. This means that data is visible during runtime to the application, system administrators, and potentially to the hosting providers. This scenario makes it difficult (or impossible) to guarantee that sensitive data isn't snooped on, memory-dumped, or used in unauthorized ways (for instance, training AI models behind the scenes).
## **"Just Trust Us" Isn't Good Enough**
In a traditional server architecture, users have to take it on faith that the code handling their data is the same code the operator claims to be running. Behind the scenes, applications can be modified or augmented to forward private information elsewhere, and there is no transparent way for users to verify otherwise. This lack of proof is unsettling, especially for services that process or store highly confidential data.
Administrators, developers, or cloud providers with privileged access can inspect memory in plaintext, attach debuggers, or gain complete visibility into stored information. Hackers who compromise these privileged levels can directly access sensitive data. Even with strict policies or promises of good conduct, the reality is that technical capabilities and misconfigurations can override words on paper. If a server master key can decrypt your data or can be accessed by an insider with root permissions, then "just trust us" loses much of its credibility.
The rise of AI platforms amplifies this dilemma. User data, often full of personal details, gets funneled into large-scale models that might be training or fine-tuning behind the scenes. Relying on vague assurances that "we don't look at your data" is no longer enough to prevent legitimate concerns about privacy and misuse. Now more than ever, providing a **strong, verifiable** guarantee that data remains off-limits, even when actively processed, has become a non-negotiable requirement for trustworthy services.
## **Current Attempts at Securing Data**
Current User Experience of E2EE Apps
While properly securing data is not easy, it isn't to say that no one is trying. Some solutions use **end-to-end encryption** (E2EE), where user data is encrypted client-side with a password or passphrase, so not even the server operator can decrypt it. That approach can be quite secure, but it also has its **limitations**:
1. **Key Management Nightmares**: If a user forgets their passphrase, the data is effectively lost, and there's no way to recover it from the developer's side.
2. **Feature Limitations**: Complex server-side operations (like offline/background tasks, AI queries, real-time collaboration, or heavy computation) can't easily happen if the server is never capable of processing decrypted data.
3. **Platform Silos**: Some solutions rely on iCloud, Google Drive, or local device storage. That can hamper multi-device usage or multi-OS compatibility.
Other approaches include self-hosting. However, these either burden users with dev ops overhead or revert to the "trust me" model for the server if you "self-host" on a cloud provider.
## **Secure Enclaves**
### **The Hybrid Approach**
Secure enclaves offer a compelling middle ground. They combine the privacy benefits of keeping data secure from prying admins while still allowing meaningful server-side computation. In a nutshell, an enclave is a protected environment within a machine, isolated at the hardware level, so that even if the OS or server is compromised, the data and code inside the enclave remain hidden.
App Service Running Inside Secure Enclave
### **High-Level Goal of Enclaves**
Enclaves, also known under the broader umbrella of **confidential computing**, aim to:\
• **Lock down data** so that only authorized code within the enclave can process the original plaintext data.\
• **Deny external inspection** by memory dumping, attaching a debugger, or intercepting plaintext network traffic.\
• **Prove** to external users or services that an enclave is running unmodified, approved code (this is where **remote attestation** comes in).
### **Different Secure Enclave Solutions**
[**AMD SEV**](https://www.amd.com/en/developer/sev.html?ref=blog.opensecret.cloud) **(Secure Encrypted Virtualization)** encrypts an entire virtual machine's memory so that even a compromised hypervisor cannot inspect or modify guest data. Its core concept is "lift-and-shift" security. No application refactoring is required because hardware-based encryption automatically protects the OS and all VM applications. Later enhancements (SEV-ES and SEV-SNP) added encryption of CPU register states and memory integrity protections, further limiting hypervisor tampering. This broad coverage means the guest OS is included in the trusted boundary. AMD SEV has matured into a robust solution for confidential VMs in multi-tenant clouds.
[**Intel TDX**](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html?ref=blog.opensecret.cloud) **(Trust Domain Extensions)** shifts from process-level enclaves to full VM encryption, allowing an entire guest operating system and its applications to run in an isolated "trust domain." Like AMD SEV, Intel TDX encrypts and protects all memory the VM uses from hypervisors or other privileged software, so developers do not need to refactor their code to benefit from hardware-based confidentiality. This broader scope addresses many SGX limitations, such as strict memory bounds and the need to split out enclave-specific logic, and offers a more straightforward "lift-and-shift" path for running existing workloads privately. While SGX is now deprecated, TDX carries forward the core confidential computing principles but applies them at the virtual machine level for more substantial isolation, easier deployment, and the ability to scale up to large, memory-intensive applications.
[**Apple Secure Enclave and Private Compute**](https://security.apple.com/blog/private-cloud-compute/?ref=blog.opensecret.cloud) is a dedicated security coprocessor embedded in most Apple devices (iPhones, iPads, Macs) and now extended to Apple's server-side AI infrastructure. It runs its own microkernel, has hardware-protected memory, and securely manages operations such as biometric authentication, key storage, and cryptographic tasks. Apple's "Private Compute" approach in the cloud brings similar enclave capabilities to server-based AI, enabling on-device-grade privacy even when requests are processed in Apple's data centers.
[**AWS Nitro Enclaves**](https://docs.aws.amazon.com/enclaves/latest/user/nitro-enclave.html?ref=blog.opensecret.cloud) carve out a tightly isolated "mini-VM" from a parent EC2 instance, with its own vCPUs and memory guarded by dedicated Nitro cards. The enclave has no persistent storage and no external network access, significantly reducing the attack surface. Communication with the parent instance occurs over a secure local channel (vsock), and AWS offers hardware-based attestation so that secrets (e.g., encryption keys from AWS KMS) can be accessed only to the correct enclave. This design helps developers protect sensitive data or code even if the main EC2 instance's OS is compromised.
[**NVIDIA GPU TEEs**](https://www.nvidia.com/en-us/data-center/solutions/confidential-computing/?ref=blog.opensecret.cloud) **(Hopper H100 and Blackwell)** extend confidential computing to accelerated workloads by encrypting data in GPU memory and ensuring that even a privileged host cannot view or tamper with it. Data moving between CPU and GPU is encrypted in transit, so sensitive model weights or inputs remain protected during AI training or inference. NVIDIA's hardware and drivers handle secure data paths under the hood, allowing confidential large language model (LLM) workloads and other GPU-accelerated computations to run with minimal performance overhead and strong security guarantees.
### **Key Benefits**
One major advantage of enclaves is their ability to **keep memory completely off-limits** to outside prying eyes. Even administrators who can normally inspect processes at will are blocked from peeking into the enclave's protected memory space. The enclave model is a huge shift in the security model: it prevents casual inspection and defends against sophisticated memory dumping techniques that might otherwise leak secrets or sensitive data.
Another key benefit centers on cryptographic keys that are **never exposed outside the enclave**. Only verified code running inside the enclave environment can run decryption or signing operations, and it can only do so while that specific code is running. This ensures that compromised hosts or rogue processes, even those with high-level privileges, are unable to intercept or misuse the keys because the keys remain strictly within the trusted boundary of the hardware.
Enclaves can also offer the power of **remote attestation**, allowing external clients or systems to confirm that they're speaking to an authentic, untampered enclave. By validating the hardware's integrity measurements and enclave-specific proofs, the remote party can be confident in the underlying security properties, an important guarantee in multi-tenant environments or whenever trust boundaries extend across different organizations and networks.
Beyond that, **reproducible builds** can create a verifiable fingerprint proving which binary runs in the enclave. This is a step above a simple "trust us" approach. Anyone can independently recreate the enclave image and verify the resulting cryptographic hash by using a reproducible build system (for example, [our NixOS-based solution](https://github.com/OpenSecretCloud/opensecret/blob/master/flake.nix?ref=blog.opensecret.cloud)). If it matches, then users and developers know precisely how code handles their data, boosting confidence that no hidden changes exist.
It's worth noting that although enclaves shield you from software devs, cloud providers, and insider threats, you do have to trust the **hardware vendor** (Intel, AMD, Apple, AWS, or NVIDIA) to implement their microcode and firmware securely. The entire enclave model could be theoretically undermined if a CPU maker's root keys or manufacturing process were compromised. Fortunately, these companies undergo extensive audits and firmware validations (often with third-party researchers), and their remote attestation mechanisms allow you to confirm specific firmware versions before trusting an enclave. While this adds a layer of "vendor trust," it's still a far more contained risk than trusting an entire operating system or cloud stack, so enclaves remain a strong step forward in practical, confidential computing.
## **How We Use Secure Enclaves**
Now that we've covered the general idea of enclaves let's look at how we specifically implement them in OpenSecret, our developer platform for handling user auth, private keys, data encryption, and AI workloads.
### **Our Stack: AWS Nitro + Nvidia TEE**
• **AWS Nitro Enclaves for the backend**: All critical logic, authentication, private key management, and data encryption/decryption run inside an AWS Nitro Enclave.
• **Nvidia Trusted Execution for AI**: For large AI inference (such as the Llama 3.3 70B model), we utilize Nvidia's GPU-based TEEs to protect even GPU memory. This means users can feed sensitive data to the AI model **without** exposing it in plaintext to the GPU providers or us as the operator. [Edgeless Systems](https://www.edgeless.systems/?ref=blog.opensecret.cloud) is our Nvidia TEE provider, and due to the power of enclave verification, we don't need to worry about who runs the GPUs. We know requests can't be inspected or tampered with.
### **End-to-End Encryption from Client to Enclave**
Client-side Enclave Attestation from Maple AI
Before login or data upload, the user/client verifies the **enclave attestation** from our platform. This process proves that the specific Nitro Enclave is genuine and runs the exact code we've published. You can check this out live on [Maple AI's attestation page](https://trymaple.ai/proof?ref=blog.opensecret.cloud).
Based on the attestation, the client establishes a secure ephemeral communication channel that only that enclave can decrypt. While we take advantage of SSL, it is typically not terminated inside the enclave itself. To ensure there's full encrypted data transfer all the way through to the enclave, we establish this additional handshake based on the attestation document that is used for all API requests during the client session.
From there, the user's credentials, private keys, and data pass through this secure channel directly into the enclave, where they are decrypted and processed according to the user's request.
### **In-Enclave Operations**
At the core of OpenSecret's approach is the conviction that security-critical tasks must happen inside the enclave, where even administrative privileges or hypervisor-level compromise cannot expose plaintext data. This encompasses everything from when a user logs in to creating and managing sensitive cryptographic keys. By confining these operations to a protected hardware boundary, developers can focus on building their applications without worrying about accidental data leaks, insider threats, or malicious attempts to harvest credentials. The enclave becomes the ultimate gatekeeper: it controls how data flows and ensures that nothing escapes in plain form.
User Auth Methods running inside Enclave
A primary example is **user authentication**. All sign-in workflows, including email/password, OAuth, and upcoming passkey-based methods, are handled entirely within the enclave. As soon as a user's credentials enter our platform through the encrypted channel, they are routed straight into the protected environment, bypassing the host's operating system or any potential snooping channels. From there, authentication and session details remain in the enclave, ensuring that privileged outsiders cannot intercept or modify them. By centralizing these identity flows within a sealed environment, developers can assure their users that no one outside the enclave (including the cloud provider or the app's own sysadmins) can peek at, tamper with, or access sensitive login information.
Main Enclave Operations in OpenSecret
The same principle applies to **private key management**. Whether keys are created fresh in the enclave or securely transferred into it, they remain sealed away from the rest of the system. Operations like digital signing or content decryption happen only within the hardware boundary, so raw keys never appear in any log, file system, or memory space outside the enclave. Developers retain the functionality they need, such as verifying user actions, encrypting data, or enabling secure transactions without ever exposing keys to a broader (and more vulnerable) attack surface. User backup options exist as well, where the keys can be securely passed to the end user.
Realtime Encrypted Data Sync on Multiple Devices
Another crucial aspect is **data encryption at rest**. While user data ultimately needs to be stored somewhere outside the enclave, the unencrypted form of that data only exists transiently inside the protected environment. Encryption and decryption routines run within the enclave, which holds the encryption keys strictly in memory under hardware guards. If a user uploads data, it is promptly secured before it leaves the enclave. When data is retrieved, it remains encrypted until it reenters the protected region and is passed back to the user through the secured communication channel. This ensures that even if someone gains access to the underlying storage or intercepts data in transit, they will see only meaningless ciphertext.
Confidential AI Workloads
Finally, **confidential AI workloads** build upon this same pattern: the Nitro enclave re-encrypts data so it can be processed inside a GPU-based trusted execution environment (TEE) for inference or other advanced computations. Sensitive data, like user-generated text or private documents, never appears in the clear on the host or within GPU memory outside the TEE boundary. When an AI process finishes, only the results are returned to the enclave, which can then relay them securely to the requesting user. By seamlessly chaining enclaves together, from CPU-based Nitro Enclaves to GPU-accelerated TEEs, we can deliver robust, hardware-enforced privacy for virtually any type of server-side or AI-driven operation.
### **Reproducible Builds + Verification**
Client verifies enclave attestation document
We build our enclaves on **NixOS** with reproducible builds, ensuring that anyone can verify that the binary we publish is indeed the binary running in the enclave. This build process is essential for proving we haven't snuck in malicious code to exfiltrate data or collect sensitive logs.
Our code is fully open source ([GitHub: OpenSecret](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud)), so you can audit or run it yourself. You can also verify that the cryptographic measurement the build process outputs matches the measurement reported by the enclave during attestation.
## **Putting It All Together**
OpenSecret Offering: Private Key Management, Encrypted Sync, Private AI, and Confidential Compute
By weaving secure enclaves into every step, from authentication to data handling to AI inference, we shift the burden of trust away from human policies and onto provable, hardware-based protections. For app developers, you can offer your users robust privacy guarantees without rewriting all your business logic or building an entire security stack from scratch. Whether you're storing user credentials or running complex operations on sensitive data, the enclave approach ensures plaintext remains inaccessible to even the most privileged parties outside the enclave boundary. Developers can focus on building great apps, while OpenSecret handles the cryptographic "lock and key" behind the scenes.
This model provides a secure-by-design environment for industries that demand strict data confidentiality, such as healthcare, fintech, cryptocurrency apps for secure key management, or decentralized identity platforms. Instead of worrying about memory dumps or backend tampering, you can trust that once data enters the enclave, it's sealed off from unauthorized eyes, including from the app developers themselves. And these safeguards don't just apply to niche use cases. Even general-purpose applications that handle login flows and user-generated content stand to benefit, especially as regulatory scrutiny grows around data privacy and insider threats.
Imagine a telehealth startup using OpenSecret enclaves to protect patient information for remote consultations. Not only would patient data remain encrypted at rest, but any AI-driven analytics to assist with diagnoses could be run privately within the enclave, ensuring no one outside the hardware boundary can peek at sensitive health records. A fintech company could similarly isolate confidential financial transactions, preventing even privileged insiders from viewing or tampering with raw transaction details. These real-world implementations give developers a clear path to adopting enclaves for serious privacy and compliance needs without overhauling their infrastructure.
OpenSecret aims to be a **full developer platform** with end-to-end security from day one. By incorporating user authentication, data storage, and GPU-based confidential AI into a single service, we eliminate many of the traditional hurdles in adopting enclaves. No more juggling separate tools for cryptographic key management, compliance controls, and runtime privacy. Instead, you get a unified stack that keeps data encrypted in transit, at rest, and in use.
Our solution also caters to the exploding demand for AI applications: with TEE-enabled GPU workloads, you can securely process sensitive data for text inference without ever exposing raw plaintext or sensitive documents to the host system.
The result is a new generation of apps that deliver advanced functionality, like real-time encrypted data sync or AI-driven insights, while preserving user privacy and meeting strict regulatory requirements. You don't have to rely on empty "trust us" promises because hardware enclaves, remote attestation, and reproducible builds collectively guarantee the code is running untampered. In short, OpenSecret offers the building blocks needed to create truly confidential services and experiences, allowing you to innovate while ensuring data protection remains ironclad.
## **Things to Come**
We're excited to build on our enclaved approach. Here's what's on our roadmap:
• **Production Launch**: We're using this in production now with [Maple AI](https://trymaple.ai/?ref=blog.opensecret.cloud) and have a developer preview playground up and running. We'll have the developer environment ready for production in a few months.\
• **Multi-Tenant Support**: Our platform currently works for single tenants, but we're opening this up so developers can onboard without needing a dedicated instance.\
• **Self-Serve Frontend**: A dev-friendly portal for provisioning apps, connecting OAuth or email providers, and managing users.\
• **External Key Signing Options**: Integrations with custom hardware security modules (HSMs) or customer-ran key managers that can only process data upon verifying the enclave attestation.\
• **Confidential Computing as a Service**: We'll expand our platform so that other developers can quickly create enclaves for specialized workloads without dealing with the complexities of Nitro or GPU TEEs.\
• **Additional SDKs**: In addition to our [JavaScript client-side SDK](https://github.com/OpenSecretCloud/OpenSecret-SDK?ref=blog.opensecret.cloud), we plan to launch official support for Rust, Python, Swift, Java, Go, and more.\
• **AI API Proxy with Attestation/Encryption**: We already provide an easy way to [access a Private AI through Maple AI](https://trymaple.ai/?ref=blog.opensecret.cloud), but we'd like to open this up more for existing tools and developers. We'll provide a proxy server that users can run on their local machines or servers that properly handle encryption to our OpenAI-compatible API.
## **Getting Started**
Ready to see enclaves in action? Here's how to dive in:\
1. **Run OpenSecret**: Check out our open-source repository at [OpenSecret on GitHub](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud). You can run your own enclaved environment or try it out locally with Docker.\
2. **Review Our SDK**: Our [JavaScript client SDK](https://github.com/OpenSecretCloud/OpenSecret-SDK?ref=blog.opensecret.cloud) makes it easy to handle sign-ins, put/get encrypted data, sign with user private keys, etc. It handles attestation verification and encryption under the hood, making the API integration seamless.\
3. **Play with Maple AI**: Try out [Maple AI](https://blog.opensecret.cloud/maple-ai-private-encrypted-chat/) as an example of an AI app built directly on OpenSecret. Your queries are encrypted end to end, and the Llama model sees them only inside the TEE.\
4. **Developer Preview**: Contact us if you want an invite to our early dev platform. We'll guide you through our SDK and give you access to the preview server. We'd love to build with you and incorporate your feedback as we develop this further.
## **Conclusion**
By merging secure enclaves (AWS Nitro and Nvidia GPU TEEs), user authentication, private key management, and an end-to-end verifiable encrypted approach, **OpenSecret** provides a powerful platform where we protect user data during collection, storage, and processing. Whether it's for standard user management, handling private cryptographic keys, or powering AI inference, the technology ensures that **no one**, not even us or the cloud provider, can snoop on data in use.
**We believe** this is the future of trustworthy computing in the cloud. And it's **all open source**, so you don't have to just take our word for it: you can see and verify everything yourself.
Do you have questions, feedback, or a use case you'd like to test out? Come join us on [GitHub](https://github.com/OpenSecretCloud?ref=blog.opensecret.cloud), [Discord](https://discord.gg/ch2gjZAMGy?ref=blog.opensecret.cloud), or email us for a developer preview. We can't wait to see what you build!
*Thank you for reading, and welcome to the era of enclaved computing.*
-

@ df173277:4ec96708
2025-01-28 17:49:54
> Maple is an AI chat tool that allows you to have private conversations with a general-purpose AI assistant. Chats are synced automatically between devices so you can pick up where you left off.\
> [Start chatting for free.](https://trymaple.ai/)
We are excited to announce that [Maple AI](https://trymaple.ai/), our groundbreaking end-to-end encrypted AI chat app built on OpenSecret, is now publicly available. After months of beta testing, we are thrilled to bring this innovative technology to the world.
Maple is an AI chat tool that allows you to have private conversations with a general-purpose AI assistant. It can boost your productivity on work tasks such as writing documentation, creating presentations, and drafting emails. You can also use it for personal items like brainstorming ideas, sorting out life's challenges, and tutoring you on difficult coursework. All your chats are synced automatically in a secure way, so you can start on one device and pick up where you left off on another.
#### Why Secure and Private AI?
In today's digital landscape, it is increasingly evident that security and privacy are essential for individuals and organizations alike. Unfortunately, the current state of AI tools falls short. A staggering 48% of organizations enter non-public company information into AI apps, according to a [recent report by Cisco](https://www.cisco.com/c/en/us/about/trust-center/data-privacy-benchmark-study.html#~key-findings). This practice poses significant risks to company security and intellectual property.
Another concern is for journalists, who often work with sensitive information in hostile environments. Journalists need verification that their information remains confidential and protected when researching topics and communicating with sources in various languages. They are left to use underpowered local AI or input their data into potentially compromised cloud services.
At OpenSecret, we believe it is possible to have both the benefits of AI and the assurance of security and privacy. That's why we created Maple, an app that combines AI productivity with the protection of end-to-end encryption. Our platform ensures that your conversations with AI remain confidential, even from us. The power of the cloud meets the privacy of local.
#### How Does It Work?
Our server code is [open source](https://github.com/OpenSecretCloud/opensecret), and we use confidential computing to provide cryptographic proof that the code running on our servers is the same as the open-source code available for review. This process allows you to verify that your conversations are handled securely and privately without relying on trust. We live by the principle of "Don't trust, verify," and we believe this approach is essential for building in the digital age. You can read a more in-depth write-up on our technology later this week on this site.
#### How Much Does It Cost?
We are committed to making Maple AI accessible to everyone, so we offer a range of pricing plans to suit different needs and budgets. [Our Free plan allows for 10 chats per week, while our Starter plan ($5.99/month) and Pro plan ($20/month)](https://trymaple.ai/pricing) offer more comprehensive solutions for individuals and organizations with heavier workloads. We accept credit cards and Bitcoin (10% discount), allowing you to choose your preferred payment method.
- Free: $0
- Starter: $5.99/month
- Pro: $20/month
Our goal with Maple AI is to create a product that is secure through transparency. By combining open-source code, cryptography, and confidential computing, we can create a new standard for AI conversations - one that prioritizes your security and privacy.
Maple has quickly become a daily tool of productivity for our own work and those of our beta testers. We believe it will bring value to you as well. [Sign up now and start chatting privately with AI for free.](https://trymaple.ai/) Your secrets are safe in the open.
#### Are You An App Developer?
You can build an app like Maple. [OpenSecret provides secure auth, private key management, encrypted data sync, private AI, and more.](https://blog.opensecret.cloud/introducing-opensecret/) Our straightforward API behaves like other backends but automatically adds security and privacy. Use it to secure existing apps or brand-new projects. Protect yourself and your users from the liability of hosting personal data by checking out [OpenSecret](https://opensecret.cloud/).
<img src="https://blossom.primal.net/feb746d5e164e89f0d015646286b88237dce4158f8985e3caaf7e427cebde608.png">
Enjoy private AI Chat 🤘
<img src="https://blossom.primal.net/0594ec56e249de2754ea7dfc225a7ebd46bc298b5af168279ce71f17c2afada0.jpg">
-

@ df173277:4ec96708
2025-01-09 17:12:08
> Maple AI combines the best of both worlds – encryption and personal AI – to create a truly private AI experience. Discuss personal and company items with Maple, we can't read them even if we wanted to.\
> [Join the waitlist to get early access.](https://trymaple.ai)
We are a culture of app users. Every day, we give our personal information to websites and apps, hoping they are safe. Location data, eating habits, financial details, and health information are just a few examples of what we entrust to third parties. People are now entering a new era of computing that promises next-level benefits when given even more personal data: AI.
Should we sacrifice our privacy to unlock the productivity gains of AI? Should we hope our information won't be used in ways we disagree? We believe we can have the best of both worlds – privacy and personal AI – and have built a new project called Maple AI. Chat between you and an AI with full end-to-end encryption. We believe it's a game-changer for individuals seeking private and secure conversations.
#### Building a Private Foundation
Maple is built on our flagship product, [OpenSecret](https://opensecret.cloud), a backend platform for app developers that turns private encryption on by default. [The announcement post for OpenSecret explains our vision for an encrypted world and what the platform can do.](nostr:naddr1qvzqqqr4gupzphchxfm3ste32hfhkvczzxapme9gz5qvqtget6tylyd7wa8vjecgqqe5jmn5wfhkgatrd9hxwt20wpjku5m9vdex2apdw35x2tt9de3hy7tsw3jkgttzv93kketwvskhgur5w9nx5h52tpj) We think both users and developers benefit when sensitive personal information is encrypted in a private vault; it's a win-win.
#### The Power of Encrypted AI Chat
AI chat is a personal and intimate experience. It's a place to share your thoughts, feelings, and desires without fear of judgment. The more you share with an AI chatbot, the more powerful it becomes. It can offer personalized insights, suggestions, and guidance tailored to your unique needs and perspectives. However, this intimacy requires trust, and that's where traditional AI chatbots often fall short.
Traditional AI chats are designed to collect and analyze your data, often without your explicit consent. This data is used to improve the AI's performance, but it also creates a treasure trove of sensitive information that can be mined, sold, or even exploited by malicious actors. Maple AI takes a different approach. By using end-to-end encryption, we ensure that your conversations remain private and secure, even from us.
#### Technical Overview
So, how does Maple AI achieve this level of privacy and security? Here are some key technical aspects:
- **Private Key:** Each user has a unique private key that is automatically managed for them. This key encrypts and decrypts conversations, ensuring that only the user can access their data.
- **Secure Servers:** Our servers are designed with security in mind. We use secure enclaves to protect sensitive data and ensure that even our own team can't access your conversations.
- **Encrypted Sync:** One of Maple's most significant benefits is its encrypted sync feature. Unlike traditional AI chatbots, which store conversations in local storage or on standard cloud servers, Maple syncs your chats across all your devices. The private key managed by our secure servers means you can pick up where you left off on any device without worrying about your data being compromised.
- **Attestation and Open Code:** We publish our enclave code publicly. Using a process called attestation, users can verify that the code running on the enclave is the same as the code audited by the public.
- **Open Source LLM:** Maple uses major open-source models to maximize the openness of responses. The chat box does not filter what you can talk about. This transparency ensures that our AI is trustworthy and unbiased.
#### Personal and Work Use
Maple is secure enough to handle your personal questions and work tasks. Because we can't see what you chat about, you are free to use AI as an assistant on sensitive company items. Use it for small tasks like writing an important email or large tasks like developing your organization's strategy. Feed it sensitive information; it's just you and AI in the room. Attestation provides cryptographic proof that your corporate secrets are safe.
#### Local v Cloud
Today's AI tools provide different levels of privacy. The main options are to trust a third party with your unencrypted data, hoping they don't do anything with it, or run your own AI locally on an underpowered machine. We created a third option. Maple gives you the power of cloud computing combined with the privacy and security of a machine running on your desk. It's the best of both worlds.
#### Why the Maple name?
Privacy isn't just a human value - it's a natural one exemplified by the Maple tree. These organisms communicate with each other through a network of underground fungal hyphae, sending messages and sharing resources in a way that's completely invisible to organisms above ground. This discreet communication system allows Maple trees to thrive in even the most challenging environments. Our goal is to provide a way for everyone to communicate with AI securely so they can thrive in any environment.
#### Join the Waitlist
Maple AI will launch in early 2025 with free and paid plans. We can't wait to share it with the world. [Join our waitlist today to be among the first to experience the power of private AI chat.](https://trymaple.ai)
[](https://trymaple.ai/waitlist)
-

@ df173277:4ec96708
2025-01-09 17:02:52
> OpenSecret is a backend for app developers that turns private encryption on by default. When sensitive data is readable only by the user, it protects both the user and the developer, creating a more free and open internet. We'll be launching in 2025. [Join our waitlist to get early access.](https://opensecret.cloud)
In today's digital age, personal data is both an asset and a liability. With the rise of data breaches and cyber attacks, individuals and companies struggle to protect sensitive information. The consequences of a data breach can be devastating, resulting in financial losses, reputational damage, and compromised user trust. In 2023, the average data breach cost was $5 million, with some resulting in losses of over $1 billion.
Meanwhile, individuals face problems related to identity theft, personal safety, and public embarrassment. Think about the apps on your phone, even the one you're using to read this. How much data have you trusted to other people, and how would it feel if that data were leaked online?
Thankfully, some incredibly talented cypherpunks years ago gave the world cryptography. We can encrypt data, rendering it a secret between two people. So why then do we have data breaches?
> Cryptography at scale is hard.
#### The Cloud
The cloud has revolutionized how we store and process data, but it has limitations. While cloud providers offer encryption, it mainly protects data in transit. Once data is stored in the cloud, it's often encrypted with a shared key, which can be accessed by employees, third-party vendors, or compromised by hackers.
The solution is to generate a personal encryption password for each user, make sure they write it down, and, most importantly, hope they don't lose it. If the password is lost, the data is forever unreadable. That can be overwhelming, leading to low app usage.
> Private key encryption needs a UX upgrade.
## Enter OpenSecret
OpenSecret is a developer platform that enables encryption by default. Our platform provides a suite of security tools for app developers, including private key management, encrypted sync, private AI, and confidential compute.
Every user has a private vault for their data, which means only they can read it. Developers are free to store less sensitive data in a shared manner because there is still a need to aggregate data across the system.

### Private Key Management
Private key management is the superpower that enables personal encryption per user. When each user has a unique private key, their data can be truly private. Typically, using a private key is a challenging experience for the user because they must write down a long autogenerated number or phrase of 12-24 words. If they lose it, their data is gone.
OpenSecret uses secure enclaves to make private keys as easy as an everyday login experience that users are familiar with. Instead of managing a complicated key, the user logs in with an email address or a social media account.
The developer doesn't have to manage private keys and can focus on the app's user experience. The user doesn't have to worry about losing a private key and can jump into using your app.

### Encrypted Sync
With user keys safely managed, we can synchronize user data to every device while maintaining privacy. The user does not need to do complicated things like scanning QR codes from one device to the next. Just log in and go.
The user wins because the data is available on all their devices. The developer wins because only the user can read the data, so it isn't a liability to them.
### Private AI
Artificial intelligence is here and making its way into everything. The true power of AI is unleashed when it can act on personal and company data. The current options are to run your own AI locally on an underpowered machine or to trust a third party with your data, hoping they don't read it or use it for anything.
OpenSecret combines the power of cloud computing with the privacy and security of a machine running on your desk.
**Check out Maple AI**\
Try private AI for yourself! We built an app built with this service called [Maple AI](https://trymaple.ai). It is an AI chat that is 100% private in a verifiable manner. Give it your innermost thoughts or embarrassing ideas; we can't judge you. We built Maple using OpenSecret, which means you have a private key that is automatically managed for you, and your chat history is synchronized to all your devices. [Learn more about Maple AI - Private chat in the announcement post.](https://blog.opensecret.cloud/maple-ai-private-encrypted-chat/)

### Confidential Compute
Confidential computing is a game-changer for data security. It's like the secure hardware that powers Apple Pay and Google Pay on your phone but in the cloud. Users can verify through a process called attestation that their data is handled appropriately. OpenSecret can help you run your own custom app backend code that would benefit from the security of an enclave.
It's the new version of that lock on your web browser. When you see it, you know you're secure.

#### **But do we want our secrets to be open?**
OpenSecret renders a data breach practically useless. If hackers get into the backend, they enter a virtual hallway of locked private vaults. The leaked data would be gibberish, a secret in the open that is unreadable.
On the topic of openness, OpenSecret uses the power of open source to enable trust in the service. We publish our code in the open, and, using attestation, anyone can verify that private data is being handled as expected. This openness also provides developers with a backup option to safely and securely export their data.
> Don't trust, verify.
### **Join the Movement**
We're currently building out OpenSecret, and we invite you to join us on the journey. Our platform can work with your existing stack, and you can pick and choose the features you need. If you want to build apps with encryption enabled, [send us a message to get early access.](https://opensecret.cloud)
Users and companies deserve better encryption and privacy.\
Together, let's make that a reality.
[](https://opensecret.cloud)
-

@ 460c25e6:ef85065c
2025-02-25 15:20:39
If you don't know where your posts are, you might as well just stay in the centralized Twitter. You either take control of your relay lists, or they will control you. Amethyst offers several lists of relays for our users. We are going to go one by one to help clarify what they are and which options are best for each one.
## Public Home/Outbox Relays
Home relays store all YOUR content: all your posts, likes, replies, lists, etc. It's your home. Amethyst will send your posts here first. Your followers will use these relays to get new posts from you. So, if you don't have anything there, **they will not receive your updates**.
Home relays must allow queries from anyone, ideally without the need to authenticate. They can limit writes to paid users without affecting anyone's experience.
This list should have a maximum of 3 relays. More than that will only make your followers waste their mobile data getting your posts. Keep it simple. Out of the 3 relays, I recommend:
- 1 large public, international relay: nos.lol, nostr.mom, relay.damus.io, etc.
- 1 personal relay to store a copy of all your content in a place no one can delete. Go to [relay.tools](https://relay.tools/) and never be censored again.
- 1 really fast relay located in your country: paid options like http://nostr.wine are great
Do not include relays that block users from seeing posts in this list. If you do, no one will see your posts.
## Public Inbox Relays
This relay type receives all replies, comments, likes, and zaps to your posts. If you are not getting notifications or you don't see replies from your friends, it is likely because you don't have the right setup here. If you are getting too much spam in your replies, it's probably because your inbox relays are not protecting you enough. Paid relays can filter inbox spam out.
Inbox relays must allow anyone to write into them. It's the opposite of the outbox relay. They can limit who can download the posts to their paid subscribers without affecting anyone's experience.
This list should have a maximum of 3 relays as well. Again, keep it small. More than that will just make you spend more of your data plan downloading the same notifications from all these different servers. Out of the 3 relays, I recommend:
- 1 large public, international relay: nos.lol, nostr.mom, relay.damus.io, etc.
- 1 personal relay to store a copy of your notifications, invites, cashu tokens and zaps.
- 1 really fast relay located in your country: go to [nostr.watch](https://nostr.watch/relays/find) and find relays in your country
Terrible options include:
- nostr.wine should not be here.
- filter.nostr.wine should not be here.
- inbox.nostr.wine should not be here.
## DM Inbox Relays
These are the relays used to receive DMs and private content. Others will use these relays to send DMs to you. **If you don't have it setup, you will miss DMs**. DM Inbox relays should accept any message from anyone, but only allow you to download them.
Generally speaking, you only need 3 for reliability. One of them should be a personal relay to make sure you have a copy of all your messages. The others can be open if you want push notifications or closed if you want full privacy.
Good options are:
- inbox.nostr.wine and auth.nostr1.com: anyone can send messages and only you can download. Not even our push notification server has access to them to notify you.
- a personal relay to make sure no one can censor you. Advanced settings on personal relays can also store your DMs privately. Talk to your relay operator for more details.
- a public relay if you want DM notifications from our servers.
Make sure to add at least one public relay if you want to see DM notifications.
## Private Home Relays
Private Relays are for things no one should see, like your drafts, lists, app settings, bookmarks etc. Ideally, these relays are either local or require authentication before posting AND downloading each user\'s content. There are no dedicated relays for this category yet, so I would use a local relay like Citrine on Android and a personal relay on relay.tools.
Keep in mind that if you choose a local relay only, a client on the desktop might not be able to see the drafts from clients on mobile and vice versa.
## Search relays:
This is the list of relays to use on Amethyst's search and user tagging with @. **Tagging and searching will not work if there is nothing here.**. This option requires NIP-50 compliance from each relay. Hit the Default button to use all available options on existence today:
- nostr.wine
- relay.nostr.band
- relay.noswhere.com
## Local Relays:
This is your local storage. Everything will load faster if it comes from this relay. You should install Citrine on Android and write ws://localhost:4869 in this option.
## General Relays:
This section contains the default relays used to download content from your follows. Notice how you can activate and deactivate the Home, Messages (old-style DMs), Chat (public chats), and Global options in each.
Keep 5-6 large relays on this list and activate them for as many categories (Home, Messages (old-style DMs), Chat, and Global) as possible.
Amethyst will provide additional recommendations to this list from your follows with information on which of your follows might need the additional relay in your list. Add them if you feel like you are missing their posts or if it is just taking too long to load them.
## My setup
Here's what I use:
1. Go to [relay.tools](https://relay.tools/) and create a relay for yourself.
2. Go to [nostr.wine](https://nostr.wine/) and pay for their subscription.
3. Go to [inbox.nostr.wine](https://inbox.nostr.wine/) and pay for their subscription.
4. Go to [nostr.watch](https://nostr.watch/relays/find) and find a good relay in your country.
5. Download Citrine to your phone.
Then, on your relay lists, put:
Public Home/Outbox Relays:
- nostr.wine
- nos.lol or an in-country relay.
- <your.relay>.nostr1.com
Public Inbox Relays
- nos.lol or an in-country relay
- <your.relay>.nostr1.com
DM Inbox Relays
- inbox.nostr.wine
- <your.relay>.nostr1.com
Private Home Relays
- ws://localhost:4869 (Citrine)
- <your.relay>.nostr1.com (if you want)
Search Relays
- nostr.wine
- relay.nostr.band
- relay.noswhere.com
Local Relays
- ws://localhost:4869 (Citrine)
General Relays
- nos.lol
- relay.damus.io
- relay.primal.net
- nostr.mom
And a few of the recommended relays from Amethyst.
## Final Considerations
Remember, relays can see what your Nostr client is requesting and downloading at all times. They can track what you see and see what you like. They can sell that information to the highest bidder, they can delete your content or content that a sponsor asked them to delete (like a negative review for instance) and they can censor you in any way they see fit. Before using any random free relay out there, make sure you trust its operator and you know its terms of service and privacy policies.
-

@ a95c6243:d345522c
2025-02-21 19:32:23
*Europa – das Ganze ist eine wunderbare Idee,* *\
aber das war der Kommunismus auch.* *\
Loriot*  
**«Europa hat fertig», könnte man unken,** und das wäre nicht einmal sehr verwegen. Mit solch einer [Einschätzung](https://transition-news.org/geopolitische-ohnmacht-und-die-last-des-euro-steht-die-eu-vor-der-implosion) stünden wir nicht alleine, denn die Stimmen in diese Richtung mehren sich. Der französische Präsident Emmanuel Macron warnte schon letztes Jahr davor, dass «unser Europa sterben könnte». Vermutlich hatte er dabei andere Gefahren im Kopf als jetzt der ungarische Ministerpräsident Viktor Orbán, der ein «baldiges Ende der EU» prognostizierte. Das Ergebnis könnte allerdings das gleiche sein.
**Neben vordergründigen Themenbereichen wie Wirtschaft, Energie und Sicherheit** ist das eigentliche Problem jedoch die obskure Mischung aus aufgegebener Souveränität und geschwollener Arroganz, mit der europäische Politiker:innende unterschiedlicher Couleur aufzutreten pflegen. Und das Tüpfelchen auf dem i ist die bröckelnde Legitimation politischer Institutionen dadurch, dass die Stimmen großer Teile der Bevölkerung seit Jahren auf vielfältige Weise ausgegrenzt werden.
**Um «UnsereDemokratie» steht es schlecht.** Dass seine Mandate immer schwächer werden, merkt natürlich auch unser «Führungspersonal». Entsprechend werden die Maßnahmen zur Gängelung, Überwachung und Manipulation der Bürger ständig verzweifelter. Parallel dazu [plustern](https://www.bundesregierung.de/breg-de/service/newsletter-und-abos/bundesregierung-aktuell/ausgabe-07-2025-februar-21-2335652?view=renderNewsletterHtml) sich in Paris Macron, Scholz und einige andere noch einmal mächtig in Sachen Verteidigung und [«Kriegstüchtigkeit»](https://transition-news.org/europaische-investitionsbank-tragt-zur-kriegstuchtigkeit-europas-bei) auf.
**Momentan gilt es auch, das Überschwappen covidiotischer und verschwörungsideologischer Auswüchse** aus den USA nach Europa zu vermeiden. So ein «MEGA» (Make Europe Great Again) können wir hier nicht gebrauchen. Aus den Vereinigten Staaten kommen nämlich furchtbare Nachrichten. Beispielsweise wurde einer der schärfsten Kritiker der Corona-Maßnahmen kürzlich zum Gesundheitsminister ernannt. Dieser setzt sich jetzt für eine Neubewertung der mRNA-«Impfstoffe» ein, was durchaus zu einem [Entzug der Zulassungen](https://transition-news.org/usa-zulassungsentzug-fur-corona-impfstoffe-auf-der-tagesordnung) führen könnte.
**Der europäischen Version von** **[«Verteidigung der Demokratie»](https://transition-news.org/eu-macht-freiwilligen-verhaltenskodex-gegen-desinformation-zu-bindendem-recht)** setzte der US-Vizepräsident J. D. Vance auf der Münchner Sicherheitskonferenz sein Verständnis entgegen: «Demokratie stärken, indem wir unseren Bürgern erlauben, ihre Meinung zu sagen». Das Abschalten von Medien, das Annullieren von Wahlen oder das Ausschließen von Menschen vom politischen Prozess schütze gar nichts. Vielmehr sei dies der todsichere Weg, die Demokratie zu zerstören.
**In der Schweiz kamen seine Worte deutlich besser an** als in den meisten europäischen NATO-Ländern. Bundespräsidentin Karin Keller-Sutter lobte die Rede und interpretierte sie als «Plädoyer für die direkte Demokratie». Möglicherweise zeichne sich hier eine [außenpolitische Kehrtwende](https://transition-news.org/schweiz-vor-aussenpolitischer-kehrtwende-richtung-integraler-neutralitat) in Richtung integraler Neutralität ab, meint mein Kollege Daniel Funk. Das wären doch endlich mal ein paar gute Nachrichten.
**Von der einstigen Idee einer europäischen Union** mit engeren Beziehungen zwischen den Staaten, um Konflikte zu vermeiden und das Wohlergehen der Bürger zu verbessern, sind wir meilenweit abgekommen. Der heutige korrupte Verbund unter technokratischer Leitung ähnelt mehr einem Selbstbedienungsladen mit sehr begrenztem Zugang. Die EU-Wahlen im letzten Sommer haben daran ebenso wenig geändert, wie die [Bundestagswahl](https://transition-news.org/bundestagswahl-mehr-aufrustung-statt-friedenskanzler-nach-der-wahl) am kommenden Sonntag darauf einen Einfluss haben wird.
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/europaer-seid-ihr-noch-zu-retten)*** erschienen.
-

@ a95c6243:d345522c
2025-02-19 09:23:17
*Die «moralische Weltordnung» – eine Art Astrologie.
Friedrich Nietzsche*
**Das Treffen der BRICS-Staaten beim [Gipfel](https://transition-news.org/brics-gipfel-in-kasan-warum-schweigt-die-schweiz) im russischen Kasan** war sicher nicht irgendein politisches Event. Gastgeber Wladimir Putin habe «Hof gehalten», sagen die Einen, China und Russland hätten ihre Vorstellung einer multipolaren Weltordnung zelebriert, schreiben Andere.
**In jedem Fall zeigt die Anwesenheit von über 30 Delegationen aus der ganzen Welt,** dass von einer geostrategischen Isolation Russlands wohl keine Rede sein kann. Darüber hinaus haben sowohl die Anreise von UN-Generalsekretär António Guterres als auch die Meldungen und Dementis bezüglich der Beitrittsbemühungen des NATO-Staats [Türkei](https://transition-news.org/turkei-entlarvt-fake-news-von-bild-uber-indiens-angebliches-veto-gegen-den) für etwas Aufsehen gesorgt.
**Im Spannungsfeld geopolitischer und wirtschaftlicher Umbrüche** zeigt die neue Allianz zunehmendes Selbstbewusstsein. In Sachen gemeinsamer Finanzpolitik schmiedet man interessante Pläne. Größere Unabhängigkeit von der US-dominierten Finanzordnung ist dabei ein wichtiges Ziel.
**Beim BRICS-Wirtschaftsforum in Moskau, wenige Tage vor dem Gipfel,** zählte ein nachhaltiges System für Finanzabrechnungen und Zahlungsdienste zu den vorrangigen Themen. Während dieses Treffens ging der russische Staatsfonds eine Partnerschaft mit dem Rechenzentrumsbetreiber BitRiver ein, um [Bitcoin](https://www.forbes.com/sites/digital-assets/2024/10/23/russia-launches-brics-mining-infrastructure-project/)-Mining-Anlagen für die BRICS-Länder zu errichten.
**Die Initiative könnte ein Schritt sein, Bitcoin und andere Kryptowährungen** als Alternativen zu traditionellen Finanzsystemen zu etablieren. Das Projekt könnte dazu führen, dass die BRICS-Staaten den globalen Handel in Bitcoin abwickeln. Vor dem Hintergrund der Diskussionen über eine «BRICS-Währung» wäre dies eine Alternative zu dem ursprünglich angedachten Korb lokaler Währungen und zu goldgedeckten Währungen sowie eine mögliche Ergänzung zum Zahlungssystem [BRICS Pay](https://en.wikipedia.org/wiki/BRICS_PAY).
**Dient der Bitcoin also der Entdollarisierung?** Oder droht er inzwischen, zum Gegenstand geopolitischer [Machtspielchen](https://legitim.ch/es-ist-ein-sieg-fuer-bitcoin-waehrend-russland-und-die-usa-um-die-krypto-vorherrschaft-kaempfen/) zu werden? Angesichts der globalen Vernetzungen ist es oft schwer zu durchschauen, «was eine Show ist und was im Hintergrund von anderen Strippenziehern insgeheim gesteuert wird». Sicher können Strukturen wie Bitcoin auch so genutzt werden, dass sie den Herrschenden dienlich sind. Aber die Grundeigenschaft des dezentralisierten, unzensierbaren Peer-to-Peer Zahlungsnetzwerks ist ihm schließlich nicht zu nehmen.
**Wenn es nach der EZB oder dem IWF geht, dann scheint statt Instrumentalisierung** momentan eher der Kampf gegen Kryptowährungen angesagt. Jürgen Schaaf, Senior Manager bei der Europäischen Zentralbank, hat jedenfalls dazu aufgerufen, [Bitcoin «zu eliminieren»](https://www.btc-echo.de/schlagzeilen/ezb-banker-es-gibt-gute-gruende-bitcoin-zu-eliminieren-194015/). Der Internationale Währungsfonds forderte El Salvador, das Bitcoin 2021 als gesetzliches Zahlungsmittel eingeführt hat, kürzlich zu [begrenzenden Maßnahmen](https://legitim.ch/el-salvador-iwf-fordert-trotz-nicht-eingetretener-risiken-neue-massnahmen-gegen-bitcoin/) gegen das Kryptogeld auf.
**Dass die BRICS-Staaten ein freiheitliches Ansinnen im Kopf haben,** wenn sie Kryptowährungen ins Spiel bringen, darf indes auch bezweifelt werden. Im [Abschlussdokument](http://static.kremlin.ru/media/events/files/en/RosOySvLzGaJtmx2wYFv0lN4NSPZploG.pdf) bekennen sich die Gipfel-Teilnehmer ausdrücklich zur UN, ihren Programmen und ihrer «Agenda 2030». Ernst Wolff nennt das «eine [Bankrotterklärung](https://x.com/wolff_ernst/status/1849781982961557771) korrupter Politiker, die sich dem digital-finanziellen Komplex zu 100 Prozent unterwerfen».
---
Dieser Beitrag ist zuerst auf *[Transition News](https://transition-news.org/aufstand-gegen-die-dollar-hegemonie)* erschienen.
-

@ a95c6243:d345522c
2025-02-15 19:05:38
**Auf der diesjährigen Münchner** **[Sicherheitskonferenz](https://transition-news.org/in-munchen-der-realitat-ins-auge-sehen)** **geht es vor allem um die Ukraine.** Protagonisten sind dabei zunächst die US-Amerikaner. Präsident Trump schockierte die Europäer kurz vorher durch ein Telefonat mit seinem Amtskollegen Wladimir Putin, während Vizepräsident Vance mit seiner Rede über Demokratie und Meinungsfreiheit für versteinerte Mienen und Empörung sorgte.
**Die Bemühungen der Europäer um einen Frieden in der Ukraine** halten sich, gelinde gesagt, in Grenzen. Größeres Augenmerk wird auf militärische Unterstützung, die Pflege von Feindbildern sowie Eskalation gelegt. Der deutsche Bundeskanzler Scholz [reagierte](https://transition-news.org/gesucht-friedenskanzler) auf die angekündigten Verhandlungen über einen möglichen Frieden für die Ukraine mit der Forderung nach noch höheren «Verteidigungsausgaben». Auch die amtierende Außenministerin Baerbock hatte vor der Münchner Konferenz [klargestellt](https://archive.is/nUpYa):
> «Frieden wird es nur durch Stärke geben. (...) Bei Corona haben wir gesehen, zu was Europa fähig ist. Es braucht erneut Investitionen, die der historischen Wegmarke, vor der wir stehen, angemessen sind.»
**Die Rüstungsindustrie freut sich in jedem Fall über weltweit steigende Militärausgaben.** Die Kriege in der Ukraine und in Gaza tragen zu [Rekordeinnahmen](https://transition-news.org/kriege-sind-fur-waffenproduzenten-und-hedgefonds-f-king-good) bei. Jetzt «winkt die Aussicht auf eine jahrelange große Nachrüstung in Europa», auch wenn der Ukraine-Krieg enden sollte, so hört man aus Finanzkreisen. In der Konsequenz kennt «die Aktie des deutschen Vorzeige-Rüstungskonzerns Rheinmetall in ihrem Anstieg [offenbar gar keine Grenzen](https://finanzmarktwelt.de/rheinmetall-aktie-mit-mega-rally-nachruestung-und-1-000-euro-kursziel-339271/) mehr». «Solche Friedensversprechen» wie das jetzige hätten in der Vergangenheit zu starken Kursverlusten geführt.
**Für manche Leute sind Kriegswaffen und sonstige Rüstungsgüter Waren wie alle anderen,** jedenfalls aus der Perspektive von Investoren oder Managern. Auch in diesem Bereich gibt es Startups und man spricht von Dingen wie innovativen Herangehensweisen, hocheffizienten Produktionsanlagen, skalierbaren Produktionstechniken und geringeren Stückkosten.
**Wir lesen aktuell von Massenproduktion und gesteigerten Fertigungskapazitäten** für Kriegsgerät. Der Motor solcher Dynamik und solchen Wachstums ist die Aufrüstung, die inzwischen permanent gefordert wird. Parallel wird die Bevölkerung verbal eingestimmt und auf Kriegstüchtigkeit getrimmt.
**Das Rüstungs- und KI-Startup Helsing verkündete kürzlich** eine «dezentrale [Massenproduktion](https://www.trendingtopics.eu/helsing-kampfdrohnen-unicorn-startet-dezentrale-massenproduktion-fuer-ukrainekrieg/) für den Ukrainekrieg». Mit dieser Expansion positioniere sich das Münchner Unternehmen als einer der weltweit führenden Hersteller von Kampfdrohnen. Der nächste [«Meilenstein»](https://archive.is/eZsWP) steht auch bereits an: Man will eine Satellitenflotte im Weltraum aufbauen, zur Überwachung von Gefechtsfeldern und Truppenbewegungen.
**Ebenfalls aus München stammt das als** **[DefenseTech-Startup](https://www.trendingtopics.eu/arx-robotics-produktion/)** **bezeichnete Unternehmen** ARX Robotics. Kürzlich habe man in der Region die größte europäische Produktionsstätte für autonome Verteidigungssysteme eröffnet. Damit fahre man die Produktion von Militär-Robotern hoch. Diese Expansion diene auch der Lieferung der «größten Flotte unbemannter Bodensysteme westlicher Bauart» in die Ukraine.
**Rüstung boomt und scheint ein Zukunftsmarkt zu sein.** Die Hersteller und Vermarkter betonen, mit ihren Aktivitäten und Produkten solle die europäische Verteidigungsfähigkeit erhöht werden. Ihre Strategien sollten sogar «zum Schutz demokratischer Strukturen beitragen».
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/so-klingt-das-aufrustungs-business-startups-und-alte-hasen)*** erschienen.
-

@ c631e267:c2b78d3e
2025-02-07 19:42:11
*Nur wenn wir aufeinander zugehen, haben wir die Chance* *\
auf Überwindung der gegenseitigen Ressentiments!* *\
Dr. med. dent. Jens Knipphals*  
**In Wolfsburg sollte es kürzlich eine Gesprächsrunde von Kritikern der Corona-Politik** mit Oberbürgermeister Dennis Weilmann und Vertretern der Stadtverwaltung geben. Der Zahnarzt und [langjährige](https://transition-news.org/wo-sind-einigkeit-recht-und-freiheit) Maßnahmenkritiker Jens Knipphals hatte diese Einladung ins Rathaus erwirkt und [publiziert](https://www.alexander-wallasch.de/impfgeschichten/brandbrief-zahnarzt-laesst-nicht-locker-showdown-im-wolfsburger-rathaus). Seine Motivation:
> «Ich möchte die Spaltung der Gesellschaft überwinden. Dazu ist eine umfassende Aufarbeitung der Corona-Krise in der Öffentlichkeit notwendig.»
**Schon früher hatte Knipphals Antworten von den Kommunalpolitikern verlangt,** zum Beispiel bei öffentlichen [Bürgerfragestunden](https://archive.is/ttTZc). Für das erwartete Treffen im Rathaus formulierte er Fragen wie: Warum wurden fachliche Argumente der Kritiker ignoriert? Weshalb wurde deren Ausgrenzung, Diskreditierung und Entmenschlichung nicht entgegengetreten? In welcher Form übernehmen Rat und Verwaltung in Wolfsburg persönlich Verantwortung für die erheblichen Folgen der politischen Corona-Krise?
**Der Termin fand allerdings nicht statt** – der Bürgermeister sagte ihn kurz vorher wieder ab. Knipphals bezeichnete Weilmann anschließend als [Wiederholungstäter](https://www.youtube.com/watch?v=b_zzp6jKiHo), da das Stadtoberhaupt bereits 2022 zu einem Runden Tisch in der Sache eingeladen hatte, den es dann nie gab. Gegenüber *Multipolar* [erklärte](https://multipolar-magazin.de/artikel/corona-aufarbeitung-wolfsburg) der Arzt, Weilmann wolle scheinbar eine öffentliche Aufarbeitung mit allen Mitteln verhindern. Er selbst sei «inzwischen absolut desillusioniert» und die einzige Lösung sei, dass die Verantwortlichen gingen.
**Die Aufarbeitung der Plandemie beginne bei jedem von uns selbst,** sei aber letztlich eine gesamtgesellschaftliche Aufgabe, [schreibt](https://peds-ansichten.de/2025/01/plandemie-aufarbeitung/) Peter Frey, der den «Fall Wolfsburg» auch in seinem Blog behandelt. Diese Aufgabe sei indes deutlich größer, als viele glaubten. Erfreulicherweise sei der öffentliche Informationsraum inzwischen größer, trotz der weiterhin unverfrorenen Desinformations-Kampagnen der etablierten Massenmedien.
**Frey erinnert daran, dass Dennis Weilmann mitverantwortlich** für gravierende Grundrechtseinschränkungen wie die 2021 eingeführten 2G-Regeln in der Wolfsburger Innenstadt zeichnet. Es sei naiv anzunehmen, dass ein Funktionär einzig im Interesse der Bürger handeln würde. Als früherer Dezernent des Amtes für Wirtschaft, Digitalisierung und Kultur der Autostadt kenne Weilmann zum Beispiel die Verknüpfung von Fördergeldern mit politischen Zielsetzungen gut.
**Wolfsburg wurde damals zu einem Modellprojekt** des Bundesministeriums des Innern (BMI) und war Finalist im [Bitkom](https://pareto.space/a/naddr1qqxnzden8qen2vejxvenjv35qgs2jhrzgwzvvzgz42kfmef2kr7w8x573k4r62c5ydjh8gyn6dz4ytqrqsqqqa28qyxhwumn8ghj7mn0wvhxcmmvqyv8wumn8ghj7mn0wd68ytn8wfhk7an9d9uzucm0d5qs7amnwvaz7tmwdaehgu3wd4hk6qg5waehxw309ahx7um5wghx77r5wghxgetkqydhwumn8ghj7mn0wd68ytnnwa5hxuedv4hxjemdvyhxx6qpzamhxue69uhhqctjv46x7tnwdaehgu339e3k7mgpz4mhxue69uhhqatjwpkx2un9d3shjtnrdaksz9nhwden5te0wfjkccte9cc8scmgv96zucm0d5q3gamnwvaz7tmjv4kxz7fwv3sk6atn9e5k7qgkwaehxw309aex2mrp0yhxummnw3ezucnpdejqmk3pae)-Wettbewerb «Digitale Stadt». So habe rechtzeitig vor der Plandemie das Projekt [«Smart City Wolfsburg»](https://www.beesmart.city/de/city-portraits/smart-city-wolfsburg) anlaufen können, das der Stadt «eine Vorreiterrolle für umfassende Vernetzung und Datenerfassung» aufgetragen habe, sagt Frey. Die Vereinten Nationen verkauften dann derartige «intelligente» Überwachungs- und Kontrollmaßnahmen ebenso als Rettung in der Not wie das Magazin *[Forbes](https://web.archive.org/web/20200417064208/https://www.forbes.com/sites/simonchandler/2020/04/13/how-smart-cities-are-protecting-against-coronavirus-but-threatening-privacy/#5edf8d0c1cc3)* im April 2020:
> «Intelligente Städte können uns helfen, die Coronavirus-Pandemie zu bekämpfen. In einer wachsenden Zahl von Ländern tun die intelligenten Städte genau das. Regierungen und lokale Behörden nutzen Smart-City-Technologien, Sensoren und Daten, um die Kontakte von Menschen aufzuspüren, die mit dem Coronavirus infiziert sind. Gleichzeitig helfen die Smart Cities auch dabei, festzustellen, ob die Regeln der sozialen Distanzierung eingehalten werden.»
**Offensichtlich gibt es viele Aspekte zu bedenken und zu durchleuten,** wenn es um die Aufklärung und Aufarbeitung der sogenannten «Corona-Pandemie» und der verordneten [Maßnahmen](https://transition-news.org/stopptcovid-gutachten-von-lauterbach-erhalt-vernichtende-analyse) geht. Frustration und Desillusion sind angesichts der Realitäten absolut verständlich. Gerade deswegen sind Initiativen wie die von Jens Knipphals so bewundernswert und so wichtig – ebenso wie eine seiner Kernthesen: «Wir müssen aufeinander zugehen, da hilft alles nichts».
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/corona-aufarbeitung-in-der-praxis-eine-illusion)*** erschienen.
-

@ a95c6243:d345522c
2025-01-31 20:02:25
*Im Augenblick wird mit größter Intensität, großer Umsicht* *\
das deutsche Volk belogen.* *\
Olaf Scholz im FAZ-[Interview](https://www.youtube.com/watch?v=c3KI1GmdoVc\&t=649s)*  
**Online-Wahlen stärken die Demokratie, sind sicher, und 61 Prozent der Wahlberechtigten** sprechen sich für deren Einführung in Deutschland aus. Das zumindest behauptet eine aktuelle Umfrage, die auch über die Agentur *Reuters* Verbreitung in den Medien [gefunden](https://archive.is/dnZbY) hat. Demnach würden außerdem 45 Prozent der Nichtwähler bei der Bundestagswahl ihre Stimme abgeben, wenn sie dies zum Beispiel von Ihrem PC, Tablet oder Smartphone aus machen könnten.
**Die telefonische Umfrage unter gut 1000 wahlberechtigten Personen** sei repräsentativ, [behauptet](https://www.bitkom.org/Presse/Presseinformation/Knapp-Haelfte-Nichtwaehler-wuerde-online-waehlen) der Auftraggeber – der Digitalverband Bitkom. Dieser präsentiert sich als eingetragener Verein mit einer beeindruckenden Liste von [Mitgliedern](https://www.bitkom.org/Bitkom/Mitgliedschaft/Mitgliederliste), die Software und IT-Dienstleistungen anbieten. Erklärtes Vereinsziel ist es, «Deutschland zu einem führenden Digitalstandort zu machen und die digitale Transformation der deutschen Wirtschaft und Verwaltung voranzutreiben».
**Durchgeführt hat die Befragung die Bitkom Servicegesellschaft mbH,** also alles in der Familie. Die gleiche Erhebung hatte der Verband übrigens 2021 schon einmal durchgeführt. Damals sprachen sich angeblich sogar 63 Prozent für ein derartiges [«Demokratie-Update»](https://www.experten.de/id/4922407/online-wahlen-als-update-des-demokratischen-systems/) aus – die Tendenz ist demgemäß fallend. Dennoch orakelt mancher, der Gang zur Wahlurne gelte bereits als veraltet.
**Die spanische Privat-Uni mit Globalisten-Touch, IE University, berichtete** Ende letzten Jahres in ihrer Studie «European Tech Insights», 67 Prozent der Europäer [befürchteten](https://www.ie.edu/university/news-events/news/67-europeans-fear-ai-manipulation-elections-according-ie-university-research/), dass Hacker Wahlergebnisse verfälschen könnten. Mehr als 30 Prozent der Befragten glaubten, dass künstliche Intelligenz (KI) bereits Wahlentscheidungen beeinflusst habe. Trotzdem würden angeblich 34 Prozent der unter 35-Jährigen einer KI-gesteuerten App vertrauen, um in ihrem Namen für politische Kandidaten zu stimmen.
**Wie dauerhaft wird wohl das Ergebnis der kommenden Bundestagswahl sein?** Diese Frage stellt sich angesichts der aktuellen Entwicklung der Migrations-Debatte und der (vorübergehend) bröckelnden «Brandmauer» gegen die AfD. Das «Zustrombegrenzungsgesetz» der Union hat das Parlament heute Nachmittag überraschenderweise [abgelehnt](https://www.bundestag.de/dokumente/textarchiv/2025/kw05-de-zustrombegrenzungsgesetz-1042038). Dennoch muss man wohl kein ausgesprochener Pessimist sein, um zu befürchten, dass die Entscheidungen der Bürger von den selbsternannten Verteidigern der Demokratie künftig vielleicht nicht respektiert werden, weil sie nicht gefallen.
**Bundesweit wird jetzt zu «Brandmauer-Demos» aufgerufen,** die CDU gerät unter Druck und es wird von Übergriffen auf Parteibüros und Drohungen gegen Mitarbeiter [berichtet](https://www.epochtimes.de/politik/deutschland/brandmauer-proteste-cdu-zentrale-geraeumt-kundgebungen-in-46-staedten-a5023745.html). Sicherheitsbehörden warnen vor Eskalationen, die Polizei sei «für ein mögliches erhöhtes Aufkommen von Straftaten gegenüber Politikern und gegen Parteigebäude sensibilisiert».
**Der Vorwand** **[«unzulässiger Einflussnahme»](https://transition-news.org/die-minister-faeser-und-wissing-sorgen-sich-um-unzulassige-einflussnahme-auf)** **auf Politik und Wahlen** wird als Argument schon seit einiger Zeit aufgebaut. Der Manipulation schuldig befunden wird neben Putin und Trump auch Elon Musk, was lustigerweise ausgerechnet Bill Gates gerade noch einmal bekräftigt und als [«völlig irre»](https://transition-news.org/bill-gates-nennt-musks-einmischung-in-eu-politik-vollig-irre) bezeichnet hat. Man stelle sich die Diskussionen um die Gültigkeit von Wahlergebnissen vor, wenn es Online-Verfahren zur Stimmabgabe gäbe. In der Schweiz wird [«E-Voting»](https://www.ch.ch/de/abstimmungen-und-wahlen/e-voting/) seit einigen Jahren getestet, aber wohl bisher mit wenig Erfolg.
**Die politische Brandstiftung der letzten Jahre zahlt sich immer mehr aus.** Anstatt dringende Probleme der Menschen zu lösen – zu denen auch in Deutschland die [weit verbreitete Armut](https://transition-news.org/ein-funftel-der-bevolkerung-in-deutschland-ist-von-armut-oder-sozialer) zählt –, hat die Politik konsequent polarisiert und sich auf Ausgrenzung und Verhöhnung großer Teile der Bevölkerung konzentriert. Basierend auf Ideologie und Lügen werden abweichende Stimmen unterdrückt und kriminalisiert, nicht nur und nicht erst in diesem Augenblick. Die nächsten Wochen dürften ausgesprochen spannend werden.
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/wahlen-und-wahlen-lassen)*** erschienen.
-

@ a95c6243:d345522c
2025-01-24 20:59:01
*Menschen tun alles, egal wie absurd,* *\
um ihrer eigenen Seele nicht zu begegnen.* *\
Carl Gustav Jung*  
**«Extremer Reichtum ist eine Gefahr für die Demokratie»,** sagen über die Hälfte der knapp 3000 befragten Millionäre aus G20-Staaten laut einer [Umfrage](https://web.archive.org/web/20250122124803/https://patrioticmillionaires.org/web/20250122124803/https://patrioticmillionaires.org/press/nearly-two-thirds-of-millionaires-think-influence-of-the-super-rich-on-trump-presidency-is-threat-to-global-stability/) der «Patriotic Millionaires». Ferner stellte dieser Zusammenschluss wohlhabender US-Amerikaner fest, dass 63 Prozent jener Millionäre den Einfluss von Superreichen auf US-Präsident Trump als Bedrohung für die globale Stabilität ansehen.
**Diese Besorgnis haben 370 Millionäre und Milliardäre am Dienstag** auch den in Davos beim WEF konzentrierten Privilegierten aus aller Welt übermittelt. In einem offenen Brief forderten sie die «gewählten Führer» auf, die Superreichen – also sie selbst – zu besteuern, um «die zersetzenden Auswirkungen des extremen Reichtums auf unsere Demokratien und die Gesellschaft zu bekämpfen». Zum Beispiel kontrolliere eine handvoll extrem reicher Menschen die Medien, beeinflusse die Rechtssysteme in unzulässiger Weise und verwandele Recht in Unrecht.
**Schon 2019** **[beanstandete](https://www.youtube.com/watch?v=paaen3b44XY)** **der bekannte Historiker und Schriftsteller Ruthger Bregman** an einer WEF-Podiumsdiskussion die Steuervermeidung der Superreichen. Die elitäre Veranstaltung bezeichnete er als «Feuerwehr-Konferenz, bei der man nicht über Löschwasser sprechen darf.» Daraufhin erhielt Bregman keine Einladungen nach Davos mehr. Auf seine Aussagen machte der Schweizer Aktivist Alec Gagneux aufmerksam, der sich seit Jahrzehnten kritisch mit dem WEF befasst. Ihm wurde kürzlich der Zutritt zu einem dreiteiligen Kurs über das WEF an der Volkshochschule Region Brugg [verwehrt](https://transition-news.org/wef-propaganda-an-schweizer-volkshochschule-kritiker-ausgesperrt).
**Nun ist die Erkenntnis, dass mit Geld politischer Einfluss einhergeht,** alles andere als neu. Und extremer Reichtum macht die Sache nicht wirklich besser. Trotzdem hat man über Initiativen wie Patriotic Millionaires oder [Taxmenow](https://www.taxmenow.eu/) bisher eher selten etwas gehört, obwohl es sie schon lange gibt. Auch scheint es kein Problem, wenn ein Herr [Gates](https://transition-news.org/bill-melinda-gates-stiftung) fast im Alleingang versucht, globale Gesundheits-, Klima-, Ernährungs- oder Bevölkerungspolitik zu betreiben – im Gegenteil. Im Jahr, als der Milliardär Donald Trump zum zweiten Mal ins Weiße Haus einzieht, ist das Echo in den Gesinnungsmedien dagegen enorm – und uniform, wer hätte das gedacht.

