-
@ ed5774ac:45611c5c
2025-02-15 05:38:56Bitcoin as Collateral for U.S. Debt: A Deep Dive into the Financial Mechanics
The U.S. government’s proposal to declare Bitcoin as a 'strategic reserve' is a calculated move to address its unsustainable debt obligations, but it threatens to undermine Bitcoin’s original purpose as a tool for financial freedom. To fully grasp the implications of this plan, we must first understand the financial mechanics of debt creation, the role of collateral in sustaining debt, and the historical context of the petro-dollar system. Additionally, we must examine how the U.S. and its allies have historically sought new collateral to back their debt, including recent attempts to weaken Russia through the Ukraine conflict.
The Vietnam War and the Collapse of the Gold Standard
The roots of the U.S. debt crisis can be traced back to the Vietnam War. The war created an unsustainable budget deficit, forcing the U.S. to borrow heavily to finance its military operations. By the late 1960s, the U.S. was spending billions of dollars annually on the war, leading to a significant increase in public debt. Foreign creditors, particularly France, began to lose confidence in the U.S. dollar’s ability to maintain its value. In a dramatic move, French President Charles de Gaulle sent warships to New York to demand the conversion of France’s dollar reserves into gold, as per the Bretton Woods Agreement.
This demand exposed the fragility of the U.S. gold reserves. By 1971, President Richard Nixon was forced to suspend the dollar’s convertibility to gold, effectively ending the Bretton Woods system. This move, often referred to as the "Nixon Shock," declared the U.S. bankrupt and transformed the dollar into a fiat currency backed by nothing but trust in the U.S. government. The collapse of the gold standard marked the beginning of the U.S.’s reliance on artificial systems to sustain its debt. With the gold standard gone, the U.S. needed a new way to back its currency and debt—a need that would lead to the creation of the petro-dollar system.
The Petro-Dollar System: A New Collateral for Debt
In the wake of the gold standard’s collapse, the U.S. faced a critical challenge: how to maintain global confidence in the dollar and sustain its ability to issue debt. The suspension of gold convertibility in 1971 left the dollar as a fiat currency—backed by nothing but trust in the U.S. government. To prevent a collapse of the dollar’s dominance and ensure its continued role as the world’s reserve currency, the U.S. needed a new system to artificially create demand for dollars and provide a form of indirect backing for its debt.
The solution came in the form of the petro-dollar system. In the 1970s, the U.S. struck a deal with Saudi Arabia and other OPEC nations to price oil exclusively in U.S. dollars. In exchange, the U.S. offered military protection and economic support. This arrangement created an artificial demand for dollars, as countries needed to hold USD reserves to purchase oil. Additionally, oil-exporting nations reinvested their dollar revenues in U.S. Treasuries, effectively recycling petro-dollars back into the U.S. economy. This recycling of petrodollars provided the U.S. with a steady inflow of capital, allowing it to finance its deficits and maintain low interest rates.
To further bolster the system, the U.S., under the guidance of Henry Kissinger, encouraged OPEC to dramatically increase oil prices in the 1970s. The 1973 oil embargo and subsequent price hikes, masterminded by Kissinger, quadrupled the cost of oil, creating a windfall for oil-exporting nations. These nations, whose wealth surged significantly due to the rising oil prices, reinvested even more heavily in U.S. Treasuries and other dollar-denominated assets. This influx of petrodollars increased demand for U.S. debt, enabling the U.S. to issue more debt at lower interest rates. Additionally, the appreciation in the value of oil—a critical global commodity—provided the U.S. banking sector with the necessary collateral to expand credit generation. Just as a house serves as collateral for a mortgage, enabling banks to create new debt, the rising value of oil boosted the asset values of Western corporations that owned oil reserves or invested in oil infrastructure projects. This increase in asset values allowed these corporations to secure larger loans, providing banks with the collateral needed to expand credit creation and inject more dollars into the economy. However, these price hikes also caused global economic turmoil, disproportionately affecting developing nations. As the cost of energy imports skyrocketed, these nations faced mounting debt burdens, exacerbating their economic struggles and deepening global inequality.
The Unsustainable Debt Crisis and the Search for New Collateral
Fast forward to the present day, and the U.S. finds itself in a familiar yet increasingly precarious position. The 2008 financial crisis and the 2020 pandemic have driven the U.S. government’s debt to unprecedented levels, now exceeding $34 trillion, with a debt-to-GDP ratio surpassing 120%. At the same time, the petro-dollar system—the cornerstone of the dollar’s global dominance—is under significant strain. The rise of alternative currencies and the shifting power dynamics of a multipolar world have led to a decline in the dollar’s role in global trade, particularly in oil transactions. For instance, China now pays Saudi Arabia in yuan for oil imports, while Russia sells its oil and gas in rubles and other non-dollar currencies. This growing defiance of the dollar-dominated system reflects a broader trend toward economic independence, as nations like China and Russia seek to reduce their reliance on the U.S. dollar. As more countries bypass the dollar in trade, the artificial demand for dollars created by the petro-dollar system is eroding, undermining the ability of US to sustain its debt and maintain global financial hegemony.
In search of new collateral to carry on its unsustainable debt levels amid declining demand for the U.S. dollar, the U.S., together with its Western allies—many of whom face similar sovereign debt crises—first attempted to weaken Russia and exploit its vast natural resources as collateral. The U.S. and its NATO allies used Ukraine as a proxy to destabilize Russia, aiming to fragment its economy, colonize its territory, and seize control of its natural resources, estimated to be worth around $75 trillion. By gaining access to these resources, the West could have used them as collateral for the banking sector, enabling massive credit expansion. This, in turn, would have alleviated the sovereign debt crisis threatening both the EU and the U.S. This plan was not unprecedented; it mirrored France’s long-standing exploitation of its former African colonies through the CFA franc system.
For decades, France has maintained economic control over 14 African nations through the CFA franc, a currency pegged to the euro and backed by the French Treasury. Under this system, these African countries are required to deposit 50% of their foreign exchange reserves into the French Treasury, effectively giving France control over their monetary policy and economic sovereignty. This arrangement allows France to use African resources and reserves as implicit collateral to issue debt, keeping its borrowing costs low and ensuring demand for its bonds. In return, African nations are left with limited control over their own economies, forced to prioritize French interests over their own development. This neo-colonial system has enabled France to sustain its financial dominance while perpetuating poverty and dependency in its former colonies.
Just as France’s CFA franc system relies on the economic subjugation of African nations to sustain its financial dominance, the U.S. had hoped to use Russia’s resources as a lifeline for its debt-ridden economy. However, the plan ultimately failed. Russia not only resisted the sweeping economic sanctions imposed by the West but also decisively defeated NATO’s proxy forces in Ukraine, thwarting efforts to fragment its economy and seize control of its $75 trillion in natural resources. This failure left the U.S. and its allies without a new source of collateral to back their unsustainable debt levels. With this plan in ruins, the U.S. has been forced to turn its attention to Bitcoin as a potential new collateral for its unsustainable debt.
Bitcoin as Collateral: The U.S. Government’s Plan
The U.S. government’s plan to declare Bitcoin as a strategic reserve is a modern-day equivalent of the gold standard or petro-dollar system. Here’s how it would work:
-
Declaring Bitcoin as a Strategic Reserve: By officially recognizing Bitcoin as a reserve asset, the U.S. would signal to the world that it views Bitcoin as a store of value akin to gold. This would legitimize Bitcoin in the eyes of institutional investors and central banks.
-
Driving Up Bitcoin’s Price: To make Bitcoin a viable collateral, its price must rise significantly. The U.S. would achieve this by encouraging regulatory clarity, promoting institutional adoption, and creating a state-driven FOMO (fear of missing out). This would mirror the 1970s oil price hikes that bolstered the petro-dollar system.
-
Using Bitcoin to Back Debt: Once Bitcoin’s price reaches a sufficient level, the U.S. could use its Bitcoin reserves as collateral for issuing new debt. This would restore confidence in U.S. Treasuries and allow the government to continue borrowing at low interest rates.
The U.S. government’s goal is clear: to use Bitcoin as a tool to issue more debt and reinforce the dollar’s role as the global reserve currency. By forcing Bitcoin into a store-of-value role, the U.S. would replicate the gold standard’s exploitative dynamics, centralizing control in the hands of large financial institutions and central banks. This would strip Bitcoin of its revolutionary potential and undermine its promise of decentralization. Meanwhile, the dollar—in digital forms like USDT—would remain the primary medium of exchange, further entrenching the parasitic financial system.
Tether plays a critical role in this strategy. As explored in my previous article (here: [https://ersan.substack.com/p/is-tether-a-bitcoin-company]), Tether helps sustaining the current financial system by purchasing U.S. Treasuries, effectively providing life support for the U.S. debt machine during a period of declining demand for dollar-denominated assets. Now, with its plans to issue stablecoins on the Bitcoin blockchain, Tether is positioning itself as a bridge between Bitcoin and the traditional financial system. By issuing USDT on the Lightning Network, Tether could lure the poor in developing nations—who need short-term price stability for their day to day payments and cannot afford Bitcoin’s volatility—into using USDT as their primary medium of exchange. This would not only create an artificial demand for the dollar and extend the life of the parasitic financial system that Bitcoin was designed to dismantle but would also achieve this by exploiting the very people who have been excluded and victimized by the same system—the poor and unbanked in developing nations, whose hard-earned money would be funneled into sustaining the very structures that perpetuate their oppression.
Worse, USDT on Bitcoin could function as a de facto central bank digital currency (CBDC), where all transactions can be monitored and sanctioned by governments at will. For example, Tether’s centralized control over USDT issuance and its ties to traditional financial institutions make it susceptible to government pressure. Authorities could compel Tether to implement KYC (Know Your Customer) rules, freeze accounts, or restrict transactions, effectively turning USDT into a tool of financial surveillance and control. This would trap users in a system where every transaction is subject to government oversight, effectively stripping Bitcoin of its censorship-resistant and decentralized properties—the very features that make it a tool for financial freedom.
In this way, the U.S. government’s push for Bitcoin as a store of value, combined with Tether’s role in promoting USDT as a medium of exchange, creates a two-tiered financial system: one for the wealthy, who can afford to hold Bitcoin as a hedge against inflation, and another for the poor, who are trapped in a tightly controlled, surveilled digital economy. This perpetuates the very inequalities Bitcoin was designed to dismantle, turning it into a tool of oppression rather than liberation.
Conclusion: Prolonging the Parasitic Financial System
The U.S. government’s plan to declare Bitcoin as a strategic reserve is not a step toward financial innovation or freedom—it is a desperate attempt to prolong the life of a parasitic financial system that Bitcoin was created to replace. By co-opting Bitcoin, the U.S. would gain a new tool to issue more debt, enabling it to continue its exploitative practices, including proxy wars, economic sanctions, and the enforcement of a unipolar world order.
The petro-dollar system was built on the exploitation of oil-exporting nations and the global economy. A Bitcoin-backed system would likely follow a similar pattern, with the U.S. using its dominance to manipulate Bitcoin’s price and extract value from the rest of the world. This would allow the U.S. to sustain its current financial system, in which it prints money out of thin air to purchase real-world assets and goods, enriching itself at the expense of other nations.
Bitcoin was designed to dismantle this parasitic system, offering an escape hatch for those excluded from or exploited by traditional financial systems. By declaring Bitcoin a strategic reserve, the U.S. government would destroy Bitcoin’s ultimate purpose, turning it into another instrument of control. This is not a victory for Bitcoin or bitcoiners—it is a tragedy for financial freedom and global equity.
The Bitcoin strategic reserve plan is not progress—it is a regression into the very system Bitcoin was designed to dismantle. As bitcoiners, we must resist this co-option and fight to preserve Bitcoin’s original vision: a decentralized, sovereign, and equitable financial system for all. This means actively working to ensure Bitcoin is used as a medium of exchange, not just a store of value, to fulfill its promise of financial freedom.
-
-
@ 599f67f7:21fb3ea9
2025-01-26 11:01:05¿Qué es Blossom?
nostr:nevent1qqspttj39n6ld4plhn4e2mq3utxpju93u4k7w33l3ehxyf0g9lh3f0qpzpmhxue69uhkummnw3ezuamfdejsygzenanl0hmkjnrq8fksvdhpt67xzrdh0h8agltwt5znsmvzr7e74ywgmr72
Blossom significa Blobs Simply Stored on Media Servers (Blobs Simplemente Almacenados en Servidores de Medios). Blobs son fragmentos de datos binarios, como archivos pero sin nombres. En lugar de nombres, se identifican por su hash sha256. La ventaja de usar hashes sha256 en lugar de nombres es que los hashes son IDs universales que se pueden calcular a partir del archivo mismo utilizando el algoritmo de hash sha256.
💡 archivo -> sha256 -> hash
Blossom es, por lo tanto, un conjunto de puntos finales HTTP que permiten a los usuarios almacenar y recuperar blobs almacenados en servidores utilizando su identidad nostr.
¿Por qué Blossom?
Como mencionamos hace un momento, al usar claves nostr como su identidad, Blossom permite que los datos sean "propiedad" del usuario. Esto simplifica enormemente la cuestión de "qué es spam" para el alojamiento de servidores. Por ejemplo, en nuestro Blossom solo permitimos cargas por miembros de la comunidad verificados que tengan un NIP-05 con nosotros.
Los usuarios pueden subir en múltiples servidores de blossom, por ejemplo, uno alojado por su comunidad, uno de pago, otro público y gratuito, para establecer redundancia de sus datos. Los blobs pueden ser espejados entre servidores de blossom, de manera similar a cómo los relays nostr pueden transmitir eventos entre sí. Esto mejora la resistencia a la censura de blossom.
A continuación se muestra una breve tabla de comparación entre torrents, Blossom y servidores CDN centralizados. (Suponiendo que hay muchos seeders para torrents y se utilizan múltiples servidores con Blossom).
| | Torrents | Blossom | CDN Centralizado | | --------------------------------------------------------------- | -------- | ------- | ---------------- | | Descentralizado | ✅ | ✅ | ❌ | | Resistencia a la censura | ✅ | ✅ | ❌ | | ¿Puedo usarlo para publicar fotos de gatitos en redes sociales? | ❌ | ✅ | ✅ |
¿Cómo funciona?
Blossom utiliza varios tipos de eventos nostr para comunicarse con el servidor de medios.
| kind | descripción | BUD | | ----- | ------------------------------- | ------------------------------------------------------------------ | | 24242 | Evento de autorización | BUD01 | | 10063 | Lista de Servidores de Usuarios | BUD03 |
kind:24242 - Autorización
Esto es esencialmente lo que ya describimos al usar claves nostr como IDs de usuario. En el evento, el usuario le dice al servidor que quiere subir o eliminar un archivo y lo firma con sus claves nostr. El servidor realiza algunas verificaciones en este evento y luego ejecuta el comando del usuario si todo parece estar bien.
kind:10063 - Lista de Servidores de Usuarios
Esto es utilizado por el usuario para anunciar a qué servidores de medios está subiendo. De esta manera, cuando el cliente ve esta lista, sabe dónde subir los archivos del usuario. También puede subir en múltiples servidores definidos en la lista para asegurar redundancia. En el lado de recuperación, si por alguna razón uno de los servidores en la lista del usuario está fuera de servicio, o el archivo ya no se puede encontrar allí, el cliente puede usar esta lista para intentar recuperar el archivo de otros servidores en la lista. Dado que los blobs se identifican por sus hashes, el mismo blob tendrá el mismo hash en cualquier servidor de medios. Todo lo que el cliente necesita hacer es cambiar la URL por la de un servidor diferente.
Ahora, además de los conceptos básicos de cómo funciona Blossom, también hay otros tipos de eventos que hacen que Blossom sea aún más interesante.
| kind | descripción | | ----- | --------------------- | | 30563 | Blossom Drives | | 36363 | Listado de Servidores | | 31963 | Reseña de Servidores |
kind:30563 - Blossom Drives
Este tipo de evento facilita la organización de blobs en carpetas, como estamos acostumbrados con los drives (piensa en Google Drive, iCloud, Proton Drive, etc.). El evento contiene información sobre la estructura de carpetas y los metadatos del drive.
kind:36363 y kind:31963 - Listado y Reseña
Estos tipos de eventos permiten a los usuarios descubrir y reseñar servidores de medios a través de nostr. kind:36363 es un listado de servidores que contiene la URL del servidor. kind:31963 es una reseña, donde los usuarios pueden calificar servidores.
¿Cómo lo uso?
Encuentra un servidor
Primero necesitarás elegir un servidor Blossom donde subirás tus archivos. Puedes navegar por los públicos en blossomservers.com. Algunos de ellos son de pago, otros pueden requerir que tus claves nostr estén en una lista blanca.
Luego, puedes ir a la URL de su servidor y probar a subir un archivo pequeño, como una foto. Si estás satisfecho con el servidor (es rápido y aún no te ha fallado), puedes agregarlo a tu Lista de Servidores de Usuarios. Cubriremos brevemente cómo hacer esto en noStrudel y Amethyst (pero solo necesitas hacer esto una vez, una vez que tu lista actualizada esté publicada, los clientes pueden simplemente recuperarla de nostr).
noStrudel
- Encuentra Relays en la barra lateral, luego elige Servidores de Medios.
- Agrega un servidor de medios, o mejor aún, varios.
- Publica tu lista de servidores. ✅
Amethyst
- En la barra lateral, encuentra Servidores multimedia.
- Bajo Servidores Blossom, agrega tus servidores de medios.
- Firma y publica. ✅
Ahora, cuando vayas a hacer una publicación y adjuntar una foto, por ejemplo, se subirá en tu servidor blossom.
⚠️ Ten en cuenta que debes suponer que los archivos que subas serán públicos. Aunque puedes proteger un archivo con contraseña, esto no ha sido auditado.
Blossom Drive
Como mencionamos anteriormente, podemos publicar eventos para organizar nuestros blobs en carpetas. Esto puede ser excelente para compartir archivos con tu equipo, o simplemente para mantener las cosas organizadas.
Para probarlo, ve a blossom.hzrd149.com (o nuestra instancia comunitaria en blossom.bitcointxoko.com) e inicia sesión con tu método preferido.
Puedes crear una nueva unidad y agregar blobs desde allí.
Bouquet
Si usas múltiples servidores para darte redundancia, Bouquet es una buena manera de obtener una visión general de todos tus archivos. Úsalo para subir y navegar por tus medios en diferentes servidores y sincronizar blobs entre ellos.
Cherry Tree
nostr:nevent1qvzqqqqqqypzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzfmhxue69uhkummnw3e82efwvdhk6tcqyp3065hj9zellakecetfflkgudm5n6xcc9dnetfeacnq90y3yxa5z5gk2q6
Cherry Tree te permite dividir un archivo en fragmentos y luego subirlos en múltiples servidores blossom, y más tarde reensamblarlos en otro lugar.
Conclusión
Blossom aún está en desarrollo, pero ya hay muchas cosas interesantes que puedes hacer con él para hacerte a ti y a tu comunidad más soberanos. ¡Pruébalo!
Si deseas mantenerte al día sobre el desarrollo de Blossom, sigue a nostr:nprofile1qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzfmhxue69uhkummnw3e82efwvdhk6tcqyqnxs90qeyssm73jf3kt5dtnk997ujw6ggy6j3t0jjzw2yrv6sy22ysu5ka y dale un gran zap por su excelente trabajo.
Referencias
-
@ dbb19ae0:c3f22d5a
2025-01-26 08:43:57First make sure to add this relay wss://relay.momostr.pink in your Nostr setting and second follow this account
Soon after an account will be created on bluesky and will mirror your Nostr profile the address will be like this: bsky.app/profile/npub1mwce4c8qa2zn9zw9f372syrc9dsnqmyy3jkcmpqkzaze0slj94dqu6nmwy.momostr.pink.ap.brid.gy
And from there keep spreading the good word
originally posted at https://stacker.news/items/825913
-
@ b17fccdf:b7211155
2025-01-21 18:30:13~ > Available at: https://minibolt.info
~> It builds on a personal computer with x86/amd64 architecture processors.
~> It is based on the popular RaspiBolt v3 guide.
Those are some of the most relevant changes:
- Changed OS from Raspberry Pi OS Lite (64-bits) to Ubuntu Server LTS (Long term support) 64-bit PC (AMD64).
- Changed binaries and signatures of the programs to adapt them to x86/amd64 architecture.
- Deleted unnecessary tools and steps, and added others according to this case of use.
- Some useful authentication logs and monitoring commands were added in the security section.
- Added some interesting parameters in the settings of some services to activate and take advantage of new features.
- Changed I2P, Fulcrum, and ThunderHub guides, to be part of the core guide.
- Added exclusive optimization section of services for slow devices.
~ > Complete release notes of the MiniBolt v1: https://github.com/twofaktor/minibolt/releases/tag/1.0.
~ > Feel free to contribute to the source code on GitHub by opening issues, pull requests or discussions.
Created by ⚡2 FakTor⚡
-
@ b17fccdf:b7211155
2025-01-21 18:22:51😱 Did you recently find this signature verification error when you tried to update your MiniBolt repositories with ->
sudo apt update
? 💥🚨👇🔧 Don't worry, that's because Tor renewed its signing key since it expired last 07/15, just renew your keyring by following the next steps to solve this problem:
~ > CLICK HERE < ~
Enjoy it MiniBolter!💙
-
@ b17fccdf:b7211155
2025-01-21 17:58:35The router reserves the IP address of the device for a time after going out, but if the device goes out some time, the next time that the device starts, the router could assign a different IP and you could lose access to your node. To avoid this, you need to set a static IP to your MiniBolt.
~ > In addition, you can customize your DNS servers to improve your privacy, normally your ISP, gives you the router with its own DNS servers set by default, and this does that you expose all of your navigation trackings to your ISP, affecting seriously your privacy.
~ > This bonus guide includes all of the necessary steps to get this and is available ~ > HERE < ~
Enjoy it MiniBolter! 💙
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Ripple and the problem of the decentralized commit
This is about Ryan Fugger's Ripple.
The summary is: unless everybody is good and well-connected at all times a transaction can always be left in a half-committed state, which creates confusion, erodes trust and benefits no one.
If you're unconvinced consider the following protocol flow:
- A finds a route (A--B--C--D) between her and D somehow;
- A "prepares" a payment to B, tells B to do the same with C and so on (to prepare means to give B a conditional IOU that will be valid as long as the full payment completes);
- When the chain of prepared messages reaches D, D somehow "commits" the payment.
- After the commit, A now really does owe B and so on, and D really knows it has been effectively paid by A (in the form of debt from C) so it can ship goods to A.
The most obvious (but wrong) way of structuring this would be for the entire payment chain to be dependent on the reveal of some secret. For example, the "prepare" messages could contain something like "I will pay you as long as you know
p
such thatsha256(p) == h
".The payment flow then starts with D presenting A with an invoice that contains
h
, so D knowsp
, but no one else knows. A can then send the "prepare" message to B and B do the same until it reaches D.When it reaches D, D can be sure that C will pay him because he knows
p
such thatsha256(p) == h
. He then revealsp
to C, C now reveals it to B and B to A. When A gets it it has a proof that D has received his payment, therefore it is happy to settle it later with B and can prove to an external arbitrator that he has indeed paid D in case D doesn't deliver his products.Issues with the naïve flow above
What if D never reveals
p
to C?Then no one knows what happened. And then 10 years later he arrives at C's house (remember they are friends or have a trust relationship somehow) and demands his payment, and shows
p
to her in a piece of paper. Or worse: go directly to the court and shows C's message that says "I will pay you as long as you knowp
such thatsha256(p) == h
" (but with an actual number instead of "h") and the correspondingp
. Now the judge has to decide in favor of D.Now C was supposed to do the same with B, but C is not playing with this anymore, has lost all contact with B after they did their final settlement many years ago, no one was expecting this.
This clearly can't work. There must be a timeout for these payments.
What if we have a timeout?
Now what if we say the payment expires in one hour. D cannot hold the payment hostage and reveal
p
after 10 years. It must either reveal it before the timeout or conditional IOU will be void. Solves everything!Except no, now it's the time we reach the most dark void of the protocol, the flaw that sucks its life into the abyss: subjectivity and ambiguity.
The big issue is that we don't have an independent judge to assert, for example, that D has indeed "revealed"
p
to C in time. C must acknowledge that voluntarily. C could do it using messages over the internet, but these messages are not reliable. C is not reliable. Clocks are not synchronized. Also if we now require C to confirm it has receivedp
from D then the "prepare" message means nothing, as for D now just knowingp
is not enough to claim before an arbitrator that C owes her -- because, again, D also must prove it has shownp
to C before the timeout, therefore it needs a new signed acknowledgement from C, or from some other party.Let's see a few examples.
Subjectivity and perverse incentives
D could send
p
to C, and C acknowledge it, but then when C goes to B and send it B will not acknowledge it, and claim it's past the time. Now C loses money.Maybe C can not acknowledge it received anything from D before checking first with B? But B will have to check with A too! And it subverts the entire flow of the thing. And now A has a "proof of payment" (knowledge of
p
) without even having to acknowledge anything! In this case knowingp
or not becomes meaningless as everybody knowsp
without acknowleding it to anyone else.But even if A is honest and sends an "acknowledge" message to B, now B can just sit quiet and enjoy the credit it has just earned from A without ever acknowleding anything to C. It's perverted incentives in every step.
Ambiguity
But isn't this a protocol based on trust?, you ask, isn't C trusting that B will behave honestly already? Therefore if B is dishonest C just has to acknowledge his loss and break his chain of trust with B.
No, because C will not know what happened. B can say "I could have sent you an acknowledgement, but was waiting for A, and A didn't send anything" and C won't ever know if that was true. Or B could say "what? You didn't send me
p
at all", and that could be true. B could have been offline when A sent it, there could have been a broken connection or many other things, and B continues: "I was waiting for you to present me withp
, but you didn't, therefore the payment timed out, you can't come here withp
now, because now A won't accept it anymore from me". That could be true or could be false, who knows?Therefore it is impossible for trust relationships and reputations to be maintained in such a system without "good fences".[^ln-solution][^ln-issue]
[^ln-solution]: The Lightning Network has a solution for the problem of the decentralized commit. [^ln-issue]: Ironically this same ambiguity problem is being faced by the Lightning Network community when trying to create a reputation/payment system to prevent routing abuses. It seems simple when you first think about it: "let each node manage its own trust", but in fact it is somewhat impossible.
-
@ d360efec:14907b5f
2025-03-03 05:40:07การวิเคราะห์แต่ละ Timeframe (TF):
-
TF 15m (Intraday):
- แนวโน้ม: Bearish (แต่เริ่มมีสัญญาณกลับตัวเล็กน้อย). ราคาเคยอยู่ใต้ EMA ทั้งสอง แต่เริ่มขยับขึ้นมาเหนือ EMA 50.
- SMC:
- มี Bearish OB ชัดเจนที่ ~93,000 (ทดสอบแล้วไม่ผ่านในวันที่ 1 มี.ค.).
- มี Bullish OB ที่ ~86,000-87,000 (ราคาลงไปทดสอบแล้วดีดกลับ).
- SSL: ~86,845, ~83,859 (ถูกกวาดไปแล้ว).
- BSL: ~92,669 (อาจเป็นเป้าหมายถัดไป).
- Trend Strength: เมฆยังเป็นสีแดง แต่เริ่มจางลง. มีลูกศร Buy เล็กๆ.
- กลยุทธ์ Day Trade (SMC):
- ระมัดระวัง: ตลาดมีความผันผวน. แนวโน้มหลักยังเป็นขาลง, แต่ระยะสั้นเริ่มมีแรงซื้อ.
- Option 1 (Aggressive): Buy เมื่อราคาย่อลงมาใกล้ Bullish OB (~87,000) หรือ EMA 50. ตั้ง Stop Loss ใต้ OB. เป้าหมายทำกำไรที่ BSL (~92,669) หรือ Bearish OB เดิม.
- Option 2 (Conservative): รอให้ราคา Breakout เหนือ Bearish OB (~93,000) อย่างชัดเจน แล้วค่อยพิจารณา Buy ตาม.
- Short: ถ้าจะ Short, รอให้ราคาขึ้นไปใกล้ Bearish OB อีกครั้ง แล้วเกิดสัญญาณ Bearish Reversal (เช่น Bearish Engulfing) ค่อย Short.
-
TF 4H (ระยะกลาง):
- แนวโน้ม: Bearish. ราคาอยู่ใต้ EMA ทั้งสอง, EMA 50 อยู่ใต้ EMA 200.
- SMC:
- Bearish OB ใหญ่: ~95,000-100,000.
- SSL: ~83,559.5, ~81,260.4, ~78,961.4 (เป้าหมายระยะกลาง-ยาว).
- BSL: 105,543.4
- Trend Strength: เมฆสีแดงเข้ม. สัญญาณ Sell.
- กลยุทธ์: เน้น Short. รอ Pullback ไปใกล้ EMA หรือ Bearish OB แล้วหาจังหวะ Short.
-
TF Day (ระยะยาว):
- แนวโน้ม: ยังคงเป็น Bearish, แต่เริ่มเห็นสัญญาณการชะลอตัว. ราคาหลุด EMA 200 ลงมา
- SMC: มี Order Block ใหญ่ที่ $90,000 - $100,000
- Trend Strength: เมฆเริ่มเปลี่ยนจากสีแดงเข้ม เป็นสีแดงจางลง. ยังไม่มีสัญญาณ Buy ที่ชัดเจน.
- กลยุทธ์: ยังไม่ควร Long. รอสัญญาณกลับตัวที่ชัดเจนกว่านี้ (เช่น Breakout เหนือ EMA 50, เกิด Bullish Divergence).
สรุปและข้อควรระวัง:
- แนวโน้มหลักของ BTC ยังคงเป็นขาลง (Bearish) ในทุก Timeframe.
- TF 15m เริ่มมีสัญญาณการกลับตัวระยะสั้น (Bullish Reversal) แต่ยังต้องระวัง เพราะยังอยู่ในแนวโน้มหลักขาลง.
- Smart Money อาจกำลังสะสม (Accumulation) ที่ระดับราคาปัจจุบัน.
- สิ่งที่ต้องระวัง: ข่าว, ความผันผวน, การ "กวาด" Stop Loss (Liquidity Sweep).
Disclaimer: การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-
-
@ b17fccdf:b7211155
2025-01-21 17:47:28Link to the bonus guide ~ > HERE < ~
Some sections of the guide:
- Generate SSH keys
- Import SSH pubkey
- Connect to the MiniBolt node using SSH keys
- Disable password login
- Disable admin password request
Some shortcuts to the Extra sections:
Enjoy it MiniBolter! 💙
-
@ 95cb4330:96db706c
2025-03-03 05:36:23Adopting Single-Threaded Leadership, as implemented by Jeff Bezos at Amazon, involves assigning full ownership of a high-impact initiative to one individual. This strategy ensures accountability, accelerates decision-making, and fosters deep focus, leading to more effective execution.
Understanding Single-Threaded Leadership
- Definition:
A leadership approach where a dedicated leader focuses exclusively on a specific project or goal, free from competing responsibilities. This model contrasts with traditional structures where leaders juggle multiple projects simultaneously.
medium.com
Examples in Practice
-
Amazon's Single-Threaded Leaders:
Jeff Bezos structured Amazon's key initiatives around single-threaded leaders, ensuring they could drive results without distractions. This approach has been credited with enhancing innovation and operational efficiency within the company. -
Elon Musk's Focused Leadership:
Elon Musk exemplifies intense focus by dedicating his attention to one company at a time, such as Tesla, SpaceX, or Neuralink, thereby propelling each forward without splitting his attention.
Implementing Single-Threaded Leadership
-
Identify High-Impact Projects:
Determine which initiatives are critical to your organization's success and would benefit from dedicated leadership. -
Assign Sole Ownership:
Appoint a leader whose primary responsibility is the success of that specific project, minimizing their involvement in unrelated tasks. -
Empower Decision-Making:
Grant the single-threaded leader the authority to make decisions and allocate resources necessary for the project's success. -
Minimize Dependencies:
Structure the project to reduce reliance on other teams or departments, allowing the leader to maintain momentum without unnecessary delays.
Action Step
Evaluate your current projects to identify where responsibilities are fragmented. Select a high-priority initiative and assign one person full responsibility, ensuring they have the autonomy and resources to execute effectively without unnecessary dependencies.
By implementing single-threaded leadership, organizations can enhance focus, streamline decision-making, and drive successful outcomes in their most critical projects.
For a deeper understanding of this concept, consider watching this discussion:
Single-Threaded Leadership: How Amazon Solved Organizational Scaling Challenges
- Definition:
-
@ 95cb4330:96db706c
2025-03-03 05:23:48Most people make decisions based on averages—what usually happens. But in high-impact fields like investing, startups, and technology, outliers drive the biggest results.
Instead of asking, "What is the average outcome?" ask: - ✔ What is the full range of possible outcomes? - ✔ How can I maximize the upside while protecting against the worst-case scenario?
Example in Action: Bezos, Thiel & Altman
Jeff Bezos & AWS
When launching Amazon Web Services (AWS), Bezos saw a small chance of massive success—cloud computing dominance—against a limited downside (R&D costs). He optimized for the best-case scenario, which became a trillion-dollar business.
Peter Thiel & Venture Capital
Thiel’s Power Law investing philosophy is based on distributions: Instead of funding many "average" startups, he focuses on a few outliers that can return 100x or more (e.g., Facebook, Palantir).
Sam Altman & OpenAI
Altman understands that AI breakthroughs follow an exponential curve—a small chance of creating AGI (Artificial General Intelligence) is worth more than incremental AI improvements.
How to Apply This Thinking
Map the Full Range of Outcomes
Instead of assuming an "average" result, consider: - Best-case scenario: How big can this get? - Worst-case scenario: What’s my downside risk? - Unlikely but extreme possibilities: What are the hidden risks or rare events?
Optimize for Asymmetric Upside
Focus on decisions where the upside is massive, even if the probability is low. - Example: Launching a new product in an emerging market versus incrementally improving an existing one.