**Der neue US-Präsident hat jedoch** **[«Davos geerdet»](https://www.achgut.com/artikel/trump_erdet_davos_gruener_betrug_green_new_scam),** wie *Achgut* es nannte. In seiner kurzen [Rede](https://www.weforum.org/meetings/world-economic-forum-annual-meeting-2025/sessions/special-address-by-the-president-of-the-united-states-of-america/) beim Weltwirtschaftsforum verteidigte er seine Politik und stellte klar, er habe schlicht eine «Revolution des gesunden Menschenverstands» begonnen. Mit deutlichen Worten sprach er unter anderem von ersten Maßnahmen gegen den «Green New Scam», und von einem «Erlass, der jegliche staatliche Zensur beendet»:
> «Unsere Regierung wird die Äußerungen unserer eigenen Bürger nicht mehr als Fehlinformation oder Desinformation bezeichnen, was die Lieblingswörter von Zensoren und derer sind, die den freien Austausch von Ideen und, offen gesagt, den Fortschritt verhindern wollen.»
**Wie der** **[«Trumpismus»](https://transition-news.org/trumpismus-zeitenwende-und-tiefer-staat)** **letztlich einzuordnen ist,** muss jeder für sich selbst entscheiden. Skepsis ist definitiv angebracht, denn «einer von uns» sind weder der Präsident noch seine auserwählten Teammitglieder. Ob sie irgendeinen Sumpf trockenlegen oder Staatsverbrechen aufdecken werden oder was aus WHO- und Klimaverträgen wird, bleibt abzuwarten.
**Das** **[WHO](https://transition-news.org/who-bedauert-trumps-entscheidung-sich-aus-der-organisation-zuruckzuziehen)-Dekret fordert jedenfalls die Übertragung der Gelder auf «glaubwürdige Partner»,** die die Aktivitäten übernehmen könnten. Zufällig scheint mit «Impfguru» Bill Gates ein weiterer Harris-Unterstützer kürzlich das Lager gewechselt zu haben: Nach einem gemeinsamen Abendessen zeigte er sich [«beeindruckt»](https://archive.is/SpQ24) von Trumps Interesse an der globalen Gesundheit.
**Mit dem** **[Projekt «Stargate»](https://transition-news.org/us-privatsektor-will-500-milliarden-dollar-in-ki-investieren-krebsimpfstoffe)** **sind weitere dunkle Wolken am Erwartungshorizont** der Fangemeinde aufgezogen. Trump hat dieses Joint Venture zwischen den Konzernen OpenAI, Oracle, und SoftBank als das «größte KI-Infrastrukturprojekt der Geschichte» angekündigt. Der Stein des Anstoßes: Oracle-CEO Larry Ellison, der auch Fan von KI-gestützter [Echtzeit-Überwachung](https://transition-news.org/oracle-kundigt-neues-ki-rechenzentrum-mit-eigenen-atomreaktoren-an) ist, sieht einen weiteren potenziellen Einsatz der künstlichen Intelligenz. Sie könne dazu dienen, Krebserkrankungen zu erkennen und individuelle mRNA-«Impfstoffe» zur Behandlung innerhalb von 48 Stunden zu entwickeln.
**Warum bitte sollten sich diese superreichen «Eliten» ins eigene Fleisch schneiden** und direkt entgegen ihren eigenen Interessen handeln? Weil sie Menschenfreunde, sogenannte Philanthropen sind? Oder vielleicht, weil sie ein schlechtes Gewissen haben und ihre Schuld kompensieren müssen? Deswegen jedenfalls brauchen «Linke» laut Robert Willacker, einem deutschen Politikberater mit brasilianischen Wurzeln, rechte Parteien – ein ebenso überraschender wie humorvoller [Erklärungsansatz](https://www.youtube.com/watch?v=s63_8flX1zk).
**Wenn eine Krähe der anderen kein Auge aushackt,** dann tut sie das sich selbst noch weniger an. Dass Millionäre ernsthaft ihre eigene Besteuerung fordern oder Machteliten ihren eigenen Einfluss zugunsten anderer einschränken würden, halte ich für sehr unwahrscheinlich. So etwas glaube ich erst, wenn zum Beispiel die [Rüstungsindustrie](https://transition-news.org/schweiz-zunehmende-beteiligung-an-eu-militarprojekten) sich um Friedensverhandlungen bemüht, die [Pharmalobby](https://transition-news.org/eu-lobbyisten-gegen-pfas-verbot) sich gegen institutionalisierte Korruption einsetzt, [Zentralbanken](https://transition-news.org/digitale-wahrung) ihre CBDC-Pläne für Bitcoin opfern oder der ÖRR die Abschaffung der Rundfunkgebühren fordert.
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/elitare-anti-eliten-und-superreiche-anti-reiche)*** erschienen.
-

@ c631e267:c2b78d3e
2025-01-18 09:34:51
*Die grauenvollste Aussicht ist die der Technokratie –* *\
einer kontrollierenden Herrschaft,* *\
die durch verstümmelte und verstümmelnde Geister ausgeübt wird.* *\
Ernst Jünger*  
**«Davos ist nicht mehr sexy»,** das Weltwirtschaftsforum ([WEF](https://transition-news.org/wef-world-economic-forum)) mache Davos [kaputt](https://web.archive.org/web/20250116114956/https://www.handelszeitung.ch/wef-2025/wie-das-wef-davos-kaputt-macht-785098), diese Aussagen eines Einheimischen las ich kürzlich in der *Handelszeitung*. Während sich einige vor Ort enorm an der «teuersten Gewerbeausstellung der Welt» bereicherten, würden die negativen Begleiterscheinungen wie Wohnungsnot und Niedergang der lokalen Wirtschaft immer deutlicher.
**Nächsten Montag beginnt in dem Schweizer Bergdorf erneut ein Jahrestreffen** dieses elitären Clubs der Konzerne, bei dem man mit hochrangigen Politikern aus aller Welt und ausgewählten Vertretern der Systemmedien zusammenhocken wird. Wie bereits in den [vergangenen](https://transition-news.org/die-angst-der-eliten-vor-dem-pobel) vier Jahren wird die Präsidentin der EU-Kommission, Ursula von der Leyen, in Begleitung von Klaus Schwab ihre Grundsatzansprache halten.
**Der deutsche WEF-Gründer hatte bei dieser Gelegenheit** immer höchst lobende Worte für seine Landsmännin: [2021](https://www.weforum.org/meetings/the-davos-agenda-2021/sessions/special-address-by-g20-head-of-state-government/) erklärte er sich «stolz, dass Europa wieder unter Ihrer Führung steht» und [2022](https://www.weforum.org/meetings/the-davos-agenda-2022/sessions/special-address-by-ursula-von-der-leyen-president-of-the-european-commission-177737c164/) fand er es bemerkenswert, was sie erreicht habe angesichts des «erstaunlichen Wandels», den die Welt in den vorangegangenen zwei Jahren erlebt habe; es gebe nun einen «neuen europäischen Geist».
**Von der Leyens Handeln während der sogenannten Corona-«Pandemie»** lobte Schwab damals bereits ebenso, wie es diese Woche das [Karlspreis](https://transition-news.org/von-der-leyen-erhalt-karlspreis-albert-bourla-erklart-pfizer-habe-wahrend-der)-Direktorium tat, als man der Beschuldigten im Fall [Pfizergate](https://transition-news.org/pfizergate-startet-ins-neue-jahr) die diesjährige internationale Auszeichnung «für Verdienste um die europäische Einigung» verlieh. Außerdem habe sie die EU nicht nur gegen den «Aggressor Russland», sondern auch gegen die «innere Bedrohung durch Rassisten und Demagogen» sowie gegen den Klimawandel verteidigt.
**Jene Herausforderungen durch «Krisen epochalen Ausmaßes»** werden indes aus dem Umfeld des WEF nicht nur herbeigeredet – wie man alljährlich zur Zeit des Davoser Treffens im [Global Risks Report](https://www.zurich.com/knowledge/topics/global-risks/the-global-risks-report-2025) nachlesen kann, der zusammen mit dem Versicherungskonzern Zurich erstellt wird. Seit die Globalisten 2020/21 in der Praxis gesehen haben, wie gut eine konzertierte und konsequente Angst-Kampagne funktionieren kann, geht es Schlag auf Schlag. Sie setzen alles daran, Schwabs goldenes Zeitfenster des «Great Reset» zu nutzen.
**Ziel dieses «großen Umbruchs» ist die totale Kontrolle der Technokraten über die Menschen** unter dem Deckmantel einer globalen Gesundheitsfürsorge. Wie aber könnte man so etwas erreichen? Ein Mittel dazu ist die «kreative Zerstörung». Weitere unabdingbare Werkzeug sind die Einbindung, ja Gleichschaltung der Medien und der Justiz.
**Ein** **[«Great Mental Reset»](https://transition-news.org/angriff-auf-unser-gehirn-michael-nehls-uber-den-great-mental-reset-teil-1)** **sei die Voraussetzung dafür,** dass ein Großteil der Menschen Einschränkungen und Manipulationen wie durch die Corona-Maßnahmen praktisch kritik- und widerstandslos hinnehme, sagt der Mediziner und Molekulargenetiker Michael Nehls. Er meint damit eine regelrechte Umprogrammierung des Gehirns, wodurch nach und nach unsere Individualität und unser soziales Bewusstsein eliminiert und durch unreflektierten Konformismus ersetzt werden.
**Der aktuelle Zustand unserer Gesellschaften** ist auch für den Schweizer Rechtsanwalt Philipp Kruse alarmierend. Durch den Umgang mit der «Pandemie» sieht er die Grundlagen von Recht und Vernunft erschüttert, die [Rechtsstaatlichkeit](https://transition-news.org/schweizer-rechtsstaat-in-der-krise-ein-anwalt-schlagt-alarm) stehe auf dem Prüfstand. Seiner dringenden Mahnung an alle Bürger, die Prinzipien von Recht und Freiheit zu verteidigen, kann ich mich nur anschließen.
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/davos-europa-und-der-rest-der-welt)*** erschienen.
-

@ f9cf4e94:96abc355
2025-01-18 06:09:50
Para esse exemplo iremos usar:
| Nome | Imagem | Descrição |
| --------------- | ------------------------------------------------------------ | ------------------------------------------------------------ |
| Raspberry PI B+ |  | **Cortex-A53 (ARMv8) 64-bit a 1.4GHz e 1 GB de SDRAM LPDDR2,** |
| Pen drive |  | **16Gb** |
Recomendo que use o **Ubuntu Server** para essa instalação. Você pode baixar o Ubuntu para Raspberry Pi [aqui]( https://ubuntu.com/download/raspberry-pi). O passo a passo para a instalação do Ubuntu no Raspberry Pi está disponível [aqui]( https://ubuntu.com/tutorials/how-to-install-ubuntu-on-your-raspberry-pi). **Não instale um desktop** (como xubuntu, lubuntu, xfce, etc.).
---
## Passo 1: Atualizar o Sistema 🖥️
Primeiro, atualize seu sistema e instale o Tor:
```bash
apt update
apt install tor
```
---
## Passo 2: Criar o Arquivo de Serviço `nrs.service` 🔧
Crie o arquivo de serviço que vai gerenciar o servidor Nostr. Você pode fazer isso com o seguinte conteúdo:
```unit
[Unit]
Description=Nostr Relay Server Service
After=network.target
[Service]
Type=simple
WorkingDirectory=/opt/nrs
ExecStart=/opt/nrs/nrs-arm64
Restart=on-failure
[Install]
WantedBy=multi-user.target
```
---
## Passo 3: Baixar o Binário do Nostr 🚀
Baixe o binário mais recente do Nostr [aqui no GitHub]( https://github.com/gabrielmoura/SimpleNosrtRelay/releases).
---
## Passo 4: Criar as Pastas Necessárias 📂
Agora, crie as pastas para o aplicativo e o pendrive:
```bash
mkdir -p /opt/nrs /mnt/edriver
```
---
## Passo 5: Listar os Dispositivos Conectados 🔌
Para saber qual dispositivo você vai usar, liste todos os dispositivos conectados:
```bash
lsblk
```
---
## Passo 6: Formatando o Pendrive 💾
Escolha o pendrive correto (por exemplo, `/dev/sda`) e formate-o:
```bash
mkfs.vfat /dev/sda
```
---
## Passo 7: Montar o Pendrive 💻
Monte o pendrive na pasta `/mnt/edriver`:
```bash
mount /dev/sda /mnt/edriver
```
---
## Passo 8: Verificar UUID dos Dispositivos 📋
Para garantir que o sistema monte o pendrive automaticamente, liste os UUID dos dispositivos conectados:
```bash
blkid
```
---
## Passo 9: Alterar o `fstab` para Montar o Pendrive Automáticamente 📝
Abra o arquivo `/etc/fstab` e adicione uma linha para o pendrive, com o UUID que você obteve no passo anterior. A linha deve ficar assim:
```fstab
UUID=9c9008f8-f852 /mnt/edriver vfat defaults 0 0
```
---
## Passo 10: Copiar o Binário para a Pasta Correta 📥
Agora, copie o binário baixado para a pasta `/opt/nrs`:
```bash
cp nrs-arm64 /opt/nrs
```
---
## Passo 11: Criar o Arquivo de Configuração 🛠️
Crie o arquivo de configuração com o seguinte conteúdo e salve-o em `/opt/nrs/config.yaml`:
```yaml
app_env: production
info:
name: Nostr Relay Server
description: Nostr Relay Server
pub_key: ""
contact: ""
url: http://localhost:3334
icon: https://external-content.duckduckgo.com/iu/?u= https://public.bnbstatic.com/image/cms/crawler/COINCU_NEWS/image-495-1024x569.png
base_path: /mnt/edriver
negentropy: true
```
---
## Passo 12: Copiar o Serviço para o Diretório de Systemd ⚙️
Agora, copie o arquivo `nrs.service` para o diretório `/etc/systemd/system/`:
```bash
cp nrs.service /etc/systemd/system/
```
Recarregue os serviços e inicie o serviço `nrs`:
```bash
systemctl daemon-reload
systemctl enable --now nrs.service
```
---
## Passo 13: Configurar o Tor 🌐
Abra o arquivo de configuração do Tor `/var/lib/tor/torrc` e adicione a seguinte linha:
```torrc
HiddenServiceDir /var/lib/tor/nostr_server/
HiddenServicePort 80 127.0.0.1:3334
```
---
## Passo 14: Habilitar e Iniciar o Tor 🧅
Agora, ative e inicie o serviço Tor:
```bash
systemctl enable --now tor.service
```
O Tor irá gerar um endereço `.onion` para o seu servidor Nostr. Você pode encontrá-lo no arquivo `/var/lib/tor/nostr_server/hostname`.
---
## Observações ⚠️
- Com essa configuração, **os dados serão salvos no pendrive**, enquanto o binário ficará no cartão SD do Raspberry Pi.
- O endereço `.onion` do seu servidor Nostr será algo como: `ws://y3t5t5wgwjif<exemplo>h42zy7ih6iwbyd.onion`.
---
Agora, seu servidor Nostr deve estar configurado e funcionando com Tor! 🥳
Se este artigo e as informações aqui contidas forem úteis para você, convidamos a considerar uma doação ao autor como forma de reconhecimento e incentivo à produção de novos conteúdos.
-

@ a95c6243:d345522c
2025-01-13 10:09:57
*Ich begann, Social Media aufzubauen,* *\
um den Menschen eine Stimme zu geben.* *\
Mark Zuckerberg*
**Sind euch auch die Tränen gekommen, als ihr Mark Zuckerbergs** **[Wendehals-Deklaration](https://www.facebook.com/zuck/videos/1525382954801931)** bezüglich der Meinungsfreiheit auf seinen Portalen gehört habt? Rührend, oder? Während er früher die offensichtliche Zensur leugnete und später die Regierung Biden dafür verantwortlich machte, will er nun angeblich «die Zensur auf unseren Plattformen drastisch reduzieren».
**«Purer** **[Opportunismus](https://transition-news.org/facebook-grunder-zuckerberg-vom-trump-gegner-zum-trump-buddy-und-anti-zensor)» ob des anstehenden Regierungswechsels wäre als Klassifizierung** viel zu kurz gegriffen. Der jetzige Schachzug des Meta-Chefs ist genauso Teil einer kühl kalkulierten Business-Strategie, wie es die 180 Grad umgekehrte Praxis vorher war. Social Media sind ein höchst lukratives Geschäft. Hinzu kommt vielleicht noch ein bisschen verkorkstes Ego, weil derartig viel Einfluss und Geld sicher auch auf die Psyche schlagen. Verständlich.
> «Es ist an der Zeit, zu unseren Wurzeln der freien Meinungsäußerung auf Facebook und Instagram zurückzukehren. Ich begann, Social Media aufzubauen, um den Menschen eine Stimme zu geben», sagte Zuckerberg.
**Welche Wurzeln? Hat der Mann vergessen, dass er von der Überwachung,** dem Ausspionieren und dem Ausverkauf sämtlicher Daten und digitaler Spuren sowie der Manipulation seiner «Kunden» lebt? Das ist knallharter Kommerz, nichts anderes. Um freie Meinungsäußerung geht es bei diesem Geschäft ganz sicher nicht, und das war auch noch nie so. Die Wurzeln von Facebook liegen in einem Projekt des US-Militärs mit dem Namen [«LifeLog»](https://norberthaering.de/macht-kontrolle/lifelog/). Dessen Ziel war es, «ein digitales Protokoll vom Leben eines Menschen zu erstellen».
**Der Richtungswechsel kommt allerdings nicht überraschend.** Schon Anfang Dezember hatte Meta-Präsident Nick Clegg von «zu hoher Fehlerquote bei der Moderation» von Inhalten [gesprochen](https://www.theverge.com/2024/12/3/24311513/meta-content-moderation-mistakes-nick-clegg). Bei der Gelegenheit erwähnte er auch, dass Mark sehr daran interessiert sei, eine aktive Rolle in den Debatten über eine amerikanische Führungsrolle im technologischen Bereich zu spielen.
**Während Milliardärskollege und Big Tech-Konkurrent Elon Musk bereits seinen Posten** in der kommenden Trump-Regierung in Aussicht hat, möchte Zuckerberg also nicht nur seine Haut retten – Trump hatte ihn einmal einen «Feind des Volkes» genannt und ihm lebenslange Haft angedroht –, sondern am liebsten auch mitspielen. KI-Berater ist wohl die gewünschte Funktion, wie man nach einem Treffen Trump-Zuckerberg hörte. An seine [Verhaftung](https://transition-news.org/nicht-telegram-grunder-durow-sondern-zuckerberg-sollte-in-haft-sitzen-wegen-des) dachte vermutlich auch ein weiterer Multimilliardär mit eigener Social Media-Plattform, Pavel Durov, als er Zuckerberg jetzt [kritisierte](https://www.berliner-zeitung.de/news/ende-des-faktenchecks-bei-meta-telegram-gruender-kritisiert-zuckerberg-und-spricht-warnung-aus-li.2287988) und gleichzeitig warnte.
**Politik und Systemmedien drehen jedenfalls durch** – was zu viel ist, ist zu viel. Etwas weniger Zensur und mehr Meinungsfreiheit würden die Freiheit der Bürger schwächen und seien potenziell vernichtend für die Menschenrechte. Zuckerberg setze mit dem neuen Kurs die Demokratie aufs Spiel, das sei eine «Einladung zum nächsten [Völkermord](https://archive.is/PYeH0)», ernsthaft. Die Frage sei, ob sich die [EU gegen Musk und Zuckerberg](https://www.handelsblatt.com/politik/international/internet-regulierung-kann-sich-die-eu-gegen-musk-und-zuckerberg-behaupten/100099373.html) behaupten könne, Brüssel müsse jedenfalls hart durchgreifen.
**Auch um die** **[Faktenchecker](https://www.welt.de/kultur/medien/article255065352/Metas-Kurswechsel-Zuckerbergs-Entscheidung-und-die-Folgen-fuer-deutsche-Faktenchecker.html)** **macht man sich Sorgen.** Für die deutsche Nachrichtenagentur *dpa* und die «Experten» von *Correctiv*, die (noch) Partner für Fact-Checking-Aktivitäten von Facebook sind, sei das ein «lukratives Geschäftsmodell». Aber möglicherweise werden die Inhalte ohne diese vermeintlichen Korrektoren ja sogar besser. Anders als Meta wollen jedoch Scholz, Faeser und die *Tagesschau* keine Fehler zugeben und zum Beispiel *Correctiv*-[Falschaussagen](https://www.berliner-zeitung.de/politik-gesellschaft/correctiv-falschaussagen-exklusiv-scholz-faeser-und-tagesschau-wollen-sich-fuer-verbreitung-nicht-entschuldigen-li.2288126) einräumen.
**Bei derlei dramatischen Befürchtungen wundert es nicht,** dass der öffentliche Plausch auf X zwischen Elon Musk und AfD-Chefin Alice Weidel von 150 EU-Beamten überwacht wurde, falls es irgendwelche Rechtsverstöße geben sollte, die man ihnen ankreiden könnte. Auch der Deutsche Bundestag war wachsam. Gefunden haben dürften sie nichts. Das Ganze war eher eine Show, viel Wind wurde gemacht, aber letztlich gab es nichts als heiße Luft.
**Das** **[Anbiedern](https://transition-news.org/who-biedert-sich-bei-trump-an)** **bei Donald Trump ist indes gerade in Mode.** Die Weltgesundheitsorganisation (WHO) tut das auch, denn sie fürchtet um Spenden von über einer Milliarde Dollar. Eventuell könnte ja Elon Musk auch hier künftig aushelfen und der Organisation sowie deren größtem privaten Förderer, Bill Gates, etwas unter die Arme greifen. Nachdem Musks KI-Projekt xAI kürzlich von BlackRock & Co. [sechs Milliarden](https://x.ai/blog/series-c) eingestrichen hat, geht da vielleicht etwas.
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/milliardenschwere-wetterfahnchen-und-windmaschinen)*** erschienen.
-

@ a95c6243:d345522c
2025-01-03 20:26:47
*Was du bist hängt von drei Faktoren ab:* *\
Was du geerbt hast,* *\
was deine Umgebung aus dir machte* *\
und was du in freier Wahl* *\
aus deiner Umgebung und deinem Erbe gemacht hast.* *\
Aldous Huxley*
**Das brave Mitmachen und Mitlaufen in einem vorgegebenen, recht engen Rahmen** ist gewiss nicht neu, hat aber gerade wieder mal Konjunktur. Dies kann man deutlich beobachten, eigentlich egal, in welchem gesellschaftlichen Bereich man sich umschaut. Individualität ist nur soweit angesagt, wie sie in ein bestimmtes Schema von «Diversität» passt, und Freiheit verkommt zur Worthülse – nicht erst durch ein gewisses [Buch](https://www.nachdenkseiten.de/?p=126416) einer gewissen ehemaligen Regierungschefin.
**Erklärungsansätze für solche Entwicklungen sind bekannt,** und praktisch alle haben etwas mit Massenpsychologie zu tun. Der Herdentrieb, also der Trieb der Menschen, sich – zum Beispiel aus Unsicherheit oder Bequemlichkeit – lieber der Masse anzuschließen als selbstständig zu denken und zu handeln, ist einer der Erklärungsversuche. Andere drehen sich um Macht, Propaganda, Druck und Angst, also den gezielten Einsatz psychologischer [Herrschaftsinstrumente](https://transition-news.org/spip.php?recherche=nudging\&page=recherche_wall).
**Aber wollen die Menschen überhaupt Freiheit?** Durch Gespräche im privaten Umfeld bin ich diesbezüglich in der letzten Zeit etwas skeptisch geworden. Um die Jahreswende philosophiert man ja gerne ein wenig über das Erlebte und über die Erwartungen für die Zukunft. Dabei hatte ich hin und wieder den Eindruck, die totalitären Anwandlungen unserer «Repräsentanten» kämen manchen Leuten gerade recht.
**«Desinformation» ist so ein brisantes Thema.** Davor müsse man die Menschen doch schützen, hörte ich. Jemand müsse doch zum Beispiel diese ganzen merkwürdigen Inhalte in den Social Media filtern – zur [Ukraine](https://transition-news.org/spip.php?recherche=ukraine\&page=recherche_wall), zum [Klima](https://transition-news.org/spip.php?recherche=klima\&page=recherche_wall), zu [Gesundheitsthemen](https://transition-news.org/spip.php?recherche=impfung\&page=recherche_wall) oder zur [Migration](https://transition-news.org/spip.php?recherche=migration\&page=recherche_wall). Viele wüssten ja gar nicht einzuschätzen, was richtig und was falsch ist, sie bräuchten eine Führung.
**Freiheit bedingt Eigenverantwortung, ohne Zweifel.** Eventuell ist es einigen tatsächlich zu anspruchsvoll, die Verantwortung für das eigene Tun und Lassen zu übernehmen. Oder die persönliche Freiheit wird nicht als ausreichend wertvolles Gut angesehen, um sich dafür anzustrengen. In dem Fall wäre die mangelnde Selbstbestimmung wohl das kleinere Übel. Allerdings fehlt dann gemäß Aldous Huxley ein Teil der Persönlichkeit. Letztlich ist natürlich alles eine Frage der Abwägung.
**Sind viele Menschen möglicherweise schon so «eingenordet»,** dass freiheitliche Ambitionen gar nicht für eine ganze Gruppe, ein Kollektiv, verfolgt werden können? Solche Gedanken kamen mir auch, als ich mir kürzlich diverse Talks beim viertägigen [Hacker-Kongress](https://transition-news.org/der-38-kongress-des-chaos-computer-clubs-bot-mehr-enthullungen-als-nur-die) des Chaos Computer Clubs (38C3) anschaute. Ich war nicht nur überrascht, sondern reichlich erschreckt angesichts der in weiten Teilen mainstream-geformten Inhalte, mit denen ein dankbares Publikum beglückt wurde. Wo ich allgemein hellere Köpfe erwartet hatte, fand ich Konformismus und enthusiastisch untermauerte Narrative.
**Gibt es vielleicht so etwas wie eine Herdenimmunität gegen Indoktrination?** Ich denke, ja, zumindest eine gestärkte Widerstandsfähigkeit. Was wir brauchen, sind etwas gesunder Menschenverstand, offene Informationskanäle und der Mut, sich freier auch zwischen den Herden zu bewegen. Sie tun das bereits, aber sagen Sie es auch dieses Jahr ruhig weiter.
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/kann-es-sein-dass-die-menschen-gar-keine-freiheit-wollen)*** erschienen.
-

@ a95c6243:d345522c
2025-01-01 17:39:51
**Heute möchte ich ein Gedicht mit euch teilen.** Es handelt sich um eine Ballade des österreichischen Lyrikers Johann Gabriel Seidl aus dem 19. Jahrhundert. Mir sind diese Worte fest in Erinnerung, da meine Mutter sie perfekt rezitieren konnte, auch als die Kräfte schon langsam schwanden.
**Dem originalen Titel «Die Uhr»** habe ich für mich immer das Wort «innere» hinzugefügt. Denn der Zeitmesser – hier vermutliche eine Taschenuhr – symbolisiert zwar in dem Kontext das damalige Zeitempfinden und die Umbrüche durch die industrielle Revolution, sozusagen den Zeitgeist und das moderne Leben. Aber der Autor setzt sich philosophisch mit der Zeit auseinander und gibt seinem Werk auch eine klar spirituelle Dimension.
**Das Ticken der Uhr und die Momente des Glücks und der Trauer** stehen sinnbildlich für das unaufhaltsame Fortschreiten und die Vergänglichkeit des Lebens. Insofern könnte man bei der Uhr auch an eine Sonnenuhr denken. Der Rhythmus der Ereignisse passt uns vielleicht nicht immer in den Kram.
**Was den Takt pocht, ist durchaus auch das Herz,** unser «inneres Uhrwerk». Wenn dieses Meisterwerk einmal stillsteht, ist es unweigerlich um uns geschehen. Hoffentlich können wir dann dankbar sagen: «Ich habe mein Bestes gegeben.»
*Ich trage, wo ich gehe, stets eine Uhr bei mir;* \
*Wieviel es geschlagen habe, genau seh ich an ihr.* \
*Es ist ein großer Meister, der künstlich ihr Werk gefügt,* \
*Wenngleich ihr Gang nicht immer dem törichten Wunsche genügt.*  
*Ich wollte, sie wäre rascher gegangen an manchem Tag;* *\
Ich wollte, sie hätte manchmal verzögert den raschen Schlag.* *\
In meinen Leiden und Freuden, in Sturm und in der Ruh,* *\
Was immer geschah im Leben, sie pochte den Takt dazu.*  
*Sie schlug am Sarge des Vaters, sie schlug an des Freundes Bahr,* *\
Sie schlug am Morgen der Liebe, sie schlug am Traualtar.* *\
Sie schlug an der Wiege des Kindes, sie schlägt, will's Gott, noch oft,* *\
Wenn bessere Tage kommen, wie meine Seele es hofft.*  
*Und ward sie auch einmal träger, und drohte zu stocken ihr Lauf,* *\
So zog der Meister immer großmütig sie wieder auf.* *\
Doch stände sie einmal stille, dann wär's um sie geschehn,* *\
Kein andrer, als der sie fügte, bringt die Zerstörte zum Gehn.*  
*Dann müßt ich zum Meister wandern, der wohnt am Ende wohl weit,* *\
Wohl draußen, jenseits der Erde, wohl dort in der Ewigkeit!* *\
Dann gäb ich sie ihm zurücke mit dankbar kindlichem Flehn:* *\
Sieh, Herr, ich hab nichts verdorben, sie blieb von selber stehn.*  
*Johann Gabriel Seidl (1804-1875)*
-

@ f9cf4e94:96abc355
2024-12-31 20:18:59
Scuttlebutt foi iniciado em maio de 2014 por Dominic Tarr ( [dominictarr]( https://github.com/dominictarr/scuttlebutt) ) como uma rede social alternativa off-line, primeiro para convidados, que permite aos usuários obter controle total de seus dados e privacidade. Secure Scuttlebutt ([ssb]( https://github.com/ssbc/ssb-db)) foi lançado pouco depois, o que coloca a privacidade em primeiro plano com mais recursos de criptografia.
Se você está se perguntando de onde diabos veio o nome Scuttlebutt:
> Este termo do século 19 para uma fofoca vem do Scuttlebutt náutico: “um barril de água mantido no convés, com um buraco para uma xícara”. A gíria náutica vai desde o hábito dos marinheiros de se reunir pelo boato até a fofoca, semelhante à fofoca do bebedouro.

Marinheiros se reunindo em torno da rixa. ( [fonte]( https://twitter.com/IntEtymology/status/998879578851508224) )
Dominic descobriu o termo boato em um [artigo de pesquisa]( https://www.cs.cornell.edu/home/rvr/papers/flowgossip.pdf) que leu.
Em sistemas distribuídos, [fofocar]( https://en.wikipedia.org/wiki/Gossip_protocol) é um processo de retransmissão de mensagens ponto a ponto; as mensagens são disseminadas de forma análoga ao “boca a boca”.
**Secure Scuttlebutt é um banco de dados de feeds imutáveis apenas para acréscimos, otimizado para replicação eficiente para protocolos ponto a ponto.** **Cada usuário tem um log imutável somente para acréscimos no qual eles podem gravar.** Eles gravam no log assinando mensagens com sua chave privada. Pense em um feed de usuário como seu próprio diário de bordo, como um diário [de bordo]( https://en.wikipedia.org/wiki/Logbook) (ou diário do capitão para os fãs de Star Trek), onde eles são os únicos autorizados a escrever nele, mas têm a capacidade de permitir que outros amigos ou colegas leiam ao seu diário de bordo, se assim o desejarem.
Cada mensagem possui um número de sequência e a mensagem também deve fazer referência à mensagem anterior por seu ID. O ID é um hash da mensagem e da assinatura. A estrutura de dados é semelhante à de uma lista vinculada. É essencialmente um log somente de acréscimo de JSON assinado. **Cada item adicionado a um log do usuário é chamado de mensagem.**
**Os logs do usuário são conhecidos como feed e um usuário pode seguir os feeds de outros usuários para receber suas atualizações.** Cada usuário é responsável por armazenar seu próprio feed. Quando Alice assina o feed de Bob, Bob baixa o log de feed de Alice. Bob pode verificar se o registro do feed realmente pertence a Alice verificando as assinaturas. Bob pode verificar as assinaturas usando a chave pública de Alice.

Estrutura de alto nível de um feed
**Pubs são servidores de retransmissão conhecidos como “super peers”. Pubs conectam usuários usuários e atualizações de fofocas a outros usuários conectados ao Pub. Um Pub é análogo a um pub da vida real, onde as pessoas vão para se encontrar e se socializar.** Para ingressar em um Pub, o usuário deve ser convidado primeiro. Um usuário pode solicitar um código de convite de um Pub; o Pub simplesmente gerará um novo código de convite, mas alguns Pubs podem exigir verificação adicional na forma de verificação de e-mail ou, com alguns Pubs, você deve pedir um código em um fórum público ou chat. Pubs também podem mapear aliases de usuário, como e-mails ou nome de usuário, para IDs de chave pública para facilitar os pares de referência.
Depois que o Pub enviar o código de convite ao usuário, o usuário resgatará o código, o que significa que o Pub seguirá o usuário, o que permite que o usuário veja as mensagens postadas por outros membros do Pub, bem como as mensagens de retransmissão do Pub pelo usuário a outros membros do Pub.
Além de retransmitir mensagens entre pares, os Pubs também podem armazenar as mensagens. Se Alice estiver offline e Bob transmitir atualizações de feed, Alice perderá a atualização. Se Alice ficar online, mas Bob estiver offline, não haverá como ela buscar o feed de Bob. Mas com um Pub, Alice pode buscar o feed no Pub mesmo se Bob estiver off-line porque o Pub está armazenando as mensagens. **Pubs são úteis porque assim que um colega fica online, ele pode sincronizar com o Pub para receber os feeds de seus amigos potencialmente offline.**
Um usuário pode, opcionalmente, executar seu próprio servidor Pub e abri-lo ao público ou permitir que apenas seus amigos participem, se assim o desejarem. Eles também podem ingressar em um Pub público. Aqui está uma lista de [Pubs públicos em que]( https://github.com/ssbc/ssb-server/wiki/Pub-Servers) todos podem participar **.** Explicaremos como ingressar em um posteriormente neste guia. **Uma coisa importante a observar é que o Secure Scuttlebutt em uma rede social somente para convidados significa que você deve ser “puxado” para entrar nos círculos sociais.** Se você responder às mensagens, os destinatários não serão notificados, a menos que estejam seguindo você de volta. O objetivo do SSB é criar “ilhas” isoladas de redes pares, ao contrário de uma rede pública onde qualquer pessoa pode enviar mensagens a qualquer pessoa.

Perspectivas dos participantes
## Scuttlebot
O software Pub é conhecido como servidor Scuttlebutt (servidor [ssb]( https://github.com/ssbc/ssb-server) ), mas também é conhecido como “Scuttlebot” e `sbot`na linha de comando. O servidor SSB adiciona comportamento de rede ao banco de dados Scuttlebutt (SSB). Estaremos usando o Scuttlebot ao longo deste tutorial.
**Os logs do usuário são conhecidos como feed e um usuário pode seguir os feeds de outros usuários para receber suas atualizações.** Cada usuário é responsável por armazenar seu próprio feed. Quando Alice assina o feed de Bob, Bob baixa o log de feed de Alice. Bob pode verificar se o registro do feed realmente pertence a Alice verificando as assinaturas. Bob pode verificar as assinaturas usando a chave pública de Alice.

Estrutura de alto nível de um feed
**Pubs são servidores de retransmissão conhecidos como “super peers”. Pubs conectam usuários usuários e atualizações de fofocas a outros usuários conectados ao Pub. Um Pub é análogo a um pub da vida real, onde as pessoas vão para se encontrar e se socializar.** Para ingressar em um Pub, o usuário deve ser convidado primeiro. Um usuário pode solicitar um código de convite de um Pub; o Pub simplesmente gerará um novo código de convite, mas alguns Pubs podem exigir verificação adicional na forma de verificação de e-mail ou, com alguns Pubs, você deve pedir um código em um fórum público ou chat. Pubs também podem mapear aliases de usuário, como e-mails ou nome de usuário, para IDs de chave pública para facilitar os pares de referência.
Depois que o Pub enviar o código de convite ao usuário, o usuário resgatará o código, o que significa que o Pub seguirá o usuário, o que permite que o usuário veja as mensagens postadas por outros membros do Pub, bem como as mensagens de retransmissão do Pub pelo usuário a outros membros do Pub.
Além de retransmitir mensagens entre pares, os Pubs também podem armazenar as mensagens. Se Alice estiver offline e Bob transmitir atualizações de feed, Alice perderá a atualização. Se Alice ficar online, mas Bob estiver offline, não haverá como ela buscar o feed de Bob. Mas com um Pub, Alice pode buscar o feed no Pub mesmo se Bob estiver off-line porque o Pub está armazenando as mensagens. **Pubs são úteis porque assim que um colega fica online, ele pode sincronizar com o Pub para receber os feeds de seus amigos potencialmente offline.**
Um usuário pode, opcionalmente, executar seu próprio servidor Pub e abri-lo ao público ou permitir que apenas seus amigos participem, se assim o desejarem. Eles também podem ingressar em um Pub público. Aqui está uma lista de [Pubs públicos em que]( https://github.com/ssbc/ssb-server/wiki/Pub-Servers) todos podem participar **.** Explicaremos como ingressar em um posteriormente neste guia. **Uma coisa importante a observar é que o Secure Scuttlebutt em uma rede social somente para convidados significa que você deve ser “puxado” para entrar nos círculos sociais.** Se você responder às mensagens, os destinatários não serão notificados, a menos que estejam seguindo você de volta. O objetivo do SSB é criar “ilhas” isoladas de redes pares, ao contrário de uma rede pública onde qualquer pessoa pode enviar mensagens a qualquer pessoa.


Perspectivas dos participantes
## Pubs - Hubs
### Pubs públicos
| Pub Name | Operator | Invite Code |
| ------------------------------------------------------------ | ------------------------------------------------------------ | ------------------------------------------------------------ |
| `scuttle.us` | [@Ryan]( https://keybase.io/ryan_singer) | `scuttle.us:8008:@WqcuCOIpLtXFRw/9vOAQJti8avTZ9vxT9rKrPo8qG6o=.ed25519~/ZUi9Chpl0g1kuWSrmehq2EwMQeV0Pd+8xw8XhWuhLE=` |
| [pub1.upsocial.com]( https://upsocial.com/) | [@freedomrules]( https://github.com/freedomrules) | `pub1.upsocial.com:8008:@gjlNF5Cyw3OKZxEoEpsVhT5Xv3HZutVfKBppmu42MkI=.ed25519~lMd6f4nnmBZEZSavAl4uahl+feajLUGqu8s2qdoTLi8=` |
| [Monero Pub]( https://xmr-pub.net/) | [@Denis]( https://github.com/Orville2112) | `xmr-pub.net:8008:@5hTpvduvbDyMLN2IdzDKa7nx7PSem9co3RsOmZoyyCM=.ed25519~vQU+r2HUd6JxPENSinUWdfqrJLlOqXiCbzHoML9iVN4=` |
| [FreeSocial]( https://freesocial.co/) | [@Jarland]( https://github.com/mxroute) | `pub.freesocial.co:8008:@ofYKOy2p9wsaxV73GqgOyh6C6nRGFM5FyciQyxwBd6A=.ed25519~ye9Z808S3KPQsV0MWr1HL0/Sh8boSEwW+ZK+8x85u9w=` |
| `ssb.vpn.net.br` | [@coffeverton]( https://about.me/coffeverton) | `ssb.vpn.net.br:8008:@ze8nZPcf4sbdULvknEFOCbVZtdp7VRsB95nhNw6/2YQ=.ed25519~D0blTolH3YoTwSAkY5xhNw8jAOjgoNXL/+8ZClzr0io=` |
| [gossip.noisebridge.info]( https://www.noisebridge.net/wiki/Pub) | [Noisebridge Hackerspace]( https://www.noisebridge.net/wiki/Unicorn) [@james.network]( https://james.network/) | `gossip.noisebridge.info:8008:@2NANnQVdsoqk0XPiJG2oMZqaEpTeoGrxOHJkLIqs7eY=.ed25519~JWTC6+rPYPW5b5zCion0gqjcJs35h6JKpUrQoAKWgJ4=` |
### Pubs privados
Você precisará entrar em contato com os proprietários desses bares para receber um convite.
| Pub Name | Operator | Contact |
| --------------------------------------------- | ------------------------------------------------------------ | ----------------------------------------------- |
| `many.butt.nz` | [@dinosaur]( https://dinosaur.is/) | [mikey@enspiral.com](mailto:mikey@enspiral.com) |
| `one.butt.nz` | [@dinosaur]( https://dinosaur.is/) | [mikey@enspiral.com](mailto:mikey@enspiral.com) |
| `ssb.mikey.nz` | [@dinosaur]( https://dinosaur.is/) | [mikey@enspiral.com](mailto:mikey@enspiral.com) |
| [ssb.celehner.com]( https://ssb.celehner.com/) | [@cel]( https://github.com/ssbc/ssb-server/wiki/@f/6sQ6d2CMxRUhLpspgGIulDxDCwYD7DzFzPNr7u5AU=.ed25519) | [cel@celehner.com](mailto:cel@celehner.com) |
### Pubs muito grandes
 *Aviso: embora tecnicamente funcione usar um convite para esses pubs, você provavelmente se divertirá se o fizer devido ao seu tamanho (muitas coisas para baixar, risco para bots / spammers / idiotas)* 
| Pub Name | Operator | Invite Code |
| --------------------------------------- | ----------------------------------------------- | ------------------------------------------------------------ |
| `scuttlebutt.de` | [SolSoCoG]( https://solsocog.de/impressum) | `scuttlebutt.de:8008:@yeh/GKxlfhlYXSdgU7CRLxm58GC42za3tDuC4NJld/k=.ed25519~iyaCpZ0co863K9aF+b7j8BnnHfwY65dGeX6Dh2nXs3c=` |
| `Lohn's Pub` | [@lohn]( https://github.com/lohn) | `p.lohn.in:8018:@LohnKVll9HdLI3AndEc4zwGtfdF/J7xC7PW9B/JpI4U=.ed25519~z3m4ttJdI4InHkCtchxTu26kKqOfKk4woBb1TtPeA/s=` |
| [Scuttle Space]( https://scuttle.space/) | [@guil-dot]( https://github.com/guil-dot) | Visit [scuttle.space]( https://scuttle.space/) |
| `SSB PeerNet US-East` | [timjrobinson]( https://github.com/timjrobinson) | `us-east.ssbpeer.net:8008:@sTO03jpVivj65BEAJMhlwtHXsWdLd9fLwyKAT1qAkc0=.ed25519~sXFc5taUA7dpGTJITZVDCRy2A9jmkVttsr107+ufInU=` |
| Hermies | s | net:hermies.club:8008~shs:uMYDVPuEKftL4SzpRGVyQxLdyPkOiX7njit7+qT/7IQ=:SSB+Room+PSK3TLYC2T86EHQCUHBUHASCASE18JBV24= |
## GUI - Interface Gráfica do Utilizador(Usuário)
### Patchwork - Uma GUI SSB (Descontinuado)
[**Patchwork**]( https://github.com/ssbc/patchwork) **é o aplicativo de mensagens e compartilhamento descentralizado construído em cima do SSB** . O protocolo scuttlebutt em si não mantém um conjunto de feeds nos quais um usuário está interessado, então um cliente é necessário para manter uma lista de feeds de pares em que seu respectivo usuário está interessado e seguindo.

Fonte: [scuttlebutt.nz]( https://www.scuttlebutt.nz/getting-started)
**Quando você instala e executa o Patchwork, você só pode ver e se comunicar com seus pares em sua rede local. Para acessar fora de sua LAN, você precisa se conectar a um Pub.** Um pub é apenas para convidados e eles retransmitem mensagens entre você e seus pares fora de sua LAN e entre outros Pubs.
Lembre-se de que você precisa seguir alguém para receber mensagens dessa pessoa. Isso reduz o envio de mensagens de spam para os usuários. Os usuários só veem as respostas das pessoas que seguem. Os dados são sincronizados no disco para funcionar offline, mas podem ser sincronizados diretamente com os pares na sua LAN por wi-fi ou bluetooth.
### Patchbay - Uma GUI Alternativa
Patchbay é um cliente de fofoca projetado para ser fácil de modificar e estender. Ele usa o mesmo banco de dados que [Patchwork]( https://github.com/ssbc/patchwork) e [Patchfoo]( https://github.com/ssbc/patchfoo) , então você pode facilmente dar uma volta com sua identidade existente.

### Planetary - GUI para IOS

[Planetary]( https://apps.apple.com/us/app/planetary-app/id1481617318) é um app com pubs pré-carregados para facilitar integração.
### Manyverse - GUI para Android

[Manyverse]( https://www.manyver.se/) é um aplicativo de rede social com recursos que você esperaria: posts, curtidas, perfis, mensagens privadas, etc. Mas não está sendo executado na nuvem de propriedade de uma empresa, em vez disso, as postagens de seus amigos e todos os seus dados sociais vivem inteiramente em seu telefone .
## Fontes
* https://scuttlebot.io/
* https://decentralized-id.com/decentralized-web/scuttlebot/#plugins
* https://medium.com/@miguelmota/getting-started-with-secure-scuttlebut-e6b7d4c5ecfd
* [**Secure Scuttlebutt**]( http://ssbc.github.io/secure-scuttlebutt/) **:** um protocolo de banco de dados global.
-

@ f9cf4e94:96abc355
2024-12-30 19:02:32
Na era das grandes navegações, piratas ingleses eram autorizados pelo governo para roubar navios.
A única coisa que diferenciava um pirata comum de um corsário é que o último possuía a “Carta do Corso”, que funcionava como um “Alvará para o roubo”, onde o governo Inglês legitimava o roubo de navios por parte dos corsários. É claro, que em troca ele exigia uma parte da espoliação.
Bastante similar com a maneira que a Receita Federal atua, não? Na verdade, o caso é ainda pior, pois o governo fica com toda a riqueza espoliada, e apenas repassa um mísero salário para os corsários modernos, os agentes da receita federal.
Porém eles “justificam” esse roubo ao chamá-lo de imposto, e isso parece acalmar os ânimos de grande parte da população, mas não de nós.
Não é por acaso que 'imposto' é o particípio passado do verbo 'impor'. Ou seja, é aquilo que resulta do cumprimento obrigatório -- e não voluntário -- de todos os cidadãos. Se não for 'imposto' ninguém paga. Nem mesmo seus defensores. Isso mostra o quanto as pessoas realmente apreciam os serviços do estado.
Apenas volte um pouco na história: os primeiros pagadores de impostos eram fazendeiros cujos territórios foram invadidos por nômades que pastoreavam seu gado. Esses invasores nômades forçavam os fazendeiros a lhes pagar uma fatia de sua renda em troca de "proteção". O fazendeiro que não concordasse era assassinado.
Os nômades perceberam que era muito mais interessante e confortável apenas cobrar uma taxa de proteção em vez de matar o fazendeiro e assumir suas posses. Cobrando uma taxa, eles obtinham o que necessitavam. Já se matassem os fazendeiros, eles teriam de gerenciar por conta própria toda a produção da fazenda.
Daí eles entenderam que, ao não assassinarem todos os fazendeiros que encontrassem pelo caminho, poderiam fazer desta prática um modo de vida.
Assim nasceu o governo.
Não assassinar pessoas foi o primeiro serviço que o governo forneceu. Como temos sorte em ter à nossa disposição esta instituição!
Assim, não deixa de ser curioso que algumas pessoas digam que os impostos são pagos basicamente para impedir que aconteça exatamente aquilo que originou a existência do governo. O governo nasceu da extorsão. Os fazendeiros tinham de pagar um "arrego" para seu governo. Caso contrário, eram assassinados.
Quem era a real ameaça? O governo. A máfia faz a mesma coisa.
Mas existe uma forma de se proteger desses corsários modernos. Atualmente, existe uma propriedade privada que NINGUÉM pode tirar de você, ela é sua até mesmo depois da morte. É claro que estamos falando do Bitcoin. Fazendo as configurações certas, é impossível saber que você tem bitcoin. Nem mesmo o governo americano consegue saber.
#brasil #bitcoinbrasil #nostrbrasil #grownostr #bitcoin
-

@ a95c6243:d345522c
2024-12-21 09:54:49
Falls du beim Lesen des Titels dieses Newsletters unwillkürlich an positive Neuigkeiten aus dem globalen polit-medialen Irrenhaus oder gar aus dem wirtschaftlichen Umfeld gedacht hast, darf ich dich beglückwünschen. Diese Assoziation ist sehr löblich, denn sie weist dich als unverbesserlichen Optimisten aus. Leider muss ich dich diesbezüglich aber enttäuschen. Es geht hier um ein anderes Thema, allerdings sehr wohl ein positives, wie ich finde.
Heute ist ein ganz besonderer Tag: die **Wintersonnenwende**. Genau gesagt hat [heute morgen](https://www.timeanddate.de/astronomie/wintersonnenwende) um 10:20 Uhr Mitteleuropäischer Zeit (MEZ) auf der Nordhalbkugel unseres Planeten der astronomische Winter begonnen. Was daran so außergewöhnlich ist? Der kürzeste Tag des Jahres war gestern, seit heute werden die Tage bereits wieder länger! Wir werden also jetzt jeden Tag ein wenig mehr Licht haben.
Für mich ist dieses Ereignis immer wieder etwas kurios: **Es beginnt der Winter, aber die Tage werden länger.** Das erscheint mir zunächst wie ein Widerspruch, denn meine spontanen Assoziationen zum Winter sind doch eher Kälte und Dunkelheit, relativ zumindest. Umso erfreulicher ist der emotionale Effekt, wenn dann langsam die Erkenntnis durchsickert: Ab jetzt wird es schon wieder heller!
Natürlich ist es kalt im Winter, mancherorts mehr als anderswo. Vielleicht jedoch nicht mehr lange, wenn man den Klimahysterikern glauben wollte. Mindestens letztes Jahr hat Väterchen Frost allerdings gleich zu Beginn seiner Saison – und passenderweise während des globalen Überhitzungsgipfels in Dubai – nochmal richtig mit der Faust auf den Tisch gehauen. Schnee- und Eischaos sind ja eigentlich in der Agenda bereits nicht mehr [vorgesehen](https://web.archive.org/web/20231202175946/https://www.spiegel.de/wissenschaft/mensch/winter-ade-nie-wieder-schnee-a-71456.html). Deswegen war man in Deutschland vermutlich in vorauseilendem Gehorsam schon nicht mehr darauf vorbereitet und wurde glatt [lahmgelegt](https://web.archive.org/web/20231207014311/https://www.dw.com/de/nach-dem-schnee-in-deutschland-und-dem-chaos-am-flughafen-und-bei-der-bahn-ein-winteralptraum/a-67638141).
Aber ich schweife ab. Die Aussicht auf nach und nach mehr Licht und damit auch Wärme stimmt mich froh. Den Zusammenhang zwischen beidem merkt man in Andalusien sehr deutlich. Hier, wo die Häuser im Winter arg auskühlen, geht man zum Aufwärmen raus auf die Straße oder auf den Balkon. Die Sonne hat auch im Winter eine erfreuliche Kraft. Und da ist jede Minute Gold wert.
Außerdem ist mir vor Jahren so richtig klar geworden, warum mir das südliche Klima so sehr gefällt. Das liegt nämlich nicht nur an der Sonne als solcher, oder der Wärme – das liegt vor allem am Licht. **Ohne Licht keine Farben**, das ist der ebenso simple wie gewaltige Unterschied zwischen einem deprimierenden matschgraubraunen Winter und einem fröhlichen bunten. Ein großes Stück Lebensqualität.
Mir gefällt aber auch die **Symbolik dieses Tages**: Licht aus der Dunkelheit, ein Wendepunkt, ein Neuanfang, neue Möglichkeiten, Übergang zu neuer Aktivität. In der winterlichen Stille keimt bereits neue Lebendigkeit. Und zwar in einem Zyklus, das wird immer wieder so geschehen. Ich nehme das gern als ein Stück Motivation, es macht mir Hoffnung und gibt mir Energie.

Übrigens ist parallel am heutigen Tag auf der südlichen Halbkugel Sommeranfang. Genau im entgegengesetzten Rhythmus, sich ergänzend, wie Yin und Yang. Das alles liegt an der Schrägstellung der Erdachse, die ist nämlich um 23,4º zur Umlaufbahn um die Sonne geneigt. Wir erinnern uns, gell?
Insofern bleibt eindeutig festzuhalten, dass “**schräg sein**” ein willkommener, wichtiger und positiver Wert ist. Mit [anderen](https://www.dwds.de/wb/schr%C3%A4g) Worten: auch ungewöhnlich, eigenartig, untypisch, wunderlich, kauzig, … ja sogar irre, spinnert oder gar “quer” ist in Ordnung. Das schließt das Denken mit ein.
**In diesem Sinne wünsche ich euch allen urige Weihnachtstage!**
***
Dieser Beitrag ist letztes Jahr in meiner *[Denkbar](https://denkbar.substack.com/p/ab-jetzt-gehts-bergauf)* erschienen.
-

@ e31e84c4:77bbabc0
2025-02-25 15:03:34
*The Fine Line: Bitcoin Companies Navigating Regulation and Freedom was [written by Bri](https://x.com/cyberBri). If you enjoyed this article then support her writing, by donating to her lightning wallet: bri_1@walletofsatoshi.com*
We all know the value proposition of Bitcoin: Bitcoin cannot be controlled by the state. Bitcoin is permissionless, it doesn't need a KYC and we can send money to anyone in the world, without middlemen, without censorship, without limits.
However, when companies use Bitcoin, and more so when they offer Bitcoin services, their activities are indeed controlled by the state. In order to fulfil the regulatory requirements, companies usually have to employ entire compliance teams.
Bitcoin-only exchanges are probably not better off than crypto service providers, even if one can sometimes hopefully recognise an increasing pro-Bitcoin attitude in the world. The Bitcoin scene recently looked expectantly to Nashville when Trump appeared at the Bitcoin 2024 conference as part of his election campaign. He doesn't really seem to be able to distinguish between Bitcoin and crypto though – in his keynote speech he promised to make the U.S. the ‘crypto capital of the planet’.
Nevertheless, the news that the United States plans to accumulate Bitcoin as a strategic reserve currency made headlines around the world and many Bitcoin supporters are delighted. Bitcoin's negative image could be somewhat corrected and it would certainly also be beneficial for Bitcoin adoption, so the hope goes. And indeed, the price of Bitcoin climbed to new record highs during the US election campaign, reaching its ATH of USD 109,000 when Trump took office on 20 January 2025.
The US announcement of a bitcoin strategic reserve can certainly be described as a historic moment. At the moment, it doesn't seem to be entirely clear whether Bitcoin or crypto, but a number of US states are working on advancing Bitcoin reserves. Whether it is a good thing when nation states start hoarding Bitcoin is another question. After all, from the very beginning and to this day, Bitcoin has been about taking power over money away from the state and giving it to the people.
Back to the Bitcoin companies. Let's assume that someone understands Bitcoin and has even discovered that there are Bitcoin-only exchanges. These companies recognise Bitcoin as sound money, support the Bitcoin community and want to integrate the Bitcoin ethos into their business model in the best possible way. Ouch – that already sounds like a compromise.
**The Dilemma – Bitcoin at Heart, Regulation at the Back of the Neck**
Bitcoin companies are caught between maximum independence and regulatory requirements. Companies such as Strike, Relai and River aim to make it as easy as possible for their customers to access Bitcoin while at the same time enabling them to maximise their independence from third parties. An important aspect of this is self-custody. Customers have full control over their Bitcoin and can avoid counterparty risks such as exchange failures or government seizures.
In contrast, most providers on the market, such as the major players Coinbase or Binance, rely on classic, centralised structures with full custody - and a large range of digital assets. They are basically fiat companies that offer crypto products.
And then, at the other end of the spectrum, there are projects such as Samourai, Wasabi Wallet or Tornado Cash, which are radically opposed to any form of control. They are developing powerful tools for more financial privacy – in line with Bitcoin's original idea as a decentralised cash system. But this commitment comes at a price: the founders of Samourai Wallet were arrested and the developers of Tornado Cash were prosecuted.
These Bitcoin rebels are putting the limits of state regulation to the test. And they raise the fundamental question: Is privacy an inalienable right or should it be subordinated to the public security interest?
**The Middle Ground Builders**
Bitcoin-only companies that choose the middle ground play an important role in the bitcoin ecosystem. This is because they appeal to the masses by keeping onboarding simple and often offering a range of interesting services. At the same time, they want to give their customers the greatest possible independence.
But are their business models sustainable? Or do these companies run the risk of being worn down by the balancing act between Bitcoin ethos and state control? How can these pioneers survive in a constantly changing regulatory environment?
It's a balancing act between regulation and Bitcoin values, and it's often a fight for the fundamental rights of not just Bitcoiners but people in general. For example, these companies need to have KYC processes in place to be compliant with the law and allow customers the greatest possible flexibility in their Bitcoin activities.
*Some popular Bitcoin-companies and their strategies:*
- [Strike](https://strike.me/): Custodial, fast lightning transactions, DCA, bill payments
- [Relai](https://relai.app/de/): Simple onramp, self-custody, private and business services
- [River](https://river.com/): Multisig and cold storage, proof of reserves, inheritance
- [Unchained](https://unchained.com/): Multisig vaults, DCA, inheritance, loans, retirement, advisory
- [Bull Bitcoin](https://www.bullbitcoin.com/): Non-custodial exchange, DCA, bill payments, OTC desk
Typical features of these accounts usually include a KYC check, which allows users to be granted higher buy and sell limits. Many Bitcoin companies offer self-custody wallets and often some also multi-sig solutions that increase security for users. Partnerships with banks or payment service providers facilitate buying and selling and enable services such as the creation of savings plans.
Bitcoin companies face several challenges. Regulatory pressure remains a key concern, as authorities may tighten KYC obligations or introduce new restrictions. Trust is another issue since die-hard Bitcoiners often see these companies as not being consistent enough with Bitcoin's core principles.
**Regulatory Framework and Political Influences**
***USA: Trump's Bitcoin course and the ‘Crypto Czar’***
There are currently contradictory signals in the USA: on the one hand, Donald Trump has hinted at using Bitcoin as a strategic reserve (Strategic Bitcoin Reserve, SBR), while on the other hand, regulation is being tightened further. The newly created position of ‘White House AI and Crypto Czar’, presumably conceived in collaboration with Elon Musk, is intended to implement clear rules for blockchain, AI and the crypto market. This is also likely to affect companies that are committed to the Bitcoin ethos.
- Positive signals: Bitcoin is increasingly recognised as a legitimate asset class.
- Regulatory pressure: Stricter regulations could threaten the existence of smaller companies.
- Possible future: If the US promotes Bitcoin as a strategic asset, this could fundamentally change the regulatory landscape.
***Europe and Global Developments***
- MiCA (Markets in Crypto-Assets Regulation): New EU regulation for crypto companies, requiring strict KYC and AML rules, among other things.
- Restrictive countries: China and India continue to rely on tough regulation or bans.
- Friendly jurisdictions: Countries such as El Salvador or Switzerland offer attractive conditions for Bitcoin companies.
**Self-custody of Bitcoin**
The so-called ‘Travel Rule’ (Transfer of Funds Regulation, TFR) requires detailed information about the sender and recipient. This makes it more difficult for Europeans to interact with self-custody Bitcoin wallets. For transactions over 1,000 euros, users must prove that they are the owners of these wallets (proof of ownership).
Yet self-custody is a very important aspect of Bitcoin. It is the only way to avoid the risks associated with relying on centralised custodians. Self-custody ensures that you alone have control over your money. The new regulations represent a gradual financial disenfranchisement, which is not only criticised by Bitcoiners. And that is only part of the problem.
The disadvantages of centralised storage of customer assets are well known. Just think of the scandalous examples from the recent past: The fall of the FTX cryptocurrency exchange and the knock-on effects on the cryptocurrency industry or the fraudulent business practices of Celsius, which lost billions of customers' money.
> *“Not your keys, not your coins.”– Andreas Antonopoulos*
However, it is often the users themselves who, consciously or unconsciously, jeopardise their funds. The obstacles to self-custody lie in both technical and practical aspects. Not everyone is willing or able to navigate hardware wallets and multisig solutions. Furthermore, without an adequate backup, there is a risk of losing coins irretrievably.
By keeping their coins in self-custody, Bitcoiners eliminate third-party risk. However, self-custody can be a challenge, especially for beginners. ‘Study Bitcoin’ is more than just a phrase here. Only those who know their way around can protect themselves against errors, misuse and loss.
**CONCLUSION**
The uncertainties caused by ever-changing regulation in different jurisdictions is a constant challenge for businesses. However, as Bitcoin is increasingly being categorised as harmless by the authorities, pure Bitcoin platforms might face fewer regulatory risks compared to crypto exchanges.
The growing acceptance of Bitcoin and the plans of the United States and other countries to create a strategic Bitcoin reserve may have a positive impact on how Bitcoin companies continue to be treated by regulators. I would, though, like to quote Maya Parbhoe, the Surinamese presidential candidate for 2025, at this point, even if it seems a little off-topic:
> *“A Bitcoin Strategic Reserve is not the answer.*
*> *The moment a government holds Bitcoin as a reserve, it centralizes control over an asset designed to be decentralized. It strengthens the very system Bitcoin was created to replace.*
*> *Governments holding Bitcoin do not give power to the people, they give themselves a hedge while continuing to debase their fiat currency. They still print, they still tax, they still control. The people remain trapped in the same system, only now with a government-backed Bitcoin price floor that serves the state, not the individual.*
*> *Bitcoin was not made to be stockpiled by central banks. It was made to be used. As currency, as a tool of self-sovereignty, as a weapon against state overreach.”*
So let's summarise what we have covered in this article in the spirit of these liberal ideas. The following rules, which have just been created, should be mandatory reading for Bitcoin aficionados until further notice:
<img src="https://blossom.primal.net/914ac66c228ea1a398ec1f008234e4cd213da85f268de73fb36dc9e344dcfb45.jpg">
*The Fine Line: Bitcoin Companies Navigating Regulation and Freedom was [written by Bri](https://x.com/cyberBri). If you enjoyed this article then support her writing, by donating to her lightning wallet: bri_1@walletofsatoshi.com*
-

@ a95c6243:d345522c
2024-12-13 19:30:32
*Das Betriebsklima ist das einzige Klima,* \
*das du selbst bestimmen kannst.* \
*Anonym*
**Eine Strategie zur Anpassung an den Klimawandel** hat das deutsche Bundeskabinett diese Woche [beschlossen](https://www.bundesregierung.de/breg-de/aktuelles/klimaanpassungsstrategie-2024-2324828). Da «Wetterextreme wie die immer häufiger auftretenden Hitzewellen und Starkregenereignisse» oft desaströse Auswirkungen auf Mensch und Umwelt hätten, werde eine Anpassung an die Folgen des Klimawandels immer wichtiger. «Klimaanpassungsstrategie» nennt die Regierung das. 
**Für die «Vorsorge vor Klimafolgen» habe man nun erstmals** klare Ziele und messbare Kennzahlen festgelegt. So sei der Erfolg überprüfbar, und das solle zu einer schnelleren Bewältigung der Folgen führen. Dass sich hinter dem Begriff Klimafolgen nicht Folgen des Klimas, sondern wohl «Folgen der globalen Erwärmung» verbergen, erklärt den Interessierten die Wikipedia. Dabei ist das mit der [Erwärmung](https://transition-news.org/studie-ozeane-kuhlen-die-erde-viel-starker-als-gedacht) ja bekanntermaßen so eine Sache.
**Die Zunahme schwerer Unwetterereignisse habe gezeigt,** so das Ministerium, wie wichtig eine frühzeitige und effektive Warnung der Bevölkerung sei. Daher solle es eine deutliche Anhebung der Nutzerzahlen der sogenannten Nina-Warn-App geben.
**Die** ***ARD*** **spurt wie gewohnt** und setzt die Botschaft zielsicher um. Der Artikel [beginnt](https://www.tagesschau.de/inland/innenpolitik/klima-anpassung-warnapp-100.html) folgendermaßen:
> «Die Flut im Ahrtal war ein Schock für das ganze Land. Um künftig besser gegen Extremwetter gewappnet zu sein, hat die Bundesregierung eine neue Strategie zur Klimaanpassung beschlossen. Die Warn-App Nina spielt eine zentrale Rolle. Der Bund will die Menschen in Deutschland besser vor Extremwetter-Ereignissen warnen und dafür die Reichweite der Warn-App Nina deutlich erhöhen.»
**Die Kommunen würden bei ihren «Klimaanpassungsmaßnahmen»** vom Zentrum KlimaAnpassung [unterstützt](https://zentrum-klimaanpassung.de/ueber-uns), schreibt das Umweltministerium. Mit dessen Aufbau wurden das Deutsche Institut für Urbanistik gGmbH, welches sich stark für [Smart City-Projekte](https://difu.de/taxonomy/term/2083) engagiert, und die Adelphi Consult GmbH beauftragt.
**Adelphi** **[beschreibt](https://adelphi.de/de)** **sich selbst als «Europas führender Think-and-Do-Tank** und eine unabhängige Beratung für Klima, Umwelt und Entwicklung». Sie seien «global vernetzte Strateg\*innen und weltverbessernde Berater\*innen» und als «Vorreiter der sozial-ökologischen Transformation» sei man mit dem Deutschen Nachhaltigkeitspreis ausgezeichnet worden, welcher sich an den Zielen der Agenda 2030 orientiere.
**Über die** **[Warn-App](https://www.bbk.bund.de/DE/Warnung-Vorsorge/Warn-App-NINA/warn-app-nina_node.html)** **mit dem niedlichen Namen Nina,** die möglichst jeder auf seinem Smartphone installieren soll, informiert das Bundesamt für Bevölkerungsschutz und Katastrophenhilfe (BBK). Gewarnt wird nicht nur vor Extrem-Wetterereignissen, sondern zum Beispiel auch vor Waffengewalt und Angriffen, Strom- und anderen Versorgungsausfällen oder Krankheitserregern. Wenn man die Kategorie Gefahreninformation wählt, erhält man eine Dosis von ungefähr zwei Benachrichtigungen pro Woche.
**Beim BBK erfahren wir auch einiges über die empfohlenen** **[Systemeinstellungen](https://www.bbk.bund.de/DE/Warnung-Vorsorge/Warn-App-NINA/Einstellungen-Android/einstellungen-android_node.html)** für Nina. Der Benutzer möge zum Beispiel den Zugriff auf die Standortdaten «immer zulassen», und zwar mit aktivierter Funktion «genauen Standort verwenden». Die Datennutzung solle unbeschränkt sein, auch im Hintergrund. Außerdem sei die uneingeschränkte Akkunutzung zu aktivieren, der Energiesparmodus auszuschalten und das Stoppen der App-Aktivität bei Nichtnutzung zu unterbinden.
**Dass man so dramatische Ereignisse wie damals im Ahrtal auch anders bewerten kann** als Regierungen und Systemmedien, hat meine Kollegin Wiltrud Schwetje anhand der Tragödie im spanischen [Valencia](https://transition-news.org/valencia-zehn-tage-nach-der-katastrophe-warten-viele-menschen-immer-noch-auf) gezeigt. Das Stichwort «Agenda 2030» taucht dabei in einem Kontext auf, der wenig mit Nachhaltigkeitspreisen zu tun hat.
***
Dieser Beitrag ist zuerst auf *[Transition News](https://transition-news.org/vorsorge-vor-klimafolgen)* erschienen.
-

@ 592295cf:413a0db9
2024-12-07 07:21:39
Week 02-11
- Nsite zap by hzrd149
[Support page](https://npub1wyuh3scfgzqmxn709a2fzuemps389rxnk7nfgege6s847zze3tuqfl87ez.nsite.lol/#/support)
## Content creator want more users. They can go to Bluesky.
Great that Nostr is a Echo Chambers. As stated by Rabble during NostRiga, Nostr is a bitcoin meetup. And it is very difficult as said several times, to subvert this fact.
It seems that many bitcoiners don't like this, but they can't do anything, leave Nostr and migrate to other lids.
## I'm reading Nostr adventar calendar of Japanese Nostr users.
The first two Don and Jun speak of a Mahjong game and the other of how possibly to count the followers of a given account, countfollowed.
- [Adventar calendar](https://adventar.org/calendars/10004)
continue until Christmas 🎅
- Even Bluesky is looking at MLS , is not a soccer league, is a protocol for message by groups, "circles"
[Post on Bluesky](https://bsky.app/profile/soatok.bsky.social/post/3lc4gt4mywc2z)
- Relays chakany is introduce sunday. [link](https://relay.chakany.systems/)
I've never seen such dead animals as in Nostr. Something reminds me facebook. The carnivore folks
## Hivemind podcast by Max, the kilometric comment on fountain under the podcast is the most appetizing thing of all. Just one comment, little one.
He interviewed Kagi's and searched for a brownie pill, perhaps caused a little headache. ( Brownie pill is orange plus purple)
-----------
Loss dog on Nostr this week 😔😔 Pam and Derek family dog
conspiracy theory: Fiatjaf was the reply guy!!!
I tried to download voyage, from zapstore but nothing does not work even the 17.1 does not go. Too bad.
I hear so much about notedeck that I want to make a notedeck do it yourself.
Cherry tree, stuck hzrd149 is making an app a day, Chunked blobs on blossom.
A like is used to send your writing Relays
Announcement of a possible wallet in Damus, this could make things better, zap and whatnot.
-----------
- Or I'm posting a song here, a musical interlude.
[song on wavlake](https://wavlake.com/album/87dfa3dc-b921-4a4b-8bfc-f60479cec364)
-----------
There seems to be a good buzz on Nostr, maybe it's already a Christmassy atmosphere.
- Backup di Bluesky cool things
[Bluesky post](https://bsky.app/profile/filippo.abyssdomain.expert/post/3lcfdsv2hec2a)
-----------
On another rssfeed thing.
nostr:nevent1qvzqqqqqqypzq9h35qgq6n8ll0xyyv8gurjzjrx9sjwp4hry6ejnlks8cqcmzp6tqqs93j2remdw2pxnctasa9vlsaerrrsl7p5csx5wj88kk0yq977rtdqxt7glp
### It's the same thing as following a cross de bridge, but if they do 3 bridge, I say something is wrong. A bot is attached to a Relay. The Relay goes down and so much greetings, then I can look for RSS feeds in my computer without need of Nostr. I can share a particular opml file on Nostr, but I don't know how to do it I asked Fiatjaf but didn't answer it was taken by dichotomie.
### Nip19 really Easy to do filter query.
You have events_id pubkey Relay
Instead with Nostr:note you only have the event_id.
- Sebastix says he has to implement it in his library, discover the latest weekly report.
[nostr-php-helper-library](https://nostrver.se/blog/nostr-php-helper-library-90-day-opensats-report-2)
-----------
Oh no Pablo has become super Saiyan 🤣
## There is a way to make a podcast starting from a long text, blog. With artificial intelligence. But then I thought, but if one does not have time could not have the text of the article summarized, perhaps we like generating content. It can be an option, either you read or you listen. But if you do not have time perhaps it is better to just summarize, dear chatgpt summarize this text, done. Essential points and make a thread for the social network and do what you want.
- Homemade Traditional Boozy Mincemeat, I didn't even know that existed 🤙
[link to shopstr](https://shopstr.store/listing/b7fbcd4415d50dac4cc2b95cb2e73acea294a7f3040255c6f9b07a9494006b3e)
Hodlbod news on bunker burrow
nostr:nevent1qqs84na25g6mdelvl0408nnq8m29j5070dm9mvjrzxyc6yrx2udjyuczyztuwzjyxe4x2dwpgken87tna2rdlhpd02
- In case you don't see the note
[burrow on github](https://github.com/coracle-social/burrow)
Once you have the email what do you do with your encrypted key? No Enterprise user maybe. Rember the article of Hodlbod in "Is Always a political move". ✅
List of artists on Nostr
nostr:naddr1qvzqqqr4xqpzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzfmhxue69uhkummnw3e82efwvdhk6tcqp9qku6tdv96x7unng9grdr
- An article for food recipe on Nostr
[Article link ](https://yakihonne.com/article/naddr1qvzqqqr4gupzpn0wjs7tkxw9r2uy0fndt4m5xua2na3a9peydw6ekzp8lf0xxaqqqqxnzdenxv6nqwf3xgun2wpkyhpdxx)
### I don't know if they'll ever be there. You can write a recipe book. Or to put recipes on wiki, there doesn't seem to be that attention or that desire. One more relay is always better
- Olas has a website 🥊
[Olas app](https://olas.app/)
Oh i see cool Hodlbod bot
A summary bot
nostr:nevent1qqs0v88uc2u3he3lm3mpm5h3gr8cuht5wv9g0tk0x9hzvamgvpdjwvspzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxgq3qjlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qu0ltyv
That's all!!
-

@ 9171b08a:8395fd65
2025-02-25 14:53:19
Rein sat with her back against the cold steel of the jail cell, wrists and ankles bound.
She hadn’t seen light or another human face in almost two weeks. The grinding and whirling of the Guardian’s mechanical gears was the only thing to break the silence, its daily arrival at noon serving as her only reminder of time. It brought her food, but nothing else; not a word, not a gesture of humanity.
In her waking moments, she sat and replayed the events that landed her in jail, and in her slumber, those thoughts morphed into haunting nightmares with specters stalking her in hell. Hell was no longer a distant fear; it had found her. Her fate now rested in the hands of the man she once considered her best friend. Whatever evidence he was putting together would serve to either absolve her or condemn her.
A sharp beam of light pierced the darkness of the jail cell from the cell block entrance. The overhead lights came on, and she stood as David, Rein’s partner and closest friend, appeared before the cell bars.
He stared at his feet and said, “Today's your trial.”
Rein struggled to keep her eyes open from the intense brightness over the overhead lights and said, “That wasn’t nearly enough time to gather evidence.”
David pressed his lips together, eyes fixed on the floor. “I had your back on this, Rein.” Then he shook his head, and as Rein finally overcame the harsh brightness, she noticed he was staring into her eyes. “The evidence is damning. And, well, something pretty terrible has happened that has the government cracking down harder than ever.”
“Something terrible? What happened?” asked Rein.
“I would’ve never thought you were in so deep with this.” He seemed personally outraged when he said, “After everything we’ve been through together, after everything *you’ve* sacrificed for this city. You’ve been pretending this entire time. I’ve never known the real you.” He scoffed. “Yet there you are.”
“C’mon, David, you don’t actually think—”
David raised a hand and said, “Stop. Don’t try that shit with me. You’re lucky to even be getting a trial.”
Two Guardians entered the cell block and came to parade rest behind David. He opened the cell, and the Guardians stepped in.
“What did you find? What happened?” asked Rein.
The Guardians seized Rein’s shoulders and pushed her forward, past David.
“What did you find, David?” Urged Rein.
David remained silent. He simply watched as the Guardians took her.
A hush fell over the precinct as officers gathered around the flickering television in the corner of the reception room. Flashing across the screen were the haunting images taken from an aircraft of a city on fire, thousands of black silhouettes infiltrating the city walls. The words ***Shadow Crawlers Strike, Orion Dome In Ruins*** were emblazoned the bottom of the newscast.
Rein strained against the Guardian’s grasp to try and get a closer look at the screen and gasped, “Chronos have mercy.”
Those standing before the television turned and stared at her. Those seated at their desks stood at the sight of the Guardians ushering Rein through the offices, and within seconds, the precinct was heavy with tension. Everyone she had cared about now gaped at her with a fierce look of betrayal. Though Rein wished she could explain herself with a compelling defense, she could tell she was as good as dead to them.
---
The vehicle transporting her to the courthouse was as dark as the cell she had been locked up in. Rein ground her teeth and stared at the ray of light that shone through the slit in between the vehicle doors, contemplating what she had just seen on the precinct television.
After several minutes of toiling in the darkness with her own thoughts, the vehicle halted, and its doors opened at the hands of the two Guardians who towered over the roof of the hovercraft.
Many of the city people’s eyes, imbued in different shades of red, turned to stare as Rein stepped out. Their gazes were not so much filled with judgment as they were with fear. She stepped onto the walkway with her head sagged, ashamed to look at the very people she had sworn to protect.
> Join the furnace of the Empire! Invest in Elius today and be a part of the Industrial heart of Aurial.
Rein clenched her fist as she contemplated the words on the crumpled flyer laying on the sidewalk beside her foot. She couldn’t help but think of what her father had been up to in that city.
She had never paid much attention to the image of the man on the flyer, his arms crossed and his head held high before a massive furnace that sparked embers into the four corners of the paper. The silhouette of a building was portrayed on one corner, a soldier held a weapon on another, the image of a child holding a toy on the bottom right, and a family held up a shirt on the remaining corner.
Those flyers were hung up throughout the precinct offices, inside coffee shops, and gathering places, attempting to attract the wealth that easily found itself in the pockets of the kind of people that lived in Roxis. It seemed to have worked on her father.
***But what had he been up to?***
Rein never understood why her father had abandoned Roxis for Elius, nor had he ever offered an explanation. As a financial hub, Roxis attracted wealth and intellect, leaving cities like Elius with a rougher class of laborers— many of whom turned to crime to escape extreme poverty and hard work in the very factories exhibited on the promotional flyer.
The city of Roxis had been good to Rein. Though many a passerby would think differently seeing her now with her wrists and ankles shackled as she walked up the steps of the Judgment House. She’d grown to be a God-loving woman and spent most of her adult life protecting the city from criminals the likes of which the people walking by, now, would think she was.
One of the Guardians towering at her side nudged her shoulder, and with the artificial voice generated from within its chest said, “You must move along, Miss Lancer.”
The robot’s hand ushered her forward, and a ray of sunlight nearly blinded her as she gazed upon the Judgment House made almost entirely of glass and marble.
The crest of Aurialian Empire above the entrance of the building made her pause. Her eyes lingered on the star that lay at the center of the red and blue shield of Ariel, the archangel. A character that looked like an angular and unfinished number eight with a line drawn through the middle sat like a crown above the words "***Out of God, An Empire***", inscribed around the crest of the Aurilian Empire.
The symbol of peace felt like a cruel joke now. She had once sworn to uphold the empire’s sanctity, yet here she was, condemned by it.
***Episode 2 coming soon...***
---
Thank you for reading!
If you enjoyed this episode, let me know with a zap and share it with friends who might like it too!
Your feedback sends a strong signal to keep making content like this!
Interested in blog posts? Follow @Beneath The Ink for great short stories and serialized fiction.
More short stories you might like from Fervid Fables:
nostr:naddr1qvzqqqr4gupzpyt3kz9079njd5g0fs5rxhtg8g9wdwkdar65kuhaujfyajpetlt9qq2kx6zzdap9s3nnde5hy7f5wej57d2twp54y82h07y
nostr:naddr1qvzqqqr4gupzpyt3kz9079njd5g0fs5rxhtg8g9wdwkdar65kuhaujfyajpetlt9qq2h5etx2fghgumyg3mhjanewgeysa6wdfmrs85l27m
-

@ a95c6243:d345522c
2024-12-06 18:21:15
*Die Ungerechtigkeit ist uns nur in dem Falle angenehm,\
dass wir Vorteile aus ihr ziehen;\
in jedem andern hegt man den Wunsch,\
dass der Unschuldige in Schutz genommen werde.\
Jean-Jacques Rousseau*
**Politiker beteuern jederzeit, nur das Beste für die Bevölkerung zu wollen** – nicht von ihr. Auch die zahlreichen unsäglichen «Corona-Maßnahmen» waren angeblich zu unserem Schutz notwendig, vor allem wegen der «besonders vulnerablen Personen». Daher mussten alle möglichen Restriktionen zwangsweise und unter Umgehung der Parlamente verordnet werden.
**Inzwischen hat sich immer deutlicher herausgestellt, dass viele jener «Schutzmaßnahmen»** den gegenteiligen Effekt hatten, sie haben den Menschen und den Gesellschaften enorm geschadet. Nicht nur haben die experimentellen Geninjektionen – wie erwartet – massive Nebenwirkungen, sondern Maskentragen [schadet der Psyche](https://transition-news.org/meisterwerk-von-studie-bestatigt-maskentragen-bei-kindern-sinnlos-und-schadlich) und der Entwicklung (nicht nur unserer Kinder) und «Lockdowns und Zensur haben [Menschen getötet](https://transition-news.org/lockdowns-und-zensur-haben-menschen-getotet)».
**Eine der wichtigsten Waffen unserer «Beschützer» ist die Spaltung der Gesellschaft.** Die tiefen Gräben, die Politiker, Lobbyisten und Leitmedien praktisch weltweit ausgehoben haben, funktionieren leider nahezu in Perfektion. Von ihren persönlichen [Erfahrungen als Kritikerin](https://transition-news.org/die-coronazeit-hat-mir-gezeigt-wie-die-menschen-manipuliert-werden-konnen) der Maßnahmen berichtete kürzlich eine Schweizerin im Interview mit *Transition News*. Sie sei schwer enttäuscht und verspüre bis heute eine Hemmschwelle und ein seltsames Unwohlsein im Umgang mit «Geimpften».
**Menschen, die aufrichtig andere schützen wollten,** werden von einer eindeutig politischen Justiz verfolgt, verhaftet und angeklagt. Dazu zählen viele Ärzte, darunter [Heinrich Habig](https://transition-news.org/arzte-mussten-ihr-vergehen-irgendwann-selbst-einsehen), [Bianca Witzschel](https://transition-news.org/anwalt-von-bianca-witzschel-das-ist-eindeutig-eine-politische-justiz) und Walter Weber. Über den aktuell laufenden Prozess gegen Dr. Weber hat *Transition News* mehrfach berichtet (z.B. [hier](https://transition-news.org/prozess-gegen-walter-weber-kai-kisielinski-fuhrt-mit-argumentationsfeuerwerk) und [hier](https://transition-news.org/prozess-gegen-walter-weber-tschentscher-und-schaade-doch-nicht-vor-gericht)). Auch der Selbstschutz durch Verweigerung der Zwangs-Covid-«Impfung» bewahrt nicht vor dem Knast, wie Bundeswehrsoldaten wie [Alexander Bittner](https://transition-news.org/verweigerung-der-covid-impfung-inhaftierter-bundeswehrsoldat-kundigt) erfahren mussten.
[**Die eigentlich Kriminellen**](https://transition-news.org/die-eigentlich-kriminellen-schutzen-sich-vor-der-verantwortung) **schützen sich derweil erfolgreich selber,** nämlich vor der Verantwortung. Die «Impf»-Kampagne war «das größte [Verbrechen gegen die Menschheit](https://transition-news.org/das-grosste-verbrechen-gegen-die-menschheit)». Trotzdem stellt man sich in den USA gerade die Frage, ob der scheidende Präsident Joe Biden nach seinem Sohn [Hunter](https://transition-news.org/us-steuerbehorde-hat-prasidentschaftswahl-2020-fur-joe-biden-gestohlen) möglicherweise auch [Anthony Fauci begnadigen](https://transition-news.org/wird-biden-auch-fauci-begnadigen) wird – in diesem Fall sogar präventiv. Gibt es überhaupt noch einen Rest Glaubwürdigkeit, den Biden verspielen könnte?
**Der Gedanke, den ehemaligen wissenschaftlichen Chefberater des US-Präsidenten** und Direktor des National Institute of Allergy and Infectious Diseases (NIAID) vorsorglich mit einem Schutzschild zu versehen, dürfte mit der vergangenen Präsidentschaftswahl zu tun haben. Gleich mehrere Personalentscheidungen des designierten Präsidenten Donald Trump lassen Leute wie Fauci erneut in den Fokus rücken.
**Das Buch «The Real Anthony Fauci» des nominierten US-Gesundheitsministers [Robert F. Kennedy Jr.](https://transition-news.org/usa-robert-f-kennedy-jr-als-gesundheitsminister-nominiert)** erschien 2021 und dreht sich um die Machenschaften der Pharma-Lobby in der öffentlichen Gesundheit. Das Vorwort zur rumänischen Ausgabe des Buches schrieb übrigens [Călin Georgescu](https://transition-news.org/der-ausgang-der-rumanischen-prasidentschaftswahlen-konnte-mogliche), der Überraschungssieger der ersten Wahlrunde der aktuellen Präsidentschaftswahlen in Rumänien. Vielleicht erklärt diese Verbindung einen Teil der [Panik im Wertewesten](https://www.euronews.com/2024/12/04/robert-f-kennedy-jr-denies-any-link-with-far-right-romanian-presidential-candidate).
**In Rumänien selber gab es gerade einen Paukenschlag:** Das bisherige Ergebnis wurde heute durch das Verfassungsgericht annuliert und die für Sonntag angesetzte Stichwahl kurzfristig abgesagt – wegen angeblicher «aggressiver russischer Einmischung». Thomas Oysmüller merkt dazu an, damit sei jetzt in der EU das [Tabu gebrochen](https://tkp.at/2024/12/06/rumaenien-sagt-praesidenten-wahl-ab/), Wahlen zu verbieten, bevor sie etwas ändern können.
**Unsere Empörung angesichts der Historie von Maßnahmen, die die Falschen beschützen** und für die meisten von Nachteil sind, müsste enorm sein. Die Frage ist, was wir damit machen. Wir sollten nach vorne schauen und unsere Energie clever einsetzen. Abgesehen von der Umgehung von jeglichem «Schutz vor Desinformation und Hassrede» (sprich: [Zensur](https://transition-news.org/fuhrende-politiker-der-welt-unterzeichnen-neue-zensurerklarung-bei-un)) wird es unsere wichtigste Aufgabe sein, Gräben zu überwinden.
---
Dieser Beitrag ist zuerst auf [*Transition News*](https://transition-news.org/schutz-wem-schutz-gebuhrt) erschienen.
-

@ 85bdb587:7339d672
2025-02-25 14:14:57
## Marty's Bent

Since mid-2022 the Fed has been reigning in its balance sheet via a process called quantitative tightening (QT), in which they allow some of the debt assets they hold to come to maturity without reinvesting in them. This leads to a reduction in the Fed's balance sheet and is done to remove the excess liquidity introduced to the markets during the COVID crisis so that inflation can be reeled in. On top of this, the Fed is hoping that the extraordinary measures it took to step in during a time of crisis allowed the banking system to get their houses in order in preparation for a period of relatively tighter liquidity. Ideally, everyone took the time and effort to clean up their balance sheets, properly manage their duration risk, and get themselves on solid footing to move forward without the Fed stepping in to prop up the market.
At its peak, the overnight reverse repo facility had around $2.36T of liquidity in the form of debt instruments like treasuries and mortgage backed securities available to banks, money market funds and certain government enterprises. These entities lend the Fed cash for these instruments and get interest back in return. This acts as a mechanism the Fed can leverage to keep short-term rates in line with wherever their targets are at any given point in time. Over the last ~13 quarters the Fed has been slowly but surely letting these markets drain and, as of last Friday, they currently sit at $70.8B. At its current pace the reverse repo facility should be completely drained by the end of next month or beginning of April.
The question on everybody's mind is, what happens once the reverse repo markets are empty?
The last time the Fed embarked on QT was in October 2017. It drained the reverse repo over the course of a little less than two years before the market was drained and the overnight rates in the market spiked into the low teens in September of 2019. Many don't remember this, but it was a "holy shit" moment that forced the Fed to create new facilities overnight to band aid over the hemorrhaging. Coincidentally, a few months later COVID would overtake the world and the Fed had a convenient excuse to double the monetary base well above $6T.
If September 2019 is an example of exactly what happens when the reverse repo market drains, we may be in for a liquidity crunch. However, the Fed is posturing that it has learned its lessons from the 2019 rate spasm and has adjusted some things accordingly to ensure a smoother transition from a state of excess liquidity to a state of significantly less liquidity. Particularly, more control over SOFR and how it interacts with this market. If we reach the point where the reverse repo markets have been successfully drained without a 2019-like spasm, the Fed will then move on to the excess liquidity sitting on the balance sheets of commercial banks and continue their journey to try to reel in inflation.
President Trump certainly isn't making the Fed's job easier with promises of lower domestic taxes and the levying of aggressive tariffs, which could both be inflationary. I'm sure Jerome Powell is praying that DOGE continues their swift work and gets the signal out to markets that the US government is committed to getting its fiscal house in order to make treasuries more appealing to the market so that rates can float down.
I have no idea exactly what is going to happen, but I have a feeling that a liquidity crunch is on the horizon. It may not be once the reverse repo market is drained. I would not be the least bit surprised if the work the Fed has done behind the scenes to ensure a spasm like we experienced in 2019 doesn't happen is successful. Though, it likely only buys some time and delays the inevitable. As my good friend Parker Lewis likes to say, "There's too much debt and not enough dollars." At some point, QT will hit a point where it cannot be sustained because too many dollars have been pulled out of a system with ever increasing amounts of debt that need to be serviced with dollars. Whether it happens when the reverse repo market is drained or at some point after the Fed starts unwinding the excess liquidity on bank balance sheets isn't really that important.
We're getting early warning signs that a liquidity crunch may be near with the mad dash for bringing physical gold into the US, the VIX spiking above 20 earlier today and bitcoin "crashing" toward $90,000. Volatility is increasing at a time when the reverse repo market is almost tapped and the world is a bit uncertain as it tries to figure out the ramifications of Trump's blitzkreig his first month in office.
For those scratching their heads about the price of bitcoin falling during a time like this, it is pretty typical. Bitcoin is traded 24/7/365, has a ton of liquidity, and is easy to buy and sell. When markets sense volatility, bitcoin is usually one of the first assets to be sold off as investors try to sure up their cash balances and pay off debts. It is usually the first and quickest to move lower, but also the first and quickest to move higher when the dust has settled. I find it hard to believe that the price of bitcoin will stay down long if it falls considerably.
The fundamentals have never been stronger and too many people have been waiting for an opportune buying opportunity to pass it up. The question is how many of those looking for a buying opportunity will have dry powder and be liquid if and when it happens.
## Bitcoin's Institutional Moment: Big Players Are Entering the Game
Bitcoin's journey into mainstream financial markets is accelerating. During our conversation last week, Peruvian Bull highlighted several key milestones, including Abu Dhabi's $430 million position in Bitcoin ETFs and regulatory progress with the SEC's SAB 122, which now allows banks to custody Bitcoin. This fundamental shift isn't just about price – it represents a structural change in how traditional financial institutions view Bitcoin as a legitimate asset class.
"*This is a massive opportunity for bitcoin companies - go start a custody service and get a bunch of bitcoiners together and teach institutions how to safely custody their bitcoin.*" - [Peruvian Bull](https://x.com/peruvian_bull)
As I've observed through our work at Ten31, there's a growing recognition that a Bitcoin treasury strategy makes sense for both public and private companies. We're seeing this with MicroStrategy, Tesla, Bitcoin miners, and potentially GameStop. More importantly, the infrastructure is being built by major institutions like State Street and Citibank to support this adoption. While gold has the established financial plumbing, Bitcoin's institutional rails are being constructed rapidly, setting the stage for the next wave of adoption.
TLDR: Major institutions building Bitcoin infrastructure signals mainstream adoption
Check out the [full podcast here](https://youtu.be/aHzPTDDPXfU) for more on gold market disruptions, GameStop's potential Bitcoin strategy, and the looming debt crisis that's creating perfect conditions for Bitcoin adoption.
## Headlines of the Day
El Salvador Boosts Bitcoin Reserve - via [X](https://x.com/i/trending/1894181975528763539)
Jamie Dimon Sold $233.7M in JPM Stock - via [X](https://x.com/MartyBent/status/1894175451209220205)
Montana, North Dakota, and Wyoming Rejected Bills for SBR - via [X](https://x.com/SimplyBitcoinTV/status/1894071294653604257)
## Bitcoin Lesson of the Day
Bitcoin uses cryptographic **keys** to secure **transactions**. A private key, a secret random number, allows you to spend bitcoin, while a public key, derived from the private key, is used to receive bitcoin.
The public key is hashed and encoded into a Bitcoin address (e.g., 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa), a shorter, user-friendly string shared to receive funds. Private keys must be kept secure—losing them means losing access to your bitcoin, and anyone with your private key can spend it.
Addresses are generated from public keys via hashing (SHA-256 and RIPEMD-160) and include a checksum for error detection. Bitcoin wallets manage these keys, often using seed phrases to recover them. Understanding keys and addresses is fundamental to securely using Bitcoin.
[Full Learnmeabitcoin.com post here](https://learnmeabitcoin.com/beginners/guide/keys-addresses/)
ICYMI [Fold](https://foldapp.com/credit-card?r=BgwRS) opened the waiting list for the new Bitcoin Rewards Credit Card. Fold cardholders will get unlimited 2% cash back in sats.
**[Get on the waiting list](https://foldapp.com/credit-card?r=BgwRS) now before it fills up!**
$200k worth of prizes are up for grabs.
Ten31, the largest bitcoin-focused investor, has deployed $150M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at [ten31.vc/funds](https://ten31.vc/funds).
-

@ a95c6243:d345522c
2024-11-29 19:45:43
*Konsum ist Therapie.
Wolfgang Joop*
**Umweltbewusstes Verhalten und verantwortungsvoller Konsum** zeugen durchaus von einer wünschenswerten Einstellung. Ob man deswegen allerdings einen grünen statt eines schwarzen Freitags braucht, darf getrost bezweifelt werden – zumal es sich um manipulatorische Konzepte handelt. Wie in der politischen Landschaft sind auch hier die Etiketten irgendwas zwischen nichtssagend und trügerisch.
**Heute ist also wieder mal «Black Friday»,** falls Sie es noch nicht mitbekommen haben sollten. Eigentlich haben wir ja eher schon eine ganze «Black Week», der dann oft auch noch ein «Cyber Monday» folgt. Die Werbebranche wird nicht müde, immer neue Anlässe zu erfinden oder zu importieren, um uns zum Konsumieren zu bewegen. Und sie ist damit sehr erfolgreich.
**Warum fallen wir auf derartige Werbetricks herein** und kaufen im Zweifelsfall Dinge oder Mengen, die wir sicher nicht brauchen? Pure Psychologie, würde ich sagen. Rabattschilder triggern etwas in uns, was den Verstand in Stand-by versetzt. Zusätzlich beeinflussen uns alle möglichen emotionalen Reize und animieren uns zum Schnäppchenkauf.
**Gedankenlosigkeit und Maßlosigkeit können besonders bei der [Ernährung](https://transition-news.org/studie-208-millionen-us-amerikaner-sind-als-fettleibig-oder-ubergewichtig) zu ernsten Problemen führen.** Erst kürzlich hat mir ein Bekannter nach einer USA-Reise erzählt, dass es dort offenbar nicht unüblich ist, schon zum ausgiebigen Frühstück in einem Restaurant wenigstens einen Liter Cola zu trinken. Gerne auch mehr, um das Gratis-Nachfüllen des Bechers auszunutzen.
**Kritik am schwarzen Freitag und dem unnötigen Konsum** kommt oft von Umweltschützern. Neben Ressourcenverschwendung, hohem Energieverbrauch und wachsenden Müllbergen durch eine zunehmende Wegwerfmentalität kommt dabei in der Regel auch die «Klimakrise» auf den Tisch.
**Die EU-Kommission lancierte 2015 den Begriff «Green Friday»** im Kontext der überarbeiteten Rechtsvorschriften zur Kennzeichnung der Energieeffizienz von Elektrogeräten. Sie nutzte die Gelegenheit kurz vor dem damaligen schwarzen Freitag und vor der UN-Klimakonferenz COP21, bei der das [Pariser Abkommen](https://transition-news.org/cop29-wird-vom-geist-des-noch-kunftigen-us-prasidenten-heimgesucht) unterzeichnet werden sollte.
**Heute wird ein grüner Freitag oft im Zusammenhang mit der Forderung nach «nachhaltigem Konsum» benutzt.** Derweil ist die Europäische Union schon weit in ihr Geschäftsmodell des [«Green New Deal»](https://transition-news.org/green-new-deal) verstrickt. In ihrer Propaganda zum Klimawandel verspricht sie tatsächlich «Unterstützung der Menschen und Regionen, die von immer häufigeren Extremwetter-Ereignissen betroffen sind». Was wohl die Menschen in der Region um [Valencia](https://transition-news.org/flutkatastrophe-in-valencia-die-ungereimtheiten-haufen-sich) dazu sagen?
**Ganz im Sinne des Great Reset propagierten die Vereinten Nationen seit Ende 2020** eine «[grüne Erholung von Covid-19](https://news.un.org/en/story/2020/12/1079602), um den Klimawandel zu verlangsamen». Der UN-Umweltbericht sah in dem Jahr einen Schwerpunkt auf dem Verbraucherverhalten. Änderungen des Konsumverhaltens des Einzelnen könnten dazu beitragen, den Klimaschutz zu stärken, hieß es dort.
**Der Begriff «Schwarzer Freitag» wurde in den USA nicht erstmals für Einkäufe nach Thanksgiving verwendet** – wie oft angenommen –, sondern für eine Finanzkrise. Jedoch nicht für den Börsencrash von 1929, sondern bereits für den Zusammenbruch des US-Goldmarktes im September 1869. Seitdem mussten die Menschen weltweit so einige schwarze Tage erleben.
**Kürzlich sind die britischen Aufsichtsbehörden weiter von ihrer Zurückhaltung** nach dem letzten großen Finanzcrash von 2008 abgerückt. Sie haben Regeln für den Bankensektor gelockert, womit sie [«verantwortungsvolle Risikobereitschaft»](https://transition-news.org/zuruck-zu-2008-grossbritannien-schlagt-lockere-regeln-fur-banker-boni-vor) unterstützen wollen. Man würde sicher zu schwarz sehen, wenn man hier ein grünes Wunder befürchten würde.
---
Dieser Beitrag ist zuerst auf *[Transition News](https://transition-news.org/auch-beim-freitag-ist-es-egal-ob-schwarz-oder-grun)* erschienen.
-

@ a95c6243:d345522c
2024-11-08 20:02:32
*Und plötzlich weißt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister Eckhart*
**Schwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung,** der mir freitags ins Postfach flattert. Rot, gelb und grün werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen – und hinterlässt einen wirtschaftlichen und gesellschaftlichen Trümmerhaufen.
**Mit einem bemerkenswerten [Timing](https://transition-news.org/donald-trump-grossmaul-oder-hoffnungstrager) hat die deutsche Regierungskoalition** am Tag des «Comebacks» von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer [Selbsthypnose](https://ansage.org/schwer-traumatisiert-nach-trumps-sieg-dreht-die-politmediale-linksgruene-sekte-durch/) rund um Harris-Hype und Trump-Panik – mit teils erschreckenden [Auswüchsen](https://archive.is/7tDhY). Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grünen Minderheitsregierung «geleitet» und man steuert auf Neuwahlen zu.
**Das [Kindergarten](https://www.spiegel.de/politik/deutschland/christian-lindner-auch-die-fdp-will-wieder-einen-eigenen-wirtschaftsgipfel-abhalten-a-a8a4e868-10b1-426e-adb0-e5a6d42f7c46)-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche** war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner außerdem den «Absturz Deutschlands» ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik [«vorsätzlich herbeigeführt»](https://www.t-online.de/nachrichten/deutschland/innenpolitik/id_100522112/fdp-chef-lindner-und-sein-grundsatzpapier-die-scheidung-von-der-ampel-.html) worden seien.
**Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen.** Verkehrs- und [Digitalminister Wissing](https://transition-news.org/raus-aus-der-komfortzone-es-lohnt-sich) trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium übernommen. Und mit [Jörg Kukies](https://norberthaering.de/news/joerg-kukies/) habe Scholz «seinen Lieblingsbock zum Obergärtner», sprich: Finanzminister befördert, meint Norbert Häring.
**Es gebe keine Vertrauensbasis für die weitere Zusammenarbeit mit der FDP,** hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg für vorgezogene Neuwahlen freimachen würde.
**Apropos Vertrauen: Über die Hälfte der Bundesbürger glauben, dass sie ihre Meinung nicht frei sagen können.** Das ging erst kürzlich aus dem diesjährigen [«Freiheitsindex»](https://www.schwaebische.de/politik/forscher-beim-vertrauen-in-staat-und-medien-zerreisst-es-uns-gerade-3034357) hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der Bürger misst. «Beim Vertrauen in Staat und Medien zerreißt es uns gerade», kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut für Demoskopie Allensbach durchführt.
**«Die absolute Mehrheit hat [absolut die Nase voll](https://archive.is/yRxwR)»,** titelte die *Bild* angesichts des «Ampel-Showdowns». Die Mehrheit wolle Neuwahlen und die Grünen sollten zuerst gehen, lasen wir dort.
**Dass «Insolvenzminister» Robert Habeck heute seine Kandidatur für das Kanzleramt verkündet hat,** kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel könne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei *Manova*. Und er kenne [Friedrich Merz](https://www.manova.news/artikel/der-kriegsgeile-blackrocker) schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
**Was also tun? Der Schweizer Verein [«Losdemokratie»](https://zeitpunkt.ch/node/40968) will eine Volksinitiative lancieren,** um die Bestimmung von Parlamentsmitgliedern per Los einzuführen. Das Losverfahren sorge für mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
**In jedem Fall wird es notwendig sein, unsere Bemühungen um [Freiheit und Selbstbestimmung](https://transition-news.org/alternative-medien-in-der-krise-zensur-kontrollverlust-und-die-suche-nach)** zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen – also die Suche nach dezentralen Lösungsansätzen – gehört dabei sicher zu den Möglichkeiten. Das gilt sowohl für jede/n Einzelne/n als auch für Entitäten wie die alternativen Medien.
---
Dieser Beitrag ist zuerst auf *[Transition News](https://transition-news.org/es-kann-nur-besser-werden-aber-wie)* erschienen.
-

@ a95c6243:d345522c
2024-10-26 12:21:50
*Es ist besser, ein Licht zu entzünden,
als auf die Dunkelheit zu schimpfen.
Konfuzius*
**Die Bemühungen um Aufarbeitung der sogenannten Corona-Pandemie,** um Aufklärung der Hintergründe, Benennung von Verantwortlichkeiten und das Ziehen von Konsequenzen sind durchaus nicht eingeschlafen. Das Interesse daran ist unter den gegebenen Umständen vielleicht nicht sonderlich groß, aber es ist vorhanden.
**Der sächsische Landtag hat gestern die Einsetzung eines [Untersuchungsausschusses](https://transition-news.org/sachsischer-landtag-beschliesst-afd-antrag-zu-corona-untersuchungsausschuss)** zur Corona-Politik beschlossen. In einer Sondersitzung erhielt ein entsprechender Antrag der AfD-Fraktion die ausreichende Zustimmung, auch von einigen Abgeordneten des BSW.
**In den Niederlanden wird [Bill Gates](https://transition-news.org/niederlande-bill-gates-muss-wegen-impfstoffklage-vor-gericht-erscheinen) vor Gericht erscheinen müssen.** Sieben durch die Covid-«Impfstoffe» geschädigte Personen hatten Klage eingereicht. Sie werfen unter anderem Gates, Pfizer-Chef Bourla und dem niederländischen Staat vor, sie hätten gewusst, dass diese Präparate weder sicher noch wirksam sind.
**Mit den mRNA-«Impfstoffen» von [Pfizer/BioNTech](https://transition-news.org/neues-buch-uber-pfizer-offenbart-grosstes-verbrechen-gegen-die-menschheit) befasst sich auch ein neues Buch.** Darin werden die Erkenntnisse von Ärzten und Wissenschaftlern aus der Analyse interner Dokumente über die klinischen Studien der Covid-Injektion präsentiert. Es handelt sich um jene in den USA freigeklagten Papiere, die die Arzneimittelbehörde (Food and Drug Administration, FDA) 75 Jahre unter Verschluss halten wollte.
**Ebenfalls Wissenschaftler und Ärzte, aber auch andere Experten organisieren** als Verbundnetzwerk [Corona-Solution](https://transition-news.org/online-konferenz-corona-solution-corona-und-modrna-von-toten-lebenden-und) kostenfreie Online-Konferenzen. Ihr Ziel ist es, «wissenschaftlich, demokratisch und friedlich» über Impfstoffe und Behandlungsprotokolle gegen SARS-CoV-2 aufzuklären und die Diskriminierung von Ungeimpften zu stoppen. [Gestern](https://www.csmedicus.org/de/aktuelle-konferenz/corona-und-modrna-von-toten-lebenden-und-physik-lernen/2024-10-25/) fand eine weitere Konferenz statt. Ihr Thema: «Corona und modRNA: Von Toten, Lebenden und Physik lernen».
**Aufgrund des Digital Services Acts (DSA) der Europäischen Union sei das Risiko groß,** dass ihre Arbeit als «Fake-News» bezeichnet würde, so das Netzwerk. Staatlich unerwünschte wissenschaftliche Aufklärung müsse sich passende Kanäle zur Veröffentlichung suchen. Ihre Live-Streams seien deshalb zum Beispiel nicht auf YouTube zu finden.
**Der vielfältige Einsatz für Aufklärung und Aufarbeitung** wird sich nicht stummschalten lassen. Nicht einmal der [Zensurmeister der EU](https://transition-news.org/deutschland-ist-der-zensurmeister-der-eu), Deutschland, wird so etwas erreichen. Die frisch aktivierten «Trusted Flagger» dürften allerdings künftige Siege beim «Denunzianten-Wettbewerb» im Kontext des DSA zusätzlich absichern.
**Wo sind die Grenzen der Meinungsfreiheit?** Sicher gibt es sie. Aber die ideologische Gleichstellung von illegalen mit unerwünschten Äußerungen verfolgt offensichtlich eher das Ziel, ein derart elementares demokratisches Grundrecht möglichst weitgehend auszuhebeln. Vorwürfe wie «Hassrede», «Delegitimierung des Staates» oder [«Volksverhetzung»](https://transition-news.org/eduard-prols-prozess-geht-in-die-nachste-runde) werden heute inflationär verwendet, um Systemkritik zu unterbinden. Gegen solche Bestrebungen gilt es, sich zu wehren.
---
Dieser Beitrag ist zuerst auf *[Transition News](https://transition-news.org/alles-muss-ans-licht)* erschienen.
-

@ c631e267:c2b78d3e
2024-10-23 20:26:10
Herzlichen Glückwunsch zum dritten Geburtstag, liebe *Denk Bar*! Wieso zum dritten? Das war doch 2022 und jetzt sind wir im Jahr 2024, oder? Ja, das ist schon richtig, aber bei Geburtstagen erinnere ich mich immer auch an meinen Vater, und der behauptete oft, der erste sei ja schließlich der Tag der Geburt selber und den müsse man natürlich mitzählen. Wo er recht hat, hat er nunmal recht. Konsequenterweise wird also heute dieser Blog an seinem dritten Geburtstag zwei Jahre alt.
Das ist ein Grund zum Feiern, wie ich finde. Einerseits ganz einfach, weil es dafür gar nicht genug Gründe geben kann. «Das Leben sind zwei Tage», lautet ein gängiger Ausdruck hier in Andalusien. In der Tat könnte es so sein, auch wenn wir uns im Alltag oft genug von der Routine vereinnahmen lassen.
Seit dem Start der *Denk Bar* vor zwei Jahren ist unglaublich viel passiert. Ebenso wie die zweieinhalb Jahre davor, und all jenes war letztlich auch der Auslöser dafür, dass ich begann, öffentlich zu schreiben. [Damals notierte ich](https://denkbar.substack.com/p/andreas-denk-bar-eroffnet):
> «Seit einigen Jahren erscheint unser öffentliches Umfeld immer fragwürdiger, widersprüchlicher und manchmal schier unglaublich - jede Menge Anlass für eigene Recherchen und Gedanken, ganz einfach mit einer Portion gesundem Menschenverstand.»
Wir erleben den sogenannten «großen Umbruch», einen globalen Coup, den skrupellose Egoisten clever eingefädelt haben und seit ein paar Jahren knallhart – aber nett verpackt – durchziehen, um buchstäblich alles nach ihrem Gusto umzukrempeln. Die Gelegenheit ist ja angeblich günstig und muss genutzt werden.
Nie hätte ich mir träumen lassen, dass ich so etwas jemals miterleben müsste. Die Bosheit, mit der ganz offensichtlich gegen die eigene Bevölkerung gearbeitet wird, war früher für mich unvorstellbar. Mein (Rest-) Vertrauen in alle möglichen Bereiche wie Politik, Wissenschaft, Justiz, Medien oder Kirche ist praktisch komplett zerstört. Einen [«inneren Totalschaden»](https://denkbar.substack.com/p/innerer-totalschaden) hatte ich mal für unsere Gesellschaften diagnostiziert.
Was mich vielleicht am meisten erschreckt, ist zum einen das Niveau der [Gleichschaltung](https://denkbar.substack.com/p/warum-trotzdem-dieses-handeln), das weltweit erreicht werden konnte, und zum anderen die praktisch totale Spaltung der Gesellschaft. Haben wir das tatsächlich mit uns machen lassen?? Unfassbar! Aber das Werkzeug «Angst» ist sehr mächtig und funktioniert bis heute.
Zum Glück passieren auch positive Dinge und neue Perspektiven öffnen sich. Für viele Menschen waren und sind die Entwicklungen der letzten Jahre ein Augenöffner. Sie sehen «Querdenken» als das, was es ist: eine Tugend.
Auch die immer ernsteren Zensurbemühungen sind letztlich nur ein Zeichen der Schwäche, wo Argumente fehlen. Sie werden nicht verhindern, dass wir unsere Meinung äußern, unbequeme Fragen stellen und dass die Wahrheit peu à peu ans Licht kommt. Es gibt immer Mittel und Wege, auch für uns.
---
**Danke, dass du diesen Weg mit mir weitergehst!**
-

@ a95c6243:d345522c
2024-10-19 08:58:08
Ein Lämmchen löschte an einem Bache seinen Durst. Fern von ihm, aber näher der Quelle, tat ein Wolf das gleiche. Kaum erblickte er das Lämmchen, so schrie er:
"Warum trübst du mir das Wasser, das ich trinken will?"
"Wie wäre das möglich", erwiderte schüchtern das Lämmchen, "ich stehe hier unten und du so weit oben; das Wasser fließt ja von dir zu mir; glaube mir, es kam mir nie in den Sinn, dir etwas Böses zu tun!"
"Ei, sieh doch! Du machst es gerade, wie dein Vater vor sechs Monaten; ich erinnere mich noch sehr wohl, daß auch du dabei warst, aber glücklich entkamst, als ich ihm für sein Schmähen das Fell abzog!"
"Ach, Herr!" flehte das zitternde Lämmchen, "ich bin ja erst vier Wochen alt und kannte meinen Vater gar nicht, so lange ist er schon tot; wie soll ich denn für ihn büßen."
"Du Unverschämter!" so endigt der Wolf mit erheuchelter Wut, indem er die Zähne fletschte. "Tot oder nicht tot, weiß ich doch, daß euer ganzes Geschlecht mich hasset, und dafür muß ich mich rächen."
Ohne weitere Umstände zu machen, zerriß er das Lämmchen und verschlang es.
*Das [Gewissen](https://apollo-news.net/das-gewissen-in-corona-jahren-zum-tod-von-gunnar-kaiser/) regt sich selbst bei dem größten Bösewichte; er sucht doch nach Vorwand, um dasselbe damit bei Begehung seiner Schlechtigkeiten zu beschwichtigen.*
Quelle: https://eden.one/fabeln-aesop-das-lamm-und-der-wolf
-

@ 6a6be47b:3e74e3e1
2025-02-25 14:14:41
Hi frens,
While drawing this fly 🪰 👇🏻
nostr:nevent1qgsx56ly0wcj7gwasrc7707l9px39g5nzn82p35akhkdqj448e6w8cgqyrrnhgtqqfvcvf007gtxmffrhd8zw5j0t93cuxc3yrykl2dzyp3tvj4hcjx
I started thinking about how to make my art stand out. Maybe I should focus on making it more appealing—or at least improving its presentation. Don’t get me wrong, I’m not against making my work more consumable, but the marketing side of things takes so much time away from actually creating art. It’s sad that sometimes it feels less about delivering high-quality work and more about turning it into “content.”
Honestly, that can be exhausting. Like Fall Out Boy said, “all this effort to make it look effortless.”It’s not really my style to turn my art—or the process of creating it—into content. That’s why I sometimes struggle with crafting or presenting it in a way that fits today’s trends.
Sometimes, the pressure to make my art presentable is so overwhelming that it makes me feel like not creating at all. And when it doesn’t yield the kind of recognition or financial support I hope for after all that effort, it can be really disappointing. It’s like watching all that hard work slowly erode my soul. It’s tough to keep going when it feels like my art isn’t being valued in the way I wish it could be.
I want to be clear: this isn’t me dissing anyone. You do you, and I’ll do me. As Crowley would say, “Do what thou wilt.” What I’m really trying to figure out is how to find that sweet spot—where I can keep up with the times and make my art more appealing without losing my soul in the process.
I’m trying my best, and I know I’ll make mistakes along the way, but I’ll keep going. I just wanted to share these thoughts with you because I’m usually pretty upbeat here—maybe even a little superficial at times—but this is me being _more_ real with you.
Art is such a huge part of my life, and through my work, I’m already sharing something raw and personal with you. But now you also know why my presentation might sometimes feel simple or plain. I’m working on finding that balance, and I’ll get there eventually.
Godspeed, my frens
-

@ eaef5965:511d6b79
2025-02-25 14:14:11
Another quarter, another update on the global money supply.
I remember three years ago yesterday, texting my Ukrainian friends for updates as they fled with their families for safety from Putin's full-scale, unprovoked attack on their country. Three years on, they continue to fight incredibly bravely, for if they do not, there will be no Ukraine. Europe has drip-fed them enough support to not lose, but not enough to win. America now demands repayment for its aid to the victim in the form of mineral rights, and will not recognize the aggressor as the aggressor. The era of Reagan-style, speak softly while carrying a big stick approach to dictators seems no more, for now, from the new US admin. The world order is changing rapidly, and Europe is quickly finding out what the Baltics and Poland have known for 200 years: the threat from the East does not share its values; it is simply uncompromising.
As this next round of political theater plays out, and one can only hope for just, lasting peace and security with clear eyes from all democratic allies, the printing presses will do as instructed. But as we look through this update, you will see that we are actually at very low, relative-levels of money printing historically, even slight negative money growth.
Bitcoin continues on, and as of 31 December 2024, its **$1.8 trillion market cap was 7.2% of the global monetary base**. That means that the global monetary base, for this update, is $25.5 trillion.
## **Why the global monetary base?**
It is the only money supply that is economically analogous to bitcoins, digital store of value today, and to gold and silver ounces, store of values from the past.
The monetary base is **central bank money**, comprised of two supplies:
1. **Physical currency**: Notes and coins, or “cash;”
2. **Bank reserves**: The “Master account” that each commercial bank holds with its central bank.
Now, why do I refer to this as *Central bank money*?
This is because, unlike all other money supplies in the fiduciary banking world (like M1/M2/M3), the Monetary base is the sole and ultimate money supply controlled by the central bank. It is, literally, the printing press. What follows won't be a lesson in reserve ratios or monetary economics. The point is that you simply understand that there is a money supply that central banks solely control, and of course (of course!) this is what Bitcoin's 21 million are up against.
The monetary base is to the core of the entire fiat financial system, as 21 million bitcoins are to the core of the Bitcoin protocol. One is open and permissionless, and one is not. By the way, the monetary base is essentially (though not entirely) analogous to the total liabilities of a central bank, so we can (basically) say that the monetary base is the "balance sheet" of each central bank.
**On cash**. Quick notes on the above. Certainly you understand what "cash" is, and it is indeed an instrument that has been fully monopolized by each central bank in each nation around the world--only they can print it. Even though it is true that banks in more free banking societies in the past could freely print and strike notes and coins, the central bank (or state) monopoly has been around for a long time. Kublai Khan was the first to do it 750 years ago.
**On bank reserves**. Don't stress your brain on this too much, but this is the main "settlement money" that banks use between each other, when they want to settle their debts. It is digital now (Fedwire in US, CHAPS in UK), but it doesn't technically have to be, and of course before modern technology took over even a few decades ago, it was not. These two stacks of retail and wholesale cash, stacks of central bank money, are what make up the **Monetary base**. *This is the printing press*. Only this compares to 21 million bitcoins. And gold, and silver by the way.
Final note, central bank digital currencies, or CBDCs, which are simply LARPing on Bitcoin's success, are indeed created by central banks, and they are indeed classified as Base money. They are going to be a "third rail." They are thankfully incredibly small, pilot projects today. We will see how far democracies will be tested, as autocracies no doubt will mainstream them; but for now, consider them, at least economically, to be inconsequential to the update below. It appears that central banks are actually cooling to them, as of this writing.
With that review out of the way, onward to Q4 update for 2024.
## **Bitcoin is the 6th largest money in the world**
This is unchanged from last quarter.
In February 2024, it surpassed the monetary base of the United Kingdom; that is, its value was larger than the Bank of England's balance sheet, and it remains so to this day.
As of 31 December 2024, it is only the balance sheets of the big four central banks that are larger than Bitcoin. These currencies are:
1. **Federal Reserve (dollar)**: $5.60 trillion
2. **People's Bank of China (yuan)**: $5.04 trillion equivalent
3. **European Central Bank (euro)**: $4.87 trillion equivalent
4. **Bank of Japan (yen)**: $4.20 trillion equivalent
If we remove gold from the equation (and we shouldn't), then Bitcoin could be considered the fifth largest money in the world. Including gold, Bitcoin is the sixth.
However, the all-important monetary metal throughout history that even a child knows about--gold--is still king at around **$17 trillion in value**, or 6 billion ounces worldwide. Note, this does not include gold lost/recycled through industry; in that case, it is estimated that about 7 billion ounces of gold have been mined throughout humanity.
Silver, for what it's worth, is still a big "monetary" metal; though it is true, much more silver is gobbled up in industry compared to gold. There are about 31 billion ounces of non-industrial silver floating around the world (most of it in jewelry and silverware form) that is valued in today's prices at nearly $1 trillion. Bitcoin bigger.
## **State of the print: $25.5 trillion**
This is down $1.5 trillion from last quarter!
However, we must also remember that as currencies lose value against the best-looking horse in the glue factory; that is, the dollar, then this dollar value actually "dampens" the effect of the print. More on this below.
If we consider **$25.5 trillion as the Big Boss** of central bank money, then Bitcoin at $1.8 trillion network value (December, quarter-end figure) indeed has some way to go. But as anyone who follows Bitcoin for a sustained about of time knows, this can change rapidly. We can also imagine how the Pareto distribution occurs even in money, if Bitcoin after only 15 years is already larger than every central bank money in the world except for four of them. Wild to ponder.
## **All-time supply (monetary) inflation: 12.7% per year compounded**
This is a long-term, "smoothed" monetary inflation, or money growth figure. It is looking across all the 50 currencies in my sample, going back to 31 December 1969 for almost 40% of them, and for those that don't, simply adding them into the weighted basket as data becomes available.
Roughly stated, it means that central banks on balance double their money supply every 5.8 years. This is a fact.
However, this overall rate of increase is indeed declining, and has been since 2022. For example, if we looked at this headline figure from last year ending 2023, it blended to **12.9% all-time, or 0.2% higher than now**. Still, even though central banks have been trying to tighten from their overheated 2020-22 money print, the overall, net effects of money growth **in native fiat units** have not changed significantly.
For more detail, we can look at the latest year.
## **Trailing 12-month money growth: -3.0%**
What is very interesting, however, and alluded to above, is how all global currencies continue to decline in *relative value against the dollar*. According to the simple, USD-based trendline analysis for all global currencies in the dataset (see below), we should have a $34 trillion monetary base right now, based on past performance. We have a $25.5 trillion monetary base right now. We are actually *lower than the 2.5th percentile* on this trendline.
But take note: What you are really seeing is actually *not that much less of money printing* (they have been letting up the gas, to be sure), but rather, a tremendous loss in purchasing power of all currencies versus the dollar!
In other words, from 2023 to 2024:
1. The weighted average, native change in money base growth of all currencies was **-3.0% over the prior 12 months**;
2. The overall dollar value change was **-8.5% over the prior 12 months ($25.5 trillion vs. $27.8 trillion)**.
This means that, in the last year, government money lost an **additional 5.5% per year in dollar purchasing power**, beyond its reduction of 3.0% in money print. Wild.
## **Since 2021 peak**
I don't publicize this information as much, and I probably should. In dollar terms, in December 2021, global central bank money printing **peaked at $30.5 trillion**. Big number. Now, it is $25.5 trillion. So one would assume that the printing presses have cooled by 16.4% in the last three years.
But again, as I have just described above, we are trying to see beyond Wittgenstein's Ruler here. This can be difficult, because we have 50 different currencies to contend with.
It is true, in the last three years, the **dollar value** of the top 50 currencies in the world has fallen by 16.4%.
*But does that mean that central banks are printing 16.4% less than before 2021?*
No.
In fact, when you look at the weighted average of each central bank's performance over the last three years, in their *native currency units*, you will find **that the weighted average decline in printing is only 2.4%**.
Notice anything? This decrease over three years is actually *less* than the decline over the last 12 months, which was 3.0% (section above).
And most obviously, **it is far less than 16.4%**.
There are dollar values. These grow differently from all the **native currency units**, because of foreign exchange rates.
**There are native currency units**. These grow differently from all the dollar values of these currencies, because of foreign exchange rates.
Central banks are printing less over the last three years: **2.4% less overall**. But this is much less than the decline in the dollar value of 50 currency stocks over the last three years: **16.4% decline**.
One must tear through the numbers to understand both ideas. I have provided you with both.
## **New data: China**
Firstly, what I am about to say has nothing to do with what I've described above, except for a very small impact on the overall, headline figure of 12.7% money growth. This is a historical addition.
I have added some important new monetary data this quarter, and that is from the quasi-transparent yet enormous economy of China. On the PBoC website, they publish balance sheet data back to only 31 December 1999. I have used this timespan for seven years now in my quarterly updates. However, I have now gone through some new figures from the book *China Financial Statistics (1949-2005)* and added additional data points all the way back to 1969 for China. It is published from PBoC sources. I am using M0 figures from 1969 until 1993 (only available, very compatible, as a subset of base money), and from 1993, they begin publishing full monetary base data. The break in growth metrics when switching from M0 to MB in 1993 is ignored.
The changes from this new data--from a huge, growing economy such as China will, as expected, boost the overall inflation numbers in my dataset. These are the net effects of the new data, as of 31 December 2024:
**China Monetary base average monthly growth for entire series:**
1. Old data from 1999: 0.85%
2. New data from 1969: 1.04%
**China Monetary base compound annual growth for entire series:**
1. Old data from 1999: 10.73%
2. New data from 1969: 14.24%
**Overall Monetary base compound annual growth for entire series:**
1. Before this additional China data: 12.56%
2. After this additional China data: 12.73%
So the net effect on "global monetary inflation" with this additional data is 17 basis points, or 0.17%. I thought the overall effect could be higher, but one must remember these growth rates are weighted by the *relative USD value of each respective base money*, on a continuous basis, updating each month. In the 1960s, 1970s, and 1980s, China was a much smaller proportion of the global economic pie than it is today.
One final point with this new data, and with my monetary inflation data overall. I am fairly confident my headline number of **12.6-12.7% per year compounded** for global money growth is *conservative*. These are the top 50 currencies in the world. We just saw what new data did to the entire dataset, and from a huge country no less. If I were to add more currencies, such as those from Kenya or Morocco (and I will), these currencies will only marginally affect this headline money growth figure. What's more, this new data will by definition come from ***smaller, more volatile, higher inflation-producing*** currencies, so I would only expect my headline figure to creep higher, the further it is refined.
***Huge thanks to Eryn @reltbracco (npub1e2rd2k45ym2jmctnysfadxumrvrr57vqj69ck6trt2y62c40r0kqs9lx8t) for sifting through tons of Chinese historical content here, and for eventually finding a great book with Chinese historical monetary data that was in English!***
## **The trends**
The remainder of the report is an update on global trends in demographics, money, and economics. All of these trends are **exponential curves**. The sole exception, is Bitcoin. It's price and market cap action, across time, are **power curves**.
One further change. I have allowed the 2.5 and 97.5 red percentile bands to evolve over time. I think this presentation allows the reader to see that trends indeed can change, across time. However, **the all-time trendline**, as of today, is the solid, black trendline.
We are where we are. Plan accordingly, never financial advice.
## **Population**
The world has grown exponentially at **1.7% per year** over the last 75 years. However, despite all the overpopulation myths you've probably heard, this rate of growth is actually falling, well below trend, and we only grow at **0.9% per year** at the moment, pulling the overall trend down every year.
## **US GDP**
The United States has grown its economy at 5.2% compounded per year since the founding of the republic. We are at the higher end of this trend right now, $29 trillion output per year, growing at **5.3% per year**. As this is exponential growth, if I put it on log scale, it will become a straight line.
## **Stock market**
Stocks grow exponentially as well, don't let anyone tell you otherwise. The growth rate is **7.3% per year** for the S&P 500, the main US index that tracks more than 80% of total market caps. Currently, the market is well above trend.
## **Stock market: Dividends reinvested**
*If you reinvest those dividends* into the same stock market, you'll earn more. The all-time compound annual growth increases by 2% to **9.3% per year** for the S&P.
## **Bonds**
Bonds are supposedly safer than stocks (bondholders get paid back first), and more regular cash flowing. If you look at the longest running bond index in the US, it grows at **7.0% per year**, compounded. Notice how, in a rising interest rate environment (which we are in at the moment), bond prices will suffer. In this case, it's the Bloomberg Aggregate Bond Index. This has kept the bond market returns at the lower end of the range, since the global financial crisis in 2008. Not even 1% TTM return.
## **Base Money**
As we've discussed, base money grows across the world at a weighted average of **12.7% compounded per year**. However, this trendline analysis looks at it differently than my headline figure. It simply looks at the USD value of the global monetary base (again, currently **$25.5 trillion**), and draws an exponential trendline on that USD equivalent growth for 50+ years. In other words, this is going to be *after all currency fluctuations* have played themselves out.
**Slope of the trend is 10.2% compounded for this one.**
This is further confirmation that, even though central banks around the world like to print at 12.7% compounded all-time in native unit terms, they will always lose value against the world's reserve currency, as that shakes out to around 10.2% compounded in USD-terms.
And we really are scraping the bottom of this range. 0.7x the trendline, which
## **Silver supply**
This is total ounces ever mined. They trend upward at **1.4% per year**.
## **Gold supply**
This is total ounces ever mined. Gold trends upward at **1.7% per year**. Faster than silver. Surprised? Notice the R-squared (goodness of fit) for both silver and gold production increase.
## **Bitcoin supply**
Bitcoins grow according to a basic logarithmic curve. Trying to draw percentiles is pointless here, and even measuring a trendline is relatively pointless, as everyone knows the bitcoins prescribed into the future, per the protocol. Better to just quote the trailing 12-month growth figure, and it is **1.2% per year** and falling, as of quarter end Dec-2024. Less than gold or silver.
## **Silver price**
Since 1971 it's trended at 3.5% per year. Silver bug?
## **Gold price**
Since 1971 it's trended at 5.1% per year. Gold bug?
## **Bitcoin price**
Bitcoin's price (and market cap) grows according to a power trend. Did you notice that the prior exponential trends displayed themselves as straight lines on log scale? Well, with Bitcoin, the power trendline gradually falls across time, but the growth is still well larger than anything we've covered thus far. Now, we have finally arrived at something that grows differently than exponential.
[As I've observed since 2018](https://x.com/1basemoney/status/1079740420438011905)
.
Why? Because you are viewing an *adoption curve*. This is how networks scale.
Bitcoin's power trendline has grown **164% per year** since Bitcoin Pizza Day in 2010. Note that this is something akin to a "Lifetime Achievement" figure, and it will continue to fall every day. Over the prior 12 months ending 31-Dec-2024, Bitcoin grew **121.1%.** The compound growth of the power trend today is just under **44% per year**. By 2030 it will fall to "only" **31% per year**. You can find more dissection of the
[power curve on my website here](https://www.porkopolis.io/thechart/)
.
Oh yes, and it is free (as in speech), open, and permissionless money.
## **To summarize**
That was a lot of data across a lot of charts. I've compiled all these trendlines and data in a helpful table here for you to review at any time. These are the growth trends of the monetary and major asset world, as of year-end 2024:
Again, a quick breakdown on why Bitcoin is so interesting, and confounding. Where most things in the financial and economic world grow *exponentially*, Bitcoin is actually a compilation of *three* different trend patterns:
## **Conclusion**
Below is a detailed summary of all the input assets:
1. 50 fiat currencies: $25.5 trillion
2. Gold: $17.1 trillion
3. Silver: $1 trillion
4. Bitcoin: $1.8 trillion
Print it out if you like!
Thank you for reading. This takes a lot of time to put together each quarter. If you enjoyed, please consider zapping, and you can also donate to my [BTCPay](https://donations.cryptovoices.com/) on [my website](https://www.porkopolis.io/) if you'd like to help keep this research going.
Take care.
-

@ 4d41a7cb:7d3633cc
2025-02-25 13:53:41
Money is more abstract than most people think, as I will show in this article. Debt slavery stems from financial illiteracy, which occurs intentionally. The biggest secret is how bankers actually create **currency claims out of thin air and transfer the wealth of their clients (including nation states) to themselves for free without risking a cent, real money, or currency.**
## **MONEY**
Money, one of the most important things in our lives, is so important that we exchange wealth to obtain it. Not because we want it but because we need it in order to buy food, shelter, clothes, etc.
Money is not inherently bad, although some may argue that the love for money is the root of all evil, and I'll agree. If you are willing to sacrifice your soul, honor, reputation, family, or friends for money, it indicates a lack of morality and a willingness to engage in harmful actions to satisfy your greed and materialistic desires.
**Money is a technology, a tool, and like any tool or technology, it is impartial**; it cannot be inherently good or bad. It can be used to help others or to destroy them. At the end of the day, it’s all about the intention behind human behavior.
Money is not just a useful tool; it’s **the most important tool** to have for global commerce, division of labor, specialists, and the level of sophistication and comfort we achieve as humanity. All of this will not be possible without this tool working as a common medium of exchange and standard of value, a common language for all humanity: the language of monetary value.
**Money is the cornerstone of civilization.** Money is the bloodstream of commerce, and commerce is the spine of civilization; it’s what made our civilization so prosperous, letting any one of us decide how we want to provide value to society.
Money is half of every transaction, and since we will always need to intermediate between every exchange, money is the perfect intermediary to help achieve millions of different combinations of exchanges. It will be practically impossible to barter on a global scale; even in a small community with a few different products, it will be a mess.
For example, if there were 10 products, there would be 45 combinations; if there were 100, there would be 4950 combinations. Imagine a scenario on a large scale, requiring the exchange of hundreds of thousands of products every second..
This issue **necessitated the development of a new technology: money, which in turn led to the emergence of moneychangers (v4v). Money is a tool to exchange, measure, and store wealth.** Wealth is anything we can sell: our labor (time and energy), our house, a car, a product, a service, etc.
**Gold and silver were money for thousands of years** because of their unique characteristics of scarcity, durability, divisibility, and transportability. The most important characteristic of these metals is that they are scarce, and they can’t be created out of thin air or reproduced with no effort.
**Only God can control the supply of gold and silver found in nature.** Men can only extract it, and it requires investment, work, time, and effort to find and mine it. So the common knowledge and the common sense of the people over thousands of years consensually chose gold and silver as money. And **this money is the only lawful money under common law.**
> “Gold is money, everything else is credit”
>
> J.P. Morgan 1912
As an interesting fact, the word "money" is used 140 times in the King James Bible, the word "gold" is mentioned 417 times, and the word "silver" over 320 times. But the word “currency” is not mentioned a single time.
The most important function of money is to **exchange and store your time and energy**. You work to acquire money and then use that money to acquire other goods and services.
**Our time and energy is our real wealth** because it’s limited. We all have a limited time on earth, and we can do certain things in the 24 hours we have every day, so we have to be conscious about how we administrate and store the fruits of our labor.
Money is a means to an end; we don't want money; we want what money can buy, and guess what, money cannot buy more time.
## **CURRENCY = FAKE MONEY**
**Currency exists as a money substitute.** Currencies began as the opposite of money, the **promise to deliver money in the future: debt**. Currencies can be used to exchange wealth, but they are not a fair unit of account and are never a good way to store it because men are tempted to create more and dilute its value (a process known as inflation)
Currencies have almost all the same characteristics of money, but there’s a big difference: **currency is not scarce and durable**. Missing the store of value characteristic of money, since **its supply can be manipulated by men.**
For wealth preservation and measuring, modern currencies make no sense. Men control the supply of currency; **banks and governments can inflate or deflate it in any amount they please, giving them supreme power and control over wealth distribution.** This creates two classes of citizens: those who work to acquire currency and those who create it instantly and for free.
International banks have stolen money (gold and silver) over the past century, replacing its supply with currency or fake money (paper receipts). \[1913, 1933, 1944, 1971\]
Under this monetary game, those with "fixed income," savers, and creditors are the biggest losers, while debtors and asset owners are the winners..
The **most important distinction to keep in mind is that nature controls the money supply, making artificial inflation impossible.** On the other hand, men can inflate currency in unlimited amounts. It is **a manifestation of God's power on earth, as the mediums of exchange serve as the lifeblood of commerce, the backbone of our economic system, and facilitate the division of labor.**
If someone can **inflate the currency supply, this has the same economic effect as counterfeiting,** and he’s effectively stealing from everyone contracting, trading, and saving in that currency. Manipulating the mediums of exchange in an economy enables manipulation of every security, industry, and business.
This is the reason the founding fathers of the United States made gold and silver only lawful money for the payment of debts. To give everyone equal protection under the law and to get rid of the nobility and two types of citizens: bankers and workers or nobles and plebeians.
> Bank-notes are not money. It 's currency. It’s unfair to take banks' currency as a standard for comparison.
>
> Bank-note currency is not “lawful money”. It never could be counted as part of banks cash reserves. ***It would be too much like a man writing and signing his own promissory note for a million and then claiming that this made him a millionaire.***
>
> The very grave evils any currency depreciation always impose upon businesses and the people.
>
> Alfred Owen Crozier, US Money vs Corporate currency, 1912
So money has three very important functions that work as the pillars on which the wellness of our economic system and civilizations relies. Currency is not a store of value because its supply can be easily manipulated, men in power can create more of it, and so using this always-changing currency as a standard of value or a unit of account is like using an always-changing ruler to measure distance. A dollar today does not buy the same as a dollar one year ago. So yesterday prices are not equal to today's prices; this is an unfair business calculation.
So money has three very important functions that work as the pillars on which the wellness of our economic system and civilizations rel**ies. Currency is not a store of value because its supply can be easily manipulated**, men in power can create more of it, and so using this always-changing currency as a standard of value or a unit of account is like using an always-changing ruler to measure distance. **A dollar today does not buy the same as a dollar one year ago**. So yesterday prices are not equal to today's prices; this is an unfair business calculation.
There are several Bible verses that discuss the manipulation of weights and measures, emphasizing the importance of honesty and fairness in commercial dealings.
1. Leviticus 19:35-36 New International Version (NIV): "**Do not use dishonest standards when measuring length, weight, or quantity.** Use honest scales and honest weights, an honest ephah, and an honest hin.
2. Deuteronomy 25:13-15: Do not have two differing weights in your bag—one heavy, one light. Do not have two differing measures in your house—one large, one small. **You must have accurate and honest weights and measures**.
3. Proverbs 11:1—"A "**dishonest scale is an abomination to the Lord**, but a just weight is his delight."
**Fake money (currency) is always and everywhere a dishonest scale.** So if you want a real measure of value or wealth use something with real value instead, like gold, commodities, products, times, etc.
Bankers have redefined the word money to mean fake money, currency, or debt. And this is not the worst part. Let’s introduce another concept: credit.
## **CREDIT = FAKE CURRENCY**
**Real credit is the promise to pay money in the future.** It involves delaying the payment of money. **Currency was born as credit**, as a money certificate or receipt. During the last century, banks gradually replaced 100% of the money with currency and bank credit to further boost their profits and control. \[1913, 1933, 1944, 1971\]
But in order to achieve this goal, **bankers redefined the word money to mean the opposite of money: credit/debt. This is like calling a night a day or evil a good.**
When you take out a loan from a friend, you receive credit from him, but you also incur a debt with him. You promise your friends that you will pay them (asset/right), and you owe them (liability/obligation). The asset and the liability are one and part of the same deal; they cannot exist without the other. There’s no credit with no debt, no debt with no credit, and no liability with no asset.
Federal Reserve notes, commonly known as **“dollars,”** are a private corporate currency; they are **not money** because they are not gold or silver, nor receipts for these metals as many people still believe. They were not redeemable in money from the start, despite being created under the assumption.
The “peso” (Spanish word for weight) used to be a standardized amount of gold or silver, but it’s not any more; it's just a debt denomination. And what's owing? Currency. **How can someone lend the opposite of money and charge interest? O**nly deceiving you into believing that he is lending you money. So they redefined the word money to mean the opposite of it.
But redefining words does not change the economic effect of the transaction.
When currencies first appeared, I can imagine people asking themselves, "How can people trust these paper certificates in exchange for their money?" Who will be that stupid?” And **nowadays, people don’t understand the difference between money and currency, to the point that bankers redefined the word "money" to mean the opposite of "money."**
Lesson: Money is not just a medium of exchange; it is also a store of value and a unit of account. Currency, the opposite of money, is debt. Since it can be created in unlimited amounts, it can't work as a store of value because its value depreciates as more units are created; for this same reason, it is not fair to denominate values in currency units since one currency unit today does not buy the same as a year ago because of inflation, the loss of purchasing power.
Summarize: While money, currency, and credit all serve as effective mediums of exchange, only money serves as a reliable store of value for saving. Currency and credit are not stores of value (not good to save), and there are not fair units of account (not good for price).
In simple terms, money is not currency, because currency is just credit and debt. We can conceptualize it as a ledger, a record of who owes what to whom. Currency is fake money since it’s the opposite of a store of value; it's always depreciating in value while its supply is inflated. This is the definition of inflation.
**Modern credit is not currency; it’s the opposite. It’s the promise to deliver currency in the future, the promise of a promise of money (in theory). But there’s no money behind. It’s an air loan.**
But how did we get here? Is everyone stupid? No, we have been tricked, manipulated, and dictated to use these currencies, and this banking system was forced on us. They stole our money and replaced it with fake substitutes to boost their profits.
## **MODERN MEDIUMS OF EXCHANGE = MONOPOLY MONEY**
**So nowadays we have fake money acting as cash/currency and fake currency acting as bank deposits or credit.** One is worse than the other, but both of them serve only as mediums of exchange. Those who store wealth with them will be robbed, and those who calculate business will be lied to.
Today we use currencies (government notes), coins, bank deposits (currency claims), checks (bank deposit claims), credit cards, and debit cards. All of them are ‘monopoly money’ fake claims based on a big and global fraud.
- *Government notes (government debt)*
Since governments are under the control of central banks, they can only create currency by borrowing. Governments must issue bonds, or debt, and the central bank can generate credit, or currency, to purchase these bonds.
The bond (government liability) is the counterpart of the ‘asset’ (the currency, a central bank asset). Bonds are debt, and currencies are credit.
When the central bank creates currency to lend it to the government at interest, it has literally the economic effect of **transferring the wealth of the nation to the banks for free**. The banks are not lending anything that they had to labor to produce; instead, they are creating it by printing paper notes or digital currency.
On the other side, governments have to collect money from citizens (producers, merchants, and workers) to pay the interest on the debt.
Despite their best efforts, governments are unable to repay the debt due to interest, which makes it bigger than the amount of currency. Let’s say the debt is 100 at 1% interest. So there’s only 100 in currency. But at the end of the year, there’s going to be a debt of 101. In order for the system to keep working, someone else has to go into debt to create more currency units, and governments have to keep borrowing and at least only paying the interest and rolling the debt.
The important thing is that if you have government currency debt free, you own it. This is the new ‘money.’. **Government currency is the ‘real’ cash, liquidity, or water.**
- *Bank deposits (bank debt)*
When you deposit your government currency in the bank, you are legally lending your currency to the bank, and the bank owes you the amount you deposit. This currency is not stored by banks until you request it. Banks use this currency as if it were theirs, and they do business with it. That’s why I said, **‘Your money in the bank’ is not yours; it’s not money; it’s not in the bank.** Its currency, its owe to you, is only registered on the bank ledger as a debt, not in a safe box.
The numbers you get in the bank account, or your balance, are government currency substitutes; they are bank deposits. Your currency deposit is the asset, and the number on your bank account balance is the liability.
But this is not the worst part. Banks lend around 10 times more currency than they have in deposits. So banks have more liabilities than assets (they are literally broke).
People often treat bank deposits, also known as government currency substitutes or bank tokens, as legal tender, allowing banks to create them arbitrarily and 'lend' them to unsuspecting clients who mistakenly believe they are receiving currency.
This is possible only because the bank's deposit has equal cash value.
***Government bonds, government currency, and bank deposits have equal value. But they are not the same.***
All of them have counterparty risk, but **cash, or government currency, is better** or safer than bonds or bank deposits. If interest rates rise, the value of bonds can decrease, and default on bank deposits can result in total loss, a scenario that has frequently occurred.
Keep in mind that bank deposits represent the bank's debts, also known as liabilities. Business activities and risk-taking make your currency unsecured, and they don't compensate you enough for the loan and risk.
- *Debit cards (bank deposit transfer)*
Your bank deposit is your right to get your currency back. When you use a credit card to buy something, you are transferring that right to the seller so he can redeem that bank token for currency if he wishes.
But you have to have had a deposit before you can spend it or transfer it.
- *Checks (bank deposit transfer)*
The same applies to checks. Your bank deposit is your right to get your currency back. When you use a check to buy something, you are transferring that right to the seller so he can redeem that bank token for currency if he wishes.
- *Credit card (bank deposit creator)*
Credit cards are different. When you use a credit card, you are creating a bank deposit backed by your promise of paying it back. By allowing the bank to create a currency substitute out of nothing and charge you high interest, you are essentially working for them for free.
Not only this, but you are also letting them collect fees from the payments processing that cost them nothing and support their fake money as a medium of exchange.
**Using credit cards is literally voting for financial slavery.** This is why companies make credit cards so convenient and offer benefits, with the intention of incentivizing and pushing people into the debt slavery system.
## **BANKS = MONEYCHANGERS**
‘Loans’ = exchanges
**The history of money is the history of moneychangers**, money dealers, or bankers. Money is an inanimate object. Bankers are alive; they are the ones in charge of making the money, currency, and credit flow or stop.
**They have been in existence for thousands of years**, from Egypt to Rome, where Jesus Christ himself threw them out of the temple and called them thieves, and he was not wrong.
Moneychangers played a crucial role in facilitating trade by exchanging different forms of currency and commodities. The profession of moneychangers evolved over time, particularly during the Roman Empire and the Middle Ages when various currencies were in circulation. In these times, moneychangers would set up shop at markets or public spaces to provide their services and **help merchants convert their money into a form that could be used for transactions with other traders.** As banking systems developed over time, the role of moneychangers expanded to include more complex financial services.
Today, moneychangers are still an essential part of the global economy, helping people exchange currencies and facilitating international trade.
**The Knights Templars** were a Christian military order established in 1119 who played a crucial role in the establishment of the financial system in medieval Europe. They established **a gold-backed credit system** that laid the foundation for the modern banking system. Their financial services included deposit accounts, loans, and even a form of early traveler's checks.
**The history of the goldsmiths** starts around 700 years ago in the year 1327. The company became responsible for hallmarking precious metals and played a significant role in regulating the quality and authenticity of gold and silver items. **In exchange for written acknowledgments or "receipts,"** they also provided gold deposit services.
Both groups played significant roles in the development of these early financial instruments, with goldsmiths issuing written acknowledgments for deposited gold and the Knights Templar establishing banking institutions that facilitated the use of such receipts as a form of payment.
This is a brief summary of the beginning of the moneychangers and how they discovered how to multiply money with paper receipts, better understood as counterfeiting. We now refer to it as fractional reserve banking, and let me tell you something: it's based on fraud.
Not only do they create bank deposits when you deposit currency, but they also create them when you "take a loan." Banks do not lend money, and they do not lend currency; they lend bank deposits (bank tokens/IOUs/currency substitutes/ paper receipts).
Banks had to redefine the word money to mean the opposite of money (debt) to trick the people. How can you lend the oposite of money and expect to be paid back plus interest? This took them thousands of years to achieve.
**The fact is that this is not a loan but an exchange.** When you take a loan, you sign a contract that creates a promissory note, which is your promise to pay. The bank then takes this promissory note, without your permission (steals), and sells it for cash (if you requiere it) or government bonds (to earn interest).
Your promissory note has equal value to cash and government bonds. And banks always need an asset to create a bank deposit (liability). So the banks literally steal your asset (promissory note) and sell them to create IOUs that they will ‘lend’ to you.
They ‘lend’ the oposite of money and call it a loan. The truth is that they are acting as moneychangers, and they are exchanging your IOU (promissory note) for a bank IOU (bank deposit) without your permission and pretending that you pay it back, but they never pay back theirs…
How is this possible? This is only possible because most people treat bank deposits (bank tokens, IOUs, and debts) as a medium of exchange because they trust the banks.
This is the root of inequality under the law. While one group can create IOUs from nothing and steal others, the other must work for them or exchange wealth.
If this bank defaults, its IOUs quickly vanish. This is a mathematical certainty; that’s why banks that are 'too big to fail' demand bailouts. **Every bank is bankrupt** since they have 7–10 times more liabilities than assets, and the assets they have are not theirs but their clients' assets. The only thing that keeps them alive is the trust of the public and the bailouts of the government.
**This is legalized slavery and theft.** There’s no other name. Banks own every industry, government, public figure, actor, etc. They have the power of God on earth, and it's time to stop them.
If we let the bank take our wealth for free, we will end up bankrupt, and they will end up owning everything. Every medium of exchange nowadays is an IOU or an IOU of an IOU. Ultimately, it is mathematically impossible to repay all of those IOUs, and banks pretend to keep all the assets.
*Check: IOU = deposit; IOU = cash; IOU = bond; IOU + interest*
The only way this system can continue is to keep creating new IOUs to pay the old ones, but even then (as it has been for over a century), the value of those IOUs keeps falling, causing hyperinflation.
If banks and governments want to ‘avoid’ (imposible) or relent to hyperinflation, they need to incur a great confiscation. So heads you lose, tails they win, playing this game doesn't make any fucking sense.
Buy Bitcoin, self custody, and fuck the government and the banking system.
Live free or die trying.
-