Protect Against Catastrophic Downside
Even if an outlier event has a small chance, if it can ruin you, avoid it. - Example: Diversifying investments instead of going all-in on one bet.
Resources to Learn More
- Understanding Distributions vs. Averages – Farnam Street
- Jeff Bezos on Thinking Long-Term – Harvard Business Review
- Peter Thiel’s Power Law Thinking – NFX
Action Step: Apply This Today
- Pick one major decision you're working on.
- Instead of assuming an "average" result, analyze the full distribution of outcomes.
- Ask: Am I optimizing for a rare, high-upside event while managing the worst-case risks?
By thinking in distributions, you make better strategic bets, spot hidden risks, and maximize your long-term impact. 🚀
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28A chatura Kelsen
Já presenciei várias vezes este mesmo fenômeno: há um grupo de amigos ou proto-amigos conversando alegremente sobre o conservadorismo, o tradicionalismo, o anti-comunismo, o liberalismo econômico, o livre-mercado, a filosofia olavista. É um momento incrível porque para todos ali é sempre tão difícil encontrar alguém com quem conversar sobre esses assuntos.
Eis que um deles fez faculdade de direito. Tendo feito faculdade de direito por acreditar que essa lhe traria algum conhecimento (já que todos os filósofos de antigamente faziam faculdade de direito!) esse sujeito que fez faculdade de direito, ao contrário dos demais, não toma conhecimento de que a sua faculdade é uma nulidade, uma vergonha, uma época da sua vida jogada fora -- e crê que são valiosos os conteúdos que lhe foram transmitidos pelos professores que estão ali para ajudar os alunos a se preparem para o exame da OAB.
Começa a falar de Kelsen. A teoria pura do direito, hermenêutica, filosofia do direito. A conversa desanda. Ninguém sabe o que dizer. A filosofia pura do direito não está errada porque é apenas uma lógica pura, e como tal não pode ser refutada; e por não ter qualquer relação com o mundo não há como puxar um outro assunto a partir dela e sair daquele território. Os jovens filósofos perdem ali as próximas duas horas falando de Kelsen, Kelsen. Uma presença que os ofende, que parece errada, que tem tudo para estar errada, mas está certa. Certa e inútil, ela lhes devora as idéias, que são digeridas pela teoria pura do direito.
É imperativo estabelecer esta regra: só é permitido falar de Kelsen se suas idéias não forem abordadas ou levadas em conta. Apenas elogios ou ofensas serão tolerados: Kelsen era um bom homem; Kelsen era um bobão. Pronto.
Eis aqui um exemplo gravado do fenômeno descrito acima: https://www.youtube.com/watch?v=CKb8Ij5ThvA: o Flavio Morgenstern todo simpático, elogiando o outro, falando coisas interessantes sobre o mundo; e o outro, que devia ser amigo dele antes de entrar para a faculdade de direito, começa a falar de Kelsen, com bastante confiança de que aquilo é relevante, e dá-lhe Kelsen, filosofia do direito, toda essa chatice tremenda.
-
@ b17fccdf:b7211155
2025-01-21 17:29:54Some sections inside of the guide:
- Set up Dynamic DNS
- Wireguard VPN server & client side configurations
- Install & configure the WireGuard VPN Client on a mobile phone
- Configure additional servers & clients
- Use your router’s DDNS preconfigured provider
- Port forwarding on NAT/PAT router
Link to the bonus guide HERE
Enjoy it MiniBolter! 💙
-
@ b84b0d81:f3a3865f
2025-03-03 05:05:30**Introduction ** Starting a business is an exciting journey, but ensuring its long-term success requires careful planning, strategic decision-making, and continuous adaptation. Many entrepreneurs fail not because they lack passion but because they don’t build a business that is sustainable. To establish a thriving business, you need to identify the right opportunity, create a solid foundation, and adapt to market trends effectively.
This guide will take you through the key steps to identifying and building the best business for long-term success. From market research to customer engagement and financial management, we’ll cover essential strategies to ensure your business remains competitive and profitable over time. Step 1: Identifying the Right Business Idea 1.1 Assess Your Interests and Strengths One of the best ways to build a sustainable business is to align it with your passion and expertise. When you start a business in an area where you have knowledge and interest, you increase your chances of success. 1.2 Conduct Market Research Researching your target market is crucial to understanding demand, competition, and potential customer needs. Consider the following when conducting market research: • Who is your ideal customer? • What problems are they facing that your business can solve? • How big is the market for your product or service? • Who are your competitors, and what are they doing well (or poorly)? A report by the Small Business Administration (SBA) states that only 50% of businesses survive beyond five years, emphasizing the importance of thorough market research and planning. (Source) 1.3 Evaluate Market Trends Trends can dictate the future of any industry. Businesses that succeed in the long term are those that adapt to changing consumer behaviors, technological advancements, and economic shifts. Utilize tools like Google Trends, industry reports, and customer feedback to stay ahead of the curve. Step 2: Building a Strong Business Foundation 2.1 Create a Clear Business Plan A well-structured business plan acts as a roadmap for your company’s growth. It should include: • Executive Summary • Market Analysis • Business Structure • Product/Service Offering • Marketing and Sales Strategies • Financial Projections • Growth Plan 2.2 Secure Funding and Manage Finances Financial stability is a pillar of business success. Options for securing capital include: • Bootstrapping (using personal savings) • Small business loans • Angel investors or venture capitalists • Crowdfunding According to the U.S. Bureau of Labor Statistics, approximately 20% of new businesses fail within their first year due to cash flow issues. (Source) To avoid this, monitor your finances closely, keep overhead costs low, and reinvest profits wisely. Step 3: Establishing a Competitive Edge 3.1 Develop a Unique Value Proposition (UVP) Your UVP should clearly articulate why customers should choose your business over competitors. It should be: • Clear and concise • Focused on solving a specific problem • Easily communicated to your target audience 3.2 Build a Strong Brand Identity A strong brand helps customers recognize and trust your business. Essential elements of branding include: • Logo and visual identity • Brand voice and messaging • Customer experience and service 3.3 Leverage Digital Marketing In today’s digital era, having an online presence is non-negotiable. Strategies to implement: • SEO (Search Engine Optimization): Helps increase organic traffic to your website. • Social Media Marketing: Engage with customers on platforms like Facebook, Instagram, and LinkedIn. • Email Marketing: Build relationships with potential and existing customers through personalized emails. • Content Marketing: Provide valuable information through blogs, videos, and guides to establish authority in your industry. Step 4: Customer-Centric Approach 4.1 Understand and Engage Your Customers Listening to your customers can provide insights into improving your business. Strategies to enhance customer engagement include: • Conducting surveys and feedback sessions • Implementing a loyalty program • Providing exceptional customer service 4.2 Build a Community Around Your Brand Creating a loyal customer base goes beyond selling a product or service. Engage with your audience through social media, email newsletters, and exclusive events to foster a sense of community. Step 5: Scaling and Adapting for Long-Term Success 5.1 Implement Scalable Processes As your business grows, efficient systems and automation can help manage increased demand. Consider: • Using customer relationship management (CRM) software • Automating inventory and order processing • Streamlining workflow with project management tools 5.2 Stay Agile and Innovative The most successful businesses evolve with market trends. Regularly evaluate industry developments, adopt new technologies, and be open to pivoting your strategy when necessary. 5.3 Expand Wisely When expanding, assess factors such as: • Market demand for your product or service • Financial readiness • Operational capacity Options for expansion include opening new locations, diversifying product lines, or entering international markets.
**Conclusion ** Building a business that lasts requires a strategic approach, financial discipline, and an unwavering commitment to customer satisfaction. By conducting thorough research, creating a strong foundation, leveraging digital tools, and continuously adapting to industry trends, you can set your business up for long-term success. With careful planning and execution, your business can not only survive but thrive for years to come.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28A crappy course on torrents
In 8 points[^twitterlink]:
- You start seeding a file -- that means you split the file in a certain way, hash the pieces and wait.
- If anyone connects to you (either by TCP or UDP -- and now there's the webRTC transport) and ask for a piece you'll send it.
- Before downloading anything leechers must understand how many pieces exist and what are they -- and other things. For that exists the .torrent file, it contains the final hash of the file, metadata about all files, the list of pieces and hash of each.
- To know where you are so people can connect to you[^nathole], there exists an HTTP (or UDP) server called "tracker". A list of trackers is also contained in the .torrent file.
- When you add a torrent to your client, it gets a list of peers from the trackers. Then you try to connect to them (and you keep getting peers from the trackers while simultaneously sending data to the tracker like "I'm downloading, I have x bytes already" or "I'm seeding").
- Magnet links contain a tracker URL and a hash of the metadata contained in the .torrent file -- with that you can safely download the same data that should be inside a .torrent file -- but now you ask it from a peer before requesting any actual file piece.
- DHTs are an afterthought and I don't know how important they are for the torrent ecosystem (trackers work just fine). They intend to replace the centralized trackers with message passing between DHT peers (DHT peers are different and independent from file-download peers).
- All these things (.torrent files, tracker messages, messages passed between peers) are done in a peculiar encoding format called "bencode" that is just a slightly less verbose, less readable JSON.
[^twitterlink]: Posted first as this Twitter thread. [^nathole]: Also your torrent client must be accessible from the external internet, NAT hole-punching is almost a myth.
-
@ e9fcc47b:ae2e68a8
2025-03-03 02:26:47This event has been deleted; your client is ignoring the delete request.
-
@ b17fccdf:b7211155
2025-01-21 17:19:12Do you want to use a different disk to store data (blockchain and other databases) independently of the disk of the system?
A step-by-step guide using a secondary disk to store the data (blockchain and other databases) independently of the disk of the system and using the Ubuntu Server guided installation.
What's changed
- Rebuilt the Ubuntu Server installation guide based on this bonus guide added.
- Added GIFs to improve the illustration of the steps to follow.
- Case 1: during the Ubuntu server guided installation.
- Case 2: build it after system installation (by command line).
~ > Link to the bonus guide HERE
Enjoy it MiniBolter! 💙
-
@ d360efec:14907b5f
2025-03-03 01:34:50$OKX:BTCUSDT.P
Timeframe Analysis:
-
TF 15m (Intraday):
- Trend: Bearish (but showing signs of a minor reversal). Price was below both EMAs but is starting to move above the EMA 50.
- SMC:
- Clear Bearish OB at ~93,000 (tested and failed on March 1st).
- Bullish OB at ~86,000-87,000 (price tested and bounced).
- SSL: ~86,845, ~83,859 (already swept).
- BSL: ~92,669 (potential next target).
- Trend Strength: Cloud is still red but fading. A small Buy arrow appears.
- Day Trade Strategy (SMC):
- Caution: The market is volatile. The main trend is still down, but there's short-term buying pressure.
- Option 1 (Aggressive): Buy when the price dips near the Bullish OB (~87,000) or EMA 50. Set a stop-loss below the OB. Target the BSL (~92,669) or the previous Bearish OB.
- Option 2 (Conservative): Wait for a clear breakout above the Bearish OB (~93,000) before considering a buy.
- Short: If shorting, wait for the price to approach the Bearish OB again and look for a bearish reversal signal (e.g., Bearish Engulfing) before shorting.
-
TF 4H (Medium-Term):
- Trend: Bearish. Price is below both EMAs, EMA 50 is below EMA 200.
- SMC:
- Larger Bearish OB: ~95,000-100,000.
- SSL: ~83,559.5, ~81,260.4, ~78,961.4 (medium- to long-term targets).
- BSL: 105,543.4
- Trend Strength: Dark red cloud. Sell signal.
- Strategy: Focus on shorts. Wait for pullbacks to the EMAs or Bearish OB and look for shorting opportunities.
-
TF Day (Long-Term):
- Trend: Still Bearish, but starting to show signs of slowing down. The price has broken below the EMA 200.
- SMC: Large order Block $90,000-$100,000
- Trend Strength: The cloud is changing from dark red to a lighter red. No clear Buy signal yet.
- Strategy: Avoid going long. Wait for clearer reversal signals (e.g., breakout above EMA 50, Bullish Divergence).
Summary and Cautions:
- The main trend of BTC is still Bearish on all timeframes.
- The 15m TF is showing signs of a short-term Bullish Reversal, but be cautious as it's against the main downtrend.
- Smart Money may be accumulating at current price levels.
- Cautions: News, volatility, liquidity sweeps (stop-loss hunting).
Disclaimer: This analysis is for informational purposes only and does not constitute financial advice. Investors should conduct their own research and make decisions carefully.
-
-
@ b17fccdf:b7211155
2025-01-21 17:07:47 -
@ b17fccdf:b7211155
2025-01-21 16:56:24It turns out that Ubuntu Linux installations of Ubuntu 23.04, 22.04.3 LTS, and installs done since April 2023 that accepted the Snap version update haven't been following Ubuntu's own recommended security best practices for their security pocket configuration for packages.
A new Subiquity release was issued to fix this problem while those on affected Ubuntu systems already installed are recommended to manually edit their
/etc/apt/sources.list
file.If you didn't install MiniBolt recently, you are affected by this bug, and we need to fix that manually if not we want to install all since cero. Anyway, if you installed Minibolt recently, we recommend you review that.
Follow these easy steps to review and fix this:
- Edit the
sources-list
file:
sudo nano /etc/apt/sources.list
- Search now for every line that includes '-security' (without quotes) (normally at the end of the file) and change the URL to --> http://security.ubuntu.com/ubuntu
~ > For example, from http://es.archive.ubuntu.com/ubuntu (or the extension corresponding to your country) to --> http://security.ubuntu.com/ubuntu
~> Real case, Spain location, before fix:
``` deb http://es.archive.ubuntu.com/ubuntu jammy-security main restricted
deb-src http://es.archive.ubuntu.com/ubuntu jammy-security main restricted
deb http://es.archive.ubuntu.com/ubuntu jammy-security universe
deb-src http://es.archive.ubuntu.com/ubuntu jammy-security universe
deb http://es.archive.ubuntu.com/ubuntu jammy-security multiverse
deb-src http://es.archive.ubuntu.com/ubuntu jammy-security multiverse
```
After fix:
``` deb http://security.ubuntu.com/ubuntu jammy-security main restricted
deb-src http://es.archive.ubuntu.com/ubuntu jammy-security main restricted
deb http://security.ubuntu.com/ubuntu jammy-security universe
deb-src http://es.archive.ubuntu.com/ubuntu jammy-security universe
deb http://security.ubuntu.com/ubuntu jammy-security multiverse
deb-src http://es.archive.ubuntu.com/ubuntu jammy-security multiverse
```
Save and exit
Note: If you have already these lines changed, you are not affected by this bug, and is not necessary to do anything. Simply exit the editor by doing Ctrl-X
- Finally, type the next command to refresh the repository pointers:
sudo apt update
- And optionally take the opportunity to update the system by doing:
sudo apt full-upgrade
More context:
- https://wiki.ubuntu.com/SecurityTeam/FAQ#What_repositories_and_pockets_should_I_use_to_make_sure_my_systems_are_up_to_date.3F
- https://bugs.launchpad.net/subiquity/+bug/2033977
- https://www.phoronix.com/news/Ubuntu-Security-Pocket-Issue
- Edit the
-
@ 878dff7c:037d18bc
2025-03-03 00:23:00Slow Cooker Pastrami (No Smoker)
This is one of our family staples! It is pretty low effort and the first few slices straight after it comes out of the oven are AMAZING.
Full credit to Nagi over at RecipeTin Eats! Please go and check out her other amazing recipes and give her the recognition she deserves.
Adapted from Nagi at RecipeTin Eats
Ingredients
Meat
- 4 lbs (2 kg) corned beef with a thick fat cap (Try find one that has a fairly consistent shape and direction of muscle fibers for maximum tenderness)
Spice Mix
- 4 tbsp coarsely ground black pepper
- 2 tbsp coriander powder
- 1½ tsp mustard powder
- 1 tbsp brown sugar
- 1 tbsp smoked paprika
- 2 tsp garlic powder (For a low FODMAP alternative substitute garlic and onion with hing powder, only about 1/4 tsp... If in doubt, just skip garlic and onion. It still tastes amazing!)
- 2 tsp onion powder
- Optional: 2 tbsp liquid smoke
Instructions
1. Prepare the Spice Mix
- Combine all spice mix ingredients in a bowl.
2. Season the Beef
- Pat the corned beef dry.
- Spread the spice mix on a tray and roll the beef in it, ensuring all sides are well-coated.
- If using liquid smoke, sprinkle it over the beef.
3. Wrap the Beef
- Place the beef fat-side down on a large sheet of foil and wrap it tightly.
- Wrap it again with another sheet of foil and flip it so the fat side is up.
- I use 3 sheets of foil and 'over lay' the wrap so it's a bit harder for the delicious juices to escape.
- Dont stress if you forget where the fat cap is, it'll be fine...
4. Slow Cook
- Place a rack in the slow cooker to elevate the beef (scrunched-up foil balls can be used if a rack isn't available. I use cookie cutter patterns ;) ).
- Set the wrapped beef on the rack.
- Cook on low for 10 hours.
5. Cool and Refrigerate
- Remove the beef from the slow cooker and let it cool.
- Refrigerate for at least 6 hours to firm up, making it easier to slice thinly. (24-36hrs is fine in the fridge if you don't have time etc)
6. Bake to Set the Crust
- Preheat the oven to 350°F (180°C).
- Unwrap the beef and place it on a rack over a baking tray.
- Bake for 30 minutes to set the spice crust.
7. Slice and Serve
- Remove from the oven and let it cool slightly.
- Slice thinly against the grain.
- Serve on toasted rye bread with mustard and pickles, or use in Reuben sandwiches.
Enjoy homemade pastrami without a smoker!
-
@ b17fccdf:b7211155
2025-01-21 16:49:27What's changed
- New method for Bitcoin Core signature check, click ~ >HERE< ~
- GitHub repo of Bitcoin Core release attestations (Guix), click ~ >HERE< ~
History:
~ > PR that caused the broken and obsolescence of the old signature verification process, click ~ >HERE< ~
~ > New GitHub folder of Bitcoin Core repo that stores the signatures, click ~ >HERE< ~
Thanks to nostr:npub1gzuushllat7pet0ccv9yuhygvc8ldeyhrgxuwg744dn5khnpk3gs3ea5ds for building the command that made magic possible 🧙♂️🧡
Enjoy it MiniBolter! 💙
-
@ c8383d81:f9139549
2025-03-02 23:57:18Project is still in early stages but now it is split into 2 different domain entities. Everything is opened sourced under one github https://github.com/Nsite-Info
So what’s new ?
Project #1 https://Nsite.info
A basic website with main info regarding what an Nsite is how it works and a list of tools and repo’s you can use to start building and debugging. 99% Finished, needs some extra translations and the Nsite Debugger can use a small upgrade.
Project #2 https://Nsite.cloud
This project isn’t finished, it currently is at a 40% finished stage. This contains the Nsite Gateway for all sites (still a work in progress) and the final stage the Nsite editor & template deployment.
If you are interested in Nsite’s join: https://chachi.chat/groups.hzrd149.com/e23891
Big thanks to nostr:npub1elta7cneng3w8p9y4dw633qzdjr4kyvaparuyuttyrx6e8xp7xnq32cume nostr:npub1ye5ptcxfyyxl5vjvdjar2ua3f0hynkjzpx552mu5snj3qmx5pzjscpknpr nostr:npub1klr0dy2ul2dx9llk58czvpx73rprcmrvd5dc7ck8esg8f8es06qs427gxc for all the tooling & code.
!(image)[https://i.nostr.build/AkUvk7R2h9cVEMLB.png]
-
@ b17fccdf:b7211155
2025-01-21 16:40:01Important notice to MiniBolt node runners:
~ > It turns out that the I2P devs have opened an issue on the Bitcoin Core GitHub repo commenting that because they gave the option to enable the
notransit=true
parameter in the official documentation:[...] If you prefer not to relay any public I2P traffic and only allow I2P traffic from programs connecting through the SAM proxy, e.g. Bitcoin Core, you can set the no transit option to true [...] are having a heavy load on the I2P network since last December 19. Also comment that it is advisable to share as much bandwidth and transit tunnels as we can, to increase anonymity with coverage traffic, by contributing more to the I2p network than we consume.
So they ask that we deactivate that option that you use activated. With all this, he already updated the "Privacy" section by removing that setting.
The steps to delete this configuration once we have already configured it, are the following:
- With the "admin" user, stop i2pd:
sudo systemctl stop i2pd
- Comment line 93 with "#" at the beginning of it (notransit = true), save and exit
sudo nano /var/lib/i2pd/i2pd.conf --line numbers
- Start i2pd again:
sudo systemctl start i2pd
- And that's it, you could take a look at Bitcoin Core to see that it has detected i2pd running again after the reboot with:
tail --lines 500 -f /home/bitcoin/.bitcoin/debug.log
~ > If you don't see that I2P is up in Bitcoin Core after the restart,
sudo systemctl restart bitcoind
and look again at the logs of the same.
More info in the rollback commit, see ~> HERE < ~
-
@ 878dff7c:037d18bc
2025-03-02 22:48:04This dish is a classic Argentine barbecue (asado) preparation, where lamb leg is slowly grilled over an open fire or on a parrilla (grill) and served with chimichurri sauce.
Ingredients
For the Lamb:
- 1 whole leg of lamb (about 2.3–3.2 kg/5–7 lbs)
- 3 tbsp coarse salt
- 2 tbsp black pepper
- 3 tbsp olive oil
- 4 cloves garlic, minced
- 1 tbsp smoked paprika
- 1 tbsp dried oregano
- 1 tbsp ground cumin
- Juice of 1 lemon
- ½ cup red wine (optional)
For the Chimichurri Sauce:
- 1 cup fresh parsley, finely chopped
- ½ cup fresh cilantro (optional)
- 4 cloves garlic, minced
- 1 tsp red pepper flakes
- 1 tbsp dried oregano
- ½ cup olive oil
- ¼ cup red wine vinegar
- Salt and pepper to taste
Instructions
1. Prepare the Lamb:
- Pat the lamb leg dry and rub it with olive oil, garlic, lemon juice, paprika, oregano, cumin, salt, and black pepper.
- Let it marinate at room temperature for 1 hour (or overnight in the fridge for more flavor. I recommend 12-24hrs).
2. Set Up the Fire:
- Traditionally, cordero asado is cooked over a wood fire or charcoal at a low temperature (225–275°F / 110–135°C) for slow cooking.
- If using a grill, prepare indirect heat by placing hot coals on one side and keeping the lamb on the cooler side.
3. Grill the Lamb:
- Place the lamb leg on the grill bone-side down.
- Cook low and slow for 3 to 4 hours, turning occasionally and basting with wine or water to keep it moist.
- If using a thermometer, the internal temperature should be:
- Rare: 125°F (52°C)
- Medium-Rare: 130–135°F (55–57°C) (I recommend medium rare for my lamb)
- Medium: 140–145°F (60–63°C)
- Well Done: 155°F+ (68°C+)
4. Make the Chimichurri Sauce:
- In a bowl, mix chopped parsley, cilantro, garlic, red pepper flakes, oregano, olive oil, and red wine vinegar.
- Season with salt and pepper.
- Let it sit for 30 minutes for the flavors to blend.
5. Rest & Serve:
- Once cooked, let the lamb rest for 15–20 minutes before slicing.
- Serve with chimichurri sauce and a side of grilled vegetables or crusty bread.
Enjoy your Argentinian Cordero Asado! 🇦🇷🔥
-
@ 8d34bd24:414be32b
2025-03-02 22:12:14Last night I was reading this passage in Ezekiel, who was called to be a watchman to Israel.
“Son of man, I have appointed you a watchman to the house of Israel; whenever you hear a word from My mouth, warn them from Me. When I say to the wicked, ‘You will surely die,’ and you do not warn him or speak out to warn the wicked from his wicked way that he may live, that wicked man shall die in his iniquity, but his blood I will require at your hand. Yet if you have warned the wicked and he does not turn from his wickedness or from his wicked way, he shall die in his iniquity; but you have delivered yourself. Again, when a righteous man turns away from his righteousness and commits iniquity, and I place an obstacle before him, he will die; since you have not warned him, he shall die in his sin, and his righteous deeds which he has done shall not be remembered; but his blood I will require at your hand. However, if you have warned the righteous man that the righteous should not sin and he does not sin, he shall surely live because he took warning; and you have delivered yourself.” (Ezekiel 3:17-21) {emphasis mine}
Although I do not believe we can directly apply this command to our lives because it was given directly to Ezekiel and because our salvation comes from Jesus and not works, I do think we can learn from this passage. Just as Ezekiel was called to share God’s blessings, His curses, and His fixed plan, in the same way we are to share the Gospel (the good and the bad) and God’s eternal plan as laid out in the Bible. Unlike Ezekiel, we will receive blessings for being God’s witness and watchman, but will not be punished for failure due to being covered in the blood of Jesus and His righteousness.
We are called to share the Gospel and make disciples:
Go therefore and make disciples of all the nations, baptizing them in the name of the Father and the Son and the Holy Spirit, teaching them to observe all that I commanded you; and lo, I am with you always, even to the end of the age.” (Matthew 28:19-20) {emphasis mine}
We should never stop until the end. We are not supposed to hide the fact we are Christians or act like everyone else in the culture, but to be a light for Jesus.
“You are the light of the world. A city set on a hill cannot be hidden; nor does anyone light a lamp and put it under a basket, but on the lampstand, and it gives light to all who are in the house. Let your light shine before men in such a way that they may see your good works, and glorify your Father who is in heaven. (Matthew 5:14-16) {emphasis mine}
Our love for Jesus should shine so brightly that everyone knows we belong to Christ.
Now as they observed the confidence of Peter and John and understood that they were uneducated and untrained men, they were amazed, and began to recognize them as having been with Jesus. (Acts 4:13)
We should study the Bible so we are ready to share God’s word with all who will listen. Being a light for Jesus isn’t always easy. It can sometimes even lead to persecution and hardship, but we are called to give an account.
But even if you should suffer for the sake of righteousness, you are blessed. And do not fear their intimidation, and do not be troubled, but sanctify Christ as Lord in your hearts, always being ready to make a defense to everyone who asks you to give an account for the hope that is in you, yet with gentleness and reverence; and keep a good conscience so that in the thing in which you are slandered, those who revile your good behavior in Christ will be put to shame. (1 Peter 3:14-16) {emphasis mine}
Being ready requires diligent prayer and Bible study. We need to know God and His word well to be most effective. Of course we need to be more than just impersonal scholars. We need to have a relationship with Jesus and our Father God and share that relationship with others. We need to share Jesus with even more excitement than we would share our spouse or our kids. We need to be more excited to introduce people to Jesus than we would be to introduce people to a celebrity or other important person. Jesus should be a focus and our joy and such a part of our life that talking about Him becomes second nature. (For most people this takes a long time to reach this point, so don’t lose hope if you aren’t there yet.)
There are lies that we tell and there are also lies by omission. When we leave out some truth, we can imply a lie. So often Christians are so worried about seeming loving that we don’t love people enough to speak the whole truth to them. Yes, God is loving, but He is also holy and gives righteous judgment. Yes Jesus died on our cross to take away our sins, but some will reject Him and spend eternity in eternal torment in Hell. If we only tell the “good” parts, but leave out the “bad” parts, we are speaking a lie.
Everyone deceives his neighbor And does not speak the truth, They have taught their tongue to speak lies; They weary themselves committing iniquity. (Jeremiah 9:5)
In court we are asked to speak the truth, the whole truth, and nothing but the truth. Are you speaking the whole truth when you speak of God? Do you sometimes hold back? I recently was communicating with someone online about the Bible and I caught myself watering down a truth. Not speaking the whole, complete truth trapped me in a corner and my witness was harmed. I like to think of myself as fearlessly sharing God and His truth with people, but I seriously messed up on this one.
Therefore, laying aside falsehood, speak truth each one of you with his neighbor, for we are members of one another. (Ephesians 4:25) {emphasis mine}
Sometimes we hold back because the truth (things like God’s judgment, only one way to God, election, or God’s sovereignty) seems too hard or unpleasant. Sometimes we hold back because we are ashamed. Don’t be ashamed, for Jesus said:
For whoever is ashamed of Me and My words, the Son of Man will be ashamed of him when He comes in His glory, and the glory of the Father and of the holy angels. (Luke 9:26) {emphasis mine}
The closer our relationship is to God and the better we know our Bible, the more confident we can be sharing the Good News to those around us, but no matter how much we prepare within ourselves, we must always lean on Jesus and do things in His power, not our own.
For God has not given us a spirit of timidity, but of power and love and discipline. Therefore do not be ashamed of the testimony of our Lord or of me His prisoner, but join with me in suffering for the gospel according to the power of God, who has saved us and called us with a holy calling, not according to our works, but according to His own purpose and grace which was granted us in Christ Jesus from all eternity (2 Timothy 1:7-9) {emphasis mine}
May God mold us and guide us to be a good witness and a good watchman, so we can shine the light of Jesus onto all the world and become the faithful servants we were designed to be for His glory.
Trust Jesus
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Buying versus donating
Currently (and probably it has always been the case) in the Bitcoin community there is some push towards donations as some sort of business model, or in general just a general love for the idea of donations, and I think that is very misguided.
Two examples of the push for the primacy of donations
For example, there is a general wantness of people to have some sort of "static QR code" or "static Lightning invoice" that people can put on their Twitter profiles to receive donations (sometimes they say "payments" instead of "donations" but to me there is no such a thing as a payment without a good or service being given in exchange, so I'm saying "donations") and that is a hard problem to solve considering the fact that most Lightning wallets are running on phones.
Another example is the "Podcasting 2.0" initiative that tries to integrate podcast players with Lightning wallets so they can send donations to podcast hosts that are running Lightning nodes. Their proponents call it "value for value" (or "value4value", "v4v") and if you ask they will say value4value is a "model" in which the listener gives out in satoshis to the podcast host the same amount of "value" he is getting from listening to that content.
The value4value concept makes it almost explicit the problems I see with this big emphasis on donations the Bitcoin community is making in general. In essence, the idea that the listener is capable of measuring the value it gets from the podcast then converting it into a monetary amount and then donating that is completely wrong and even nonsensical.
Why value4value is not sound
Basic (Austrian) economics teaches us that all value is ordinal, not cardinal -- i.e., it can't be measured or assigned a number to. One can only know that at some instant they prefer x over y, they cannot say x has a value of 10 and y has a value of 9. Because of that, it's a nonsense quest to try determine how much value one is getting from a podcast.
Basic (Austrian) economics also teaches us that exchanges happen when there are differences in the subjective valuations of goods, i.e., Alice can give x to Bob in exchange for y if Alice prefers y over x and Bob prefers x over y at that point. Because of that (and disregarding the previous paragraph), it's futile to expect that the podcast listener will donate exactly the amount he is getting from the podcast in "value".
Because of the two points above, it should also be clear that it is impossible to convert "value" in podcast content form into "value" in satoshis form, but I won't try to explain why that is because this is not an economics textbook.
What actually happens is that whether it's in the value4value context or not, donations are always a somewhat random and subjective amount, if they happen. If I like some content that someone is publishing for free, my decision on if and how much I will donate is never dictated by some nonsense calculation, but by calculation that is governed almost entirely by feeling and animal spirits (but one that also considers how much money I can spare, how much I like that person and how much I perceive they need).
When I go to a normal shop to buy a bottle of milk I look at the bottle of milk and I read its price, and there is one simple decision I have to make: is this bottle of milk worth more than the amount of money that's specified in the price tag? It's a single decision with only two answers: yes or no.
While when I see a free form on some free "creator" page asking me to type how much I will donate I have to decide if I will donate, when I will donate, how much I will donate, if I want this donation to be done every month or how will that work going forward? Will I keep consuming the content produced by this person? Will they keep producing? Maybe I'll just listen for free now and do this later as I'm busy, but then will I forget? Maybe I have just donated a lot to someone else and do not have much more money to spare, but now I feel guilty that the other person got all my donation money and this one didn't get anything but I can't go back and ask the other to return the money I just donated -- and so on and so forth.
Conclusions
Although the paragraphs above are confusing and do not follow a very logical presentation pattern, I hope you got from them why I think donations are much more complicated than purchases, and that repeating the "value for value" mantra doesn't help at all.
Considering that, what I wanted to say is that bitcoiners should give more attention to the other model, in which people produce goods and services and sell them. And that model can be applied successfully to "content creators", podcasters etc in many ways that are probably (I don't have any data backing my claims) better than the donation model.
Other possible monetization possibilities
For example, I've noticed that many blogs and podcasts with interesting content start to release exclusive episodes as they get big enough. These exclusive episodes are available only for "supporters". This is effectively selling access to the episodes. There is also the "crowdwall" model in which multiple people pay so that some content gets released for free.
We can count even the model in which a donation is not just a blank donation, but gives the donor the right to write something on the screen or something like that -- these are actually not just donations, but purchases of these rights.
Professional videogame streamers have come up with some other interesting ideas. For example, they crowdfund the creation of special content ("if enough people pay I will dress like a rabbit") or they sell the right to participate in the stream somehow (for example, by playing a game with the streamer in some special day).
In these models, the static QR code with which so many people dream doesn't make much sense (if you're selling a specific episode or if a payment is specific to one identifiable person, you need different QR codes or more metadata to be attached to each payment by the payer).
Addendum
I think people like the donation model very much because they only see the big and super famous people that receive donations. A very small set of people have so many followers that they can live with just donations, even though donations are very inefficient and they could earn more and even deliver better content if they were using some other model.
I imagine that a creator with a high number of followers will get a lot of people that do not donate anything, a lot that will donate a little -- probably less than they would if they were paying -- and eventually a little number of people that will donate way more than they would if they were buying. This last group is probably what makes it worthwhile to work on this donations model for these creators.
The takeaway is that the donations model is not a panacea and is not very good either.
Related:
-
@ b17fccdf:b7211155
2025-01-21 16:15:51What's changed
A bonus guide to get a quick overview of the system status with the most relevant data about the services on the main guide.