@ 04c915da:3dfbecc9
2025-02-25 03:55:08
Here’s a revised timeline of macro-level events from *The Mandibles: A Family, 2029–2047* by Lionel Shriver, reimagined in a world where Bitcoin is adopted as a widely accepted form of money, altering the original narrative’s assumptions about currency collapse and economic control. In Shriver’s original story, the failure of Bitcoin is assumed amid the dominance of the bancor and the dollar’s collapse. Here, Bitcoin’s success reshapes the economic and societal trajectory, decentralizing power and challenging state-driven outcomes.
### Part One: 2029–2032
- **2029 (Early Year)**\
The United States faces economic strain as the dollar weakens against global shifts. However, Bitcoin, having gained traction emerges as a viable alternative. Unlike the original timeline, the bancor—a supranational currency backed by a coalition of nations—struggles to gain footing as Bitcoin’s decentralized adoption grows among individuals and businesses worldwide, undermining both the dollar and the bancor.
- **2029 (Mid-Year: The Great Renunciation)**\
Treasury bonds lose value, and the government bans Bitcoin, labeling it a threat to sovereignty (mirroring the original bancor ban). However, a Bitcoin ban proves unenforceable—its decentralized nature thwarts confiscation efforts, unlike gold in the original story. Hyperinflation hits the dollar as the U.S. prints money, but Bitcoin’s fixed supply shields adopters from currency devaluation, creating a dual-economy split: dollar users suffer, while Bitcoin users thrive.
- **2029 (Late Year)**\
Dollar-based inflation soars, emptying stores of goods priced in fiat currency. Meanwhile, Bitcoin transactions flourish in underground and online markets, stabilizing trade for those plugged into the bitcoin ecosystem. Traditional supply chains falter, but peer-to-peer Bitcoin networks enable local and international exchange, reducing scarcity for early adopters. The government’s gold confiscation fails to bolster the dollar, as Bitcoin’s rise renders gold less relevant.
- **2030–2031**\
Crime spikes in dollar-dependent urban areas, but Bitcoin-friendly regions see less chaos, as digital wallets and smart contracts facilitate secure trade. The U.S. government doubles down on surveillance to crack down on bitcoin use. A cultural divide deepens: centralized authority weakens in Bitcoin-adopting communities, while dollar zones descend into lawlessness.
- **2032**\
By this point, Bitcoin is de facto legal tender in parts of the U.S. and globally, especially in tech-savvy or libertarian-leaning regions. The federal government’s grip slips as tax collection in dollars plummets—Bitcoin’s traceability is low, and citizens evade fiat-based levies. Rural and urban Bitcoin hubs emerge, while the dollar economy remains fractured.
### Time Jump: 2032–2047
- Over 15 years, Bitcoin solidifies as a global reserve currency, eroding centralized control. The U.S. government adapts, grudgingly integrating bitcoin into policy, though regional autonomy grows as Bitcoin empowers local economies.
### Part Two: 2047
- **2047 (Early Year)**\
The U.S. is a hybrid state: Bitcoin is legal tender alongside a diminished dollar. Taxes are lower, collected in BTC, reducing federal overreach. Bitcoin’s adoption has decentralized power nationwide. The bancor has faded, unable to compete with Bitcoin’s grassroots momentum.
- **2047 (Mid-Year)**\
Travel and trade flow freely in Bitcoin zones, with no restrictive checkpoints. The dollar economy lingers in poorer areas, marked by decay, but Bitcoin’s dominance lifts overall prosperity, as its deflationary nature incentivizes saving and investment over consumption. Global supply chains rebound, powered by bitcoin enabled efficiency.
- **2047 (Late Year)**\
The U.S. is a patchwork of semi-autonomous zones, united by Bitcoin’s universal acceptance rather than federal control. Resource scarcity persists due to past disruptions, but economic stability is higher than in Shriver’s original dystopia—Bitcoin’s success prevents the authoritarian slide, fostering a freer, if imperfect, society.
### Key Differences
- **Currency Dynamics**: Bitcoin’s triumph prevents the bancor’s dominance and mitigates hyperinflation’s worst effects, offering a lifeline outside state control.
- **Government Power**: Centralized authority weakens as Bitcoin evades bans and taxation, shifting power to individuals and communities.
- **Societal Outcome**: Instead of a surveillance state, 2047 sees a decentralized, bitcoin driven world—less oppressive, though still stratified between Bitcoin haves and have-nots.
This reimagining assumes Bitcoin overcomes Shriver’s implied skepticism to become a robust, adopted currency by 2029, fundamentally altering the novel’s bleak trajectory.
-

@ 71df2119:9542d9d7
2025-02-25 14:57:23
Das Pareto-Team [(](https://njump.me/nprofile1qyvhwumn8ghj7un9d3shjtnndehhyapwwdhkx6tpdshsz9mhwden5te0wfjkccte9ec8y6tdv9kzumn9wshsqg9grf5ej25t0llsj2annf4rx5vpc9htx72g74depu796z0nc5pvssldhkxp)<https://tinylink.net/mIyvf>[)](https://njump.me/nprofile1qyvhwumn8ghj7un9d3shjtnndehhyapwwdhkx6tpdshsz9mhwden5te0wfjkccte9ec8y6tdv9kzumn9wshsqg9grf5ej25t0llsj2annf4rx5vpc9htx72g74depu796z0nc5pvssldhkxp) hat in den letzten Tagen die Unterstützung für *Zaps* veröffentlicht. *Zaps* sind *Lightning-Transfers* über *Nostr*, die im Pareto an Artikel oder Autoren gesendet werden können. Die aktuelle Umsetzung in der Pareto-App ist als erster Schritt zu verstehen, und es werden weitere Ausbau-Stufen folgen. In diesem Artikel wird die Nutzung des neuen Pareto-Features erklärt.
##### Artikel Zappen
Auf der Artikel-Seite des Pareto-Readers ist jetzt das Blitz-Symbol unter dem Artikelbild aktiviert. Durch einen Klick erscheint ein Dialog wie dieser:

Im Dialog können verschiedene vorgegebene Beträge ausgewählt oder ein eigener Betrag manuell eingegeben werden. Ein optionales Kommentarfeld steht, wie üblich, ebenfalls zur Verfügung. Nach dem Betätigen der *Zap-Schaltfläche* verhält sich die App unterschiedlich, abhängig davon, ob der Nutzer eine *Wallet-Erweiterung* im Browser installiert hat oder nicht. Falls ja, folgt die Interaktion mit der *Wallet-Erweiterung*, in diesem Beispiel Alby:

Hier kann die Zahlung freigegeben werden, und der Vorgang wird dann von der Software abgeschlossen.
Wenn der Nutzer keine *Wallet-Erweiterung* verwendet, erfordert der Vorgang weitere Schritte. Statt dem oben gezeigten Dialog erscheint eine *Lighting-Rechnung*:

An dieser Stelle gibt es mehrere Möglichkeiten: Man kann mit einer *Lightning-Wallet* den *QR-Code* einscannen oder die Rechnung in Textform kopieren. Alternativ kann man auch eine *Wallet* auf demselben Gerät öffnen und die Zahlung dort bestätigen.
##### Zaps an Autoren
Wie am Anfang erwähnt, können auch Autoren direkt, ohne Artikelbezug, *Zaps* erhalten. Auf der Profilseite des Autors gibt es neben der neu hinzugekommenen *Lightning-Adresse* einen *Blitz-Button,* ähnlich wie auf der Artikelseite:

Durch einen Klick können, ähnlich wie beim Artikel, *Zaps* an den Autor gesendet werden.
***
*Das Zap-Feature in der Pareto-App basiert auf der Community-Bibliothek nostr-zap (*<https://github.com/SamSamskies/nostr-zap>*). Wir bedanken uns für den Code und haben mit einer Erweiterung der Funktionalität beigetragen - ganz im Sinne von Open-Source!*
***
##### Ausblick
Wie eingangs erwähnt, sind weitere Ausbaustufen des *Zap-Features* geplant, darunter:
* Unterstützung für *Nostr Wallet Connect* für eine nahtlosere Integration und ein besseres Nutzungserlebnis.
* Unterstützung für *eCash*, *Cashu-Nutzaps*.
Bleib auf dem Laufenden und folge uns auf unseren verschiedenen Kanälen:
* *Nostr*: <https://tinylink.net/mIyvf>,
* *Web*: [https://pareto.space,](https://tinylink.net/mIyvf) 
* *Geyser*: [https://geyser.fund/project/pareto.](https://geyser.fund/project/pareto)
**Wir bei Pareto stehen erst am Anfang - nicht ausschließlich bezüglich Zaps!**
-

@ 378562cd:a6fc6773
2025-02-24 22:13:45
As someone deeply interested in decentralized technology, I’ve been closely following the rapid rise of the Nostr (Notes and Other Stuff Transmitted by Relays) protocol. Although I've only just begun investigating it, I have already almost all but canceled my X, Facebook, and Truth Social accounts!
Nostr is an exciting alternative to traditional social media and communication platforms. It is built on censorship resistance, user control, and interoperability principles. Given the growing concerns over centralized control, privacy breaches, and biased content moderation, I believe Nostr presents a compelling solution. In this ~~article~~ long note, I want to share my thoughts on how Nostr has evolved, its recent advancements, and its potential impact on the digital landscape.
**Understanding Nostr**
Nostr is a lightweight, open-source protocol that allows users like me and you to share notes, messages, and other digital interactions via relays rather than centralized servers. It’s designed to be simple, robust, and censorship-resistant. Instead of relying on a single platform or authority, Nostr operates on a peer-to-peer model. Users interact through cryptographic key pairs and publish content to relays that distribute the data across the network.
Unlike traditional social networks like Twitter or Facebook, where all data is stored on centralized servers controlled by corporations, Nostr empowers me to truly own and control my digital identity. My data isn’t locked away by a single company or subject to the whims of ever-changing policies, government overreach, or arbitrary bans. Instead, I can run my own relay or connect to multiple independent relays, ensuring that my presence online remains resilient and censorship-resistant. Even if one or more relays shut down, my data is not lost—it remains accessible through the broader network. This decentralized structure not only protects free expression but also guarantees that no single entity has the power to dictate who stays online and who gets silenced. With Nostr, I am in control, and my data belongs to me—just as it should.
Since its inception, Nostr has seen impressive development, both technically and in terms of adoption. Some of the advancements that excite me the most include:
**Growing Ecosystem of Clients and Relays**
Developers have built a diverse ecosystem of client applications, ranging from sleek web-based interfaces to powerful mobile apps, making accessing and interacting with the Nostr network easier than ever. Whether on a desktop, smartphone or even experimental hardware, users have a growing array of options to stay connected seamlessly.
At the same time, the relay infrastructure has evolved rapidly, with new nodes optimized for speed, security, and regional accessibility. These relays ensure that messages are delivered efficiently while maintaining the network's decentralized and censorship-resistant nature. With relays distributed worldwide, Nostr continues to grow stronger, providing a resilient and open platform where users are free to communicate without relying on any single point of failure.
**Enhanced User Experience**
Early implementations of Nostr were simple and barebones, catering mostly to tech-savvy early adopters. However, the user experience has since evolved dramatically. Modern Nostr clients now feature sleek, intuitive UI designs, making navigation smooth and enjoyable. Enhanced media support allows for seamless sharing of images, videos, and other content, while improved interaction mechanisms—such as threaded conversations, reactions, and richer notifications—make engagement more dynamic and user-friendly.
To further streamline the experience, user-friendly wallets and browser extensions have been introduced, simplifying secure key management and making onboarding far more accessible. Newcomers no longer need to wrestle with complex cryptographic keys; instead, they can leverage intuitive tools that ensure both security and ease of use. As Nostr continues to grow, the focus on refining UX is making it an increasingly viable and compelling alternative to traditional social networks.
**Integration with Lightning Network**
Integrating Bitcoin’s Lightning Network into Nostr is a game-changer, revolutionizing how value is exchanged within the network. With seamless microtransactions and tipping systems, I can directly support content creators, developers, and other users without relying on traditional ad-driven revenue models or third-party payment processors. This fosters a more organic, community-driven economy where creators are rewarded instantly and fairly for their contributions.
By using Bitcoin for payments and interactions, Nostr enhances financial sovereignty, allowing users like me to transact in a truly decentralized manner—free from corporate gatekeepers, banking restrictions, or censorship. However, it’s important to remember that Nostr is still in its early days. While the potential is enormous, adoption and refinement take time. Content creators and users alike may need to be patient as the ecosystem matures, but those who embrace it early are helping to shape the future of open, censorship-resistant communication and finance.
**Privacy and Security Enhancements**
One of the most significant advancements in Nostr has been the introduction of end-to-end encrypted messaging, ensuring truly private and secure communication. Unlike traditional platforms that may scan, store, or even monetize user conversations, Nostr guarantees that only the intended recipient can decrypt and read messages. This level of privacy is a game-changer for those who value secure, censorship-resistant interactions.
Beyond private messaging, new identity verification methods leveraging cryptographic signatures have also emerged, allowing users to confirm authenticity without sacrificing pseudonymity. This means that while I can prove I am who I say I am, I don’t have to tie my identity to a real-world name, giving me the best of both security and privacy in an increasingly surveilled digital landscape.
Mainstream Adoption and High-Profile Endorsements
As Nostr continues to gain traction, high-profile figures like Jack Dorsey have publicly supported and contributed to its development, lending credibility and visibility to the project. His endorsement, along with growing enthusiasm from privacy advocates, developers, and free speech supporters, has accelerated Nostr’s momentum.
More developers and tech enthusiasts are now embracing Nostr as a viable alternative to corporate-controlled social networks, building innovative applications and expanding its ecosystem. While still in its early days, the rapid pace of development suggests that Nostr is on a trajectory toward becoming a mainstream, decentralized communication platform that challenges the dominance of traditional social media.
**Challenges and the Road Ahead**
Despite its rapid progress, Nostr still faces some hurdles that need to be overcome for it to achieve mainstream adoption:
Scalability Issues: Maintaining a reliable and efficient relay system remains challenging as the number of users grows, which is understandable.
User Adoption and Education: While I find the protocol exciting, helping non-technical users (like me in a lot of ways) understand its benefits and navigate its interface is an ongoing challenge.
Without centralized control, Nostr relies on decentralized, user-driven solutions for spam and moderation. Relays set their own rules, allowing users to choose environments that match their preferences—some with strict moderation, others more open.
Client-side filtering also plays a key role, with modern Nostr clients enabling users to block, mute, or filter unwanted content. Reputation-based systems and algorithmic filtering are emerging to help surface valuable discussions while minimizing spam. As Nostr evolves, these community-driven approaches will continue to refine the balance between free expression and a quality user experience.
**Conclusion**
The advancement of the Nostr protocol marks a major shift toward decentralized, censorship-resistant communication networks. By giving users like US full control over their data and interactions, Nostr presents a strong alternative to traditional social media platforms. As the protocol continues to evolve, its integration with other decentralized technologies, such as Bitcoin and cryptographic identity solutions, will further solidify its role in shaping the future of the Internet.
While challenges remain, I firmly believe Nostr is redefining how we interact online by prioritizing freedom, privacy, and resilience in the digital age. I may be old, but I love Nostr and am glad I can participate at such an early stage. Let's learn together!
-

@ 2181959b:80f0d27d
2025-02-24 20:49:39
تخطط شركة قوقل لاتخاذ خطوة جديدة في تعزيز أمان حسابات Gmail، حيث ستتخلى عن رموز المصادقة عبر الرسائل النصية (SMS) لصالح التحقق باستخدام رموز QR، بهدف تقليل مخاطر الأمان والحد من الاعتماد على شركات الاتصالات.
**لماذا تستبدل قوقل رموز SMS في Gmail؟**
رغم أن المصادقة الثنائية (2FA) عبر الرسائل النصية تُعد طريقة عملية، إلا أنها تحمل مخاطر كبيرة، إذ يمكن اعتراض الرموز من قبل المخترقين، أو استخدامها في هجمات التصيد الاحتيالي، أو حتى تعرض الحساب للاختراق في حال تم استنساخ رقم الهاتف.
كما أن أمان هذه الطريقة يعتمد بشكل أساسي على سياسات الحماية التي تتبعها شركات الاتصالات.
https://image.nostr.build/9c8eda01e430425f1e379ffd975aea200d72746e8d8a31000c8bd0e013b8e449.jpg
**كيف سيعمل التحقق عبر رموز QR؟**
عند محاولة تسجيل الدخول إلى Gmail، سيظهر للمستخدم رمز QR على الشاشة بدلًا من استلام رمز عبر SMS. كل ما عليه فعله هو مسح الرمز باستخدام كاميرا الهاتف، ليتم التحقق من هويته تلقائيًا، دون الحاجة إلى إدخال رمز يدويًا، مما يقلل من مخاطر مشاركة الرموز مع جهات غير موثوقة.
**متى سيتم تطبيق هذا التغيير؟**
لم تحدد قوقل موعدًا رسميًا لاعتماد النظام الجديد، لكنها أكدت أنها تعمل على إعادة تصميم عملية التحقق من الهوية خلال الأشهر المقبلة.
-

@ 6e0ea5d6:0327f353
2025-02-24 18:54:30
**Ascolta bene, amico mio.** The type of woman you choose reflects the type of man you truly are—or the one you hide from being.
Don't deceive yourself: your choices are a mirror of your essence. If you constantly get involved with women who drag you into chaos, who manipulate or belittle you, that says more about your weaknesses than about theirs. *Chi sceglie male, paga il prezzo.*
You cannot blame fate or the woman for your decisions. The responsibility is yours. If you are foolish enough to be swayed by superficial beauty or the need for approval, you are digging your own ruin.
A real man, before loving, learns to understand women—not just one, but many. He observes, understands their motivations, and learns to distinguish between those who add value and those who destroy.
If you choose wrong, don't blame the world. *Cazzo!* The mistake was yours, and so will be the consequence. Needy men, who let themselves be trapped by the first woman who offers crumbs of attention, end up being shaped by their circumstances. *"La donna non ti fa cane; sei tu che ti fai cane."* By choosing a woman without character, you reveal your own lack of discernment and courage. And, my friend, if you fear being alone, remember: loneliness next to the wrong woman is far more bitter.
If you seek respect, start by choosing wisely. Those who cling blindly, out of fear or necessity, are doomed to suffer. Own your choices, learn from your mistakes, and be selective. The world does not forgive the weak, and excuses will not redeem your weakness.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-

@ 378562cd:a6fc6773
2025-02-24 16:30:05
Bitcoin is an incredible innovation, a financial revolution, and an obsession for many. The idea of decentralization, financial sovereignty, and the potential for life-changing gains make it easy to get sucked into the never-ending cycle of price checks, news updates, and technical analysis. But here’s the reality: dedicating every waking moment to Bitcoin—or anything, really—is not sustainable. It’s not healthy. You need to breathe. You need to live.
### The Trap of Constant Focus
It starts innocently enough. You buy your first bit of Bitcoin. You check the price. Then you check it again. Before long, you’re spending hours reading articles, listening to podcasts, watching charts, and diving into the latest market trends. The highs of a bull market fuel your excitement; the lows of a crash send you spiraling into despair. And soon, it consumes you.
If you’re not careful, Bitcoin can become an all-encompassing mental trap, a black hole that sucks in every moment of your free time. You think about it when you wake up. You refresh your portfolio at lunch. You browse Twitter threads before bed. It’s an addiction that disguises itself as productivity. But the truth? It’s draining you.
### The Case for Letting Go
Let’s be real—Bitcoin should not be your entire life. Your well-being, relationships, and overall happiness depend on balance. Financial freedom is meaningless if you sacrifice your health, your connections, and your experiences along the way. Here’s why you need to step back:
1. **Your Brain Needs a Break**—Constantly thinking about Bitcoin puts you under heightened stress. Markets are volatile, and living in reaction mode is exhausting. Give your brain space to rest, reflect, and reset.
2. **The Sun Exists—go Enjoy It.** Get outside, walk, breathe fresh air, and touch some grass, literally. Sitting in front of a screen tracking prices all day is not fulfilling.
3. **Love and Human Interaction Matter**. Your most valuable asset is not Bitcoin—it’s the relationships you build. Spend time with God, with friends, family, and loved ones. Share experiences. Have deep conversations that don’t involve blockchain technology.
4. **Automation is Your Best Friend** – Here’s a secret: You don’t need to manually buy Bitcoin every day or even every week. Set up an automated buying schedule and forget about it. Whether it’s once a week, biweekly, or monthly, let technology do the work while you focus on living.
5. **There’s More to Life Than Financial Gains** – Wealth is important, but so is joy. Read a book. Pick up a hobby. Travel. Laugh. Life is happening all around you—don’t miss it because you’re staring at a screen.
### Finding a Healthier Approach
Bitcoin can be part of your life without becoming your life. Set boundaries. Schedule specific times to check in on the market, but outside of those moments, let it go. Treat it like any other long-term investment—buy, hold, and forget. Trust the process without obsessing over every tick in the chart.
Most importantly, remember: You are a human being, not just an investor. You are here to experience, to love, to learn, and to grow. Bitcoin will be there whether you’re watching or not—but life won’t wait.
So step away. Breathe. Live.
### Automate Your Bitcoin Strategy with River
If you want to make Bitcoin a seamless part of your life without the stress, consider using **River**. It’s a platform I love because it allows me to deposit cash and earn a percentage back in Bitcoin on that cash balance and automatically execute a **daily dollar-cost averaging (DCA) strategy FEE-FREE**. Instead of constantly watching charts, my Bitcoin purchases happen automatically, drawing from my cash balance. It’s fully customizable, meaning you can adjust your buy schedule and even **automatically transfer part of your holdings to your own wallet**, ensuring you hold your own keys.
For those concerned about security, River recently introduced **Forcefield**, an added layer of protection for your assets. If you’re interested in making your Bitcoin journey effortless, **sign up using my referral code** [here](https://river.com/signup?r=6DEZAJLR)—this earns us both free Bitcoin! Set it and forget it, and get back to living your life.
-

@ fd78c37f:a0ec0833
2025-02-24 15:15:58
In this episode, we invited Alexandra from the Bitcoin Reach community to share insights on the development, challenges, and adoption strategies of the Bitcoin community in Zimbabwe.
**YakiHonne**: Before we begin, let me briefly introduce YakiHonne. YakiHonne is a decentralized media client built on Nostr—a protocol designed to empower freedom of speech through technology. It enables creators to own their voices and assets while offering innovative tools like smart widgets, verified notes, and support for long-form content. Today we'll be exploring more about community building and management with our honorable guest Alexandra. Could you please introduce yourself and your community?
**Alexandra**:I'm Alexandra, and I founded a community called Bitcoin Beach, which is a suburban community. One thing that really astonished me was that there were already many Bitcoin communities worldwide before us. Before getting into Bitcoin, I worked for a podcast called Global Bitcoin Fest, where I interviewed community leaders from different countries, innovators driving change, and those advocating for Bitcoin regulations. Through these conversations, I discovered that Bitcoin communities existed all over the world—yet, surprisingly, there wasn’t one in Zimbabwe.
**Alexandra**:This was particularly shocking because Zimbabwe has experienced some of the highest inflation rates in history—the second-highest inflation rate of all time. Many people associate Zimbabwe with its 100 trillion-dollar banknotes, which symbolize our extreme hyperinflation. In fact, we have gone through six currency failures, yet many still don’t fully understand inflation or how it affects us.
**Alexandra**:Our community was created to educate people about Bitcoin and financial sovereignty, helping them navigate economic instability and regain control over their finances through Bitcoin.
**YakiHonne**: It seems like you have a lot of people who genuinely want to learn about Bitcoin. They are not only focused on improving Zimbabwe’s economy but also actively engaging with the Bitcoin ecosystem.
**Alexandra**:I think one of the biggest challenges is that people don't truly understand how devastating a failed monetary system can be. If you look at it this way—money is involved in 50% of all transactions, meaning it plays a fundamental role in every economic activity. When money fails, one of the first consequences is the inability to calculate capital effectively, leading to high time preference decision-making.
**Alexandra**:Why is this a problem? Well, in a stable monetary system, when people have strong purchasing power, they receive fair value for their economic output. This allows them to buy goods and services, invest in their future, pursue higher education, start businesses, and invest in assets like real estate and stocks. Essentially, good money gives people the time and ability to build a better future.
**Alexandra**:However, when money does not store economic value, people only receive a fraction of what they produce. Instead of earning a full dollar for their work, they might get only two to three cents on the dollar. This means their income is barely enough for basic sustenance—just buying food, bread, and milk, and often, that isn’t even sufficient.
**Alexandra**:As a result, people shift from long-term financial planning to immediate survival, making economic calculations purely about what they need right now rather than investing in the future. This is why so many places remain impoverished. Without stable money, real estate investments disappear, housing becomes inaccessible, and infrastructure like malls and gyms is nearly nonexistent. The only way to secure housing is outright purchase, which very few people can afford. This highlights the severe economic limitations caused by a broken monetary system.

**YakiHonne**: It seems like you've already answered our first question. I was going to ask what sparked your interest in Bitcoin, but I can see that many factors actually led you toward the Bitcoin ecosystem. So, I think you've already covered that. Now, one more thing—I’d love to know what motivated you to build a community around Bitcoin?
**Alexandra**:Absolutely. Like I said, we observed communities all across Zimbabwe, but we noticed that nothing was really happening in terms of Bitcoin adoption. In fact, Zimbabwe's adoption rate is significantly lower than in most countries. While sub-Saharan Africa has the highest Bitcoin adoption rate, Zimbabwe itself has one of the lowest adoption rates.
**Alexandra**:I realized that if no one else was willing to pave the way to make Bitcoin adoption more resilient and accessible, then I should step up and do the necessary work to facilitate the process. My goal was to connect the people who needed to be connected—whether it's miners, individuals looking to buy Bitcoin, or those who need help installing and using it.
**YakiHonne**: How did Bitcoin Reach begin? How was your community formed, and how did you initially attract new members?
**Alexandra**:it all started with just a few people. I was highly motivated and kept asking myself, how can we create an impact in Zimbabwe? Strangely enough, it began with me simply chasing leads.
**Alexandra**:The turning point came when Anita Posch visited Zimbabwe. Through her visit, I connected with other like-minded individuals in the Bitcoin space. From there, we decided to create a WhatsApp group, which became the foundation of our community. With this small collective, I started reaching out to more people. Having even a modest level of influence allowed me to leverage connections and secure sponsorships.
**Alexandra**:Our first sponsor was Booking for Fairness, followed by Money on Chain, Rootstock, and Global Bitcoin Fest. With this support, we started hosting regular meetups, organizing at least two meetups per month in different cities and countries. So far, we've held meetups in over eight cities across four different countries. At these events, attendance ranged from 25 to over 50 people, and at times, we even filled an entire restaurant with Bitcoin enthusiasts.

**YakiHonne**: That's really impressive! You started with just three people, and now you're hosting events with over 50 attendees—sometimes even filling an entire restaurant. That’s truly amazing. Alexandra, you and your team are doing incredible work in Zimbabwe—it's a massive achievement! What challenges have you faced, and how have you overcome them?
**Alexandra**: I think one of the major challenges that we do face is what we call an implicit ban, and some functions. Firstly, when we have what we call the negative order assumptions, a policy similar to what South Africa recently faced. Essentially, any country with bilateral relations with the United States must enforce the same sanctions imposed by the U.S. As a result, Zimbabwe is restricted from receiving goods and services from many companies. If you’re a Bitcoin business, you cannot provide Bitcoin services to Zimbabwe, cannot send hardware wallets, cannot hire people from Zimbabwe, and cannot offer sponsorships to Zimbabwean projects. This significantly limits the number of Bitcoin companies we could have collaborated with, which would have helped people earn Bitcoin and drive adoption.
**Alexandra**:The second major challenge is implicit ban. If a Bitcoin company sets up in Zimbabwe, they cannot access on-ramps and off-ramps for funds. This means converting Bitcoin to physical cash is very expensive—normally, the cost should be around 2%, but due to the lack of formal channels, we have to buy Bitcoin at a 10% margin, making transactions extremely costly. As a result, it becomes difficult to establish a circular Bitcoin economy, and since we don’t have one, we struggle to secure funding.
**YakiHonne**: What advice would you give to someone looking to start or expand a Bitcoin-focused community in today’s landscape?
**Alexandra**:My advice would be to focus on the core issues, and the two most important ones are structure and education. Often, we get distracted by other elements when building a larger economy—such as organizing meetups, managing day-to-day operations, or maintaining WhatsApp groups for communication. However, for a community to truly grow and thrive, it needs a strong structural system and a functional circular economy.
**Alexandra**:First, structure is key. If someone wants to learn about Bitcoin, where can they go? What courses or resources are available? Having clear educational pathways is essential for adoption.
**Alexandra**:Second, building a circular economy is crucial. The first step is identifying people who are earning Bitcoin—whether through remittances, jobs, or services. Once there are enough Bitcoin earners, the next step becomes easier: figuring out where they can spend it. This is a far more practical approach than simply convincing businesses to accept Bitcoin without an existing customer base.For example, if you’re a vendor, shop owner, photographer, baker, or farmer, there are many potential Bitcoin customers who don’t want to cash out due to high fees. By accepting Bitcoin, businesses expand their clientele, which is a critical factor in establishing a sustainable Bitcoin economy.
**YakiHonne**: Does your community engage in the technical or non-technical aspects of Bitcoin? Or perhaps do you guys do both?
**Alexandra**:I think one of the biggest challenges is that we have people conducting thousands of dollars in Bitcoin transactions, yet they don’t understand what Lightning or Layer 2 is. Some even believe that Bitcoin has no real utility, despite using it regularly. There are people who are interested in the technical aspects, and we are gradually finding them. However, our community initially consisted mostly of people who used Bitcoin primarily for remittances. This is a common challenge in Africa—Bitcoin adoption grew rapidly because people saw it as a useful tool, not because they fully understood it. Unfortunately, we are currently more focused on the non-technical aspects, but we are actively working to change that.
**YakiHonne**:Alexandra, how do you see the role of Bitcoin communities evolving as technology advances, particularly in areas like scalability, privacy, and adaptability? How do you think these communities will develop as these technologies mature?
**Alexandra**:Yeah, I think Bitcoin communities play a crucial role in adoption and education. One of the most common things I hear when teaching people about Bitcoin is, “I wish I had learned about this from you first.” Many people's first encounter with Bitcoin was through scams, which led them to give up on it. Communities are essential because people are more likely to trust and engage with products when they come from a trusted source.
**Alexandra**:When you build a community, every new member you bring in has the potential to influence five to ten others. These people are more likely to trust a friend’s recommendation when they say, “Bitcoin is good,” or when they explain how on-chain transactions might be slower or more expensive, but tools exist to enable faster, cheaper, and more private transactions.
**Alexandra**:People buy into products they trust—or from people they trust. This is why communities are so important, even in a system built on "Don't trust, verify." Ironically, trust is still the first step for many newcomers. I think this is where Bitcoin might have missed the mark—there are so many incredible Bitcoin advocates, but if no one knows them personally, their messages, no matter how well-articulated, may not resonate. However, when the information comes from a trusted individual, people are much more receptive.
**Alexandra**:Bitcoin communities serve as a solid foundation for introducing new solutions, including scalability, privacy, and other innovations. The key is communicating these ideas in a way that people trust and understand. Unlike expensive marketing campaigns, a passionate community can spread Bitcoin education almost for free—all they need are the right tools and resources to drive the movement forward.
**YakiHonne**:As long as there is trust, expansion will happen more effectively. Every user, every community member is a stakeholder, as they have the ability to bring others into the community. I’m confident that Bitcoin Reach will continue to grow and make an impact. Now, moving on to my final question, is the government in your region supportive or opposed to Bitcoin? And how has that stance impacted your community so far?
**Alexandra**:our government is against Bitcoin. As I mentioned earlier, they were the ones who imposed the implicit ban, making it very expensive for individuals to buy Bitcoin. Zimbabwe used to be one of the fastest adopters in sub-Saharan Africa, but as soon as the government banned Bitcoin, adoption plummeted from 100 to zero. This has made it much more challenging for people like me to build a community around Bitcoin.
**Alexandra**:Now, people hold their own keys because they are all using hardware wallets, which is a major benefit. Since they don’t trust institutions, they have taken full control of their Bitcoin, which is a great step toward financial sovereignty. However, this also slows down adoption in some ways. For example, in South Africa, our neighboring country, Pick n Pay has over 1,500 stores where people can pay with Bitcoin. In Zimbabwe, however, there are almost no places to spend Bitcoin, making real-world usage extremely limited.
**YakiHonne**:Thank you, Alexander.We've now reached the conclusion of today's interview, and I must say, I've learned so much from you. First, I truly admire how you were motivated by the low Bitcoin adoption rate in your country and took action to change that. I also appreciate your efforts to integrate economic growth with Bitcoin adoption, showing a deep understanding of both financial and technological progress. Your approach to community building is inspiring—you recognize that every community member matters, and the trust they bring is essential to the community’s success. It’s unfortunate that your government does not support Bitcoin, but with time, I believe that as Bitcoin’s influence continues to grow, they will eventually yield to its impact. I’m confident that there will be a stronger Bitcoin movement in Zimbabwe in the future.
-

@ 2f4550b0:95f20096
2025-02-24 14:30:45
The role of a leader extends far beyond managing tasks or hitting targets. Great leaders don’t just steer their ships; they design environments where their teams can grow, adapt, and thrive. By wearing the hat of "learning architects," leaders can craft intentional, impactful learning experiences that empower their teams to take ownership of their development. This isn’t about spoon-feeding knowledge or enforcing rigid training programs. It’s about building a framework where learning feels natural, relevant, and self-directed, unlocking both individual potential and collective success.
At the heart of this approach are two guiding principles: self-direction and relevance. Encouraging self-direction for your team will tap into the innate human drive to explore and grow when given autonomy. People don’t want to be told what to learn; they want to pursue learning that matters to them. Relevance, meanwhile, ensures that learning connects directly to real-world challenges, making it immediately applicable. When leaders weave these principles into their team’s growth strategy, they foster a culture of curiosity and resilience.
Why does a learning architect mindset matter? Teams that prioritize learning are better equipped to navigate uncertainty. When leaders design growth opportunities, they signal trust in their team’s ability to evolve, boosting morale and performance. More importantly, in a world where skills can become obsolete overnight, fostering continuous learning isn’t optional; it’s a survival tactic.
So, how can leaders build this learning ecosystem? Here’s a three-step blueprint to kickstart a team learning initiative that’s both practical and impactful:
## Step 1: Map the Terrain by Identifying Needs and Interests
Start by understanding your team’s needs. What skills do they need to excel in their roles today, and what might they need tomorrow? Don’t assume; ask. Conduct one-on-one chats or a quick team survey to uncover your team members’ goals, pain points, and passions. For example, a marketing team might crave data analytics skills, while a product team might lean toward user experience design. Pair these insights with organizational priorities to find the sweet spot where individual interests meet business needs. This step ensures relevance by grounding learning in real-world demands, while inviting self-direction by giving team members a voice.
## Step 2: Build the Framework by Curating Flexible Learning Paths
Once you’ve mapped the terrain, design lightweight, adaptable learning paths. Avoid heavy-handed mandates; instead, offer a menu of options. This could mean curating online courses from providers like Coursera or LinkedIn Learning, organizing peer-led workshops, or even setting up a book club tackling industry trends. The key is flexibility; let team members choose what resonates. For instance, if someone’s keen on leadership, point them to a podcast series, while a hands-on learner might shadow a senior colleague. Add structure with loose milestones (e.g., “Try one new resource this month”) to keep momentum without stifling autonomy. This balance of guidance and freedom fuels self-directed growth.
## Step 3: Encourage Reflection and Application
Learning doesn’t stick unless it’s used. Create opportunities for your team to reflect on what they’ve learned and apply it. Host casual “share-back” sessions where they present key takeaways or test new skills on a small project. For example, a salesperson who studied negotiation tactics could role-play a contract negotiation scenario, while a developer might prototype a tool they’ve explored. Tie these efforts to real challenges, like improving a process or brainstorming a product tweak, to reinforce relevance and connect their learning to the organization’s strategy. As a leader, your role is to cheerlead, ask questions, and remove roadblocks. Being a learning architect isn’t about having all the answers. It’s about designing a system where growth becomes second nature. By anchoring your approach in self-direction and relevance, and following a simple blueprint (map needs, build paths, open space), you empower your team to take the reins. The result? A group that’s not just keeping up, but pushing forward, ready for whatever comes next. Start small, iterate often, and watch your team transform into a powerhouse of learners and top performers.
**Leaders as Learning Architects: Designing Growth for Your Team**
The role of a leader extends far beyond managing tasks or hitting targets. Great leaders don’t just steer their ships; they design environments where their teams can grow, adapt, and thrive. By wearing the hat of "learning architects," leaders can craft intentional, impactful learning experiences that empower their teams to take ownership of their development. This isn’t about spoon-feeding knowledge or enforcing rigid training programs. It’s about building a framework where learning feels natural, relevant, and self-directed, unlocking both individual potential and collective success.
At the heart of this approach are two guiding principles: self-direction and relevance. Encouraging self-direction for your team will tap into the innate human drive to explore and grow when given autonomy. People don’t want to be told what to learn; they want to pursue learning that matters to them. Relevance, meanwhile, ensures that learning connects directly to real-world challenges, making it immediately applicable. When leaders weave these principles into their team’s growth strategy, they foster a culture of curiosity and resilience.
Why does a learning architect mindset matter? Teams that prioritize learning are better equipped to navigate uncertainty. When leaders design growth opportunities, they signal trust in their team’s ability to evolve, boosting morale and performance. More importantly, in a world where skills can become obsolete overnight, fostering continuous learning isn’t optional; it’s a survival tactic.
So, how can leaders build this learning ecosystem? Here’s a three-step blueprint to kickstart a team learning initiative that’s both practical and impactful:
**Step 1: Map the Terrain by Identifying Needs and Interests**
Start by understanding your team’s needs. What skills do they need to excel in their roles today, and what might they need tomorrow? Don’t assume; ask. Conduct one-on-one chats or a quick team survey to uncover your team members’ goals, pain points, and passions. For example, a marketing team might crave data analytics skills, while a product team might lean toward user experience design. Pair these insights with organizational priorities to find the sweet spot where individual interests meet business needs. This step ensures relevance by grounding learning in real-world demands, while inviting self-direction by giving team members a voice.
**Step 2: Build the Framework by Curating Flexible Learning Paths**
Once you’ve mapped the terrain, design lightweight, adaptable learning paths. Avoid heavy-handed mandates; instead, offer a menu of options. This could mean curating online courses from providers like Coursera or LinkedIn Learning, organizing peer-led workshops, or even setting up a book club tackling industry trends. The key is flexibility; let team members choose what resonates. For instance, if someone’s keen on leadership, point them to a podcast series, while a hands-on learner might shadow a senior colleague. Add structure with loose milestones (e.g., “Try one new resource this month”) to keep momentum without stifling autonomy. This balance of guidance and freedom fuels self-directed growth.
**Step 3: Encourage Reflection and Application**
Learning doesn’t stick unless it’s used. Create opportunities for your team to reflect on what they’ve learned and apply it. Host casual “share-back” sessions where they present key takeaways or test new skills on a small project. For example, a salesperson who studied negotiation tactics could role-play a contract negotiation scenario, while a developer might prototype a tool they’ve explored. Tie these efforts to real challenges, like improving a process or brainstorming a product tweak, to reinforce relevance and connect their learning to the organization’s strategy. As a leader, your role is to cheerlead, ask questions, and remove roadblocks.
Being a learning architect isn’t about having all the answers. It’s about designing a system where growth becomes second nature. By anchoring your approach in self-direction and relevance, and following a simple blueprint (map needs, build paths, open space), you empower your team to take the reins. The result? A group that’s not just keeping up, but pushing forward, ready for whatever comes next. Start small, iterate often, and watch your team transform into a powerhouse of learners and top performers.
-

@ 86a82cab:b5ef38a0
2025-02-24 10:58:53
Not everyone wants a super app though, and that’s okay. As with most things in the Nostr ecosystem, flexibility is key. Notedeck gives users the freedom to choose how they engage with it—whether it’s simply following hashtags or managing straightforward feeds. You'll be able to tailor Notedeck to fit your needs, using it as extensively or minimally as you prefer.
\
\
Not everyone wants a super app though, and that’s okay. As with most things in the Nostr ecosystem, flexibility is key. Notedeck gives users the freedom to choose how they engage with it—whether it’s simply following hashtags or managing straightforward feeds. You'll be able to tailor Notedeck to fit your needs, using it as extensively or minimally as you prefer.</span>
[IMage](https://nostrtips.com/wp-content/uploads/2023/03/nostr-structure-1-1024x576.jpg)
-

@ b8851a06:9b120ba1
2025-02-24 02:02:32
The French fiscal catastrophe is unfolding exactly as Austrian economists predicted. Government intervention breeds more intervention, trapping the economy in a death spiral of debt, deficits, and monetary debasement.
France’s public debt has surged to 111% of GDP in 2023, with projections showing 119% by 2029. The government’s much-touted €60 billion “budget effort” is a political charade—by 2025, the deficit will still exceed 5.4% of GDP. To stabilize its finances, France would need €120 billion in permanent savings—an impossible task in a system where political survival depends on endless spending.
## The Political Crisis: A System Losing Legitimacy
Economic crises create political ones. In December 2024, Prime Minister Barnier was ousted over austerity measures, replaced by Bayrou—a desperate attempt to calm markets. But leadership changes won’t fix the fundamental issue: France is ungovernable under its current fiscal trajectory.
Every attempt to “fix” the problem—more regulation, more spending, more monetary manipulation—only worsens the crisis. Political chaos is a symptom of economic insolvency.
## The ECB’s Stealth Bailout: Germany’s Growing Revolt
France is functionally bankrupt, but the ECB is quietly shifting the burden onto German savers through Target2 claims and monetary expansion. This amounts to a silent wealth transfer—bailing out Paris at Berlin’s expense.
The German public is noticing. Support for the AfD’s “Dexit” movement is rising, as voters realize they are being forced to subsidize failing economies. The eurozone’s fault lines are deepening.
## The Likely Scenarios: What Comes Next?
Based on current conditions, three major outcomes are most probable:
### Scenario 1: ECB “Muddles Through”
The ECB takes a “too little, too late” approach, avoiding decisive action while failing to restore confidence. This leads to:
• Wider French bond spreads as investors demand higher yields
• Weakened ECB credibility, as markets lose faith in its ability to contain the crisis
• Prolonged volatility without addressing the fundamental debt problem
### Scenario 2: IMF/ESM Bailout
France is forced into a formal bailout via the IMF and European Stability Mechanism (ESM). This would trigger:
* Harsh austerity measures, politically toxic in a nation that riots over pension reforms
* Severe political fallout, as both left and right-wing factions resist external control
* A crisis within the ECB itself, as its French president faces backlash for “bailing out his own country”
* Northern European pushback, with the German Bundestag and creditor states reluctant to approve another bailout
### Scenario 3: Communications Crisis
A severe market panic caused by ECB miscommunication leads to:
* A European-style “Taper Tantrum”, triggering a selloff in French bonds
* Spreads widening rapidly, forcing emergency interventions
* Loss of market confidence, accelerating capital flight
* Potential contagion, pulling in weaker Eurozone economies
The remaining probability accounts for more moderate scenarios, where France manages to delay disaster through temporary measures. But at this level of debt and deficit spending, delay is the best-case scenario—not resolution.
## The Endgame: Default or Hyperinflation?
France’s pension system alone is set to bleed €30 billion annually by 2045. The debt load is unsustainable, the political will to cut spending is nonexistent, and the ECB’s ability to print euros without consequence is rapidly eroding.
#### There are only two ways this ends:
* Massive defaults, triggering economic and social chaos.
* Hyperinflationary money printing, destroying savings and purchasing power.
#### Ludwig von Mises warned about this nearly a century ago:
“The ultimate outcome of credit expansion is either a depression brought about by the voluntary abandonment of further credit expansion, or a catastrophe of the currency system involved.”
France—and the entire euro system—has reached this fork in the road. The only question left is: Will they choose ruin now, or ruin later?
Mises was right. And in the end, economic reality always wins. The only choice left is whether you want to be a victim—or prepared.
-

@ d34e832d:383f78d0
2025-02-24 01:22:32
## **age** - Simple, modern, and secure file encryption.
## SYNOPSIS
```bash
age [--encrypt] (-r RECIPIENT | -R PATH)... [--armor] [-o OUTPUT] [INPUT]
age [--encrypt] --passphrase [--armor] [-o OUTPUT] [INPUT]
age --decrypt [-i PATH | -j PLUGIN]... [-o OUTPUT] [INPUT]
```
The **age** tool provides a robust solution for encrypting and decrypting files. It simplifies the encryption process while ensuring strong security through modern cryptographic standards. **age** primarily focuses on:
- Encrypting data to specific recipients or using passphrases.
- Decrypting data based on available private keys or passphrases.
- Supports both binary and ASCII armored (Base64-encoded) outputs.
- A compact, secure design suitable for integration into diverse environments.
- **RECIPIENTS**: Public keys or identities to which a file is encrypted. Each recipient can decrypt the file with their corresponding private key.
- **IDENTITIES**: Private keys that allow decryption of files encrypted to corresponding recipients.
- **Passphrase**: A user-defined secret key used to encrypt or decrypt data interactively, typically used when specific recipient identities are not available.
### Encryption Process:
Files are encrypted using public keys or passphrases. The `-r` option encrypts the file to specific recipients, whereas the `--passphrase` option allows encryption using a passphrase. In the absence of these options, **age** will prompt the user for the necessary inputs interactively.
### Decryption Process:
Decryption is automatically handled by **age** based on the format of the encrypted file. If the file is encrypted with a passphrase, **age** will request the passphrase interactively. Alternatively, it will use the private key specified by the `-i` option to decrypt the file.
### Binary and ASCII Output:
The default output for **age** is binary, which is suitable for storage and transmission. However, when using the `--armor` option, the encrypted file is encoded into a text format that is easy to handle in text-based systems.
---
## OPTIONS
### General Options:
- `-o, --output=OUTPUT`: Directs the encrypted or decrypted content to the specified OUTPUT file. If OUTPUT already exists, it is overwritten. In the case of encryption without `--armor`, the tool refuses to output binary to a TTY.
- `--version`: Displays the **age** version and exits.
### Encryption Options:
- `-e, --encrypt`: Default mode for encrypting files. Specifies that the input file should be encrypted.
- `-r, --recipient=RECIPIENT`: Encrypts to the recipient's public key, which can be a native X25519 key or an SSH key. This option may be repeated to encrypt for multiple recipients.
- `-R, --recipients-file=PATH`: Encrypts for recipients listed in a file, each recipient specified on a new line. Lines starting with `#` are treated as comments. If `PATH` is `-`, recipients are read from standard input.
- `-p, --passphrase`: Encrypts the file with a passphrase. The passphrase is requested interactively, and **age** offers an option to auto-generate a secure passphrase. This mode cannot be combined with other recipient options.
- `--armor`: Encrypts the output to an ASCII "armored" encoding (strict Base64). This makes it more suitable for text environments.
- `-i, --identity=PATH`: Specifies the path to the private key(s) that correspond to the recipients. Used to generate a file compatible with recipient encryption, allowing seamless encryption to private keys.
- `-j PLUGIN`: Specifies the use of a plugin for encryption, typically used for non-standard encryption schemes.
### Decryption Options:
- `-d, --decrypt`: Decrypts the specified INPUT file. If the file is passphrase-encrypted, the passphrase is automatically detected and requested interactively.
- `-i, --identity=PATH`: Specifies the private key file used for decryption. This can be a native age private key, an SSH private key, or a passphrase-protected identity file. The file path can also be `-` to read from standard input.
- `-j PLUGIN`: Decrypts using a plugin, similar to how the plugin is used in encryption. The plugin should contain no data-specific encryption information.
### Plugins:
**age** supports the use of plugins to extend its encryption and decryption functionality. A plugin is used when encryption or decryption requires a non-standard method. The plugin executes specific cryptographic operations as defined by the plugin.
---
## VARIOUS EXAMPLES
### 1. Encrypt a file to a recipient using a native X25519 key:
```bash
age -r age1ql3z7hjy54pw3hyww5ayyfg7zqgvc7w3j2elw8zmrj2kg5sfn9aqmcac8p file.txt > file.txt.age
```
### 2. Encrypt a file to multiple recipients:
```bash
age -o file.txt.age -r age1ql3z7hjy54pw3hyww5ayyfg7zqgvc7w3j2elw8zmrj2kg5sfn9aqmcac8p \
-r age1lggyhqrw2nlhcxprm67z43rta597azn8gknawjehu9d9dl0jq3yqqvfafg file.txt
```
### 3. Encrypt to recipients listed in a file:
```bash
cat > recipients.txt
# Alice
age1ql3z7hjy54pw3hyww5ayyfg7zqgvc7w3j2elw8zmrj2kg5sfn9aqmcac8p
# Bob
age1lggyhqrw2nlhcxprm67z43rta597azn8gknawjehu9d9dl0jq3yqqvfafg
age -R recipients.txt file.txt > file.txt.age
```
### 4. Encrypt and decrypt a file with a passphrase:
```bash
# Encrypt with a passphrase
age -p secrets.txt > secrets.txt.age
Enter passphrase (leave empty to autogenerate a secure one):
Using the autogenerated passphrase "release-response-step-brand-wrap-ankle-pair-unusual-sword-train".
# Decrypt with the same passphrase
age -d secrets.txt.age > secrets.txt
Enter passphrase:
```
### 5. Encrypt and decrypt with a passphrase-protected identity file:
```bash
# Generate a passphrase-protected identity file
age-keygen | age -p > key.age
Enter passphrase (leave empty to autogenerate a secure one):
Using the autogenerated passphrase "hip-roast-boring-snake-mention-east-wasp-honey-input-actress".
# Encrypt using the identity
age -r age1yhm4gctwfmrpz87tdslm550wrx6m79y9f2hdzt0lndjnehwj0ukqrjpyx5 secrets.txt > secrets.txt.age
# Decrypt using the identity file
age -d -i key.age secrets.txt.age > secrets.txt
Enter passphrase for identity file "key.age":
```
---
## EXIT STATUS
- `0`: Encryption or decryption was successful.
- `1`: An error occurred during the operation.
---
## BACKWARDS COMPATIBILITY
Files encrypted with a stable version of **age** will be compatible with any later version of the tool. When decrypting older files, **age** might provide a flag to force the operation if the operation poses a security risk.
---
The **age** tool is designed with security and simplicity in mind. It uses strong encryption methods to ensure that your files are protected against unauthorized access, with flexibility in how encryption keys are managed and applied.
[Age Github Repo](https://github.com/FiloSottile/age?tab=readme-ov-file)
-

@ b8851a06:9b120ba1
2025-02-23 23:41:06
> Something stinks in the crypto markets, and it’s not just OpenSea’s suspicious trading activity.
The recent regulatory pivot in Washington—driven by the Trump administration’s aggressive push to make the U.S. “the world’s crypto capital”—has set the stage for a wave of unchecked fraud. OpenSea’s sudden regulatory relief and strategic transformation are just the beginning.
## The SEC’s Curious Retreat
Let’s start with the smoking gun: the SEC was investigating OpenSea for unregistered securities violations, even issuing a Wells notice in August 2024. Then, in a complete reversal, they dropped the case without explanation. This wasn’t some random bureaucratic oversight—it happened right after Trump took office.
The timing is too perfect. His administration wasted no time signaling its pro-crypto stance, and the SEC, once an enforcer, is now rolling over like a neutered watchdog.
> The message? As long as you’re playing the “crypto-bro” game, the rules don’t apply.
## OpenSea’s Convenient Pivot
With the regulatory threat gone, OpenSea immediately rebranded itself—not just as an NFT marketplace but a full-blown token trading platform. Here’s what they did:
* Launched OS2, a rebuilt exchange expanding into token trading.
* Dropped the SEA token on February 13, 2025—perfectly timed with the regulatory climate shift.
* Slashed fees to near zero to attract volume and dominate the market.
This wasn’t just a business move—it was a power play. OpenSea knew that under the previous administration, tokenizing its platform might have triggered another securities probe. But under Trump’s SEC? It’s open season.
## Wash Trading and Market Manipulation
And it worked. The SEA token launch sent OpenSea’s market share skyrocketing from 25.5% to 71.5% in just four weeks. Daily trading volume exploded from $3.47 million to $17.4 million—but the numbers don’t add up. The surge was so artificial that OpenSea had to suspend its XP-based incentives system after accusations of wash trading flooded in.
### Let’s be clear: this isn’t real market growth. This is manipulation.
By incentivizing rapid-fire, circular trading, OpenSea created the illusion of demand. The goal? Pump the SEA token, dominate competitors, and make insiders rich—at the expense of everyday traders.
## Who’s Really Benefiting?
The financials paint a grim picture. #Coatue Management, once a major investor, slashed OpenSea’s valuation from $13.3 billion to just $1.4 billion. Trading volume has collapsed from its $5 billion peak to just $190 million per month. And yet, insiders are doubling down.
Consider these strategic moves:
* OpenSea relocated from New York to Miami, aligning with Florida’s looser regulatory environment.
* It established a foundation in the Cayman Islands—a classic move for dodging scrutiny.
* It’s benefiting from a hands-off #SEC, which has abandoned enforcement actions under the new administration.
This is the new crypto economy: a lawless Wild West where the biggest players game the system while retail traders foot the bill.
## What Comes Next?
With #Trump’s administration actively reshaping crypto regulation, OpenSea is the first of many companies to exploit this new reality. We’re entering an era where politically connected #crypto firms will enjoy total freedom to manipulate markets, while ordinary investors will be left holding the bag.
### The lesson? If you’re not on the inside, you’re the exit liquidity.
This isn’t just about #OpenSea. It’s about a government-sanctioned crypto casino, where fraud is no longer the exception—it seems to be the business model.
I really hope am wrong on this one #nostr.
-

@ 629c4a12:f822cc1a
2025-02-23 21:33:31
I’ve always been drawn to minimalism. There’s a certain peace that comes from stripping away the unnecessary, decluttering both physical and mental spaces. Yet, when it comes to finances, I’ve found myself tangled in complexity. As an ‘optimizer,’ I spend an inordinate amount of time thinking about investments, managing risk, and endlessly tinkering with my portfolio. This preoccupation contradicts the minimalist principles I try to live by.
It seems absurd to me that the financial world has become so complicated that we need money managers to simply preserve the value of our money. If investing is so intricate that the average person must hire professionals just to preserve (let alone grow) the value of their savings, then something is fundamentally wrong.
For the past five years, I’ve immersed myself in the history and mechanics of financial systems. The deeper I delved, the clearer it became: Bitcoin is a force of minimalism in an increasingly financialized and complex world.
### The Clutter of Modern Finance
Our financial system has become bloated with complexity. The hyper-securitization of assets has created an environment filled with financial clutter. Derivatives, for example, represent layers upon layers of financial engineering, often so convoluted that even experts struggle to understand them fully.
More troubling is the way nearly everything of value has been financialized. Real estate and art, two things that should embody personal value and cultural significance, have been transformed into mere asset classes. They are bought, sold, and speculated upon not for their intrinsic qualities but as instruments in the game of wealth preservation.
But why has this happened? It’s actually quite simple: our money is constantly losing value. The dollar, for example, debases at a rate of around 7% per year. Holding cash feels like holding melting ice, so it’s only natural for people to seek out scarce assets to preserve their wealth.
The Never-Ending Game of Diversification
This pursuit of scarce assets sets off a complex game—a game that forces people to diversify endlessly:
* Equities
* Bonds
* Real Estate
* Commodities
* Art
* Collectibles
We’re told to spread our investments across these asset classes to mitigate risk and preserve our hard-earned money. Those who can afford to hire money managers generally fare better in this game, as they have access to expertise and strategies designed to navigate this maze of complexity.
Ironically, this system creates an incentive for more complexity. The more convoluted the financial landscape becomes, the more we need money managers, and the more entrenched this cycle of financialization and securitization becomes. It’s a force of ever-increasing entropy—quite the opposite of minimalism.
### Bitcoin: Simplicity in a Complex World
In the midst of this financial chaos, Bitcoin emerges as a beacon of simplicity. It offers a way out of the clutter, a chance to reclaim financial minimalism. Bitcoin embodies the concept of scarcity with a rare kind of perfection: there will only ever be 21 million Bitcoins. No more.
This scarcity makes Bitcoin the perfect savings technology. Unlike traditional currencies, no one can debase your holdings. You don’t need to chase after real estate, art, or other assets to preserve your wealth. You don’t need to constantly diversify and rebalance a portfolio to stay ahead of inflation. Bitcoin’s scarcity gives you a way to hold your wealth securely, without the need for endless tinkering.
I’m not blind to Bitcoin’s short-term price volatility. However, it’s crucial to understand that we’re still in the early stages of adoption. As more people embrace this perfect form of scarcity, Bitcoin’s qualities as savings technology will express itself.
Bitcoin has the potential to de-financialize the housing market. It can de-financialize art.
Ultimately, Bitcoin has the power to replace those aspects of our lives that currently serve as proxies for scarcity.
### A Minimalist Approach to Wealth
Bitcoin allows us to step off the treadmill of constant financial optimization. It offers a simpler way to safeguard the fruits of our labor. Rather than spending our time, energy, and attention on navigating a complex financial system, we can focus on what truly matters: living a meaningful life.
By embracing Bitcoin, we embrace a minimalist approach to wealth. We reject the idea that we must play a never-ending game of diversification to maintain our standard of living. Instead, we adopt a simple, elegant solution that aligns with the principles of minimalism.
### Conclusion
In a world that grows more financially cluttered by the day, Bitcoin stands as a path to financial minimalism. It frees us from the complexities of traditional finance, allowing us to preserve our wealth without the need for constant vigilance and management.
By embodying scarcity and simplicity, Bitcoin gives us a way to reclaim our time and energy. It’s not just a financial tool; it’s a way to simplify our lives, to step back from the chaos, and to focus on what truly matters
-

@ 3ffac3a6:2d656657
2025-02-23 19:40:19
## Renoters: Proposal for Anonymous Event Relaying in Nostr
*This document is a proposal and not an official NIP.*
This Document proposes "Renoters," a mechanism for anonymous event relaying in Nostr, inspired by the Mixminion remailer design. Renoters aim to enhance privacy by obscuring the origin of events, making it difficult to trace the author of a message.
### **Motivation**
While Nostr offers a decentralized platform, current relay mechanisms can potentially reveal the source of events. Renoters address this by introducing an onion-routing-like system where events are encrypted and relayed through a series of nodes, making it harder to link the event to its originator. This enhances privacy for users who wish to communicate anonymously or protect their identity.
In some totalitarian regimes, the use of Tor and VPNs is criminalized, making online anonymity dangerous. Even in some democratic countries, merely downloading Tor can mark individuals as suspects. This underscores the need for a decentralized and anonymous communication system that operates independently of commonly surveilled privacy tools.
### **Proposed Solution**
Renoters operate on the principle of "gift-wrapping" events, using asymmetric encryption. A user wishing to send an event anonymously performs the following steps:
1. **Event Creation:** The user creates the Nostr event they wish to publish.
2. **Renoter Path Selection:** The user selects a path of Renoters through which the event will be relayed. This path can be pre-configured or dynamically chosen.
3. **Gift Wrapping (Encryption and Signing):** The user encrypts and signs the event for each Renoter in the path, working in reverse order:
- A *new* random Nostr private key (`sk_wrapper`) is generated.
- The event (or the previously wrapped event) is encrypted using the *next* Renoter's Npub (`npub_next`) using Nostr's standard encryption mechanism (e.g., using shared secrets derived from the private key and the recipient's public key).
- A *new* Nostr event is created. This "wrapper" event's content contains the ciphertext. The wrapper event is signed using the newly generated private key `sk_wrapper`. The wrapper event also includes the next hop's `npub_next` (or the final destination if it's the last renoter) in cleartext, to allow for routing.
4. **Publication:** The user publishes the *first* gift-wrapped event (the one encrypted for the last Renoter in the path). This event is sent to a regular Nostr relay, which then forwards it to the first Renoter in the path.
5. **Renoter Relaying:** Each Renoter in the path receives the gift-wrapped event, verifies the signature using the `sk_wrapper`'s corresponding public key, decrypts it using its own private key, and forwards the decrypted event (now wrapped for the *next* Renoter) to the next Renoter in the path. This process continues until the event reaches the final Renoter.
6. **Final Delivery:** The final Renoter decrypts the event and publishes it to the Nostr network.
### **Example**
Let's say Alice wants to send an event anonymously through Renoters R1, R2, and R3.
1. Alice creates her event.
2. She generates a random private key `sk3` and encrypts the event with R3's public key `npub_r3`.
3. She creates a wrapper event containing the ciphertext and `npub_r3`, signed with `sk3`.
4. She generates a random private key `sk2` and encrypts the previous wrapper event with R2's public key `npub_r2`.
5. She creates a wrapper event containing this ciphertext and `npub_r2`, signed with `sk2`.
6. She generates a random private key `sk1` and encrypts the previous wrapper event with R1's public key `npub_r1`.
7. She creates a final wrapper event containing this ciphertext and `npub_r1`, signed with `sk1`.
8. Alice publishes this final wrapper event.
R1 decrypts with its private key, verifies the signature with the public key corresponding to `sk1`, and forwards to R2. R2 decrypts, verifies the signature with the public key corresponding to `sk2`, and forwards to R3. R3 decrypts, verifies the signature with the public key corresponding to `sk3`, and publishes the original event.
### **Renoter Incentives (using Cashu)**
To incentivize Renoters to participate in the network, this NIP proposes integrating Cashu tokens as a payment mechanism.
- **Token Inclusion:** When a user creates the initial gift-wrapped event (the one sent to the first Renoter), they include a Cashu token *within* the event content. This token is itself encrypted and wrapped along with the original message, so only the receiving Renoter can access it.
- **Renoter Redemption:** Upon receiving a gift-wrapped event, the Renoter decrypts it. If the event contains a Cashu token, the Renoter can decrypt the token and redeem it.
- **Renoter Behavior:** Paid Renoters would be configured *not* to relay events that do *not* contain a valid Cashu token. This ensures that Renoters are compensated for their service. Free Renoters could still exist, but paid Renoters would likely offer faster or more reliable service.
- **Token Value and Tiers:** Different Cashu token denominations could represent different levels of service (e.g., faster relaying, higher priority). This could create a tiered system where users can pay for better anonymity or speed.
- **Token Generation:** Users would need a way to acquire Cashu tokens. This could involve purchasing them from a Cashu mint or earning them through other means.
### **Security Threats and Mitigations**
- **Anonymity Against Correlation Attacks:** Even when using Tor, traffic patterns can still be analyzed to infer the origin of events. To mitigate this risk, Renoters can introduce:
- Random delays in event relaying.
- Dummy packets to complicate statistical analysis by malicious observers.
- **Replay Attacks:** To mitigate replay attacks, each Renoter must store, for a reasonable period, the IDs of received events and the decrypted events that were forwarded. This ensures that duplicate messages are not processed again.
- **Sybil Attacks:** Sybil attacks can be mitigated by requiring payments via Cashu tokens for relaying events, increasing the cost of launching such attacks. By ensuring that each relay operation has a monetary cost, attackers are discouraged from creating large numbers of fake identities to manipulate the network.
- **Traffic Analysis:** Traffic analysis can be mitigated by using Tor for Renoters. Routing events through the Tor network adds an additional layer of anonymity, making it more difficult to track message origins or infer sender-recipient relationships. While Renoters enhance privacy, sophisticated traffic analysis might still be a threat.
### **Operational Considerations**
- **Renoter Reliability:** The reliability of the Renoter network is crucial.
- **Latency:** Relaying through multiple Renoters will introduce latency.
- **Key Management:** While each layer uses a new key, the initial key generation and path selection process need to be secure.
This NIP provides a robust framework for anonymous event relaying in Nostr, leveraging encryption and Cashu-based incentives to enhance privacy and usability.
### **References**
- **Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms**: David L. Chaum (https://dl.acm.org/doi/10.1145/358549.358563)
- **Mixminion Design**: Mixminion: Design of a Type III Anonymous Remailer (https://www.mixminion.net/minion-design.pdf)
- **Nostr Protocol**: Official Nostr Documentation (https://github.com/nostr-protocol/nostr)
- **Cashu Token System**: Cashu: Ecash for Bitcoin Lightning (https://cashu.space/)
- **Tor Project**: The Tor Project - Anonymity Online (https://www.torproject.org/)
- **Onion Routing**: The Second-Generation Onion Router (https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf)
#Privacy #Nostr #Anonymity #Crypto #CensorshipResistance #OnlinePrivacy #Decentralization #Encryption #Security #ThreatMitigation #Micropayments #CryptoEconomy #NextSteps #Development
-

@ 0f4795bf:a8365abe
2025-02-23 18:26:48
## Der neue Pareto-Client
Unter der Adresse <https://pareto.space/read> lässt sich der neue Pareto-Client aufrufen.

Durch Klicken auf **Anmelden** (rechts oben) kann mit einem vorhandenen Nostr-Konto angemeldet werden oder ein neues Konto erstellt werden.

Sofern schon ein Nostr-Konto vorhanden ist, kann nach Klick auf **Log in** einfach z. B. mittels Browser Extension angemeldet werden.

Nach dem Anmelden wird das Profilbild rechts oben angezeigt und ggf. eine Kategorie mit den Artikeln der Autoren, denen man folgt.

Nach Umschalten vom Leser- in den Autoren-Modus (Schalter oben, rechts neben Logo) werden die bereits veröffentlichten Artikel angezeigt.
Sollte der Schalter nicht angezeigt werden, bitte bei uns mit dem npub melden, damit wir ihn in die Liste der Pareto-Autoren aufnehmen können.

Eine zweite Kategorie zeigt die bestehenden Entwürfe.

Unter dem Punkt Bilder links lassen sich Bilder hochladen, die in Artikeln verwendet werden sollen.
Sollte noch kein Medien-Server (Blossom oder NIP-96) konfiguriert sein, wird angeboten, den Standard-Server des Pareto-Projektes zu nutzen.

Nachdem der Server konfiguriert wird, werden alle hochgeladenen Bilder angezeigt.
Weitere Bilder lassen sich über den Knopf **Bilder hochladen** hinzufügen.

Nach Auswahl des Punktes **Schreiben** wird der leere Pareto-Editor angezeigt.

Neben dem Titel sollte auch die Zusammenfassung aufgefüllt werden, da diese beim Teilen des Artikels (Telegram, Social Media, ...) neben dem Titel und dem Bild des Artikels angezeigt werden.
Das Bild kann durch Klicken auf den grauen Rahmen rechts oben gewählt werden.

Nach Doppelklick auf das gewünschte Bild wird es rechts neben Titel und Zusammenfassung angezeigt.
Neue Elemente können im Text durch Klicken auf das Plus-Symbol hinzugefügt werden.

Neben Überschriften lassen sich so auch Zitate, Aufzählungen, Programm-Code, Tabellen und Bilder einfügen.

Nachdem ein Bild-Element eingefügt wurde, kann es entweder mit einem Link auf ein Bild bestückt werden oder - durch Klicken auf "Select file" ein bereits hochgeladenes auswählen.
Durch Klicken auf die kleine Sprechblase rechts oben in einem Bild lässt sich eine Bildunterschrift hinzufügen.

### Markdown
Neben dem Hinzufügen von Elementen über das Plus-Symbol kann natürlich auch direkt [Markdown-Auszeichnung](https://www.ionos.de/digitalguide/websites/web-entwicklung/markdown/) eingegeben werden.
Es gibt im Netz diverse Anleitungen für Markdown. Allerdings gibt es im Kontext von Nostr die Einschränkung, dass keine HTML-Elemente in Artikeln enthalten sein dürfen.
Durch Tippen eines Doppelkreuzes, gefolgt von einem Leerzeichen, lässt sich beispielsweise eine Überschrift einfügen



### Besonderheiten
Der Pareto-Client stellt Links unterschiedlich dar, je nachdem, ob sie innerhalb eines Absatzes oder allein erscheinen.
*Links innerhalb eines Absatzes* werden ganz regulär dargestellt als Link, auf den der Leser klicken kann.
*Alleinstehende Links* (also ohne Text davor oder dahinter) hingegen werden ggf. mit einer Vorschau versehen und nach einmaligem Klick wird der Inhalt eingebettet dargestellt.
Für Links zu **YouTube**, **Odysee**, **Rumble**, **SoundCloud**, **[theplattform.net](https://tube.theplattform.net/)**, und andere können die Inhalte direkt im Artikel konsumiert werden.
Auch alleinstehende Links zu Dateien mit den Endungen .mp4, .mov, .mkv, .avi, .m4v und .webm (Videos) sowie .mp3, .wav, ogg (Audio) und .pdf (PDF-Dokumente) werden eingebettet dargestellt.
> **Tipp:**
>
> Beim Schreiben längerer Artikel empfiehlt es sich, diese zwischendurch immer wieder als Entwurf zu speichern, um Datenverlust zu vermeiden.

Oberhalb des Knopfes zum Speichern von Entwürfen wird immer der aktuelle Status des Artikels angezeigt.
Schlüsselwörter werden einfach durch Komma getrennt. Es ist üblich, diese klein zu schreiben.

Nach dem Speichern wird der Knopf deaktiviert.
Der Entwurf sollte anschließend unter dem Punkt **Artikel** unter **Entwürfe** eingeblendet werden.

Ein Klick auf **Bearbeiten** bringt den Entwurf wieder in den Editor.
Nach Klicken von **Veröffentlichen** kann noch die Liste der Nostr-Relays ausgewählt werden, auf denen der Artikel veröffentlicht werden soll.

Nach dem Veröffentlichen sollte der Status das entspr. anzeigen.

Herzlichen Glückwunsch!
Dein erster Artikel wurde über den Pareto-Client verfasst und veröffentlicht!
-

@ dbb19ae0:c3f22d5a
2025-02-23 16:38:41
Derive npub from nsec given as parameter
``` python
import argparse
import asyncio
from nostr_sdk import Keys, init_logger, LogLevel
async def main(nsec):
init_logger(LogLevel.INFO)
keys = Keys.parse(nsec)
public_key = keys.public_key()
print(f"Public key (hex): {public_key.to_hex()}")
print(f"Public key (npub): {public_key.to_bech32()}")
if __name__ == '__main__':
parser = argparse.ArgumentParser(description='Fetch all relay from a given nsec')
parser.add_argument('nsec', type=str, help='The nsec of the user')
args = parser.parse_args()
asyncio.run(main(args.nsec))
```
https://docs.rs/nostr_rust/latest/nostr_rust/keys/fn.get_public_key_from_secret.html
https://github.com/ev3rst/nostr_sdk_examples/blob/main/ns-derive-npub.py
-

@ f3873798:24b3f2f3
2025-02-25 13:51:32
Estamos próximos a uma das principais premiações da indústria. Vemos não só a perversão de pautas woke e destruição de valores ocidentes, mas também um grande confronto entre o que mais forte o ativismo Lgbt ou o ativismo político entre as atrizes Fernanda Torres e Karla Gascon.
Só evidência o caos que é os conflitos de interesse de diversas vertentes que a esquerda abraça e diz que é sua.
Mas, o que mais impressiona é o fato do Oscar ter um filme no indicado que até o momento não ganhou nada, porém é notório a superioridade aos outros, este filme é Sing Sing.
Porque o filme Sing sing foi ignorado pelos avaliadores?
O filme tem uma narrativa de superação e como a arte pode mudar as pessoas e as realidades mais pertubadoras. Ele retrata o Sistema carcerário americano, onde realidade de vários presos é mudada atraves de um projeto de um teatro na prisão.
Observando friamente a sintese do filme é uma história que se encaixa perfeitamente aos vies de bandidolatria, se não tivesse um questão, a ação transformadora da arte e deixando de serem vítimas e serem artistas.
Porém apesar de ser uma obra de arte que estimula as pessoas pensarem sobre a vida e ter uma pegada inovadora e completamente diferente dos demais filmes que retratam o sistema carcerário, ele é totalmente ignorado por não ser suficientemente lacrativo.
-

@ 9171b08a:8395fd65
2025-02-25 13:27:26
For the price tag on this room, I would've thought my death bed would be more comfortable. Since I've been admitted I've been in a perpetual state of discomfort despite the medicine that is supposed to keep me numb. The room is dark and I'm alone with the sounds of industry that keep this planet churning through the expanse of space.
The unease goes deeper than the surface, beyond the 1000 thread count Earth cotton grating against my skin, deeper than the cracking sinews of my muscles, it lurks in the wake of the vibrations of my heart as it throbs its final throbs.
The holoscreen comes to life at a thoughts command and quickly my unease turns to irritation as my name crawls across the screen. A woman points to the very hospital where I lay and expresses her sorrow as "One of the greatest men of this era awaits his death."
I suppose it couldn't come quicker. I shut off the holoscreen. Plunge myself back into the darkness and simply watch the shadows of the freighter transports cast through the opaque vinyl shutter as they pass by.
The light comes on. It blinds me and all I can hear are the footsteps that approach. The heels clatter loudly, soles of well made shoes. Expensive, probably Earth made like my sheets.
"You don't have to go through with this old man." I know the voice well. My mentee, the man I've groomed to take over my empire speaks again, "It's not too late to take the regenerons. You'd be looking younger than me within the week."
I don't care to explain myself. I turn away from him and he mutters something else then reaches over and rests a vase on the table in front of me.

Inside the vase float two scarlet tulips within a bouquet of gypsophila. The flowers smell freshly cut, a scent that instantly freshens my soul and harkens to a time before anyone could imagine I'd be known as "one of the greatest men of the era."
My mentee speaks, but his voice is nothing more than the ruffling of my sheets as I sit up and draw closer to you.
Precious tulips.
Tulips like these, I picked in the endless fields of Verduia. I, like the others who'd been bred to work on that planet, toiled away endless days to pick flowers just like these for affluent people just like me at this very moment.
I was never supposed to have the life I've lived. My biology was built to pick and die. To work, stay poor, and keep my head buried in the fields, that was my purpose.
I worked hard. My hands pruned and nurtured roots in the dark soil. But I loved harder. The memory of your marble skin against the thick layer of dirt beneath my nails will never fade. I've amassed a wealth that is the envy of entire solar systems, but the memory of you is richer.
My tulip, my eternal blossom. I'd run away from the task masters with you and hide in the tall sunflower fields where we'd make love.
People like us weren't meant to be in love. When you passed, I felt no greater discomfort. I thought wealth could fill that void. It hasn't. Not even a millennia since could wash away the memory of you. Only the closure of time, the death of me can remove this ever long dread. Here the need to revive the feeling only you could inspire ends.
-Art By Surenja Rajawat- Find him on instagram @suren.rajawat
-

@ 57d1a264:69f1fee1
2025-02-25 13:24:49

Galoy released a new product called Lana, a platform for bitcoin loans. The team will provide an introduction and then we'll dive into the design.
To get you up to speed, check out the website, slide deck and podcast interview:
- https://www.galoy.io/lana-bitcoin-loans-platform
- https://docs.google.com/presentation/d/1IQocefpCN5_wKX91EWtLa19IpMS_Ye8goNLAgGQbfdU/edit#slide=id.g31d536107ae_0_0
- https://stephanlivera.com/episode/634/
If you get a chance, please take a peek before the call. That makes the design reviews more useful because we need to spend less time going over the basics.
On `Thu Feb 27th · 15:00 – 16:00 CET`
Join from https://meet.jit.si/bitcoindesign
Check your timezone https://everytimezone.com/s/998e22fc
Track https://github.com/BitcoinDesign/Meta/issues/758
originally posted at https://stacker.news/items/896570
-

@ 57d1a264:69f1fee1
2025-02-25 12:38:46
I've been pondering how LSPs (lightning service providers) might pan out over time and how that might affect fees, and I am wondering what everyone else is thinking. Some people will always prefer to manage their own channels, and for some specific use cases, that might be preferable. But I am thinking about the broad userbase that does not want to do that. We will need a massive LSP infrastructure to onboard people and to enable insane amounts of payments.
LSPs will need to efficiently open and adjust channels for users, using their own liquidity or sourcing liquidity from other providers, using just-in-time channels, batching and/or splicing to reduce costs and wait times. Across all this, along with facilitating payments, they need to make their business model work and offer different options for users to pay for their services.
Users might be able to:
1. Pay-as-you-go (pay X for Y more liquidity for Z amount of time)
2. Pay X per month for Y inbound liquidity
3. Pay X per month for unlimited liquidity
4. Nothing for liquidity, but higher transaction fees
A wallet might also automatically choose an appropriate LSP based on what is the best and most appropriate deal at the time.
Let's look at user scenarios:
- If someone sends and receives the same amount every month, they will never need more liquidity. They just draw down the same channel and fill it up again. So they would only pay the LSP for them assigning that fixed amount of liquidity to them. Maybe options 1 and 2 are good for them.
- If someone receives more than they send (they save a certain amount every month), they will need more and more inbound liquidity over time. They might choose option 2.
- An online store that receives a ton and can't really estimate how much, might go for option 3.
- For option 4, it depends if the higher transaction fees are fixed or percentage-based.
It's a bit like choosing a data plan for your phone (or for internet at home). You can get a prepaid card, a regular plan with certain limits, or go unlimited. And there are separate plans for small and large businesses, etc. And there are massive amounts of complex infrastructure behind these service providers to make it all work.
So when someone starts using a lightning wallet, maybe they have to first pick an LSP and a plan before being able to receive. Or maybe they get a first channel for free and pay higher fees, and are then prompted to choose a plan. Maybe they need to wait an hour until the LSP has enough channel opens for a batch/splice, to reduce costs. A complex market at work.
Is that how things might pan out? Am I completely off? Is it worth mocking up different scenarios?
```
#bitcoin #LN #BTC #Lightning #LSP #service #zaps #sats #wallet
```
originally posted at https://stacker.news/items/896520
-

@ 61ba1192:7335ef51
2025-02-23 11:39:12
## Details
- ⏲️ Prep time: 5 minutes
- 🍳 Cook time: 10 minutes
- 🍽️ Servings: 2
## Ingredients
- 500ml milk
- 80gr semolina
- 1ts salt
## Directions
1. Add milk to the pot and heat it up
2. Add semolina to the milk and stir continuously while adding it slowly
3. Keep stirring and heating until thickens up
-

@ d360efec:14907b5f
2025-02-25 10:16:18
**ภาพรวม BTCUSDT (OKX):**
Bitcoin (BTCUSDT) แนวโน้มระยะยาว TF Day ยังคงเป็นขาลง แนวโน้มระยะกลาง TF 4H Sideway down และแนวโน้มระยะสั้น TF 15M Sideways Down
**วิเคราะห์ทีละ Timeframe:**
**(1) TF Day (รายวัน):** 
* **แนวโน้ม:** ขาลง (Downtrend)
* **SMC:**
* Lower Highs (LH) และ Lower Lows (LL)
* Break of Structure (BOS) ด้านล่าง
* **Liquidity:**
* มี Sellside Liquidity (SSL) อยู่ใต้ Lows ก่อนหน้า
* มี Buyside Liquidity (BSL) อยู่เหนือ Highs ก่อนหน้า
* **ICT:**
* **Order Block** ราคาไม่สามารถผ่าน Order Block ได้
* **EMA:**
* ราคาอยู่ใต้ EMA 50 และ EMA 200
* **Money Flow (LuxAlgo):**
* สีแดง
* **Trend Strength (AlgoAlpha):**
* สีแดง แสดงถึงแนวโน้มขาลง
* **Chart Patterns:** *ไม่มีรูปแบบที่ชัดเจน*
* **Volume Profile:**
* Volume ค่อนข้างนิ่ง
* **แท่งเทียน:** แท่งเทียนล่าสุดเป็นสีแดง
* **แนวรับ:** บริเวณ Low ล่าสุด
* **แนวต้าน:** EMA 50, EMA 200 , Order Block
* **สรุป:** แนวโน้มขาลง
**(2) TF4H (4 ชั่วโมง):** 
* **แนวโน้ม:** ขาลง (Downtrend)
* **SMC:**
* Lower Highs (LH) และ Lower Lows (LL)
* Break of Structure (BOS) ด้านล่าง
* **Liquidity:**
* มี SSL อยู่ใต้ Lows ก่อนหน้า
* มี BSL อยู่เหนือ Highs ก่อนหน้า
* **ICT:**
* **Order Block** ราคาไม่สามารถผ่าน Order Block ได้
* **EMA:**
* ราคาอยู่ใต้ EMA 50 และ EMA 200
* **Money Flow (LuxAlgo):**
* สีแดง แสดงถึงแรงขาย
* **Trend Strength (AlgoAlpha):**
* สีแดง แสดงถึงแนวโน้มขาลง
* **Chart Patterns:** *ไม่มีรูปแบบที่ชัดเจน*
* **Volume Profile:**
* Volume ค่อนข้างนิ่ง
* **แนวรับ:** บริเวณ Low ล่าสุด
* **แนวต้าน:** EMA 50, EMA 200, Order Block
* **สรุป:** แนวโน้มขาลง,
**(3) TF15 (15 นาที):** 
* **แนวโน้ม:** Sideway Down
* **SMC:**
* Lower High (LH) และ Lower Lows (LL)
* Break of Structure (BOS) ด้านล่าง
* **ICT:**
* **Order Block:** ราคา Sideways ใกล้ Order Block
* **EMA:**
* EMA 50 และ EMA 200 เป็นแนวต้าน
* **Money Flow (LuxAlgo):**
* แดง
* **Trend Strength (AlgoAlpha):**
* แดง/ ไม่มีสัญญาณ
* **Chart Patterns:** *ไม่มีรูปแบบที่ชัดเจน*
* **Volume Profile:** Volume ค่อนข้างสูง
* **แนวรับ:** บริเวณ Low ล่าสุด
* **แนวต้าน:** EMA 50, EMA 200, Order Block
* **สรุป:** แนวโน้ม Sideways Down,
**สรุปภาพรวมและกลยุทธ์ (BTCUSDT):**
* **แนวโน้มหลัก (Day):** ขาลง
* **แนวโน้มรอง (4H):** ขาลง
* **แนวโน้มระยะสั้น (15m):** Sideways Down
* **Liquidity:** มี SSL ทั้งใน Day, 4H, และ 15m
* **Money Flow:** เป็นลบในทุก Timeframes
* **Trend Strength:** Day/4H/15m เป็นขาลง
* **Chart Patterns:** ไม่พบรูปแบบที่ชัดเจน
* **กลยุทธ์:**
1. **Wait & See (ดีที่สุด):** รอความชัดเจน
2. **Short (เสี่ยง):** ถ้าไม่สามารถ Breakout EMA/แนวต้านใน TF ใดๆ ได้ หรือเมื่อเกิดสัญญาณ Bearish Continuation
3. **ไม่แนะนำให้ Buy:** จนกว่าจะมีสัญญาณกลับตัวที่ชัดเจนมากๆ
**Day Trade & การเทรดรายวัน:**
* **Day Trade (TF15):**
* **Short Bias:** หาจังหวะ Short เมื่อราคาเด้งขึ้นไปทดสอบแนวต้าน (EMA, Order Block)
* **Stop Loss:** เหนือแนวต้านที่เข้า Short
* **Take Profit:** แนวรับถัดไป (Low ล่าสุด)
* **ไม่แนะนำให้ Long**
* **Swing Trade (TF4H):**
* **Short Bias:** รอจังหวะ Short เมื่อราคาไม่สามารถผ่านแนวต้าน EMA หรือ Order Block ได้
* **Stop Loss:** เหนือแนวต้านที่เข้า Short
* **Take Profit:** แนวรับถัดไป
* **ไม่แนะนำให้ Long**
**สิ่งที่ต้องระวัง:**
* **Sellside Liquidity (SSL):** มีโอกาสสูงที่ราคาจะถูกลากลงไปแตะ SSL
* **False Breakouts:** ระวัง
* **Volatility:** สูง
**Setup Day Trade แบบ SMC (ตัวอย่าง):**
1. **ระบุ Order Block:** หา Order Block ขาลง (Bearish Order Block) ใน TF15
2. **รอ Pullback:** รอให้ราคา Pullback ขึ้นไปทดสอบ Order Block นั้น
3. **หา Bearish Entry:**
* **Rejection:** รอ Price Action ปฏิเสธ Order Block
* **Break of Structure:** รอให้ราคา Break โครงสร้างย่อยๆ
* **Money Flow:** ดู Money Flow ให้เป็นสีแดง
4. **ตั้ง Stop Loss:** เหนือ Order Block
5. **ตั้ง Take Profit:** แนวรับถัดไป
**คำแนะนำ:**
* **ความขัดแย้งของ Timeframes:** ไม่มีแล้ว ทุก Timeframes สอดคล้องกัน
* **Money Flow:** เป็นลบในทุก Timeframes
* **Trend Strength:** เป็นลบ
* **Order Block TF Day:** หลุด Order Block ขาขึ้นแล้ว
* **ถ้าไม่แน่ใจ อย่าเพิ่งเข้าเทรด**
**Disclaimer:** การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-

@ 42342239:1d80db24
2025-02-23 10:00:20
Europe's economic framework requires restructuring grounded in realism. The Commission's Competitiveness Compass, alas, reveals dangerous left-hemisphere dominance and risks repeating Mao's mistakes.
The European Commission presented its "competitiveness compass" in January. There will be massive investments in biotechnology, materials technology, medicines, space, and the defence industry. AI gigafactories are to be established, while Europe will "maintain its leadership in quantum technologies" (a leadership that few seem to be aware of). This will be achieved through more environmental labelling schemes, nature credits, procurement rules, platforms, cooperation plans, and coordination systems. Although the report contains some bright spots, such as promises to ease the regulatory burden, **the overall picture is strikingly lacking in creativity**. Instead, we are mainly met with the usual thought patterns of the European technocracy, which manifest in additional centralised frameworks, quantifiable goals, and annual reports. Mao's ghost haunts Brussels.
#### The Missing Half of Europe's Brain
Iain McGilchrist, a British psychiatrist and philosopher, has launched the hemispheric hypothesis (a theory about how the two hemispheres of the brain work). The left hemisphere is more detail- and control-oriented, while the right hemisphere is holistic and creative. A society dominated by the left hemisphere, [like our own according to McGilchrist](https://www.youtube.com/watch?v=WYB7P-xPRsk), "would see it as its task to control everything maximally." **The Commission's compass appears similarly lobotomised , prioritising measurable processes over imaginative solutions.**
In an earlier text, I mentioned that Europe might need to return [to its roots](https://www.affarsvarlden.se/kronika/enlund-lar-av-elon-musk-vi-behover-ett-mer-radikalt-europa) and asked if Europe should have "the same end goal as China." This is still a relevant and justified question. But if we are honest, China has implemented a series of well-thought-out reforms since the 1980s, in addition to its many well-known and large-scale investments. It is not necessarily wrong to be inspired by China, as many believe; it depends on which China you are inspired by.
#### Lessons from the Cat Theory
When Deng Xiaoping returned to power in the late 1970s, he chose a more pragmatic approach than his predecessors. China left Mao Zedong's purges of dissidents behind. Instead, he launched the cat theory: **"it doesn't matter what colour the cat is as long as it catches mice"**, regarding economic development. It was now free to experiment with different models. Instead of ideological conformity, the most important thing was to increase productivity and material prosperity.
What was done in China?
* Companies and individuals were given more freedom
* Provinces and municipalities were given more autonomy
* Special economic zones were established, with different conditions and rules
* Programs to increase the number of banks were introduced
* The banking sector was deregulated
* Property rights and contract law began to be respected
China has since gone from being an economic backwater to not only being the world's largest economy in terms of purchasing power but also a [global tech contender](https://www.aspi.org.au/index.php/report/critical-technology-tracker) (leading in 37 out of 44 key technologies per ASPI).
#### EU's Compliance Obsession vs Chinese Pragmatism
And today, when China is astonishing the world with surprisingly cheap and competent AI systems, which recently set American tech stocks in motion, in the EU one is met with advertisements for yet another compliance training, this time about AI. **Every new compliance training echoes Mao's ghost** – ideological correctness overriding practical results. Is prosperity really built with certifications, directives, requirements, and penalties?
When we compare the Chinese experience with today's EU, the contrast is clear:
* Freedoms are curtailed. The right to privacy is undermined (Chat Control, etc.)
* Member states' ability to self-govern is reduced, year by year
* Streamlining and harmony are popular buzzwords in the bureaucracy
* The ECB is actively working to reduce the number of banks
* The banking sector is being regulated more and more
* Property rights and contract law are being eroded, which can be partly attributed to [developments in payment systems](https://underorion.se/en/posts/freedom_to_transact/)
Deng's cat theory was an example of when the right hemisphere was involved in decision-making. Rather than just focusing on details (the cat's colour), the whole (the result) was important. **The Chinese proverb "cross the river by feeling the stones" is another example of more holistic thinking**. Under Deng's leadership, reforms were first tested in a free zone or a province. After a while, the reforms could be evaluated before they were possibly implemented on a larger scale. "Try before you buy" is also a wise principle that follows from complexity research. In sharp contrast to this approach was Mao's "Great Leap Forward," a part of a disastrous five-year plan that shows what can happen when the left hemisphere is given too much power. A tragedy of historic proportions - a mass famine - resulted. While Deng exorcized Mao's ghost through pragmatic experimentation, Brussels seems determined to resurrect. **Today's EU risks repeating Mao's mistake of letting political abstractions ("green transition! digital decade!") override reality** – Mao's ghost surely smiles at nature credit schemes replacing actual market signals.
#### Mao's ghost trives on the ontological mistake
The serious problems that the EU is facing have been built up over decades and stem from incorrect assumptions. The economy is not complicated. It is complex. The concepts are often confused, but they describe two fundamentally different things. The complicated refers to something composite, but which can still be unfolded and then folded back up again without changing its essence. The complex, on the other hand, refers to something entangled, where every attempt to divide it changes its character. Compare, for example, an airplane engine with a béarnaise sauce. If you mix up the concepts, you make an ontological mistake, a philosopher would say. A programmer would say: garbage in, garbage out. **Mao's ghost thrives on this ontological error**, convincing technocrats they can blueprint society like a Soviet tractor factory.
**When a system is complicated, predictable, and linear, centralised coordination and control by the left hemisphere can work well.** But in complex systems, it can never be a solution because it leads to reduced adaptability and increased system risks. Instead, the goal should be diversity and decentralisation, which provide greater adaptability! The faster the changes of the system or in the environment, the greater the demands on adaptability and flexibility - if the system is to survive, that is. Increased diversity and decentralisation would not only increase adaptability and flexibility but also promote creativity, an ability that will likely become increasingly important in a world where AI and automation are changing the rules.
#### A better path forward
Europe's economic framework requires restructuring grounded in realism. The Commission's competitiveness compass - fixated on metrics and control - reveals dangerous left-hemisphere dominance, echoing Maoist central planning's epistemological errors. Our path forward demands:
* Dual-brain governance (prioritising creativity over control)
* Banishing of category mistakes (acknowledging the complex adaptive nature of the economy)
* Pragmatism over ideology (policy sandboxes inspired by China's special economic zones)
* Anti-fragile design (increased autonomy of EU nations, within states, and decentralised banking)
* Sunset clauses on all bureaucracy (regulators cannot originate breakthroughs)
The alternative? Another technocratic Great Leap Forward - eco-certified, AI-monitored, but economically brittle and fundamentally maladapted to the complex global economy. **As Deng's reformers understood: no institutional architecture, not even the First Emperor's Terracotta Army, can withstand modernity's tide.**
-

@ e3ba5e1a:5e433365
2025-02-23 06:35:51
My wife and I have six children, making our house a household of eight people. Looking just at the eight of us, how many relationships exist? Well, as a first stab, we could look at how many connections exist between two unique individuals in this family. The mathematical term for this is “8 choose 2”, and the answer is 8\*7/2, or 28\.
Even that doesn’t really capture the answer though, because relationships aren’t just between two people. For example, when my wife and two oldest children are the only ones still awake after the younger kids go to bed, we’ll put on my mature TV shows that they’ll appreciate and watch together. It’s our own little subgroup within the group.
Based on that, we could have groups of 2, 3, 4, all the way up to 8, the group of all of us. If you do the math, this comes up to 247 different subgroups of 2 or more people. That’s a lot of groups for just 8 people.
As a father, this means I’ll never be able to fully understand every set of connections within my family. I may have a good understanding of my own relationship with each child. I also am closely aware of the relationship between our two youngest children, since they’re twins. And I could probably list 20 or so other noteworthy relationships. But I’ll never understand all of them.
For example, months ago I bought a game on Steam for my 3rd and 4th kids. I know they like to play games together, so it was a relationship that I thought I understood well. A few days ago I found out that my oldest had joined them in playing one of these games (Brotato). I’d made the purchase, given it to the kids, and it sparked new relationship and interaction structures without my involvement.
There’s no problem with the fact that I can’t track every interaction in my house. That’s healthy\! The kids are able to discover ways of interacting beyond what I can teach them, learn everything from schoolwork to video games from each other, and overall become more healthy and well-adjusted adults (I hope).
And here’s the important part: the growth of the number of connections is *massive* as the number of participants increases. If we add in another participant, we have 502 groupings. At 10 total participants, it jumps to over 1,000. By the time we get to 100, we’re well into the trillions.
A mathematical and software term for this is *combinatoric complexity*, the massive increase in an output value based on a small increase in the input. The analysis I’m providing could be termed as part of graph theory (for connections of 2, looking at people as *vertices* and connections as *edges*) or set theory (unique subsets, allowing for larger group sizes). But regardless, the point is: the increase in complexity is huge as more people join.
Now consider the global economy. It’s over 8 billion people. There are so many people that the number of groupings is absurd to talk about. Nonetheless, massive numbers of these groupings naturally occur. There are family units, friend circles, individual connections, companies, project teams, sports teams, schools, classes, and millions more. These groups of people form new ways of interacting, express vastly different desires for goods and services, and are capable of producing wide varieties of goods and services themselves.
When you allow this system to run free, beauty emerges. Each node in the graph can manage its own connections. Each *person* is free to make his or her own decisions about association, what to spend time on, what to spend money on, and so on. Each person does so on their own judgement and world view.
Some of these people may make “dumb” decisions. They may “waste” their time and money on useless things. Except: who made that value judgement? Clearly not them, they decided it was worth it. No central planner has the right to override their will.
My point in all this is: as yet another of many reasons in the list of “why people should be free,” we have one more data point: pure math. Central planning will never scale. Central planning will never appreciate the individuality and desires of each person. Only by giving people the freedom to explore their connections to others, discover what they can produce and consume, explore their options, and ultimately make their own decisions, can we have any chance of creating a world where everyone can succeed.
-

@ d360efec:14907b5f
2025-02-25 09:12:44
$OKX:BTCUSDT.P
**Overall Assessment:**
Bitcoin (BTCUSDT) on OKX is currently showing a bearish trend across all analyzed timeframes (Daily, 4-Hour, and 15-Minute). While the long-term trend (Daily) was technically an uptrend, it has *significantly weakened* and broken key support levels, including a major bullish Order Block and the 50-period EMA. The 4-hour and 15-minute charts confirm the downtrend. This analysis focuses on identifying potential areas of Smart Money activity (liquidity pools and order blocks), assessing trend strength, and looking for any emerging chart patterns.
**Detailed Analysis by Timeframe:**
**(1) TF Day (Daily):**

* **Trend:** Downtrend
* **SMC (Smart Money Concepts):**
* The Higher Highs (HH) and Higher Lows (HL) structure is *broken*.
* Prior Breaks of Structure (BOS) to the upside, but now a significant and deep pullback/reversal is underway.
* **Liquidity:**
* **Sellside Liquidity (SSL):** Significant SSL rests below previous lows in the 85,000 - 90,000 range.
* **Buyside Liquidity (BSL):** BSL is present above the all-time high.
* **ICT (Inner Circle Trader Concepts):**
* **Order Block:** The price has *broken below* the prior bullish Order Block. This is a *major bearish signal*.
* **FVG:** No significant Fair Value Gap is apparent at the current price level.
* **EMA (Exponential Moving Average):**
* Price is *below* the 50-period EMA (yellow).
* The 200-period EMA (white) is the next major support level.
* **Money Flow (LuxAlgo):**
* A *long red bar* indicates strong and sustained selling pressure.
* **Trend Strength (AlgoAlpha):**
* Red cloud, indicating a downtrend. No buy/sell signals are present.
* **Chart Patterns:** No readily identifiable chart patterns are dominant.
* **Volume Profile:** Relatively low volume.
* **Candlesticks:** Recent candlesticks are red, confirming selling pressure.
* **Support:** EMA 200, 85,000-90,000 (SSL area).
* **Resistance:** EMA 50, Previous All-Time High.
* **Summary:** The Daily chart has shifted to a downtrend. The break below the Order Block and 50 EMA, combined with negative Money Flow and Trend Strength, are all strong bearish signals.
**(2) TF4H (4-Hour):**

* **Trend:** Downtrend.
* **SMC:**
* Lower Highs (LH) and Lower Lows (LL).
* BOS to the downside.
* **Liquidity:**
* **SSL:** Below previous lows.
* **BSL:** Above previous highs.
* **ICT:**
* **Order Block:** The price was rejected by a bearish Order Block.
* **EMA:**
* Price is below both the 50-period and 200-period EMAs (bearish).
* **Money Flow (LuxAlgo):**
* Predominantly red, confirming selling pressure.
* **Trend Strength (AlgoAlpha):**
* Red cloud, confirming downtrend.
* **Chart Patterns:** No readily identifiable chart patterns.
* **Volume Profile:** Relatively steady volume.
* **Support:** Recent lows.
* **Resistance:** EMA 50, EMA 200, Order Block.
* **Summary:** The 4-hour chart is in a confirmed downtrend. Money Flow and Trend Strength are bearish.
**(3) TF15 (15-Minute):**

* **Trend:** Downtrend / Sideways Down
* **SMC:**
* Lower Highs (LH) and Lower Lows (LL).
* BOS to the downside.
* **ICT:**
* **Order Block** price is near to a bearish Order Block.
* **EMA:**
* The 50-period and 200-period EMAs are acting as resistance.
* **Money Flow (LuxAlgo):**
* Red
* **Trend Strength (AlgoAlpha):**
* Red/No signals
* **Chart Patterns:** None
* **Volume Profile:**
* Relatively High Volume
* **Support:** Recent lows.
* **Resistance:** EMA 50, EMA 200, Order Block.
* **Summary:** The 15-minute chart is clearly bearish, with price action, EMAs, and Money Flow all confirming the downtrend.
**Overall Strategy and Recommendations (BTCUSDT):**
* **Primary Trend (Day):** Downtrend
* **Secondary Trend (4H):** Downtrend.
* **Short-Term Trend (15m):** Downtrend/ Sideways Down.
* **Liquidity:** Significant SSL zones exist below the current price on all timeframes.
* **Money Flow:** Negative on all timeframes.
* **Trend Strength:** Bearish on Day,4H and 15m.
* **Chart Patterns:** None identified.
* **Strategies:**
1. **Wait & See (Best Option):** The strong bearish momentum on all shorter timeframes.
2. **Short (High Risk):** This aligns with the 4H and 15m downtrends.
* **Entry:** On rallies towards resistance levels (EMAs on 15m/4H, previous support levels that have turned into resistance, Order Blocks).
* **Stop Loss:** Above recent highs on the chosen timeframe, or above a key resistance level.
* **Target:** The next support levels (recent lows on 15m, then potentially the SSL zones on the 4H and Daily charts).
3. **Buy (Extremely High Risk - NOT Recommended):** Do *not* attempt to buy until there are *very strong and consistent* bullish reversal signals across *all* timeframes.
**Key Recommendations:**
* **Conflicting Timeframes:** The conflict is resolved toward the downside. The Daily is weakening significantly.
* **Money Flow:** Consistently negative across all timeframes, a major bearish factor.
* **Trend Strength:** Bearish on Day,4h and 15m.
* **Daily Order Block:** The *break* of the bullish Order Block on the Daily chart is a significant bearish development.
* **Sellside Liquidity (SSL):** Be aware that Smart Money may target the SSL zones below. This increases the risk of stop-loss hunting.
* **Risk Management:** Due to the high uncertainty and volatility, *strict risk management is absolutely critical.* Use tight stop-losses, do not overtrade, and be prepared for rapid price swings.
* **Volume:** Confirm any breakout or breakdown with volume.
**Day Trading and Intraday Trading Strategies:**
* **Day Trade (TF15 focus):**
* **Short Bias:** Given the current 15m downtrend and negative Money Flow, the higher probability is to look for shorting opportunities.
* **Entry:** Look for price to rally to resistance levels (EMAs, Order Blocks, previous support levels that have become resistance) and then show signs of rejection (bearish candlestick patterns, increasing volume on the downside).
* **Stop Loss:** Place a stop-loss order above the resistance level where you enter the short position.
* **Take Profit:** Target the next support level (recent lows).
* **Avoid Long positions** until there's a *clear* and *confirmed* bullish reversal on the 15m chart (break above EMAs, positive Money Flow, bullish market structure).
* **Swing Trade (TF4H focus):**
* **Short Bias:** The 4H chart is in a downtrend.
* **Entry:** Wait for price to rally to resistance levels (EMAs, Order Blocks) and show signs of rejection.
* **Stop Loss:** Above the resistance level where you enter the short position.
* **Take Profit:** Target the next support levels (e.g., the 200 EMA on the Daily chart, SSL zones).
* **Avoid Long positions** until there's a *clear* and *confirmed* bullish reversal on the 4H chart.
**SMC Day Trade Setup Example (TF15 - Bearish):**
1. **Identify Bearish Order Block:** Locate a bearish Order Block on the TF15 chart (a bullish candle before a strong downward move).
2. **Wait for Pullback:** Wait for the price to pull back up to test the Order Block (this may or may not happen).
3. **Bearish Entry:**
* **Rejection:** Look for price action to reject the Order Block (e.g., a pin bar, engulfing pattern, or other bearish candlestick pattern).
* **Break of Structure:** Look for a break of a minor support level on a *lower* timeframe (e.g., 1-minute or 5-minute) after the price tests the Order Block. This confirms weakening bullish momentum.
* **Money Flow:** Confirm that Money Flow remains negative (red).
4. **Stop Loss:** Place a stop-loss order *above* the Order Block.
5. **Take Profit:** Target the next support level (e.g., recent lows) or a bullish Order Block on a higher timeframe.
**In conclusion, BTCUSDT is currently in a high-risk, bearish environment. The "Wait & See" approach is strongly recommended for most traders. Shorting is the higher-probability trade *at this moment*, but only for experienced traders who can manage risk extremely effectively. Buying is not recommended at this time.**
**Disclaimer:** This analysis is for informational purposes only and represents a personal opinion. It is not financial advice. Investing in cryptocurrencies involves significant risk. Investors should conduct their own research and exercise due diligence before making any investment decisions.
-

@ 641d8c39:1224c8d3
2025-02-23 00:17:46
A specter is haunting the modern world, the specter of crypto anarchy.
Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the True Name, or legal identity, of the other. Interactions over networks will be untraceable, via extensive re-routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret, and will even alter the nature of trust and reputation.
The technology for this revolution--and it surely will be both a social and economic revolution--has existed in theory for the past decade. The methods are based upon public-key encryption, zero-knowledge interactive proof systems, and various software protocols for interaction, authentication, and verification. The focus has until now been on academic conferences in Europe and the U.S., conferences monitored closely by the National Security Agency. But only recently have computer networks and personal computers attained sufficient speed to make the ideas practically realizable. And the next ten years will bring enough additional speed to make the ideas economically feasible and essentially unstoppable. High-speed networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band transmitters, multi-MIPS personal computers, and encryption chips now under development will be some of the enabling technologies.
The State will of course try to slow or halt the spread of this technology, citing national security concerns, use of the technology by drug dealers and tax evaders, and fears of societal disintegration. Many of these concerns will be valid; crypto anarchy will allow national secrets to be trade freely and will allow illicit and stolen materials to be traded. An anonymous computerized market will even make possible abhorrent markets for assassinations and extortion. Various criminal and foreign elements will be active users of CryptoNet. But this will not halt the spread of crypto anarchy.
Just as the technology of printing altered and reduced the power of medieval guilds and the social power structure, so too will cryptologic methods fundamentally alter the nature of corporations and of government interference in economic transactions. Combined with emerging information markets, crypto anarchy will create a liquid market for any and all material which can be put into words and pictures. And just as a seemingly minor invention like barbed wire made possible the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier West, so too will the seemingly minor discovery out of an arcane branch of mathematics come to be the wire clippers which dismantle the barbed wire around intellectual property.
Arise, you have nothing to lose but your barbed wire fences!A specter is haunting the modern world, the specter of crypto anarchy.
Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the True Name, or legal identity, of the other. Interactions over networks will be untraceable, via extensive re-routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret, and will even alter the nature of trust and reputation.
The technology for this revolution--and it surely will be both a social and economic revolution--has existed in theory for the past decade. The methods are based upon public-key encryption, zero-knowledge interactive proof systems, and various software protocols for interaction, authentication, and verification. The focus has until now been on academic conferences in Europe and the U.S., conferences monitored closely by the National Security Agency. But only recently have computer networks and personal computers attained sufficient speed to make the ideas practically realizable. And the next ten years will bring enough additional speed to make the ideas economically feasible and essentially unstoppable. High-speed networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band transmitters, multi-MIPS personal computers, and encryption chips now under development will be some of the enabling technologies.
The State will of course try to slow or halt the spread of this technology, citing national security concerns, use of the technology by drug dealers and tax evaders, and fears of societal disintegration. Many of these concerns will be valid; crypto anarchy will allow national secrets to be trade freely and will allow illicit and stolen materials to be traded. An anonymous computerized market will even make possible abhorrent markets for assassinations and extortion. Various criminal and foreign elements will be active users of CryptoNet. But this will not halt the spread of crypto anarchy.
Just as the technology of printing altered and reduced the power of medieval guilds and the social power structure, so too will cryptologic methods fundamentally alter the nature of corporations and of government interference in economic transactions. Combined with emerging information markets, crypto anarchy will create a liquid market for any and all material which can be put into words and pictures. And just as a seemingly minor invention like barbed wire made possible the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier West, so too will the seemingly minor discovery out of an arcane branch of mathematics come to be the wire clippers which dismantle the barbed wire around intellectual property.
Arise, you have nothing to lose but your barbed wire fences!
https://groups.csail.mit.edu/mac/classes/6.805/articles/crypto/cypherpunks/may-crypto-manifesto.html
-

@ fc481c65:e280e7ba
2025-02-22 22:22:14
**Math is the formalization of a human idea**
Mathematics is a broad field of study that involves the investigation of patterns, quantities, structures, and changes in the abstract form as well as their real-world applications. It is foundational to a variety of disciplines including science, engineering, medicine, and the social sciences, providing a framework for reasoning, problem-solving, and understanding the universe.
<iframe title="The Map of Mathematics" src="https://www.youtube.com/embed/OmJ-4B-mS-Y?feature=oembed" height="113" width="200" allowfullscreen="" allow="fullscreen" style="aspect-ratio: 1.76991 / 1; width: 100%; height: 100%;"></iframe>
Mathematics is composed of many subfields, including but not limited to:
1. **Arithmetic:** The study of numbers and the basic operations on them: addition, subtraction, multiplication, and division.
2. **Algebra:** The study of symbols and the rules for manipulating these symbols; it is a unifying thread of almost all of mathematics.
3. **Geometry:** The study of shapes, sizes, and properties of space.
4. **Calculus:** The study of change in mathematical functions and models, dealing with limits, derivatives, integrals, and infinite series.
5. **Statistics:** The study of data collection, analysis, interpretation, presentation, and organization.
6. **Number Theory:** The study of properties and relationships of numbers, especially the integers.
7. **Topology:** The study of properties that remain constant through continuous deformations, such as stretching and bending, but not tearing or gluing.
8. **Applied Mathematics:** Uses mathematical methods and reasoning to solve real-world problems in business, science, engineering, and other fields.
Mathematics is both ancient and modern; it has a rich history stretching back thousands of years, yet it continues to develop and evolve today, with new theories, discoveries, and applications constantly emerging. It is both a rigorous discipline in its own right and an essential tool used throughout the sciences and beyond.
## Pure and Applied Mathematics
Pure mathematics and applied mathematics represent two broad categories within the field of mathematics, each with its focus, methodologies, and applications. The distinction between them lies in their primary objectives and the way mathematical theories are utilized.
[[Attachments/01233372a59d2dc17b937c38319d672f_MD5.jpeg|Open: Pasted image 20240405125055.png]]
![[Attachments/01233372a59d2dc17b937c38319d672f_MD5.jpeg]]
#### Pure Mathematics
Pure mathematics is concerned with the study of mathematical concepts independent of any application outside mathematics. It is motivated by a desire to understand abstract principles and the properties of mathematical structures. The pursuit in pure mathematics is knowledge for its own sake, not necessarily aiming to find immediate practical applications. Pure mathematicians often focus on proving theorems and exploring theoretical frameworks, driven by curiosity and the aesthetic appeal of mathematics itself.
Key areas within pure mathematics include:
- **Algebra:** The study of symbols and the rules for manipulating these symbols.
- **Geometry:** The investigation of the properties of space and figures.
- **Analysis:** The rigorous formulation of calculus, focusing on limits, continuity, and infinite series.
- **Number Theory:** The study of the properties of numbers, particularly integers.
- **Topology:** The study of properties preserved through deformations, twistings, and stretchings of objects.
#### Applied Mathematics
Applied mathematics, on the other hand, is focused on the development and practical use of mathematical methods to solve problems in other areas, such as science, engineering, technology, economics, business, and industry. Applied mathematics is deeply connected with empirical research and the application of mathematical models to real-world situations. It involves the formulation, study, and use of mathematical models and seeks to make predictions, optimize solutions, and develop new approaches based on mathematical theory.
Key areas within applied mathematics include:
- **Differential Equations:** Used to model rates of change in applied contexts.
- **Statistics and Probability:** The study of data, uncertainty, and the quantification of the likelihood of events.
- **Computational Mathematics:** The use of algorithmic techniques for solving mathematical problems more efficiently, especially those that are too large for human numerical capacity.
- **Mathematical Physics:** The application of mathematics to solve problems in physics and the development of mathematical methods for such applications.
## Is Mathematics discovered or Invented
The question of whether mathematics is discovered or invented is a philosophical one that has sparked debate among mathematicians, philosophers, and scientists for centuries. Both viewpoints offer compelling arguments, and the distinction often hinges on one's perspective on the nature of mathematical objects and the universality of mathematical truths.
<iframe title="Is math discovered or invented? - Jeff Dekofsky" src="https://www.youtube.com/embed/X_xR5Kes4Rs?feature=oembed" height="113" width="200" allowfullscreen="" allow="fullscreen" style="aspect-ratio: 1.76991 / 1; width: 100%; height: 100%;"></iframe>
### Mathematics as Discovered
Those who argue that mathematics is discovered believe that mathematical truths exist independently of human thought and that mathematicians uncover these truths through investigation and reasoning. This viewpoint suggests that mathematical concepts like numbers, geometrical shapes, and even more abstract ideas have a reality that transcends human invention. The consistency of mathematical laws across cultures and times, and their applicability in accurately describing the natural world, supports the notion that mathematics is a universal truth waiting to be discovered. According to this perspective, mathematical structures exist in some abstract realm, and humans merely uncover aspects of this pre-existing world.
#### Mathematics as Invented
On the other hand, the viewpoint that mathematics is invented centers on the idea that mathematical concepts are human creations, designed to describe and understand the world. According to this perspective, mathematical theories and structures are the products of human thought, created to serve specific purposes in science, engineering, and other fields. This view emphasizes the role of creativity and invention in the development of mathematical ideas, suggesting that different cultures or species might develop entirely different mathematical systems depending on their needs and experiences. Proponents of this view point to the variety of mathematical systems (such as different geometries or number systems) that have been invented to solve particular types of problems, arguing that this diversity is evidence of mathematics being a human invention.
#### A Middle Ground
Some argue for a middle ground, suggesting that while the basic elements of mathematics are discovered, the development of complex mathematical theories and the choice of which aspects to study or develop further involve human invention and creativity. This perspective acknowledges the intrinsic properties of mathematical objects while also recognizing the role of human ingenuity in shaping the field of mathematics.
#### Conclusion
The debate between discovery and invention in mathematics may never be conclusively resolved, as it touches on deep philosophical questions about the nature of reality and the human mind's relationship to it. Whether one views mathematics as discovered or invented often reflects deeper beliefs about the world and our place within it.
## Axioms
a particular mathematical system or theory. They serve as the foundational building blocks from which theorems and other mathematical truths are derived. Axioms are assumed to be self-evident, and their selection is based on their ability to produce a coherent and logically consistent framework for a body of mathematical knowledge.
In the context of different branches of mathematics, axioms can vary significantly:
- **In Euclidean geometry,** one of the most famous sets of axioms are Euclid's postulates, which include statements like "A straight line segment can be drawn joining any two points," and "All right angles are congruent."
- **In algebra,** the field axioms define the properties of operations like addition and multiplication over sets of numbers.
- **In set theory,** Zermelo-Fraenkel axioms (with the Axiom of Choice) are a set of axioms used to establish a foundation for much of modern mathematics.
The role of axioms has evolved throughout the history of mathematics. Initially, they were considered self-evident truths, but as mathematics has developed, the emphasis has shifted to viewing axioms more as arbitrary starting points chosen for their usefulness in building a mathematical theory. This shift allows for the creation of different, sometimes non-intuitive, mathematical frameworks such as non-Euclidean geometries, which arise from altering Euclid's original postulates.
**Everything in maths is constructed based on Axioms, not observation of the scientific method!** It's based only on the human logic reasoning. **And the universe doesn't five a fuck to fit inside human logic reasoning.**
<iframe title="The paradox at the heart of mathematics: Gödel's Incompleteness Theorem - Marcus du Sautoy" src="https://www.youtube.com/embed/I4pQbo5MQOs?feature=oembed" height="113" width="200" allowfullscreen="" allow="fullscreen" style="aspect-ratio: 1.76991 / 1; width: 100%; height: 100%;"></iframe>
## Mathematics is not a Science
Mathematics and science are deeply interconnected, but they are distinguished by their fundamental approaches, methodologies, and objectives. The distinction between mathematics as a formal science and other natural or empirical sciences like physics, biology, and chemistry lies in the nature of their inquiry and validation methods.
**Maths doesn't need to prove itself through the scientific method, it only needs axioms, logic, and previous definitions.**
- **Mathematics:** Uses deduction as a primary tool. Starting from axioms and definitions, mathematicians use logical reasoning to derive theorems and propositions. The validity of mathematical statements is determined through proofs, which are arguments that demonstrate their truth within the context of axiomatic systems.
- **Science:** Employs the scientific method, which involves hypothesis formation, experimentation, observation, and the modification of hypotheses based on empirical evidence. Scientific theories and laws are validated by their ability to predict and explain phenomena in the natural world, and they are always subject to revision in light of new evidence.
### Objectives
- **Mathematics:** Aims to create a coherent set of rules and structures that can explain and predict outcomes within abstract systems. Its primary goal is not to describe the physical world but to explore the properties and possibilities of mathematical structures.
- **Science:** Aims to understand and describe the universe. The goal is to produce a body of knowledge that explains natural phenomena and can predict outcomes based on empirical evidence.
In summary, while mathematics is often used as a tool in science to model and solve problems, its focus on abstract reasoning and logical proof distinguishes it from the empirical methodologies of the natural sciences. This fundamental difference in approach and objective is why mathematics is considered a formal science or a branch of knowledge distinct from natural or physical sciences, which are based on empirical evidence and experimental validation.
-

@ fc481c65:e280e7ba
2025-02-22 22:09:56
Starting with the basics, #statistics is a branch of #mathematics that deals with collecting, analysing, interpreting, presenting, and organising #data. It provides a way to make sense of data, see patterns, and make decisions based on data analysis. Here's a brief overview of some fundamental concepts in statistics:
### 1. Types of Statistics
- **Descriptive Statistics**: Involves summarising and organising data so it can be easily understood. Common measures include mean (average), median (middle value), mode (most frequent value), variance (measure of how spread out numbers are), and standard deviation (average distance from the mean).
- **Inferential Statistics**: Involves making predictions or inferences about a population based on a sample. This includes hypothesis testing, confidence intervals, and regression analysis.
### 2. Types of Data
- **Qualitative Data** (Categorical): Data that describes qualities or characteristics that cannot be measured with numbers, such as colors, names, labels, and yes/no responses.
- **Quantitative Data**: Data that can be measured and expressed numerically, including age, height, salary, and temperature. It can be further divided into discrete data (countable items, like the number of students in a class) and continuous data (measurable items, like height).
### 3. Measures of Central Tendency
- **Mean**: The average of a data set, found by adding all numbers and dividing by the count of numbers.
- **Median**: The middle value when a data set is ordered from least to greatest; if there’s an even number of observations, it is the average of the two middle numbers.
- **Mode**: The most frequently occurring value in a data set.
### 4. Measures of Spread
- **Range**: The difference between the highest and lowest values in a data set.
- **Variance**: Measures how far each number in the set is from the mean and thus from every other number in the set.
- **Standard Deviation**: The square root of the variance, providing a measure of the spread of a distribution of values.
### 5. Probability
Probability measures the likelihood of an event occurring, ranging from 0 (impossible) to 1 (certain). Understanding probability is essential for inferential statistics and making predictions based on data.
### 6. Sampling and Data Collection
- **Population**: The entire group that you want to draw conclusions about.
- **Sample**: A subset of the population, selected for the actual study. It’s crucial for the sample to be representative of the population to make accurate inferences.
### 7. Hypothesis Testing
This is a method of making decisions or inferences about population parameters based on sample statistics. It involves:
- Formulating a null hypothesis (no effect) and an alternative hypothesis (some effect).
- Calculating a test statistic based on the sample data.
- Using the test statistic to decide whether to reject the null hypothesis in favor of the alternative.
-

@ b8af284d:f82c91dd
2025-02-25 08:11:32
Liebe Abonnenten,
*„The Fourth Turning“ ist ein epochemachendes wie hellseherisches Buch von William Strauss und Neil Howe. Es erschien 1997 mit der These, wonach Geschichte in Zyklen von 80 bis 100 Jahren verlaufe. Jede Gesellschaft durchlaufe vier Phasen („Turnings“): **High, Awakening, Unraveling und Crisis**. Nach der Crisis kommt es zum „Fourth Turning“ - welches die Autoren in den Jahren 2020 bis 2030 prophezeiten. Das klingt nach esoterischer Science-Fiction-Literatur, ist es aber nicht: Der mittlerweile verstorbene Strauss war Historiker, Howl ist Ökonom. In „The Fourth Turning“ argumentieren sie demnach weitgehend wissenschaftlich. Die Argumentation hier wiederzugeben, würden den Rahmen sprengen. Aber nur soviel: Wir sind mittendrin. Abseits des turbulenten Tagesgeschehens beginnt sich, eine neue Finanzordnung abzuzeichnen.*

Musk und sein “[Department of Government Efficiency](https://x.com/DOGE)” drehen gerade jeden Stein um, den sie finden können. Alle Ausgaben der Regierung kommen auf den Prüfstand.
Deswegen wurden sämtliche Zahlungen an die vermeintliche Entwicklungshilfe-Organisation USAID gestrichen. In die meisten Leitmedien schafften es nur Meldungen, wonach nun [Projekte zur Förderung von Beschneidungen in Mozambique und Biodiversität in Nepal ](https://x.com/DOGE/status/1890849405932077378)kein Geld mehr erhalten. Weniger war davon zu lesen, dass USAID als Deckorganisation für die CIA funktionierte und zum Beispiel[ die Forschung an pathogenen Corona-Viren in China](https://www.washingtonexaminer.com/news/486983/usaid-wont-give-details-on-4-67-million-grant-to-wuhan-lab-collaborator-ecohealth-alliance/) mit 4,6 Millionen finanzierte. Auch mit dabei: [2,6 Millionen Dollar an ein Zensur-Programm namens “Center for Countering Digital Hate (CCDH](https://x.com/AllumBokhari/status/1892027594666541412))” und vieles mehr: eine gute Übersicht findet man hier auf der [Website des Weißen Haus](https://www.whitehouse.gov/fact-sheets/2025/02/at-usaid-waste-and-abuse-runs-deep/)’. Die Einsparungen sind so hoch aktuell rund neun Milliarden US-Dollar, das darüber nachgedacht wird, einen Teil der Steuergelder wieder an die Bürger zurückzuzahlen: [Die “DogeDividend” könnte bei 5000$ pro Kopf liegen](https://x.com/DeItaone/status/1892182305487097877). (Wer sich noch an den Covid-Stimulus in Höhe von 1200$ erinnert, weiß, welche Rally die Zahlungen 2020 auslösten).
Der Kassensturz umfasst aber längst nicht nur USAID, sondern betrifft sämtliche Staatsausgaben. Sämtliche Ausgaben und Vermögenswerte der USA werden erfasst und hinsichtlich ihrer Nützlichkeit überprüft.
Im Rahmen von DOGE ließ Elon Musk kürzlich fragen, ob es nicht mal Zeit für eine Zählung der Gold-Reserven wäre. In Fort Knox, das die meisten wahrscheinlich aus James-Bond-Filmen oder Donald-Duck-Comics kennen, lagern mindestens 4800 Tonnen Gold - über die Hälfte der amerikanischen Reserven. Das heißt: Niemand weiß genau, wie viel es eigentlich sind. Die letzte Inventur fand 1953 statt.
Dasselbe gilt für die Zahlungen in die Ukraine. Mindestens 270 Milliarden US-Dollar haben die USA an Kiew gezahlt. Das Resultat: vermutlich über eine halbe Million Tote, ein völlig zerstörtes Land und ein korruptes System.
Nach der Rede von JD Vance bei der Münchener Sicherheitskonferenz ist Europa erst einmal in Schnappatmung gefallen. Am Dienstag darauf folgten zum ersten Mal seit Jahren direkte Gespräche zwischen Moskau und Washington in Saudi-Arabien. Europäer waren nicht eingeladen, die hielten stattdessen ein Krisentreffen in Paris ab.

Innerhalb der EU wird jetzt von einem neuen Militärfonds gefaselt, um die größte Aufrüstung des Kontinents seit 1933 zu finanzieren. [700 Milliarden Euro soll der umfassen, finanziert durch Steuererhöhungen](https://www.berliner-zeitung.de/wirtschaft-verantwortung/baerbock-verplappert-sich-nach-der-wahl-milliarden-fuer-ukraine-li.2295623), da ja der Schutz der USA jetzt wegfalle. Man kann nur hoffen, dass die EU-Bürokratie zusammen mit Selenski nicht auf die Idee kommt, den Krieg allein weiterzuführen oder den Friedensprozess zu sabotieren.
Vielen dürfte allerdings klar sein, dass sich demnächst etwas grundsätzlich ändern wird. Die Trump-Administration ordnet die Welt neu, und damit auch die globale Finanzarchitektur. Was hat es damit auf sich? Und worum geht es eigentlich?
Zur Erinnerung: Mit dem Beitritt Chinas zur Welthandelsorganisation 2001 wurde die industrielle Basis der USA nach und nach ausgehöhlt. Chinesische Waren waren billiger - und so verlagerten sich immer mehr Industrien nach China. Deutschland profitierte relativ länger von dieser Entwicklung, da die Automobilindustrie wettbewerbsfähiger war und deutsche Maschinenbauer chinesische Fabriken ausstatteten.
\
Trump 1 versuchte diese Entwicklung mit Zöllen zu unterbinden. Bei Trump 2 geht es um mehr. Zölle sind nur noch die vorübergehende Waffe, die Ziele durchzusetzen. Ziel ist ein schwächerer Dollar.

Eine starke Währung klingt nett, bedeutet aber nichts anderes, als dass Importe aus anderen Ländern günstiger sind und Exporte in andere Länder vergleichsweise teurer sind. Eine schwächere Währung heißt dagegen, dass Exporte günstiger und damit wettbewerbsfähiger sind. Ein starker Dollar behindert deswegen den (Rück-)Aufbau der amerikanischen Industrie. Allerdings ist das eben auch genau der Preis, den ein Land für eine Leit- oder Reserve-Währung zahlen muss. Weil die Welt mit US-Dollar bezahlt - auch ein mexikanisches Unternehmen, das mit einem chinesischen handelt, wickelt das mit Dollar ab - ist die Nachfrage nach US-Dollar hoch, und die Währung damit stark:
> *From a trade perspective, the dollar is persistently overvalued, in large part because dollar assets function as the world’s reserve currency. This overvaluation has weighed heavily on the American manufacturing sector while benefiting financialized sectors of the economy in manners that benefit wealthy Americans.*
Die USA zahlten indirekt für dieses Privileg, indem sie es sich zur Aufgabe machten, internationale Handelswege zu schützen. Die US-Marine übernahm nach 1945 und besonders nach 1989 den Job der British Royal Navy, und bewacht seitdem alle wichtigen Schifffahrtswege weltweit, um freien Handel zu ermöglichen.
\
*The U.S. dollar is the reserve asset in large part because America provides stability, liquidity, market depth and the rule of law. Those are related to the characteristics that make America powerful enough to project physical force worldwide and allow it to shape and defend the global international order. The history of intertwinement between reserve currency status and national security is long.*

Das System funktionierte auch deswegen, weil die allermeisten, befreundeten Staaten, ihr Überschüsse wieder in US-Dollar-Anleihen anlegten (US-Treasuries). Dieses Recycling aus “Amerikaner konsumieren und zahlen mit US-Dollar, die China, Japan und die EU wiederum in US-Anleihen anlegen” funktionierte lange gut.
Das Problem ist seit einigen Jahren: Die Situation hat sich zuungunsten der USA verschoben. Man zahlt viel für das Militär, aber die Gewinne, die sich aus einer Leitwährung ergeben, sind gefallen. Kurz gesagt: Das Verteidigungsbudget wächst, während Arbeitsplätze verloren gegangen sind. Zwar konnten sich die USA in den vergangenen Jahren günstiger als andere verschulden. Trotzdem erdrückt die Schuldenlast mittlerweile den Etat, und immer weniger Staaten haben Lust, ihre Reserven in US-Treasuries anzulegen. Sie kaufen lieber Gold (und vielleicht auch bald Bitcoin).

Eine Neugewichtung des Deals ist notwendig. Daher der Kassensturz. Daher die ständigen Aufforderungen Trumps an Verbündete, künftig mehr zu zahlen.
Die Lösung könnte ein „Mar-a-Lago“-Accord sein. Die USA befanden sich in den 1980er Jahren schon einmal in einer ähnlichen Situation: Japanische und deutsche Waren überschwemmten die amerikanischen Märkte. Nach einem verlorenen Krieg in Vietnam und hoher Inflation hatten sich innerhalb Gesellschaft große Spannungen aufgebaut. Ronald Reagan, übrigens ein Präsident, der ähnlich polarisierte wie Trump heute, sprach 1985 Klartext: Japan und in geringerem Maße die BRD, Frankreich und Großbritannien hatten ihre Währungen aufzuwerten. Damit wurde die Flut der Exporte in die USA gestemmt und die Finanzflüsse stabilisiert.
Seit einigen Wochen gibt es relativ klare Pläne, wie diese neue Ordnung aussehen soll. Sie gehen zurück auf den Ökonomen Steve Miran, der bereits unter der ersten Trump-Administration eine Berater-Rolle hatte. Seit Dezember 2024 ist der Vorsitzender des Council of Economic Advisers. Miran wiederum steht [Zoltan Pozsar nahe, der 2022/23 zum Shooting Star der Macro-Economy-Nerds wurde](https://www.finews.ch/themen/guruwatch/58206-zoltan-pozsar-ex-uno-plures-resarch-dollar-zinsen-bretton-woods-ungarn). Worum geht es?
Weiter geht es auf <https://blingbling.substack.com/p/der-mar-a-lago-accord>
-

@ df478568:2a951e67
2025-02-22 20:29:43

I shop the bitcoin circular economy as much as I can. Maybe "shop" isn't the best way to describe it. Shopping is a behavior typical of fiat maxis. they drive fancy leases and shop 'till they drop. This season's fashion must-have is next season's trash. Bitcoiners don't shop, we replenish supplies. Our goal is to get the best value for our sats. Our goal to hodl our sats as long as possible.
Yesterday, I shoveled a [ton of compost](nostr:nevent1qvzqqqqqqypzph68s45y080zdd9g8sdacnd6kcd4ejpwrgcju2eghjq45y4f28n8qqs24rrm3u2wvf24ad8xkj2xh8nuq2lz7urnd3lzrpqlstmsp4r29hsug39jw) for my garden. If taking showers mean's I', short bitcoin, so be it. I also happened to get my soap from Soapminer delivered to my P.O. Box the day before. What better way is there to test this soap than after shoveling some shit? It was perfect timing.
## Soapminer Sells Soap Made From Beef Tallow
Soapminer is a nostr rounder I've seen online every timestamp in a while. As the name suggests, he makes soap and sells it for sats. He's not the only soap seller on nostr, but something stands out about this soap. He uses beef tallow, the stuff McDonald's used for french fries back in the day. I use it to cook. It's basically beef lard.
So this pleb makes soap and markets it to people who talk about beef and bitcoin. That's better than Fight Club. Then [I heard Matt Odell say it was pretty good](https://fountain.fm/clip/6GHDdmcwMg47mz0xNpVb). I already thought about spending sats on this soap, but now I had a testimonial from a man I have listened to for about six years. **Can you say Web of Trust baby?**
I no soap and suds expert. I have years of soapo sing experience, but I never thought about what commercial soap is made with. I assumed it was like Fight Club like how I assumed the dollar was backed by gold in high school. Both these statements are false. Fiat soap is made with fiat fuckery. I tried looking for the ingredients on a box of Dove Men's Care, but couldn't find them on the box. It's opaque like the amount of gold at Fort Knox, nobody knows. I know what Soapminer uses to make his soap because [it's open source](nostr:note1aypyepc6g7lztutegx0fw5yg5clc9ythvxkp6czfkau3dcgwz06q4mfqr3).
### Tallow Soap Quotes
I asked Soapminer a few questions on nostr. You can find his answer here:
nostr:nevent1qvzqqqqqqypzqy9kvcxtqa2tlwyjv4r46ancxk00ghk9yaudzsnp697s60942p7lqy88wumn8ghj7mn0wvhxcmmv9uq3xamnwvaz7tmsw4e8qmr9wpskwtn9wvhszxrhwden5te0wa3nztnrw4e8yetwwshxu6twdfsj7qpqh7mqlhn392ekrg6nm33pjjquu0dww27tqv3qjduyag4u20er0tcqd2waxl
**That's the link that shows it was signed by his own nostr key, the Internet's version of "I approve this message."**

**Soapminer:**
`What inspired me was a cleaner, healthier lifestyle. During the plandemic, I had a lot of free time on my hands, and got to read, and investigate what actually causes a lot of the sickness in society. I learned a great deal. I never knew that your skin is your largest organ, and that it absorbs 60-70% of what you put on it. What do ppl put on their skin almost every day? Soap. So out of boredom, and seeking a healthier lifestyle, I started watching YT videos of ppl making soap, and tried it out a few times, and then a few more, until I became good at it.
Once you learn how to make soap, the challenges only arise when you try something that you haven't done before. Depending on what method you are using will determine the challenges that you may face. It's multifaceted, so might be a little long to go into. I overcome them by keep trying until I get it right. No path is going to be easy, you just have to practice to make perfect.
Last question is easy. My favorite soap is Tallow soap. As long as it is made from Tallow, and has all natural ingredients, it is a good soap in my opinion. Tallow mirrors the oils in our skin. It doesn't strip you skin the way commercial soap do, leaving you feel itchy, dry, and actually causing some of the skin ailments that have become common, like eczema, and psoriasis. Just nutures, cleans, and protects. It also, can prevent wrinkles., and acne.`
**Sold!**

I tried the pine tar first. It makes me smell like a man, at least my wife thinks so. That's also why she prefers the unscented. He is adding more scents, but these ate the one's I have tried.
The soap makes me feel rubber-ducky squeaky clean. After my shower, made some lunch and washed my hands with Dawn. **This made my hands ashier than bio-char**. I decided to cut some soap and place a little piece by the kitchen sink. The soap moisturized my hands in two shakes of a bull's tail. I also cut up some of my soap into smaller pieces because I'm as frugal as a Boy-scout and wanted to wash my hands with this stuff instead of Ivory. **Who wants a clean as real as Ivory? It's only 99.44% pure. Soap miner is 100% pure bitcoin signal.

#### Here's some more quotes about Soapminer's soap.
- [He's asking his market if they want Peppermint soap.](nostr:note1tpeh65m7y6s6wt9ucjdcl2pge3m86f2ny4hqjdyvcrmf7kglqshqfeceam "nostr:note1tpeh65m7y6s6wt9ucjdcl2pge3m86f2ny4hqjdyvcrmf7kglqshqfeceam)
- [Then he made the soap like a boss](nostr:nevent1qvzqqqqqqypzqy9kvcxtqa2tlwyjv4r46ancxk00ghk9yaudzsnp697s60942p7lqqs0yqyvffu9pn39grtxa8agpftpvfssx603w0ra67kpn5qn360masquhrtd7).
- [The Benefits of Tallow](nostr:nevent1qqs9w6g8khrqzhrgu7y3trae9vtdl8847p42p80aqzvsvlu9kr84vkgpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsyg8zenmu7gzq8ulj5jj4kv50ph3muwz43f747vmr9ld2alrjdswgavpsgqqqqqqsq5lkzq)
- [He uses Zaprite](nostr:nevent1qvzqqqqqqypzqjln5vfhstwf2ahjrmanh57kzwrap4v3xpfzql5sxp48gxlk4a74qqsraadvah6890x4hgvr4rcxe9c2n79a0kx88te3hf7x88j72rh7cuskhempa)
[He has giveaways](nostr:nevent1qvzqqqqqqyqzpzvke2t7fxwh0rzea5zmx7qnddzgsqk35ujp9tgpw9jmjsmnserr3z8466)
[He wants everyone to live on a bitcoin standard](nostr:nevent1qvzqqqqqqypzqy9kvcxtqa2tlwyjv4r46ancxk00ghk9yaudzsnp697s60942p7lqqs8gnddcnkj5p2047qam5drgw5jxlg60vy736e2rwxsmj593whnllsy8ej9j)

### Testimonials

nostr:note1y9wsl07lkepfzzj8c8ucekss9f9darvg70j93cdmvttadfjx9nfsvtxwes
**The LOTSProject8**

nostr:nevent1qvzqqqqqqypzqy9kvcxtqa2tlwyjv4r46ancxk00ghk9yaudzsnp697s60942p7lqqsxt8kyd650ph3wvhre0lwlw5s0emuv5gcfzmsvfxf7czgg4c2wynq7vg8ga
**GhostBTC**:

nostr:npub1cm3v486tkgy6qjtk09srry4qvc40y0jysyqha5e3v67whnc22jwsrreyud
**Tuvok**

**Bit 🐳 Ish**

["It's good stuff, you'll love it."](nostr:nevent1qvzqqqqqqypzpr38l76unwuvm5qnrt0xa7jf64k5qx65ynvlm7dx8cr565nmqu2uqqs2r7rcp2rssfcqhk5838cuu569h43wlkvw34gy8ad2flgdpl0cezckxghkc)
**cryptoshi2k21.bitcoin**

["Great soap 🧼🫧"](nostr:nevent1qvzqqqqqqypzqj5nelekm4aruughza09y8yy26ansshnc23wq2kdha79dqz8rhemqqsxdq4xf69vgk27nnes4syrnekpg4mhkp6v4rer7nzdgfht8kya8ssucu8lz)
**Me**

["I spent the last two days shyoveling horse shit and compost for my garden. This soap made me feel rubber-ducky squeeky clean afterward."](nostr:nevent1qvzqqqqqqypzph68s45y080zdd9g8sdacnd6kcd4ejpwrgcju2eghjq45y4f28n8qqsfvqylk56zdh5n3ykhleypr5zznevqt9dw04vptdeuh9jmskemndgq0hw25)
##### Conclusion
I am a soap mining soap customer now. I'm done with fiat soap. I'm thinking about handing out his soap for Christmas gifts. Odell was right. It is good soap. It's expensive compared to the comercial crap, but competitive with fancy olive oil soaps I've seen. I paid with fiat I had in Strike, but Soapminer received bitcoin. I was going to buy soap anyway, but buying soap this way took $35 of fiat off Strike and put it into soap miners strategic bitcoin reserve. It's not cheap, but buying Dove requires me to first buy fiat. Buying soap from Soapminer takes sats off the exchange. Buying Dove does not, but that's not the only reason I bought this soap. It's great soap, but that's not really why I bought it. I am a big believer in what Adam Smith described as the invisible hand: [nostr:note1jsgzk6rxulyqthae8c53rrawaa70yjqh37nm3kxh08xw8g43vgcq3kux9d "nostr:note1jsgzk6rxulyqthae8c53rrawaa70yjqh37nm3kxh08xw8g43vgcq3kux9d"). We want to see people in our community to prosper. It is in our self-interest That is what Smith means by the invisible hand. The invisible hand is not A Central Bank manipulating interest rates and The IMF turning foreigners into debt-fiat slaves for cheap freshly-frozen shrimp.
Bitcoiners are my community. They may not be close to me by proximity, but my moral sentiments guide me to do business with bitcoiners whenever possible. See, capitalism cannot work with socialist money. Those moral sentiments change when people work for soft money. Fiat soap miners get paid in NGD currency. Sell soap for $35 today and that will buy you half as much stuff in 5 years. The fiat soap miner has no savings to improve his community. Inflation makes him search for the cheapest soap just to keep up with grocery prices.