➕Additional extra sections (optional) to:
- Show on login
- Get the channel.db size of an old LND bbolt database backend
- Use MobaXterm compatibility version
🔧 GitHub PR related: https://github.com/minibolt-guide/minibolt/pull/97
Σ Dedicated GitHub repository: https://github.com/minibolt-guide/system_overview
🫂Acknowledgments
This is a fork of the minibolt_info repository, the main developer of this project is rmnscb, a member of the MiniBolt community, all the merits go to him. Thank you for your contribution 🧡🫂
-> CLICK HERE <- to go to the bonus guide
Enjoy it MiniBolter! 💙
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28The unit test bubble
Look at the following piece of Go code:
func NewQuery(query []rune) *Query { q := &Query{ query: &[]rune{}, complete: &[]rune{}, } _ = q.Set(query) return q } func NewQueryWithString(query string) *Query { return NewQuery([]rune(query)) }
It is taken from a GitHub project with over 2000 stars.
Now take a look at these unit tests for the same package:
``` func TestNewQuery(t *testing.T) { var assert = assert.New(t)
v := []rune(".name") q := NewQuery(v) assert.Equal(*q.query, []rune(".name")) assert.Equal(*q.complete, []rune(""))
}
func TestNewQueryWithString(t *testing.T) { var assert = assert.New(t)
q := NewQueryWithString(".name") assert.Equal(*q.query, []rune(".name")) assert.Equal(*q.complete, []rune(""))
} ```
Now be honest: what are these for? Is this part of an attack to eat all GitHub storage and head them to bankruptcy?
Also
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Bolo
It seems that from 1987 to around 2000 there was a big community of people who played this game called "Bolo". It was a game in which people controlled a tank and killed others while trying to capture bases in team matches. Always 2 teams, from 2 to 16 total players, games could last from 10 minutes to 12 hours. I'm still trying to understand all this.
The game looks silly from some videos you can find today, but apparently it was very deep in strategy because people developed strategy guides and wrote extensively about it and Netscape even supported
bolo:
URLs out of the box.The two most important elements on the map are pillboxes and bases. Pillboxes are originally neutral, meaning that they shoot at every tank that happens to get in its range. They shoot fast and with deadly accuracy. You can shoot the pillbox with your tank, and you can see how damaged it is by looking at it. Once the pillbox is subdued, you may run over it, which will pick it up. You may place the pillbox where you want to put it (where it is clear), if you've enough trees to build it back up. Trees are harvested by sending your man outside your tank to forest the trees. Your man (also called a builder) can also lay mines, build roads, and build walls. Once you have placed a pillbox, it will not shoot at you, but only your enemies. Therefore, pillboxes are often used to protect your bases.
That quote was taken from this "augmented FAQ" written by some user. Apparently there were many FAQs for this game. A FAQ is after all just a simple, clear and direct to the point way of writing about anything, previously known as summa[^summa-k], it doesn't have to be related to any actually frequently asked question.
More unexpected Bolo writings include an etiquette guide, an anthropology study and some wonderings on the reverse pill war tactic.
[^summa-k]: It's not the same thing, but I couldn't help but notice the similarity.
-
@ 66675158:1b644430
2025-01-16 20:44:33Before the time of Utensils, people lived in genuine harmony. They gathered in markets to trade freely, built homes where they pleased, and traveled without papers or permissions. Communities solved their own problems through discussion and agreement. When disputes arose, wise elders would help find solutions that satisfied all. Children learned from their parents or chose mentors from among the skilled craftspeople.
In those days, gold changed hands freely for goods and services. Each person kept what they earned. Communities would voluntarily pool resources for shared needs - wells, bridges, and roads. Those who had more would often help those with less, not by decree but by choice.
Neighbors knew each other's names. Doors were left unlocked. Children played in the streets until sunset. Gardens grew wherever people planted them. Merchants traveled between towns without inspections. Healers practiced their craft freely, sharing knowledge openly.
Then came the Utensils.
In our land, Aldrich found the Silver Spoon. In the East, Emperor Chen discovered the Jade Chopsticks. The Norse kingdoms united under the Golden Fork. The desert peoples followed the Bronze Ladle.
Each Utensil, their holders claimed, granted divine wisdom to rule. Each promised protection and prosperity in exchange for obedience.
The changes came slowly at first. The Spoon Holder requested a share of each harvest to store for hard times. The Chopstick Emperor required homes to be built in specific ways to prevent fires. The Fork King demanded that travelers carry documents proving their loyalty.
At first, the Utensils did bring some genuine improvements. The Spoon Holder's collectors used part of their harvest share to help villages during droughts. The Chopstick Emperor's building codes truly did reduce fires. The Fork King's road patrols deterred the few bandits who had troubled merchants. The Bronze Ladle's water management systems helped farms flourish in the desert.
The early years saw stone roads replace dirt paths, connecting villages more efficiently than before. Granaries were built with better designs, preserving food longer. Some diseases decreased as the Chopstick Emperor's cleanliness codes spread. The Fork Kingdom's standardized weights and measures did make trade easier.
The Spoon Holder soon declared that carrying gold was dangerous and inefficient. They introduced sacred paper notes, "backed by the Silver Spoon's power." At first, you could trade these notes back for gold, but gradually this right vanished.
Scholars wrote lengthy memos about the divine wisdom of the Utensils, creating complex theories about why ordinary people couldn't possibly understand how to live without direction. They advised the Holders and were rewarded with special privileges, comfortable positions, and influence.
When anyone questioned this system, the Utensil Holders and their Experts would ask: "But who would build the roads without us? Who would help the poor? Who would protect you?" They spoke as if humans had never cooperated or helped each other before the Utensils came, and many began to believe it.
People grumbled but accepted. After all, the Utensils shone with otherworldly power.
Some remembered these early benefits when questioning the growing restrictions. "Remember how the Spoon Holder's men helped during the great flood?" they would say. "Surely they have our best interests at heart." The Utensil Holders carefully nurtured these memories, even as their power grew far beyond such humble beginnings.
More rules followed. The Spoon Holder's men began watching the roads, collecting portions from merchants. The Chopstick Guards enforced strict codes about proper behavior. The Fork Watchers kept lists of who attended the mandatory gatherings.
Children were taught the sacred histories of their Utensils. The Spoon's light blessed the worthy. The Chopsticks maintained harmony. The Fork brought strength. The Ladle provided guidance.
When people remembered the old freedoms, the Utensil Holders reminded them of the chaos before - though few could actually recall any chaos.
But surely there must have been chaos, or why would the Utensils have come?
The Utensil Holders began to eye each other's territories. How dare the Fork King claim his metal was superior? How could the Chopstick Emperor suggest jade held more wisdom than silver? The Ladle Holder's bronze was clearly inferior to all!
The Utensil Holders pointed to their achievements - the roads, the granaries, the safer towns - as proof of their divine right to rule. They spoke of how they had unified squabbling villages, standardized laws, and created order. Few noticed how these very achievements had required less and less input from the people themselves.
Wars erupted. Armies marched under banners bearing their sacred Utensils. Men died believing their Utensil was the one true source of authority. Villages burned as soldiers searched for heretics who might secretly worship foreign Utensils.
The Utensil Holders demanded more from their people - more food, more gold, more obedience. They placed watchers in every village. They required written permission for travel between towns. They forbade more than three people from gathering without a Guardian present.
"It's for protection," they said, holding their Utensils high. "How can you doubt the sacred silver?"
And indeed, their guards did stop some thieves, their inspectors did prevent some fraud, their builders did create some useful works. But these benefits came with an ever-increasing price in freedom, until the cost far exceeded any advantage. Yet by then, most people could no longer imagine providing these services for themselves, as their ancestors had done.
Towns built walls, not against invaders but to control who could enter and leave. The Utensil Holders required everyone to wear markers showing their village of origin. They appointed observers in every community to report suspicious behavior - like speaking of the time before Utensils.
Children were taken to special houses to learn proper reverence for their Utensil. Families who taught the old ways disappeared in the night. The Holders declared certain words forbidden, certain thoughts dangerous, certain memories treasonous.
Now, centuries later, the Utensils rule absolutely. People bow when the sacred implements pass by. They inform on neighbors who question the Utensils' power. They offer their children to serve in the Utensil temples.
The latest marvel was Utensil Technology - enchanted mirrors and crystals that watched people's movements, recorded their words, and tracked their trades. "Only criminals fear being watched," the Holders proclaimed, as their surveillance spread into every home and market. The crystals even allowed them to freeze people's paper money if they spoke against the Utensils.
The Utensil Holders formed special partnerships with the largest merchant guilds. These favored merchants received special permissions, protection from smaller competitors, and access to the new paper money first. In return, they helped enforce the Holders' rules and collected information about their customers. Small traders and craftsmen found themselves crushed between these powerful allies.
The latest decree requires all newborns to be blessed by touching their foreheads to their realm's sacred Utensil, marking them forever as its property. Parents compete for earlier blessing times, believing this shows greater devotion.
The wars continue. The Fork Kingdoms battle the Chopstick Empire. The Ladle Realms raid the Spoon Holdings. Each believes their Utensil must rule all.
And in quiet corners, in hidden places, a few elders still whisper stories of the time before - when humans lived without Utensils telling them how to live. But fewer remember with each passing year. After all, who could imagine a world without the guidance of sacred silverware?
-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Let’s dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computers—and it has nothing to do with what so-called “quantum coaches” teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoin’s security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computing’s Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. It’s a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoin’s Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoin’s blockchain.
- Lamport: Created in 1977, it’s considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoin’s Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the community’s constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoin’s future is not at risk—it is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ 592295cf:413a0db9
2024-11-30 08:33:35Week 25 11
Vitor created another social network edit mode. There are countless cases of use. But type threads are possible, small books, Rabbit hole and those who put it more.
nostr:nevent1qvzqqqqqqypzq3svyhng9ld8sv44950j957j9vchdktj7cxumsep9mvvjthc2pjuqyghwumn8ghj7mn0wd68ytnhd9hx2tcqyrewvkqwqt7urn2u9h5tk88vj9p3csl0wt08aqd8kxsngxtdmr0zqmszxds
Nostr Report is missing, was a lot of news, 20 notes in a day.
Some news do not need resonance case, Primal did a good job with trending. Of course is a centralized service. But it was one of the Twitter features, he did it with the top trending hashtags. Now Primal is more focused on DVM smart feed, read, and Discovery. This will bring chaos, as long as you can switch the trend feed with your Algo or DVM Algo. I'm obsessed with these switches 😅
Hostile people can happen along the way, it's not like in Bluesky 😔.
Someone share on Bluesky https://bsky.app/profile/laurenshof.online/post/3lbrsjzobps2u Video is this https://audiovisual.ec.europa.eu/fr/video/I-264553?lg=en
Trying to convince someone for Unanimity, Relay groups are nice, but Unanimity is simpler.
nostr:nevent1qqs9ar5t9xu97nhtwef9ej2y7cklnysf7hgwce7t2wk5axhfdwuq5sqpzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxgq3qmzyp990kgskujdyplzydmd08ft42mkkfg4lzldaap8ng7n2u3kmss8l76e
Game on Nostr on 2025, cool be.
Angor are finally ready, crowdfunding with Nostr and Bitcoin. (alpha test)
nostr:nevent1qvzqqqqqqypzqw4hcggg2f9h68qutp0snsdhux20teljykjmh9rlx78qwnt5a8dlqqstte0g54hfa2cmr63vq4ava7e7wsr483p63tylvut8cvufzs44a0cd6saa3
PR 1600
The name is curated pubblication use kind 30040 e 30041, 30040 Is the envelope and 30041 are chapters or paragraphs. We'll see what's left in a month. There are no big discussions until now. This is the basis to leave it so, if you can improve it without breaking it ok. I think liminal is preparing at least two other NPs. The bottom problem is that there are no "competitor", someone else outside who wants to use this thing. But if there are no one can invent.
You can't do things with others. There's too "bad" people. Keep calm is a toxin environment. Maybe you have to get away a bit.
I was trying to help David but there are no aggregators for neo4j Nostr. Dustin's example, I think it's only worth the DVM. There are two other projects one grain of Oceanslim I saw the video where he explains some things, with Dr. Morales. And the other is Cody's Nostr Relay tray. At least you have all the data in a Relay, and for that Relay you can query, I don't think you find anything significant, maybe you need 100(k) notes to have a good sample. I think I'll make the update. I downloaded two months ago, it worked for a while with Nostrudel, then only with next, lately some problems with next. Cody launched the project with fiatjaf and I think it is also implemented here. In the end, I don't think this answer is useful to David.
Zapview nostr-zap-view The lokuyow project, always attentive to zap lightning and Nostr.
Give a "microsat" to Fiatjaf nostrabia relay
I managed to send a zap from a hex known id, it only works with getalby, so until January 4th. I have to prove if other lnurls have the call.
Something I might have understood about the new version of Nostr_sdk or rust Nostr. Sending messages will be harder. The builder does not support the tag, it breaks almost all the scripts I was writing and to verify them you can do nothing but send to the Relays, I wait a few days if there are news, but I don't think there will be. It is no longer linked to the table of examples so it will not be updated presumably, I would like to continue, as the cli does not come out. That then the cli will be in python 12.. (I'm still in version 3.10.9 of python)
I've seen bulletin proof, posting on Nostr seems interesting, but they need many interactions to have a functioning client. link, stacker news
Nostr nuance, login, Nostr connect, private. (two Notes)
nostr:nevent1qvzqqqqqqypzq77777lz9hvwt86xqrsyf2jn588ewk5aclf8mavr80rhmduy5kq9qyg8wumn8ghj7mn0wd68ytnddakj7qghwaehxw309aex2mrp0yhxummnw3ezucnpdejz7qpqqqqz3757ha8j5xcm7er8kkdc0dgtvmy55dz2t2d7c2tv9h8qm88qlcjsls
nostr:nevent1qvzqqqqqqypzq9eemymaerqvwdc25f6ctyuvzx0zt3qld3zp5hf5cmfc2qlrzdh0qyt8wumn8ghj7ur4wfcxcetjv4kxz7fwvdhk6tcpzpmhxue69uhkummnw3ezumt0d5hsqgz98qckr40flhpyt48fxqjkuf9p4dv245634ygvp6dfu2kt7qk5egqmc4l8
An other microsat to Fiatjaf chronicle relay
Kind 1 was a mistake and many people are realizing it, they are replacing it. Kind 5 now it is only almost to eliminate drafts, here the option is to overwrite.
That's all!!
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28IPFS problems: Community
I was an avid IPFS user until yesterday. Many many times I asked simple questions for which I couldn't find an answer on the internet in the #ipfs IRC channel on Freenode. Most of the times I didn't get an answer, and even when I got it was rarely by someone who knew IPFS deeply. I've had issues go unanswered on js-ipfs repositories for year – one of these was raising awareness of a problem that then got fixed some months later by a complete rewrite, I closed my own issue after realizing that by myself some couple of months later, I don't think the people responsible for the rewrite were ever acknowledge that he had fixed my issue.
Some days ago I asked some questions about how the IPFS protocol worked internally, sincerely trying to understand the inefficiencies in finding and fetching content over IPFS. I pointed it would be a good idea to have a drawing showing that so people would understand the difficulties (which I didn't) and wouldn't be pissed off by the slowness. I was told to read the whitepaper. I had already the whitepaper, but read again the relevant parts. The whitepaper doesn't explain anything about the DHT and how IPFS finds content. I said that in the room, was told to read again.
Before anyone misread this section, I want to say I understand it's a pain to keep answering people on IRC if you're busy developing stuff of interplanetary importance, and that I'm not paying anyone nor I have the right to be answered. On the other hand, if you're developing a super-important protocol, financed by many millions of dollars and a lot of people are hitting their heads against your software and there's no one to help them; you're always busy but never delivers anything that brings joy to your users, something is very wrong. I sincerely don't know what IPFS developers are working on, I wouldn't doubt they're working on important things if they said that, but what I see – and what many other users see (take a look at the IPFS Discourse forum) is bugs, bugs all over the place, confusing UX, and almost no help.
-
@ 878dff7c:037d18bc
2025-03-02 21:49:36Cyclone Alfred Threatens South East Queensland
Tropical Cyclone Alfred is projected to make landfall in South East Queensland by Thursday as a Category 2 system.
Currently located 465 km northeast of Brisbane, the cyclone is expected to bring gale-force winds, up to 600 mm of rainfall, abnormally high tides, and damaging swells.
Authorities have issued multiple warnings, including coastal hazard and flood watches, urging residents from Bundaberg to the Gold Coast to prepare for severe weather conditions.
Housing Market Rebounds Amid Interest Rate Cut
Australia's housing market downturn appears to be over, with property values rising by 0.3% in February, nearly offsetting the previous three-month decline of 0.4%.
This rebound is attributed to increased buyer confidence following a recent interest rate cut by the Reserve Bank, signaling a potential resurgence in the housing sector.
Federal Politics: Australia Urged to Lift Defense Spending
In federal politics, discussions have emerged urging Australia to increase its defense spending.
This call emphasizes the need to bolster national security and address evolving geopolitical challenges.
Australian Government Pledges RAAF Base Access for Aerial Firefighting
The Australian government has pledged to grant the New South Wales Rural Fire Service access to Royal Australian Air Force (RAAF) bases to support aerial firefighting operations.
This initiative aims to enhance the state's capacity to respond to bushfires and improve overall emergency preparedness.
New Search Initiated for MH370
Eleven years after the disappearance of Malaysia Airlines Flight MH370, a new search has commenced.
Ocean Infinity is deploying advanced technology, including mothership Armada 7806 and remote-controlled underwater drones capable of scanning the ocean floor down to six kilometers.
The search covers a new 15,000 square kilometer area 1,500 kilometers west of Perth, identified based on data from the past decade.
Challenges such as extreme weather conditions and the vast Indian Ocean area persist.
Experts emphasize the improvement in maritime technology and the emotional toll of repeated search efforts.
The Malaysian government is negotiating a contract with Ocean Infinity, promising a $70 million reward if the wreckage is found.
Victorian Unions Protest Public Sector Job Cuts
The Victorian government, led by Treasurer Jaclyn Symes, announced an unexpected plan to cut 3,000 public sector jobs as part of a budget clean-out, causing uproar among unions.
Six unions representing various sectors, including firefighters, teachers, and public sector workers, have organized a rally on March 3 to protest the job cuts.
Union officials emphasized the widespread impact of these cuts, questioning who would take on the workload and warning of the expensive payouts in redundancies.
They criticized the government's approach, pointing out potential repercussions and the irony of hiring costly consultants to advise on job cuts.
Centrelink Payments Increase for Millions of Australians
Starting in March, approximately five million Australians receiving various Centrelink payments, including Age Pension, Carer Payment, Commonwealth Rent Assistance, ABSTUDY, JobSeeker, Disability Support Pension, and Parenting Payment Single, will see payment increases.
These adjustments are based on the higher of the consumer price index or wage price index, assessed biannually.
Notable changes for JobSeeker include reduced penalties for non-compliance with job requirements for new registrants and exemptions for those working 30 hours a fortnight for two months.
Carers will benefit from more flexible work hours, allowing a spread of 100 hours over four weeks without affecting their payments.
These measures aim to alleviate cost-of-living pressures, with increments resulting in a substantial rise in support since the current government took office.
Note: All information is based on articles published on March 3, 2025.
-
@ f3873798:24b3f2f3
2025-03-02 20:00:47No Brasil, o consumo de álcool não é apenas aceito socialmente, mas fortemente incentivado. A presença de bebidas alcoólicas é constante em festas, confraternizações e até mesmo no ambiente familiar. Quem se recusa a beber muitas vezes é visto como alguém “estranho”, “chato” ou antissocial. Essa mentalidade gera um ciclo vicioso de incentivo ao consumo, ignorando seus impactos negativos.
A Pressão Social Pelo Consumo
Desde cedo, muitos brasileiros são introduzidos ao álcool sem qualquer reflexão sobre os riscos. Em algumas regiões, crianças experimentam bebidas alcoólicas ainda na infância, muitas vezes com o incentivo de familiares. A ideia de que “todo mundo bebe” cria um ambiente em que se recusar a ingerir álcool pode levar ao isolamento social e até mesmo a chacotas.
Aqueles que não bebem frequentemente se sentem excluídos de eventos sociais, pois a cultura ao redor do álcool é tão intensa que parece não haver espaço para quem faz uma escolha diferente. Em reuniões, festas e até mesmo encontros informais, a presença da bebida é praticamente obrigatória, reforçando a ideia de que a diversão depende dela.
O Álcool e a Imprudência no Trânsito
Outro reflexo dessa cultura é a alta incidência de acidentes de trânsito causados pelo consumo de álcool. Apesar das campanhas de conscientização e das leis mais rígidas, dirigir embriagado ainda é um problema grave no Brasil. Muitos motoristas assumem o risco, acreditando que estão “bem o suficiente” para conduzir, colocando a própria vida e a de outras pessoas em perigo.
Infelizmente, essa imprudência não se limita ao ato de dirigir. Em festas e eventos regados a álcool, discussões e brigas são comuns, e atos de violência aumentam significativamente. O efeito entorpecente do álcool reduz a capacidade de julgamento, resultando em comportamentos agressivos e irresponsáveis.
A Decadência e o Cenário Degradante
Outro aspecto ignorado pela cultura do álcool é a decadência humana observada em eventos onde o consumo excessivo é incentivado. Não é raro ver pessoas embriagadas vomitando ou até mesmo defecando em vias públicas, completamente inconscientes de seus atos. Essas cenas se tornaram tão comuns que são tratadas como algo natural, quando, na verdade, refletem um problema social sério.
O Carnaval é um dos exemplos mais emblemáticos desse fenômeno. O que deveria ser uma celebração cultural muitas vezes se transforma em um festival de exageros, onde a bebedeira extrema leva a uma série de consequências negativas, como furtos, brigas, acidentes e crimes diversos.
O Lado Ignorado Dessa Cultura
Curiosamente, todos esses problemas são frequentemente minimizados ou ignorados. A sociedade foca apenas no aspecto festivo do álcool, sem considerar os prejuízos que ele causa. Pouco se discute sobre os impactos na saúde pública, na segurança e na dignidade dos indivíduos.
É importante ressaltar que este artigo não propõe a proibição do álcool nem adota uma visão moralista sobre o tema. O problema não está na bebida em si, mas na forma como é consumida e incentivada. O que se defende aqui é o equilíbrio e a responsabilidade.
Beber com moderação, respeitar os limites do próprio corpo e das pessoas ao redor, evitar a pressão social sobre aqueles que não bebem e nunca misturar álcool e direção são atitudes fundamentais para transformar essa cultura. O consumo consciente permite que momentos de celebração sejam realmente prazerosos, sem que se tornem um problema para quem bebe ou para a sociedade como um todo.
A diversão não precisa estar atrelada ao exagero. É possível aproveitar bons momentos sem perder o controle, sem colocar vidas em risco e sem alimentar um ciclo de imprudência. Repensar a forma como lidamos com o álcool é essencial para uma convivência mais saudável e responsável.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28P2P reputation thing
Each node shares a blob of the reputations they have, which includes a confidence number. The number comes from the fact that reputations are inherited from other nodes they trust and averaged by their confidence in these. Everything is mixed for plausible deniability. By default a node only shares their stuff with people they manually add, to prevent government from crawling everybody's database. Also to each added friend nodes share a different identity/pubkey (like giving a new Bitcoin address for every transaction) (derived from hip32) (and since each identity can only be contacted by one other entity the node filters incoming connections to download their database: "this identity already been used? no, yes, used with which peer?").
Network protocol
Maybe the data uploader/offerer initiates connection to the receiver over Tor so there's only a Tor address for incoming data, never an address for a data source, i.e. everybody has an address, but only for requesting data.
How to request? Post an encrypted message in an IRC room or something similar (better if messages are stored for a while) targeted to the node/identity you want to download from, along with your Tor address. Once the node sees that it checks if you can download and contacts you.
The encrypted messages could have the target identity pubkey prefix such that the receiving node could try to decrypt only some if those with some probability of success.
Nodes can choose to share with anyone, share only with pre-approved people, share only with people who know one of their addresses/entities (works like a PIN, you give the address to someone in the street, that person can reach you, to the next person you give another address etc., you can even have a public address and share limited data with that).
Data model
Each entry in a database should be in the following format:
internal_id : real_world_identifier [, real_world_identifier...] : tag
Which means you can either associate one or multiple real world identifier with an internal id and associate the real person designated by these identifiers with a tag. the tag should be part of the standard or maybe negotiated between peers. it can be things like
scammer
,thief
,tax collector
etc., orhonest
,good dentist
etc. defining good enough labels may be tricky.internal_id
should be created by the user who made the record about the person.At first this is not necessary, but additional bloat can be added to the protocol if the federated automated message posting boards are working in the sense that each user can ask for more information about a given id and the author of that record can contact the person asking for information and deliver free text to them with the given information. For this to work the internal id must be a public key and the information delivered must be signed with the correspondent private key, so the receiver of the information will know it's not just some spammer inventing stuff, but actually the person who originated that record.
-
@ 592295cf:413a0db9
2024-11-16 10:40:22Week 11-11
Lamenting is becoming something I should ask people who complain. Charity bussiness and after sending zap received to those who do not complain...
I started making an RSS feed template. Open an opml file and check the feed. I called this script,Teed.
This morning I saw a bounty from a fiatjaf note, on a rss-feed long form, basic a plugin for an app. But I'm not doing that, of course, I can also publish it as soon as I'm in charge. Maybe I have some opml files and I want to see if these are still active.
Starter pack is not good apparently creates elites and maybe gives you the feeling of not choosing, but that's what people want. Do not choose but have the illusion of choosing.
Toxicity level. high.
P2P stuff, Iroh is a protocol for syncing & moving bytes iroh computer post on Bluesky
Juraj new project
nostr:nevent1qvzqqqqqqypzpk4kccr9csumnwhmpv83ladqc6p88089cx2e5s2c4448ppgl2pakqqsyv4hs424x6c8phks903s595q2lqp5fpwyq7ajwrf00lxev8cfamcvmq23h
Alex Gleason bunker Knox. (Beta) "knox is a new Nostr bunker CLI for running a NIP-46 remote signer and granting credentials to members of your team". Announcing bunker knox article
Local First podcast, web2.5. Something like Nostr but Local P2P, interesting episode. youtube link
Open Secret AI. "OpenSecret is a backend for app developers that turns private encryption on by default." announcment AI
I think users with regard to algorithms do not want ten different feeds to choose from, but that their feed adapts to their choices, training the feed if this makes sense. So the feed is your feed for your choices, respond and train with them.
Pleblab 2, cool "ANNOUNCING TOP BUILDER SEASON 2! " nostr:nevent1qvzqqqqqqypzpmx02p4slzahlf7jlcaspsx57g6uc7kl7cc7dvhlsnqtpn6khjj0qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qgwwaehxw309ahx7uewd3hkctcqyzy9w0frd802hfmrp45jr6dqhf7umqj7s63z0jvhv7hvvkcsqjg0vjwd7q4)
It was the real Guardian, quit 7fqx, we know it's you who want to distract us from number go up. The Guardian has left or wants to leave twitter is looking for alternatives, but how to verify a high profile user on Nostr? Nostr Address is already something but it's not enough.
We sometimes think that there is the money tree somewhere is that they magically appear, when instead the money is in the ground but they are dirty.
If Amethyst doesn't support is others stuff
People are simple, they want an app that works for all devices they have. People are "flutter-system".
A podcast feed xml file
Add to teed, if only i had made that option, meanwhile i saw a new interesting project
An other RSS feed github project
Imagine making a file opml with categories and those are your follow nostriches.
The problem is this does not bring new sap to the social chart is important to you, receive the selected posts and it is fantastic. You can also not use Nostr, if you want to use it as backup is fine. Share opml files? It's okay, but you can also find specific sites and find the best. Update for clients, you have a lot of RSS feeds from clients but update after a few hours so if there is really an emergency you lose. I still need to figure out how to integrate Nostr into RSS feed. Maybe an event to make your lists known.
I saw the event in these pr: nostr verified podcast nip #1465 Add audio track NIP #1043
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28Reasons why Lightning is not that great
Some Bitcoiners, me included, were fooled by hyperbolic discourse that presented Lightning as some magical scaling solution with no flaws. This is an attempt to list some of the actual flaws uncovered after 5 years of experience. The point of this article is not to say Lightning is a complete worthless piece of crap, but only to highlight the fact that Bitcoin needs to put more focus on developing and thinking about other scaling solutions (such as Drivechain, less crappy and more decentralized trusted channels networks and statechains).
Unbearable experience
Maintaining a node is cumbersome, you have to deal with closed channels, allocating funds, paying fees unpredictably, choosing new channels to open, storing channel state backups -- or you'll have to delegate all these decisions to some weird AI or third-party services, it's not feasible for normal people.
Channels fail for no good reason all the time
Every time nodes disagree on anything they close channels, there have been dozens, maybe hundreds, of bugs that lead to channels being closed in the past, and implementors have been fixing these bugs, but since these node implementations continue to be worked on and new features continue to be added we can be quite sure that new bugs continue to be introduced.
Trimmed (fake) HTLCs are not sound protocol design
What would you tell me if I presented a protocol that allowed for transfers of users' funds across a network of channels and that these channels would pledge to send the money to miners while the payment was in flight, and that these payments could never be recovered if a node in the middle of the hop had a bug or decided to stop responding? Or that the receiver could receive your payment, but still claim he didn't, and you couldn't prove that at all?
These are the properties of "trimmed HTLCs", HTLCs that are uneconomical to have their own UTXO in the channel presigned transaction bundles, therefore are just assumed to be there while they are not (and their amounts are instead added to the fees of the presigned transaction).
Trimmed HTLCs, like any other HTLC, have timelocks, preimages and hashes associated with them -- which are properties relevant to the redemption of actual HTLCs onchain --, but unlike actual HTLCs these things have no actual onchain meaning since there is no onchain UTXO associated with them. This is a game of make-believe that only "works" because (1) payment proofs aren't worth anything anyway, so it makes no sense to steal these; (2) channels are too expensive to setup; (3) all Lightning Network users are honest; (4) there are so many bugs and confusion in a Lightning Network node's life that events related to trimmed HTLCs do not get noticed by users.
Also, so far these trimmed HTLCs have only been used for very small payments (although very small payments probably account for 99% of the total payments), so it is supposedly "fine" to have them. But, as fees rise, more and more HTLCs tend to become fake, which may make people question the sanity of the design.
Tadge Dryja, one of the creators of the Lightning Network proposal, has been critical of the fact that these things were allowed to creep into the BOLT protocol.
Routing
Routing is already very bad today even though most nodes have a basically 100% view of the public network, the reasons being that some nodes are offline, others are on Tor and unreachable or too slow, channels have the balance shifted in the wrong direction, so payments fail a lot -- which leads to the (bad) solution invented by professional node runners and large businesses of probing the network constantly in order to discard bad paths, this creates unnecessary load and increases the risk of channels being dropped for no good reason.
As the network grows -- if it indeed grow and not centralize in a few hubs -- routing tends to become harder and harder.
While each implementation team makes their own decisions with regard to how to best way to route payments and these decisions may change at anytime, it's worth noting, for example, that CLN will use MPP to split up any payment in any number of chunks of 10k satoshis, supposedly to improve routing success rates. While this often backfires and causes payments to fail when they should have succeeded, it also contributes to making it so there are proportionally more fake HTLCs than there should be, as long as the threshold for fake HTLCs is above 10k.
Payment proofs are somewhat useless
Even though payment proofs were seen by many (including me) as one of the great things about Lightning, the sad fact is that they do not work as proofs if people are not aware of the fact that they are proofs. Wallets do all they can to hide these details from users because it is considered "bad UX" and low-level implementors do not care very much to talk about them at all. There have been attempts from Lightning Labs to get rid of the payment proofs entirely (which at the time to me sounded like a terrible idea, but now I realize they were not wrong).
Here's a piece of anecdote: I've personally witnessed multiple episodes in which Phoenix wallet released the preimage without having actually received the payment (they did receive a minor part of the payment, but the payment was split in many parts). That caused my service, @lntxbot, to mark the outgoing payment as complete, only then to have to endure complaints from the users because the receiver side, Phoenix, had not received the full amount. In these cases, if the protocol and the idea of preimages as payment proofs be respected, should I have been the one in charge of manually fixing user balances?
Another important detail: when an HTLC is sent and then something goes wrong with the payment the channel has to be closed in order to redeem that payment. When the redeemer is on the receiver side, the very act of redeeming should cause the preimage to be revealed and a proof of payment to be made available for the sender, who can then send that back to the previous hop and the payment is proven without any doubt. But when this happens for fake HTLCs (which is the vast majority of payments, as noted above) there is no place in the world for a preimage and therefore there are no proofs available. A channel is just closed, the payer loses money but can't prove a payment. It also can't send that proof back to the previous hop so he is forced to say the payment failed -- even if it wasn't him the one who declared that hop a failure and closed the channel, which should be a prerequisite. I wonder if this isn't the source of multiple bugs in implementations that cause channels to be closed unnecessarily. The point is: preimages and payment proofs are mostly a fiction.
Another important fact is that the proofs do not really prove anything if the keypair that signs the invoice can't be provably attached to a real world entity.
LSP-centric design
The first Lightning wallets to show up in the market, LND as a desktop daemon (then later with some GUIs on top of it like Zap and Joule) and Anton's BLW and Eclair wallets for mobile devices, then later LND-based mobile wallets like Blixt and RawTX, were all standalone wallets that were self-sufficient and meant to be run directly by consumers. Eventually, though, came Breez and Phoenix and introduced the "LSP" model, in which a server would be trusted in various forms -- not directly with users' funds, but with their privacy, fees and other details -- but most importantly that LSP would be the primary source of channels for all users of that given wallet software. This was all fine, but as time passed new features were designed and implemented that assumed users would be running software connected to LSPs. The very idea of a user having a standalone mobile wallet was put out of question. The entire argument for implementation of the bolt12 standard, for example, hinged on the assumption that mobile wallets would have LSPs capable of connecting to Google messaging services and being able to "wake up" mobile wallets in order for them to receive payments. Other ideas, like a complicated standard for allowing mobile wallets to receive payments without having to be online all the time, just assume LSPs always exist; and changes to the expected BOLT spec behavior with regards to, for example, probing of mobile wallets.