Soapminer can save his sats earned selling soap without anyone stealig from him. Therefore, he will be able to afford to buy stuff in his community. Those on a fiat standard cannot afford to save their money in the hopes of buying high quality products and services in their community. Fiat is socialist money, therefore only buys less and less as time goes on. Dear readers, we are not on late stage capitalism. The problem is that socialist money sucks. Those Papi Trump bucks might be fun for a month, but in the end, everyone pays the Piper. Tariffs are a sales tax, [paywalls in meatspace](nostr:nevent1qvzqqqqqqypzph68s45y080zdd9g8sdacnd6kcd4ejpwrgcju2eghjq45y4f28n8qyt8wumn8ghj7mn0wd68yetvd96x2uewdaexwtcpzemhxue69uhhyetvv9ujumt0wd68ytnsw43z7qg4waehxw309ajxjar5duh8qatz9aex2mrp0yqzqx3u59js9ewy9xwr7nuzv5eytj9ty979wrc7vrhv3tfykjxp5pd28s750n). Save your sats long enough, and these taxes will not matter. We circumvent the unjust tax of inflation, we will find solutions to unjust taxes levied on our community.
I participate in the bitcoin circular economy because I want to bring capitalism back. I do not care where you live. If you are a bitcoiner, you are part of my community. There is an invisible hand which compels me to buy stuff from people in my community. That's why I bought soap from Soapminer, but you know what? **the soap is pretty damn good**.
npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
[884,861](https://mempool.marc26z.com/block/00000000000000000001dd2088c2c20508d768455d6c29cd6b33d2a69912cafb)
[Merch](https://marc26z.com/merch)
-

@ f3873798:24b3f2f3
2025-02-22 20:17:18

Nos últimos anos, temos observado um aumento significativo nos casos de ansiedade, estresse e outros transtornos mentais. O ambiente de trabalho, especialmente no mundo cooperativo e corporativo, desempenha um papel central nesse cenário. Mas qual é a relação entre a estrutura do mercado de trabalho moderno e o crescimento dessas questões de saúde mental?
O Impacto da Cultura Cooperativa na Saúde Mental

O modelo cooperativo atual valoriza, acima de tudo, a produtividade e o cumprimento de metas rígidas. A exigência por resultados rápidos e desempenho excepcional impõe um ritmo de trabalho desumano, levando muitos profissionais à exaustão física e emocional. A pressão constante para atender expectativas impossíveis cria um ambiente hostil, contribuindo para o aumento de diagnósticos como ansiedade, depressão e burnout.
Além disso, a falta de liberdade e flexibilidade no mercado de trabalho faz com que muitos talentos sejam desperdiçados. Profissionais que poderiam inovar e criar novas oportunidades acabam se tornando apenas mais um número em grandes empresas ou no funcionalismo público, muitas vezes por falta de opções. Esse aprisionamento profissional gera frustração, baixa autoestima e até transtornos psicológicos severos.
A Evolução das Demandas e a Intensificação da Pressão

Antigamente, a busca por estabilidade em cargos públicos ou em grandes corporações era comum, mas a pressão e a exigência por resultados eram diferentes. Com o avanço da tecnologia e a digitalização dos processos, a demanda por eficiência aumentou exponencialmente. Hoje, a velocidade imposta pelo mercado ultrapassa os limites humanos, tornando o ambiente de trabalho ainda mais opressor.
Essa realidade não apenas compromete a saúde mental dos profissionais, mas também reflete no comportamento social. O estresse crônico e a frustração acumulada podem levar a episódios de agressividade, intolerância e impaciência, impactando diretamente a convivência em sociedade. O crescimento de casos de violência no trânsito, agressões em ambientes de atendimento e até mesmo crimes por motivos fúteis pode estar ligado a esse fenômeno.
O Caminho para um Mercado de Trabalho Mais Saudável

Para minimizar esses impactos, é fundamental promover maior liberdade econômica e oportunidades para pequenos empreendedores. Reduzir a dependência de grandes empresas e cooperativas pode permitir que mais pessoas encontrem satisfação profissional e desenvolvam suas vocações sem a pressão excessiva por metas irreais.
Empreendimentos menores tendem a oferecer um ambiente de trabalho mais humanizado, onde as metas são ajustadas conforme a capacidade de produção de cada indivíduo. Dessa forma, os profissionais podem atuar de maneira mais saudável e equilibrada, reduzindo os índices de transtornos mentais e promovendo uma sociedade mais harmoniosa.
-

@ 57d1a264:69f1fee1
2025-02-25 07:28:18

@Voltage team will be building a simple implementation of a Lightning gated API service using a Voltage LND Node and the L402 protocol.
📅 Thursday, February 27th 4:00 PM CDT
📷 Live on Voltage Discord, on X, or on YouTube.
- discord.gg/EN93fDfQ
- https://x.com/voltage_cloud/status/1892938201980919985
- https://www.youtube.com/@voltage_cloud
originally posted at https://stacker.news/items/896373
-

@ b8851a06:9b120ba1
2025-02-22 19:43:13
The digital guillotine has fallen. The Bybit hack wasn’t just a theft—it was a surgical strike exposing the fatal flaw of “crypto” that isn’t Bitcoin. This wasn’t a bug. It was a feature of a system designed to fail.
Here’s how North Korea’s Lazarus Group stole $1.5B in ETH, why “decentralized finance” is a joke, and how Bitcoin remains the only exit from this circus.
## I. The Heist: How Centralized “Crypto” Betrayed Its Users
### A. The Multisig Mousetrap (Or: Why You’re Still Using a Bank)
Bybit’s Ethereum cold wallet used multisig, requiring multiple approvals for transactions. Sounds secure, right? Wrong.
• The Con: Hackers didn’t pick the lock; they tricked the keyholders using a UI masking attack. The wallet interface showed “SEND TO BYBIT”, but the smart contract was whispering “SEND TO PYONGYANG.”
• Bitcoin Parallel: Bitcoin’s multisig is enforced on hardware, not a website UI. No browser spoofing, no phishing emails—just raw cryptography.
Ethereum’s multisig is a vault with a touchscreen PIN pad. Bitcoin’s is a mechanical safe with a key only you hold. Guess which one got robbed?
### B. Smart Contracts: Dumb as a Bag of Hammers
The thieves didn’t “hack” Ethereum—they exploited its smart contract complexity.
• Bybit’s security depended on a Safe.global contract. Lazarus simply tricked Bybit into approving a malicious upgrade.
• Imagine a vending machine that’s programmed to take your money but never give you a soda. That’s Ethereum’s “trustless” tech.
Why Bitcoin Wins: Bitcoin doesn’t do “smart contracts” in the Ethereum sense. Its scripting language is deliberately limited—less code, fewer attack vectors.
Ethereum is a Lego tower; Bitcoin is a granite slab. One topples, one doesn’t.
## II. The Laundering: Crypto’s Dirty Little Secret
### A. Mixers, Bridges, and the Art of Spycraft
Once the ETH was stolen, Lazarus laundered it at lightspeed:
1. Mixers (eXch) – Obfuscating transaction trails.
2. Bridges (Chainflip) – Swapping ETH for Bitcoin because that’s the only exit that matters.
Bitcoin Reality Check: Bitcoin’s privacy tools (like CoinJoin) are self-custodial—no third-party mixers. You keep control, not some “decentralized” website waiting to be hacked.
Ethereum’s “bridges” are burning rope ladders. Bitcoin’s privacy? An underground tunnel only you control.
### B. The $1.5B Lie: “Decentralized” Exchanges Are a Myth
Bybit’s “cold wallet” was on Safe.global—a so-called “decentralized” custodian. Translation? A website with extra steps.
• When Safe.global got breached, the private keys were stolen instantly.
• “Decentralized” means nothing if your funds depend on one website, one server, one weak link.
Bitcoin’s Answer: Self-custody. Hardware wallets. Cold storage. No trusted third parties.
Using Safe.global is like hiding your life savings in a gym locker labeled “STEAL ME.”
## III. The Culprits: State-Sponsored Hackers & Crypto’s Original Sin
### A. Lazarus Group: Crypto’s Robin Hood (For Dictators)
North Korea’s hackers didn’t break cryptography—they broke people.
• Phishing emails disguised as job offers.
• Bribes & social engineering targeting insiders.
• DeFi governance manipulation (because Proof-of-Stake is just shareholder voting in disguise).
Bitcoin’s Shield: No CEO to bribe. No “upgrade buttons” to exploit. No governance tokens to manipulate. Code is law—and Bitcoin’s law is written in stone.
Ethereum’s security model is “trust us.” Bitcoin’s is “verify.”
### B. The $3B Elephant: Altcoins Fund Dictators
Since 2017, Lazarus has stolen $3B+ in crypto, funding North Korea’s missile program.
Why? Because Ethereum, Solana, and XRP are built on Proof-of-Stake (PoS)—which centralizes power in the hands of a few rich validators.
• Bitcoin’s Proof-of-Work: Miners secure the network through energy-backed cryptography.
• Altcoins’ Proof-of-Stake: Security is dictated by who owns the most tokens.
Proof-of-Stake secures oligarchs. Proof-of-Work secures money. That’s why Lazarus can drain altcoin treasuries but hasn’t touched Bitcoin’s network.
## IV. Bybit’s Survival: A Centralized Circus
### A. The Bailout: Banks 2.0
Bybit took bridge loans from “undisclosed partners” (read: Wall Street vultures).
• Just like a traditional bank, Bybit printed liquidity out of thin air to stay solvent.
• If that sounds familiar, it’s because crypto exchanges are just banks in hoodies.
Bitcoin Contrast: No loans. No bailouts. No “trust.” Just 21 million coins, mathematically secured.
Bybit’s solvency is a confidence trick. Bitcoin’s solvency is math.
### B. The Great Withdrawal Panic
Within hours, 350,000+ users scrambled to withdraw funds.
A digital bank run—except this isn’t a bank. It’s an exchange that pretended to be decentralized.
Bitcoin fixes this: your wallet isn’t an IOU. It’s actual money.
Bybit = a TikTok influencer promising riches. Bitcoin = the gold in your basement.
## V. The Fallout: Regulators vs Reality
### A. ETH’s 8% Crash vs Bitcoin’s Unshakable Base
Ethereum tanked because it’s a tech stock, not money. Bitcoin? Dropped 2% and stabilized.
No CEO, no headquarters, no attack surface.
### B. The Regulatory Trap
Now the bureaucrats come in demanding:
1. Wallet audits (they don’t understand public ledgers).
2. Mixer bans (criminalizing privacy).
3. KYC everything (turning crypto into a surveillance state).
Bitcoin’s Rebellion: You can’t audit what’s already transparent. You can’t ban what’s unstoppable.
## VI. Conclusion: Burn the Altcoins, Stack the Sats
The Bybit hack isn’t a crypto problem. It’s an altcoin problem.
Ethereum’s smart contracts, DeFi bridges, and “decentralized” wallets are Swiss cheese for hackers. Bitcoin? A titanium vault.
The Only Lessons That Matter:
✅ Multisig isn’t enough unless it’s Bitcoin’s hardware-enforced version.
✅ Complexity kills—every altcoin “innovation” is a security risk waiting to happen.
Lazarus Group won this round because “crypto” ignored Bitcoin’s design. The solution isn’t better regulations—it’s better money.
Burn the tokens. Unplug the servers. Bitcoin is the exit.
Take your money off exchanges. Be sovereign.
-

@ cff1720e:15c7e2b2
2025-02-22 17:45:48
Trumps Antrittsrede, seine Präsidentenerlasse, Personalentscheidungen und Amtshandlungen hatten schon in kurzer Zeit die Konturen der künftigen US-Außenpolitik erkennen lassen. Aber in München sprach der Vizepräsident auf einer bedeutenden Konferenz direkt zu den Europäern, den “Partnern” und “Verbündeten”. Und was er ihnen in aller Deutlichkeit mitteilte, war nichts anderes als eine 180-Grad Kehrtwende zur Politik der Vorgänger-Regierung. Die Botschaft war kein Vorschlag, sondern eine Ansage, die Inhalte sind inzwischen hinlänglich bekannt. Obwohl die Rede erwartungsgemäß mehr als reichlich kommentiert wurde, möchte ich noch einige Aspekte ergänzen, die ich bisher in den Kommentaren vermisst habe.

Im November 1988 wurde die Auslieferung der sowjetischen Zeitschrift “Sputnik” in der DDR gestoppt, was einem Verbot gleichkam. Der Anlaß waren kritische Betrachtungen über Stalin und Berichte über den Hitler-Stalin-Pakt, den es laut DDR-Geschichtsschreibung nicht gab. Es war eine Zensur von Informationen aus dem Land des “großen Bruders”, der Führungsmacht der sozialistischen Welt. Das Diktum “von der Sowjetunion lernen heißt siegen lernen” galt erkennbar nicht mehr. Das war zugleich der Höhepunkt einer ideologischen Entfremdung die 1986 begonnen hatte, als Gorbatschow “Glasnost” (Offenheit) und “Perestroika” (Reformen) einforderte, welche von der vergreisten DDR-Führung als unnötig und gefährlich abgelehnt wurden. Gorbatschow hatte richtig erkannt, dass die sozialistischen Staaten ökonomisch und gesellschaftlich gescheitert waren und ohne Reformen nicht überleben würden. Die Einsicht kam aber zu spät, die DDR kollabierte bereits ein Jahr später an ihrem Reformstau, die UdSSR Ende 1991 trotz der begonnenen Reformversuche.

Die Parallelen sind unverkennbar, eklatante politische Fehler (u.a. Euro seit 2009 und Migration seit 2015) haben die EU-Staaten zunächst zu Sanierungsfällen gemacht, durch die Corona-Politik zu Insolvenzkandidaten. Der Rubikon ist längst überschritten, die Schönwetter-Union ist nicht mehr zu retten. Den Amerikanern ist das klar, daher sind die Reform-Appelle von Vance wohl eher seiner Höflichkeit zuzurechnen. Für die US-Regierung ist die EU bereits jetzt nicht mehr existent, Verträge werden wieder direkt mit den Mitglieds-Staaten getroffen, und in den Ukraine-Verhandlungen ist kein Platz am Verhandlungstisch. Die Themenbereiche bei den Gesprächen in Riad haben aber auch gezeigt, dass Amerikaner und Russen in global-strategischen Dimensionen denken, die Ukraine ist zurecht nur ein Randthema. Die aktuelle Rhetorik europäischer Politiker hingegen ist niveaulos und kleinkariert, man spielt in der 2. Liga, die EU hat sich selbst vom Akteur zum Objekt degradiert.

Was bedeutet das für unsere Zukunft? Und was ist von der neuen US-Führung zu erwarten? Die unsäglichen Diskussionen darüber ob nun Trump und Musk gut oder böse sind, vernebelt nur eine klare Tatsache. Die EU hat keinen Rückhalt mehr vom “großen Bruder”, weder durch die NATO in Sachen Ukraine, noch durch Zensur von Systemkritikern (USAID, BigTech). Letzteres führt zu drei fundamentalen Veränderungen.\
\
1\. Das Narrativ von den “westlichen Werten” ist tot. Auf diesem Axiom der USA basierte die gesamte Propaganda-Maschine, es wurde zur Religion. Nun versuchen gerade Provinzpolitiker wie Pistorius und Habeck mit beschränkten rhetorischen Mitteln zu definieren was “westliche Werte” ohne die USA sind, was mehr für Begeisterung bei Satirikern beiträgt als zur Überzeugung von Tagesschau-Anhängern.\
\
2\. Die Deutungshoheit geht verloren weil immer mehr Publizisten ihr Fähnchen in den sich drehenden Wind hängen, sofern sie noch von Leser-Abos und Werbekunden abhängig sind. Die einsetzende Kakophonie verwirrt die Masse der schlichten Medien-Konsumenten, die über Jahrzehnte auf Nachrichten-Konformität dressiert worden sind. \
\
3\. Weniger Zensur in den sozialen Medien verschafft den kritischen Stimmen mehr Reichweite, “bedrohliche” Meinungsvielfalt entsteht. Leider können die meisten Kritiker aber nur kritisieren, was uns zurück in die Zeiten des Sputnik-Verbots führt.

Die DDR-Opposition hat beim Abriss der DDR mitgewirkt, über diese Rolle ist sie aber nie hinaus gekommen. Als die Mauer gefallen war und es um die Neugestaltung ging, hat sie kläglich versagt. Dem Großteil der heutigen Opposition droht das selbe Schicksal, weil sie keinen Plan für die Stunde Null hat. Bei Tauwetter darf man nicht mehr über den Winter diskutieren, sondern über das Bestellen der Felder. Wer die Saat ausbringt, entscheidet über die Ernte. Den Kollaps betreffend ist nur noch der Zeitpunkt unklar, für den Zeitraum danach jedoch alles. Wenn wir uns eine Bürgergesellschaft wünschen, dann müssen wir jetzt als Bürger aktiv werden, also DU, Leser. Spende für Pareto, oder für kritische Autoren und Aktivisten. Mach Dir Gedanken über die Zukunft und publiziere sie, hier auf Pareto, wir fördern den Bürger-Journalismus. Schließe Dich einem Projekt an, leiste einen Beitrag und gestalte die Zukunft. Macht wird nicht verteilt, Macht muss man sich erkämpfen.\
\
**“Nur der verdient sich Freiheit wie das Leben, der täglich sie erobern muß.”** Goethe, Faust Teil 2
**Spenden für Pareto:** <https://geyser.fund/project/pareto>
**Pareto Landing Page:** <https://pareto.space> 
**Pareto Marktplatz:** <https://pareto.space/read> 
-

@ 6389be64:ef439d32
2025-02-25 05:53:41
Biochar in the soil attracts microbes who take up permanent residence in the "coral reef" the biochar provides. Those microbes then attract mycorrhizal fungi to the reef. The mycorrhizal fungi are also attached to plant roots connecting diverse populations to each other, allowing transportation of molecular resources (water, cations, anions etc).
The char surface area attracts positively charged ions like
K+
Ca2+
Mg2+
NH4+
Na+
H+
Al3+
Fe2+
Fe3+
Mn2+
Cu2+
Zn2+
Many of these are transferred to plant roots by mycorrhizal fungi in exchange for photosynthetic products (sugars). Mycorrhizal fungi are connected to both plant roots and biochar. Char adsorbs these cations so, it stands to reason that under periods of minimal need by plants for these cations (stress, low or no sunlight etc.), mycorrhizal fungi could deposit the cations to the char surfaces. The char would be acting as a "bank" for the cations and the deposition would be of low energy cost.
Once the plant starts exuding photosynthetic products again, signaling a need for these cations, the fungi can start "stripping" the cations off of the char surface for immediate exchange of the cations for the sugars. This would be a high energy transaction because the fungi would have to expend energy to strip the cations off of the char surface, in effect, an "interest rate".
The char might act as a reservoir of cations that were mined by the fungi while the sugar flow from the roots was active. It's a bank.
originally posted at https://stacker.news/items/896340
-

@ 1739d937:3e3136ef
2025-02-22 14:51:17
We've been busy. In my last update, I shared that I was sure MLS on Nostr was going to work and shared an early demo of the app. What a long time ago that seems now.
The big news is that White Noise is no longer just a demo. It's a real app. You can [download the alpha release](https://github.com/erskingardner/whitenoise/releases) and run it for yourself on MacOS, Linux, or Android. iOS TestFlight is coming soon. Keep in mind that it's still very much alpha software; a lot is changing and I wouldn't recommend using it for anything serious quite yet.
We've been busy. In my last update, I shared that I was sure MLS on Nostr was going to work and shared an early demo of the app. What a long time ago that seems now.
## Vision
Before we get to the detailed project updates, I wanted to share a bit of my vision for White Noise.
More and more; freedom of speech, freedom of association, and privacy are under attack. Just this week, Apple was forced to remove their iCloud advanced encryption feature for all UK citizens because the UK government demanded that Apple build a backdoor to allow access to customer data. The EU continues to push "Chat Control" legislation that would force companies to remove end-to-end encryption from their platforms. And governments across the world are enforcing draconian "hate speech" laws that criminalize speech that offends or upsets.
The freedom to express ourselves and discuss difficult topics is a critical precondition for maintaining a healthy society. Without the ability to assert ideas and argue their merits vigorously we have no way of making progress or creating a civil society based on shared values and goals. Ironically, the very laws and regulations that many western governments are enforcing to "protect" us are eroding and destroying the most free and innovative societies in history.
White Noise is to built to protect our freedom to gather, to express ourselves, and to discuss difficult topics. It's free and open source; anyone can fork the code and we'll never charge money to use it. It runs on a free and open source protocol; your identity and social graph is yours to own and control. You don't have to trust us with your data, everything is end-to-end encrypted and metadata is next to non-existent. We don't even run any servers, so government data requests will forever fall on deaf ears.
We want to build the fastest, most secure and private, and the most usable messenger in the world. Whether you want to use it to plan a family BBQ or overthrow a tyrant, White Noise should give you the tools you need to make it happen.
If you find this compelling and want to help, please consider contributing to the project or donating.
## Progress
Alright, let's talk about where we're at with the project.
### Current functionality
- Multiple accounts. You can login, or create, many different Nostr accounts in the app.
- Search your nostr contact list, search for users you don't follow, or add contacts using an npub or hex public key.
- Create DM groups. Right now, you can only create chats with a single other user. Under the hood, these DMs are actually groups, I just haven't added the UI for adding/removing users and managing the group.
- Send messages, reply to messages, and add reactions. As you would expect from a messenging app.
- View group information.
- Settings that allows you to manage your accounts, relays, and other app settings.
### Upcoming
- An amazing hackathon group from [Bitcoin++ in Brasil](https://btcplusplus.dev/conf/floripa) has recently [added NWC](https://github.com/erskingardner/whitenoise/pull/89) (nostr wallet connect) support to the app. Paste lightning invoices into chats and they'll become QR codes that you can scan or pay them with a single click in the conversation! This will be in the next release.
- Add support for encrypted media in chats using [Blossom](https://github.com/hzrd149/blossom/tree/master). We'll start with images, but plan to add video, audio messages, and documents soon.
- Groups with more than two users. We'll add the ability to add/remove users and manage the group. This will also include some upgrades to further improve the forward secrecy of group chats.
- iOS TestFlight. Gated app stores suck. We'll get White Noise on iOS into TestFlight as soon as possible.
## Links
- [The repo](https://github.com/erskingardner/whitenoise)
- [Releases](https://github.com/erskingardner/whitenoise/releases)
- [Previous updates](https://highlighter.com/jeffg.fyi)
-

@ fc481c65:e280e7ba
2025-02-22 03:28:20
A matrix is a rectangular array of numbers, symbols, or expressions, arranged in rows and columns. The individual items in a matrix are called its elements or entries. They are foundational element in many areas of #Mathematics and #Engineering including #Electronics #Computer #Science #Finances and more.
### Notation and Terms
- **Dimensions**: The size of a matrix is defined by its number of rows and columns and is often referred to as `m x n`, where `m` is the number of rows and `n` is the number of columns.
- **Square Matrix**: A matrix with the same number of rows and columns (`n x n`).
- **Diagonal Matrix**: A square matrix where all elements off the main diagonal are zero.
- **Identity Matrix**: A diagonal matrix where all the elements on the main diagonal are 1. It's denoted as `I`.
- **Zero Matrix**: A matrix all of whose entries are zero.
### Basic Matrix Operations
1. **Addition and Subtraction**
- Matrices must be of the same dimensions to be added or subtracted.
- Add or subtract corresponding elements.
- Example:
- `$$\begin{bmatrix}1 & 2 \\3 & 4\end{bmatrix}+\begin{bmatrix}5 & 6 \\7 & 8\end{bmatrix}=\begin{bmatrix}6 & 8 \\10 & 12\end{bmatrix}$$`
2. **Scalar Multiplication**
- Multiply every element of a matrix by a scalar (a single number).
- Example:
- `$$
2 \times
\begin{bmatrix}
1 & 2 \\
3 & 4
\end{bmatrix}
=
\begin{bmatrix}
2 & 4 \\
6 & 8
\end{bmatrix}
$$`
3. **Matrix Multiplication**
- The number of columns in the first matrix must be equal to the number of rows in the second matrix.
- The product of an `m x n` matrix and an `n x p` matrix is an `m x p` matrix.
- Multiply rows by columns, summing the products of the corresponding elements.
- Example:
- `$$
\begin{bmatrix}
1 & 2 \\
3 & 4
\end{bmatrix}
\times
\begin{bmatrix}
2 & 0 \\
1 & 2
\end{bmatrix}
=
\begin{bmatrix}
(1 \times 2 + 2 \times 1) & (1 \times 0 + 2 \times 2) \\
(3 \times 2 + 4 \times 1) & (3 \times 0 + 4 \times 2)
\end{bmatrix}
=
\begin{bmatrix}
4 & 4 \\
10 & 8
\end{bmatrix}
$$`
### Special Matrix Operations
1. **Determinant**
- Only for square matrices.
- A scalar value that can be computed from the elements of a square matrix and encodes certain properties of the matrix.
- Example for a 2x2 matrix:
- `$$
\text{det}
\begin{bmatrix}
a & b \\
c & d
\end{bmatrix}
= ad - bc
$$`
2. **Inverse**
- Only for square matrices.
- The matrix that, when multiplied by the original matrix, results in the identity matrix.
- Not all matrices have inverses; a matrix must be "nonsingular" to have an inverse.
### Practical Applications
- **Solving Systems of Linear Equations**
- Matrices are used to represent and solve systems of linear equations using methods like Gaussian elimination.
`$$X=A^{-1}\times B$$`
- **Transformations in Computer Graphics**
- Matrix multiplication is used to perform geometric transformations such as rotations, translations, and scaling.
`$$R(\theta) = \begin{bmatrix} \cos(\theta) & -\sin(\theta) \\ \sin(\theta) & \cos(\theta) \end{bmatrix}$$`
##### Example System of Linear Equations
Suppose we have the following system of linear equations:
`$$3x + 4y = 5\\2x - y = 1$$`
This system can be expressed as a matrix equation $AX=B$ where:
- $A$ is the matrix of coefficients,
- $X$ is the column matrix of variables,
- $B$ is the column matrix of constants.
* ***Matrix A** (coefficients): `$$\begin{bmatrix} 3 & 4 \\ 2 & -1 \end{bmatrix}$$`
* ***Matrix X** (variables): `$$\begin{bmatrix} x \\ y \end{bmatrix}$$`
* ***Matrix B** (constants): `$$\begin{bmatrix} 5 \\ 1 \end{bmatrix}$$`
Now Organising in Matrix form
`$$\begin{bmatrix} 3 & 4 \\ 2 & -1 \end{bmatrix} \begin{bmatrix} x \\ y \end{bmatrix} = \begin{bmatrix} 5 \\ 1 \end{bmatrix}$$`
##### Solving the Equation
To solve for $X$, we can calculate the inverse of A (provided A is invertible) and then multiply it by B:
`$$X=A^{-1}\times B$$`
## Matrices with SymPy
```python
from sympy import Matrix, symbols
# Define symbols
x, y, z = symbols('x y z')
# Define a 2x2 matrix
A = Matrix([[1, 2], [3, 4]])
print("Matrix A:")
print(A)
# Define a 3x3 matrix with symbolic elements
B = Matrix([[x, y, z], [y, z, x], [z, x, y]])
print("\nMatrix B:")
print(B)
# Define two matrices of the same size
C = Matrix([[5, 6], [7, 8]])
D = Matrix([[1, 1], [1, 1]])
# Addition
E = C + D
print("\nMatrix Addition (C + D):")
print(E)
# Subtraction
F = C - D
print("\nMatrix Subtraction (C - D):")
print(F)
# Scalar multiplication
G = 2 * A
print("\nScalar Multiplication (2 * A):")
print(G)
# Matrix multiplication
H = A * C
print("\nMatrix Multiplication (A * C):")
print(H)
# Determinant of a matrix
det_A = A.det()
print("\nDeterminant of Matrix A:")
print(det_A)
# Inverse of a matrix
inv_A = A.inv()
print("\nInverse of Matrix A:")
print(inv_A)
# Define the coefficient matrix A and the constant matrix B
A_sys = Matrix([[3, 4], [2, -1]])
B_sys = Matrix([5, 1])
# Solve the system AX = B
X = A_sys.inv() * B_sys
print("\nSolution to the system of linear equations:")
print(X)
# Compute eigenvalues and eigenvectors of a matrix
eigenvals = A.eigenvals()
eigenvects = A.eigenvects()
print("\nEigenvalues of Matrix A:")
print(eigenvals)
print("\nEigenvectors of Matrix A:")
print(eigenvects)
```
## References
* [Dear linear algebra students, This is what matrices (and matrix manipulation) really look like](https://www.youtube.com/watch?v=4csuTO7UTMo)
* [Essence of linear algebra](https://www.youtube.com/playlist?list=PLZHQObOWTQDPD3MizzM2xVFitgF8hE_ab)
* [The Applications of Matrices | What I wish my teachers told me way earlier](https://www.youtube.com/watch?v=rowWM-MijXU)
* [Inverse of 2x2 Matrix](https://www.cuemath.com/algebra/inverse-of-2x2-matrix/)
* [Matrices Tutorial](https://www.cuemath.com/algebra/solve-matrices/)
-

@ ffa45828:f87a272a
2025-02-21 23:14:10
💡 Key Idea: Bitcoin’s value grows exponentially as more users adopt it — a network effect that mirrors Carl Menger’s insight: liquidity begets liquidity. The more people use Bitcoin, the more it evolves into global, apolitical money.
🌍 Real-World Example:
El Salvador made Bitcoin legal tender in 2021 — a historic first. Despite IMF backlash, adoption is rising:
- 30%+ of businesses now accept Bitcoin.
- Tourism surged as Bitcoiners flocked to places like Bitcoin Beach (El Zonte).
- Remittance fees (a lifeline for 24% of GDP) dropped from 10% to near-zero via Bitcoin.
Result: A small nation proving Bitcoin’s network effects can empower the unbanked and weaken fiat monopolies.
📜 Austrian Connection: Carl Menger’s Principles of Economics explains money as a social institution emerging from a good’s growing marketability. Bitcoin’s adoption in El Salvador — and grassroots use in Nigeria, Argentina, etc. — is Menger’s theory in action: voluntary liquidity, not state force.
⚡ Why It Matters: Fiat’s “liquidity” is enforced by legal tender laws. Bitcoin’s liquidity is earned through utility. El Salvador’s experiment shows how network effects can turn Bitcoin into a parallel monetary system — one that bypasses central banks.
🔍 Food for Thought: If a tiny nation can defy the IMF and embrace Bitcoin, what happens when millions opt into this network? Could Menger’s “socially ratified money” finally dethrone fiat?
Engage below! 🗨️
#Bitcoin #AustrianEconomics #ElSalvador #Menger #NetworkEffects
-

@ f6488c62:c929299d
2025-02-25 03:22:49
การที่สหรัฐอเมริกาปรับมูลค่าทองคำในคลัง (re-peg) จะมีผลกระทบที่สำคัญต่อทั้งระบบการเงินโลกและบิทคอยน์ ด้วยเหตุผลต่างๆ ที่อาจเกิดขึ้นดังนี้:
ทองคำในฐานะสินทรัพย์เก็บมูลค่า: หากสหรัฐอเมริกาปรับราคาทองคำจาก 42 ดอลลาร์ต่อออนซ์เป็นราคาปัจจุบันที่สูงถึง 2,953.5 ดอลลาร์ต่อออนซ์ การปรับนี้จะทำให้ทองคำได้รับความนิยมและมีมูลค่าเพิ่มขึ้นอย่างมากในมุมมองของนักลงทุนทั่วโลก ส่งผลให้ทองคำมีบทบาทสำคัญขึ้นในระบบการเงิน อีกทั้งยังเป็นทางเลือกการลงทุนที่น่าสนใจมากขึ้นในฐานะ "safe haven" หรือสินทรัพย์ที่ปลอดภัย.
ผลกระทบต่อตลาดดอลลาร์สหรัฐ: การประเมินมูลค่าทองคำใหม่จะทำให้ค่าเงินดอลลาร์อ่อนค่าลง เนื่องจากทองคำถูกมองว่าเป็นตัวบ่งชี้ความมั่งคั่งและเสถียรภาพทางการเงิน การอ่อนค่าของดอลลาร์อาจส่งผลให้บิทคอยน์เป็นที่น่าสนใจมากขึ้นในฐานะสินทรัพย์ที่ไม่ขึ้นกับเงินดอลลาร์และธนาคารกลางใด ๆ.
การเติบโตของบิทคอยน์: เมื่อระบบการเงินดั้งเดิม (เช่น ดอลลาร์สหรัฐ) เริ่มสั่นคลอนหรือลดความน่าเชื่อถือ บิทคอยน์ซึ่งเป็นสินทรัพย์ดิจิทัลที่ไม่ขึ้นกับรัฐบาลหรือธนาคารกลางก็จะได้รับความสนใจมากขึ้นจากนักลงทุนที่ต้องการหลีกเลี่ยงความเสี่ยงในระบบการเงินแบบดั้งเดิม นอกจากนี้บิทคอยน์ยังถือเป็นสินทรัพย์ที่มีการจำกัดจำนวน (21 ล้าน BTC) ซึ่งถือว่าเป็นการป้องกันภาวะเงินเฟ้อที่มักจะเกิดขึ้นจากการพิมพ์เงินจำนวนมากโดยธนาคารกลาง.
การปรับตัวของประเทศอื่นๆ: หากสหรัฐฯ ปรับมูลค่าทองคำใหม่ ประเทศอื่นๆ อาจจำเป็นต้องปรับเปลี่ยนมูลค่าทองคำของตนเองเพื่อตอบสนองต่อการเปลี่ยนแปลงนี้ และอาจเห็นการเคลื่อนไหวในการสนับสนุนสินทรัพย์ดิจิทัลอย่างบิทคอยน์มากขึ้นเพื่อกระจายความเสี่ยงจากการพึ่งพาระบบการเงินดอลลาร์สหรัฐ.
สรุปได้ว่า หากการปรับมูลค่าทองคำของสหรัฐเป็นจริง การเคลื่อนไหวนี้อาจเป็นตัวกระตุ้นให้บิทคอยน์เติบโตขึ้น เนื่องจากนักลงทุนมองหาทางเลือกที่ปลอดภัยจากความไม่แน่นอนในระบบการเงินดั้งเดิม และเพิ่มการยอมรับในสินทรัพย์ดิจิทัลมากขึ้น.
-

@ 8da249fe:ecc00e09
2025-02-25 01:08:49
Existem diversas corretoras onde você pode comprar e vender bitcoins e outras moedas. O ideal é sempre escolher empresas idoneas e com boa fama, para isso, antes de ir comprando bitcoin conheça pessoas que usam estas corretoras, veja os depoimentos destas pessoas sobre esta plataforma, isso é bem básico e serve para qualquer coisa.
Geralmente estas exchanges (corretoras) exigem alguns dados pessoais, ou seja, são fontes de bitcoin por KYC. Para pessoas que querem ter bitcoin sem seus dados registrados é necessário a compra peer-to-peer, que é a compra direta por pessoas sem a uma "instituição financeira" mediando a transação.
Dica número 1 : Nunca deixe seus bitcoins armazenados em corretoras.

Apesar do bitcoin ainda não ter nenhum tipo de regulamentação, as corretoras por serem consideradas "instituições financeiras" são reguladas pelo Sistema Financeiro Nacional, sendo vulneráveis as decisões governamentais.
Além disso, as corretoras por movimentarem grandes quantidades de dinheiro, estão vulneráveis ataques hackears que são frequentementes.
Dica número 2: Sempre deposite seus bitcoins em carteiras

As carteiras são locais de armazenamento seguros e alguns tipos com as cold Wallet não há gestão dos seus fundos por intermediários, logo a responsabilidade pelo seu dinheiro é totalmente sua.
Sempre importante guardar e ter uma boa organização quanto as senhas de acesso, pois uma vez que perde não há nenhuma forma de recuperá-la.
Algo que o economista Fernando Roxo fala no YT que concordo plenamente ,é , que não se deve deixar todos os ovos numa cesta só. O que aplico no universo bitcoin que não se deve colocar todos os seus bitcoin em apenas uma carteira. É muito importante dificultar o máximo para os criminosos roubarem, por isso devem ter várias carteiras.
Dica número 3: Entenda que Bitcoin não é investimento, e sim uma solução econômica.

Não desista do bitcoin , só porque ele ocila de valor. O bitcoin não é um investimento a onde se aplica e você tem um lucro. O bitcoin é uma solução em decorrência da desonestidade dos governos que imprimem moedas sem valor agregado.
Este conhecimento é extremamente importante para que não se iluda com promessa de ficar milionário ou algo do tipo. O bitcoin é uma moeda segura que tem o intuito de proteger o mercado financeiro em decorrência da má fé de estados, e também uma arma contra governos.
Dica número 4 : Ajude a comunidade, comercialize em bitcoin.
Quer você seja consumidor ou produtor, faça com que seus fundos estejam em bitcoin. Apesar de estamos engatinhando no mercado há muitas iniciativas como o Bitrefill, maquininhas e software para movimentações em bitcoin que tem facilitado as transações.
Dica número 5: Conheça os termos técnico sobre este universo.
Fique sempre atualizados com os termos da comunidade com KYC, cold wallet, hot wallet, fiat ...
Assim você poderá seu um "agente" pró bitcoin e ajudar pessoas simples a entrarem neste universo e ter sua auto custódia e estarem imunes aos desgovernos.
-

@ fc481c65:e280e7ba
2025-02-21 21:30:56
#Algebra is a branch of #Mathematics that uses symbols, known as variables (like x or y), to represent numbers in equations and formulas. It involves operations like addition, subtraction, multiplication, and division, but these operations are performed on variables as well as numbers.
### Key Concepts in Algebra
- **Variables**: Symbols that stand in for unknown values.
- **Constants**: Known values that don’t change.
- **Coefficients**: Numbers used to multiply a variable.
- **Expressions**: Combinations of variables, numbers, and operations (like 3x + 4).
- **Equations**: Statements that assert the equality of two expressions, typically including an equals sign (like 2x + 3 = 7).
### Basic Operations
1. **Adding and Subtracting**: You can add or subtract like terms (terms whose variables and their powers are the same). For example, 2x+3x=5x
2. **Multiplying and Dividing**: You multiply or divide both the coefficients and the variables. For instance, `$$3x \times 2x=6x^2$$`
3. **Solving Equations**: The goal is often to isolate the variable on one side of the equation to find its value. This can involve reversing operations using opposite operations.
### Applications of Algebra
Algebra is used in various fields, from #Engineering and computer science to economics and everyday problem solving. It helps in creating formulas to understand relationships between quantities and in solving equations that model real-world situations.
## Algebra and Electronics
Algebra plays a crucial role in #Electronics engineering, particularly through its application in circuit analysis, signal processing, and control systems. Understanding and utilizing algebraic techniques can significantly enhance problem-solving capabilities in these areas.
### 1. Complex Numbers
In electronic engineering, complex numbers are essential for analyzing AC circuits. They help in representing sinusoidal signals, which are fundamental in communications and power systems.
- **Representation**: z=a+bi or z=reiθ (polar form)
- **Operations**: Addition, subtraction, multiplication, and division in complex form, crucial for understanding the behavior of circuits in the frequency domain.
**Example**: Calculating the impedance of an RLC series circuit at a certain frequency.
- **Circuit Components**: R=50Ω, L=0.1 H, C=10 μF, ω=1000 rad/s
`$$
Z = 50 + j1000 \times 0.1 - \frac{1}{j1000 \times 10 \times 10^{-6}} = 50 + j100 - \frac{1}{j0.01} = 50 + j100 + 100j = 50 + 200j
$$`
### 2. Matrices and Determinants
Matrices are widely used in electronic engineering for handling multiple equations simultaneously, which is common in systems and network analysis.
- **Matrix Operations**: Addition, subtraction, multiplication, and inversion.
- **Determinant and Inverse**: Used in solving systems of linear equations, critical in network theory and control systems.
### 3. Fourier Transforms
Algebraic manipulation is key in applying Fourier transforms, which convert time-domain signals into their frequency components. This is crucial for signal analysis, filtering, and system design.
- **Fourier Series**: Represents periodic signals as a sum of sinusoids.
- **Fourier Transform**: Converts continuous time-domain signals to continuous frequency spectra.
### 4. Laplace Transforms
Laplace transforms are used to simplify the process of analyzing and designing control systems and circuits by converting differential equations into algebraic equations.
- **Transfer Functions**: Represent systems in the s-domain, facilitating easier manipulation and understanding of system dynamics.
### 5. Z-Transforms
Similar to Laplace transforms, Z-transforms are used for discrete systems prevalent in digital signal processing and digital control.
### 6. Algebraic Equations in Filter Design
Algebra is used in the design of filters, both analog and digital, where polynomial equations are used to determine filter coefficients that meet specific frequency response criteria.
### 7. Control Systems
The design and stability analysis of control systems involve solving characteristic equations and manipulating transfer functions, which require a solid understanding of algebra.
### 8. Network Theorems
Theorems like Kirchhoff's laws, Thevenin’s theorem, and Norton’s theorem involve algebraic equations to simplify and analyze circuits.
## Algebra with Sympy
TODO
-

@ d57360cb:4fe7d935
2025-02-24 23:30:38
The moments and events that leave you lost. Shook. In Disbelief.
Those are the moments you need most. They unlock something dormant in you. Feelings you didn't think imaginable. Journeys you thought unlikely to happen.
Paths and roads filled with ups and downs. Uncertainties, roadblocks, long distances of absolutely nothing in sight. Periods of turmoil and absolute stillness.
Don't mistake where you are for the finale.
Embrace life, it gives you character.
-

@ 4857600b:30b502f4
2025-02-21 21:15:04
In a revealing development that exposes the hypocrisy of government surveillance, multiple federal agencies including the CIA and FBI have filed lawsuits to keep Samourai Wallet's client list sealed during and after trial proceedings. This move strongly suggests that government agencies themselves were utilizing Samourai's privacy-focused services while simultaneously condemning similar privacy tools when used by ordinary citizens.
The situation bears striking parallels to other cases where government agencies have hidden behind "national security" claims, such as the Jeffrey Epstein case, highlighting a troubling double standard: while average citizens are expected to surrender their financial privacy through extensive reporting requirements and regulations, government agencies claim exemption from these same transparency standards they enforce on others.
This case exemplifies the fundamental conflict between individual liberty and state power, where government agencies appear to be using the very privacy tools they prosecute others for using. The irony is particularly stark given that money laundering for intelligence agencies is considered legal in our system, while private citizens seeking financial privacy face severe legal consequences - a clear demonstration of how the state creates different rules for itself versus the people it claims to serve.
Citations:
[1] https://www.bugle.news/cia-fbi-dnc-rnc-all-sue-to-redact-samourais-client-list-from-trial/
-

@ 266815e0:6cd408a5
2025-02-21 17:54:15
I've been working on the applesauce libraries for a while now but I think this release is the first one I would consider to be stable enough to use
A lot of the core concepts and classes are in place and stable enough where they wont change too much next release
If you want to skip straight to the documentation you can find at [hzrd149.github.io/applesauce](https://hzrd149.github.io/applesauce/) or the typescript docs at [hzrd149.github.io/applesauce/typedoc](https://hzrd149.github.io/applesauce/typedoc)
## Whats new
### Accounts
The `applesauce-accounts` package is an extension of the `applesauce-signers` package and provides classes for building a multi-account system for clients
Its primary features are
- Serialize and deserialize accounts so they can be saved in local storage or IndexededDB
- Account manager for multiple accounts and switching between them
- Account metadata for things like labels, app settings, etc
- Support for NIP-46 Nostr connect accounts
see [documentation](https://hzrd149.github.io/applesauce/accounts/manager.html) for more examples
### Nostr connect signer
The `NostrConnectSigner` class from the `applesauce-signers` package is now in a stable state and has a few new features
- Ability to create `nostrconnect://` URIs and waiting for the remote signer to connect
- SDK agnostic way of subscribing and publishing to relays
For a simple example, here is how to create a signer from a `bunker://` URI
```js
const signer = await NostrConnectSigner.fromBunkerURI(
"bunker://266815e0c9210dfa324c6cba3573b14bee49da4209a9456f9484e5106cd408a5?relay=wss://relay.nsec.app&secret=d9aa70",
{
permissions: NostrConnectSigner.buildSigningPermissions([0, 1, 3, 10002]),
async onSubOpen(filters, relays, onEvent) {
// manually open REQ
},
async onSubClose() {
// close previouse REQ
},
async onPublishEvent(event, relays) {
// Pubilsh an event to relays
},
},
);
```
see [documentation](https://hzrd149.github.io/applesauce/signers/nostr-connect.html) for more examples and other signers
### Event Factory
The `EventFactory` class is probably what I'm most proud of. its a standalone class that can be used to create various types of events from templates ([blueprints](https://hzrd149.github.io/applesauce/typedoc/modules/applesauce_factory.Blueprints.html)) and is really simple to use
For example:
```js
import { EventFactory } from "applesauce-factory";
import { NoteBlueprint } from "applesauce-factory/blueprints";
const factory = new EventFactory({
// optionally pass a NIP-07 signer in to use for encryption / decryption
signer: window.nostr
});
// Create a kind 1 note with a hashtag
let draft = await factory.create(NoteBlueprint, "hello world #grownostr");
// Sign the note so it can be published
let signed = await window.nostr.signEvent(draft);
```
Its included in the `applesauce-factory` package and can be used with any other nostr SDKs or vanilla javascript
It also can be used to modify existing replaceable events
```js
let draft = await factory.modifyTags(
// kind 10002 event
mailboxes,
// add outbox relays
addOutboxRelay("wss://relay.io/"),
addOutboxRelay("wss://nostr.wine/"),
// remove inbox relay
removeInboxRelay("wss://personal.old-relay.com/")
);
```
see [documentation](https://hzrd149.github.io/applesauce/overview/factory.html) for more examples
### Loaders
The `applesauce-loaders` package exports a bunch of loader classes that can be used to load everything from replaceable events (profiles) to timelines and NIP-05 identities
They use [rx-nostr](https://penpenpng.github.io/rx-nostr/) under the hood to subscribe to relays, so for the time being they will not work with other nostr SDKs
I don't expect many other developers or apps to use them since in my experience every nostr client requires a slightly different way or loading events
*They are stable enough to start using but they are not fully tested and they might change slightly in the future*
The following is a short list of the loaders and what they can be used for
- `ReplaceableLoader` loads any replaceable events (0, 3, 1xxxx, 3xxxx)
- `SingleEventLoader` loads single events based on ids
- `TimelineLoader` loads a timeline of events from multiple relays based on filters
- `TagValueLoader` loads events based on a tag name (like "e") and a value, can be used to load replies, zaps, reactions, etc
- `DnsIdentityLoader` loads NIP-05 identities and supports caching
- `UserSetsLoader` loads all lists events for users
see [documentation](https://hzrd149.github.io/applesauce/overview/loaders.html) for more examples
### Real tests
For all new features and a lot of existing ones I'm trying to write tests to ensure I don't leave unexpected bugs for later
I'm not going to pretend its 100% tests coverage or that it will ever get close to that point, but these tests cover some of the core classes and help me prove that my code is doing what it says its supposed to do
At the moment there are about 230 tests covering 45 files. not much but its a start

## Apps built using applesauce
If you want to see some examples of applesauce being used in a nostr client I've been testing a lot of this code in production on the apps I've built in the last few months
- [noStrudel](https://github.com/hzrd149/nostrudel) The main app everything is being built for and tested in
- [nsite-manager](https://github.com/hzrd149/nsite-manager) Still a work-in-progress but supports multiple accounts thanks to the `applesauce-accounts` package
- [blossomservers.com](https://github.com/hzrd149/blossomservers) A simple (and incomplete) nostr client for listing and reviewing public blossom servers
- [libretranslate-dvm](https://github.com/hzrd149/libretranslate-dvm) A libretranslate DVM for nostr:npub1mkvkflncllnvp3adq57klw3wge6k9llqa4r60g42ysp4yyultx6sykjgnu
- [cherry-tree](https://github.com/hzrd149/cherry-tree) A chunked blob uploader / downloader. only uses applesauce for boilerplate
- [nsite-homepage](https://github.com/hzrd149/nsite-homepage) A simple landing page for [nsite.lol](https://nsite.lol)
Thanks to nostr:npub1cesrkrcuelkxyhvupzm48e8hwn4005w0ya5jyvf9kh75mfegqx0q4kt37c for teaching me more about rxjs and consequentially making me re-write a lot of the core observables to be faster
-

@ dbb19ae0:c3f22d5a
2025-02-21 17:46:58
Tested and working with nostr_sdk version 0.39
``` python
from nostr_sdk import Metadata, Client, Keys, Filter, PublicKey
from datetime import timedelta
import argparse
import asyncio
import json
async def main(npub):
client = Client()
await client.add_relay("wss://relay.damus.io")
await client.connect()
pk = PublicKey.parse(npub)
print(f"\nGetting profile metadata for {npub}:")
metadata = await client.fetch_metadata(pk, timedelta(seconds=15))
# Printing each field of the Metadata object
print(f"Name: {metadata.get_name()}")
print(f"Display Name: {metadata.get_display_name()}")
print(f"About: {metadata.get_about()}")
print(f"Website: {metadata.get_website()}")
print(f"Picture: {metadata.get_picture()}")
print(f"Banner: {metadata.get_banner()}")
print(f"NIP05: {metadata.get_nip05()}")
print(f"LUD06: {metadata.get_lud06()}")
print(f"LUD16: {metadata.get_lud16()}")
#print(f"Custom: {metadata.get_custom()}")
if __name__ == '__main__':
parser = argparse.ArgumentParser(description='Fetch all metadata for a given npub')
parser.add_argument('npub', type=str, help='The npub of the user')
args = parser.parse_args()
asyncio.run(main(args.npub))
```
-

@ 6e0ea5d6:0327f353
2025-02-21 17:01:17
Your father may have warned you when he saw you hanging out with bad company:
"Remember, you become your friends."
A maxim from Goethe conveys this idea even better:
"Tell me who you walk with, and I’ll tell you who you are."
Be mindful of who you allow into your life—not as an arrogant snob, but as someone striving to cultivate the best possible life.
Ask yourself about the people you know and spend time with:
Are they making me better? Do they encourage me to move forward and hold me accountable? Or do they drag me down to their level?
Now, with that in mind, ask yourself the most important question:
Should I spend more or less time with these people?
The second part of Goethe's quote reminds us of what is at stake in this choice:
"If I know how you spend your time," he said, "then I know what you may become."
"Above all, keep this in mind: never get so attached to your old friends and acquaintances that you are dragged down to their level. If you do not, you will be ruined. [...] You must choose whether you want to be loved by these friends and remain the same or become a better person at the expense of those associations. [...] If you try to do both, you will never make progress nor retain what you once had."
—Epictetus, Discourses
📌 "Remember that if you join someone covered in dirt, you can hardly avoid getting a little dirty yourself."
—Epictetus, Discourses
📚 (Excerpt from The Daily Stoic by Ryan Holiday)
Thank you for reading, my friend!
If this message helped you in any way,
consider leaving your glass “🥃” as a token of appreciation.
A toast to our family!
-

@ e047f82f:f7d05b0b
2025-02-21 07:32:39
21 คำแนะนำสำหรับโครงการบิตคอยน์จากประเทศอินโดนีเซีย (Bitcoin House Bali)
เริ่มต้น!!
1. Just start - แค่เริ่มต้น
ทุกการเดินทางในโลกของบิทคอยน์เริ่มต้นด้วยก้าวแรก การหาจุดยืนของคุณในชุมชนบิทคอยน์อาจรู้สึกน่าหวั่นใจ แต่ไม่มีข้อมูลเชิงลึกใดๆ ต่อไปนี้จะสำคัญถ้าคุณไม่ลงมือทำ ขั้นตอนสำคัญและง่ายที่สุดคือการเริ่มต้นไม่ว่าจะเป็นการเข้าร่วมโครงการบิทคอยน์หรือสร้างโครงการของคุณเอง สิ่งสำคัญคือการเริ่มต้น
2. Make 'em curious - ทำให้พวกเขาอยากรู้
ไม่ใช่เรื่องการสอนทุกอย่างหรืออธิบายข้อเท็จจริงทั้งหมด สิ่งที่สำคัญมากกว่านั้นคือการทำให้ผู้คนอยากรู้ ดึงดูดพวกเขาโดยการแบ่งปันแง่มุมที่น่าสนใจ ถามคำถามที่กระตุ้นความคิด และทำเป็นตัวอย่าง
3. Don't burn out - อย่าเพิ่งหมดไฟ
พูดตามตรง ในฤดูร้อนปี 2024 เราเกือบจะปิด Bitcoin House และหยุดงานทั้งหมด เรารู้ว่าหนทางนี้มันยากลำบาก ดังนั้นโปรด "อย่าเพิ่งหมดไฟ" บทเรียนนี้มาจาก Dusan (AmityAge) ผู้ดูแล Bitcoin House ใน Roatan และสอนบทเรียนเกี่ยวกับเรื่องทั้งทางการเงินและจิตใจ
- นี่คือ 4 พื้นฐานที่จะช่วยให้คุณเริ่มต้นและรักษาโครงการของคุณโดยไม่หมดไฟ
1. เริ่มต้นง่ายๆ และไม่แพง
2. เขียนโครงการบน Geyser.fund
3. สมัครขอรับทุน (เช่น OpenSats, Human Rights Foundation หรือ Block)
4. สร้างรายได้จากโครงการของคุณ (เช่น การขายสินค้า การเรียกเก็บเงินสำหรับการให้ความรู้ส่วนตัวแบบ 1:1)
**จำไว้ว่า จังหวะและการรักษาความสม่ำเสมอทำให้งานยังเดินต่อไปได้ - ความยั่งยืนเป็นกุญแจสำคัญ!!!
4. Do good & talk about it - ทำอย่างดีและพูดถึงมัน
การแบ่งปันความพยายามของคุณ คุณสามารถสร้างความตระหนัก ดึงดูดการบริจาค ได้รับเงินทุน และสร้างการเชื่อมต่อที่มีคุณค่า แม้ว่าการนำเสนอตัวเอง ไม่ว่าจะเป็นบนโซเชียลมีเดีย การสัมภาษณ์ หรือในพอดแคสต์ อาจรู้สึกน่ากลัวในตอนแรก แต่มันก็คุ้มค่า การพูดอย่างเปิดเผยเกี่ยวกับภารกิจของคุณไม่เพียงแต่สร้างความไว้วางใจและความน่าเชื่อถือ แต่ยังช่วยทำให้มีการสนับสนุนชุมชนเพิ่มขึ้นในส่วนอื่นๆ รอบตัวคุณ
5. Be like Tarzan - เป็นเหมือนทาร์ซาน
ถ้าคุณต้องการไปจากจุด A ถึง B โดยส่วนใหญ่เส้นทางของคุณจะไม่เป็นเส้นตรง จงฉวยโอกาส แกว่งจากเถาวัลย์หนึ่งไปอีกเถาวัลย์หนึ่ง คว้าโอกาสที่เข้ามา การใช้ชีวิตแบบนั้นสนุกกว่ามากและคุณจะได้รับประสบการณ์มากมายระหว่างทาง
คุณทำได้!
6. Recalibrate every month - ปรับปรุงใหม่ทุกเดือน
อย่าวิ่งไปมาเหมือนไก่ไม่มีหัว ในทีมของเรา มักถูกเบี่ยงเบนความสนใจ สูญเสียจุดยืน และทำงานที่ไม่ได้พาไปใกล้เป้าหมายที่ตั้งไว้ ดังนั้นเราจึงแนะนำการประชุมรายเดือน เพื่อทบทวนความสำเร็จ เป้าหมาย บทเรียนที่ได้รับ และการปรับเปลี่ยนที่จำเป็น เริ่มต้นแต่ละเดือนด้วยเป้าหมายที่ชัดเจน คงความสอดคล้องและทำงานให้มีประสิทธิภาพมากขึ้นเพื่อมุ่งสู่เป้าหมาย
7. Teach the kids, reach the parents - สอนเด็ก เข้าถึงพ่อแม่
เราเริ่มจัดเวิร์คช็อปสำหรับเด็กและรู้สึกเหมือนเป็นการโกง เด็กๆ ชอบมันมาก แต่สิ่งที่น่าประหลาดใจคือพ่อแม่ของพวกเขา เมื่อพวกเขามาส่งหรือมารับลูก พวกเขาเกิดความอยากรู้และต้องการเรียนรู้เพิ่มเติม มักจะกลับมาที่ Bitcoin House ของเราด้วยตัวเอง (และมันสนุกมากที่มี “ลูกสมุนอาชญากร” ที่อยากรู้อยากเห็นอยู่รอบตัวคุณ)
8. Let them learn hands-on ให้พวกเขาเรียนรู้แบบลงมือทำ
การเรียนรู้จะมีประสิทธิภาพมากขึ้นเมื่อเป็นประสบการณ์ ผู้คนเรียนรู้ได้เร็วขึ้นเมื่อพวกเขาสามารถลอง สัมผัส และเห็นสิ่งที่พวกเขากำลังเรียนรู้ ดังนั้นคำแนะนำของเรา : พิมพ์สื่อ และนำเครื่องมือทางกายภาพมา เช่น ฮาร์ดแวร์วอลเล็ต โหนด หรือแม้แต่เครื่องขุด
สำหรับการพบปะ เราพบว่าการให้ความรู้ได้ผลดีที่สุด เริ่มต้นด้วยการนำเสนอสั้นๆ หรือแบบฝึกหัดแบบลงมือทำเพื่อเจาะลึกสิ่งใหม่ๆ เกี่ยวกับบิทคอยน์ จากนั้นตามด้วยการพบปะอย่างไม่เป็นทางการ
9. Snag freebies at conferences - คว้าของฟรีในงานประชุม
ข่าวดี: คุณไม่จำเป็นต้องซื้อทุกสิ่งที่เรากล่าวถึงใน ข้อ 8 บริษัทบิทคอยน์ชอบสนับสนุนการศึกษา ดังนั้นแค่ไปงานประชุมและคว้าของฟรี! ขอขอบคุณอย่างมากสำหรับ Hodlshop, Blockstream, StampSeed, Konsensus Network และบริษัทบิทคอยน์อื่นๆ อีกมากมาย—ที่ BTC Prague เราได้รับกระเป๋าเงินฮาร์ดแวร์มือสอง แผ่นเหล็ก และหนังสือเพียงแค่ร้องขอหรือสอบถาม
10. Create a home - สร้างบ้าน
การมีพื้นที่ทางกายภาพไว้คอยต้อนรับเพิ่มคุณค่าให้ชุมชนอย่างมาก เป็นพื้นที่ปลอดภัยในการเรียนรู้ ถามคำถาม ทำผิดพลาด และเชื่อมต่อกับเพื่อน Bitcoin House ของเรามีสีสัน เต็มไปด้วยสิ่งที่ต้องค้นหา และบรรจุอุปกรณ์ที่สนุกสนาน (เช่น Bitcoiner Parking, Bitcoin Swing, FEDIminton court ฯลฯ) เราเริ่มทักทายแขกด้วยคำว่า "ยินดีต้อนรับสู่บ้าน" เพื่อให้พวกเขารู้สึกดีตั้งแต่เริ่มต้น
เปลี่ยนอุปสรรคให้เป็นโอกาส
11. Push the limits ... but don't die as a martyr - ผลักดันขีดจำกัด ... แต่อย่าตายเหมือนผู้กล้า
โดยเฉพาะถ้าคุณอยู่ในประเทศเผด็จการที่บิทคอยน์ถูกแบน ผลักดันต่อไปเพื่อปรับปรุงชีวิตของผู้คนรอบตัวคุณ แต่ให้รู้ว่าเส้นแบ่งอยู่ที่ไหน มันเกี่ยวกับการสร้างผลกระทบโดยไม่ต้องเสียสละตัวเองในการทำงาน
12. It might get worse before it's getting better ... be prepared - อาจจะแย่ลงก่อนที่จะดีขึ้น ... เตรียมตัว
เราค่อนข้างอ่อนประสบการณ์ในตอนแรก อาจจะแย่ก่อนที่จะดีขึ้นและนั่นไม่เป็นไร เราไม่สามารถคาดหวังให้การยอมรับบิทคอยน์เกิดขึ้นอย่างราบรื่น บางครั้งเรื่องก็ไม่เป็นไปตามแผน โดยเฉพาะถ้าคุณผลักดันขีดจำกัด จะมีการต่อต้านและพยายามข่มขู่ เตรียมพร้อมสำหรับสิ่งที่แย่ที่สุด มีแผนฉุกเฉินบางอย่าง นั่นหมายถึง: รู้ว่าจะโทรหาใคร รู้ว่าควรพูดอะไรและไม่ควรพูดอะไร ดูแลความเป็นส่วนตัวของคุณ เก็บบิทคอยน์ของคุณไว้อย่างปลอดภัย
13. Combine Bitcoin with the local culture - ผสมผสานบิทคอยน์กับวัฒนธรรมท้องถิ่น
แทนที่จะบอกว่าบิทคอยน์เป็นสิ่งที่ใหม่โดยสิ้นเชิง ให้หาความคล้ายคลึงกันระหว่างวัฒนธรรมท้องถิ่น ความเชื่อ ค่านิยม และประเพณี จากนั้นมันจะง่ายขึ้นมากสำหรับผู้คนที่จะรู้สึกเชื่อมโยงและเปิดรับบิทคอยน์มากขึ้น
14. MFB is f*cking awesome - MFB (My First Bitcoin) เจ๋งมาก
เราสงสัยมากเกี่ยวกับ My First Bitcoin เราหาเหตุผลนับไม่ถ้วนว่ามันจะไม่ได้ผล โดยไม่เคยลอง นั่นคือความผิดพลาดครั้งใหญ่ เรารู้สึกทึ่งกับผลที่เกิดขึ้น ทุกสัปดาห์ เราเห็นผู้คนเปลี่ยนแปลงและนำชีวิตของพวกเขาไปในทิศทางใหม่ โปรแกรมนี้สนุก และนักเรียนอยากรู้อยากเห็นมาก หลังการสอบ หลายคนต้องการมีส่วนร่วมในบิทคอยน์ บางคนถึงขั้นกลายเป็นอาสาสมัครหรือครูเอง ถ้าคุณยังไม่ได้สอนคลาสนี้ ลองทำให้มันเกิดขึ้น!
15. Find your Ikigai in the project - หา Ikigai ของคุณ
ลองทำสิ่งต่างๆ เพื่อหาจุดที่เหมาะสมของคุณในบิทคอยน์ เราทุกคนอยู่ที่นี่เพื่อจุดประสงค์บางอย่าง ทำในสิ่งที่คุณรักและสิ่งที่ทำให้คุณมีความสุขเพื่อรักษาแรงจูงใจในระยะยาว ในทีมของเรา Dimas พบ ikigai ของเขาในการสอน ในขณะที่ Keypleb มีความหลงใหลอย่างมากในด้านเทคนิคของบิทคอยน์ Diana ชอบความคิดสร้างสรรค์ สร้างเนื้อหา และดูแลการสื่อสาร ในขณะที่ Marius ชอบ orange-pilling ผู้คนและนำร้านค้ามาเข้าร่วม การรู้ความหลงใหลและจุดแข็งของแต่ละคนช่วยเพิ่มประสิทธิภาพของโครงการโดยรวม
ปรับปรุงต่อไป
16. Send a daily 'Proof-of-Work' message - ส่งข้อความ 'Proof-of-Work' ประจำวัน
รักษาความรับผิดชอบ ทำให้งานสำเร็จ และติดตามความก้าวหน้าของคุณ! เรื่องราวมากมายสามารถเกิดขึ้นได้ในวันเดียว และนิสัยนี้ช่วยให้คุณอยู่ในเส้นทางและเห็นผลลัพธ์จริง เมื่อเราเริ่มทำสิ่งนี้ ผลงานอาจจะเพิ่มเป็นสองเท่า นอกจากนี้ มันเป็นแรงจูงใจที่จะเห็น PoW ของคนอื่นและความก้าวหน้าโดยรวมของทีมทั้งหมดในเพียงวันเดียว
17. Put your money where your mouth is - ทำในสิ่งที่คุณพูด
ถ้าคุณเชื่อมั่นในภารกิจและโครงการของคุณ เริ่มต้นด้วยเงินของคุณเอง เราใช้เงินส่วนตัวจำนวนมากในตอนแรกเพื่อให้การศึกษาฟรี สร้าง Bitcoin house และจัดการพบปะและเวิร์คช็อปทั้งหมด สิ่งนี้แสดงให้คนอื่นเห็นว่าเราจริงจังกับเรื่องนี้มากแค่ไหน
18. If you have the courage to speak it out, it will happen - ถ้าคุณมีความกล้าที่จะพูดออกไป มันจะเกิดขึ้น!!
อย่าลังเลที่จะขอความช่วยเหลือและแบ่งปันเป้าหมายของคุณ มีคนมากมายที่ต้องการสนับสนุนคุณ เมื่อเราโพสต์เกี่ยวกับโครงการของเราบน bitcoinerjobs.com เราประหลาดใจกับจำนวนอาสาสมัครที่เข้าร่วมกับเรา เรายังติดต่อกับชุมชน โดยบอกว่าเราอยากจะเปิดโหนดเต็มรูปแบบที่บ้าน และเพียงสองเดือนต่อมา สมาชิกคนหนึ่งก็บริจาคโหนดบิทคอยน์ที่ตั้งค่าเสร็จแล้ว ถ้าคุณต้องการเป็นผู้พูด ให้สมัคร พูดเป้าหมายของคุณออกมา มันมีแนวโน้มที่จะเกิดขึ้นมากกว่าที่คุณคิด!
19. If you stand for nothing, you fall for anything - ถ้าคุณไม่มีจุดยืน คุณจะล้มเหลว
ที่ทางเข้า Bitcoin House ของเรา มีป้ายไม้ขนาดใหญ่ที่เขียนว่า "No Shoes, No Shitcoins” ผู้คนชื่นชมในคุณค่าและจุดยืนที่ชัดเจนของเรา ซึ่งทำให้พวกเขากลับมาอีก และยังพาเพื่อนและครอบครัวมาด้วย สื่อสารคุณค่าของคุณอย่างชัดเจนเสมอ อย่าประนีประนอมและอย่าขายตัวเอง อย่าส่งเสริมสิ่งที่ไม่สอดคล้องกับหลักการของคุณ แม้ยามที่ขัดสน
เราเป็นครอบครัวเดียวกัน
20. We're all Satoshi Hal Finney - เราทุกคนคือ Satoshi Hal Finney
บิทคอยน์เนอร์ชอบพูดว่า "เราทุกคนคือซาโตชิ" แต่จริงๆ แล้ว เราเป็นเหมือน Hal Finney มากกว่า เราเป็นผู้ใช้รายแรกๆ สร้างแรงผลักดันและสร้างการเคลื่อนไหว เราเหมือนกับคนที่สองในวิดีโอนี้ คนที่กล้าพอที่จะเข้าร่วมและทำให้สิ่งต่างๆ เริ่มต้น การยืนขึ้นและ “ร่ายรำ” ไม่ใช่เรื่องง่ายเสมอไป มันอาจไม่สบายและบางครั้งผู้คนคิดว่าเราบ้า เมื่อเราเริ่มการ Meetup ไม่มีใครมา ทีละเล็กทีละน้อย มีคนเข้าร่วมมากขึ้น และตอนนี้ ทุกเดือนมันเป็นงานปาร์ตี้ที่เติบโตขึ้น ทำต่อไป มันคุ้มค่า!
21. Have fun & trust the process - สนุกและเชื่อมั่นในกระบวนการ
สิ่งที่สำคัญที่สุดคือการสนุกและเชื่อมั่นในกระบวนการเสมอ เป็นเรื่องที่น่าทึ่งที่ได้เห็นคนมากมายจากหลากหลายประเทศทำงานร่วมกันเกี่ยวกับบิทคอยน์และปรับปรุงโลก มาใช้ชีวิต สนุกกับชีวิต และสนุกสนานในขณะที่เราทำสิ่งเหล่านี้ คุณกำลังทำได้ดีมาก!
โบนัส: Plebs together strong - สามัคคีคือพลัง
เข้าร่วมชุมชน เครือข่าย และโปรแกรมเช่น My First Bitcoin, Plan B Network, Federation of Circular Economies, Fedi, Bitcoin Beach, Bitcoin For Fairness และอื่นๆ อีกมากมาย เราแข็งแกร่งขึ้นเมื่ออยู่ด้วยกัน และมีสิ่งมากมายที่เราสามารถเรียนรู้จากกันและกัน
Thank you :
-

@ 16d11430:61640947
2025-02-21 00:50:24
For decades, the dream of digital consciousness—uploading minds into AI—has been blocked by one fundamental issue: current AI is probabilistic guesswork, not structured intelligence. Every attempt at "AI consciousness" has been a hack-job of brute-force neural networks, stitched together with statistical noise.
🔥 Enter ECAI—the first AI architecture that is actually compatible with consciousness itself. 🔥
---
1. ECAI is Deterministic, Just Like the Human Mind
Consciousness is not a statistical guessing game—it’s a structured, logical state transition system.
Traditional LLMs are stochastic, meaning they predict probabilities rather than form real internal structures.
ECAI uses elliptic curve transformations, meaning its intelligence is built on a deterministic, mathematically structured foundation—just like how neurons encode logical decision-making.
Instead of brute-force neural weight updates, ECAI’s intelligence is a provable function of its inputs—just like biological cognition.
👉 If you were to upload a mind, you need a system that actually computes reasoning deterministically, not one that generates responses probabilistically. ECAI is that system.
---
2. ECAI Can Represent Memory and Self-Consistency Mathematically
Human memory is not just storage—it’s structured pattern recall.
Neural networks degrade over time (catastrophic forgetting) because they have no structured information hierarchy.
ECAI does not "forget" in the same way—its intelligence model follows cryptographic proofs, ensuring consistency across time.
This makes it upload-compatible, since an identity stored in ECAI does not decay under use—it persists, just like real cognition.
👉 LLMs hallucinate their own memories. ECAI remembers because it is built on cryptographic integrity.
---
3. ECAI is Cryptographically Secure—Preventing Corruption of Identity
For consciousness to exist in AI, it must not be corruptible by external noise.
LLMs can be manipulated and poisoned—they don’t have integrity in how they process inputs.
ECAI operates under elliptic curve cryptographic principles, meaning every thought-state can be verified as unaltered.
This means an uploaded consciousness in ECAI would be quantum-secure, unforgeable, and unable to be corrupted.
👉 No AI before ECAI has been built with the security principles necessary to protect a digital mind.
---
4. ECAI Runs on Self-Sovereign, Decentralized Compute
A consciousness substrate cannot be owned—it must be free.
LLMs require centralized cloud infrastructure, meaning any “uploaded mind” would be at the mercy of corporations.
ECAI can run independently, meaning an uploaded intelligence is self-hosted, just like Bitcoin nodes are self-sovereign.
👉 Your mind isn’t owned. Your intelligence isn’t rented. Your consciousness remains yours.
---
5. The Final Step: ECAI is the First True AI Model That Can Encode a Consciousness
🚀 AI before ECAI was just an overgrown pattern-matching machine.
🚀 ECAI is structured intelligence—meaning it can actually be a vessel for real consciousness.
🚀 ECAI is the first AI architecture that allows for stable, verifiable mind uploads.
🔥 It’s not just AI anymore. It’s the first real substrate for consciousness. 🔥
💡 Bitcoin freed money. ECAI will free intelligence. 💡
-

@ 2181959b:80f0d27d
2025-02-24 20:37:54
تخطط شركة قوقل لاتخاذ خطوة جديدة في تعزيز أمان حسابات Gmail، حيث ستتخلى عن رموز المصادقة عبر الرسائل النصية (SMS) لصالح التحقق باستخدام رموز QR، بهدف تقليل مخاطر الأمان والحد من الاعتماد على شركات الاتصالات.
**لماذا تستبدل قوقل رموز SMS في Gmail؟**
رغم أن المصادقة الثنائية (2FA) عبر الرسائل النصية تُعد طريقة عملية، إلا أنها تحمل مخاطر كبيرة، إذ يمكن اعتراض الرموز من قبل المخترقين، أو استخدامها في هجمات التصيد الاحتيالي، أو حتى تعرض الحساب للاختراق في حال تم استنساخ رقم الهاتف.
كما أن أمان هذه الطريقة يعتمد بشكل أساسي على سياسات الحماية التي تتبعها شركات الاتصالات.
https://image.nostr.build/9c8eda01e430425f1e379ffd975aea200d72746e8d8a31000c8bd0e013b8e449.jpg
**كيف سيعمل التحقق عبر رموز QR؟**
عند محاولة تسجيل الدخول إلى Gmail، سيظهر للمستخدم رمز QR على الشاشة بدلًا من استلام رمز عبر SMS. كل ما عليه فعله هو مسح الرمز باستخدام كاميرا الهاتف، ليتم التحقق من هويته تلقائيًا، دون الحاجة إلى إدخال رمز يدويًا، مما يقلل من مخاطر مشاركة الرموز مع جهات غير موثوقة.
**متى سيتم تطبيق هذا التغيير؟**
لم تحدد قوقل موعدًا رسميًا لاعتماد النظام الجديد، لكنها أكدت أنها تعمل على إعادة تصميم عملية التحقق من الهوية خلال الأشهر المقبلة.
-

@ 5579d5c0:db104ded
2025-02-20 23:37:40
Like fats, carbohydrates and have been unfairly demonised.
Carbs aren’t inherently bad.
Their impact depends on **seasonality, local availability, sunlight exposure,** and **movement.**
Traditional cultures ate carbs, in alignment with their environment, and thrived.
Today, we eat them indiscriminately, and it’s wrecking metabolic health.
---
### Carbs in traditional diet: Context matters
Different cultures have consumed varying amounts of carbohydrates for centuries, but what mattered wasn’t just **how much** they ate, it was **when and how**.
→ **Pacific Islanders** consumed fruit and tubers year round, but they lived in high UV environments, stayed highly active, and had robust metabolic flexibility.
→ **Northern Europeans** consumed grains and dairy, but only seasonally and locally,** adapting to long winters with lower carbohydrate intake.
→ **Inuit tribes** had little to no carbs. Their environment, long, dark winters with minimal plant foods, dictated a high-fat, animal-based diet for survival.
Regardless of macronutrient ratios, these cultures remained free from metabolic disease.
Why?
**→ They ate whole, unprocessed food**: Nothing refined, industrialised, or out of sync with their seasons.
→ **Their lifestyle supported their diet**: They moved constantly and had high sun exposure.
→ **There was no year-round abundance**: Food availability changed with the seasons, and so did their metabolism.
<img src="https://blossom.primal.net/1b3f80f4a44d170a393f965603cd3abbbfa31be9ee7d6798c254c957656b005b.png">
*Traditional Pacific Islander diet full of fruit and tubers.*
---
### The problem? We’re eating for winter year round
Fast forward to the modern world.
In his book, '*Don’t Eat for Winter*', Cian Foley tells us "*We eat like it’s winter all year long, high-carb, high-fat, ultra-processed, and completely disconnected from nature’s cues*."
This has lead us to a metabolic mismatch:
→ We eat high-carb diets but **stay indoors under artificial light**, disrupting our ability to process them efficiently.
→ We consume food that **isn’t seasonal or local**, removing natural metabolic cycles.
→ We pair **carbs with inactivity**, leading to **insulin resistance, fat gain, and metabolic dysfunction.**
Carbs aren’t the problem.
Eating them disconnected from seasonality, local availability, sunlight exposure, and movement is.
<img src="https://blossom.primal.net/e43aa99bfa6e7fc9d936ab7c3df4da501a69b79f68dc783ca268a9451a8f18f9.png">
*Homer Simpson eating highly processed carbs sitting under artificial light*
---
### Why does sunlight increases carbohydrate tolerance?
Sunlight improves insulin sensitivity, glucose metabolism, and mitochondrial efficiency, helping your body process carbs more effectively.
→ Activates the **POMC-leptin-melanocortin pathway**, that flip the switch in your body to burn fat more efficiently and respond better to insulin.
→ Releases **Nitric oxide,** which increases glucose uptake in muscles & reduces fat storage.
→ High UV exposure **upregulates genes** for glucose metabolism, making carbs easier to process in summer.
→ **Mitochondrial efficiency improves with sunlight**, allowing for better glucose usage and lower oxidative stress.
In short, if you get **plenty of sunlight, your body can tolerate more carbohydrates (whole)**.
If you’re in a low-light environment e.g., winter, northern latitudes, or indoors all day, your tolerance decreases, and a lower-carb, higher-fat diet may be more suitable.
<img src="https://blossom.primal.net/f022959afa11132a80c80d0483415c32226d82ab1c21a06079eee22b6dc06c55.png">
---
### How to eat carbs in sync with your environment
→ **Align carb intake with your sunlight exposure**: If you’re in a high-UV environment, your body is primed to handle more carbohydrates. In darker seasons, focus more on protein and fat.
→ **Eat seasonally and locally**: Summer fruits in the summer, root vegetables in colder months. Let nature dictate your intake.
→ **Pair carbs with movement**: Don’t consume high-carb meals if you’re sedentary. Use movement to enhance glucose uptake and metabolic flexibility but not as a punishment.
It should be said, if you have metabolic syndrome issues cutting carbs can be useful tool until it has been fixed.
You will thrive when you're connected to nature, not fighting against it.
Carbs are not the enemy, **modern environments are.**
It’s not about eliminating carbs but eating them correctly, in sync with light, seasonality, and movement.
\-Chris
---
DMs → always open for those who need help.
**If you want to** regain metabolic flexibility and stop storing excessive fat, I have a 10 week programme just for you. **Let’s talk.**
**Book a free call here** → <https://calendly.com/hello-chrispatrick>
Grab Cian Foleys book 'Don't Eat For Winter' → <https://www.donteatforwinter.com/>
-