Ark is another example of a kind of LSP that got so enshrined that it become a new protocol that depends on it entirely.
Protocol complexity
Even though the general idea of how Lightning is supposed to work can be understood by many people (as long as these people know how Bitcoin works) the Lightning protocol is not really easy: it will take a long time of big dedication for anyone to understand the details about the BOLTs -- this is a bad thing if we want a world of users that have at least an idea of what they are doing. Moreover, with each new cool idea someone has that gets adopted by the protocol leaders, it increases in complexity and some of the implementors are kicked out of the circle, therefore making it easier for the remaining ones to proceed with more and more complexity. It's the same process by which Chrome won the browser wars, kicked out all competitors and proceeded to make a supposedly open protocol, but one that no one can implement as it gets new and more complex features every day, all envisioned by the Chrome team.
Liquidity issues?
I don't believe these are a real problem if all the other things worked, but still the old criticism that Lightning requires parking liquidity and that has a cost is not a complete non-issue, specially given the LSP-centric model.
-
@ d6affa19:9110b177
2025-03-02 19:43:03i make my way downstairs,
the house is quiet now;
the little ones are finally asleep.
a soft drizzle from the shower fills the silence.
She must've gotten in already—
taking some time for Herself after a long day.i grab two towels from the closet and toss them in the dryer.
She likes them warm.
unsure of how long She's been bathing,
i begin preparing the room.i light a few of Her candles—
a sweet, autumn scent fills the air,
rich with hints of cinnamon and crisp leaves.
it wraps me in a pleasant embrace,
evoking memories of cozy evenings.i turn off the lighting,
leaving only the candlelight flickering.
the room is illuminated with a warm, orange glow.i go ahead and set out the oils and lotions—
wondering what She'll choose tonight...
anticipation quickens my heartbeat,
rousing a familiar longing.with everything prepped,
i take some time to breathe in the atmosphere.
the gentle cascade of water still echoes from the bathroom.
it flows like a calming stream,
creating a soothing ambiance.i lie down on the bed, closing my eyes.
a moment of stillness envelops me,
a brief escape from the day's chaos.
i've been looking forward to this.
i can feel my mindset shifting.suddenly, the shower stops,
breaking the stillness.
my eyes quickly open.
a rush of enthusiasm surges through me.
i spring out of bed and retrieve Her towels from the dryer.upon opening the bathroom door, i'm greeted by Her sweet voice, "Is that my good boy? Perfect timing."
a flash of heat creeps up my neck,
i can't help but grin.
my body relaxes,
the tension eases as i lean into Her approval.i open the shower door then kneel down,
the soft bath mat cushions me.
steam from the shower fills the room,
creating a cocoon of warmth.
Her silhouette glows softly through the mist.i offer the warm towels,
the fabric still radiating heat.
without a word She presents Her leg.
instinctively, i set one towel on my lap,
using the other i begin patting Her dry,
starting from Her pedicured foot.Her smooth skin invites my touch—
but the plush towel acts as a barrier.
once She is satisfied,
i switch to the other leg,
continuing my attentive care."Did they give you any trouble?" She asks, Her tone light and curious.
"I hope they weren't too rough on you.""not tonight, my Queen," i answer, still focused on my task.
"they fell asleep quickly—must've been exhausted."
"Good," She says with a relieved sigh.She then snaps Her fingers—
signaling for me to hand Her the towel.
i comply, moving out of Her way.
She finishes drying Herself and wraps the towel snugly around Her body.
She casually grabs the other towel and wraps it around Her head,
then makes Her way into the bedroom.i watch Her walk over to the nightstand,
setting the lavender oil to the front of it—
this is what She's chosen for the evening.
She then picks up Her phone,
settling onto the edge of the bed,
towel still wrapped around Her."Well done—I love it!" She says, Her voice rich with approval as She absorbs the arrangement.
Her words pull me from my thoughts,
another subtle flush creeping into my cheeks.
i make my way to the nightstand,
picking up the oil.
my pulse quickens as i kneel before Her,
the cool floor a stark contrast to my rising excitement.She tilts Her head from behind Her phone, a playful glint in Her eyes.
"Don't you look so adorable down there?"
She leans forward slightly, Her expression shifting to one of command.
"It's been a long day. So be sure that you give My feet the attention they deserve tonight."my stomach flutters as She lifts one foot.
i take it gently into my hands,
a shiver runs through me.
i pour a small amount of oil into my palm.
the scent of lavender mingles with the autumn candles.as i massage it into Her foot,
i can't help but notice every detail—
the curve of Her arch draws me in,
the softness of Her skin captivates me.She shifts Her foot slightly,
guiding me to the areas that demand my attention.
Her toes wiggle in response.
it's so mesmerizing...
with each stroke i feel my mind quieting.
the chill of the floor fades away.
there's only Her.the rhythm of my hands,
the way the oil glides so smoothly,
the way She relaxes under my touch.
i lose myself in these sensations.
my thoughts slowly dissipate—
replaced by a feeling of clarity, of purpose.i feel Her foot pull away,
momentarily releasing me from my trance.
it's had its fill.
She lifts the other one in front of me.
Her toes curling playfully.
my heartbeat skips.
a desperation fills my chest.
a longing.
to express my devotion in the most intimate way.
to worship the very thing that grounds Her—
that ties Her to this earth.
it's a yearning that goes beyond words.
i can almost taste the moment.
the connection it would bring....
i breathe deeply,
a heavy sigh escaping my lips—
lips that ache to honor Her every curve.
permission lingers in the air,
tantalizing and just out of reach.
i notice Her looking at me,
a giant smirk playing on Her lips,
Her phone now at Her side."Well..?" She teases, a mischievous look in Her eyes.
"What are you waiting for? It's not going to rub itself."
Her toes continue wiggling in front of me—taunting.the urge simmers beneath the surface.
the denial resides like a sweet ache.
i breathe through it,
accepting Her limitation.
i'm grateful for the gift of this moment,
channeling the energy into the task at hand.i gently embrace Her other foot,
admiring the delicate contours of Her ankle.
Her skin feels like silk against my fingertips.
i pour a few more drops of oil into my palm,
the velvety texture glides through my hands.
another burst of lavender dances in the air,
blending again with the persistent aroma of the candles.i begin to knead Her other foot,
focusing on the arch,
applying a careful amount of pressure.
each stroke sends ripples of warmth through my hands,
i feel Her tension melting away beneath my touch.
She lets out a contented sigh and falls back on the bed taking it in.
"Mmmm, that feels good." She encourages.i savor this privilege,
as the flickering candles cast a soft glow around us.
they dance slowly,
a soothing backdrop to the rhythm of my hands.i trace the outline of Her heel,
feeling the delicate curves,
enthralled by Her foot's response.
with each gentle caress,
watching Her toes dance slightly,
a silent acknowledgement of my devotion.as if pulled by a magnetic force,
i lean in closer,
inhaling the sweet aroma of lavender,
it's floral notes fused with the radiance of Her scent.
a sense of peace settles within me.
the weight of the day lifts,
replaced by the comforting embrace of surrender.
i'm here to please Her,
i'm here to honor Her,
i'm here to love Her.
lost in the act of serving,
i feel Her energy flow through me,
binding us together.
closer.as i finish,
i look back up at Her.
my heart swells with pride.
She smiles down at me,
a knowing glimmer in Her eyes.
igniting a fire within me—
a sense of belonging.
right now,
i know exactly where i need to be—
kneeling before Her,
fully aligned with Her presence.in these cherished rituals,
in this sacred exchange,
i find my place.
forever devoted..."I love you, sweet boy." She whispers,
Her words deeply resonating,
echoing the truth of my heart—
that i am completely and utterly Hers. -
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28As valas comuns de Manaus
https://www.terra.com.br/noticias/brasil/cidades/manaus-comeca-a-enterrar-em-valas-coletivas,e7da8b2579e7f032629cf65fa27a11956wd2qblx.html
Todo o Estado do Amazonas tem 193 mortos por Coronavirus, mas essa foto de "valas coletivas" sendo abertas em Manaus tem aproximadamente 500 túmulos. As notícias de "calamidade total" já estão acontecendo pelo menos desde o dia 11 (https://www.oantagonista.com/brasil/manaus-sao-paulo-e-rio-de-janeiro-nao-podem-relaxar-com-as-medidas-de-distanciamento/).
O comércio está fechado por decreto desde o final de março (embora a matéria diga que as pessoas não estão respeitando).
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ d6affa19:9110b177
2025-03-02 19:27:10Wander — 19:27
It’s been a long, rough day.
The fresh air feels good,
but my mind is still trapped,
stuck in that office,
its fluorescent lighting,
archaic and noisy,
still buzzes behind my eyes.
Closing that sale was grueling—
the customer’s incessant demands—
they still press against my skull.
My patience feels razor-thin,
the weight of the day settling on my shoulders.On my way to the apartment,
I catch a glimpse of the setting sun.
Its warm hues contrast my somber demeanor.
I check my phone again,
scrolling through my messages.
...
Nothing new…
I haven’t heard from her in hours—
only left on “read.”I let out a sigh.
My body feels heavy.
This day has just dragged on forever.Walking up to the apartment door,
I fumble a bit with my keys,
the metal clinks,
I struggle to find the right one.
Upon entering the dimly lit apartment,
I see her sitting on the sofa,
dressed as if she’s getting ready to leave.Ugh, I don’t feel like going anywhere tonight…
She looks up from her phone,
our eyes locking.
“You didn’t let Me know you were on your way,” her tone sharp.A hint of disappointment in her eyes—
subtle, but pointed.
A silent judgment.
A reminder of my failure—
of a broken word of honor.But my pride,
like a protective big brother,
overshadows the regret gnawing at me,
feeding my mind with justifications.She didn’t respond earlier—
to my messages.
Not a single word.
And now, all of a sudden,
communication matters?
My eyebrows furrow.
My hands clench.“I told you I’d be late today, didn’t I?” I finally answer,
trying to keep my voice steady.
Her nonchalant expression shifts,
becoming more annoyed.“And that has nothing to do with your promise to let Me know when you’re leaving,”
she fires back,
arms folded across her chest.Her voice cuts through the air.
“Now go get cleaned up. I’m hungry and we have a little bit of shopping to do.”I subtly bite at my lip.
A dull pain.
A distraction.
Anything to manage the tension.Taking a seat on the sunken foyer’s edge,
I slowly remove my shoes,
lingering in defiance.Today has been so stressful…
Doesn’t she see that I’m exhausted?
Maybe I don’t want to go back out.
Does she even consider how I feel?
Maybe she’d know if she just asked.“Hey! Are you listening?” She snaps,
impatience saturating her tone.
“What’s wrong?”I remain seated,
and turn my head toward her,
meeting her gaze—
a fierce expression now on her face.A heavy sigh escapes me.
Honestly, I don’t want to tell her no.
But the thought of getting back out…
It feels unbearable.“I’m just so tired,” I finally admitted,
shoulders slumping.She seems unconvinced.
“There’s more to it than that,” she posits,
her eyes piercing through my defenses.
“What is it? Tell me what’s going on.”I turn my head away.
Shame tightens around me,
suffocating, silencing.
From the hurt I feel—
over some ignored messages.
Just a few simple messages…
It seems juvenile.
But it’s amplified by her disregard for my situation.
It stings, and I can’t find the words to express it.
Nor would I if I could.…
At some point, she moved.
I didn’t hear her.
I didn’t see her.
But I feel her now—
towering over me.
Close.
Her presence,
it’s tangible,
like a weight bearing down on me.Looking up at her,
our angry expressions collide,
the air thickens with unspoken tension.
I notice my heart beating faster—
Not only from the conflict,
but from her aura…There’s a shift in her energy.
A quiet intensity brewing beyond her expression.
Have I pushed her too far with my silence..?
Veil — 19:38
With a swift motion,
she lunges forward,
pushing me to my back.
Her weight settles on my stomach,
pinning me to the floor.My breath catches.
Her scent—something floral..?
Jasmine…
It melds with her natural aroma,
igniting my senses.The softness of her skin,
the pressure of her body above me;
they contrast sharply,
a blend of elegance and power."W-what are you doing!?" I exclaim, the surprise evident in my voice.
Her response is immediate.
"I won't tolerate you moping or acting out tonight, boy. Now tell Me what's wrong," she demands,
her voice sharp as a knife.I'm stunned.
A fire burns in my chest—
is it anger?
Or something else?
Embarrassment settles in,
uninvited, heating my face,
her eyes piercing into me."I already told you, I-I'm just tired. There's no need for this!" I plead,
muscles tensing as I try to push her off."Stop pushing!" she commands.
I resist,
frustration spilling over.
"Get off!"Attempting to restrain me,
she grabs my wrists.
But I'm stronger,
easily breaking her grip.
I interlock our hands,
pushing back,
trying to lift her."I said stop!" she asserts,
her voice firm,
unyielding.I continue to push,
arms fully extended.But she suddenly shifts.
Her weight crashes forward,
pinning my arms above my head.
I can’t push from this angle.As she holds me down,
something mingles with the fluster—
an unexpected exhilaration...Her body hovers above mine,
our faces inches apart.
I'm trapped,
her hair falling around us like a curtain.
A predaceous look glimmers in her eyes—
she leans in closer,
jawline tightening,
eyes slowly narrowing,
asserting her dominance.
I can't resist inhaling Her scent,
it’s so distracting—
intoxicating.With every labored breath,
the warmth of Her body presses down on me.
Now sitting on my chest,
Her weight feels heavier,
oddly comforting.Her gaze pursues me.
I look away,
desperate to hide.My heart is racing.
It's overwhelming—
Her scent,
Her pressure,
the gleam in Her eyes.
I struggle to focus.Somehow, without me noticing,
our hands are no longer intertwined…
Instead, She holds my wrists—
tightly against the ground.Lost between defiance and surrender,
my body is betraying me,
not from fear,
but from curiosity.
Or is it a mixture?A shiver travels down my spine,
my body relaxes,
how did we get here..?The desire to resist is fading,
yielding to the magnetic pull of Her presence—
losing myself in Her orbit.Aware of my waning resistance,
a smug grin flashes across Her lips—
so captivating.
I’m melting."Good boy." She whispers into my ear.
Her words surround me like a warm embrace,
and Her smile—
the most precious sight in the world—
puts butterflies in my stomach,
a lightness in my head.
The frustration of the prior moment,
seems somehow…
distant.Still holding my wrists,
She looks down at me,
taking in the moment—
savoring it."Who is your Queen?" She finally asks,
Her voice gentle and sweet.I feel a storm within,
emotions crashing like a tsunami.
Pulling me back to the present—
regret, devotion, shame—
all colliding together.
How She hurt me.
How I failed Her.
I try to look away.
A hint of defiance persisting..."Answer me." She demands,
Her soft tone hardening.
"Who is your Queen?"I pause,
Her gaze weighing more than Her body.
My heart pounds,
and for a moment,
I'm lost in the depths of Her eyes,
searching for an escape—
an escape that isn’t there...The silence stretches,
heavy and expectant.
My throat tightens,
heart pounding—
betraying me..?
Or leading the way?With a resigned breath,
I whisper, "You are..."She immediately follows up,
"And who do you obey?"
Her tone still harsh.My eyes plead to Her fierce gaze,
swallowed in shame.
Begging to avoid the obvious answer,
because of my guilt—
because of my broken promise.
but Her stare is unrelenting,
and I divert my eyes once more."Look at me," She commands sharply,
"Who do you obey?"My eyes instinctively comply,
Her grin now replaced by a stern expression.With no other option,
I mutter my surrender, "...You."
The word slips out,
a quiet truth that echoes in between us,
heavy with contrition,
but liberating."Now answer properly," She demands,
"Who do you obey?""I obey You, my Queen."
The words spill effortlessly from my lips,
weightless and freeing."That's right." She proudly replies.
She releases my wrists and sits up,
a triumphant smile gracing Her lips.
Those enchanting lips…
That beautiful smile…With my arms free,
I feel a mix of relief and lingering tension,
my heart still racing from the struggle.A whirlwind of emotions continue to swell—
shame, regret, adoration—
neglect and dismissal—
longing—
disappointment…And the sight of Her beauty aches—
yet, despite my surrender,
something in Her eyes tells me…She’s just getting started.
Stricken — 19:46
The sun has set.
Its remaining beams peering through the glass door,
filling the room with an orange hue.Her silhouette is framed by the fading light—
imposing, inescapable.
She looms over me,
Her shadow stretching,
covering,
consuming.I lie underneath Her—
underneath Her shadow—
between breath and reverence,
desperately searching,
looking for the right words,
but only stare.I feel trapped.
Not by Her,
but by my own self—
the walls I put up.
Unable to express my regret.
For how I failed Her.
For my own hurt feelings…When suddenly,
and surprisingly,
She slaps me.
Her palm releases a sharp crack,
a sound that echoes in the stillness.
The impact burns on my left cheek,
forcing me to wince,
the world tilts for a heartbeat,
returning me to the moment.Slightly disoriented,
my hands cover my face,
instinctively guarding."Put your hands down." She orders,
Her voice firm.
I hesitate—
caught between instinct and obedience.
Tension coils in my chest.She takes my hand,
tucks it to my side,
and pins it with Her thigh.I don't resist.
She does the same with my other hand,
leaving me unguarded—
vulnerable.Her grip is tight—
constraining.
My senses feel heightened.
The warmth of Her skin—
so smooth against my own—
presses against me.
Deceptively soothing.
A paradox of wrath and comfort,
leading me deeper into the moment.I watch Her draw back Her hand,
preparing another slap.
a stoic look etched across Her face.
My breath catches,
the air is thick with unspoken words.
Yet, strangely,
my heartbeat steadies,
my body relaxes,
ready to absorb Her frustrations.Her hand lands forcefully,
slamming into my left cheek once again,
the sting tight and harsh.
I wince again,
losing focus,
struggling to meet Her gaze."Apologize to me." She commands harshly.
Before I can orient myself,
before I can respond,
She slaps me again.
And again.
And again.
And again.
Each strike lands like a thunderbolt—
a wrecking ball to the walls I’ve built.A fiery pulse ignites my face,
blending with a deviant thrill—
something coursing through me,
blurring agony and bliss.
My eyes form tears.
I fight desperately to hold them back."I said apologize!" She hisses,
Her tone as sharp as Her slaps.
I look up at Her,
trying to focus,
and catch Her expression—
impassive, demanding,
yet with a soft glimmer in Her eyes—
so gorgeous...A warmth radiates from Her,
it blends with the heat from my cheek,
amplifying Her pull,
leaving me breathless,
utterly subject to Her will."I… I'm sorry…" I whimper,
the words barely escaping my lips,
laced with a mixture of shame and exhilaration."For what?" She asks,
Her lips curl,
a blend of annoyance and...
something, something—
primal.I try to take another deep breath,
it's difficult with Her weight pressing down.
My pride aches as much as my face.
I barely maintain composure,
my eyes unable to escape Her gaze.She strikes again,
forcefully,
without warning.
My head snaps to the side,
leaving an imprint on my soul itself.
The barriers I’ve placed—
their remnants—
are completely shattered,
freeing the truth."For disobeying You!" I nearly cry.
The admission tastes bittersweet on my tongue.
It feels like a release,
the confession washing over me,
leaving me breathless and exposed.She lets out an amused laugh.
The smile She was fighting back breaks through,
a satisfied grin that lights up Her face.
My heart to skips a beat.But She's not finished yet.
Purge — 19:52
"And how exactly did you disobey me?" She asks,
already knowing the answer.She's going to make me own it…
The buzzing on my cheek—
a subtle reminder to comply."For not letting You know when I left." I meekly respond.
"And..?" She questions,
not satisfied with the previous answer."And for not getting ready when you asked…" I amend,
my voice barely above a whisper."And..?" She continues,
Her tone becoming impatient.But I'm at a loss—
unsure.
What is She seeking?
My mind races,
desperately searching,
looking for the right words.…
But none come.
Panic sets in,
gnawing, deep—
am I failing Her again?
Was I being too much?
Too needy?
I can’t explain this ache in my chest…She looks down at me,
Her expression softening."For not telling me what's bothering you." She says,
guiding me to the answer."I'm your Queen, and I deserve for you to be honest with Me about everything—“ She continues,
Her voice carrying a tenderness,
cutting through the tension.
“you should feel safe enough to tell Me anything…"My body is still,
yet it feels as if it’s trembling fiercely.
I can only stare.“You don’t have to hide anymore...”
She continues,
“You’re safe now…”My heart feels cracked open.
Lying beneath Her,
restrained and exposed—
and now with Her words…Her voice hangs in the air,
slicing through the chaos.
She's reached into my heart,
through the walls and the barriers,
amidst the insecurities and doubts—
the fear and pain—
touching the essence that is truly me,
with nothing standing in Her way.I look up at Her angelic face,
into Her divine eyes,
and with no more hesitation,
I express what seemed impossible before."I felt… hurt, like You were ignoring me…" the confession falls out clumsily.
“Like… like I wasn’t worth the attention…” my chest tightens more as I speak,
each word breathing life into the hurt I tried to bury.
"Even after such a hard day..."I see the look on Her face change,
Her gentle expression slipping away,
revealing a raw vulnerability.
Silence fills the space between us."And..." I continue,
"And it’s stupid, I know… I’m sorry for being too much, I-I couldn’t help it…" my voice breaking,
“I just… needed You, so much… and you didn’t even message me back… I felt invisible…”I take a moment to regain my composure.
"Like, I know I was supposed to let You know that I was on my way, but... I... I was just so angry... I'm sorry… and it just seems so childish now…" I finish through tears.
The last piece of me lain bare.Her hand slowly reaches down,
caressing my cheek.
Her fingers trace across my skin,
gentle, light—
a stark contrast from the slaps earlier.
The tears linger,
a reminder of all I’ve kept from Her.
Her palm cups my cheek,
softer than I’ve ever known,
and I see in Her eyes,
Her own tension,
a glimmer of regret...“I…” Her voice trembles.
She catches Herself,
maintaining control.But there’s something else—
an unease.
"I didn’t realize… I should have known.” She continues.
“You needed me and I wasn’t there for you, was I?"She looks down,
Her gaze escapes my eyes,
and for a moment,
I see the disappointment in them—
the disappointment in Herself, too.
Her divine presence alters,
revealing a more human beauty…I nod,
feeling the weight of my admission.Her eyes meet with mine again,
shimmering with unshed tears.
She simply stares,
taking it in for a brief moment,
the words settling between us,
forming a bridge that connects our spirits."I'm so sorry, My sweet boy." She says,
trying to hold a steady demeanor.
"I had no idea you needed Me so much today… I was interrupted after reading your message and never followed up. Oh, sweetie, I'm so sorry I wasn't there for you… that I let you down… you’re not… you’re not ‘too much.’"With both arms,
She reaches around my head,
and gives me a powerful embrace.
The hug is so tight that I can barely breathe.
She begins saying something else,
but it sounds muffled,
I can't make it out.And yet, it doesn't matter.
Her words—
Her acknowledgment...
the tension inside me begins to unravel.And, despite Her increasing pressure on top of me,
it’s as if the weight of the world has been lifted from my chest,
replaced by a serene joy that blossoms within—
from knowing that She cares,
that She was able to reach out and guide me to the honesty of my confession,
creating a space where we could see each other authentically.Her arms tighten around me,
I melt into Her embrace.
My heart pounds.
But not frantically—
it’s steady now,
slow, calming,
like a gentle wave.
Her breath against my neck,
warm and soothing,
Her embrace,
feels like a sanctuary,
where my heart can rest and heal.Everything fades,
only the sound of Her heartbeat,
it intertwines with mine,
forming a profound connection.
I dare not move,
I dare not disturb this moment,
not for air,
not for life itself—
this closeness is all I crave,
and I would die for it.…
Then,
just like that,
the moment fades.
Her arms loosen,
the weight of Her touch lifts,
leaving an emptiness.My body feels light,
but my heart is heavy—
full.I need a moment,
in this space,
in the silence,
to gather the pieces of myself—
the pieces She’s helped reveal.
Bound — 20:04
She releases Her grip on me,
returning Herself to a seated position.
I inhale sharply,
much-needed air filling my lungs.
She lets out an adorable chuckle at the sight.My vision clears,
drawn to Her beautiful smile."So, will you forgive Me, sweet boy?" She asks, wiping a few tears from Her own eyes.
"Of course, my Queen." I respond almost reflexively.
"Will You forgive me?"She leans down,
Her lips pressing lightly on my forehead.
"I already have, My sweet boy," She smiles.The warmth of Her kiss lingers,
sending a shiver down my spine.She stands up,
relieving the pressure on my chest.
My lungs seize the opportunity,
pulling in air.
But the relief is fleeting—Her foot crashes down,
pressing me back into the ground.
Her weight returns—
focused,
steady,
absolute.
I’m breathless again—
by the force She exerts,
and the sight of Her over me.She stands poised,
effortless.
A Queen assessing Her property.
The look in Her eyes sharpens again,
though this time,
amusement dances behind them.She shifts Her weight slightly,
a small, deliberate adjustment.
The pressure deepens,
spreading through my chest—
slow, rolling,
a silent warning."And don't you ever give me a reason to do this to you again, do you understand me, boy?" She asks,
the weight increasing,
firm and steady.
My body strains beneath Her foot,
not quite pain,
something heavy,
something consuming,
part of me craving more…"Yes, my Queen." the words escape,
slipping through shallow breaths.
I wince,
but the feeling is not unwelcome—
it feels grounding,
reassuring.She presses a little more.
A test..?
I instinctively tense,
but don’t resist.
Our clothing dulls the sensation,
but amplifies something deeper—
the certainty of Her control,
the reality of Her dominance."I need you to be open and honest with your feelings, got it?" She continues,
Her tone firm,
and yet warm,
welcoming."Of course, my Queen." I vow instantly,
the words feeling like both a promise and a plea."Good boy." She adds with a satisfied grin spreading across Her face,
lighting up Her features.
"Now, get yourself cleaned up, I'm hungry and we have some shopping to do."She lingers for a moment.
Then with a slow, deliberate motion,
She finally lifts Her foot from my chest.
The absence is sudden.
The liberation…
unnatural.
Wrong.My chest rises sharply,
filling with air once again,
the breath She has granted me.Above me,
She smiles,
admiring Her handiwork.
There’s a sense of satisfaction in Her expression,
a silent acknowledgment of our shared moment."Yes, my Queen. Thank You, my Queen." I say to Her with a smile,
my heart swelling with gratitude.But there’s something else…
I hesitate.
The words are there,
on the tip of my tongue.
Will She welcome them..?
Acknowledge them..?<She watches me closely,
aware,
waiting,
Her eyes softening,
enough to make my heart stutter.
But I can’t hold them in any longer—…
"…I love You," I add,
the words spilling out of me. -
@ 592295cf:413a0db9
2024-10-26 13:39:00[Week 21-10] I thinks that Saylor is on right, don't trust verify, is bullshit Bitcoin is a financial tool! I think it's good for me to get away from social media once a week. I could do things outside, like walking. Take pictures of the landscape. The weirdest thing is when the alarm calls you up in an hour.
Fiatjaf wants a cache client. I feel like I can do it, I have the set to do it, but nostrudel is no longer working, so it's a little murky. Next nostrudel does not accept changes to settings (It works now!), so maybe i can think something. I want to make a corny chat, test, read this article. Nostr doesn't work with a vpn because relays don't know who you are. jokes aside, some clients have difficulties.
I couldn't take pictures of the landscape if I didn't take the wind blades. Small local controversy.
Missing the point of content creator. Simply for final user, Simply for the creator, new feature, no missing nothing. I'm trying to limit everything to writing for a week. I almost did. Maybe another week can do well.
Meanwhile I updated apps like Amber and Voyager, coracle, nostrmo.
The experiment continues with open vibe following the trending of Nostr. I'm following almost 120 npub. He'll stop, I don't know, possible he's already reached the limit. You still can't block words on the Nostr side of Open, strange thing. The app doesn't count the follow well, still some problem cleaning the cache seems that it doesn't need. After a while open and close and seems updated. I wanted to try open librarian, but I was busy sending fake zap on Nostr. This morning i try and It keeps giving me error 500 when I try to connect to a relay.
I hate when a profile follows everyone indistinctly, why does everyone follow? and in voyage, I read with WoT setting, I probably have to do unfollow. There must be an indication in which not include the followers of this person in the web of trust, I would do it by default if you follow more than 600 people.
WoT on Nostr Visualized post on stackernews
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ 2b1964b8:851949fa
2025-03-02 19:00:56Routine Picture-in-Picture American Sign Language Interpretation in American Broadcasting
(PiP, ASL)
Picture-in-picture sign language interpretation is a standard feature in news broadcasts across the globe. Why hasn’t America become a leader in picture-in-picture implementation too?
Misconception.
There are prevalent misunderstandings about the necessity of ASL interpreters in the media and beyond. As recently as January 2025, an American influencer with ~10M social followers on Instagram and X combined, referred to sign language interpreters during emergency briefings as a distraction.
Such views overlook the fact that, for many deaf individuals, American Sign Language is their primary language. It is wrongly assumed that deaf Americans know—or should know—English. American Sign Language differs in grammatical structure from English. Moreover, human interpreters are able to convey nuances that captions often miss, such as non-manual markers; facial expressions, body movements, head positions utilized in sign language to convey meaning. English is the native language for many hearing Americans, who have access to it throughout the United States without any additional expectation placed upon them.
A deeper understanding reveals that many nations have their own unique signed languages, reflecting their local deaf culture and community — Brazilian Sign Language, British Sign Language, Finnish Sign Language, French Sign Language, Japanese Sign Language, Mexican Sign Language, Nigerian Sign Language, and South African Sign Language, among numerous others.
Bottom Line: American Sign Language is the native language for many American-born deaf individuals, and English is the native language for many American-born hearing individuals. It is a one-for-one relationship; both are equal.
In an era where information dissemination is instantaneous, ensuring that mainstream broadcasts are accessible to all citizens is paramount.
Public Figures Including Language Access In Their Riders
What's a rider? A rider is an addendum or supplemental clause added to a contract that expands or adjusts the contract's terms. Riders are commonly used in agreements for public figures to specify additional requirements such as personal preferences or technical needs.
A Simple Yet Powerful Action
Public figures have a unique ability to shape industry standards, and by including language access in their riders, they can make a profound impact with minimal effort. * On-site American Sign Language interpretation ensures that deaf and hard-of-hearing individuals can fully engage with speeches and live events. * Open captions (burned-in captions) for all live and post-production interview segments guarantee accessibility across platforms, making spoken content instantly available to a wider audience. These implements don’t just benefit deaf constitutents—they also support language learners, individuals in sound-sensitive environments and any person who relies on, or simply refers, visual reinforcement to engage with spoken content.
For public figures, adding these 2 requests to a rider is one of the most efficient and immediate ways to promote accessibility. By normalizing language access as a standard expectation, you encourage event organizers, broadcasters, and production teams to adopt these practices universally.
As a result, there will be an industry shift from accessibility as an occasional accommodation to an industry norm, ensuring that future events, interviews, and media content are more accessible for all. Beyond immediate accessibility, the regular presence of interpreters in public spaces increases awareness of sign language. Seeing interpreters in mainstream media can spark interest among both deaf and hearing children to pursue careers in interpretation, expanding future language access and representation.
Year-Round Commitment to Accessibility
Too often, language access is only considered when an immediate demand arises, which leads to rushed or inadequate solutions. While some events may include interpretation or captioning, these efforts can fall short when they lack the expertise and coordination necessary for true disability justice. Thoughtful, proactive planning ensures that language access is seamlessly integrated into events, rather than being a reactive measure.
Best practices happen when all key players are involved from the start: * Accessibility leads with combined production and linguistic knowledge who can ensure accessibility remains central to the purpose rather than allowing themselves to be caught up in the spectacle of an event. * Language experts who ensure accuracy and cultural competency.
* Production professionals who understand event logistics.By prioritizing accessibility year-round, organizations create spaces where disability justice is not just accommodated, but expected—ensuring that every audience member, regardless of language needs, has access to information and engagement.
-
@ 599f67f7:21fb3ea9
2024-10-20 11:28:08LNDhub te permite importar fácilmente una billetera en aplicaciones compatibles. Si bien puedes guardar tu billetera Bitcoin Txoko LNbits en tu teléfono como una aplicación web progresiva (PWA), una aplicación nativa como Zeus o BlueWallet ofrece una mejor experiencia de usuario así como un mayor nivel de seguridad. Con Alby, también puedes importar la billetera a la extensión de tu navegador para facilitar los pagos Lightning en la web y para los zaps de Nostr. Por suerte para nosotros, todas estas billeteras hablan un lenguaje común llamado LNDhub.
En esta guía cubriremos cómo importar la billetera a tu navegador y a tu móvil. Si quieres usar tu billetera tanto en el navegador como en tu móvil, empieza con la configuración de Alby, ya que uno de los pasos te permitirá importar fácilmente tu billetera también a Zeus. Pero si sólo te interesa utilizar la billetera en tu móvil, puedes pasar directamente a la sección de Zeus.
Alby
nostr:nprofile1qqsyv47lazt9h6ycp2fsw270khje5egjgsrdkrupjg27u796g7f5k0s8jq7y6 es una extensión de navegador que lleva Lightning y Nostr a tu navegador. Utilizando el protocolo WebLN, esta extensión puede detectar facturas LN en paginas web y pagarlas, así como posibilita iniciar sesión en sitios web con Lightning. También puedes fijar presupuestos para tus sitios favoritos de Lightning. Por otro lado también puedes utilizarla para firmar en Nostr utilizando NIP-07, lo cual es mucho más seguro que ingresar tu clave privada en clientes web.
¿Qué necesito?
- Un navegador web que soporte extensiones Chrome o Firefox
- Acceso a tu billetera LNbits. Si todavía no tienes una billetera LNbits, dirígete a nuestra página de billeteras y crea una
- (Opcional) Un dispositivo móvil para configurar Zeus
1. Habilita la extensión LNDhub en tu LNbits wallet
Dirígete a tu billetera LNbits. Haz clic en
Extensiones
y habilita la extensiónLNDhub
. Una vez se haya habilitado, dirígete a la página de extensión de LNDhub.2. Instala la extensión Alby
Dirígete a getalby.com y instala la extensión desde el store de extensiones del navegador. Configura tu contraseña de desbloqueo y guárdala en un lugar seguro.
3. Importar a Alby
(Esta es una billetera de prueba. No hay fondos en ella. ¡No muestres a nadie tu URI de exportación real!)
En la siguiente pantalla, elige
Conectar
y luego eligeLNDhub
. Vuelve a tu extensión LNDhub y copia la URL de conexión. Pégala en el campoURI de exportación de LNDhub
. Pulsa continuar. ¡Ahora deberías haber estado conectado a tu billetera de LNbits con LNDhub!💡 Puedes elegir entre la URL de la factura (Invoice URL) y la URL de administración (Admin URL). Le dan a Alby diferentes permisos para interactuar con tu cartera de LNbits.
- La URL de factura te permite crear facturas y recibir pagos
- La URL de administración también te permite enviar pagos
4. Configurar Zeus con Alby (opcional)
Ahora que ya has conectado tu LNbits con Alby, también puedes importarlo de una manera sencilla a Zeus con Alby. Abre la extensión, haz cilc en el nombre de tu billetera y navega a la configuración de la cuenta. En
Wallet Settings
>General
se encuentra la opción de conectar tu billetera móvil. Al pulsar conectar, se mostrará un código QR para escanear desde Zeus.Si no tienes instalada Zeus con anterioridad, dirígete a zeusln.app y descarga la aplicación de Zeus para tu sistema operativo móvil.
Una vez tengas descargado Zeus, entra en
Configuración
>Añadir un nuevo nodo
. Aquí puedes escanear el código QR que te muestra Alby para importar la billetera.Voilà! Ahora tienes el poder de Lightning al alcance de la mano ¿Ya te sientes como un dios?
Zeus
nostr:nprofile1qqsrf5h4ya83jk8u6t9jgc76h6kalz3plp9vusjpm2ygqgalqhxgp9g84ctjf es una formidable aplicación de código abierto que permite conectar tu propio nodo a tu dispositivo movil. Es compatible con todas las principales implementaciones de nodos Lightning, como LND, CLN y Eclair, así como conexiones a través de Tor y clearnet. Recientemente también han anunciado su propio LSP (Lightning Service Provider).
¿Qué necesito?
- Teléfono Android o iOS
- Otro dispositivo en el que puede acceder a tu billetera LNbits (para mostrar el código QR para escanear)
- Acceso a tu billetera LNbits. Si todavía no tienes una billetera LNbits, dirígete a nuestra página de billeteras y crea una
1. Descarga Zeus
Puedes descargar la aplicación Zeus para tu sistema operativo aquí.
2. Habilita la extensión LNDhub en tu billetera LNbits
Dirígete a tu billetera LNbits. Haz clic en
Extensiones
y habilita la extensiónLNDhub
. Una vez habilitada, abre la pagina de la extensión LNDhub.3. Importar a Zeus
Ve a
Configuración
>Añadir un nuevo nodo en Zeus
.Escanea la cartera que quieras instalar.
💡 Puedes elegir entre la URL de la factura (Invoice URL) y la URL de administración (Admin URL). - La URL de la factura te da permiso para generar facturas y recibir pagos. - La URL de administración también te permite enviar pagos.
Una vez que hayas escaneado el código QR, todos los campos en Zeus deberían rellenarse automáticamente. También puedes añadir un apodo para tu billetera.
¡Ahora puedes guardar la configuración del nodo y controlar la billetera desde tu teléfono!
Extra
Zeus también ofrece funciones interesantes como temas personalizados, conversiones de precios, modo acechador y verificación biométrica. Estos temas están más allá del alcance de esta guía, ¡juega en la aplicación y descubre todas esas características por ti mismo!
-
@ 6e0ea5d6:0327f353
2025-03-02 15:01:24Ascolta bene! Forget the State, the Parties, and the Ideologies of bureaucrats! Let your own business, interests, and money be your greatest political allegiance.
Do not swear loyalty to a flag that despises you. Loyalty to family is the rock upon which true honor is built. In times of uncertainty, your devotion to blood ties must be unconditional, for family is the foundation that sustains your very existence. But remember: blood makes relatives, loyalty makes a family.
Loyalty is not just a virtue but a moral obligation. Betraying the trust of family is the greatest sin—an act that not only destroys relationships but also the essence of belonging to something greater.
A truly loyal man understands that family is a reflection of his own soul. He knows that each member is an extension of himself, and protecting these bonds is an extension of protecting his own identity. Amidst the storms of adversity, stand firm, for a family, like a ship, only reaches safe harbor when all its crew members work in unison.
So, amico mio, keep this truth in your heart: loyalty to family is the fortress that withstands all storms. Without it, a man is like a leaf in the wind—directionless and purposeless.
Hold fast to your principles, honor your commitments, and never, under any circumstance, abandon those dearest to you. Only then will you find the true peace and honor that come from fulfilling your sacred duty.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 592295cf:413a0db9
2024-10-13 08:29:48[07/10 week]
Thinking about it, even the protocol is a cathedral, Rabble in the speech in Riga on Bluesky.
He said the protocol is a bazaar. But you have to converge on the scheme in the NIPs or between Apps.
NIPs for example are like Luther's 95 theses, but they change continuously and adapt, but they always remain those 95.
Maybe that Pr on theother curve keys could lead to saying this is "nostr" these others are similar. Creating more points, but I just think it would have led to endless diatribes.
What will be of the protocol and who knows. He can do everything or maybe nothing and from tomorrow we will see and it will be, it will be what it will be. Italian Song
Notifications with nostter are not hidden, they are in your feed and this is good, you always know if someone has searched for you. While in the others you do not know.
I saw a sliver of light pass by it was Unanimity.
It's a very stupid idea, it takes a long time. it's basically a community + channel, where you post the channel in the community and start talking about that topic in the channel. The channel is an approved message. I made musicbook channel, it's the collection of albums released on Friday. The idea of also making a blogger channel, where to put long-form articles.
Following nostr trending on Openvibe social, with a new profile, the Lost One, sad, in this One follow fiatjaf, means I won't bother him anymore . Now I follow 62 profiles, it's an account that I will use to read the notes of the top profiles. Curious if this number will grow enormously or is there a spectre.
The strength of the protocol is the developers if they collaborate together, otherwise it can still work, everyone goes their own way, but it's like saying I want to make my own fence.
One who in his long form doing an analysis of the various social networks. npub19mq9swna4dkhlm3jaux4yhgv5kjj556lkfhv3qnjtyh0kcljph6s88e295 Nostr is all based on Bitcoin. The difficult thing is Bitcoin not Nostr and he says so.
Controversies are useful, or my doubts, but maybe people who can't write code don't understand much, the so-called end users. No one is an end user at this time. The end user doesn't care about the person behind it, only having their own service, if the service is good they also do promotion, they become sponsors. We have seen in recent months sponsoring a Nostr app, result a small attack can damage that app. But the strength of having all these apps is that the other app doesn't have that problem. Spam attack example. The problem is that you can't sponsor an ecosystem, so it becomes difficult to suggest 10 apps to download. The best 10 apps of Nostr and the other 100, there is no easy way out. It's a bit like proposing a new place in NY, then everyone goes to that place and it loses a bit. What the sponsor must understand is that Nostr has only one "one shot".
I saw a video on Nostr of two people posting content on social media, making a review. Not bad, compared to the previous video, that Nostr doesn't even have a token. It doesn't give me a sign up. The main feature they say is a platform or at least they reviewed damus, damus for Bitcoin maxi. And so Nostr is populated by people who Number go up, only fiat thought they would say on Nostr. It's true in part there are those obsessed, even the non-obsessed are obsessed.
How nice it would be to call them NPs Nostr protocol specification, today supertestnet called them that. (the nice thing is that they are pronounced the same way).
-
@ 47750177:8969e41a
2024-10-05 17:40:2528.0 Release Notes
Bitcoin Core version 28.0 is now available from:
This release includes new features, various bug fixes and performance improvements, as well as updated translations.
Please report bugs using the issue tracker at GitHub:
https://github.com/bitcoin/bitcoin/issues
To receive security and update notifications, please subscribe to:
https://bitcoincore.org/en/list/announcements/join/
How to Upgrade
If you are running an older version, shut it down. Wait until it has completely shut down (which might take a few minutes in some cases), then run the installer (on Windows) or just copy over
/Applications/Bitcoin-Qt
(on macOS) orbitcoind
/bitcoin-qt
(on Linux).Upgrading directly from a version of Bitcoin Core that has reached its EOL is possible, but it might take some time if the data directory needs to be migrated. Old wallet versions of Bitcoin Core are generally supported.
Running Bitcoin Core binaries on macOS requires self signing.
cd /path/to/bitcoin-28.0/bin xattr -d com.apple.quarantine bitcoin-cli bitcoin-qt bitcoin-tx bitcoin-util bitcoin-wallet bitcoind test_bitcoin codesign -s - bitcoin-cli bitcoin-qt bitcoin-tx bitcoin-util bitcoin-wallet bitcoind test_bitcoin
Compatibility
Bitcoin Core is supported and extensively tested on operating systems using the Linux Kernel 3.17+, macOS 11.0+, and Windows 7 and newer. Bitcoin Core should also work on most other UNIX-like systems but is not as frequently tested on them. It is not recommended to use Bitcoin Core on unsupported systems.
Notable changes
Testnet4/BIP94 support
Support for Testnet4 as specified in BIP94 has been added. The network can be selected with the
-testnet4
option and the section header is also named[testnet4]
.While the intention is to phase out support for Testnet3 in an upcoming version, support for it is still available via the known options in this release. (#29775)
Windows Data Directory
The default data directory on Windows has been moved from
C:\Users\Username\AppData\Roaming\Bitcoin
toC:\Users\Username\AppData\Local\Bitcoin
. Bitcoin Core will check the existence of the old directory first and continue to use that directory for backwards compatibility if it is present. (#27064)JSON-RPC 2.0 Support
The JSON-RPC server now recognizes JSON-RPC 2.0 requests and responds with strict adherence to the specification. See JSON-RPC-interface.md for details. (#27101)
JSON-RPC clients may need to be updated to be compatible with the JSON-RPC server. Please open an issue on GitHub if any compatibility issues are found.
libbitcoinconsensus Removal
The libbitcoin-consensus library was deprecated in 27.0 and is now completely removed. (#29648)
P2P and Network Changes
- Previously if Bitcoin Core was listening for P2P connections, either using
default settings or via
bind=addr:port
it would always also bind to127.0.0.1:8334
to listen for Tor connections. It was not possible to switch this off, even if the node didn't use Tor. This has been changed and nowbind=addr:port
results in binding onaddr:port
only. The default behavior of binding to0.0.0.0:8333
and127.0.0.1:8334
has not been changed.
If you are using a
bind=...
configuration withoutbind=...=onion
and rely on the previous implied behavior to accept incoming Tor connections at127.0.0.1:8334
, you need to now make this explicit by usingbind=... bind=127.0.0.1:8334=onion
. (#22729)-
Bitcoin Core will now fail to start up if any of its P2P binds fail, rather than the previous behaviour where it would only abort startup if all P2P binds had failed. (#22729)
-
UNIX domain sockets can now be used for proxy connections. Set
-onion
or-proxy
to the local socket path with the prefixunix:
(e.g.-onion=unix:/home/me/torsocket
). (#27375) -
UNIX socket paths are now accepted for
-zmqpubrawblock
and-zmqpubrawtx
with the format-zmqpubrawtx=unix:/path/to/file
(#27679) -
Additional "in" and "out" flags have been added to
-whitelist
to control whether permissions apply to inbound connections and/or manual ones (default: inbound only). (#27114) -
Transactions having a feerate that is too low will be opportunistically paired with their child transactions and submitted as a package, thus enabling the node to download 1-parent-1-child packages using the existing transaction relay protocol. Combined with other mempool policies, this change allows limited "package relay" when a parent transaction is below the mempool minimum feerate. Topologically Restricted Until Confirmation (TRUC) parents are additionally allowed to be below the minimum relay feerate (i.e., pay 0 fees). Use the
submitpackage
RPC to submit packages directly to the node. Warning: this P2P feature is limited (unlike thesubmitpackage
interface, a child with multiple unconfirmed parents is not supported) and not yet reliable under adversarial conditions. (#28970)
Mempool Policy Changes
-
Transactions with version number set to 3 are now treated as standard on all networks (#29496), subject to opt-in Topologically Restricted Until Confirmation (TRUC) transaction policy as described in BIP 431. The policy includes limits on spending unconfirmed outputs (#28948), eviction of a previous descendant if a more incentive-compatible one is submitted (#29306), and a maximum transaction size of 10,000vB (#29873). These restrictions simplify the assessment of incentive compatibility of accepting or replacing TRUC transactions, thus ensuring any replacements are more profitable for the node and making fee-bumping more reliable.
-
Pay To Anchor (P2A) is a new standard witness output type for spending, a newly recognised output template. This allows for key-less anchor outputs, with compact spending conditions for additional efficiencies on top of an equivalent
sh(OP_TRUE)
output, in addition to the txid stability of the spending transaction. N.B. propagation of this output spending on the network will be limited until a sufficient number of nodes on the network adopt this upgrade. (#30352) -
Limited package RBF is now enabled, where the proposed conflicting package would result in a connected component, aka cluster, of size 2 in the mempool. All clusters being conflicted against must be of size 2 or lower. (#28984)
-
The default value of the
-mempoolfullrbf
configuration option has been changed from 0 to 1, i.e.mempoolfullrbf=1
. (#30493)
Updated RPCs
-
The
dumptxoutset
RPC now returns the UTXO set dump in a new and improved format. Correspondingly, theloadtxoutset
RPC now expects this new format in the dumps it tries to load. Dumps with the old format are no longer supported and need to be recreated using the new format to be usable. (#29612) -
AssumeUTXO mainnet parameters have been added for height 840,000. This means the
loadtxoutset
RPC can now be used on mainnet with the matching UTXO set from that height. (#28553) -
The
warnings
field ingetblockchaininfo
,getmininginfo
andgetnetworkinfo
now returns all the active node warnings as an array of strings, instead of a single warning. The current behaviour can be temporarily restored by running Bitcoin Core with the configuration option-deprecatedrpc=warnings
. (#29845) -
Previously when using the
sendrawtransaction
RPC and specifying outputs that are already in the UTXO set, an RPC error code of-27
with the message "Transaction already in block chain" was returned in response. The error message has been changed to "Transaction outputs already in utxo set" to more accurately describe the source of the issue. (#30212) -
The default mode for the
estimatesmartfee
RPC has been updated fromconservative
toeconomical
, which is expected to reduce over-estimation for many users, particularly if Replace-by-Fee is an option. For users that require high confidence in their fee estimates at the cost of potentially over-estimating, theconservative
mode remains available. (#30275) -
RPC
scantxoutset
now returns 2 new fields in the "unspents" JSON array:blockhash
andconfirmations
. See the scantxoutset help for details. (#30515) -
RPC
submitpackage
now allows 2 new arguments to be passed:maxfeerate
andmaxburnamount
. See the subtmitpackage help for details. (#28950)
Changes to wallet-related RPCs can be found in the Wallet section below.
Updated REST APIs
- Parameter validation for
/rest/getutxos
has been improved by rejecting truncated or overly large txids and malformed outpoint indices via raising an HTTP_BAD_REQUEST "Parse error". These requests were previously handled silently. (#30482, #30444)
Build System
-
GCC 11.1 or later, or Clang 16.0 or later, are now required to compile Bitcoin Core. (#29091, #30263)
-
The minimum required glibc to run Bitcoin Core is now 2.31. This means that RHEL 8 and Ubuntu 18.04 (Bionic) are no-longer supported. (#29987)
-
--enable-lcov-branch-coverage
has been removed, given incompatibilities between lcov version 1 & 2.LCOV_OPTS
should be used to set any options instead. (#30192)
Updated Settings
- When running with
-alertnotify
, an alert can now be raised multiple times instead of just once. Previously, it was only raised when unknown new consensus rules were activated. Its scope has now been increased to include all kernel warnings. Specifically, alerts will now also be raised when an invalid chain with a large amount of work has been detected. Additional warnings may be added in the future. (#30058)
Changes to GUI or wallet related settings can be found in the GUI or Wallet section below.
Wallet
-
The wallet now detects when wallet transactions conflict with the mempool. Mempool-conflicting transactions can be seen in the
"mempoolconflicts"
field ofgettransaction
. The inputs of mempool-conflicted transactions can now be respent without manually abandoning the transactions when the parent transaction is dropped from the mempool, which can cause wallet balances to appear higher. (#27307) -
A new
max_tx_weight
option has been added to the RPCsfundrawtransaction
,walletcreatefundedpsbt
, andsend
. It specifies the maximum transaction weight. If the limit is exceeded during funding, the transaction will not be built. The default value is 4,000,000 WU. (#29523) -
A new
createwalletdescriptor
RPC allows users to add new automatically generated descriptors to their wallet. This can be used to upgrade wallets created prior to the introduction of a new standard descriptor, such as taproot. (#29130) -
A new RPC
gethdkeys
lists all of the BIP32 HD keys in use by all of the descriptors in the wallet. These keys can be used in conjunction withcreatewalletdescriptor
to create and add single key descriptors to the wallet for a particular key that the wallet already knows. (#29130) -
The
sendall
RPC can now spend unconfirmed change and will include additional fees as necessary for the resulting transaction to bump the unconfirmed transactions' feerates to the specified feerate. (#28979) -
In RPC
bumpfee
, if afee_rate
is specified, the feerate is no longer restricted to following the wallet's incremental feerate of 5 sat/vb. The feerate must still be at least the sum of the original fee and the mempool's incremental feerate. (#27969)
GUI Changes
-
The "Migrate Wallet" menu allows users to migrate any legacy wallet in their wallet directory, regardless of the wallets loaded. (gui#824)
-
The "Information" window now displays the maximum mempool size along with the mempool usage. (gui#825)
Low-level Changes
Tests
-
The BIP94 timewarp attack mitigation is now active on the
regtest
network. (#30681) -
A new
-testdatadir
option has been added totest_bitcoin
to allow specifying the location of unit test data directories. (#26564)
Blockstorage
- Block files are now XOR'd by default with a key stored in the blocksdir.
Previous releases of Bitcoin Core or previous external software will not be able to read the blocksdir with a non-zero XOR-key.
Refer to the
-blocksxor
help for more details. (#28052)
Chainstate
- The chainstate database flushes that occur when blocks are pruned will no longer empty the database cache. The cache will remain populated longer, which significantly reduces the time for initial block download to complete. (#28280)
Dependencies
- The dependency on Boost.Process has been replaced with cpp-subprocess, which is contained in source. Builders will no longer need Boost.Process to build with external signer support. (#28981)
Credits
Thanks to everyone who directly contributed to this release: - 0xb10c - Alfonso Roman Zubeldia - Andrew Toth - AngusP - Anthony Towns - Antoine Poinsot - Anton A - Ava Chow - Ayush Singh - Ben Westgate - Brandon Odiwuor - brunoerg - bstin - Charlie - Christopher Bergqvist - Cory Fields - crazeteam - Daniela Brozzoni - David Gumberg - dergoegge - Edil Medeiros - Epic Curious - Fabian Jahr - fanquake - furszy - glozow - Greg Sanders - hanmz - Hennadii Stepanov - Hernan Marino - Hodlinator - ishaanam - ismaelsadeeq - Jadi - Jon Atack - josibake - jrakibi - kevkevin - kevkevinpal - Konstantin Akimov - laanwj - Larry Ruane - Lőrinc - Luis Schwab - Luke Dashjr - MarcoFalke - marcofleon - Marnix - Martin Saposnic - Martin Zumsande - Matt Corallo - Matthew Zipkin - Matt Whitlock - Max Edwards - Michael Dietz - Murch - nanlour - pablomartin4btc - Peter Todd - Pieter Wuille - @RandyMcMillan - RoboSchmied - Roman Zeyde - Ryan Ofsky - Sebastian Falbesoner - Sergi Delgado Segura - Sjors Provoost - spicyzboss - StevenMia - stickies-v - stratospher - Suhas Daftuar - sunerok - tdb3 - TheCharlatan - umiumi - Vasil Dimov - virtu - willcl-ark
As well as to everyone that helped with translations on Transifex.
- Previously if Bitcoin Core was listening for P2P connections, either using
default settings or via
-
@ 592295cf:413a0db9
2024-10-05 09:32:22Week 30th September
Wiki article on the topic. [sPhil] (https://sphil.xyz/) Religion politics philosophy history are critical. They are not objective things.
Week of updates for protocol apps, including Gossip, coracle app, nostrmo, nostur and many others.
Kind7 Tags: K, emoji,a,others Others threads multi people
Show likes as kind 1 This person liked this post. Or this post has three likes in your timeline. The likes I don't know in your timeline really interest you.
The first book is the bible... Word of Alexandria.
I added cyberspace to the difficult things of the protocol ultra brain things. Low brain, middle brain, top brain, ultra.
Some alphaama codes .AA u login .AA q stuff .AA q run b .AA q run f .AA q close f
high things of alphaama nostr:nevent1qy88wumn8ghj7mn0wvhxcmmv9uq32amnwvaz7tmjv4kxz7fwv3sk6atn9e5k7tcqyqlqu2vwpwax7dj420e75yws7g7vyua9e245c0x73c056gunxchluey4q99
Comment: nostr:nevent1qqs8pn0zzhgk5l2raqh736rj3ckm48pfl6r7m72rnz2r2p7lzgmx20gzyqduwzspfzelx9k6x0lrez0j8cl8rtz0lxvqylk8z2ustnfy76jpzqcyqqqqqqgpramhxue69uhkummnw3ezuetfde6kuer6wasku7nfvuh8xurpvdjsjt5rvu
You have to get to the point where you have your community relay. But you have to go down the rabbit hole of relays. General, search, local, inbox outbox, cache. Etc until you get to community relay that is being talked about these days because of NIP 29 "Relay-based Groups". In the end you have to have that table with the various types of relays clearly in your mind. If the user doesn't think about it, who should think about it, who? if I choose the relays?
NIP-100 the world to make community for me. NIP-28 + NIP-72. So you have some structure interoperability with kind1. But the Channel is another kind. You arrange the various channels in the community. No posts need to be approved.
It's useless Protocol users are becoming more reddit users or so. I don't want to deal with these people.
-
@ 660162cf:8d93a1dc
2025-03-02 14:33:16อย่าตัดสินภาพลักษณ์ผู้อื่นจากอดีต
เคยไหมที่คุณเผลอตัดสินใครสักคนเพียงเพราะ “ภาพลักษณ์เก่าๆ” ที่คุณเคยเห็นเมื่อหลายปีก่อน? ไม่ว่าจะเป็นเพื่อนสมัยเรียนที่เคยขี้เล่น พูดเก่ง ชอบยิงมุกตลกในห้องจนดูไม่น่านับถือ แต่วันหนึ่งเขากลับมาในฐานะอาจารย์มหาวิทยาลัยผู้มีความรู้เชิงลึก หรือ เพื่อนร่วมงานที่เคยทำงานผิดพลาดในโปรเจกต์แรกแต่วันนี้กลับกลายเป็นคนที่จัดการงานได้อย่างยอดเยี่ยม
ภาพลักษณ์เก่าๆ ฝังแน่นในใจเราได้อย่างไร
สมองของเรามักจะจดจำ “ความประทับใจแรก” หรือ “เหตุการณ์สะดุดตา” ไว้เป็นกรอบเพื่อใช้ตัดสินผู้อื่นในปัจจุบันและบ่อยครั้งเรายังนำสิ่งนั้นไปคาดการณ์อนาคตของเขาเพิ่มเติมด้วย ที่สำคัญเรามักจะต่อต้านข้อมูลหรือสิ่งใหม่ ๆ ที่เราไม่คุ่นเคยโดยอัตโนมัติถ้ามันขัดแย้งกับกรอบเดิมๆที่เรารู้จัก เพราะเรารู้สึกว่าอาจต้องสูญเสียความมั่นคงหรือความสบายใจในการรับรู้จากสิ่งที่เราคุ้นชินบางครั้งก็อาจสั่นคลอนการใช้ภาพลักษณ์จำเก่าๆที่เราจดจำไว้ ดังนั้นการตัดสินใจแบบโดยการนำภาพลักษณ์เก่าๆมาจึงเป็นวิธีลัดที่สมองชอบเลือกใช้ โดยเฉพาะในชีวิตประจำวันที่ต้องเร่งรีบ
เราทุกคนล้วนมีสิทธิ์ เปลี่ยนแปลง และ เติบโต ภาพลักษณ์ก็เช่นกัน
กรอบความคิดเก่า คือ สิ่งที่ทำให้เรายึดติดกับอดีต
ลองนึกถึงเพื่อนที่เคยสอบตกวิชาคณิตศาสตร์ แต่ปัจจุบันเขาอาจเป็นโปรแกรมเมอร์มืออาชีพ หรือหัวหน้าทีมพัฒนาระบบในบริษัทใหญ่ๆ หรือเพื่อนร่วมงานที่เคยถูกมองว่าตัดสินใจพลาดไปเสียทุกครั้ง ก็อาจพัฒนาตัวเองจนมีวิจารณญาณเฉียบคมที่สุดในทีม การเปลี่ยนแปลงเหล่านี้เกิดขึ้นได้เสมอกับทุกคนที่ผ่านเข้ามาในชีวิตของเรา
คนเรามีสิทธิ์พัฒนาและเติบโตในแบบที่คาดไม่ถึง
แล้วเราจะเปิดใจยอมรับการเปลี่ยนแปลงของผู้อื่นได้อย่างไร?
1) ถามตัวเองให้บ่อยขึ้น ทุกครั้งที่เผลอตัดสินใครจากภาพลักษณ์เก่าๆลองตั้งคำถามก่อนว่า “สิ่งที่เคยเห็นหรือที่เคยรับรู้ในอดีตยังเป็นจริงอย่างที่เราคิดอยู่ไหม?” และ “ปัจจุบันตอนนี้เขาเปลี่ยนไปอย่างไรบ้าง?” หรือเราอาจจะตั้งคำถามว่า “เขามีด้านดีหรือสิ่งที่เปลี่ยนไปจากภาพลักษณ์เดิมที่เรารู้จักหรือเปล่า?” เพื่อกระตุ้นให้เราเปิดใจรับรู้ข้อมูลใหม่
2) สังเกตพฤติกรรมปัจจุบัน แทนที่จะยึดติดกับเรื่องในอดีตเราลองตั้งใจฟังความคิดเห็นของเขาหรือสังเกตการกระทำในปัจจุบันเพื่อมองหาความก้าวหน้าหรือสิ่งที่เปลี่ยนไปจากที่เราเคยคิดมาก่อนในอดีต
3) ให้โอกาสและเวลา การเปิดโอกาสให้คนคนหนึ่งได้พิสูจน์ตัวเองในสถานการณ์ใหม่ๆ มักทำให้เราเห็นศักยภาพที่ไม่เคยรับรู้มาก่อน
4) อยู่กับปัจจุบันมากกว่าความทรงจำเก่าๆ อย่าปล่อยให้ภาพลักษณ์เก่าๆของเขากลายเป็นอุปสรรคต่อการทำความรู้จักตัวตนปัจจุบันอดีตอาจเป็นเพียงหนึ่งบทของชีวิตแต่ไม่ใช่ทั้งหมดที่เขาเป็น ณ ปัจุบัน
การเปิดใจมองเพื่อนคนหนึ่งในอดีตโดยดูจากภาพลักษณ์ที่เค้าเปลี่ยนไปแล้วในปัจุบันโดยไม่ตัดสิ่นที่เขาจากสิ่งที่เคยทำแย่ๆมาก่อน เป็นอีกก้าวในการเติบโตทางด่านความคิดของเรา
ยิ่งเปิดใจ เราก็ยิ่งได้เรียนรู้
การเลือกเปิดใจยอมรับตัวตนใหม่ของคนรอบข้าง นอกจากจะช่วยให้ความสัมพันธ์ดีขึ้นแล้ว เรายังได้เรียนรู้และรับแรงบันดาลใจจากเขาอีกด้วย ทุกการเปลี่ยนแปลงที่เกิดขึ้นสะท้อนว่ามนุษย์มีศักยภาพเติบโตได้ไม่สิ้นสุด ดังคำกล่าวที่ว่า “อย่าตัดสินภาพลักษณ์ผู้อื่นจากอดีต” — เพราะเพื่อนร่วมงานที่เคยมีปัญหาในอดีต อาจกลายเป็นผู้เชี่ยวชาญในสาขาที่เราไม่เคยคาดคิด หรือเพื่อนสมัยมัธยมคนนั้นอาจเติบโตมาเป็นครูอาจารย์ผู้ถ่ายทอดความรู้ให้คนรุ่นใหม่และนี่ก็คือ พลังอันยิ่งใหญ่ของการยอมรับในพัฒนาการของผู้อื่น
Siamstr
-
@ 044da344:073a8a0e
2025-03-02 14:22:04Ich war neugierig. Florentine Anders hat mit mir studiert. Wobei: Ganz so nah, wie das jetzt klingt, waren wir nicht. 120 Studenten, sieben Seminargruppen: Als es im Herbst 1988 für uns losging an der Sektion Journalistik in Leipzig, hing es auch vom Zufall ab, mit wem man mehr zu tun hatte und mit wem weniger. Manche Gruppen hatten sich im Volontariat gebildet und andere bei der Auswahlwoche in Bad Saarow am Scharmützelsee. Lange hielt das alles ohnehin nicht. Nach einem Jahr kamen die Dinge ins Rutschen und sprengten oft das, was bis dahin gewachsen war.
Ich weiß nicht einmal, ob Florentine bis zum Diplom durchgehalten hat. Gar nicht wenige von uns haben die Ungewissheit nicht ausgehalten und sind sofort irgendwo in Lohn und Brot, manchmal auch jenseits des Journalismus. Wer eine Nase hatte für den Wind, der sich für den Propaganda-Nachwuchs schnell drehte von der Euphorie des Anfangs in Richtung Pranger, der konnte schon auf die Idee kommen, lieber Autos zu verkaufen oder Versicherungen. Außerdem lockte der Westen, auch mit Journalistenschulen. Andreas Rook, heute ein MDR-Gesicht, der damals mit seiner Freundin nach Moskau ging, war die Ausnahme. Die Regel: München, Wales, Paris. Ich hatte gehört, dass Florentine Anders nach Frankreich gegangen war, aber dann reißt der Faden ab. Dass sie im Zeit-Kosmos gelandet ist, war nicht bis zu mir durchgedrungen.
Dieses Buch dann schon. Wenn etwas über die DDR erscheint, bekomme ich das mit. Ich kaufe längst nicht mehr alles. Wenn immer wieder das gleiche serviert wird, freut man sich selbst über einen Film wie Kundschafter des Friedens 2. Florentine Anders und ihr Opa Hermann Henselmann: Das klang gut. Das klang nach Brigitte Reimann und „Franziska Linkerhand“. Nach Defa. „Unser kurzes Leben“ von Lothar Warneke und „Insel der Schwäne“ von Herrmann Zschoche, zwei Filme, die Anfang der 1980er ins Kino kamen und die Tristesse des Wohnungsbaus genauso festgehalten haben wie einen Alltag, der heute so weit weg ist wie die Marskolonie von Elon Musk.
Ich will nicht sagen, dass ich enttäuscht worden bin. Die Mitstudentin von einst hat das gut gemacht. Sie hat sich hineingegraben in die Papiere und viele der Orte besucht, die wichtig gewesen sind für die Henselmanns und ihre acht Kinder. Schreiben kann sie ohnehin. Das haben wir in Leipzig gelernt oder schon vorher in der Redaktion. Entstanden ist so eine Familienbiografie, in der sich die Autorin zurücknimmt. Drei, vier Einsprengsel zur Recherche. Mit der Mutter im Stasiarchiv, wo es nicht nur eine Opferakte gibt, sondern auch eine Täterakte – zur Überraschung der Tochter. Ein paar Sätze zu den regelmäßigen Besuchen beim berühmten Opa, der ihr alle 14 Tage ein Buch mitgibt, über das dann diskutiert werden soll. Sonst ist da vor allem Distanz. Abstand halten. Keine Emotionen zeigen. Sagen, wie es gewesen sein könnte. Journalismus und Geschichtsschreibung – aber kein Roman.
Um noch einen Moment loben zu können: Florentine Anders geht chronologisch vor, von 1931 bis 1995, fast wie in einem Fotoalbum. Da die DDR klein war und die Henselmanns zu ihrem Adel gehörten, gibt es literarische Bilder von vielen Prominenten. Mit Lotte Ulbricht auf der Völkerfreundschaft, Manfred Krug als Fast-Nachbar, ein Unterschlupf bei Alex Wedding, die eigentlich Grete Weiskopf hieß und Pflichtlektüre für jedes Kind war. Es passiert sogar jede Menge Ungeheuerliches, auch jenseits der Seitensprünge des Opas und von Robert Havemann, der mit Omas Schwester verheiratet war. Architektur, Opposition, Ost-West-Spionage, Berlin im Wandel der Zeit: Das ist auch deshalb spannend, weil Florentine Anders darauf verzichtet, dem Diktaturgedächtnis Futter zu geben, und einfach die Tatsachen sprechen lässt, ohne die zu verurteilen, die an das Projekt DDR geglaubt oder von ihm profitiert haben und beides längst nicht immer auseinanderhalten konnten.