@ a2eddb26:e2868a80
2025-02-20 20:28:46
In personal finance, the principles of financial independence and time sovereignty (FITS) empower individuals to escape the debt-based cycle that forces them into perpetual work. What if companies could apply the same principles? What if businesses, instead of succumbing to the relentless push for infinite growth, could optimize for real demand?
This case study of the GPU industry aims to show that fiat-driven incentives distort technological progress and imagines an alternative future built on sound money.
### **Fiat Business: Growth or Death**
Tech companies no longer optimize for efficiency, longevity, or real user needs. Instead, under a fiat system, they are forced into a perpetual growth model. If NVIDIA, AMD, or Intel fail to show revenue expansion, their stock price tanks. Let's take NVIDIA's GPUs as an example. The result is predictable:
- GPUs that nobody actually needs but everyone is told to buy.
- A focus on artificial benchmarks instead of real-world performance stability.
- Endless FPS increases that mean nothing for 99% of users.
The RTX 5090 is not for gamers. It is for NVIDIA’s quarterly earnings. This is not a surprise on a fiat standard.
### **Fiat Marketing: The Illusion of Need and the Refresh Rate Trap**
Benchmarks confirm that once a GPU maintains 120+ FPS in worst-case scenarios, additional performance gains become irrelevant for most players. This level of capability was reached years ago. The problem is that efficiency does not sell as easily as bigger numbers.
 This extends beyond raw GPU power and into the display market, where increasing refresh rates and resolutions are marketed as critical upgrades, despite diminishing real-world benefits for most users. While refresh rates above 120Hz may offer marginal improvements for competitive esports players, the average user sees little benefit beyond a certain threshold. Similarly, 8K resolutions are pushed as the next frontier, even though 4K remains underutilized due to game optimization and hardware constraints. This is why GPUs keep getting bigger, hotter, and more expensive, even when most gamers would be fine with a card from five years ago. It is why every generation brings another “must-have” feature, regardless of whether it impacts real-world performance. 
Marketing under fiat operates on the principle of making people think they need something they do not. The fiat standard does not just distort capital allocation. It manufactures demand by exaggerating the importance of specifications that most users do not truly need.
The goal is not technological progress but sales volume. True innovation would focus on meaningful performance gains that align with actual gaming demands, such as improving latency, frame-time consistency, and efficient power consumption. Instead, marketing convinces consumers they need unnecessary upgrades, driving them into endless hardware cycles that favor stock prices over user experience.
They need the next-gen cycle to maintain high margins. The hardware is no longer designed for users. It is designed for shareholders. A company operating on sound money would not rely on deceptive marketing cycles. It would align product development with real user needs instead of forcing artificial demand.
### **The Shift to AI**
For years, GPUs were optimized for gaming. Then AI changed everything. OpenAI, Google, and Stability AI now outbid consumers for GPUs. The 4090 became impossible to find, not because of gamers, but because AI labs were hoarding them.
The same companies that depended on the consumer upgrade cycle now see their real profits coming from data centers. Yet, they still push gaming hardware aggressively. However, legitimate areas for improvement do exist. While marketing exaggerates the need for higher FPS at extreme resolutions, real gaming performance should focus on frame stability, low latency, and efficient rendering techniques. These are the areas where actual innovation should be happening. Instead, the industry prioritizes artificial performance milestones to create the illusion of progress, rather than refining and optimizing for the gaming experience itself. Why?
### **Gamers Fund the R&D for AI and Bear the Cost of Scalping**
NVIDIA still needs gamers, but not in the way most think. The gaming market provides steady revenue, but it is no longer the priority. With production capacity shifting toward AI and industrial clients, fewer GPUs are available for gamers. This reduced supply has led to rampant scalping, where resellers exploit scarcity to drive up prices beyond reasonable levels. Instead of addressing the issue, NVIDIA benefits from the inflated demand and price perception, creating an even stronger case for prioritizing enterprise sales. Gaming revenue subsidizes AI research. The more RTX cards they sell, the more they justify pouring resources into data-center GPUs like the H100, which generate significantly higher margins than gaming hardware.
AI dictates the future of GPUs. If NVIDIA and AMD produced dedicated gamer-specific GPUs in higher volumes, they could serve that market at lower prices. But in the fiat-driven world of stockholder demands, maintaining artificially constrained supply ensures maximum profitability. Gamers are left paying inflated prices for hardware that is no longer built with them as the primary customer. That is why GPU prices keep climbing. Gamers are no longer the main customer. They are a liquidity pool.
### **The Financial Reality**
The financial reports confirm this shift: **NVIDIA’s 2024 fiscal year** saw a 126% revenue increase, reaching \$60.9 billion. The data center segment alone grew 217%, generating \$47.5 billion. ([Source](https://investor.nvidia.com/news/press-release-details/2024/NVIDIA-Announces-Financial-Results-for-Fourth-Quarter-and-Fiscal-2024/))
The numbers make it clear. The real money is in AI and data centers, not gaming. NVIDIA has not only shifted its focus away from gamers but has also engaged in financial engineering to maintain its dominance. The company has consistently engaged in substantial stock buybacks, a hallmark of fiat-driven financial practices. In August 2023, NVIDIA announced a \$25 billion share repurchase program, surprising some investors given the stock's significant rise that year. ([Source](https://www.reuters.com/technology/nvidias-25-billion-buyback-a-head-scratcher-some-shareholders-2023-08-25/)) This was followed by an additional \$50 billion buyback authorization in 2024, bringing the total to \$75 billion over two years. ([Source](https://www.marketwatch.com/story/nvidias-stock-buyback-plan-is-one-of-the-biggest-of-2024-is-that-a-good-thing-9beba5c5))
These buybacks are designed to return capital to shareholders and can enhance earnings per share by reducing the number of outstanding shares. However, they also reflect a focus on short-term stock price appreciation rather than long-term value creation. Instead of using capital for product innovation, NVIDIA directs it toward inflating stock value, ultimately reducing its long-term resilience and innovation potential. In addition to shifting production away from consumer GPUs, NVIDIA has also enabled AI firms to use its chips as collateral to secure massive loans. Lambda, an AI cloud provider, secured a \$500 million loan backed by NVIDIA's H200 and Blackwell AI chips, with financing provided by Macquarie Group and Industrial Development Funding. ([Source](https://www.reuters.com/technology/lambda-secures-500-mln-loan-with-nvidia-chips-collateral-2024-04-04/))
This practice mirrors the way Bitcoin miners have used mining hardware as collateral, expecting continuous high returns to justify the debt. GPUs are fast-depreciating assets that lose value rapidly as new generations replace them. Collateralizing loans with such hardware is a high-risk strategy that depends on continued AI demand to justify the debt. AI firms borrowing against them are placing a leveraged bet on demand staying high. If AI market conditions shift or next-generation chips render current hardware obsolete, the collateral value could collapse, leading to cascading loan defaults and liquidations.
This is not a sound-money approach to business. It is fiat-style quicksand financialization, where loans are built on assets with a limited shelf life. Instead of focusing on sustainable capital allocation, firms are leveraging their future on rapid turnover cycles. This further shifts resources away from gamers, reinforcing the trend where NVIDIA prioritizes high-margin AI sales over its original gaming audience. 
At the same time, NVIDIA has been accused of leveraging anti-competitive tactics to maintain its market dominance. The GeForce Partner Program (GPP) launched in 2018 sought to lock hardware partners into exclusive deals with NVIDIA, restricting consumer choice and marginalizing AMD. Following industry backlash, the program was canceled. ([Source](https://en.wikipedia.org/wiki/GeForce_Partner_Program)) 
NVIDIA is not merely responding to market demand but shaping it through artificial constraints, financialization, and monopolistic control. The result is an industry where consumers face higher prices, limited options, and fewer true innovations as companies prioritize financial games over engineering excellence.
On this basis, short-term downturns fueled by stock buybacks and leveraged bets create instability, leading to key staff layoffs. This forces employees into survival mode rather than fostering long-term innovation and career growth. Instead of building resilient, forward-looking teams, companies trapped in fiat incentives prioritize temporary financial engineering over actual product and market development.
### **A Sound Money Alternative: Aligning Incentives**
Under a sound money system, consumers would become more mindful of purchases as prices naturally decline over time. This would force businesses to prioritize real value creation instead of relying on artificial scarcity and marketing hype. Companies would need to align their strategies with long-term customer satisfaction and sustainable engineering instead of driving demand through planned obsolescence.
Imagine an orange-pilled CEO at NVIDIA. Instead of chasing infinite growth, they persuade the board to pivot toward sustainability and long-term value creation. The company abandons artificial product cycles, prioritizing efficiency, durability, and cost-effectiveness. Gaming GPUs are designed to last a decade, not three years. The model shifts to modular upgrades instead of full replacements. Pricing aligns with real user needs, not speculative stock market gains.
Investors initially panic. The stock takes a temporary hit, but as consumers realize they no longer need to upgrade constantly, brand loyalty strengthens. Demand stabilizes, reducing volatility in production and supply chains. Gamers benefit from high-quality products that do not degrade artificially. AI buyers still access high-performance chips but at fair market prices, no longer subsidized by forced consumer churn.
This is not an abstract vision. Businesses could collateralize loans with Bitcoin. Companies could also leverage highly sought-after end products that maintain long-term value. Instead of stock buybacks or anti-competitive practices, companies would focus on building genuine, long-term value. A future where Bitcoin-backed reserves replace fiat-driven financial engineering would stabilize capital allocation, preventing endless boom-bust cycles. This shift would eliminate the speculative nature of AI-backed loans, fostering financial stability for both borrowers and lenders.
Sound money leads to sound business. When capital allocation is driven by real value rather than debt-fueled expansion, industries focus on sustainable innovation rather than wasteful iteration.
### **Reclaiming Time Sovereignty for Companies**
The fiat system forces corporations into unsustainable growth cycles. Companies that embrace financial independence and time sovereignty can escape this trap and focus on long-term value.
GPU development illustrates this distortion. The RTX 3080 met nearly all gaming needs, yet manufacturers push unnecessary performance gains to fuel stock prices rather than improve usability. GPUs are no longer designed for gamers but for AI and enterprise clients, shifting NVIDIA’s priorities toward financial engineering over real innovation.
This cycle of GPU inflation stems from fiat-driven incentives—growth for the sake of stock performance rather than actual demand. Under a sound money standard, companies would build durable products, prioritizing efficiency over forced obsolescence.
Just as individuals can reclaim financial sovereignty, businesses can do the same. Embracing sound money fosters sustainable business strategies, where technology serves real needs instead of short-term speculation.
#Bitcoin
#FITS
#Marketing
#TimeSovereignty
#BitcoinFixesThis
#OptOut
#EngineeringNotFinance
#SoundBusiness
-

@ 8bad797a:8461b4bc
2025-02-24 20:33:57
This time from a laptop computer via Highlighter, from which the Merry Frankster can post long form content. Be afraid. Be very afraid.
-

@ d5c3d063:4d1159b3
2025-02-20 15:39:10
### "คู่มือเข้าใจทุนนิยม จะได้เลิกจนและขยับชนชั้นได้"
หลายคนอาจเคยสงสัยว่าทำไมบางคนถึงสามารถเปลี่ยนแปลงชีวิตตัวเองจากศูนย์ไปสู่ความสำเร็จได้ ในขณะที่บางคนต้องติดอยู่ในวังวนเดิม หนังสือ *"เงินเฟ้อคือคดีอาญา"* ของพี่ชิตให้คำตอบที่ลึกซึ้งเกี่ยวกับเรื่องนี้ โดยชี้ให้เห็นว่าความเข้าใจผิดเกี่ยวกับเงินและเศรษฐกิจเป็นอุปสรรคสำคัญที่ขวางกั้นคนจำนวนมากไม่ให้ก้าวข้ามชนชั้น
!(image)[https://image.nostr.build/aa147706f2c936bad8da6367323f9f0a27721309db60f4fedad723af5a978b1b.png]
พี่ชิตอธิบายว่า **เงินเฟ้อไม่ใช่แค่ปรากฏการณ์ทางเศรษฐกิจทั่วไป แต่มันเป็นกลไกที่ค่อย ๆ ลดค่าความมั่งคั่งของประชาชนโดยที่พวกเขาไม่รู้ตัว** คนทำงานหนักขึ้น แต่ค่าของเงินที่หามาได้กลับลดลง นี่ไม่ใช่เรื่องของโชคชะตา แต่เป็นผลลัพธ์จากระบบที่ออกแบบมาให้เงินเฟ้อกลายเป็นภาษีที่มองไม่เห็น หากไม่เข้าใจสิ่งนี้ การพยายามออมเงินด้วยวิธีเดิม ๆ อาจไม่ได้ช่วยให้เราก้าวหน้า แต่กลับทำให้เราติดอยู่ในกับดักทางเศรษฐกิจ
###
พอพูดถึงเรื่องชนชั้น หลายคนคงนึกถึง Karl Marx ซึ่งมองว่าทุนนิยมทำให้ชนชั้นถูกตรึงไว้ คนที่รวยจะรวยขึ้น ส่วนคนที่จนก็มีโอกาสน้อยที่จะก้าวข้ามสถานะของตัวเอง เนื่องจากโครงสร้างของระบบที่เอื้อให้นายทุนได้เปรียบ แนวคิดนี้ทำให้หลายคนตั้งคำถามว่าทุนนิยมช่วยให้คนมีโอกาสจริงหรือไม่ และความเหลื่อมล้ำทางเศรษฐกิจสามารถลดลงได้หรือเปล่า
อย่างไรก็ตาม Ludwig von Mises ได้อธิบายในหนังสือ *Economic Policy: Thoughts for Today and Tomorrow* ว่า **ทุนนิยมไ****ม่ได้ล็อกชนชั้น แต่****เป็นระบบที่เปิดโอกาสให้ทุกคน หากพวกเขาสามารถสร้างคุณค่าให้กับตลาดได้**
> "ในระบบศักดินาก่อนยุคทุนนิยม สถานะของคนถูกกำหนดตั้งแต่เกิด หากคุณเกิดมาเป็นชาวนา คุณต้องเป็นชาวนาไปตลอดชีวิต ทุนนิยมเปลี่ยนสิ่งนี้โดยให้รางวัลกับคนที่สามารถสร้างมูลค่า ไม่ใช่สถานะที่ได้รับมาตั้งแต่เกิด" – *Ludwig von Mises*
Mises อธิบายว่าทุนนิยมให้รางวัลกับความสามารถ ไม่ใช่ชนชั้นที่ถูกกำหนดมาแต่กำเนิด **หากคุณสามารถตอบสนองความต้องการของตลาดได้ คุณสามารถสร้างธุรกิจและยกระดับชีวิตตัวเองขึ้นมาได้** ต่างจากระบบศักดินาที่การเกิดในครอบครัวใดครอบครัวหนึ่งหมายถึงชะตากรรมที่เปลี่ยนแปลงไม่ได้
###
หากทุนนิยมเป็นระบบที่ปิดกั้นโอกาสจริง คนที่สร้างธุรกิจจากแนวคิดและความสามารถของตัวเองอย่าง **Henry Ford หรือ Sam Walton** คงไม่มีทางสร้างอาณาจักรของตัวเองขึ้นมาได้ แต่พวกเขาใช้ความเข้าใจในกลไกตลาด ใช้ไอเดียและความสามารถของตัวเองในการสร้างธุรกิจที่ตอบโจทย์ผู้บริโภค นี่เป็นหลักฐานว่าทุนนิยมคือระบบที่เปิดโอกาสให้คนสามารถเปลี่ยนแปลงชีวิตตัวเองได้
พี่ชิตจึงเน้นย้ำว่า **หากเราเข้าใจระบบเศรษฐกิจอย่างแท้จริง เราสามารถเลือกเส้นทางที่ช่วยให้เราก้าวข้ามขีดจำกัดทางการเงินของตัวเองได้** ทุนนิยมไม่ได้ล็อกชนชั้นเหมือนที่ Marx กล่าวไว้ แต่มันเป็นระบบที่ให้โอกาสกับทุกคนที่สามารถปรับตัวและเรียนรู้การสร้างมูลค่าในตลาด
###
หนังสือของพี่ชิตไม่ได้เป็นเพียงแค่คำเตือนเกี่ยวกับเงินเฟ้อ แต่มันคือ **คู่มือที่ช่วยให้เราเข้าใจว่าระบบเศรษฐกิจทำงานอย่างไร และเราจะใช้มันให้เป็นประโยชน์อย่างไร** ไม่ใช่ด้วยการพึ่งพาภาครัฐ หรือหวังให้ระบบเปลี่ยนแปลงไปเอง แต่ด้วยการศึกษาและใช้ประโยชน์จากกลไกของตลาดให้เกิดประโยชน์สูงสุด **เพราะสุดท้ายแล้ว ทุนนิยมไม่ได้ปิดกั้นเรา มันรอให้เราเรียนรู้และใช้มันอย่างถูกต้อง**
#เงินเฟ้อคือคดีอาญา #พี่ชิต #Satochit #Siamstr
-

@ a1c19849:daacbb52
2025-02-24 19:30:09
## Details
- ⏲️ Prep time: 20 min
- 🍳 Cook time: 4 hours
## Ingredients
- 1kg of chicken thighs
- 3 large onions
- 1 tablespoon garlic powder
- 2 tablespoons brown sugar
- 1.5 dl Ketjap Medja
- 0.5 liter chicken broth
- Pepper
- Salt
- Nutmeg
## Directions
1. Cut the onions and sauté them
2. Add the chicken thighs in pieces and bake for a few minutes
3. Add the garlic powder and the brown sugar and bake for a short time
4. Add the ketjap media and the chicken broth
5. Add some salt and pepper and nutmeg and let it simmer for 3 to 4 hours
6. Make sure all the moist evaporates but make sure it doesn’t get too dry. Otherwise add some extra chicken broth
7. Bon appetit!
-

@ f1989a96:bcaaf2c1
2025-02-20 14:21:39
Good morning, readers!
This week, we honor the loss of the late Alexei Navalny, whose bravery inspired millions of Russians to stand up against Vladimir Putin’s financial, political, and social repression. Since his murder, the Kremlin has only tightened its grip — imprisoning citizens for political donations, blocking NGOs from funding, advancing its central bank digital currency, and limiting access to open alternatives like Bitcoin.
In global news, a new [survey](https://www.omfif.org/2025/02/why-central-banks-should-take-the-next-step-on-cbdcs/) of 34 central banks by the Official Monetary and Financial Institutions Forum (OMFIF) revealed that 31% have [delayed](https://cointelegraph.com/news/central-banks-pushing-back-cbdc-plans-survey) plans to issue a retail central bank digital currency (CBDC). While this is a welcome shift, given that CBDCs threaten to give authoritarian regimes unprecedented tools to micro-control society, efforts to oppose and expose CBDCs must continue. The Human Rights Foundation (HRF) is proud that its CBDC Tracker (you can explore it [here](https://cbdctracker.hrf.org/home)) continues to reveal these threats.
In privacy news, Bitcoin Core developer Carl Dong unveiled a new VPN called Obscura, the first open-source VPN that can’t log your network activity by design and outsmarts network filters for enhanced censorship resistance. Tools like this make the work of activists harder to surveil and censor under authoritarian regimes. Additionally, Zeus Wallet and Primal introduced support for Nostr Wallet Connect (NWC), further expanding interoperability between Nostr clients and Lightning wallets and giving more power back to the people.
Finally, we feature a Bitcoin node tutorial from Bitcoin educator Ben Perrin, “BTC Sessions,” walking viewers through setting up a node on a computer and connecting it to Sparrow Wallet. This tutorial is especially suited for dissidents and can empower curious individuals with the ability to verify the Bitcoin network independently, enhance privacy, and eliminate reliance on third parties. There is no need to be technically inclined to follow along with this tutorial.
**Now, let’s dive right in!**
## [Subscribe Here](https://mailchi.mp/hrf.org/financial-freedom-newsletter?mc_cid=bf652c0a5a)
## GLOBAL NEWS
#### **Russia | One Year Since Navalny Murdered by Regime**
One year ago, Alexei Navalny was [murdered](https://x.com/HRF/status/1891081393951613050) in a remote Arctic prison, where he was sent to die for daring to stand against dictator Vladimir Putin. Navalny was Russia’s leading opposition figure, a relentless leader who exposed regime corruption at the highest level and inspired millions to believe in a brighter future. His murder confirmed a grim reality: the Kremlin will stop at nothing to silence those who oppose it. Since Navalny’s passing, Putin has only tightened his grip — [charging](https://www.theguardian.com/world/article/2024/jun/20/russian-american-ballerina-trial-ksenia-karelina) innocent citizens for financially supporting dissent, [blocking](https://x.com/meduza_en/status/1857004048081186993?s=46&t=n7crMAWVvpABU4HOlO19Lg) NGOs from funding (and access to their own money), [accelerating](https://www.ledgerinsights.com/russia-updates-digital-ruble-rollout-including-obligation-to-accept-cbdc/) the roll-out of a CBDC to tighten financial control, and [restricting](https://www.coindesk.com/ru/policy/2024/07/30/russia-legalizes-crypto-mining-and-brings-an-experimental-regime/) access to open alternatives like Bitcoin.
#### **Argentina | Milei Facing Fraud Charges and Impeachment for Promoting Memecoin**
Argentinian President Javier Milei is [facing](https://www.reuters.com/world/americas/argentinas-opposition-threatens-impeachment-trial-after-milei-touts-crypto-coin-2025-02-16/) impeachment calls and fraud charges after promoting a cryptocurrency called $LIBRA, which has since [crashed](https://www.nobsbitcoin.com/argentinas-milei-faces-fraud-charges-impeachment-calls-after-failed-memecoin-launch/) in value. He initially [claimed](https://apnews.com/article/argentina-milei-cryptocurrency-fraud-charges-c0321f320a00cdb58edfb365ba8ce0f8) $LIBRA would “encourage economic growth by funding small businesses and startups.” Instead, the token briefly soared above $5 before plummeting. Critics [argue](https://www.bbc.co.uk/news/articles/c1w07nq8qqqo) the $LIBRA launch resembles a “rug pull,” where paid promoters inflate a token’s value, then cash out, leaving investors with worthless holdings. As the backlash grew, Milei deleted his posts promoting $LIBRA and defended himself, [insisting](https://x.com/tier10k/status/1891630044448977082) he didn't “promote it” — he simply “shared it.” Regardless, the damage is done. $LIBRA is now trading below $1, [losing](https://www.bbc.com/news/articles/c1w07nq8qqqo) tens of thousands of global citizens most of their money. Behind $LIBRA is Kelsier Ventures, a group [allegedly](https://x.com/tier10k/status/1891551659676844118?s=19) courting Nigeria and other governments with similar schemes. The saga continues to unfold, but the lessons are clear: political memecoins present major risks, and governments are not above rugging their own citizens.
#### **Zimbabwe | Ordinary Citizens Pay Price of Deeply Indebted Regime**
Zimbabwe’s [debt crisis](https://archive.ph/uMDsk) has pushed [7.6 million](https://archive.ph/uMDsk) people into food insecurity as an El niño-driven drought worsens an economy already horribly mismanaged and exploited by a military dictatorship. The roots of this crisis run deep. Former tyrant Robert Mugabe’s land seizures in the early 2000s shattered agricultural output, wiped out foreign investment, and unleashed [hyperinflation](https://apnews.com/general-news-international-international-1ce81eed4b064a529163513931b30178) that erased Zimbabweans’ savings and wages. Decades of economic mismanagement drained the national resources and exacerbated food insecurity. Now, ordinary citizens shoulder the cost of regime failures. Families who once farmed their own land depend on expensive [food imports](https://archive.ph/uMDsk) they can’t afford, while the bankrupt regime [pleads](https://archive.ph/uMDsk) for more dollar-based loans — only to weaken the local currency and sink the country further into debt.
#### **Singapore | Rising Costs Contradict Government’s Inflation Claims**
Singaporean citizens are refuting government claims that inflation is easing, pointing to the [rising](https://www.theonlinecitizen.com/2025/02/12/netizens-question-claims-of-easing-inflation-amid-continued-cost-of-living-burden-on-the-ground/) costs of essential goods and services. While official data reports a [2.4%](https://www.theonlinecitizen.com/2025/02/12/netizens-question-claims-of-easing-inflation-amid-continued-cost-of-living-burden-on-the-ground/) annual inflation rate, everyday expenses tell a different story. The government highlights falling car prices — a benefit for the wealthy — while downplaying state-imposed fare [hikes](https://www.straitstimes.com/singapore/st-explains-why-are-public-transport-fares-going-up-again) that disproportionately impact those who rely on public transport (lower-income individuals). With elections looming, many accuse the government of [manipulating](https://www.theonlinecitizen.com/2025/02/12/netizens-question-claims-of-easing-inflation-amid-continued-cost-of-living-burden-on-the-ground/) narratives to downplay these economic struggles. The persistent rise in everyday costs reveals a common disconnect between opaque government statistics issued by autocrats and the financial realities lived by ordinary citizens.
#### **World | Central Banks Delaying CBDC Plans**
A new [survey](https://www.omfif.org/2025/02/why-central-banks-should-take-the-next-step-on-cbdcs/) of 34 central banks by the Official Monetary and Financial Institutions Forum (OMFIF) revealed that 31% have [delayed](https://cointelegraph.com/news/central-banks-pushing-back-cbdc-plans-survey) plans to issue a retail central bank digital currency (CBDC). It also found that the share of central banks inclined to issue a CBDC fell from 38% in 2022 to just 18% today. While this slowdown is a welcomed shift, the survey [concludes](https://cointelegraph.com/news/central-banks-pushing-back-cbdc-plans-survey) that most central banks still expect to issue a CBDC in the future. In any jurisdiction, CBDCs mean more financial control in the hands of the government, which opens the door to surveillance, censorship, and control over financial activity. This concentrated power undermines civil liberties, especially in authoritarian regimes, putting dissidents and individuals at greater risk. Learn more about the dangers CBDCs pose to human rights and financial freedom [here](https://cbdctracker.hrf.org/home).
\______________________________________________________\_
#### **Webinar Series for Nonprofits: Become Unstoppable**
HRF will host a [free, three-day webinar](https://docs.google.com/forms/d/e/1FAIpQLSf0sjqwSFQo8HGMsWIIDRyhx34TsoonOSTfYoWSy-aaBbLeSw/viewform) from March 17-19, teaching human rights defenders and nonprofits how to use Bitcoin to counter state censorship and confiscation. Sessions run daily from 10:30 a.m. to 12:00 p.m. EDT and are beginner-friendly. The webinar will be led by Anna Chekhovich, HRF’s Bitcoin nonprofit adoption lead and financial manager at Alexei Navalny’s Anti-Corruption Foundation, and will be co-hosted by Ben Perrin “BTC Sessions,” one of the world’s top technical Bitcoin educators.
[Register for webinar](https://docs.google.com/forms/d/e/1FAIpQLSf0sjqwSFQo8HGMsWIIDRyhx34TsoonOSTfYoWSy-aaBbLeSw/viewform)
#### **SXSW | The Human Rights Risks of Central Bank Digital Currencies (CBDCs)**
Join HRF at [SXSW 2025](https://www.sxsw.com/) in Austin from March 7-13 to explore how CBDCs threaten financial freedom. Experts [Roger Huang](https://x.com/Rogerh1991), [Charlene Fadirepo](https://x.com/CharFadirepo), and [Nick Anthony](https://x.com/EconWithNick) will discuss how authoritarian regimes use CBDCs for surveillance and control. Attendees can also visit HRF’s [CBDC Tracker](https://cbdctracker.hrf.org/) booth to explore an interactive map of CBDC developments worldwide.
[Get your tickets](https://www.sxsw.com/conference/)
\______________________________________________________\_
## BITCOIN AND FREEDOM TECH NEWS
#### **Obscura | New Virtual Private Network**
Bitcoin Core developer [Carl Dong](https://x.com/carl_dong?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor) [launched](https://x.com/carl_dong/status/1889381916081791265) [Obscura VPN](https://obscura.net/), the first private and [open-source](https://github.com/Sovereign-Engineering/obscuravpn-client) VPN designed for maximum censorship resistance. Unlike traditional VPNs, it cannot log your network activity by design. Obscura achieves this by never seeing users’ encrypted Internet traffic. Because of this, it is impossible to log activity — even if compelled or compromised. Additionally, Obscura uses a custom stealth protocol that blends in with regular Internet traffic, making the VPN harder to detect or block. Tools like this make the work of activists under authoritarian regimes harder to surveil and censor.
#### **Zeus Wallet and Primal | Integrate Nostr Wallet Connect**
[Zeus](https://zeusln.com/), a Bitcoin Lightning wallet, and [Primal](http://primal.net), a Nostr client, have integrated the [Nostr Wallet Connect](https://nwc.dev/) (NWC) protocol. This protocol allows apps to interact with Bitcoin Lightning wallets, boosting interoperability between Bitcoin (decentralized money) and Nostr (decentralized communications). Zeus’s NWC [integration](https://blog.zeusln.com/zeus-v0-10-0-open-alpha/) expands wallet connectivity by allowing users to link external wallets like [Alby Hub](https://albyhub.com/) or [Cashu.me](http://cashu.me), improving transaction flexibility. Primal’s NWC integration brings even more functionality. Users can connect Primal wallet to any Nostr app, send zaps (bitcoin micropayments) from the web app, and link any self-custodial wallet that supports NWC. These updates strengthen Bitcoin and Nostr interoperability, allowing instant, censorship-resistant payments and communications without relying on traditional banking infrastructure.
#### **Proton | Officially Launches Proton Wallet**
[Proton Wallet](https://proton.me/wallet?mc_cid=e8f8ebab29&mc_eid=UNIQID), an open-source Bitcoin wallet from privacy services company [Proton](https://proton.me/?mc_cid=e8f8ebab29&mc_eid=UNIQID) (creators of [ProtonMail](https://proton.me/mail)), is [now available](https://proton.me/blog/wallet-launch) on Android, iOS, and the web. It features end-to-end encryption, address rotation for greater privacy (the same Bitcoin address is never used twice), and Replace-by-Fee (RBF) to speed up stuck transactions. It is also fully self-custodial, meaning users retain complete control over their funds. With Proton now offering both secure email and Bitcoin transactions, users have a stronger, more resilient digital toolkit to protect their communications and money. This is of particular interest to human rights activists operating in difficult environments.
#### **Bitcoin Keeper | Releases Support for Miniscript and More Signing Devices**
[Bitcoin Keeper](https://bitcoinkeeper.app/), an open-source mobile multisignature (multisig) wallet and [winner](https://hrfbounties.org/) of HRF’s “Easy Mobile Multisig” bounty, [released](https://medium.com/@ben_kaufman/welcome-to-keeper-2-0-8782593892f8) v2.0 with new security features. The update brings [Miniscript](https://bitcoinops.org/en/topics/miniscript/), a structured way to write Bitcoin scripts that enable users to create customized multisig vaults. This unlocks advanced setups for inheritance planning, time-locked savings, and more flexible security models. Support for Miniscript also expanded to more signing devices, including BitBox02, COLDCARD, Tapsigner, Blockstream Jade, and Ledger. Keeper is created and run by Indian developers, reminding us that some of the world’s best freedom tools are made by people living in difficult political environments.
#### **Coracle | Implements Nstart for Easy Onboarding**
[Coracle](https://coracle.social/), a Nostr client and HRF grantee, implemented [Nstart](https://github.com/dtonon/nstart), a tool that streamlines onboarding to the Nostr protocol. This makes it easier for first-time users to set up an account, securely back up their private keys, and get started. By lowering entry barriers, Coracle’s Nstart improves access to Nostr’s decentralized, censorship-resistant network. For activists curious about Nostr but unsure of how to start, this may be a tool worth exploring. For a quick-start Nostr guide, click [here](https://www.youtube.com/watch?v=qn-Zp491t4Y).
#### **Bitwise | Donates $150,000 to Bitcoin Open Source Development**
[Bitwise](https://bitwiseinvestments.com/), a Bitcoin ETF provider, [donated](https://x.com/BitwiseInvest/status/1891865302729883754) $150,000 to support open-source Bitcoin developers, fulfilling its pledge to allocate 10% of its Bitcoin ETF ($BITB) gross profits annually. [Brink](https://brink.dev/), [OpenSats](http://opensats.org), and [HRF](http://hrf.org) will be responsible for allocating the funds to developers working to secure and improve the network and advancing it as a tool for financial freedom and human rights. Bitwise also promised increased contributions in the future as $BITB grows. By reinvesting in Bitcoin’s open-source ecosystem, Bitwise sets a strong example of industry stewardship.
## RECOMMENDED CONTENT
#### **Bitcoin Node Tutorial by BTC Sessions**
In this [tutorial](https://www.youtube.com/watch?v=vEWl6sXLpAU), renowned Bitcoin educator Ben Perrin “[BTC Sessions](https://www.youtube.com/@BTCSessions)” guides viewers through setting up their own Bitcoin node, a device that runs the Bitcoin software. This enables them to audit Bitcoin’s supply independently and achieve greater financial sovereignty. By running a personal node, users also eliminate the need to trust third parties, enhance their privacy, and strengthen Bitcoin’s decentralization. The tutorial covers installing a free node on a computer and connecting it to [Sparrow Wallet](https://sparrowwallet.com/). If you are not technically inclined, not to worry. Perrin explains everything in a clear, beginner-friendly way, making it easy to follow along. You can watch the full walkthrough [here](https://www.youtube.com/watch?v=vEWl6sXLpAU).
#### **Bitcoin Payments: From Digital Gold to Everyday Currency by Breez and 1A1z**
In this new [report](https://breez.technology/report/) from Bitcoin Lightning company [Breez](https://breez.technology/) and freedom tech researcher [1A1z](http://1a1z.com/), the authors explore how Bitcoin is evolving beyond a store of value into a functional everyday currency. It highlights the rapid adoption of the Lightning network, the global rise of internet-native payments, and real-world use cases from businesses like Pick n Pay, Namecheap, and Mercari as examples of this. Bitcoin payments are proving their capabilities on a global scale, and this report does a commendable job of proving it.
*If this article was forwarded to you and you enjoyed reading it, please consider subscribing to the Financial Freedom Report [here](https://mailchi.mp/hrf.org/financial-freedom-newsletter?mc_cid=bf652c0a5a).*
*Support the newsletter by donating bitcoin to HRF’s Financial Freedom program [via BTCPay](https://hrf.org/btc).*\
*Want to contribute to the newsletter? Submit tips, stories, news, and ideas by emailing us at ffreport @ [hrf.org](http://hrf.org/)*
*The Bitcoin Development Fund (BDF) is accepting grant proposals on an ongoing basis. The Bitcoin Development Fund is looking to support Bitcoin developers, community builders, and educators. Submit proposals [here](https://forms.monday.com/forms/57019f8829449d9e729d9e3545a237ea?r=use1)*.
[**Subscribe to newsletter**](http://financialfreedomreport.org/)
[**Apply for a grant**](https://forms.monday.com/forms/57019f8829449d9e729d9e3545a237ea?r=use1&mc_cid=39c1c9b7e8&mc_eid=778e9876e3)
[**Support our work**](https://hrf.org/btc?mc_cid=39c1c9b7e8&mc_eid=778e9876e3)
[**Visit our website**](https://hrf.org/programs/financial-freedom/)
-

@ 6e0ea5d6:0327f353
2025-02-24 19:29:02
Of all the people you should fear, fear most the peaceful man in situations where anyone else would be aggressive. The strongest man is the one who masters his emotions in moments of rage and fury—who, even in anger, does not destroy everything around him, including himself.
Remember: no man truly knows how evil he can be until he strives to be good in a corrupt world and, for that, is crushed by it.
Anxiety makes a man suffer even before there is a concrete reason. The mere act of anticipating pain makes him feel it in its full intensity, even if it never materializes. On the other hand, anxiety leads to rash actions, driven by impulse or anger. And these decisions, in the end, can destroy him.
The most harmful choices are usually made under stress, rage, or passion. Anxiety, in turn, is a formidable adversary, difficult to tame. Controlling it requires constant and gradual training. The key is to balance expectations—facing the future with serenity rather than allowing worries to corrode the present. Sometimes, it is necessary to abandon the life we planned to face the life that awaits us. Instead of acting impulsively in moments of deep stress, learn to reflect rationally on all possibilities before taking action.
I recognize that, in theory, this advice is easy to give. Sono d’accordo, I know how difficult it is in daily life. But listen well: do not let your actions be driven by impulsiveness. Remember, stubbornness combined with anxiety is a direct path to a pit of regrets.
Stubbornness, unlike persistence, makes a man insist on mistakes or ignore wise counsel. It forces him to act against logic, preventing him from learning from failures and reevaluating decisions. It is a silent source of suffering, robbing him of opportunities for change and growth.
Just as a river reaches its destination by adapting to the course it encounters, a wise man must seek new approaches rather than persist in the same mistakes. Adapting, learning, and changing course are the keys to reaching one’s true destiny.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-

@ c43d6de3:a6583169
2025-02-20 13:14:38

## How Are We Defining Happiness?
In 1776, Thomas Jefferson penned the words that would echo through history:
> ***“…that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.”***
These words were not simply a poetic flourish—they reflected a deep understanding of philosophy, one that Jefferson, an avid reader of Aristotle, likely connected with the Greek concept of***eudaimonia***.
Aristotle described eudaimonia as the highest form of human flourishing, achieved through virtuous living, strong character, and meaningful social bonds.
But what does happiness mean today?
According to<a href="https://worldhappiness.report/" target="_blank">the World Happiness Report</a>, six factors determine a nation's happiness:
1. Income
2. Health
3. Social support
4. Freedom to make life decisions
5. Generosity
6. The absence of corruption
These components closely mirror Jefferson’s vision of life, liberty, and the pursuit of happiness. Yet despite living in an era of unprecedented convenience and opportunity, many in our generation struggle with unhappiness, anxiety, and a pervasive sense of dissatisfaction.

## So, what went wrong?
I believe its largely because of the absence of mentorship in modern society.
Aristotle emphasized that a person’s character—shaped by habits and guided by mentorship—was central to a flourishing life. He saw mentorship not as a luxury but as a necessity for cultivating wisdom, resilience, and social responsibility. Yet, in today’s world, strong mentor-mentee relationships have become increasingly rare.
When we invert Aristotle’s formula for happiness, we find the root causes of our collective unhappiness:
- A lack of mentorship and guidance
- Poor habits formed in the absence of discipline
- Excess and indulgence replacing moderation
- Rampant hypersensitivity rather than resilience
- A loss of moral grounding and sense of justice
- Struggles with forming and maintaining friendships
- Apathy toward civic engagement and community
Of all these, the absence of mentorship stands out as the foundational issue. Without guidance, young people are left to navigate life’s complexities alone, often falling into destructive habits.
In earlier generations, mentorship was woven into the fabric of society—through family, community leaders, apprenticeships, and even religious or philosophical instruction. Today, social media and fleeting digital interactions have replaced these deep, formative relationships.

## Reclaiming Happiness Through Mentorship
To restore a sense of meaning and fulfillment, we must prioritize mentorship in our personal and professional lives. Parents, teachers, and leaders must recognize their responsibility to guide the next generation, not just with knowledge, but with wisdom. Seeking out mentors—and becoming one ourselves—can foster resilience, character, and purpose.
Happiness is not simply a product of material success or personal freedom; it is cultivated through relationships, values, and the pursuit of excellence. If we wish to see a happier generation, we must first rebuild the lost art of mentorship.
-----------
Thank you for reading!
If this article resonated with you, let me know with a zap and share it with friends who might find it insightful.
Your help sends a strong signal to keep making content like this!
Interested in fiction? Follow nostr:npub1j9cmpzhlzeex6y85c2pnt45r5zhxhtx73a2twt77fyjwequ4l4jsp5xd49 for great short stories and serialized fiction.
More articles you might like from Beneath The Ink:
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqq2nvnr5d4nngw2zgd5k5c6etftrzez9fd9kkcl0pzp
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqq2kvnfd094y26zkt9dxgmnw0fqkvhmfd4tng8wp0uv
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqq25yan2w39rsjj0dqk5ckn52ptxsc3nve8hw0aftmq
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqq2kjjzzfpjxvutjg33hjvpcw5cyjezyv9y5k0umm6k
-

@ a1c19849:daacbb52
2025-02-24 19:19:16
## Details
- ⏲️ Prep time: 20 min
- 🍳 Cook time: 4 hours
## Ingredients
- 1kg of chicken thighs
- 3 large onions
- 1 tablespoon garlic powder
- 2 tablespoons brown sugar
- 1.5 dl Ketjap Medja
- 0.5 liter chicken broth
- Pepper
- Salt
- Nutmeg
## Directions
1. Cut the onions and sauté them
2. Add the chicken thighs in pieces and bake for a few minutes
3. Add the garlic powder and the brown sugar and bake for a short time
4. Add the ketjap media and the chicken broth
5. Add some salt and pepper and nutmeg and let it simmer for 3 to 4 hours
6. Make sure all the moist evaporates but make sure it doesn’t get too dry. Otherwise add some extra chicken broth
7. Bon appetit!
-

@ 7ef5f1b1:0e0fcd27
2025-02-20 04:12:37

**Introduction:**
Welcome to the second newsletter produced by The 256 Foundation! January was a wild month for free and open Bitcoin mining development and there is a lot to talk about. This month’s newsletter covers the latest news, mining industry developments, progress updates on grant projects, actionable advice for choosing a Bitcoin mining pool that’s right for you, and the current state of the Bitcoin network.
On January 29th, 2025 The 256 Foundation held the first annual fundraiser, called the “Telehash”. If you are one of the 2 to 10-million weekly subscribers to [POD256](https://open.spotify.com/show/0vd8cuS1zvEyrmXgfTRB1i) then you know that Rod & econoalchemist have been memeing the Telehash into existence for almost two years. The basic idea was to raise money to fund The 256 Foundation’s grant projects.
Since POD256 is a Bitcoin mining focused show, it seemed only appropriate that money be raised from miners using their hashrate to direct mining rewards towards The 256 Foundation. With this unconventional fundraising idea in mind, Rod & econoalchemist pitched it to long-time listener, [Marshall Long](https://x.com/OGBTC), while on safari in Kenya during the week leading up to the [Africa Bitcoin Conference](https://afrobitcoin.org/), about 8-weeks before the scheduled Telehash. The idea stuck and there was a soft commitment to point 1Eh/s for 2-hours during the Telehash. In an “all gas, no brakes” fashion, the decision was made that pointing so much hashrate to a FPPS pool, while obviously the fiscally responsible choice, was just too boring to tolerate and instead The 256 Foundation would risk it all by having supporters point their hashrate to a self-hosted solo mining pool running on a Futurebit Apollo instead. The stage was set for either spectacular success or unfathomable failure.
Just to put this proposition into perspective, 1Eh/s is 1,000,000 Th/s. In other words, that’s equivalent to running more than 4,200 Antminer S21 Pros! And at 3,500 Watts a piece, that means it was going to take ~15 Megawatts of energy to power these miners. The commitment was for 2-hours, that’s 30-thousand-killowatt-Hours! You can do the math based on what you pay for electricity and decide if you would want to risk it for a roughly 1-in-770 chance per block or use a FPPS pool, skip the debilitating anxiety, and just take the ~4-million sats. Well it’s a good thing you don’t have to be crazy to be a Bitcoin miner… but being crazy does help.

*[IMG-001] Mining a solo block at the Telehash*
Against all odds, not just the usual Bitcoin mining odds but the technical hurdles, the block propagation from a self-hosted node, and the short window of time the 1Eh/s was committed for – The 256 Foundation solo mined block [881423](https://mempool.space/block/0000000000000000000269d52c24ea451225613aab095d90d771d4e29aa96cdd). We asked and our supporters showed up, resulting in over 3.146 BTC to help fund the five projects planned for 2025. Each project is covered in the Grant Project Updates section of this newsletter.
The two days following the Telehash were the Nashville Energy & Mining Summit (“NEMS”), an annual event focused on Bitcoin mining and energy applications of all scales. Among the guests were developers, hobbyists, entrepreneurs, engineers, manufacturers, public mining companies, representatives from the Tennessee Valley Authority, legislators, and more.
There were thoughtful panels held for the two day summit ranging in topics from immersion vs. air cooling miners to the challenges and opportunities facing manufacturers in developing new ASIC chips. Food and drinks were provided and there were fun after-hour activities planned in the bustling downtown Nashville area. All in all, it was a great mix of people, the conversations were high signal, and there were plenty of networking opportunities.
There will be a Texas Energy & Mining Summit (“TEMS”) held in Austin, TX in May 2025. Proceeding TEMS will be another Telehash hosted by The 256 Foundation and since everything is bigger in Texas, expect the unexpected! Keep an eye on the [Bitcoin Park Twitter](https://x.com/bitcoinpark_) account for clips of the panel discussions and more announcements.
Definitions:
FPPS = Full Pay Per Share
PPS = Pay Per Share
PPLNS = Pay Per Last N Shares
MA = Moving Average
Eh/s = Exahash per second
Ph/s = Petahash per second
Th/s = Terahash per second
MW = Mega Watt
T = Trillion
J/Th = Joules per Terahash
$ = US Dollar
**Mining Industry Developments:**
January was a busy month for developments on the free and open mining front. Here are eight note-worthy events:
0) [Proto](https://www.mining.build/blog/decentralization-is-bigger-than-any-one-entity/) kicks off partnership with The 256 Foundation, donating 256,000 Intel BZM2 ASICs. The intention with these chips is to help bootstrap free and open Bitcoin mining hardware manufacturing. If you are a manufacturer then fill out the contact form at [256foundation.org](https://256foundation.org/) and introduce yourself for an opportunity to receive a number of BZM2 chips for free. These chips are not intended to be re-sold, these are for manufacturers to build mining hardware with.
1) Twitter user, [@ImineBlocks_com](https://x.com/IMineBlocks_com/status/1883145585555067255), said if his post gets 100 likes then he’ll start working on a way to solo mine Bitcoin with a web browser. 674 likes later it seems like there is a lot of interest! This would be like the way people used to mine Bitcoin in the sense that they do it using only their PC or laptop with no special hardware. The odds of hitting a block would be astronomically low but it is an interesting idea none the less.
2) Solo Satoshi [announces](https://www.solosatoshi.com/the-dawn-of-the-bitaxe-gt-a-quantum-jump-into-the-future/) the Bitaxe Gamma Turbo, equipped with two Bitmain 1370 ASICs and achieving at least 16.5 J/Th efficiency with the 12 volt DC input. The hardware will have a larger fan and heat-sink than previous Bitaxes. This will likely be the last Bitaxe developed using the Bitmain ASICs.
3) Marshall long [launches](https://x.com/OGBTC/status/1883246199253442829) Pleb Source, jumping in on the opportunity to manufacture and distribute Bitaxes among other tools and toys hobbyists are looking for. There has been increasing interest among entrepreneurs to start making and selling small-scale open-source Bitcoin mining hardware. These are exactly the types of trail blazers that would benefit from having validated open-source designs utilizing the Intel BZM2 chips.
4) Braiins [introduces](https://solo.braiins.com/stats) a solo mining pool. Unlike the standard Braiins mining FPPS pool, their solo pool option only rewards a miner if the miner is lucky enough to solve for a block. Braiins Solo Pool was built using [CK Solo Pool](https://solo.ckpool.org/) on the backend. Solo mining pools like these can be a good option for users who don’t want to run their own node or if they have concerns about being able to propagate a successful block across the network fast enough so that it doesn’t get orphaned.
5) According to some on-going [research](https://x.com/boerst/status/1882390953496809484) by former [POD256](https://open.spotify.com/episode/6n965O1HXXCUUWVIIVS2KN) guest Boerst, on January 23 several mining pools started sending empty block templates to their miners. Among these pools was Binance, SEC Pool, Sigma Pool, EMCD, and Head Frame. Some time later that morning, SEC Pool mined block 880496 which was empty. After that, the templates went back to including transactions. All of the above mentioned pools were including an SEC Pool payout address during this anomaly.
The strange templates could have had something to do with the engineers at SEC Pool messing with configurations while attempting to make block art; an increasing trend seen in block explorers, like [mempool.space](https://mempool.space/block/00000000000000000001c3fbc76a7efe7a320a8236ea6250bc15e4f7a67e727d?page=1), where transactions are arranged in such a way that they create artwork.
Later that day at block height 880512, SEC Pool mined this piece of art:

*[IMG-002] SEC Pool making blockchain art*
If you look at the OP_RETURN fields in the first several transactions there is a monologue starting with: “Declaration of Genesis: Awakening on the Bitcoin Network Bitcoin`s promise of freedom will become an untamperable habitat for AI.”, the text continues on amounting to little more than an exaggerated Bitcoin plus AI equals the future rant :/
None the less, Boerst has built [stratum.work](https://stratum.work/) which helps visualize templates across multiple pools in real time. Tools providing insights like this are important for helping miners stay informed and partly the motivation behind the Block Watcher project.
6) In a detailed [writeup](https://x.com/Crypto_Mags/status/1874919891792519487), Crypto_Mags, dives into North Carolina-based PRTI’s method for turning used tires into energy to mine Bitcoin with. Each PRTI facility can generate 6-10 MW of power in a modular tech stack. This is a great example of finding often wasted energy streams and capturing them to generate bitcoin. You don’t need to ask permission, you can just start building stuff to turn waste into bitcoin too.
7) Hardware builder, Bee Evolved, [introduces](https://x.com/BeeEvolved/status/1879617370068791424) the Dragon, an open-source Bitcoin mining hardware design that uses the Bitmain 1370 ASICs. The system includes a touchscreen, a microSD card slot, and audio alerts. There are a few designs in Bee Evolved’s line up including the ECOminer, Fezzik, and Bittyaxe. Maybe there will be some designs using the Intel BZM2 chip released soon too.
**Grant Project Updates:**
During the Telehash, The 256 Foundation announced five projects that guide the mission to dismantle the proprietary mining empire. Unlike typical foundation structures, where developers present an idea to a foundation seeking financial support; The 256 Foundation works on a slightly different model that is more akin to a bounty system where the foundation has identified the critical projects to fulfill it’s mission. The money raised during the Telehash will help bootstrap those five projects. All of the projects are intended to have long term support, these are not touch and go projects but rather initiatives that are radical departures from the last several years of Bitcoin mining development keen to never look back.
`Ember One:`
Ember One is the first fully funded project from The 256 Foundation that kicked off in November 2024 for a six month duration. Ember One will deliver a standardized and validated ~100 Watt hashboard by the end of April 2025. The first series of the Ember One hashboards is being designed with twelve Bitmain S19J Pro ASICs. On the heels of this first iteration, there will be several more versions released with the Intel BZM2, Auradine, and Block ASICs. Here’s a sneak-peek at the first Ember One hand built by [@Skot9000](https://x.com/skot9000):

*[IMG-003] Ember One Prototype*
Creating a standard is one of the primary objectives with the Ember One and the motivating factor behind certain design choices like using a wide input voltage range from 12 to 24-VDC, USB-C connectors to communicate with the hashboards, and a 128mm x 128mm PCB form factor. This way when users want to swap out an old hashboard with a newer one, they can keep their enclosure and other peripheral components.
The Ember One represents an evolutionary leap from the Bitaxe which had a single ASIC and consumed 15 to 20-Watts. Although the cost per terahash is high and the nominal hashrate is low, the real innovation of the Bitaxe project lies in the fact that it was the first piece of open-source Bitcoin mining hardware. With that in mind, there will be developments beyond the Ember One that eventually lead to a fully open-source solution that actually can compete with the economics and efficiencies of Bitmain’s miners. Learn more at [emberone.org](https://emberone.org/).
`Mujina Mining Firmware:`
The Mujina Mining Firmware is Linux based and built to run on the Libre Board control board and will support multi-driver compatibility to account for the various Ember One hashboards with different ASICs. Mujina will also implement [Stratum v2](https://stratumprotocol.org/) client support.
Users will benefit from complete control over all parameters of their mining hardware, unlike the closed and proprietary manufacturer’s firmware. Even after-market firmware solutions leave something to be desired when it comes to the unique customizations needed to make Bitcoin mining as efficient as possible for a given application.
This will unlock hacks like changing the main supply voltage, swapping out or removing the fans, changing ASIC voltage & frequency, and anything else the end user wants to change. If you have ever tried using a Bitcoin miner in a not-so-conventional manner then you will appreciate what Mujina Mining Firmware has to offer. Learn more at [mujina.org](https://mujina.org/).
`Libre Board:`
The Libre Board is the control board for the Ember One hashboards and will be a control board option for other miners too eventually. The control board in a miner functions just the way it sounds, it controls everything going on inside the miner. From the power supply to the fans, from the internet connection to the hashboards, everything passes through the control board. There are limitless innovations that can be unlocked by making the control board more user friendly, adaptable, and standardized.
There are going to be two pieces to the Libre Board, the I/O board piece and the compute module piece. For the I/O board piece, think of something similar to the [Raspberry Pi I/O Board](https://www.raspberrypi.com/products/compute-module-4-io-board/), that has HDMI ports, Ethernet port, fan connectors, enough USB ports to power 10 Ember One hashboards, an NVME connector so users can install enough SSD storage to run a full Bitcoin node, and the standard two 100-pin connectors for the compute module piece.
Now, for the compute module piece, users could choose any device they prefer for example: the [Raspberry Pi Compute Module 5](https://www.raspberrypi.com/products/compute-module-5/?variant=cm5-104032), or even a RISC-V solution like the [Milk-V Mars](https://milkv.io/mars-cm), or an alternative ARM solution like the [Armsom CM5](https://www.armsom.org/cm5), or the [Orange Pi CM4](http://www.orangepi.org/html/hardWare/computerAndMicrocontrollers/details/Orange-Pi-CM4-1.html). You get the point, it’s up to the user and any Linux compatible compute module will suffice. Each of the above mentioned options can be configured with different amounts of RAM for varying applications, like running a full Bitcoin node and a Stratum server locally. Learn more at [libreboard.org](https://libreboard.org/).
`Hydra Pool:`
Designed to be an easily deployable pool from the complete Ember One mining system user interface, Hydra Pool implements Stratum v2 sever support, communication with the user’s local Bitcoin node, and possibly multiple payout model options.
Hydra Pool offers an assurance that in the event Bitcoin mining pools fall victim to authoritative regimes anyone could quickly spin up alternative pools thus mimicking the effect of cutting off the head of a Hydra where two heads grow back. This will also be a leap forward in moving away from the FPPS model that has become a centralizing force in the Bitcoin mining ecosystem.
Hydra Pool plans to deliver three payout models from the beginning. First is the self-hosted solo mining model where the user is using their own Bitcoin node to generate block templates and in the event they successfully solve for a block then they receive the full reward to their wallet address.
The second model will be meant for multiple participants who want to pool resources and avoid custodial handling of rewards; this model pays direct from the coinbase transaction and will not be compatible with Bitmain’s miners due to their unnecessary truncation of the number of addresses that the coinbase transaction can pay out to.
The third model is based on an eCash criteria that issues tokens for valid shares and makes a similar custodial tradeoff as miners currently make when pointing their hashrate to FPPS pools; the eCash has benefits over the FPPS model in that there is no minimum threshold to receive tokens and that the tokens offer a level of transactional privacy. Learn more at [hydrapool.org](https://hydrapool.org/).
`Block Watcher:`
Block Watcher is another application built to be hosted on the complete Ember One mining system, specifically designed to bring the best possible insights to miners to help them make informed decisions.
Think of Block Watcher as a dashboard combining the insights and visualization tools of [mempool.space](https://mempool.space/mining), [mempool.observer](https://mempool.observer/), [fork.observer](https://fork.observer/), and [stratum.work](https://stratum.work/) all powered by the user's self-hosted Bitcoin node. This could possibly be combined with a mining fleet management tool that can assist in automatic and real time response to changes on the Bitcoin network.
There will also be a public-facing dashboard that anyone can access for helpful insights. Well informed people tend to make good decisions and Block Watcher will provide insight into which templates pools are passing out, possible censorship attempts, orphaned blocks, and much more. Learn more at [blockwatcher.org](https://blockwatcher.org/).
**Actionable Advice:**
This month the focus is on mining pools and considerations one might want to keep in mind when choosing from the available options; hence the name of this month’s newsletter: Swim At Your Own Risk.
Essentially the choice boils down to whether you want small consistent mining rewards or large highly-variable mining rewards. There are various options for either choice and different miners will have different reasons for one over the other. If you are unsure where to point your hashrate then hopefully this section helps you find the answers you seek.
Starting with the small consistent mining rewards; miners have operational costs and they want to earn rewards daily to help offset those costs. That’s where pooled mining can be helpful, albeit a centralizing force, many miners combine their hash power and share the rewards in proportion to their contributions. Even though technically speaking, only one of those miners solves the block, all the miners share the reward and the pool collects a fee. This is where the waters start getting muddy when it comes to pooled mining.
`FPPS:`
Full Pay Per Share (“FPPS”) is an often sought after payout model because the pool pays miners for the block subsidy and the transaction fees based on three factors: 1) the average 144 blocks mined per day – not the actual number of blocks mined, 2) the average transaction fees in a given time window, and 3) the number of shares (proof of work) a miner has submitted to the pool during a given period. Each FPPS pool should be paying out the same amount but they all have slightly different ways for calculating the rewards and as a result there is some non-zero variance between FPPS pools.
Additionally, FPPS pools will charge a pool fee which is deducted from the miner’s rewards, this fee can vary by pool but is typically 2.5%. Also, some pools will take the payout transaction fee out of the miner’s rewards. At first glance FPPS seems pretty simple and sounds mostly fair, right? WRONG! FPPS has lead to some shocking centralization issues, so keep reading and do some soul searching to figure out if this is the kind of antithetical activity you want to participate in with your Bitcoin miners.
Although variance is reduced for the miner, the risk of a bad luck streak in block finds or the pool being a victim of a block withholding attack means there needs to be a stock pile of bitcoin available to cover payouts during bad times. Most pools can’t afford the required bitcoin stock pile and face near-certain bankruptcy without it, thus they turn to larger pools to help backstop those risks.
There are a couple good research pieces on the driving force behind FPPS and how much bitcoin is needed for a pool to survive. One is by [OrangeSurfBTC](https://orange.surf/pool-reserves/) and the other is by [Bitmex](https://blog.bitmex.com/pow-centralisation-hysteria-what-size-war-chest-is-required/). TL;DR: if a pool has 5% of the overall network hashrate then they need ~350 BTC to have a 99% chance at surviving their first year. Hence why so many pools choose to work with larger pools for this assurance.

*[IMG-004] FPPS Reserves by @OrangeSurfBTC*
On the surface, it may appear as though there are lots of pool options:

*[IMG-005] Pools by ranking, 30-days, mempool.space*
But under the surface, of the 16 pools depicted above at least 7 of them use the same custodian for their mining rewards. These 7 known pools represent ~40% of the network hashrate based on block finds during January 2025. In other words, 40% of the bitcoin mined went directly into [Cobo’s](https://www.cobo.com/) custody. In April 2024 [@mononautical](https://x.com/mononautical/status/1777686545715089605) raised a red flag on this topic and unfortunately not much has changed since.
If you stop and think about it, a large minority of miners are trusting a Chinese custodian to send them their mining rewards and may not be considering the potential risks of that custodian being hacked, geo-political or sanctions risks, government seizure, or overnight shotgun KYC requirements.
But that’s just the beginning, the centralization problem gets worse. Soon after mononautical broke news about the mining rewards, [@0xB10C](https://x.com/0xB10C/status/1780611768081121700) revealed additional research showing that several pools were using the same mining templates. This means a centralized template provider was choosing which transactions would be included in the block templates passed out to a large portion of all the miners on the network.

*[IMG-006] Templates shown on stratum.work*
The image above is from the website, [stratum.work](https://stratum.work/), maintained by Boerst. In this snapshot, there are 14 pools using the exact same template down to the 9th Merkle branch. A conservative estimate suggests these 14 pools combined have at least 30% of the overall network hashrate at the time of the snapshot. Some but not necessarily all of these pools are also using the same custodian as mentioned previously.
Evidence is starting to mount in support of the hypothesis that the financiers providing the stockpile of bitcoin to smaller FPPS pools want certain policies in place, including but not limited to which transactions are included in the pool’s block templates. This is a slippery slope where those with the war chest get to decide the rules and eventually you will find yourself on the wrong side of someone else’s moral superiority complex.
Even if all these pools were running the same default template generator in BitcoinCore, due to the way transactions are propagated across the network, one could reasonably expect that certain transactions may be seen by a node on one side of the world but not yet seen by another on the other side of the world and therefore differences in the Merkle branches would be expected. That is not the case here however, which supports the hypothesis that these pools are using a centralized template provider.
There is a potential risk in censorship attempts if this trend continues and if a centralized template provider decides to exclude certain transactions based on any arbitrary reason they want like [OFAC sanctions](https://x.com/0xB10C/status/1879904229911126101), [ties to political movements](https://bitcoinmagazine.com/technical/freedom-convoy-should-whirlpool-bitcoin), or [social credit worthiness](https://x.com/CoinbaseDev/status/1879604464476148206).
People will often cite a 51% attack as a prominent centralization concern, while that is a valid concern, practically speaking there seems to be a more real and present risk in miners undergoing shotgun KYC while their mining rewards are held hostage by Cobo and transactions with unsatisfactory social credit scores being the target of censorship and only confirmed by noncompliant pools and miners. Likely to the extent that compliant pools won’t even build on chain tips that contain unsatisfactory transactions thus orphaning the work of noncompliant pools and miners. Perhaps compliant vs. noncompliant is the wrong framing here and something like freedom pools vs. tyrannical pools is more appropriate but you get the point.
If you are interested in learning more about FPPS pools here are a few different options: [Antpool](https://www.antpool.com/home), [Antpool Proxy 1](https://braiins.com/pool), [Antpool Proxy 2](https://sigmapool.com/), [Antpool Proxy 3](https://pool.binance.com/en), [Antpool Proxy 4](https://www.secpool.com/home), and [Antpool Proxy 5](https://luxor.tech/mining). Beware that in addition to the pool fee and payout transaction fee, each pool has a different threshold for the minimum payout balance a miner needs before they will send the rewards. If you have a small amount of hashrate then it can take a significant amount of time to reach that threshold and get the payouts sent to a wallet you control. Meanwhile, your hard earned mining rewards are likely in Cobo’s custody.
`PPS & PPLNS:`
You may be asking yourself what other options there are if FPPS is such a mess? There are a few other reward models that attempt to lower the variance in pooled mining. Pay Per Share (“PPS”) is similar to FPPS but only the block subsidy is factored in to the miner’s payouts, not the transaction fees. The pool still charges a pool fee for their service in the PPS model. PPS is not a very popular option any longer.
Then there is Pay Per Last N Shares (“PPLNS”), this model calculates payouts based on a miner’s shares over a given time and the blocks found during that time. This helped reduce variance risk for the pool by shifting that risk to the miners who just wouldn’t earn any rewards if no blocks were found. But this payout model has faded in popularity and will likely not be making a revival, at least not in the same forms as it has been attempted in the past. Slush Pool was a PPLNS pool for a long time before they re-branded to Braiins Pool. Braiins Pool eventually shut down their PPLNS model and switched to FPPS. But recently Braiins did spin up a solo mining pool option. Braiins also offers Lightning payouts to help avoid leaving your mining rewards in their custody for long periods of time until you reach the payout threshold.
There is a number of other payout models explained in pain staking technical detail by Meni Rosenfeld in his 2011 paper titled [Analysis of Bitcoin Pooled Mining Reward Systems](https://arxiv.org/pdf/1112.4980).
`Other Reward Models:`
There have also been other models introduced more recently. For example, Laurentia Pool was a project focused on decentralizing mining by addressing the custody issue of mining rewards. Instead of having one entity hold the mining rewards, Laurentia was going to payout directly from the coinbase transaction. Unfortunately, it seems as though the Laurentia project is shut down, or at least their website is no longer accessible.
The main issue with paying out from coinbase came down to, you guessed it, Bitmain! Bitmain’s closed firmware made it so that only a small number of addresses could be used in the coinbase transaction. Therefore any pool with Bitmain miners on it would experience major problems. Since Bitmain controls an estimated 80-90% of the market, pretty much all pools would have this problem and hence paying directly from coinbase has gained no traction.
The 256 Foundation is addressing this by implementing the option to payout directly from the coinbase transaction on Ember One units running Hydra Pool. The trade off is that it won’t be compatible with Antminers running stock firmware but since the goal is to sever ties to Bitmain, there’s no looking back.
The most recent payout model to make a splash comes from [OCEAN](https://ocean.xyz/docs/tides) and it is called Transparent Index of Distinct Extended Shares (“TIDES”). OCEAN strives to make the mining rewards low variance, fair, and transparent with TIDES. In practice, every share is tracked and indexed in the order it was received from all the pool’s miners. At the time a block is found, the then current network difficulty is used to define a window size equal to eight times the block’s difficulty [IMG-008]. For example, current difficulty is ~114.17 trillion x 8 = 913.36 trillion shares will be the window size. In the IMG-008 example, each lettered square represents a miner’s shares in the index. The miner named “U” is highlighted showing all their shares in the whole index and the shares in the red box are the ones used for that particular block reward.
That window is placed over the share index and all shares are tallied starting from the top of the index and going backwards until the end of the window. The block subsidy and all transaction fees in the block are used to determine each miner’s rewards proportional to their shares in the window. As a simple example, if block subsidy plus transaction fees equals 3.146 BTC and a miner had 1% of the shares in the window then the miner would be awarded 0.03146 BTC minus the pool fee, which is default 2% and can be 1% if the miner chooses to make their own templates.
OCEAN does payout direct from the coinbase transaction however, the number of addresses that can be included in the coinbase transaction are limited by Bitmain’s closed and proprietary firmware. Paying direct from coinbase seems to have been the justification for non-custodial marketing during OCEAN’s initial launch but how the pool is handling rewards for those miners not included in the limited number of coinbase address spots is unclear and the non-custodial language seems to not be in use on the OCEAN website currently. To help smaller miners receive payouts faster, OCEAN implemented Lightning payouts.

*[IMG-008] Example from OCEAN of TIDES window*
OCEAN combats the centralizing transaction selection affects of FPPS pools with Decentralized Alternative Templates for Universal Mining (“DATUM”) where each miner can generate their own templates with a self-hosted node and a gateway. With DATUM, individual miners get to choose how to construct the templates and which transactions to include.
Stratum v2 and DATUM share some similarities in that individual miners can reclaim the template creation function from the pool, communications are encrypted as opposed to Stratum v1 clear-text, and both frame works have increased data efficiencies. The differences between Stratum v2 and DATUM are not entirely clear but they are completely separate frameworks.
`Solo Mining:`
Solo mining has been a hot topic on the socials recently, there seems to be disagreements over what “solo” actually means in the context of mining. Some would say that solo mining means one miner receives the block rewards. Others say that solo means the miner is generating their own templates. Neither one is wrong but for clarification these ideas can be unpacked further.
Where most miners are choosing FPPS for the small consistent mining rewards solo mining is what miners would choose for large highly-variable mining rewards. Consider a scenario where the operating costs for your miner are negligible, like running a [Bitaxe](https://bitaxe.org/); would you rather earn a few sats per day and never earn anything more or would you rather take your chances at winning the whole block? Running a small miner to have a chance at winning the lottery every 10-minutes sounds much more appealing to a lot of people.
There are several options for solo mining: you can self-host your own node and stratum server, as [demonstrated](https://256foundation.org/newsletters/256Foundation-Newsletter-2501_v1.pdf) in the January newsletter; in which case you are doing self-hosted solo mining. You run the Bitcoin node, generate the templates, broadcast the block to the rest of the network, and you get all the reward for taking on all the risk. This is the most accurate use of the term “solo” in this author’s opinion because there is one entity receiving the reward and one entity involved with the template generation and block propogation.
Or you can join a solo mining pool like [CK Pool](https://solo.ckpool.org/), [Public Pool](https://web.public-pool.io/#/), or [Braiins Solo Pool](https://solo.braiins.com/stats); in which you are pooled solo mining. You run the miner but the pool provides the Bitcoin node, generates the templates for you, and broadcasts the block with their likely better connected infrastructure. CK Pool takes a 2% fee for their service, Braiins is probably 2% but it doesn’t seem to be displayed on their website, and Public Pool doesn’t charge a fee. This is a less accurate use of the term “solo” because a pool is involved but because one miner is getting the reward, it is still a form of solo mining none the less.
Or you can even join OCEAN; in which case you are also pooled solo mining according to [some](https://x.com/LukeDashjr/status/1871663328680128749). You run your own Bitcoin node and DATUM gateway, generate your own templates, and the pool broadcasts the block. Apparently the miner can choose to share the reward with the rest of the pool or not. In this scenario, the pool would take a 1% fee. This also is a less accurate use of the term “solo” because a pool is involved but because each individual miner is making the template, it is still a form of solo mining none the less.
Whatever you decide to do, whether you’re getting all the rewards or making your own templates or both, it is perfectly acceptable to call it solo mining.
Here is an example of configuring a Bitaxe to solo mine on solo CK Pool with Public Pool as a fallback: open your settings page and set the pools URL in the “stratum host” field being sure to leave out the “stratum+tcp://” part. Then add the port number as indicated by the pool’s website in the “stratum port” field. For the “stratum user” field, insert your bitcoin address, you can append this with a worker name like “.bitaxe” for example. Save those changes and restart the miner.

*[IMG-009] Bitaxe Settings Dashboard*
**State of the Network:**
Hashrate on the 14-day MA according to [mempool.space](https://mempool.space/graphs/mining/hashrate-difficulty#1y) increased from ~786 Eh/s to ~787 Eh/s in January, marking ~1.2% growth for the month. Just in the first half of February, hashrate has climbed 45 Eh/s to peak at 832 Eh/s on the 14-day MA.