Vielleicht hätte der Verlag auf das Wort „Roman“ verzichten sollen. Ein Roman braucht einen Konflikt – einen Dreh- und Angelpunkt, der nicht nur solche Figuren aus den Tiefen der Vergangenheit trägt, sondern im Idealfall universell ist und so auch die Gegenwart erreicht. Der Mann zum Beispiel, der älter wird und prominent und daraus etwas macht bei jüngeren Frauen, ohne seine erste Liebe aufgeben zu wollen. Die Frau, die all das sieht und es trotzdem nicht zum Bruch kommen lässt – oder doch, wie Florentines Mutter offenbar dann gleich zweimal. Oder die Ideologie, die sich hineinfrisst in die Profession und etwas verlangt, wenn man sich im Licht der Macht sonnen möchte. Ich denke dabei natürlich an Eugen Ruge, dem ein runder Geburtstag gereicht hat, um nicht nur eine kommunistische Familie auseinanderbrechen zu lassen, sondern zugleich die Geschichte vom Aufstieg und Ende einer Utopie zu erzählen. Vielleicht ist dieser Vergleich aber auch vermessen. „In Zeiten des abnehmenden Lichts“: Das war einmal. Jetzt lesen wir eben „Die Allee“.
Freie Akademie für Medien & Journalismus
Titelbild: Markus Spiske @Pixabay
-
@ 592295cf:413a0db9
2024-09-28 08:19:25Week 23th September
It's not your voice anymore if it's available to everyone.
Nostr is psycho pop.
Nostrasia took place today. It all seemed beautiful. A muffled meeting, a bit in the clouds compared to the air you breathe in social media.
It seems there are two types of Nostr the one who doesn't want to grow and the one who wants to grow. 😅
-
There has always been a misconception that kind1 is the discovery layer, but in reality it is the opposite. If someone publishes a long form article there is less audience, it is true, but then it is easier to find quality content, therefore quality profiles to follow in the kind1 client aka twitter clone. And this can be true for all portable data layers, video streaming, audio, long form, ngit, wiki and whatsoever. So you have finally good follow.
-
The fact that in Nostr you don't see who follows you generally, only in a few clients, I only know one where you see who started following you. It's a strange thing, made to avoid seeing masses of bots that follow you and you can want to block, and you increase that list to the point of absurdity. It's strange because there is a lot of focus on the social graph, if you follow me it's an important aspect.
So in Nostr there are - portable data layers (Twitter style and other social) - non-portable, applications that use disposable npub, where the key is ephemeral.
- 0xchat was becoming a good client, they killed it because it has to focus on chat. I don't use chat, I don't have anyone to chat with, I follow the 0xchat channel and then I read things from Moment. I use it with my second account, because after the nos2x-amber affair with the Odell result, which I had already told you about, I no longer tried to have the first profile even on the mobile. In the end they are all keys that will be burned 😔
Maybe I won't use Nostr anymore in the future just with burn npub, pow and whatsoever. In the end you don't build anything because it's a "stateless" communication.
Lol Moment
On Nostr the poor answer guy is helping the network 🤣🤣
call the police 911: what is your emergency?
a spam bot is attacking "nostr" relays.
you want some government censorship on those relays that contain spam, yes we can do that.
-Previous week- 16 09 Machines Like Me was a good book, maybe now it will become reality.
-
The cool thing about Plebchain radio, it's not the guests, it's these two Nostr users that do a podcast. And they focused on Bitcoin and Nostr and lightning, but maybe it's just the beginning, first you have to focus on a niche and then you expand to the whole world. I think the whole world phase is starting, the podcast topics would become too repetitive. The best part is the 15 10 minute intro. Or in the live show part, there could be some interesting clips.
-
-
idea White button for activity pub user on voyage (app).
-
People hate Nostr. Don't use it
-
UnNip, now we've seen it all
-
Until the morale improves
-
-
People think Sync works like this by magic. Unfortunately it doesn't, I think, at least that's what those who are trying to do say, auto-merge, tinybase, evolu. There is an interesting local-first project. Jaguard a collaborative environment for writing empirical research papers.
-
Now I can search by id. I couldn't do it and I didn't understand the mechanism. Everything has to be instantiated. it works. Now I have to create a function maybe note_list_id and note_id. I continued to edit the NIPs page with asciidoc, categorizing this table is very fun.
New wave of Opensats grants.
- If you haven't heard about WoT this week, you probably live on Mars. There are people who didn't know you could edit on amethyst.
You need to do a podcast of NIPs, features and whatsoever, maybe doing a podcast is not the best solution because it assumes you know something more and something that could change the next day or be no longer valid. maybe you should avoid doing things you don't have full control over, or at least not spread it outside. Maybe because last year at this time I was recording audio.
-
-
@ 42342239:1d80db24
2025-03-02 14:13:43With the rapid development of artificial intelligence (AI), we face a future where we may soon have access to almost everything we desire – at least in the digital realm. But unfortunately, what we wish for doesn’t always align with what we truly need, or what would benefit us.
The Dutch ethologist Niko Tinbergen was awarded the Nobel Prize in Physiology or Medicine in 1973 for his studies of animal behaviour patterns. While earlier scientists had primarily focused on learning as the main explanation for animal behaviour, Tinbergen instead emphasised instincts.
Tinbergen studied, among other things, what makes newly hatched bird chicks beg for food from their parents. This was investigated by presenting parentless chicks with various painted beak models to see which ones they would seek food from. Several objects proved more popular than real gull beaks.
Artificial eggs were also created and placed in bird nests. Black-headed gulls that received wooden eggs before laying their own were found to actually refrain from laying real eggs. Fake eggs were painted in different colours and patterns, and made in various sizes. The gulls always preferred trying to incubate eggs of absurd sizes – for example eggs with eight times the volume of real ones. The poor gulls made desperate attempts to sit on these giant eggs – but often slid off.
The explanation for the gulls’ self-destructive behaviour was that they had a hardwired ability (instinct) to respond to specific stimuli (appearance of beaks and eggs with particular colours/sizes). Researchers exaggerated these stimuli, creating stronger but ultimately misguided reactions. The concept of "superstimuli" was hatched. Nothing in the gulls’ evolution had prepared them for these experiments, explaining their self-destructive behaviors.
Psychologist Deirdre Barrett has translated this concept to a human context. She argues that superstimuli govern human behaviours much like they do other animals’, citing junk food consumption, addictive social media use, and pornography consumption as examples. Nothing in Homo sapiens’ evolution prepared us for modern society’s stimuli, which might explain our frequently self-destructive behaviours.
When the Liberal Party (Swedish political party Liberalerna) proposes mandatory porn filters on all mobile phones "to protect children and youth," it might appear they’re on the right track. However, these issues deserve more profound discussions.
How do we create technical solutions that meet our fundamental needs for health, education, and human connection – rather than just supplying mindless scrolling entertainment? How can we ensure those collecting our data don’t exploit it for their own interests, selling us things we don’t need? Is the current model of centralisation, corporate giants, and profit maximisation really compatible with our best interests?
In summary: How can we ensure future technology serves our real needs, rather than mislead us - much like Niko Tinbergen deceived the poor gulls?
-
@ 43baaf0c:d193e34c
2025-03-02 14:00:59As an artist, your main desire is to create. I believe we are all born creators, but some of us have a deeper passion for it than others. Those who dedicate themselves to their art and receive recognition for it are often called artists. But let’s set aside the debate about what defines an artist and focus on what truly matters our craft.
This is what we love to do. We dream about it, wake up for it, and live for it. It’s more than just work—it’s a passion that comes from within. You could even go as far as to call it your purpose in life.
Often, you’d still create even without money because your art is beyond numbers. But we live in a world where kisses won’t pay for groceries—at least, I can’t pay that way! So, money matters, not as the goal, but as a tool to keep doing what you love: creating.
Artists have often been seen as struggling creatives, barely making ends meet. When I started art school, I saw so many parents telling their kids to choose a “real” career doctor, lawyer, something secure. A “real job,” right? 😅
Luckily, my parents never told me that. My mom always said, follow your heart. (Thanks, Mom and Dad! 🙏)
After art school, I spent four years studying graphic and media design, followed by another four years in animation and film. But when it came time to find work as a 2D animator, I struggled. To be honest, I wasn’t good enough—or at least, that’s how it felt. Plus, the industry had already shifted heavily toward 3D animation.
But I wasn’t discouraged. I loved everything related to art and design. And growing up in a small city like Sneek, Friesland (The Netherlands), I had always dreamed of seeing more of the world.
Travel & Filming I’ve always been fascinated by people, their stories, and how different cultures live. That curiosity led me to documentary filmmaking, and along the way, I started building my own stock footage database (you can find it all on https://www.shutterstock.com/g/traveltelly.
Making a living as an independent documentary filmmaker isn’t easy, so I often filmed for volunteer organizations. This gave me the opportunity to experience different cultures while also shooting stock footage. I did this for about 10 years, traveling across the globe—and I’ve been fortunate enough to visit 88 countries so far.
Technology, Change, and Art Stories In 2018, I read The Bitcoin Standard because I couldn’t understand why, despite investing in an expensive camera, I struggled to earn it back as stock footage royalties kept dropping. That book opened my eyes to the first part of the equation: money itself.
It took me a few years to truly grasp Bitcoin’s significance, and through trial and error, I realized it’s the only cryptocurrency I believe in. I had my fair share of shitcoin lessons—where I made some money but also lost it. Those experiences taught me a lot about value, scarcity, and what truly lasts.
Bitcoin Is Different Once you truly understand what Bitcoin stands for, you realize it’s a path to real financial freedom. Like any journey, there will be ups and downs, and plenty of people will tell you you’re wrong—especially when Bitcoin’s price drops in dollar (fiat) terms. But when in doubt, zoom out.
One thing I’ve learned is that your own path is never truly wrong for you. When others say it is, it’s usually because they’re comparing it to their own. But we’re all walking our own unique journey. The moment you start comparing, you begin to doubt. True happiness comes from embracing your path—not someone else’s.
Art Is My Life, Bitcoin Is the Tool For me, art is life. Bitcoin is simply the tool that allows me to live a good artist’s life. Saving in Bitcoin and spend when I need it gives me peace of mind. And even with a bit more financial freedom, that doesn’t mean I’d ever stop creating. I always want to push myself, improve my craft, and hopefully inspire others through my art and stories.
I truly believe that all good energy comes from human connection and relationships. The most important thing is having a good day with the people around you. These days, we share those moments on social media—but that’s just a reflection of a single moment, whether happy or sad. If you don’t truly live that moment, it’s just wasted energy.
I’ve also learned to truly appreciate other artists and their craft—to find inspiration in their work. This mindset comes more naturally when you have peace of mind, something a Bitcoin savings can provide.
When you’re not under constant financial pressure, art doesn’t have to feel like a business where you must sell your work immediately at an exhibition or event just to make ends meet. Instead, you can focus on creating for the sake of art itself, allowing your work to evolve naturally.
Freedom to Share Your Art on Nostr Luckily, we now have platforms like Nostr where we can share and earn from our art while building a community, without anyone controlling what we do. Bitcoin stands for financial freedom, and Nostr stands for art-sharing freedom. With Bitcoin, you can walk your own path, and with Nostr, you can share your journey freely.
When you’re free to walk your own path, you naturally attract like-minded people because you don’t feel the need to constantly compare yourself to others. The more you embrace being yourself, the more you’ll connect with people who resonate with you.
I’m not suggesting you stay in your own bubble, but rather acknowledging that everyone is in their own bubble in some way. Just like not everyone feels at home in the same country, not everyone feels at home in the same space or community. It’s all about finding where you belong and who aligns with your energy.
Networking/Events I’ve always hated networking events in my creative job. I understand their value, but they were never really my thing. So, I was hesitant at first to attend a Nostr event. But it was in Tokyo (Nostrasia), and I love Japan, so that gave me a good reason to go. Fortunately, I was right—it felt like the right fit for me.
I love to create, and I tend to talk less, so I’m very selective about the events I attend. Nostr events felt different. It’s like we’re all builders and creators who have already broken free from the fiat mindset. By that, I mean the mindset where you go to an event, pay a high price (like at some mayor Bitcoin events, which I can’t stand), and expect to get something in return. The fiat job mentality where you exchange time for direct money, or as we say in Dutch, uurtje factuurtje (hour work, invoice) just doesn’t fit with me. The more you walk your own path, the more you realize what works for you and what doesn’t.
My only advice? Save in Bitcoin, create, and walk your own path. And yes, don’t forget to smile and enjoy the ride. The journey is the destination!
-
@ 592295cf:413a0db9
2024-09-14 18:13:4109 09 week
The billboard has reached its first goal.
I don't understand anything, too much.
The web is a dangerous place, maybe the couch at home is for you.
Nostr is like being in a public place like a bar and you listen to the radio, and you can decide which radio to choose, you can also talk on the radio, only those who follow you and those who are connected to that frequency can listen to you.
We talk on multiple frequencies so if one is offline they can hear me on the other.
Spam will always be a constant as are fixed costs, personnel costs, taxes things that people in general hate
A lot of talk that will be blown away by the wind.
Jack Dorsey says Nostr will be a protocol for private encrypted chats
-
Open-sats drama
-
Carnivore dietitian
-
Lightning diatribe
-
This is already Twitter 😉
Fiatjaf explained for the umpteenth time what the outbox model is, now those who look at images instead of reading books must have understood it too. My note, Patricia writes in her relays write, including select some in her outbox 10002 kind. it was a dev page of something, so maybe it won't be online for long
Thinking that with Kamala Harris's victory, the price of Bitcoin would hit a low and holders would be happy to buy. 🤣🤣 Instead with Trump new all time High, holders would be happy. 🤣🤣 Lol Moment.
I read the article about btcmap maps, there were some notes to make but I didn't, it's beyond my level, it was only for builders.
Satlantis, trustroots, and wherostr were not noted.
I had this thought that we will not "succeed" in building the openness of type 1, in the following nips, because of the relays and because discovering new things has a cost, and no one wants to discover new things. And then after that the others should use them, but how and after that at least two others appear who are doing a similar thing, but they don't talk to each other because they don't have time.
If the time horizon is 10 years, those who survive will see.
Keeping calm seems difficult.
I tried nostr-relay-tray works. It works, I would suggest a couple of changes
- Delete some events.
- View events
- Search by npub id or time
- Delete by time.
These are difficult things but they can be done with a database, so they may as well not be done.
I hope that all the controversies are forgotten and overcome and we are more serene.
-
-
@ fd78c37f:a0ec0833
2025-03-02 13:55:43In this edition, we invited Bam from Bitcoin Barqnet to share his journey with Bitcoin and its impact in the Middle East. He also discussed the growth of the Barqnet community and introduced his modular wallet, Cypherbox.
YakiHonne: Bam, thank you for joining today's conversation. Before we begin, let me briefly introduce YakiHonne. YakiHonne is a decentralized media client built on Nostr—a protocol designed to empower freedom of speech through technology. It enables creators to own their voices and assets while offering innovative tools like smart widgets, verified notes, and support for long-form content. With YakiHonne, individuals can express themselves freely, without the fear of censorship, bans, or restrictions. So before starting the interview, I’d like to learn a little more about you and your community, Bam. Can you tell us more about yourself and what you do?
Bam:My name is Basim, and my nickname is Bam. I became somewhat well-known in the Middle East for releasing some Bitcoin courses. I'm an old player in Bitcoin, having gotten involved in 2014. Back then, I realized that Bitcoin was something big, but I didn’t have much Bitcoin because I didn’t have the money to buy it. Instead of investing money in Bitcoin, I invested my time in understanding it and researching it. Bam:After graduating in 2016-17, I decided to dedicate my entire career to Bitcoin while I was in Istanbul. Of course, Bitcoin was the core focus, but there were also many altcoins, and I became interested in those areas as well. I love this space because it's very libertarian, and I myself am a person with libertarian values. Bam:I currently publish tutorial videos on YouTube, primarily aimed at Arabic-speaking audiences in the Middle East, to teach them about Bitcoin economics, technology, and how to use Bitcoin. They have very little knowledge about these topics. I’ve covered many subjects, including wallet operations, mining, using the Lightning Network, and even non-custodial liquidity management. We’ve produced over 200 videos so far. I’ve realized that there are many issues with Bitcoin-related applications, so I’ve decided to develop my own Bitcoin app called Cypherbox.
YakiHonne: That's really impressive. You're a content creator in the Bitcoin ecosystem, explaining Bitcoin on YouTube and spreading the Bitcoin ideology. And you're developing your own Lightning app specifically for the Middle East. You're doing a lot of meaningful work.
Bam:Unfortunately, I didn't buy more Bitcoins in 2014. I used to own some, but I invested all of my Bitcoin into my channel because I strongly believe in the importance of education. I believe that global international currency is more important than mere wealth. I've tried to ensure that my project is neither charity nor purely commercial. I am now creating an Arabic academy, selling some courses or applications I develop, and trying to commercialize them. Overall, my project is somewhere between open source and commercialization, and I hope to support my life through these means.
YakiHonne: That's really great, Bam. I really admire how much you value education and enlightening others. So now, let's move on to the first question. Bam, I think you've already touched on part of the answer. But I'd like to ask again, this time in more detail: What truly sparked your interest in Bitcoin? What motivated you to build or form a community around it?
Bam:I used Bitcoin very early on, and I understood right away when I looked at its wallets that it wasn’t a company. I had some experience with decentralized networks, like Tor and Torrent, and I knew this was open-source. Open-source projects are really attractive to me as an engineer. The more I studied Bitcoin, the more fascinated I became with it. I love its decentralized nature. Bam:I studied complex systems, energy engineering, and systems like aeronautics and marine engineering, and I found Bitcoin to be the most sophisticated energy system I’ve ever studied. It’s just fascinating on a technical level, especially the cryptography aspect. What’s so amazing about Bitcoin’s security is that it doesn’t rely on firewalls or central authority; it’s actually the opposite, as Andreas Antonopoulos often explains. Bam:Bitcoin's security comes from its openness. The whole thing—its censorship resistance, the privacy, the community around it—just captivated me. The fact that Satoshi created the greatest monetary network ever, but never moved any coins or had any control after 2009, and gave it away to the community, for everyone in the world, is just an incredible story. There’s so much about Bitcoin that I can’t even begin to explain how deeply I’m attached to it. Bam:What I want to say is that Bitcoin has significantly helped with the issues my country faces because I am from Syria. We have been locked out of the financial system by OFAC policies, which were perhaps seen as justified due to sanctions. Syria has been under financial sanctions, but the problem is that these sanctions weren't just imposed on the Syrian government; they were imposed on the entire Syrian population. Even though the current president Assad is no longer in power, these sanctions still persist. These financial sanctions have caused great suffering for the Syrian people. Syrians are unable to engage in e-commerce or trade with the outside world. This system, which locks people into such a closed financial environment, is a huge issue. Bam:Bitcoin provides an alternative. Bitcoin has not closed its doors to Syrians, and we can still use Bitcoin in Syria. People in Syria use Bitcoin without fear of censorship from any part of the world. No government can lock Syrians out of the Bitcoin network, and Bitcoin transactions can be settled in real time in Syria, regardless of whether any government approves or not.
YakiHonne: Can you tell me how you have been able to attract members so far and what challenges have you faced when you started earlier on?
Bam:We started on Clubhouse, just a bunch of random Bitcoiners talking about Bitcoin, and around 2020 and 2021, the Lightning Network started to become more usable. We saw some interesting Lightning apps, and when I learned about it, I immediately realized that this was the future of the internet of money. I was heavily involved in Ethereum at the time, writing smart contracts, but once I took Lightning seriously, I knew it was the future of digital money. Bam:We started discussing Lightning on Clubhouse during COVID, focusing on Lightning wallets. We asked ourselves, "How can we bring this technology to the Middle East?" Around that time, I also wanted to get more involved in Bitcoin education, so I began putting out more content. A friend of mine created a Telegram group called Barqnet, and we invited everyone from Clubhouse to join. I started sharing more Bitcoin content and promoting the group, saying, "Hey, if you want to get real education about Bitcoin—beyond videos and courses—come join this group and let's build this community together. Bam:We did this for about six months, and the group attracted a lot of people. But my initial goal wasn’t just to attract regular people; it was to attract technical engineers and build a network of engineers who could not only listen to my explanations but also help me better understand Bitcoin and the challenges they face when interacting with Bitcoin and building the Bitcoin banking infrastructure in the Middle East. As a result, we attracted many highly skilled people. Now the group has about 1,000 members, all of whom are highly technical. Bam:We also created a technical support space for regular Bitcoin users. Anyone in the Middle East facing issues with wallets, buying Bitcoin, mining, or any other Bitcoin-related problems can come to us for help. This is a completely voluntary online initiative, and now many people know that if they have technical questions, no matter how complex, they can come to Barqnet and get answers.
YakiHonne: That's really amazing. It seems like you guys are covering both the technical and non-technical aspects of Bitcoin, which is truly remarkable. It's not so common to find a community that manages to engage both sides. But Barqnet, as the Arabic Bitcoin community, seems to have successfully blended both, working with both technical and non-technical people. The work you're doing is really impressive—it's an outstanding job.
Bam:I really enjoy seeing the growth of Bitcoin, and I've already started telling people how their lives have changed. In 2024, many people have messaged us in the group, saying, "Thank you so much, you really changed our lives." It's not just people from poor areas, even in wealthy regions like Saudi Arabia and the UAE, people are telling us, "I started a Bitcoin business, I started mining, I started investing, and now I’ve made some money, my value has gone up because of you guys. I didn't sell, I kept my Bitcoin in cold storage." So, everyone is thanking us. Bam:This means much more to us than any financial gain. We didn’t make a lot of money from these initiatives—sure, we earned some, but not much. And it hasn’t changed our lives. If I had spent my time as an engineer focusing on corporate projects, I would probably make a lot more money. I live in Europe now, and my life is pretty good. But helping people understand Bitcoin and onboard into the Bitcoin world means so much more to me than money. YakiHonne: So, moving on to the next question. How do you see the role of Bitcoin communities evolving as technology matures, particularly in areas like scalability, privacy, and adaptability with other systems? So, how do you see the Bitcoin community evolving with time? Bam:I actually have a lot of different views on how Bitcoin is being taught and developed, especially in terms of scalability. Many people in the West are focused on highly technical developments that do promote individual sovereignty, self-custody, and privacy protection. However, these don't help people who don’t understand the technology, and they make it really difficult for them to use Bitcoin. For example, when I see people recommending non-custodial Lightning wallets, I don’t think this is a good option for everyone, especially in the Global South. For people who don’t understand the technology and just want to use Bitcoin simply, these wallets are way too complicated. Bam:This is why I developed my own app. It's not just a wallet for the Middle East; it's an international wallet that anyone can download. It's open-source and aims to provide a modular Bitcoin experience. The Bitcoin app I envision would contain all the necessary tools, whether it's a custodial service, an exchange, or a simple Lightning custodian service for people who just want to quickly send and receive Bitcoin without dealing with complexity. Bam:A Bitcoin Lightning custodian makes perfect sense if it's reliable. In addition to that, you’d also have your hot wallet, which you can use to withdraw your funds when ready, and move them into self-custody with a simple hot wallet like Blue Wallet. Cold storage should not be the first step for everyone. People often say it's expensive, and that you need to buy hardware wallets, but it’s more of a progression. Start with the basics, and over time, you’ll learn. Bam:Inside the app, users should have access to all the tools for self-custody, including non-custodial Lightning, hot storage, cold storage, federated chains, e-cash systems, and side chains, if applicable. The app would allow users to personalize their experience—choosing what they want based on their technical knowledge, the amount of Bitcoin they want to secure, their privacy preferences, and the fees they’re willing to pay. I imagine the future of Bitcoin will be modular, and every user will be able to customize their experience according to their needs and preferences.
YakiHonne: I really appreciate the key points and important aspects of Bitcoin scalability that you mentioned. They're truly crucial, and it's essential for people to understand Bitcoin better rather than misinterpret it. The importance of Bitcoin in these other areas shouldn't be overlooked, and people should embrace it as part of the future, not reject it. Now, we're at the last question. Is the government around you for or against Bitcoin? And how has that affected the community?
Bam:I live in France, and the government is generally neutral when it comes to privacy tech. I’ve lived in Turkey, the UAE, Brazil, the EU, and the Netherlands, so I don’t consider myself Syrian. I prefer to think of myself as a citizen of Earth. When it comes to governments, I pay attention to policies and regulations in all countries. I look at examples like El Salvador, and I also follow the current situation in Syria. Right now, we’re working to push for a policy that recognizes Bitcoin rather than implementing strict regulations. We’re trying to get the government to draft laws that are more friendly to Bitcoin. Although the central bank is confused about Bitcoin, they’re not completely opposed to it. We’ve proposed a way to manage the market that doesn’t restrict people’s freedom but also helps regulators deal with companies and Bitcoin projects. We’re seeing very positive reactions, and I believe Syria will become the place that opens Bitcoin to the entire Middle East region, thanks to the voluntary initiatives we’ve initiated.
YakiHonne: That was really a fantastic answer, thank you so much, Bam. With that, we’ve come to the end of today’s interview. It’s truly an honor and privilege to have had this conversation with you. I’ve really enjoyed the entire discussion, from start to finish, and I’ve learned a lot from everything we’ve talked about. I really appreciate your passion for Bitcoin and your dedication to pushing for education. We love the work you’re doing. Although we haven’t used your app yet, we believe it’s going to be amazing.Thank you so much again.
-
@ 7460b7fd:4fc4e74b
2024-09-05 08:37:48请看2014年王兴的一场思维碰撞,视频27分钟开始
最后,一个当时无法解决的点:丢失
-
@ f3873798:24b3f2f3
2025-03-02 13:12:10Olá meus caros leitores, estou fazendo um guia voltados aos Brasileiros aqui do Nostr. Vejo que há muito conteúdo em inglês que infelizmente não é traduzido para o português. Por este motivo tomei a iniciativa de começa com este artigo.
Espero que gostem deste artigo, que tenham uma ótima leitura.
Bem-vindos ao Mundo Nostr !!
Acredito que todos que estão aqui sabem um pouco sobre o Nostr e que é uma rede social descentralizada, local onde você pode postar sem medo de represarias governamentais [ditatoriais].
Mas, vocês conheçem como o Nostr funciona e todas as ferramentas que vocês têm disponível neste ecossistema?
Poisé, acho que não.
O Nostr é um protocolo de comunição descentralizada muito versátil, isso quer dizer que não está limitado a um tipo de "rede social", nele é possível fazer Blogs, streaming, podcast e até mesmo e-mails com autonomia total do usuário.
Meus caros, isso é liberdade total, sem ficar na mão de bigtech como Microsoft, Apple, Google.
Para ficar mais claro darei um exemplo para vocês:
Imagine você criando uma conta no Youtube, você deve aceitar as Diretrizes impostas pela google no uso do SEU CANAL, por mais que você tenha autonomia na produção do SEU CONTEÚDO, determinadas palavras e termos não podem ser usadas, ou seja, O GOOGLE DETERMINA O QUE VOCÊ PODE OU NÃO FAZER NO SEU CANAL.
Veja que é uma liberdade parcial no processo de criação de conteúdo.
Já no Nostr, o seu canal é completamente seu. Não há nenhuma entidade, empresa responsável pelo seu conteúdo a não ser você.
O Mundo Nostr e sua funcionalidades
No nostr você terá acesso a uma diversidade de aplicativos para cada objetivo de uso. Mas, antes de abordar sobre os diversos layouts e funcionalidades do Nostr é necessário aprender o básico deste universo.
Em primeiro lugar: É necessário que vocês saibam que a partir do momento que vocês criaram um conta aqui, independente do "cliente" ou "distro como o pessoal que gosta de fazer analogia com o Linux", vocês recebem duas importantes chaves ! A chave privada e a chave pública.
A Chave privada, também chamada de chave secreta é o acesso ilimitado a sua conta, ou seja, é a partir dela que poderá produzir conteúdos em geral neste mundo. Ela te dará acesso a todos os rercusos do Nostr, portanto é importante que esteja muito segura.
A Chave pública, você ver como os outros usuários ver o seu perfil e o seu conteúdo. Ela é uma importante chave para que as pessoas possam ter acesso aos conteúdo que vocês públicam, ou seja, é atráves dela que você poderá compartilhar o seu perfil para que seu público tenha acesso ao seu mundo.
Dito isso vamos conhecer os apps e os chamados clientes Nostr.
O que são clientes Nostr?
Clientes são as várias maneiras de interagir com o protocolo Nostr [fonte: Nostr.com]
É semelhante ao Sistema Operacional Linux que tem várias distro com diferentes layout para o mesmo Sistema.
Vejamos as principais para que vocês tenham uma noção da amplitude do protocolo.
- Damus: é um app para celulares IOS terem acesso ao NOSTR, tem formato de rede social, como Primal e o Amethyst.
- Primal é um app versátil serve tanto para celulares IOS, Android e PCs, também tem formato de rede social, porém você pode abrir uma carteira lightning bitcoin exclusiva deste app, facilitando muito os micropagamentos em satoshis pela rede.
- Amethyst, assim como o Damus é para o IOS o Amethsy é para o Android, sou suspeita para falar sobre este clientes, pois é o meu favorito. Além de várias possibilidades de edição de texto, ele tem diversas funcionalidade incluídas, como *Guia Mercado*** onde você pode comercializar produtos pela rede, tem como intergrar com outros apps de streaming, formar grupos temáticos etc.
- OXchat não é exatamente uma rede social tem um layout que lembra um pouco o Whatsapp ou Telegram, serve como uma rede de interação instantânea, tem diversos recursos que achei mais interessante é a lousa, onde é possível interagir no grupo com desenhos etc.
- Yakihonne que é justamente o cliente que estou usando para construir este artigo. Como usuário posso dizer que ele tem um foco para criação de Blogs no protocolo Nostr, lembrando que cada cliente tem um layout diferente, ou seja, uso de templates para definir a estrutura do seu blog é meio limitado [ressalva assim como vocês sou iniciante do Nostr, pode ser que tenha como determinar um layout próprio, mas eu mesma não sei como]
Há muitos outros clientes disponíveis para acessar e experimentar e conhecer todos eu recomendo o site: Nostrapps
Agora que você leu este pequeno guia, se divirta aqui no nostr e não se esqueça de apoia a gente.
Até Mais !!
-
@ f3873798:24b3f2f3
2025-03-02 13:10:00Estamos próximos a uma das principais premiações da indústria. Vemos não só a perversão de pautas woke e destruição de valores ocidentes, mas também um grande confronto entre o que mais forte o ativismo Lgbt ou o ativismo político entre as atrizes Fernanda Torres e Karla Gascon.
Só evidência o caos que é os conflitos de interesse de diversas vertentes que a esquerda abraça e diz que é sua.
Mas, o que mais impressiona é o fato do Oscar ter um filme no indicado que até o momento não ganhou nada, porém é notório a superioridade aos outros, este filme é Sing Sing.
Porque o filme Sing sing foi ignorado pelos avaliadores?
O filme tem uma narrativa de superação e como a arte pode mudar as pessoas e as realidades mais pertubadoras. Ele retrata o Sistema carcerário americano, onde realidade de vários presos é mudada atraves de um projeto de um teatro na prisão.
Observando friamente a sintese do filme é uma história que se encaixa perfeitamente aos vies de bandidolatria, se não tivesse um questão, a ação transformadora da arte e deixando de serem vítimas e serem artistas.
Porém apesar de ser uma obra de arte que estimula as pessoas pensarem sobre a vida e ter uma pegada inovadora e completamente diferente dos demais filmes que retratam o sistema carcerário, ele é totalmente ignorado por não ser suficientemente lacrativo.
-
@ 592295cf:413a0db9
2024-08-25 09:17:54A Ux designer has arrived on Nostr. I thought run away while you can. He could get rich, if there was a little economy.
Klout, do you remember that service, which took data from Twitter and made a ~~ WoT~~.
From a note of chip, I understood one thing:
Bitcoin is your "sovereign" currency. Nostr is just third party protocol. If you have a service you can use Nostr to face your customers. "Sovereign" people offer services. They can be bitcoiners or not. So at this stage Nostr is a layer 3 Bitcoin.
So to grow the enveiroment it must be attractive. Let's paraphrase: the protocol is agnostic, the people are fundamentalist Catholics.
So when an atheist person arrives he says ah ok, how do I silence these people and use the protocol If a Protestant Catholic arrives he is laughed at or ignored or at most converted.
I had a disagreement with Dergigi, in the end he won, but he is not right... (True)
Post more notes, zap more, follow 1000 people update FAQ to the nth degree. We are in the desert of the Tartars and the enemy is coming and there are those who say every day we must be ready, sooner or later, it will happen, ah ok. Everything must be perfect. Push harder. This leads to exhaustion.
New Grant from Opensat to Victor of Amethyst, totally deserved, pushed the envelope. If you are a grapheneos user download Amethyst. It's not just Amethyst it's also orbot, citrine, amber, zap store or obtainium or f-droid.
GitCitadel has raised its first fund I wonder if it was just a test on geyser, I wonder if it is the right project to do on nostrocket, but I think Opensat grant for nostrocket makes it irreconcilable. This opens a pandora's box, as always. We are silent as fish.
I tried not to answer some questions even in one case I knew the answer, I apologize, Nostr is much older than me, so it's okay not to answer sometimes. Tomorrow begins nostRiga, The last unconference of Nostr.
(First day) The morning was so-so, in the evening the situation improved a little. In the evening I played a bit with Nostr and it broke The second day good in the morning bad in the evening. I saw little of the backstage maybe only two panels, Will by Damus, and P2Phash on Nostr.
I don't follow anyone anymore, I did a little bit of a unfollow. I saw that two users had 200 followers in common, and I said to myself ah ok what is this thing, I have to understand how they do it there is something that doesn't work, let's try to be a little more distant.
It's weird, too much reliance on following, you have to go and look, not be stationary.
-
@ f3873798:24b3f2f3
2025-03-02 13:07:41Muitas pessoas sofrem em silêncio diante das dificuldades da vida. Seja um término de relacionamento, o convívio em uma família desestruturada ou até mesmo situações extremas, como estar preso em um campo de concentração, a escrita pode ir além de um simples ato de colocar palavras no papel – ela pode ser um agente de libertação.
Seja em forma de diário, desabafo, artigo de opinião ou até mesmo a construção de uma história fantástica, como foi o caso de Harry Potter, escrever pode trazer alívio e transformar a dor em algo criativo e significativo.
Escrever é quase mágico. O simples ato de organizar ideias para construir um texto dá ao escritor o poder de viajar para mundos criados por sua própria mente, funcionando como uma verdadeira forma de escapismo.
Em certas situações extremas, essa pode ser a única alternativa para fugir da realidade, um fio de esperança para aqueles que se sentem perdidos na escuridão do desespero.
Sabe aquela fase da adolescência em que pensamos "Meus pais não me entendem"? Se você está passando por isso, este texto é para você!
Por que não transformar suas angústias em palavras e criar histórias maravilhosas sobre seus anseios, sonhos ou aprendizados do dia a dia?
A escrita pode oferecer um refúgio, um momento em que tudo ao seu redor se transforma e seu processo criativo se torna uma lembrança especial.
Portanto, se você está sofrendo com os desafios da vida, experimente colocar seus sentimentos no papel e transforme a dor em arte. Você pode se surpreender com o poder das palavras.
Essa é a mensagem de hoje.
Até a próxima leitura aleatória
-
@ f3873798:24b3f2f3
2025-03-02 13:02:47Você já conheceu alguém que sempre tenta levar vantagem em tudo? Aquele tipo de pessoa que, em vez de buscar crescimento legítimo, prefere explorar os outros para obter benefícios? Infelizmente, essa mentalidade está mais presente do que gostaríamos de admitir.
Ela se manifesta de diversas formas, como:
-
Pedir descontos e brindes de maneira abusiva, como se fosse um direito;
-
Ameaçar ou constranger vendedores para conseguir preços mais baixos;
-
Vender produtos com valores incompatíveis com a qualidade ou omitir defeitos para enganar clientes.
Quem age assim tem uma conduta antiética e, pior, muitas vezes se orgulha disso, como se enganar alguém fosse um sinal de esperteza. Mas será que essa mentalidade realmente leva ao sucesso?
A curto prazo, pode parecer que sim. Alguns até conseguem vantagens temporárias, mas a longo prazo, essa postura cobra seu preço. A reputação se desgasta, as oportunidades diminuem e, inevitavelmente, o comportamento oportunista se volta contra quem o pratica.
No Brasil, essa mentalidade oportunista se tornou quase um traço cultural. Combater isso exige uma mudança de perspectiva e, acima de tudo, uma autoavaliação sincera.
O primeiro passo é reconhecer se, em algum momento, você já adotou esse comportamento. Ser honesto consigo mesmo é fundamental para evoluir.
O segundo passo é entender que essa mentalidade não só é antiética, mas também prejudica seu próprio crescimento. Quem não valoriza o trabalho alheio dificilmente conseguirá que seu próprio trabalho seja valorizado.
Portanto, abandone essa postura de querer sempre "se dar bem" às custas dos outros. Valorize o esforço e o trabalho de quem está oferecendo um produto ou serviço. Se não pode pagar, simplesmente não compre. Faça igual o Lula rsrsrs.
Mas brincadeiras a parte, não exija que os outros arquem com o custo da sua insatisfação.
E esta foi a mensagem de hoje.
Espero que tenha gostado de mais uma leitura aleatória.
-
-
@ a296b972:e5a7a2e8
2025-03-02 10:23:10Die Geburt in die Pareto-Welt hat dann doch länger gedauert, als gedacht, jedoch dank der Geduld meines Hebammen-Mentors, ist es nun vollbracht.
Ich möchte meinen Beitrag zum Erhalt der Meinungsfreiheit leisten, bin aber nicht ganz uneigennützig, denn das Schreiben ist auch mein Ventil für den Wahnsinn, der bei Verstand gebliebenen Menschen immer näher auf die Pelle rückt.
2020 habe ich, bis heute erfolglos, damit angefangen, langjährigen Freundinnen und Freunden Links zu schicken, die die Vorzüge der Gen-Behandlung infrage stellen.
Auslöser war ein Gespräch mit einem jetzt ehemaligen Freund über die Verhältnisse im 3. Reich. Wir stellten uns damals die Frage, wie wir uns wohl verhalten hätten, wenn wir gefragt worden wären, wo denn plötzlich der ruhige, zuvorkommende Nachbar Salomon abgeblieben sei, der nie einer Fliege etwas zu Leide getan hat. Hätten wir auch mit den Achseln gezuckt, weil wir Angst davor gehabt hätten, dass uns vielleicht das gleiche Schicksal ereilen könnte?
Wir kamen überein, dass es uns nicht zusteht, über die Schweiger zu richten, weil wir uns keine wirkliche Vorstellung von dieser Zeit machen konnten. Wir, die wir in einer Demokratie aufgewachsen sind, hatten keine Ahnung davon, wie sich eine Diktatur anfühlt, welche Stimmung sie verursacht, auf was man alles achten muss, damit man sich nicht mit dem Staat anlegt.
Seit dem C-Ereignis sind wir um eine Erfahrung reicher. Jetzt wissen wir es.
Wir wissen, wie digitale Bücherverbrennung geht, wie Bankkonten ohne Begründung gelöscht werden können, wie Existenzen vernichtet werden können, was nötig ist, um morgens um 6 Uhr schon Besuch zu bekommen, der dann noch nicht einmal frische Semmeln mitbringt, und dass es gut ist, immer einen frisch gewaschenen Bademantel am Haken hängen zu haben.
Als junger Mensch hatte ich noch die Gelegenheit mit einer Frau zu sprechen, die diese dunkle Zeit in Deutschland miterlebt hatte. Auf meine Fragen antwortete sie, das werde ich nie im Leben vergessen: „Wir haben ja von all dem nichts gewusst!“ Das kann man glauben, muss man aber nicht.
Das war für mich das Aha-Erlebnis. Schon damals habe ich beschlossen, dass ich niemals zu denjenigen gehören will, die so etwas sagen werden. Und meinen Freunden wollte ich von Anfang an die Gelegenheit nehmen, mir diesen Satz einmal sagen zu können, daher habe ich sie, nach eigener anfänglicher Verunsicherung, mit Informationen über das C-Ereignis versorgt, die im staatskonformen Propaganda-Funk nicht zu finden waren.
Mit Samtpfötchen habe ich mich herangetastet, Lese-Angebote gemacht, vorsichtig formuliert. Dabei ging es mir nie darum, recht zu haben oder recht zu behalten. Für mich ging es um meine lieben Freunde, um Leben und Tod. Ich war zutiefst besorgt um sie. Das hat auch nach 5 Jahren nicht dazu geführt, dass sie ihr heiliges Schweigegelöbnis gebrochen haben.
Inzwischen ist mein Freundeskreis vollkommen ausgetauscht.
Anfangs war ich noch so naiv zu glauben, der Schwindel würde sich ganz schnell in Wohlgefallen auflösen, doch dann wurde mir klar, dass sich der gesunde Hausverstand von einem großen Teil der Menschen verabschiedet hat, und das hält bis heute an.
Irgendwann kam dann in der Öffentlichkeit der Satz auf: „Das konnten wir zum damaligen Zeitpunkt nicht wissen.“ Doch konntet ihr, wenn ihr euch mit den alternativen Informationsquellen beschäftigt hättet, die sicher nicht nur ich an Freunde weitergegeben habe.
Nie habe ich behauptet, die Wahrheit gepachtet zu haben, immer aber habe ich danach gestrebt, ihr so nahe wie möglich zu kommen. Bis heute.
Inzwischen sind die allermeisten Verschwörungstheorien wahr geworden.
Nachdem das C-Ereignis etwas an Schärfe verloren hatte, ging es gleich weiter mit dem Ukraine-Konflikt. Einen Tag nach Ausbruch im Februar 2022 schrieb ich in einer Email: Die Ukraine kann diesen Krieg nicht gewinnen.
Und so ging es weiter und weiter. Ein Wahnsinn nach dem anderen. Ohnmächtig müssen wir dabei zuschauen, wie Universal-Dilettanten das Ruder in der Hand haben und kerzengerade auf den Eisberg zusteuern. Da soll man sich still zurücklehnen, Popcorn futtern und die Show genießen? Tut mir leid, kann ich nicht.
Die „Geistesgrößen“ dieser Zeit scheinen George Orwells „1984“ als Bedienungsanleitung zu verstehen. Als ich es jüngst noch einmal gelesen habe, dachte ich, am weitesten ist bislang das Wahrheitsministerium vorangeschritten. Verdrehung der Realität mit Neusprech. Eine Generalumkehr der Begriffe. Daher auch mein Name in Anlehnung an diesen großen Vorherseher.
Es ist mir nicht vergönnt, zu denjenigen zu gehören, die die Bequemlichkeit im Denken pflegen und kultivieren und ein Diplom in Verdrängen über dem Sofa hängen haben.
Ich will die alte Welt nicht zurück, im Gegenteil. Mit meinen bescheidenen Mitteln und Möglichkeiten will ich dazu beitragen, habe ich die Hoffnung, den einen oder anderen vielleicht doch noch zum Nachdenken anregen zu können. Ich muss nicht recht behalten, darum ging es mir nie, ich kann mich irren und würde das auch zugeben. Derzeit mangelt es jedoch an Gelegenheiten.
Vielleicht habe ich tatsächlich etwas zu sagen (so sagt man mir es nach), und es ist sicher kein Zufall, dass mir Pareto durch Milosz Matuschek über den Weg gelaufen ist.
Es würde mich sehr freuen, wenn die geneigten Leserschaft das eine oder andere anspricht, was ich so von mir geben werde. Erst, wenn es Satoshis regnet, damit ich aufhöre, lasse ich es.
Bis dahin werde ich mich für den Erhalt der Meinungsfreiheit einsetzen, weil diese unmittelbar mit einem demokratischen System einhergeht. Sägt man an einem Baum auf einer Seite alle Äste ab, gerät der Baum in Schieflage und er fällt beim leisesten Windzug um. Das gilt es von den für Gehirnwäsche immunen Menschen zu verhindern.
-
@ 592295cf:413a0db9
2024-08-17 07:36:43Week 12-08 a suitable protocol
The knots come to a head, some of you have gray hair, you get older.
Tkinter is better than ws://, more secure, but has limitations, unless you know how to use figma and do some magic. The project of Nabismo.
Maybe Nostr doesn't work for me.
Aspirin moment Nip-17, works with nip-44 and nip-59. Someone said they made the groups encrypted with nip-17. I tried and succeeded, now you can DM me, don't do it. I had sent the link to a conversation of nip-87 closed groups. There's JeffG doing something with MLS. Then there's keychat.io which uses signal Nostr Bitcoin ecash and that's it... But in dart. It's a bit like the Matrix analogue for Nostr.
Final controversy not all nips are mandatory.
Build the foundation. You can't think about selling the house
Yakihonne has a countdown. What can a desktop app be. Community Lists, Nip-29
A birthday on Nostr, no that's not possible, they're all cypherpunks. 🎉🎉 (Except me)
There is a different attitude from Nostr when updates are released compared to Bluesky, everyone there is still enthusiastic, on Nostr ah ok but this is missing oh but this is missing or but support this other one, or but * zap, wait a minute, keep calm 🙇♂️, I'm the first to do this. (The revolt of the developers)
Deletetion: Client that have relay paired can do delete, more intelligently, Perhaps you can think of a delete.nrelay subdomain as a filter. This id is deleted. Be careful what you don't want to do. Maybe a session with a psychologist is better, because then you find yourself doing what you said you didn't want to do.
Does it make sense to follow someone on Bluesky? In my opinion no, or better yet yes. There are several algorithms on Bluesky, which do their job well. In the end it's just a matter of arranging them better on the screen. Yes you can have lists to save someone, but then you read everything, so lists with algorithm seems like a next feature. this way they can keep the following small, almost minimal, because there are algorithms that work for the user. People will start writing for SEO algorithm and AI and other things, which tech gurus really like and so on. The fact that it is almost exclusively an app will greatly facilitate this trend, there will be almost no need for moderation, and you can get it all in just a few apps. (Great)
Oh yegorpetrov has abandoned. Pegorpetrov said that he is coming back 😌 It might be an invention but I'm a little heartened by it.
Bankify, a new wallet of super testnet, only for crush testers.
You can't stream on zap stream without reach, maybe it's better audio space. Contact someone maybe an influencer or Nostr elite or whatever. Open Source Justice Foundation streaming
Designer, I wanted to propose comment on wikifreedia nielliesmons article and follow #nostrdesign, but too many answers for today. NVK note is ~~mainstream~~
I think I'm not suited to Nostr.
Nostr-ava bike file geo tag sharing. (NIP-113) Sebastix doesn't respond, I must have done something bad to him, or maybe I'm stressing him too much. Finally he replied 🤙. In the end maybe, I have too much hype about this proposal and it's something I don't know maybe, but maybe if they were already doing something with geo tags it's better to say so.
Another birthday, less cypher more punk 😌
Usdt on Nostr, there must be some error. (freeform app)
USDT on tron is like Money. (Bitcoiner not really)
Privacy issue, deletion motion, or deletion request, go go.
Nip29 hype, i don't have hype at all. I'm tired of words, I record a podcast on Nostr. Let's see if I can do it, at least think it. (It's more of a workflow thing than actually something I would do)
- Create an npub (easy)
- Record the audio episode (I think I can do it). Terrible audio
- Loading on a Nostrhosting, if less than 10 MB it should go smoothly.
- Publish the video or audio of the episode on some Nostr client, perhaps using blastr relay 😞.
- Do the nostree link, by putting the episode, and also the npub.pro and put the URL on café-society. 6) Publish all these links on the Main profile, saying that, made a podcast about Nostr in Nostr of nostr. 😂
I thought a client could have poll, form, spreadsheet, collaboration document. It's the kind of otherstuff we want to see. Something that goes beyond a normal feed.
Emoj on bluesky, Eventually also zap 🥜 link emoj Blue
Eventually there will be a developer revolt And they will only do a social network in their downtime, they will call it Nostr.
There is a storm, Nostr does not work in 4g with two bars. Or now 4G is gone too.
Yakihonne Smart widgets, something to try on the weekend.
-
@ 592295cf:413a0db9
2024-08-10 09:24:14Week on Nostr 05-08
List of site for nostriches https://zaplinks.lol/
Fiatjaf web components
Welcome bear market 🧟♂️ fear, angry, build It's fine meme
I mutated one on stackernews. Basically I have notifications on Nostr page But someone keeps spamming every single thing, from his point of view it's a shared bookmark, but do it on your site. Maybe it's the heat...
On bluesky they eliminated a "for you" feed, now there is Discovery, not your feed, not your choice. There's actually a label that says my feeds, they're yours... Designed for you is more appropriate.
Mutiny lightning, "get the fuck on board". 😔
You lose your Money, ok
I don't know much about programming languages, but it seems like a jungle of scams
The purple pill help the Orange pill go down, maybe it was wrong. For now it's more people passing pills I have the orange give me the purple, I have the purple give me the orange. 😅
If you don't want no corn content you can go to mastodon and bluesky or whatever.
I thought nostr:relay might be a good solution to be a little more like a mint. It was deprecated, then the Nip-73 was added, rss feed and other devilry.
If you don't like what you see, change the app, this one will perhaps clear your following list and you'll start again from scratch. Not all things come to harm.
Why not Building agregore on Nostr, Nostr pear fedimint cashu mesh and local first. It doesn't seem like a simple application to make, from a local-first perspective, I solve a problem, but it's not a small problem to solve, Sync, database management, database schema, authentication, put everything together, instead I need this to solve this problem. It seems strange.
Aspie96 is making a client of ours, there was a lot of talk about how to increase content not related to bitcoin and things like that, there was one who was anti-bitcoin. I thought: Bitcoin is just a tool. Even guns are just a tool. I hate guns, I hate Bitcoin. It will be difficult, if you know any npub that hates Bitcoin comment below, thanks.
Trying not to use nostter for a while. It has glitches when loading threads and even with zap, I zapped myself even though I was clicking on the post I was replying to.
Voyage separates follow to topic in a new version.
People start arguing, it's allowed, everyone wants to be right, that's not the definition of social 👾.
Monitors watch-only bitcoin wallets https://github.com/sommerfelddev/sentrum
I noticed on Openvibe that in the trending timeline Nostr's notes have more interactions than responses. Maybe it was just that today Fiatjaf was doing universal polls 😅.
Step away from your favorite app, for a week if you can. Detox.
Oh Our founding, rain of money https://github.com/theborakompanioni/nostr-spring-boot-starte https://opensats.org/blog/nostr-grants-august-2024#seer
I'm happy for Vic and Sepher Nostroot exists 😅, note from some time ago. (I can't find it)
Perhaps the list of grant applications should be published, no one wants to open Pandora's box. 🙇♂️
Nostrasia 2.0 the Japanese community is a bit at a loss, they are trying to relaunch themselves 🤙, even if I'm seeing less enthusiasm, I'm following less.
I think a month has passed since I said this sentence, every day it was better but the next day something happened that you said maybe 6 months is too long. nostr:nevent1qy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7te3xsczue3h0ghxjme0qyw8wumn8ghj7mn0wd68ytnxwfskxarpd35h5ety9ehx2ap0qythwumn8ghj7mn0wd68ytnnw3skkete9ehx2ap0qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qpqf25td2xxgxfu80xpgg47cmfg2zkn6v803kefj3htjss5nvamfmgswf2kcs
Ho iniziato a seguire un po' local-first. https://docnode.dev/local-first I follow a podcast of the same name and dev tools.
When everyone thinks of Nostr they think of their favorite app and think that others see the same, but this is not the case.
I delete some gossip (photo)
Gossip is Nostr or Nostr is gossip.
Communities are difficult, they take time. I don't have this type of problem. People are fine on telegram and on simplex or any app. But maybe a Nostr project should be on Nostr?? Nip-29 can be interesting. Even if you start from scratch or almost. It's true that there are more apps, but this will perhaps only add to the confusion.
They are still talking about paid or non-paid relay, it's not a mature stage. Early stage.. I thought designers liked relays, that's not the case, I thought it was a place of experimentation, that's not the case. Bring more people. Last week I was talking about how I was jealous of bluesky who had an agenda for design, now it's also on Nostr, first hypernote article https://wikifreedia.xyz/hypernote-nip
I might say silly things, I'll go.
Hey Will remember to practice safe nsec always
nostr:nevent1qqsr6x8hduv8ta0g2da4aukrhzdtv6qcekyp5f9z9sxq6sd5peegnxgprpmhxue69uhhyetvv9ujumn0wdmksetjv5hxxmmdqy28wumn8ghj7un9d3shjtnyv9kh2uewd9hsygr4wku5l2q32tl99xjgn8feq22279pzwu25eezqxm2su2ken4wzvuf2ydnp
nostr:nevent1qqspsm343talkkjnyf3ah0zwy727cwd7phw3xnz49q59q5cfw4uhyngpzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgqgcwaehxw309aex2mrp0yhxummnwa5x2un99e3k7mgzyqewrqnkx4zsaweutf739s0cu7et29zrntqs5elw70vlm8zudr3y2j7zajz
Use nsec.app, 😅 Share bunker (smart people will know how to do it)
-
@ 41fa852b:af7b7706
2025-03-02 08:13:00"The only way to deal with an unfree world is to become so absolutely free that your very existence is an act of rebellion." --Albert Camus
Another great week of Bitcoin meetups is ahead of us!
This week, we are thrilled to partner with The Bitcoin Ireland Conference 2025 to help spread the word about this amazing grass-roots gathering.
We have two tickets to give away in a competition. To enter, click here to submit your entry.
Good luck, check out all the details below, and we'll see you there.
This week's sponsor is…
Upcoming Bitcoin Meetups
Happening this week…
-
Eat and Meet with Joe Bryan: Meet the creator of 'What's the Problem' and a host of fellow bitcoiners at the Weeping Willow in Bury St Edmunds. Starting at 18:00 on Tuesday, March the 4th.
-
Bitcoin 101 @ Cyphermunk House: On Tuesday, March 4, 2025, from 18:30 to 20:30, a beginner's Bitcoin class at 9 John Street, London WC1N 2ES. This 2-hour community-led event covers wallets, signers, and privacy, starting at 18:45. Arrive early; £5 donation in cash or sats.
-
Canterbury Bitcoin: Meeting this month at the Millers Arms in Canterbury at 19:00 on Tuesday the 4th of March. An informal meetup to discuss Bitcoin and chat.
-
Belfast Bitcoin: Join them on Tuesday the 4th March, 20:00. These guys meet in person monthly on the first Tuesday of each month at Ormeau Baths Event Space, 18 Ormeau Avenue, Belfast, BT2 8HS, Northern Ireland.
-
OPA North London Meetup: On Wednesday, March 5, 2025, from 18:30 to 21:30, North Londoners gather at Alice House, 283--285 West End Lane, NW6 1RD, West Hampstead. The Snug, a cosy pub nook, hosts this relaxed meetup for plotting and connecting, easily reachable by overground, no passport needed.
-
Rooted in the West Bank @ Cyphermunk House: On Friday, March 7, 2025, from 18:30 to 21:30, a 3-hour event at 9 John Street, London WC1N 2ES features a screening of a 47-minute documentary by Uri Fruchtmann and Bruno Sorrentino. It profiles Palestinian farmer Atta Jabar, with Uri presenting to raise sats for a feature-length expansion.
-
Bitcoin Walk - Edinburgh: Every Saturday at 12:00, Edinburgh Bitcoiners gather for a walk starting near Meadows Park's tennis courts, discussing news, innovations, and hyperbitcoinization. Newcomers are welcome to learn about Bitcoin's role in separating money from state. They often continue the conversation afterwards with something to eat. 🚶🏽♂️🚶🏼♀️🚶🏻
-
Bitcoin Derby: On Saturday, March 8, 2025, at 15:00, Bitcoin Derby gathers at Ye Olde Dolphin, DE1 3DL, to mark the 32nd anniversary of Eric Hughes' "A Cypherpunk Manifesto." Join fellow Bitcoiners to commemorate this iconic moment at the regular time and place.
-
Privacy Day, Nostr London v6: On March 9, 2025, the 2140 Collective hosts the event in Tooting from 15:00 to 21:40, honoring Eric Hughes' Cypherpunk Manifesto. It features talks on Bitcoin crowdfunding, freedom, Nostr projects, art, free burgers from Angor.io, and a sats drop for Lightning wallet users.
Upcoming Special Events
These events aren't happening next week, but they're important to add to your calendar now as tickets are selling fast.
- CheatCode 2025 - Peter McCormack hosts the CheatCode conference, following last year's success. This year, international guest speakers include Preston Pysh, Alex Gladstein, Natalie Brunell, Matthew Pines, Steve Baker, Ben Arc, and Checkmate.
Friday, April 11th, is the main conference day, followed by a huge meetup at Ledger Park for the men's Real Bedford match, and again on Sunday for the women's match. Check out the link for ticket details.
- Bitcoin Ireland Conference 2025: Bitcoin Ireland is hosting its annual Bitcoin Conference, building on the momentum of previous years. This year Bitcoin Events UK are proudly serving as a media partner to help spread the word! Enter our competition to win two free tickets worth (€198 value). This year's lineup of international guest speakers includes Daniel Prince, alongside notable figures like Knut Svanholm, Dinny Collins, Lawrence-Stanley and other respected voices in the Bitcoin community, offering thoughtful perspectives on the evolving Bitcoin revolution.
The main conference takes place on Saturday, May 24th, at The Green Isle Hotel in Dublin. Following the event, attendees can join a relaxed networking meetup with Ireland's Bitcoin community to continue the discussion. For ticket details, visit: www.bitcoinireland.eu.
Get Involved
- Volunteer Opportunities: Bridge2Bitcoin is actively seeking volunteers who share our passion for merchant adoption. We'd be delighted to connect if you're eager to contribute. Reach out to us on Twitter or through our website.
- Start Your Own Meetup: Interested in launching a Bitcoin meetup? We're here to support you every step of the way. We've assisted numerous UK Bitcoin meetups in getting started. Get in touch via Twitter.
- Contribute to BTCMaps: BTCMaps is a vital part of the Bitcoin ecosystem. It's a perfect project to get involved with if you're not a coder or even that technical. A great way to give back to the community. Maintain an area of the UK and keep it up-to-date.
- Telegram users: You might find our Telegram Channel another useful way to keep up-to-date with UK meetups.
- Feedback and Suggestions: We value your input! Share your ideas on how we can enhance this newsletter.
This week's sponsors are…
Get out and support the meetups where you can, visit Bitcoin Events UK for more info on each meetup and to find your closest on the interactive map.
Stay tuned for more updates next week!
Simon.
-
-
@ 592295cf:413a0db9
2024-08-04 05:55:02Nostter muted by kind
Will mute freefrom, hashtag fall
Venezuela riots, after the vote
I was thinking that having a Nostr conference every 6 months doesn't make sense, maybe it's better to focus on something else. If not it becomes a Tour Life. It doesn't increase adoption Produces tons of material It's good for networking It's not sustainable
Readable updates, how important they are. If it's just bugs and fixes it's better.
I hate Pam. As user It writes interesting stuff, but, doesnn't write in long form, because long form are more difficult, less reach and immediacy, and difficulties to share over in the feed,but not write a poem, sorry.
The thing about coracle is that I load the initial feed, but that gets printed, and it doesn't tell me if there are new notes coming in, as if it interrupts the flow, and it's always a fetch. I want to read the future, not always the past. RealTime feeds Like bluesky 🧞
Njump had problems, it keeps the cache and if the user changes something in their data it doesn't update it immediately. Fiatjaf was angry.
It's the month of NostRiga, we can move on to September without thinking about it. No
It's funny when you see a text in Japanese and inside read Nostr, I want to know what it says. He usually says Nostr is great. And the next note I drank too much 🤣
Today I thought that on the other side of the world it is February and that their February is 31 days. Pam said was sick. I see that hate is a virus 😅🙇♂️
I decided to publish stronpy when it's ready, maybe in 6 months. I've done the lineup, now I have to do the gantt 😅. Maybe I can post the gantt somewhere.
If it's not encrypted it's public. Amethyst draft 31000 and something like event
Nostr Is great but the amount of time Lost to the same thing because you don't know that exist Is remarkable. Nostr is a redundancy protocol
nostr:nevent1qqsqjqauc34k9k278x6cka5jyf3aq033y4pn5czwaff72l3rwum7llq7ela3x When they do that I can't stand them, then maybe it's a little different 😔😔 Zapper.fun ✅ Because you launch a project, example nostr.band but contain others 100 apps 😅 Nostr.band, nostrapp.link, zapper.fun, Nostr login, nsec.app, Npub.pro, Npub.pro also cli, Nostr universe/ knows as spring site
Even in Coracle it would be great to have a check on the note as root, because when you see the answers, perhaps the distance from another post, is so small, so perhaps a gray line for the mark of another note as root.
I listened to several minutes of plebchain radio episode on nostrnests. Language is an obstacle, but also an excellent justification. Last year I started recording a podcast episode, in which I talked about nostr bookmark update. I didn't even want to listen to it again 🤣.
I sent a video of an explanation of a zap it was 500 MByte of video for 4 minutes.
Nostr doesn't work. In practice, many apps have removed the possibility of logging in with the simple key, be it public or private, because especially the private one you don't want to copy paste in every single clients/apps, increasing the attack surface.
However, by removing this functionality and doing little onboarding, the matter is very difficult, but there is a certain belief that people who arrive at a Twitter like client get to know the network a little and then move on to videos or writing, or similar. But one can open a site by chance and see what it offers without knowing anything.
In the future there will only be one client, that of medical data...
Someone share this nostr:nevent1qqs24qzelpk8xjlk4dthr9tfkqwz8n58dlm04ezyvg9nuztud6jjfhc9mg04n I had in my bookmarks. I see dozen types of this self hosted manners. Maybe captains-log is for nostr-type, good.
-
@ df67f9a7:2d4fc200
2024-07-07 18:25:32Anyone who thinks that “onboarding new users” is simply a technical challenge of educating people about “how Nostr works”, is grossly mistaken about social networks in general and blind to what makes Nostr so special.
Social Networks are for Friends
Relationship building is why people use social networks. Connecting with friends and loved ones (and colleagues and customers also) is the obvious reason to join, and should be the primary objective in any onboarding endeavor. Everything else “about the technology” only needs to be introduced “as needed” in order for each new user to achieve this goal.
The Nostr Network Requires Trusted Friendships
To thrive at scale, Nostr needs to have established and interconnected “webs of trusted friends” for “verifying” authentic profiles and quality content. This PgP strategy for decentralized trust implemented on Nostr, is the best way to keep bots and bad actors at bay while preserving freedom and sovereignty for every user. Even though Nostr still doesn’t have a standard for determining who “is trusted” for any one user across all clients, we can already build tools to onboard new friends of the highest quality trust. Leveraging existing relationships, “webs of trust” can be strengthened even at this early stage simply by advocates “inviting friends to Nostr”.
Nostr is New and Already Full of Trusted Friends
But it won’t be for long. Bots and bad actors are relatively “easy” to keep at bay today because the Nostr userbase is still small. People who come to Nostr and STAY have mostly been a self selecting group of “freedom tech fans”. We like it this way, and are generally happy to be here. The comraderie is refreshing. But the more people that come to Nostr, the more Nostr will attract different kinds of people.
This is already happening. Nostr is growing at the edges, reaching out beyond the “freedom tech fans” and attracting a number of “less committed” (and some nefarious) individuals here and there. Who sticks around? The “friends of freedom tech fans” stick around longer because they have friends here. WAY BEFORE even considering how “the network effect” will take over, Nostr needs to solve for retention by bringing more “trusted friends” into the network. Social onboarding tools will allow us to share Nostr to “friends of freedom tech fans” and beyond, establishing interconnected “webs of trust” that are increasingly impermeable to bots and bad actors.
Nostr is Freedom Tech that People Want to Share
Creators and influencers of every kind share Nostr (and Nostr content) every day. This phenomenon is a gold mine for onboarding, and can be supported with tools and incentives. Driven by the fact that Nostr is an open protocol, owned by nobody and available for anybody to build upon and profit from, the passion for sharing Nostr will never wane. But our userbase may fall off, if people become disenchanted by undesirable content or lack of good follows. This is why onboarding efforts, to attract more “friends” to the network, are so important. Leveraging the “share worthy” phenomenon of Nostr itself to grow Nostr’s networks of “trusted friends” seems like a no brainer. But for this strategy to work, it needs to be win win win for all parties.
Everybody Wins with More Trusted Users on Nostr
Even as standards for qualifying trust are still being refined, “social onboarding” increases the ratio of “more” trusted over “less” trusted users across the network.
Developers Win
With more trusted users on the network, Nostr developers win by being able to attract an increasingly diverse range of business partners to sponsor their projects.
Sponsors Win
An increase in trusted usership equates to more “real people” perusing “desired content” and more chances for brands to engage “organically” with target audiences. Marketing opportunities increase with trust.
Advocates Win
Simply by sharing Nostr with their friends, Advocates support the sustained growth of trust across the network. Valuable zap reward programs to incentivize high quality onboarding efforts are easily justified and funded by social onboarding clients and their sponsors.
Users Win
More trusted users across the network means more trustworthy content in every feed and more easily discoverable friends and new follows regardless of the client or algorithm used.
Nostr Wins
More trusted users on the network means more “high quality” trust connections between each user. Strong webs of trust is what keeps out bots and bad actors, and is essential for stability as Nostr scales.
Social Onboarding Clients Bring Trust to Nostr
Having more tools for “sharing Nostr with friends” is how Nostr wins. Any client can have capacity for “Social Onboarding”. This may be a dedicated onboarding client or a feature set within a social client. A client that offers “Social Onboarding” will support Nostr advocates and the users that they invite. These should have the following feature set :
- Nostr advocates may create and share any number of customizable “Nostr invites” for different audiences or occasions. Each may have different reccomendations, or access codes, or expiry options. (A NIP is in the works)
- Nostr invite QR codes (and shareable URLs) should resolve to a WEB based interface for prospective (and existing) users who MAY NOT have a client or browser extension already installed.
- Each invite should (within the onboarding client) provide access to low friction profile creation AND advocate reccomended lists of new friends, interest groups, preferred clients, best relays, and other stuff.
- Private key generation and management for new users should be handled entirely within the onboarding client (using NIP standards without a browser extension or external bunker app) to reduce friction at this crucial moment.
- A human readable Nostr address (NIP05 or some future NIP) should be generated automatically for all new users.
- New account creation should result immediately in a direct message or group thread of private “gift wrap” encrypted messages. This thread acts as the new user’s “first contact” with the advocate (possibly others as well) and an anchor for exploring the rest of Nostr.
- Invite “receipt” data (who invited who) should be “gift wrap” encrypted, accessible only to the advocate and new user. Clients wishing to use this data for analytics MAY request access from BOTH parties.
- Top Advocates may be calculated by the client (using data from invite receipts OR from public Nostr usage metrics), and awards may be offered.
- Advocates may also be supported by the client through access to private “advocate support” groups and communities over the Nostr network.
Support Social Onboarding for Nostr
Meet Me On Nostr is an app for sharing Nostr with friends via advocate invites. It is a reference client to demonstrate the power of Social Onboarding for Nostr. The first launch of "feature complete" client is expected in fall 2024.
This is a “bootstrap” funded project in active development. We are not grant funded or VC funded. Instead, we are looking to pay our developers by sponsorships from “Nostr adjacent” businesses who want to increase brand recognition over this new social network.
Is Your Business Nostr Adjacent?
“I’d like to advertise on Nostr but it’s “not quite ready” says our marketing team.”