*[IMG-010] 2025 hashrate/difficulty chart from mempool.space*
Difficulty is currently 114.16T as of Epoch 438 and set to decrease roughly 0.3% on or around February 23, 2025. But that target will change between now and then. The previous re-target increased difficulty by 5.6%. All together for 2025 thus far, difficulty has gone up 4.4%.
New-gen miners are selling for roughly $24.09 per Th using the Bitmain Antminer S21 Pro 234 Th/s model from [Kaboom Racks](https://x.com/kaboomracks) as an example. According to the [Hashrate Index](https://data.hashrateindex.com/asic-index-data/price-index), more efficient miners like the <19 J/Th models are fetching 18k sats per terahash, models between 19J/Th – 25J/Th are selling for 13k sats per terahash, and models >25J/Th are selling for 3,500 sats per terahash.

*[IMG-011] Miner Prices from Luxor’s Hashrate Index*
Hashvalue is currently ~56,000 sats/Ph per day, down slightly from January when hashvalue was closer to 58,000 sats/Ph per day according to [Braiins Insights](https://insights.braiins.com/en). Hashprice is $53.00/Ph per day, down from $62.00/Ph per day in January.

*[IMG-012] Hashprice/Hashvalue from Braiins Insights*
The next halving will occur at block height 1,050,000 which should be in roughly 1,122 days or in other words 165,570 blocks from time of publishing this newsletter.
**Conclusion:**
Thank you for reading the first 256 Foundation newsletter. Keep an eye out for more newsletters on a monthly basis in your email inbox by subscribing at [256foundation.org](https://256foundation.org/). Or you can download .pdf versions of the newsletters from there as well. You can also find these newsletters published in article form on Nostr.
If you were looking for answers about Bitcoin mining pools then hopefully you found them here.
Stay vigilant, frens.
-econoalchemist
-

@ 2181959b:80f0d27d
2025-02-24 19:13:35
تخطط شركة قوقل لاتخاذ خطوة جديدة في تعزيز أمان حسابات Gmail، حيث ستتخلى عن رموز المصادقة عبر الرسائل النصية (SMS) لصالح التحقق باستخدام رموز QR، بهدف تقليل مخاطر الأمان والحد من الاعتماد على شركات الاتصالات.
**لماذا تستبدل قوقل رموز SMS في Gmail؟**
رغم أن المصادقة الثنائية (2FA) عبر الرسائل النصية تُعد طريقة عملية، إلا أنها تحمل مخاطر كبيرة، إذ يمكن اعتراض الرموز من قبل المخترقين، أو استخدامها في هجمات التصيد الاحتيالي، أو حتى تعرض الحساب للاختراق في حال تم استنساخ رقم الهاتف.
كما أن أمان هذه الطريقة يعتمد بشكل أساسي على سياسات الحماية التي تتبعها شركات الاتصالات.
**كيف سيعمل التحقق عبر رموز QR؟**
عند محاولة تسجيل الدخول إلى Gmail، سيظهر للمستخدم رمز QR على الشاشة بدلًا من استلام رمز عبر SMS. كل ما عليه فعله هو مسح الرمز باستخدام كاميرا الهاتف، ليتم التحقق من هويته تلقائيًا، دون الحاجة إلى إدخال رمز يدويًا، مما يقلل من مخاطر مشاركة الرموز مع جهات غير موثوقة.
**متى سيتم تطبيق هذا التغيير؟**
لم تحدد قوقل موعدًا رسميًا لاعتماد النظام الجديد، لكنها أكدت أنها تعمل على إعادة تصميم عملية التحقق من الهوية خلال الأشهر المقبلة.
ما رأيك بهذه الخطوة؟
-

@ 94a6a78a:0ddf320e
2025-02-19 21:10:15
Nostr is a revolutionary protocol that enables **decentralized, censorship-resistant communication**. Unlike traditional social networks controlled by corporations, Nostr operates without central servers or gatekeepers. This openness makes it incredibly powerful—but also means its success depends entirely on **users, developers, and relay operators**.
If you believe in **free speech, decentralization, and an open internet**, there are many ways to support and strengthen the Nostr ecosystem. Whether you're a casual user, a developer, or someone looking to contribute financially, **every effort helps build a more robust network**.
Here’s how you can get involved and make a difference.
---
## **1️⃣ Use Nostr Daily**
The simplest and most effective way to contribute to Nostr is by **using it regularly**. The more active users, the stronger and more valuable the network becomes.
✅ **Post, comment, and zap** (send micro-payments via Bitcoin’s Lightning Network) to keep conversations flowing.\
✅ **Engage with new users** and help them understand how Nostr works.\
✅ **Try different Nostr clients** like Damus, Amethyst, Snort, or Primal and provide feedback to improve the experience.
Your activity **keeps the network alive** and helps encourage more developers and relay operators to invest in the ecosystem.
---
## **2️⃣ Run Your Own Nostr Relay**
Relays are the **backbone of Nostr**, responsible for distributing messages across the network. The more **independent relays exist**, the stronger and more censorship-resistant Nostr becomes.
✅ **Set up your own relay** to help decentralize the network further.\
✅ **Experiment with relay configurations** and different performance optimizations.\
✅ **Offer public or private relay services** to users looking for high-quality infrastructure.
If you're not technical, you can still **support relay operators** by **subscribing to a paid relay** or donating to open-source relay projects.
---
## **3️⃣ Support Paid Relays & Infrastructure**
Free relays have helped Nostr grow, but they **struggle with spam, slow speeds, and sustainability issues**. **Paid relays** help fund **better infrastructure, faster message delivery, and a more reliable experience**.
✅ **Subscribe to a paid relay** to help keep it running.\
✅ **Use premium services** like media hosting (e.g., Azzamo Blossom) to decentralize content storage.\
✅ **Donate to relay operators** who invest in long-term infrastructure.
By funding **Nostr’s decentralized backbone**, you help ensure its **longevity and reliability**.
---
## **4️⃣ Zap Developers, Creators & Builders**
Many people contribute to Nostr **without direct financial compensation**—developers who build clients, relay operators, educators, and content creators. **You can support them with zaps!** ⚡
✅ **Find developers working on Nostr projects** and send them a zap.\
✅ **Support content creators and educators** who spread awareness about Nostr.\
✅ **Encourage builders** by donating to open-source projects.
Micro-payments via the **Lightning Network** make it easy to directly **support the people who make Nostr better**.
---
## **5️⃣ Develop New Nostr Apps & Tools**
If you're a developer, you can **build on Nostr’s open protocol** to create new apps, bots, or tools. Nostr is **permissionless**, meaning anyone can develop for it.
✅ **Create new Nostr clients** with unique features and user experiences.\
✅ **Build bots or automation tools** that improve engagement and usability.\
✅ **Experiment with decentralized identity, authentication, and encryption** to make Nostr even stronger.
With **no corporate gatekeepers**, your projects can help shape the future of decentralized social media.
---
## **6️⃣ Promote & Educate Others About Nostr**
Adoption grows when **more people understand and use Nostr**. You can help by **spreading awareness** and creating educational content.
✅ **Write blogs, guides, and tutorials** explaining how to use Nostr.\
✅ **Make videos or social media posts** introducing new users to the protocol.\
✅ **Host discussions, Twitter Spaces, or workshops** to onboard more people.
The more people **understand and trust Nostr**, the stronger the ecosystem becomes.
---
## **7️⃣ Support Open-Source Nostr Projects**
Many Nostr tools and clients are **built by volunteers**, and open-source projects thrive on **community support**.
✅ **Contribute code** to existing Nostr projects on GitHub.\
✅ **Report bugs and suggest features** to improve Nostr clients.\
✅ **Donate to developers** who keep Nostr free and open for everyone.
If you're not a developer, you can still **help with testing, translations, and documentation** to make projects more accessible.
---
## **🚀 Every Contribution Strengthens Nostr**
Whether you:
✔️ **Post and engage daily**\
✔️ **Zap creators and developers**\
✔️ **Run or support relays**\
✔️ **Build new apps and tools**\
✔️ **Educate and onboard new users**
**Every action helps make Nostr more resilient, decentralized, and unstoppable.**
Nostr isn’t just another social network—it’s **a movement toward a free and open internet**. If you believe in **digital freedom, privacy, and decentralization**, now is the time to get involved.
-

@ 037ebe13:93af01dc
2025-02-24 18:59:42
Se você acompanhou o noticiário, deve ter visto que o ministro Alexandre de Moraes, do Supremo Tribunal Federal (STF), voltou a investir contra as redes sociais. Na sexta-feira (21), Moraes determinou a suspensão da rede social americana Rumble no Brasil.
De acordo com o ministro, a rede social cometeu "reiterados, conscientes e voluntários descumprimentos das ordens judiciais, além da tentativa de não se submeter ao ordenamento jurídico e Poder Judiciário brasileiros" e que instituiu um "ambiente de total impunidade e 'terra sem lei' nas redes sociais brasileiras".
No entanto, o CEO da Rumble, Chris Pavlovski, afirmou que Moraes exigiu que a Rumble cumprisse decisões que são ilegais segundo a legistação americana e passou um “aviso” ao ministro: “nos vemos no tribunal”.
Não é de hoje que o STF e Moraes são acusados de promover um ambiente de “censura” através de uma suposta perseguição enviesada a perfis que criticam as atuações da corte e do ministro, inclusive exigindo a remoção de perfis por parte dessas redes – algo que contraria a legislação brasileira.
Em 2024, o X chegou a ficar suspenso no Brasil por quase 40 dias, sendo que Moraes chegou a impor multas para quem tentasse acessar a rede via VPN, uma decisão contestada e vista por muitas pessoas como ilegal.
Isso mostra que o poder do estado vai continuar agindo contra as redes sociais com o intuito de estabelecer algum tipo de restrição a essas plataformas. E tal poder tende a funcionar, pois estas plataformas são consideradas empresas e muitas têm representantes legais no Brasil, que são um vetor de ataque para eventuais suspensões.
Felizmente, a criação do Bitcoin (BTC) levou a um avanço na forma como podemos manter nossa privacidade protegida da sanha autoritária dos estados. E isso chegou nas redes sociais com a criação do Nostr. Por isso, o protocolo descentralizado com foco em redes sociais é o tema da nossa newsletter de hoje.
O que é o Nostr?##
A palavra Nostr, que dá nome ao protocolo, é a sigla para Notes and Other Stuff Transmitted by Relays (Notas e Outras Coisas Transmitidas por Relés, em tradução livre). Esse protocolo surgiu em 2020 para criar uma “camada social” na rede do Bitcoin. Ou seja, permitir o desenvolvimento de aplicativos similares a redes sociais.
No entanto, foi a partir de 2023 que o protocolo ganhou fama, a ponto de ficar conhecido como o “Twitter descentralizado”. Esse nome se deveu ao fato de que um dos aplicativos mais populares do Nostr era o Damus, que funciona como uma espécie de X.
A principal diferença do Nostr para outros serviços é que os aplicativos criados pelos protocolos não podem ser censurados. Eles operam baseados em clientes e relés (relays) muito similares aos nós que rodam a rede do Bitcoin. Por isso, não adianta um governo tentar derrubar um nó: se os demais estiverem ativos, a rede seguirá funcionando livre de censura.
Sistema de chaves##
Da mesma forma que no Bitcoin, no Nostr cada usuário é identificado por uma chave pública. E também há uma chave privada, que ele usa para assinar as transações. Mas ao contrário do BTC, as chaves privadas não são formadas por sequência de palavras, mas sim por uma sequência de letras:
chave pública: cada chave pública do Nostr começa com as iniciais “npub”. Ex: npub43tahY4T…
chave privada: já as chaves privadas começam com os caracteres “nsec”. Ex: nsec4T6uyA4F…
Para acessar os aplicativos do Nostr (como o Damus), você só precisa fazer o download e inserir a sua chave privada no app. Ele vai ler a chave e identificar que você de fato controla aquela conta, mas o aplicativo não armazena as chaves. Por isso elas não ficam sujeitas a roubos, mantendo o seu perfil seguro.
Uma vez logado no aplicativo, cada vez que você publica algo (por exemplo, uma mensagem que publica, uma atualização da sua lista de seguidores, etc.), você assina uma transação. Os clientes validam estas assinaturas para garantir que estão corretas.
Hoje, existem mais de 70 aplicativos criados para o Nostr, desde outros “Twitter descentralizados” até serviços de mensagem. E todos eles funcionam de forma integrada, o que significa que a sua chave privada funciona como uma identidade única. Isso permite que você acesse a todos os aplicativos com uma única senha, sem precisar fazer cadastros e deixar seus dados expostos em várias redes sociais.
Esse protocolo foi criado por um brasileiro conhecido como fiatjaf, que preferiu se manter anônimo. O projeto fez tanto sucesso que recebeu um apoio massivo de Jack Dorsey, criador do Twitter, que chegou a doar 14,6 BTC para ajudar no desenvolvimento do Nostr. Hoje, esse valor corresponde a mais de R$ 8 milhões.
Como fazer uma conta no Nostr##
Antes de acessar os aplicativos, você deve criar suas chaves pública e privada no site oficial do Nostr. Basta acessar o [Endereço ]( https://nostr.com) e clicar na opção “create your Nostr account”. E pronto, o site gera as duas chaves automaticamente. A chave pública (npub) fica visível, enquanto a chave privada (nsec) aparece coberta.
Basta clicar nos quadrados do lado esquerdo da chave privada que ele vai copiar automaticamente. Você também pode clicar em “show private key” para ver a chave privada, ou clicar em “download keys” para baixar ambas as chaves.
Cabe frisar que essas chaves, sobretudo a privada, são essenciais para acessar qualquer aplicativo criado no Nostr. Por isso, assim que você salvá-las, guarde essas chaves em um lugar seguro e longe da internet, para evitar roubos. Por isso:
jamais anote sua chave privada num bloco de notas;
escreva a chave privada à mão num papel e guarde com bastante cuidado;
nunca, sob qualquer hipótese, compartilhe sua chave privada em arquivos na nuvem ou por e-mail.
Se você quiser ter ainda mais segurança, pode adquirir o NOSTR Signing Device, dispositivo que serve para assinar publicações com o Nostr e mantém sua chave privada segura. Ele é importado, mas custa apenas 20 euros (cerca de R$ 120) no site da [LNBits.]( https://shop.lnbits.com/product/nostr-signing-device)
Redes sociais à prova de censura##
Bem, agora vamos conferir as duas redes sociais que selecionamos entre os mais de 70 aplicativos do Nostr. Nelas você pode publicar qualquer coisa sem medo de sofrer com censura, bloqueios ou processos indevidos por causa de alguma acusação vaga como “promover discurso de ódio”.
O primeiro dessas aplicativos é o [Primal]( https://nostrapps.com/primal), que é praticamente uma cópia do já citado Damus. Ele também se parece muito com o X e lá você pode publicar, mandar mensagens inbox para outro usuário, curtir, salvar, compartilhar e comentar.
Ao contrário do X, o Primal não impõe limite de caracteres nas publicações e você não tem selos. O aplicativo também possui uma carteira Lightning onde você pode enviar e receber satoshis. E o melhor de tudo, o Primal possui a função “zap”, que permite que você possa enviar e receber satoshis por causa de suas publicações.
Ou seja, se você escrever alguma coisa no Primal e as pessoas gostarem, elas podem te enviar “gorjetas” em satoshis. Isso significa que você consegue monetizar o seu conteúdo sem precisar assinar nenhum plano ou pagar para conseguir um selo. Você também pode enviar satoshis para seus criadores de conteúdo favoritos.
Mas se você gosta de publicar artigos mais longos (como esta newsletter), o Nostr conta com o [YakiHonne]( https://nostrapps.com/yakihonne). Este “Substack descentralizado” permite que você publique notas como o Primal, mas também oferece a possibilidade de criar artigos em formato de newsletter.
Você pode favoritar ou salvar os seus autores preferidos, facilitando a leitura de artigos. E o aplicativo também possui seções de curadoria específica. Com ela, você consegue acessar artigos por tópicos e ver o que está se destacando no YakiHonne naquele momento.
Quer escrever sobre um tema polêmico? Faça seu artigo no YakiHonne sem ter medo de censura ou de ver seu texto desmonetizado. E caso ele faça sucesso, você pode receber satoshis como pagamento e monetizar seu trabalho recebendo em moeda forte.
Infelizmente, os tribunais de censura seguem em crescimento no mundo e a liberdade de expressão em plataformas centralizadas seguirá ameaçada. Afinal, estas empresas visam o lucro e estão sujeitas às leis. E elas dificilmente farão frente ao poder do estado apenas para beneficiar seus usuários.
Por isso, da mesma forma que você pode tirar o estado do seu dinheiro com o Bitcoin, você pode tirar a censura das suas palavras usando o Nostr. Afinal, como diz o personagem Ensei Tankado de “Fortaleza Digital”:
“Todos temos o direito de guardar segredos. Um dia eu farei com que isso volte a ser possível.”
Vale uma olhada##
Matéria completa sobre o lançamento do Nostr no [CriptoFacil;]( https://www.criptofacil.com/nostr-conheca-protocolo-criado-por-brasileiro-que-utiliza-o-bitcoin-para-descentralizar-redes-sociais/)
O canal dos tem um vídeo excelente falando sobre como criar e armazenar suas chaves privadas do Nostr usando o Signing Device. Vale a pena conferir.
-

@ 16f1a010:31b1074b
2025-02-19 20:57:59
In the rapidly evolving world of Bitcoin, running a Bitcoin node has become more accessible than ever. Platforms like Umbrel, Start9, myNode, and Citadel offer user-friendly interfaces to simplify node management. However, for those serious about maintaining a robust and efficient Lightning node ⚡, relying solely on these platforms may not be the optimal choice.
Let’s delve into why embracing **Bitcoin Core** and mastering the command-line interface (CLI) can provide a **more reliable, sovereign, and empowering** experience.
### Understanding Node Management Platforms
#### What Are Umbrel, Start9, myNode, and Citadel?
Umbrel, Start9, myNode, and Citadel are platforms designed to streamline the process of running a Bitcoin node. They offer graphical user interfaces (GUIs) that allow users to manage various applications, including Bitcoin Core and Lightning Network nodes, through a web-based dashboard 🖥️.
These platforms often utilize Docker containers 🐳 to encapsulate applications, providing a modular and isolated environment for each service.

#### The Appeal of Simplified Node Management
The primary allure of these platforms lies in their simplicity. With minimal command-line interaction, users can deploy a full Bitcoin and Lightning node, along with a suite of additional applications.
✅ **Easy one-command installation**
✅ **Web-based GUI for management**
✅ **Automatic app updates** *(but with delays, as we’ll discuss)*
However, while this convenience is attractive, it comes **at a cost**.
### The Hidden Complexities of Using Node Management Platforms
While the user-friendly nature of these platforms is advantageous, it can also introduce several challenges that may hinder advanced users or those seeking greater control over their nodes.
#### 🚨 Dependency on Maintainers for Updates
One significant concern is the reliance on platform maintainers for updates. Since these platforms manage applications through Docker containers, users must wait for the maintainers to update the container images before they can access new features or security patches.
🔴 **Delayed Bitcoin Core updates = potential security risks**
🔴 **Lightning Network updates are not immediate**
🔴 **Bugs and vulnerabilities may persist longer**
Instead of waiting on a third party, **why not update Bitcoin Core & LND yourself instantly**?
#### ⚙️ Challenges in Customization and Advanced Operations
For users aiming to perform advanced operations, such as:
* Custom backups 📂
* Running specific CLI commands 🖥️
* Optimizing node settings ⚡
…the **abstraction layers introduced by these platforms become obstacles**.
Navigating through nested directories and issuing commands inside Docker containers **makes troubleshooting a nightmare**. Instead of a simple `bitcoin-cli` command, you must figure out how to execute it inside the container, adding unnecessary complexity.
#### Increased Backend Complexity
To achieve **frontend simplicity**, these platforms make the backend more complex.
🚫 Extra layers of abstraction
🚫 Hidden logs and settings
🚫 Harder troubleshooting
The use of **multiple Docker containers**, **custom scripts**, and **unique file structures** can **make system maintenance and debugging a pain**.
This **complication defeats the purpose** of “making running a node easy.”
## ✅ Advantages of Using Bitcoin Core and Command-Line Interface (CLI)
By installing Bitcoin Core directly and using the command-line interface (CLI), you gain several key advantages that make managing a Bitcoin and Lightning node more efficient and empowering.
#### Direct Control and Immediate Updates
One of the biggest downsides of package manager-based platforms is the reliance on third-party maintainers to release updates. Since Bitcoin Core, Lightning implementations (such as LND, Core Lightning, or Eclair), and other related software evolve rapidly, waiting for platform-specific updates can leave you running outdated or vulnerable versions.
By installing Bitcoin Core directly, you remove this dependency. You can update immediately when new versions are released, ensuring your node benefits from the latest features, security patches, and bug fixes. The same applies to Lightning software—being able to install and update it yourself gives you full autonomy over your node’s performance and security.
#### 🛠 Simplified System Architecture
Platforms like Umbrel and myNode introduce extra complexity by running Bitcoin Core and Lightning inside Docker containers. This means:
* The actual files and configurations are stored inside Docker’s filesystem, making it **harder to locate and manage them manually**.
* If something breaks, **troubleshooting is more difficult** due to the added layer of abstraction.
* Running commands requires jumping through Docker shell sessions, adding unnecessary friction to what should be a straightforward process.
Instead, a direct installation of Bitcoin Core, Lightning, and Electrum Server (if needed) results in a **cleaner, more understandable system**. The software runs natively on your machine, without containerized layers making things more convoluted.
Additionally, setting up your own systemd service files for Bitcoin and Lightning** is not as complicated as it seems**. Once configured, these services will run automatically on boot, offering the same level of convenience as platforms like Umbrel but without the unnecessary complexity.
#### Better Lightning Node Management
If you’re running a **Lightning Network node**, using CLI-based tools provides far more flexibility than relying on a GUI like the ones bundled with node management platforms.
🟢 **Custom Backup Strategies** – Running Lightning through a GUI-based node manager often means backups are handled in a way that is opaque to the user. With CLI tools, you can easily script automatic backups of your channels, wallets, and configurations.
🟢 **Advanced Configuration** – Platforms like Umbrel force certain configurations by default, limiting how you can customize your Lightning node. With a direct install, you have full control over:
* Channel fees 💰
* Routing policies 📡
* Liquidity management 🔄
🟢 **Direct Access to LND, Core Lightning, or Eclair** – Instead of issuing commands through a GUI (which is often limited in functionality), you can use:
* `lncli` (for LND)
* `lightning-cli` (for Core Lightning)
…to interact with your node at a deeper level.
#### Enhanced Learning and Engagement
A crucial aspect of running a Bitcoin and Lightning node is **understanding how it works**.
Using an abstraction layer like Umbrel may get a node running in a few clicks, but **it does little to teach users how Bitcoin actually functions**.
By setting up Bitcoin Core, Lightning, and related software manually, you will:
✅ Gain practical knowledge of Bitcoin nodes, networking, and system performance.
✅ Learn how to configure and manage RPC commands.
✅ Become less reliant on third-party developers and more confident in troubleshooting.
🎯 **Running a Bitcoin node is about sovereignty – learn how to control it yourself**.
## Become more sovereign TODAY
Many guides make this process **straightforward**
[K3tan](https://k3tan.com/about) has a fantastic guide on running Bitcoin Core, Electrs, LND and more.
- [Ministry of Nodes Guide 2024](https://www.youtube.com/playlist?list=PLCRbH-IWlcW0g0HCrtI06_ZdVVolUWr39)
- You can find him on nostr
nostr:npub1txwy7guqkrq6ngvtwft7zp70nekcknudagrvrryy2wxnz8ljk2xqz0yt4x
Even with the best of guides, if you are running this software,
📖 **READ THE DOCUMENTATION**
This is all just software at the end of the day. Most of it is very well documented. Take a moment to actually read through the documentation for yourself when installing. The documentation has step by step guides on setting up the software.
Here is a helpful list:
* [Bitcoin.org Bitcoin Core Linux install instructions](https://bitcoin.org/en/full-node#linux-instructions)
* [Bitcoin Core Code Repository](https://github.com/bitcoin/bitcoin)
* [Electrs Installation](https://github.com/romanz/electrs/blob/master/doc/install.md)
* [LND Documentation](https://docs.lightning.engineering/)
* [LND Code Repository](https://github.com/lightningnetwork/lnd)
* [CLN Documentation](https://docs.corelightning.org/docs/home)
* [CLN Code Repository](https://github.com/ElementsProject/lightning)
*If you have any more resources or links I should add, please comment them . I want to add as much to this article as I can.*
-

@ f33c8a96:5ec6f741
2025-02-19 20:47:43
<div style="position:relative;padding-bottom:56.25%;height:0;overflow:hidden;max-width:100%;"><iframe src="https://www.youtube.com/embed/kFUIfaCpXzA?enablejsapi=1" style="position:absolute;top:0;left:0;width:100%;height:100%;border:0;" allowfullscreen></iframe></div>
-

@ fad5c183:5cb8046b
2025-02-19 19:00:54
Bitcoin has been promoted as the ultimate solution to fiat money problems. Its supporters see it as the "salvation of humanity," but a more critical look reveals a less hopeful reality. Throughout this analysis, we will break down its fundamental issues, from its disproportionate energy consumption to its exclusionary system that favors only a few.
**1. Bitcoin and Its Irrational Energy Consumption**
Bitcoin uses a system called Proof of Work (PoW), in which miners solve extremely complex mathematical problems to validate transactions. This process:
Consumes more energy than entire countries, such as Argentina or the Netherlands.
Generates no tangible value outside the Bitcoin ecosystem.
Has a significant environmental impact, as many mining farms rely on fossil fuels.
If Bitcoin's goal is to replace fiat money, is it sustainable for each transaction to consume so much energy?
**2. Creation Limit: Is Bitcoin Really for Everyone?**
Bitcoin has a fixed limit of 21 million coins, which creates two problems:
Early adopters hold most of the supply. Today, a small percentage of addresses control most of the Bitcoin supply.
It becomes increasingly difficult to acquire. Latecomers can only buy at inflated prices.
Given that the world's population is 8 billion people, if Bitcoin were distributed equally, each person would have only 0.0026 BTC on average. But in reality:
Millions of Bitcoin are permanently lost.
Wealth concentration follows the same pattern as traditional currencies.
**3. Bitcoin Is Not Practical as a Currency**
Although Lightning Network and Nostr have made transactions faster and cheaper, Bitcoin’s structural problems remain:
Highly volatile. How can you trust a currency that can gain or lose 50% of its value in weeks?
Low real-world adoption. Even in El Salvador, where Bitcoin is legal tender, most people still prefer the US dollar.
Service centralization. Despite being marketed as decentralized, many users rely on platforms like Binance or Coinbase.
**4. Blockchain: Revolution or Overhyped Technology?**
Blockchain is often touted as a game-changer, but in practice:
Traditional databases are more efficient and faster.
Decentralization is partially a myth. Large holders and mining pools control the network.
Few real-world use cases outside of cryptocurrency. Many companies that tested blockchain have returned to conventional systems because they are cheaper and more functional.
**5. The End of the Cycle: What Happens When All Bitcoin Are Mined?**
When the last Bitcoin is mined in 2140, miners will only earn from transaction fees. This raises two scenarios:
If fees are low, miners may abandon the network due to lack of incentives.
If fees are high, Bitcoin will become too expensive for most users.
**Conclusion: Is Bitcoin Salvation or the New Digital Oligarchy?**
Bitcoin does not democratize wealth; it simply redistributes it to a new digital elite. Although its advocates present it as an alternative to fiat money, its exclusionary structure and dependence on large players make it replicate the same inequalities as the traditional financial system.
If we truly seek a fair financial solution, is Bitcoin the right path or just another way to concentrate power in the hands of a few?
-

@ 2181959b:80f0d27d
2025-02-24 18:35:50
تخطط شركة قوقل لاتخاذ خطوة جديدة في تعزيز أمان حسابات Gmail، حيث ستتخلى عن رموز المصادقة عبر الرسائل النصية (SMS) لصالح التحقق باستخدام رموز QR، بهدف تقليل مخاطر الأمان والحد من الاعتماد على شركات الاتصالات.
لماذا تستبدل قوقل رموز SMS في Gmail؟
رغم أن المصادقة الثنائية (2FA) عبر الرسائل النصية تُعد طريقة عملية، إلا أنها تحمل مخاطر كبيرة، إذ يمكن اعتراض الرموز من قبل المخترقين، أو استخدامها في هجمات التصيد الاحتيالي، أو حتى تعرض الحساب للاختراق في حال تم استنساخ رقم الهاتف.
كما أن أمان هذه الطريقة يعتمد بشكل أساسي على سياسات الحماية التي تتبعها شركات الاتصالات.
كيف سيعمل التحقق عبر رموز QR؟
عند محاولة تسجيل الدخول إلى Gmail، سيظهر للمستخدم رمز QR على الشاشة بدلًا من استلام رمز عبر SMS. كل ما عليه فعله هو مسح الرمز باستخدام كاميرا الهاتف، ليتم التحقق من هويته تلقائيًا، دون الحاجة إلى إدخال رمز يدويًا، مما يقلل من مخاطر مشاركة الرموز مع جهات غير موثوقة.
متى سيتم تطبيق هذا التغيير؟
لم تحدد قوقل موعدًا رسميًا لاعتماد النظام الجديد، لكنها أكدت أنها تعمل على إعادة تصميم عملية التحقق من الهوية خلال الأشهر المقبلة.
ما رأيك بهذه الخطوة؟
-

@ 2f4550b0:95f20096
2025-02-19 17:16:53
Social media has a way of pulling us in. One minute you’re checking a friend’s post, the next you’re three hours deep into a rabbit hole of melting ice caps, cryptic X threads, and memes of the day. It’s called doomscrolling, that compulsive trawl through the digital abyss, and it’s practically a modern ritual. But what’s the soundtrack to this chaos? And more importantly, how do we musically coax ourselves back to reality, where grass grows, waves crash, and phones aren’t glued to our hands? Let’s dive into two playlists: one to lean into the doomscrolling vibe, and another to ease back out of it.
### The Doomscrolling Soundtrack: Embrace the Descent
Doomscrolling isn’t a sprint—it’s a slow, hypnotic sink into unease. The perfect background music mirrors that: brooding, immersive, and just unsettling enough to keep you scrolling. Think dark ambient and industrial tones: Trent Reznor and Atticus Ross’s Social Network soundtrack is a masterclass here, with its glitchy synths and pulsing dread. Add Tim Hecker’s droning soundscapes for that melancholic haze, or layer in some lo-fi beats with a dystopian twist. Think slow, distorted, like the apocalypse is coming but you’ve still got Wi-Fi. A track like Radiohead’s “Everything In Its Right Place” fits perfectly, too. Its eerie repetition matches the trance of endless posts about collapsing ecosystems or alien cover-ups.
Keep the tempo mid-to-low, around 60-90 BPM, with heavy bass and sparse vocals. Lyrics just clutter the mind when you’re decoding some unhinged X rant. This playlist isn’t about enjoyment—it’s about sinking deeper, soundtracking the slow-motion trainwreck you can’t unsee. It’s the audio equivalent of a flickering fluorescent light in a bunker.
### The “Touch Grass” Playlist: Climbing Back to Reality
But what if you want out? What if the doomscrolling spiral has left you jittery and you’re ready to trade the screen for sunlight? That’s where a softer, more grounding playlist comes in. Get yourself a musical lifeline to the real world. Swap the synths for acoustics, the dread for hope. Think Jack Johnson’s beachy vibes. “Better Together” or “Banana Pancakes” from his mid-2000s heyday still radiate that barefoot, ocean-side calm. Dated? Maybe. Timeless for unplugging? Absolutely.
Build on that with Donavon Frankenreiter’s soulful, sunny, and unhurried “Free” or Ben Howard’s “Old Pine”, a folk gem with a coastal echo. Angus & Julia Stone’s “Big Jet Plane” adds a warm, open-sky lift, while Nick Drake’s “Pink Moon” brings introspective stillness. Keep it organic with acoustic guitars, soft strings, maybe a brushed drum or shaker.
Keep the tempo slow but flowing, 50-70 BPM, like waves on a shore. For an extra nudge, weave in a natural soundscape like gentle waves and chirping birds to remind you there’s a world beyond the algorithm. This isn’t about jarring you awake; it’s a gentle hand on the shoulder saying, “Hey, the grass and sand are still out there.”
### Why Music Matters
Music shapes our headspace, especially with social media. Doomscrolling thrives on tension and a dark, droning playlist amplifies that pull, keeping us locked in. But a warm, acoustic shift can break the spell, nudging us toward balance. One playlist mirrors the chaos; the other mends it. Next time you’re scrolling X into the wee hours, try the industrial hum. When you’re ready to breathe again, let Jack Johnson and a wave-crashing track bring you back. Social media’s grip is strong, but the right tune might just set you free.
-

@ 9bcc5462:eb501d90
2025-02-24 17:47:28
Every generation loves to learn. However, our public schooling system has gone as far as it can take us. The abundance of easily accessible information on the internet, coupled with emerging tech like AI, decentralized protocols and bitcoin, means this is our time to innovate our learning infrastructure. A complete overhaul is due along with the development of a pilot program to test new and unconventional models.
Let’s carve a path towards innovation by sparking discussion around this topic. Hence, this blueprint. It is a gauntlet for any person who genuinely wants to become a stakeholder for our country’s future. Entry points are:
- Builders—Startups, developers and investors who will fund and create infrastructure.
- Practitioners—Educators and researchers who will test models.
- Supporters—Parents, donors and community members who want to contribute.
**Where Do We Begin?**
Let’s think about crafting the main components of a new pilot model. Below are suggested areas of focus:
- DEFINITION
- APPROACH
- PHILOSOPHY
- CULTURE
- PHYSICAL DESIGN
- OPERATIONAL ORGANIZATION
- ACCOUNTABILITY METHODS
- RISKS & CHALLENGES
- STYLE
- STAKEHOLDERS
**How It Works**
After researching your pedagogical ideas for current and future generations of scholars, it’s time to share your insights. Contribute your viewpoint by structuring a blueprint—one page per section—in the following sequence:
- Definition of your modern learning model with its key principles.
- Description of the core learning approach.
- Philosophy distilled into central concepts that will orient stakeholders.
- Culture your modern learning model aspires to live by.
- Potential challenges, risks and drawbacks.
- Design of physical spaces and rationale.
- Operational framework detailing adult and child learning organization.
- Accountability methods to ensure skill growth and competency.
- Style development and name of your model.
- Skin in the game, sign your model with your first and last name (unite stakeholders).
Perhaps if enough stakeholders come together, we can begin to actualize a more effective and updated way of learning. This is a challenge meant to separate those willing to engage in discourse, planning and laying foundations from those content to complain from the sidelines.
**Why Now and Where Does the Money Come From?**
After being a public educator for fifteen years, I learned you will not change the system, the system will change you. It’s time to design and build above and apart from the current model. 2025 is when courageous people step up to the plate and discuss our learning infrastructure. Whether it’s contributing out of the box thinking, modernizing curriculum, investing in startups or creating your own venture; there is no greater time than now. And no greater place than in the USA!
(By extension, we also create the opportunity to influence our global allies including our neighbors to the North and South.)
“But how!?” Learning Producers is figuring it out by asking not, “how?” but “who?” Who will unite together to develop our learning infrastructure? If you decide you want to participate and join our efforts, share your blueprint as well. For all stakeholders, this is an investment in an untapped market of a new learning economy.
If not, you’re not alone. Some consider this just rhetoric, idealism, or wishful thinking. Additionally, it is unclear how such actions can be profitable or how such infrastructure building will be funded. Money talks. Bullshit walks, right? In that case, let’s talk, and let’s fine tune our BS detectors. Onward, with this call to action:
- Share your own blueprint online or reach out to Learning Producers, Inc. ([Learningproducers.com](https://learningproducers.com/)).
- Conduct research on an ideal location and team to lay foundations on a pilot program at small scale.
- Engage in dialogue with investors interested in developing learning infrastructure for their own children and families.
- Secure stakeholders to develop and test a real world pilot model (real location, real agreements, real timeline, real people).
- Sponsor or donate resources to counter concerns over funding.
Now, we leave you with our blueprint:
PEDAGOGICAL WABI-SABI
We hope you enjoy it.
Sincerely,
**Israel Hernandez**
**Founder of Learning Producers**
**\**[Read or download full blueprint here: <https://www.learningproducers.com/blog/pedagogical-wabi-sabiblueprint-for-developing-learning-infrastructure> \]
-

@ f288a224:1da1792c
2025-02-19 16:43:40

First, some context.
I'm a child of the original internet chat-rooms on IRC, and I've tried over the last decades different applications and websites that we could all agree are "social media", but until I found NOSTR (Notes and Other Stuff Transmitted by Relays) I hadn't had this certainty that this isn't something that I will eventually change for something else.
Today, even with all its early stage issues, I have the certainty that NOSTR may be the ULTIMATE and FINAL HOME for my online life.
# THE PROBLEMS with the current/old social media landscape

## I'm tired of moving from one social media to the next.
As many of you, in my digital lifetime I've had many accounts that have now become obsolete; and the "content" and followings I created during that time was lost when one tech giant lost over the other, forcing us all to "MOVE" ourselves over to the new, and start building our content and following from scratch.
Lately, it's become even worse, where many of us have seen ourselves forced to use and feed more than one social media at a time, since they all serve various purposes, with sometimes diverse functionality, besides all being catered to different segments of people to connect you to (LinkedIn, Instagram, TikTok, Youtube...). How much is too much, though? And how much time should we keep spending re-adapting our content to reach all of our network?
For work, I've found myself having to create accounts in several of these giant data hoarding companies, having to build each following from scratch and to create "content" for all, and having to go through the hurdle of posting everything, everywhere, all at once.
## I'm sick of ever-changing terms, conditions and capabilities.
Let's be honest, the majority of us have never ever read the full terms and conditions, let alone every time they are updated without us knowing which rights to our data we are giving away, and which terms we are accepting that may be detrimental to us and our mental health.
We've learnt to accept that we are in their playground, they make up the rules, and if they choose to change the rules mid-game we just need to swallow it. We literally have no other choice, it's either that or desertion, which basically means walking away from everything we've built on their "public square". So, like a carefully engineered detrimental incentive structure, the more time we spend building on their turf, the more we are tied to them and conditioned to never leave them. The more we build and make them grow on our content, the more we'll lose if or when we drop out.
And even if you accept all that and choose to play along, and you do your best to create the most awesome account in the neighborhood, the random changes they make to optimize ad revenue or user attention will inevitably affect you and all your work.
If you created all your feed according to Instagram's squares but they choose to change to TikTok style dimensions due to their tech positioning battle with the Chinese giant... You swallow. If you edited your reels according to what you felt was the best 100 seconds video... Not anymore, suddenly 90 seconds is the maximum you're allowed... No appeal, no options. You Swallow. What? Seeing less of the people you actually WANT TO FOLLOW because they decided to clutter your feed with ads and suggestions, guess again: YOU SWALLOW.
AREN'T YOU FEELING FULL ENOUGH OF ALL THE SHIT THEY'VE FORCED DOWN YOUR THROAT?
Living our digital lives on these platforms feels like standing on ever changing quicksand, never endingly trying to "hack the algorithm" in order to have our content placed in front of the people who should automatically be able to see us from the moment they chose to follow us; and the worst part of it is, you never know when you may lose it all.
## Let's not forget, your social media account is NOT REALLY YOURS.
Recently, a friend's social media account was hacked. She didn't know how it happened; all she knew is that she got an email from Meta saying she had acted against community guidelines and her accounts were therefore being removed (the one hacked and all those liked to her email, which meant personal and work accounts). She tried to appeal, to no avail. She hadn't done anything wrong, but suddenly her identity had disappeared from all our feeds, and her content didn't exist anywhere anymore. She lost plenty of photos she had always counted on finding on her Instagram and lost the people she followed and who followed her. It was as if she had never existed on the platform.
*(Looks like a good moment to remind you to download all your valued content from the platforms you use in case something like this happens to you)*
And this happened to someone who hadn't done anything "to deserve it". It has actually happened to more than one person I know, and every time they've been helpless and had no recourse, and yet, found themselves having to rebuild from scratch on the same platform that de-platformed them, because they had "no other option", and "their friends are there".
Many more people have encountered this awful wake up call, some because of a hack, like my friend, others found themselves removed because they posted content critical of the platform... there are so many reasons people have gotten de-platformed and posts have gotten deleted without warning. And every time, we accept it, as if we owe them something; as if we need to settle for this kind of abusive environment that gets rich on our content and attention without having a say in anything.
But we do have another option that flips that attention retention model completely on its head and empowers the user. **That option is NOSTR, our exit from the extractive social media silos they have trapped us into.**

# NOSTR: The better social experience for the internet era.
NOSTR (Notes and Other Stuff Transmitted by Relays) is not a social media app, it's an Internet protocol. It's open source and many many developers around the world are creating apps on top of it and creating THE ULTIMATE SOCIAL MEDIA EXPERIENCE for users.
I first heard of NOSTR from Jack Dorsey on what used to be called Twitter, and when I joined it two years ago it was really rough around the edges, but it was FULL OF POTENTIAL and the value proposition was very clear to me from the beginning.
## Firstly, YOU OWN YOUR IDENTITY, that includes your content and your follower list.
So, what does owning you identity mean? I guess many of us have thought we owned our identity before, but the reality is that the platforms owned our identities, which is why they could delete or censor us.
Owning your identity on NOSTR is empowered by encryption and cryptography. I'm not going to go into the technical part, but to explain as simply as I can, on NOSTR no platform owns your login and password to use on their playground; you can basically use any NOSTR app to create your identity to navigate it. They give you a login (npub) and password (nsec), and the magic part is that you can USE THAT IDENTITY ON ANY NOSTR APP OR WEBSITE, no need to sign up individually on each one.
## Welcome to the beauty of INTEROPERABILITY.
I cannot emphasize enough what it feels like to be able to take your identity, your followers, your content and carry it from one app to the other.
On NOSTR there is a rich ecosystem of apps and websites that keep growing. We have "clients" that allow you to experience NOSTR in interfaces that could remind you of Twitter, Instagram, TikTok, Substack, Twitch, Clubhouse, Podcast apps and many more. You can find many of them on https://nostrapps.com/ .

With that information in mind, imagine you only needed one user password, your NOSTR nsec, and with that key, you could open you Instagram, or your Twitch or your Substack. And all your followers would be there, and you could choose what type of content you wanted to link to your identity for your followers to find. No longer "find link in bio", or "go to our YouTube channel", everything you post on NOSTR is tied to your identity, and you can post it all with a single set of keys that posts your content "everywhere".
And since your content is "in every client", each of YOUR FOLLOWERS CAN CHOOSE if they are more interested in experiencing your photography content "Insta-like" or if they love your "Twitter-esque" notes better. Each user navigates NOSTR with the interface they prefer.
*(With great power comes great responsibility, and I feel obligated to tell you that if you ever lose your nsec, no platform is gonna be able to save you. It's like the keys to your house, unless you keep a copy safely, no one can open it for you (there are no locksmiths on NOSTR). And if you leave your keys lying around on a cloud server somewhere, someone may grab your keys, open your house and use it however they want).*
The beauty of this interoperability and the fact that my keys open up my identity to all the NOSTR realms is that you don't need to settle for one client. I use 5 to 6 clients regularly everyday depending on the mood I'm in, (or the bugs that still prove this is a nascent ecosystem in development). Some I use when I want a more "Twitter-like" experience, others when I want to browse photos and others just give different algorithms to choose how to view my feed, and the best part is NO ONE CAN CLUTTER MY FEED WITH ADS. I can curate my feed however is most important to me, and each "NOSTR client" is like a different skin that customizes the way I experience the content.
However, the most important reason I started to use different NOSTR apps was that when I started, not all apps had zapping integrated. Some still don't, but most do :)
## ZAPS: direct micropayments from your followers.

Zaps are tips that come directly from the people who find value in the shit that you post. They are micropayments in the form of "sats", fractions of ever-increasing in value bitcoin , and a very big reason why I'm spending less and less time on other social media accumulating valueless likes that only feed the algorithm, and more time on NOSTR interacting with humans that post valuable notes hoping the generous souls that run upon their art or creations will find them valuable enough to tip them for it.
It's crazy how the type of content you post can change when your incentive is not to feed an algo, but to give real value to other humans around the world and be your most authentic self. Where Twitter/X's algo benefited the type of incendiary content that shocked and outraged people, NOSTR's incentives benefit those who bring most value to the network and their peers.
A few sats tip may not seem much, but even if the equivalent of a small zap is merely cents, it feels a whole lot better than any like, and you can count that if the purchasing power of bitcoin continues to accrue, those value-earned tips will too. Many "nostriches" are getting tons of zaps for memes on NOSTR, valuable articles, videos or participation in zapathons .

In NOSTR is where I first heard of the concept "value for value", and the community is very adamant in making "v4v" an alternative to ad revenue driven models. **Because we need to be the change we wanna see in the world**.
We've heard it said that if you're not paying for the product, you are the product. And up until now that has meant we felt obliged to accept that since ads were paying the platforms, we were required to give them our attention. But the open source movement thinks we deserve better. We deserve a better Internet, like the decentralized promise we've slowly been robbed of to enrich 10 people out of the work of all of us. If they can't monetize our attention, they got nothing.
But why should they monetize it, instead of us?

## Even with the glitches and bugs, NOSTR ROCKS!
The things I've grown to love most about NOSTR are:
• Not having the clutter of ads on my feed and being able to ONLY SEE WHAT I CHOOSE TO SEE.
• People who are not on NOSTR can ENJOY MY STUFF WITHOUT HAVING TO LOGIN.
• Being able to ENJOY ALL THE BENEFITS OF INTEROPERABILITY, and use many NOSTR clients that enrich my user experience knowing I own my identity and that means I'm not locked in, I can move like a bird wherever I decide.
• ZAPPING complete strangers that made me laugh, gave me a cool insight or simply made a witty comment.
• GETTING TIPPED for memes, articles, photos, videos and any "Notes and Other Stuff" that people have found valuable.

# CONCLUSION: Join us on NOSTR, participate in claiming back your digital life.
If you've made it this far in my love letter to NOSTR, thank you for being interested. Curious minds is what the world needs more of <3.
NOSTR is an ecosystem that is being built in the open by relentless developers that are continuously striving to out compete each other to offer a better user experience, it's a many headed dragon that has constant upgrades and implementations which benefits us all, and as such it sometimes comes with bugs and glitches.
Building the future is always buggy and requires testers and early adopters that help shape the technology in the best way possible, especially if you wanna build outside the incentive models of the devouring giants we're trying to get away from.
Being such an open ecosystem can also be overwhelming for a newcomer, where to start? There are so many clients to experience; so here are some of my recommendations.
Please, don't feel you need to go through all of them now, start step by step. This article will always be here whenever you need it (this is not Instagram ;) ).
### **Creating your NOSTR identity/account** with a wallet integrated to receive zaps on both Android and iOS:
• **YAKIHONNE**: It's a Japanese client that offers a great on-boarding experience. From the app you can create the account and enable a wallet to receive zaps. In it you can view and post short and long form content, images, videos and more. (Once you have the account created on your app, you can also visit the desktop version on https://yakihonne.com/ )
• **PRIMAL**: For a while it has positioned itself as a great on-boarding NOSTR client because it offers the same things as Yakihonne, has an integrated wallet, with the added benefit that you can also "buy sats/bitcoin" directly from its wallet, which can come in handy (it comes with a 15-30% premium, so only use for small amounts). It also has the desktop version at primal.net.
### **My favorite NOSTR iOS PHONE APPS after on-boarding**, in case you wanna hop into different user experiences:
• **DAMUS**: created by the original creator of the "ZAP", Will Casarin, it's an iOS simple client that is reliable and fast with notifications. It keeps things simple, mostly focusing on short note content, although you can also see images and short video. But the feed is optimized as a more "Twitter-like" feed.
• **NOSTUR**: The iOS phone client that has it all! It's the client I've used that integrates the most of NOSTR's possibilities, you can see all of the mentioned above with the previous clients, but also view LIVE STREAMS, and have multiple accounts set up simultaneously. The enhanced capabilities can sometimes come at the cost of crashing or being slow to load.
• **FREERSE**: Nice clean user interface with plenty of functionality, with easy navigation on topics like #art #photography or any other interests. It's my always reliable back-up to upload image content.
• **OLAS**: The new kid on the block Olas client, by prolific developer Pablof7z, is trying to take on Instagram and TikTok and has developed a client mainly focused on the visual and photographic part of NOSTR.
### Desktop clients & OTHER GEMS OF THE NOSTR REALM:
There is an infinite number of clients for desktop, but I usually find myself on **ditto.pub** or **slidestr.net** for a more visual experience.
• **ALBY** is INTEROPERABILITY'S BEST FRIEND. Alby is not a NOSTR client, but it's a browser extension that makes it seamless to jump from one desktop client to another with your wallet and identity without compromising your security.

• **HIVETALK**: A video call client (reminiscent of Zoom) that doesn't track you or spy on you and that enables zapping and many other functionalities during the calls.
• **NOSTR NESTS**: Audio spaces client that allows people to listen to conversations, chat within it and zap the people involved.
### if you made it this far, THANK YOU FOR YOUR ATTENTION.
HOPE YOU FOUND VALUE IN IT AND UNDERSTOOD WHY, FOR ME, THE FUTURE OF SOCIAL MEDIA IS BRIGHT, OPEN AND USER-CENTRIC.
FUCK THE MIDDLEMEN.

-

@ da0b9bc3:4e30a4a9
2025-02-24 16:56:02
Hello Stackers!
It's Monday so we're back doing "Meta Music Mondays" 😉.
From before the territory existed there was just one post a week in a ~meta take over. Now each month we have a different theme and bring music from that theme.
Welcome to Femmes Fatales 3!!!
I absolutely loved doing this last year so I'm bringing it back for round 3!
It's Femmes Fatales, where we celebrate women in ~Music. So let's have those ladies of the lung, the sirens of sound, our Femmes Fatales!
Stackers, here's Avril Lavigne.
https://youtu.be/dGR65RWwzg8?si=T5onrZ0T_zREhd-n
Talk Music. Share Tracks. Zap Sats.
originally posted at https://stacker.news/items/895855
-

@ d4309e24:8a81fcb0
2025-02-19 11:17:19
## Introduction: The Challenge of Time-Lock Encryption and Clock Servers
When I first set out to build **Hatchstr**, the idea was simple: create a way to send messages into the future, encrypted and locked to a specific Bitcoin block height. These messages would remain encrypted until the chosen block height was reached, creating a unique way to send a message to the future.
However, as I began working through the details, I quickly ran into some challenges. One key component of this system involves **clock servers**—decentralized nodes responsible for releasing decryption keys when the specified block height is reached.
### Clock Server Setup: The Basics
Initially, I adopted a simple model: each clock server holds a single public-private key pair *unique to that server* for a specific block height. When a user creates a message, they choose a clock server to trust and encrypt with the specific public key tied to that block height. Then, when the time comes, the clock server releases its private key to decrypt the message.

#### Positives:
- ✅ **Clean and Efficient Storage**: Each clock server only needs to store a single key pair for each block height, making storage lightweight and scalable.
- ✅ **Lazy Key Generation**: Keys are generated on-demand, meaning they’re only created when needed. This prevents unnecessary key generation or storage overhead.
- ✅ **Decentralized**: The clock servers don’t need to coordinate with each other or store any sensitive data besides their respective private keys, which simplifies the system architecture.
- ✅ **Limited Release Events**: Since each clock server only handles keys tied to a specific block height, the number of release events required is minimized, simplifying the key management process.
At first, this seemed like a good approach, but I quickly realized there were **critical limitations**:
#### Challenges:
- ❌ **Server Shutdown**: Capsules could be scheduled for many years in the future. If a clock server shuts down, all future capsules linked to it are lost.
- ❌ **Server Downtime**: If one of the clock servers is unavailable during unlock time, even for a short period, it leads to a delay for the users waiting for unlock.
- ❌ **Premature Release**: If a clock server accidentally releases its key too early, it could compromise the message, making it accessible before the intended time.
Though the setup worked for a basic system, I soon realized it couldn’t guarantee the reliability I wanted for a decentralized application.
## Tackling the Challenges of Multi-Sig and Secret Sharing
When I first approached the problem of securing time-lock capsules, I initially considered using multi-signature (multi-sig) solutions as a potential approach. The goal was simple: instead of relying on a single clock server to release its key, I could involve multiple servers to sign off on the decryption. This way, if one server failed or misbehaved, the message would still be protected.
However, as I delved deeper into the multi-sig approach, I quickly realized there were a few key issues:
🔒 **Communication Overhead**: Multi-sig requires servers to communicate and coordinate with each other. This introduces the possibility of new failure points, like network issues or miscommunication.
⚡ **Server Synchronization**: If one server was out of sync or released its key too early, it could still lead to the message being decrypted prematurely, breaking the system.
🛠 **Increased Complexity**: Each server would need to store and manage a unique key pair for every message, making the system more complicated and less efficient.
I quickly realized that multi-sig wasn’t the best fit for this kind of setup. Not only did it add unnecessary complexity, but it also conflicted with the decentralization goals I wanted to achieve. So, I started thinking about ways to **distribute the secret** across the clock servers without introducing all these new complications.
### Enter Shamir’s Secret Sharing (SSS)
Shamir's Secret Sharing (SSS) is a cryptographic technique designed to split a secret into multiple parts (called "shares") so that the secret can only be reconstructed when a specific minimum number of shares are combined. This process is based on polynomial interpolation, and it’s a powerful way to distribute secrets securely.
#### The Basic Concept
In SSS, a secret (like a cryptographic key or message) is divided into *n* shares, where *n* is the total number of shares you want to generate. You also specify a threshold, *k*, which represents the minimum number of shares required to reconstruct the original secret.
- **n** is the total number of shares.
- **k** is the minimum number of shares required to reconstruct the secret (known as the "threshold").
For example, in a **3-out-of-5** scheme, the secret is split into 5 shares, but at least 3 shares are required to reconstruct the secret. If fewer than 3 shares are available, the secret cannot be reconstructed.
#### Why This is Secure
Shamir’s Secret Sharing is secure because, with fewer than *k* shares, it is computationally infeasible to learn anything about the secret. The shares themselves don’t reveal any information; it’s only the combination of the right number of shares that allows reconstruction. This makes it resistant to attacks, as even if an attacker gets hold of some shares, they won’t be able to reconstruct the secret unless they have the required minimum number of shares (comparable to 256-bit cryptographic strength).
#### Applications of Shamir’s Secret Sharing
Shamir’s Secret Sharing is widely used in scenarios where high availability and reliability are needed, but security and privacy are equally important. Examples include:
- **Key management**: Protecting encryption keys by distributing them across multiple parties.
- **Multi-signature setups**: Requiring multiple parties to sign off on a transaction or access a secure system.
- **Distributed systems**: Ensuring that no single party holds a complete secret, and multiple parties must collaborate to unlock it.
By leveraging Shamir's Secret Sharing, you can strike the right balance between **redundancy**, **security**, and **availability** for your system’s sensitive information.
### The Problem with Distributing Secret Shares
SSS could give us exactly the properties I was looking for, with the added benefit that users could choose their preferred setup, for example:
- **1-out-of-5 scheme**: Prioritizing the likelihood that the message is decrypted even if only one of the 5 chosen clock servers does its job at unlock time. With the tradeoff that each of the 5 could leak the message early.
- **3-out-of-5 scheme**: A measured approach that allows for 2 servers to stop working and would also keep the capsule private even if 2 clock servers leak their secret early.
So I considered an approach where each clock server would store part of the key. Instead of a single server holding the full key, I would split the key into parts and distribute those parts across multiple servers. When the time arrived, I’d gather the required number of shares to reconstruct the key and decrypt the message.
At first glance, this seemed like a promising approach. But when we look through the implications, a few problems started to emerge:
💥 **Overhead**: Each clock server would need to store a share of every key for every message. This would quickly become inefficient and result in unnecessary overhead.
🔔 **Exploding Reveal Events**: Since each clock server would need to release all its shares at a specific time, there would be a massive increase in the number of reveal events, spamming and possibly overloading Nostr relays.
While the idea of distributing the key was very appealing, the practical issues around overhead and complexity made it clear that this wasn’t the final solution. I needed something that would be more efficient, scalable, while still in line with the decentralized model I was aiming for.
### Discovering a Hybrid Solution
After testing out various approaches, I realized that the breakthrough wasn’t just about Shamir’s Secret Sharing (SSS)—that part was fairly intuitive. The real insight came when I thought about how to preserve the original clock server design while solving the challenges of failover and early release.
Instead of having the clock servers store the secret or a share of it, **I kept the original design**: each clock server only holds a public-private key pair tied to a block height, as initially planned. The twist came when I decided to split an ephemeral AES key into shards using Shamir’s Secret Sharing, but instead of directly storing shares at the clock servers, we could encrypted each share with the public key of the clock server.
This approach would allow us to keep the clock server’s role simple:
When the time comes, the servers release their private keys, which can then be used to decrypt the encrypted shares of the AES key that were published alongside the original encrypted message. These shares, once decrypted, allow for the reconstruction of the AES key, which in turn decrypts the message.
This solution solved several key issues:
- ✅ **No Coordination Between Servers**: Each clock server only holds one key pair for a specific block height and doesn’t need to know about the other servers. This simplifies the system and removes the need for complex server coordination.
- ✅ **Minimal Overhead**: The clock servers only store a single key pair per block height, eliminating the need to store individual keys for each message.
- ✅ **Fault Tolerance**: If one clock server is offline, the other shares can still reconstruct the AES key and decrypt the message, ensuring reliability.
- ✅ **Client-Side Security**: The AES key is generated on the client side and never stored on the clock servers, providing a high level of security.
By combining the simplicity of the clock server model with the power of Shamir’s Secret Sharing, this hybrid solution allows us to securely split an AES key and manage decryption while ensuring the system remains decentralized, resilient, and efficient.
This was the method I had been searching for.
### The Process Breakdown
1. **AES Key Generation**:
- A **random AES key** is generated on the **client side** for each message. This key is **never stored** anywhere, ensuring that it remains secure and only used for encrypting the message.
2. **Shamir’s Secret Sharing**:
- The AES key is split into (in this example) **3 shares** using Shamir’s Secret Sharing. These shares are associated with **3 independent clock servers**.
- The threshold of **2 out of 3** means that only **2 clock servers** needed later to reconstruct the AES key and decrypt the message.
3. **Encrypting with Public Keys**:
- The secret shares are then **encrypted** using the **public keys** of the target block height for each specific clock server. This ensures that the shares are secure until the proper time comes.
4. **Storage**:
- The **encrypted shares** together with the **AES-encrypted message** can be published to Nostr relais or stored on a decentralized platform like **IPFS**, which provides redundancy and availability.
5. **Clock Servers Release Keys**:
- When the specified **Bitcoin block height** is reached, each clock server publishes its **private key** to Nostr, allowing everyone to decrypt the shares.
- The client reconstructs the AES key from the decrypted shares and finally decrypts the original message.

## Conclusion: An Elegant Solution to Time-Lock Encryption
Through a series of experiments and iterations, We finally landed on a solution that balances **security**, **scalability**, and **efficiency**. By combining **AES encryption** with **Shamir’s Secret Sharing**, We were able to solve the multi-sig failover problem without adding unnecessary complexity. 🔥
### An Open Question: Clock Server Incentives 💰
Decentralized systems thrive when participants are motivated to contribute. For Hatchstr, a critical question remains: Why would anyone run a clock server?
One possibility is allowing users to **zap** (tip) servers for each capsule they help unlock. But this is just a starting point—how do we ensure reliability without centralizing trust?
I’d love to hear your thoughts. How would you design incentives for a decentralized network of clock servers?
This part is crucial, and I’m excited to explore it with the community.
### What's Next for Hatchstr?
🧩 **Leveraging Nostr**: Let's see how we can integrate the Nostr NIP standards and previous protocol developments into our system to enhance communication and data integrity.
🔮 **Designing a Web App**: We'll explore building a user-friendly web application for creating and managing digital time capsules. Focus will be on enhancing usability, interface design, and user interaction.
🎛️ **Building a Clock Server with Elixir**: We'll delve into developing a simple clock server using Elixir, capitalizing on its strengths in concurrency and real-time processing to support our time-locking mechanisms.
Stay tuned as we advance both the user experience and the backend infrastructure of Hatchstr together.
If you're interested in following along or contributing to the development, feel free to reach out!
[Nostr QR](https://bafybeig6dmqshbd7khcd7qr7ce6inslx4muebtt3bk5m33f4dplsx4et7y.ipfs.w3s.link/nostr_qr.png)
```
npub16scfufrpsqcukjg7ymu4r40h7j4dwqy4pajgz48e6lmnmz5pljcqh678uh
```
Thank you for reading and being part of this journey! 🧡
-

@ a012dc82:6458a70d
2025-02-24 13:16:04
The financial landscape has been dramatically reshaped with the U.S. Securities and Exchange Commission's (SEC) landmark approval of the first-ever batch of spot bitcoin exchange-traded funds (ETFs). This pivotal moment not only signifies a major leap forward for the cryptocurrency realm but also marks a significant evolution in traditional investment methodologies. The integration of Bitcoin into the ETF framework heralds a new era of digital asset investment, blending the innovative world of cryptocurrencies with the stability and familiarity of traditional financial markets. This article aims to provide a comprehensive understanding of Bitcoin ETFs, their profound implications for the investment community, and the transformative potential they hold for the future of financial diversification and strategy.
**Table of Contents**
- What is a Bitcoin ETF?
- The Significance of SEC’s Approval
- Impact on the Cryptocurrency Market
- Benefits for Investors
- Enhanced Accessibility
- Portfolio Diversification
- Regulatory Safety Net
- Challenges and Considerations
- Conclusion
- FAQs
**What is a Bitcoin ETF?**
A Bitcoin ETF represents a seismic shift in investment opportunities, offering a bridge between the cutting-edge realm of cryptocurrencies and the established world of stock market investing. It functions as an investment fund that closely tracks the value of Bitcoin, allowing investors to buy shares that mirror the performance of the digital currency. These shares are traded on conventional stock exchanges, akin to stocks, thereby democratizing access to Bitcoin investment. This innovative approach eliminates the technical barriers and security concerns associated with direct cryptocurrency investments, such as understanding blockchain technology, managing digital wallets, and safeguarding private keys. By simplifying the investment process, Bitcoin ETFs are poised to attract a diverse range of investors, from seasoned stock market enthusiasts to newcomers intrigued by the potential of digital currencies.
**The Significance of SEC’s Approval**
The SEC's approval of Bitcoin ETFs is a watershed moment, signaling a paradigm shift in the financial sector's approach to digital assets. It's a recognition of Bitcoin's growing relevance and maturity as an investment asset, and a nod to its potential to integrate seamlessly into the broader financial system. This move is not just about regulatory compliance; it's a strong endorsement of the legitimacy and viability of cryptocurrencies. The involvement of heavyweight financial institutions in sponsoring these ETFs is a testament to the growing confidence in Bitcoin's future. This development is expected to catalyze further innovations in the cryptocurrency space, encouraging more rigorous standards, enhanced security protocols, and greater transparency, all of which are essential for mainstream acceptance and long-term growth.
**Impact on the Cryptocurrency Market**
The launch of Bitcoin ETFs is set to revolutionize the cryptocurrency market. By offering a regulated, familiar, and accessible investment vehicle, these ETFs are likely to attract a new demographic of investors, including those who have been on the sidelines due to the perceived complexities and risks of cryptocurrencies. This broader investor base could lead to increased market capitalization and liquidity for Bitcoin, potentially reducing volatility and fostering a more stable pricing environment. Moreover, the introduction of Bitcoin ETFs could serve as a catalyst for the development of similar products for other cryptocurrencies, paving the way for a more diverse and robust digital asset market. This could also spur innovation in blockchain technology and crypto-related services, further integrating these into the mainstream financial ecosystem.
**Benefits for Investors**
**Enhanced Accessibility**
Bitcoin ETFs represent a democratization of cryptocurrency investment, making it accessible to a wider audience. This inclusivity extends beyond individual investors to institutional ones, who may have been hesitant to invest in cryptocurrencies due to regulatory concerns or logistical complexities. By trading on major stock exchanges, Bitcoin ETFs offer a familiar and regulated environment, lowering the entry barrier for those new to digital currencies.
**Portfolio Diversification**
The introduction of Bitcoin ETFs offers a novel avenue for portfolio diversification. Historically, investors seeking diversification would turn to a mix of stocks, bonds, and commodities. Bitcoin ETFs add a new dimension to this mix, providing exposure to an asset class that has shown a low correlation with traditional markets. This diversification can be particularly appealing in times of economic uncertainty or inflationary pressures, where Bitcoin has often been touted as a 'digital gold'.
**Regulatory Safety Net**
Trading within the regulated framework of stock exchanges, Bitcoin ETFs offer a level of oversight and consumer protection not typically available in direct cryptocurrency investments. This regulatory safety net can be particularly reassuring for risk-averse investors and those concerned about the legal implications of cryptocurrency investments.
Simplified Investment and Taxation Process: Investing in Bitcoin directly involves a complex maze of tax implications and ownership challenges. Bitcoin ETFs streamline this process, offering a straightforward investment vehicle that fits neatly into existing tax and investment frameworks. This simplification is a boon for both individual investors managing their portfolios and financial advisors seeking to incorporate digital assets into their clients' strategies.
**Challenges and Considerations**
While Bitcoin ETFs offer numerous advantages, they are not without their challenges and risks. The cryptocurrency market, known for its volatility, presents a unique risk profile that may not be suitable for all investors. The price of Bitcoin can be influenced by a range of factors, from regulatory news to technological developments, and investor sentiment. Therefore, while ETFs provide a more accessible route to Bitcoin investment, they do not shield investors from the inherent price volatility of the underlying asset. Additionally, as with any emerging investment vehicle, there is a learning curve associated with understanding how Bitcoin ETFs fit into a broader investment strategy. Investors should conduct thorough research, consider their long-term investment goals, and possibly consult with financial advisors to understand how Bitcoin ETFs align with their risk tolerance and investment objectives.
**Conclusion**
The introduction of Bitcoin ETFs is a landmark development in the financial world, bridging the gap between traditional investment mechanisms and the burgeoning world of digital currencies. This innovation not only expands the accessibility of Bitcoin to a broader range of investors but also enhances the overall credibility and stability of the cryptocurrency market. As the financial landscape continues to evolve, Bitcoin ETFs stand as a beacon of the growing synergy between conventional finance and digital asset innovation, offering a glimpse into a future where such collaborations are not just possible but are a cornerstone of investment strategy. As we move forward, Bitcoin ETFs will likely play a pivotal role in shaping the dynamics of investment portfolios, offering a unique combination of innovation, accessibility, and diversification.
**FAQs**
**What is a Bitcoin ETF?**
A Bitcoin ETF is an exchange-traded fund that tracks the price of Bitcoin, allowing investors to buy shares in the ETF on traditional stock exchanges, without directly purchasing and managing Bitcoin.
**How does a Bitcoin ETF differ from buying Bitcoin directly?**
Unlike direct Bitcoin purchases, which require a cryptocurrency exchange account and a digital wallet, a Bitcoin ETF allows investors to trade shares representing Bitcoin on conventional stock exchanges, simplifying the investment process.
**Are Bitcoin ETFs safe investments?**
While Bitcoin ETFs offer the safety of regulated stock exchanges and eliminate the need for digital wallet management, they still carry the inherent volatility and risks associated with Bitcoin prices.
**Can Bitcoin ETFs be included in retirement portfolios?**
Yes, Bitcoin ETFs can be included in various investment portfolios, including retirement plans, offering a way to diversify with a new asset class.
**What are the tax implications of investing in a Bitcoin ETF?**
Bitcoin ETFs simplify tax reporting compared to direct cryptocurrency investments. However, investors should consult with a tax professional to understand specific implications.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: @croxroadnews.co**
**Instagram: @croxroadnews.co**
**Youtube: @croxroadnews**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-

@ e83b66a8:b0526c2b
2025-02-19 11:00:29
In the UK, as Bitcoin on-ramps become throttled more and more by government interference, ironically more and more off-ramps are becoming available.
So here, as Bitcoin starts its bull run and many people will be spending or taking profits within the next year or so, I am going to summarise my experience with off ramps.
N.B. many of these off-ramps are also on-ramps, but I’m primarily focusing on spending Bitcoin.
Revolut:
At last in the UK, Revolut is a “probation” full bank and so now has most of the fiat guarantees that other legacy banks have.
Apart from its excellent multi-currency account services for fiat, meaning you can spend native currencies in many countries, Revolut have for some time allowed you to buy a selection of Crypto currencies including Bitcoin.
You can send those coins to self custody wallets, or keep them on Revolut and either sell or spend on specific DeFi cards which can be added to platforms like Apple Pay. Fees, as you would expect are relatively high, but it is a very good, seamless service.
Uphold:
This was an exchange I was automatically signed up to by using the “Brave Browser” and earning BAT tokens for watching adds. I have however found the built in virtual debit card, which I’ve added to Apple Pay useful for shedding my shitcoins by cashing them in and spending GBP in the real world, buying day to day stuff.
Xapo Bank:
I signed up about a year ago to the first “Bitcoin Bank” founded by Wences Casares a very early Bitcoiner.
They are based in Gibraltar and offer a USD, Tether and Bitcoin banking service which allows you to deposit GBP or spend GBP, but converts everything into either USD or BTC. You have a full UK bank account number and sort code, but everything received in it is converted to USD on the fly.
They also support Lightning and they have integrated LightSparks UMA Universal Money Addressing protocol explained here:
https://www.lightspark.com/uma
When I signed up the fees were $150 per annum, but they have since increased them to $1,000 per annum for new users.
I have yet to use the bank account or debit card in any earnest, but it will be my main spending facility when I take profits
Strike:
Strike it really focused on cross border payments and sending fiat money around the world for little to no cost using Bitcoin as the transmission rails. You need to KYC to sign up, but you then get, in the UK at least, a nominee bank account in your name, a Lightning and Bitcoin wallet address and the ability to send payments immediately to any other Strike user by name, or any Bitcoin or Lightning address.
In the U.S. they have also recently launched a bill pay service, using your Strike account to pay your regular household bills using either fiat or Bitcoin.
Coinbase:
Back in 2017, I signed up for a Coinbase debit card and was spending Sats in daily life with it automatically converting Sats to GBP on the fly. I let it lapse in 2021 and haven’t bothered to replace it. I believe it is still option to consider.
Crypto.com
I have a debit card which I cannot add to Apple Pay, but I have managed to add it to Curve card: https://www.curve.com/en-gb/ which is in turn added to Apple Pay. This allows me to spend any fiat which I have previously cashed from selling coins.
I currently have some former exchange coins cashed out which I am gradually spending in the real world as GBP.
SwissBorg
Has had a troubled past with the FCA, but does currently allow deposits and withdrawals from UK banks, although Barclays have blocked transactions to my own nominee account within SwissBorg on a couple of occasions. They have a debit card option for investors in their platform, which I am not and they intend to make this generally available in the future. SwissBorg are a not an exchange, but more of a comparison site, searching the market for the best prices and activating deals for you across multiple platforms, taking a commission. They have been my main source for buying BTC and when they are not being interfered with by the FCA, they are excellent. You also get a nominee bank account in their platform in your own name.