“It has potential, and we have alignment, but the technology is still a bit rough.”
“Nostr is a perfect fit for our “target audience”, but there simply aren’t enough people using it.”
If your business is aligned with freedom technology, and the people who build and use Nostr, then NOW is the perfect time to sponsor Social Onboarding. Help grow Nostr’s base of trusted users and engage directly with Nostr’s most active advocates and influencers as it scales.
Release Nostr’s Superpower
When Nostr advocates are equipped and incentivized to share Nostr with their friends, nothing can stop this network from growing and growing and growing ever more secure and interconnected networks of trusted users.
Onboarding and retaining trusted users as Nostr scales will require so much more than just pointing people to “how Nostr works” content. Nostr’s true power lies dormant in the existing relationships that Nostr users already have outside of Nostr. Leveraging this power is what Social Onboarding is all about. Social Onboarding is Nostr’s superpower.
-
@ da0b9bc3:4e30a4a9
2025-03-02 08:12:23Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/901383
-
@ 3bf0c63f:aefa459d
2024-06-19 16:13:28Estórias
-
@ 266815e0:6cd408a5
2024-04-22 22:20:47While I was in Mediera with all the other awesome people at the first SEC cohort there where a lot of discussions around data storage on nostr and if it could be made censorship-resistent
I remember lots of discussions about torrents, hypercore, nostr relays, and of course IPFS
There were a few things I learned from all these conversations:
- All the existing solutions have one thing in common. A universal ID of some kind for files
- HTTP is still good. we don't have to throw the baby out with the bath water
- nostr could fix this... somehow
Some of the existing solutions work well for large files, and all of them are decentralization in some way. However none of them seem capable of serving up cat pictures for social media clients. they all have something missing...
An Identity system
An identity system would allow files to be "owned" by users. and once files have owners servers could start grouping files into a single thing instead of a 1000+ loose files
This can also greatly simplify the question of "what is spam" for a server hosting (or seeding) these files. since it could simply have a whitelist of owners (and maybe their friends)
What is blossom?
Blossom is a set of HTTP endpoints that allow nostr users to store and retrieve binary data on public servers using the sha256 hash as a universal id
What are Blobs?
blobs are chunks of binary data. they are similar to files but with one key difference, they don't have names
Instead blobs have a sha256 hash (like
b1674191a88ec5cdd733e4240a81803105dc412d6c6708d53ab94fc248f4f553
) as an IDThese IDs are universal since they can be computed from the file itself using the sha256 hashing algorithm ( you can get a files sha256 hash on linux using:
sha256sum bitcoin.pdf
)How do the servers work?
Blossom servers expose four endpoints to let clients and users upload and manage blobs
GET /<sha256>
(optional file.ext
)PUT /upload
Authentication
: Signed nostr event- Returns a blob descriptor
GET /list/<pubkey>
- Returns an array of blob descriptors
Authentication
(optional): Signed nostr eventDELETE /<sha256>
Authentication
: Signed nostr event
What is Blossom Drive?
Blossom Drive is a nostr app built on top of blossom servers and allows users to create and manage folders of blobs
What are Drives
Drives are just nostr events (kind
30563
) that store a map of blobs and what filename they should have along with some extra metadataAn example drive event would be
json { "pubkey": "266815e0c9210dfa324c6cba3573b14bee49da4209a9456f9484e5106cd408a5", "created_at": 1710773987, "content": "", "kind": 30563, "tags": [ [ "name", "Emojis" ], [ "description", "nostr emojis" ], [ "d", "emojis" ], [ "r", "https://cdn.hzrd149.com/" ], [ "x", "303f018e613f29e3e43264529903b7c8c84debbd475f89368cb293ec23938981", "/noStrudel.png", "15161", "image/png" ], [ "x", "a0e2b39975c8da1702374b3eed6f4c6c7333e6ae0008dadafe93bd34bfb2ca78", "/satellite.png", "6853", "image/png" ], [ "x", "e8f3fae0f4a43a88eae235a8b79794d72e8f14b0e103a0fed1e073d8fb53d51f", "/amethyst.png", "20487", "image/png" ], [ "x", "70bd5836807b916d79e9c4e67e8b07e3e3b53f4acbb95c7521b11039a3c975c6", "/nos.png", "36521", "image/png" ], [ "x", "0fc304630279e0c5ab2da9c2769e3a3178c47b8609b447a30916244e89abbc52", "/primal.png", "29343", "image/png" ], [ "x", "9a03824a73d4af192d893329bbc04cd3798542ee87af15051aaf9376b74b25d4", "/coracle.png", "18300", "image/png" ], [ "x", "accdc0cdc048f4719bb5e1da4ff4c6ffc1a4dbb7cf3afbd19b86940c01111568", "/iris.png", "24070", "image/png" ], [ "x", "2e740f2514d6188e350d95cf4756bbf455d2f95e6a09bc64e94f5031bc4bba8f", "/damus.png", "32758", "image/png" ], [ "x", "2e019f08da0c75fb9c40d81947e511c8f0554763bffb6d23a7b9b8c9e8c84abb", "/old emojis/astral.png", "29365", "image/png" ], [ "x", "d97f842f2511ce0491fe0de208c6135b762f494a48da59926ce15acfdb6ac17e", "/other/rabbit.png", "19803", "image/png" ], [ "x", "72cb99b689b4cfe1a9fb6937f779f3f9c65094bf0e6ac72a8f8261efa96653f5", "/blossom.png", "4393", "image/png" ] ] }
There is a lot going on but the main thing is the list of "x" tags and the path that describes the folder and filename the blob should live at
If your interested, the full event definition is at github.com/hzrd149/blossom-drive
Getting started
Like every good nostr client it takes a small instruction manual in order to use it properly. so here are the steps for getting started
1. Open the app
Open https://blossom.hzrd149.com
2. Login using extension
You can also login using any of the following methods using the input - NIP-46 with your https://nsec.app or https://flare.pub account - a NIP-46 connection string - an
ncryptsec
password protected private key - ansec
unprotected private key (please don't) - bunker:// URI from nsecbunker3. Add a blossom server
Right now
https://cdn.satellite.earth
is the only public server that is compatible with blossom drive. If you want to host your own I've written a basic implementation in TypeScript github.com/hzrd149/blossom-server4. Start uploading your files
NOTE: All files upload to blossom drive are public by default. DO NOT upload private files
5. Manage files
Encrypted drives
There is also the option to encrypt drives using NIP-49 password encryption. although its not tested at all so don't trust it, verify
Whats next?
I don't know, but Im excited to see what everyone else on nostr builds with this. I'm only one developer at the end of the day and I can't think of everything
also all the images in this article are stored in one of my blossom drives here
nostr:naddr1qvzqqqrhvvpzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qq8xzun5d93kcefdd9kkzem9wvr46jka
-
@ 5df413d4:2add4f5b
2024-02-18 18:26:57You Are Not A Gadget by Jaron Lanier
Reading Jaron Lanier’s 2010 You Are Not A Gadget in 2023 is an interesting experience—equal parts withering, prophetic, and heretical clarion call warning from a high priest of the Technocracy and rambling, musing, cognitive jam session from a technofied musician-philosopher.
Yet, in ways that I think the author would be simultaneously pleased, amused, saddened, and disturbed by, the 13 yeas since the book’s publishing have, in places, proven him right with stunning foresight and precision, and in others, made his ideas appear laughable, bizarre, even naive. The book is written in five parts, yet I would suggest viewing it as two discrete elements—Part One (around the first half of the book) and…everything else.
For context, Lanier, is a computer scientist and early technologist from the area of Jobs, Wozniak, and Gates, and is considered to be a founding father of virtual reality. He is also a consummate contrarian, a player of rare and obscure musical instruments, a deep interdisciplinary thinker…and a white man with dreadlocks named Jaron.
PART ONE
Part One of the book “What is a Person?” reads like a scathing and clear-eye manifesto—where Lanier is batting 1000, merciless in his rightness. Were one to pull a passage that speaks to the soul of this portion of the book, it might be the following: “The net does not design itself. We design it.”
Lanier terms the prevailing technocratic ideology—the particular winning tech-nerd subculture that has now come to capture our society—as “the cybernetic totalist” or “digital Maoists.” Essentially a materialist and stealth collectivist movement in new-age technocratic dress, that through its successes, and now excesses, represents much the same of religion that it’s founders would have claimed to be “evolving past.”
Lanier points out that in this, we are simply trading the pursuit of finding God in spirituality or the afterlife, for a notion of digital immortality—seeking, or, if possible, becoming, God in the cloud. He aptly identifies that this worldview requires that society, and all human interactions really, be savagely bent into adherence to this new religion of aggregation that demands deification of data, gross diminishment of the individual, and belief in some objective (but never defined) "meaning" that exists beyond and apart from the human observer.
With skill and simple wit, he raises strong, rational counterpoint to the digital Maoists’ obsession with quantity, data in aggregate and at-scale, as society's prime directive “A fashionable idea in technical circles is that quantity […] turns into quality at some extreme scale […] I disagree. A trope in the early days or computer science comes to mind: garbage in, garbage out.”
Lanier is able to envision the digital cages that likes of Facebook, Youtube, social-media dating apps would become for the internet native generations. Of whom he writes “The most effective young Facebook users […] are the ones who create successful online fictions about themselves,” and “If you start out by being fake, you’ll eventually have to put in twice the effort to undo the illusion if anything good is to come of it.”
Lanier’s 2010 criticism of Wikipedia-ism is now double or triply apropos in our current hype cycle of “AI magic” and Everything-GPT, “Wikipedia, for instance, works on what I can the Oracle Illusion, in which knowledge of human authorship of a text is suppressed in order to give the text superhuman validity. Traditional holy books work in precisely the same way and present many of the same problems.” This same deep truth now sits at the heart of every “new” creation churned out by the flavor-of-the-week, plagiarism-at-scale, generative AI tool.
More darkly, he is also able to foresee the spectre of a return to collectivism lurking both at the core and on the margins of our new digital age—“The recipe that led to social catastrophe in the past was economic humiliation combined with collectivist ideology. We already have the ideology in its new digital packaging, and it’s entirely possible we could face dangerously traumatic economic shock in the coming decades.”—“No Shit” said everyone who lived through 2020-2022…
This brings us, eerily, to the world of today. Where aggregate insights are upheld as more valuable than discrete insights. Where crowds are are assumed to have more wisdom than individuals. Where truth is twisted into a might-is-right numbers game. A world ruled by the idea that if we can just centralize enough information and sufficiently pulverize authorship, the result will, necessarily, be something super-intelligent, "alive," and perhaps even divine.
In short, the cybernetic totalists and digital Maoists, having killed reason, now sit on its corpse like a thrown, smearing its blood on the walls in the name of art and reading its still-steaming entrails for prophecy.
If I were to infer some ideological takeaway from Part One of the book, it might be that Lanier seems to axiomatically reject any affirmative implication of the Turing Test. Simply put, he believes that bits are not and cannot ever be alive independent of the human-as-oracle. Further, there is no objective meaning beyond the human observer—in fact, that observer fundamentally creates any meaning there is to be had. This is best illustrated by one of the most powerful passages in the book:
“But the Turing Test cuts both ways. You can’t tell if a machine has gotten smarter or if you’ve just lowered your own standard of intelligence to such a degree that the machine seems smart. If you can have a conversation with a simulated person presented by an AI program, can you tell how far you’ve let your sense of personhood degrade in order to make the illusion work for you?”
Ponder this well, Anon.
EVERYTHING ELSE
With all of the great stuff above out of the way, we must turn to…the rest of the book. Parts Two through Five breakdown into something more like a stream of consciousness. And while there are certainly many nuggets to insight and beauty to be found, the book becomes largely dis-coherent and very difficult to read. That said, the remainder of the book does contain three particularly compelling threads that I find to be worth pulling on.
Internet Attribution First, are Lanier’s musing about money and attribution in our authorless “information wants to be free” world. He laments the infinite elevation of advertising and offers harsh critique to the concept of attention as the new currency—as this tends to overwhelmingly reward the aggregator and a piddling few soulless super-influencers at the expense of all other users and creators.
Interestingly, under the guise of “what could have been” he imagines a world where attribution is tracked across the web (though how this achieved is left unanswered) and royalty payments can flow back to the author seamlessly over the internet. I find his vision to be intriguing because in 2010, we lacked the technology to either track attribution across the web or facilitate seamless micropayment royalties based on access / usage.
While we still don't have the ability to achieve the type of fully-tracked, always-on attribution Lanier imagines, we do now have the ability to stream payments across the internet with bitcoin and the lightning network. While Lanier can be excused for not mentioning the then uber-nascent bitcoin in 2010, bitcoin’s development since only goes to underscore the prescience of Lanier’s imagination.
The bigger question that now remains, especially in the face of the advent of “AI,” is whether such a system to manage and therefore enforce attribution globally on the internet would even be a good thing. Where obscured attribution enables mashed-up plagiarism-at-scale, centrally enforced attribution can just as easily enable idea, content, discovery, and innovation suppression-at-scale.
Music in the New Age Second, much of the book, particularly in the second half, is filtered through the lens and language of music. Music is essential to Lanier’s inner life and it is clear that he views music as an emergent mystery force attributable to something unknowable, if not divine, and entirely unique to the human experience.
He bemoans the music of the 2000s as lacking in any distinct chronological era sound—everything is either a rehashed mashup or digitally lofi-ed emulation of sounds from previous begone eras—it is music that is impossible to place. To him, it is as though musical evolution stopped right around the time of the advent of the internet…and then folded back in on itself, creating an endless kaleidoscoping of what came before but rarely, if ever, the creation anything truly new.
In response, Lanier goes so far as to imagine the ridiculous (my take, not his) world of “Songles”—songs on dongles—essentially physical music NFTs. In Songleland, listening to the hottest tracks at a party hinges on the guy or gal with the dankest songles swinging through and plugging them into the Songle player. And songles, being scarce, even become speculative investments. On this, Lanier manages to be both right and wrong in only the most spectacularly absurd of ways.
But what Lanier really laments is the passing of popular music as a shared cultural experience at national or even global scale. During Lanier’s coming of age through the 1960-80s—with only a few consolidated channels for music distribution, it was truly impossible to escape the sounds and influence of the Beatles or Prince or Micheal Jackson—everyone heard it and even the deaf still felt it.
In the end, Lanier could image Songles but he couldn’t envision what Spotify would become—a conduit to shatter music distribution into a myriad of tiny longtails—providing infinitely fragmented and individually fine-tuned music experiences rather than large and cohesive cultural moments. However, even in this miss, Lanier is largely able to project what Spotify-ed music would resolve to—music designed as much or more to please the self-referential selection algorithm than any real, human listeners. A dangerously foretelling insight that goes well beyond music as AI tools are posed to become the "googling" of the next technological cycle—what happens to information, to human thought, when the majority of "generative AI" outputs are just the machine referencing itself?
Digital Neoteny The final thread to pull is that of "digital neoteny," the retention of juvenile behaviors in adult form, in this case, a neoteny of the mind if you will. Lanier sees the internet as specifically primed to propagate three kinds of neoteny in digital-native humans— a blissful and curious Bachelardian neoteny (as in Gaston Bachelard’s Poetics of Reverie); a cruel and mob-like Goldingesque neoteny (as in William Golding’s Lord of the Flies); and a general and deeply pervasive, infantile neoteny.
Neoteny of the Bachelardian variety, which Lanier likens to “the sense of wonder and weirdness that a teen can find in the unfolding world,” is what he feels the internet has provided in a few brief and magical moments generally aligned with the “early days” of successive internet technologies, movements, and companies—through this generally degrades into Goldingesque neoteny as novelty gives way to ossification.
Lanier’s missives on Bachelardian neoteny feel especially pertinent to the present state of Nostr (where I am publishing this writing). Nostr is in a moment where winner-take all dynamics and corporatization have yet to take hold. Child-like revelry abounds with each new discovery or novel Nostr client development so much so that the likes of Jack Dorsey compare it to the excitement of the early internet.
But with time, if and as the Nostr protocol wins, to what extent will technical lock-in take hold here? To what extent will calcification of seemingly trivial or even comical decisions being made by client devs today have dramatic implications on the feasibility of other development in the future? And will we early Nostr users, at some point put down welcoming inclusivesness for insular tribalism—and in what ways might we be doing this already?
Finally, to the third kind of neoteny, Infantile neoteny—which perhaps incapsulates the internet even more so than either of the other two types—Lanier sees the net driving an evermore prolonged deferral of maturity, resulting ultimately in some centrally-managed permanent arresting of society in a stupefied and juvenile mental state:
“Some of the greatest speculative investments in human history continue to converge on Silicon Valley schemes that seemed to have been named by Dr. Seuss. On any given day, one might hear of tens or hundreds of millions of dollars flowing to a start-up company named Ublibudly or MeTickly. These are names I just made up, but they would make great venture capital bait if they existed. At these companies one finds rooms full of MIT PhD engineers not seeking cancer cures or sources of safe drinking water for the underdeveloped world but schemes to send little digital pictures of teddy bears and dragons between adult members of social networks. At the end of the road of the pursuit of technological sophistication appears to lie a playhouse in which humankind regresses to nursery school.”
The popular culture of the early 2020s—with it’s NFT Monke JPEGs, silent and masked TikTok dancing in the drab aisles of crumbling department stores, and rampant peer-pressured social-media virtue-signaling and paternalism—could scarcely be described in any more stark and specific detail. That such could be seen so vividly in 2010 is as masterful as it is dishearteningly dark.
CONCLUSION
You Are Not A Gadget is a special thing, a strange beast—as lucid in its first half as it is jumbled, meandering, and even nonsensical in its second half. And while the discerning reader might judge the book harshly for these structural failings, I doubt the author would care, he might even welcome it. Lanier’s apparent purpose in writing is to share his mind rather than please the reader in any particular regard. The sufficiently curious reader, one who is willing to engage with the book’s content, for whatever the book’s faults may be, finds a king’s randoms of wisdom, insight, and uncanny foresight.
In closing, it seems fitting to recall one of Lanier’s earliest warnings in the book, “Maybe if people pretend they are not conscious or do not have free will […] then perhaps we have the power to make it so. We might be able to collectively achieve antimagic.” 13 years on, this feels more pressing and urgent and true than ever. (Rating: 4/5🐙)
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ fbf0e434:e1be6a39
2025-03-02 06:18:25DoraHacks has once again set a new standard for showcasing the brightest minds in Web3 and frontier technology with the successful debut of BUIDL DAY—our flagship event dedicated to amplifying the voices of early-stage, high-impact projects from the most promising ecosystems in the space.
With over 500 participants in attendance, BUIDL DAY was more than just an event; it was a hub of energy and innovation. Held at the intersection of collaboration and cutting-edge technology, we brought together nine pioneering ecosystems.— Cosmos, Babylon, Sonic, Aptos, Circle, KAIA, Initia, Movement and Flow—to spotlight the most original and contrarian early-stage teams building the next generation of technology.
It was the moment DoraHacks unveiled its defining thesis for 2025: Freedom of BUIDL—the fundamental belief that anyone, anywhere, should have the freedom to build what they want, when they want.
DoraHacks is not merely a platform. It is a force of nature, mobilizing the world's largest and most significant hacker movement. With over 200,000 developers having collectively launched 20,000+ startups, DoraHacks is rewriting the blueprint of innovation. This is where the future is built—not in closed rooms, but in the open, by hackers who refuse to ask for permission.
Hacking Without Borders
The numbers speak for themselves. In 2024 alone, over 300 organizations hosted more than 350 hackathons through DoraHacks, proving that the demand for open innovation has never been stronger. Any organization, from emerging startups to global enterprises, can tap into the boundless creative potential of the DoraHacks ecosystem and launch their own hackathons with ease.
DoraHacks' 2025 Thesis: The Future of BUIDL
At BUIDL Day, DoraHacks announced its core technological priorities for 2025. These are not mere trends—they are fundamental shifts in how the internet, cryptography, and decentralized systems will evolve. DoraHacks is doubling down on collaborations with the most critical open-source platforms to foster growth and innovation. The key areas include:
- Consumer Crypto – A narrative gaining traction across Aptos, Circle, Flow, and beyond, driving the next wave of crypto-native consumer applications.
- Agentic Crypto & Organizations – A revolution in decentralized coordination, playing out in Injective, Sonic, and YakiHonne.
- Freedom of BUIDL & Privacy Tech – Powering sovereign innovation and privacy-first technologies, championed by Zama and Dora Factory.
- Sovereign Independent Blockchains – The rise of self-sovereign networks, an area where Cosmos and its ecosystem continue to lead.
But we are not stopping there.
Exploring the Next Frontier
2025 marks the beginning of DoraHacks’ deep foray into frontier technology:
- Quantum Software & Infrastructure – Enabling the next paradigm shift in computing.
- Quantum Cryptography – Developing encryption that withstands the quantum era.
- Open Source Hardware – Breaking the barriers of proprietary computing.
The future is decentralized. It is open-source. And it is being built, right now.
The Next Chapter: Google Cloud x DoraHacks
DoraHacks is not just shaping the future—it is forming alliances with those who are building it. At BUIDL Day, DoraHacks officially announced its partnership with Google Cloud. As part of this collaboration, Google Cloud will provide $350,000 in cloud and AI services to support DoraHacks’ most promising startups. This partnership will also drive the launch of new hackathons focused on cutting-edge fields, from AI to quantum computing.
A Platform for Bold Builders
BUIDL DAY was meticulously designed to give early-stage teams the visibility, resources, and connections they need to propel their projects forward. Unlike traditional conferences and summits, our focus was on the BUIDLs that challenge the status quo—teams building with first-principles thinking and forging paths where others have yet to tread. These BUIDLs represented the cutting edge of decentralized technology, from novel Layer 1s and interoperability solutions to revolutionary applications in DeFi, consumer, AI gaming, and infrastructure.
Unparalleled Networking and Exposure
The energy in the room was electric as builders, investors, and foundation leaders engaged in deep discussion. Venture capitalists, including some of the most active investors in the space, had the opportunity to meet the next wave of category-defining projects at their earliest stages. Meanwhile, developers and founders connected with the leading foundations backing their ecosystems, receiving invaluable insights, mentorship, and potential funding opportunities.
Beyond structured networking, serendipitous encounters defined the day—whether it was a team finding a strategic partner over coffee or a founder securing an unexpected investor introduction during a panel discussion. BUIDL DAY was proof that the right environment fosters groundbreaking collaborations.
Why BUIDL DAY Matters
The ethos behind BUIDL DAY is simple: true innovation happens when visionary builders are given a platform to share, iterate, and connect. While the Web3 landscape is constantly evolving, one thing remains certain—early-stage projects need more than funding; they need the right ecosystem, exposure, and support to succeed.
By curating an event that prioritizes originality and contrarian thinking, DoraHacks has reaffirmed its commitment to nurturing the builders who will define the future of blockchain and beyond. BUIDL DAY was not just a moment in time—it was the beginning of something much bigger.
To all the builders, investors, and foundation leaders who joined us: thank you for making this an unforgettable experience. We can’t wait to see where these projects go next and look forward to building together in the future.
Until next time, keep BUIDLing!
If you want to learn more about all of the participating BUIDLs please refer the our
-
@ d6dc9554:d0593a0c
2023-09-21 18:37:14Nas blockchains PoW o consenso é alcançado por meio de prova de trabalho computacional e o objetivo principal é evitar que atores mal intencionados consumam ou ataquem a rede de forma perigosa. Este método de consenso requer um grande poder computacional para criar novos blocos, mas é muito simples, por parte de outros, verificar esse trabalho. Por isso se diz que PoW é uma estratégia assimétrica.
Nas blockchains PoS o objetivo é o mesmo, criar blocos e chegar a um consenso, mas nas PoS não é necessário um poder de processamento tão grande como nas PoW. Em média as PoS gastam menos de 1% da energia das PoW. Nas PoS os mineradores são chamados de validadores. Enquanto que nas PoW quem fica com a recompensa é quem resolve primeiro a charada matemática, nas PoS o validador que vai ganhar a recompensa é escolhido de forma aleatória, mas dando maior probabilidade aos que respeitem determinados critérios. A comunidade bitcoin é muito relutante em relação a PoS porque é mais fácil conseguir uma grande quantidade da moeda em causa do que mais que 51% de poder processamento. Logo as PoS são mais vulneráveis no que toca a segurança. Mas aqui cada caso é um caso e é preciso fazer essa análise para cada moeda.
As blockchains PoW tendem a ser mais descentralizadas enquanto as PoS mais centralizadas, não só em acesso, mas também em operação. Mais de metade dos validadores de ethereum estão na cloud da amazon. As blockchains PoW apresentam grandes desafios na escalabilidade de operação, muitas vezes exigindo soluções de segunda camada (L2), enquanto que as PoS possuem mecanismos de escalabilidade muito mais flexíveis. Os algoritmos PoW são muito mais simples de implementar do que os PoS e, portanto, menos suscetíveis a erros. Um bom exemplo é o PoS da ethereum que estava a ser implementado desde 2018.
-
@ 6e0ea5d6:0327f353
2025-03-02 03:08:00Ascolta bene! Conquering a city is easy. All it takes is gathering armies, strategies, and being ruthless. But mastering one’s own spirit? Ah, that is the battle that separates men from boys, leaders from tyrants, and the wise from the foolish.
Davvero, patience is the hammer that shapes a man's spirit; fury is the fire that destroys it. A warrior wins battles, but a man who controls his emotions rules empires. He who governs himself will never be a slave to circumstances.
An army may tear down walls, but a single man who controls his emotions builds empires—both within and beyond himself. Patience is not weakness; it is the precise strike of one who has already won the internal battle. Unchecked rage destroys in seconds what patience builds over a lifetime.
External victory without internal mastery is a deception. What good is it to conquer a city if your soul remains a battlefield? He who does not control his spirit is a slave to himself. Anger, ego, and pride are serpents coiled within the heart, ready to suffocate any chance of greatness. A man without self-control is nothing more than a wild beast; a patient man is a fortress.
Patience is not weakness; it is an invisible sword that cuts deeper than any forged blade. True power does not lie in the roar of rage but in the silence of strategy. It is the shield that guards against reckless decisions, words that cannot be taken back, and mistakes that are far too costly. A patient man, one who masters his spirit, is like a volcano—choosing when and where to erupt. He does not waste energy; he channels it, calculates, and triumphs.
A man's success is not measured by the lands he conquers or the people he commands, but by his ability to remain unshaken, even when everything around him crumbles. The man who does not master himself is a slave, even with an empire at his feet. But the patient man, the one who transforms anger into strength and silence into strategy, becomes a living weapon. He does not merely survive—he dominates, unbreakable, immortal in his legacy.
Be this man, amico mio.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 7d4417d5:3eaf36d4
2023-08-19 01:05:59I'm learning as I go, so take the text below for what it is: my notes on the process. These steps could become outdated quickly, and I may have some wrong assumptions at places. Either way, I have had success, and would like to share my experience for anyone new to the process. If I have made any errors, please reply with corrections so that others may avoid potential pitfalls.
!!! If you have "KYC Bitcoin", keep it in separate wallets from your "Anonymous Bitcoin". Any Anonymous Bitcoin in a wallet with KYC Bitcoin becomes 100% KYC Bitcoin.
!!! It took me several days to get all the right pieces set up before I could even start an exchange with someone.
!!! Using a VPN is highly recommended. If you're not already using one, take the time to find one that suits you and get it running.
!!! If you don't normally buy Amazon Gift Cards, start doing so now, and just send them to yourself, or friends that will give you cash in return, etc. For my first trade, Amazon locked me out of my account for about 22 hours, while I was in the middle of an exchange. All because I had never purchased an Amazon Gift Card before. It was quite nerve wracking. My second trade was for $300, and although my Amazon account wasn't shut down, that order had a status of "Sending" for about 22 hours, due to the large amount. In each of these cases I had multiple phone calls with their customer support, all of whom gave me false expectations. Had I already been sending gift cards to the anonymous email address that I created in the steps below, and maybe other anonymous email addresses that I could make, then I might not have been stalled so much.
-
Install Tor Browser for your OS. The RoboSats.com website issues a warning if you are not using Tor Browser. If you don't know what Tor is, I won't explain it all here, but trust me, it's cool and helps keep you anonymous. If you use Firefox, the interface will look very familiar to you.
-
Create a KYC-free e-mail address. I used tutanota.com in Firefox, as it would not allow me to create an account using Tor Browser. After the account was created, using Tor Browser to login, check emails, etc. has been working perfectly. Tutanota requires a 48 hour (or less) waiting period to prevent bots from using their system. You'll be able to login, and even draft an email, but you won't be able to send. After you've been approved, you should be able to login and send an email to your new address. It should show up in your Inbox almost instantly if it's working.
-
Have, or create, at least one Lightning wallet that is compatible with RoboSats.com and has no KYC Bitcoin in it. The RoboSats website has a compatibility chart available to find the best wallet for you. During an exchange on RoboSats, you will need to put up an escrow payment, or bond, in Satoshis. This amount is usually 3% of the total amount being exchanged. If the exchange is successful, the bond payment is canceled, leaving that amount in your wallet untouched, and with no record of it having been used as escrow. If you don't hold up your end of the trade, the bond amount will be transfered from your wallet. I created a wallet, using my new email address, with the Alby extension in the Tor Browser. This anonymous wallet was empty, so I used a separate wallet for the bond payment of my first trade. This wallet had KYC Bitcoin, but since it is being used for a bond payment, and no transaction will be recorded if everything goes okay, I don't mind taking the minuscule risk. After the first trade, I don't need to use the "KYC wallet", and I will use only my anonymous Lightning wallet for transactions related to performing a trade.
-
Create a new Robot Token by going to RoboSats using the Tor Browser. Copy the Token (Robot ID) to a text file as a temporary backup. It is recommended to create a new robot-token for every session of exchanges you make.
-
Select "Offers" to browse what others are presenting. "Create" is for when you want to create an offer of your own. You may need to create your own offer if none of the existing offers match your criteria.
-
Select "Buy" at the top of the page.
-
Select your currency (USD).
-
Select your payment methods by typing "amazon" and selecting (Amazon Gift Card). Repeat this process and select (Amazon USA Gift Card).
-
Determine Priorities - If you prefer to trade quickly, and don't care as much about premiums, look for users with a green dot on the upper-right of their robot icon. If you're not in a hurry, sort users by premium and select the best deal, even if they are inactive. They may become active once they are notified that their offer has activity from you.
-
The Definition of Price = the price with the premium added, but not the bond
-
A. Find A Compatible Offer - Select the row of the desired offer and enter the amount you would like to buy. i.e. $100 If you do not find a compatible offer, you will have to create your own offer.
B. **Create An Offer** - First, take a look at "Sell" offers for your same currency and payment method(s) that you will be using. Take note of the premium those buyers are willing to pay. If your premium is drastically less than theirs, your offer may get ignored. Select "Create" at the bottom of the screen. There is a slider at the top of the screen, select it to see all the options. Select "Buy". Enter the minimum and maximum amount that you wish to spend. Type "amazon" to select the methods that you would like to use (Amazon Gift Card, Amazon USA Gift Card). For "Premium Over Market", enter an amount that is competitive with premiums you saw at the start of this step and do not use the % sign! You can adjust the duration, timer, and bond amount, but I leave those at their default settings. Select the "Create Order" button, and follow the instructions for making a bond payment.
-
Pay the Bond - Copy the invoice that is presented. From your wallet that contains bond funds, select "Send", and paste the invoice as the recipient. This money will never leave your account if the exchange completes without issue. No transaction will be recorded. If there is a complication with the exchange, it is possible that this transaction will complete.
-
Create and Submit Your Invoice for Their Bitcoin Payment To You - Select "Lightning", if not selected by default.* Select the Copy Icon to copy the correct amount of Satoshis. This amount already has the premium deducted. From your anonymous Lightning Wallet, select "Receive", and paste the Satoshi amount. If you enter a description, it's probably best to keep it cryptic. Copy the invoice and paste it into RoboSats; then select "Submit".
* If you plan on "mixing" your Bitcoin after purchase, it may be better to select "On Chain" and pay the necessary fees swap and mining fees. In the example this comes from, Sparrow wallet is used and has whirlpool ability in its interface.
-
Connect With Seller and Send Funds - Greet the seller in the chat window. The seller has now provided RoboSats with the Bitcoin to transfer to you. Your move is to buy an Amazon eGift Card for the amount of the trade. Log in to your Amazon account and start the process of buying an eGift card. For delivery there is the option of email or txt message. Ask the seller what their preference is, and get their address, or phone number, to enter into Amazon's form. Complete the purchase process on Amazon, and check the status of your order. Once you see the status of "Sent", go back to RoboSats in your Tor Browser.
-
Confirm Your Payment - Select the "Confirm ___ USD Sent" button and notify the seller to check their e-mail/txt messages.
-
Seller Confirmation - Once the seller select their "Confirm" button, the trade will immediately end with a confirmation screen.
-
Verify - If you check the anonymous wallet, the new amount should be presented.
-
-
@ e6817453:b0ac3c39
2023-08-12 15:42:22The Zooko’s Triangle is a concept in the realm of naming systems, specifically for decentralized or distributed networks. It was named after Zooko Wilcox-O’Hearn, a computer scientist and cypherpunk known for his work on the Zcash cryptocurrency. The triangle illustrates a trade-off between three desirable properties in a naming system:
- Human-meaningful: Names are easily understood and remembered by humans.
- Decentralized: No central authority controls the allocation or management of names.
- Secure: Names are unique and cannot be easily taken or manipulated by others.
Zooko’s Triangle posits that achieving all three properties in a single system is difficult. Traditionally, a system could have only two of the three properties, leading to various combinations of naming systems with their respective advantages and disadvantages.
However, recent developments in cryptographic and distributed systems have led to solutions that challenge the traditional constraints of Zooko’s Triangle. One such system is the Decentralized Identifiers (DIDs).
DIDs
Decentralized Identifiers (DIDs) are a new identifier for verifiable, decentralized digital identity. DIDs are designed to be self-sovereign, meaning that individuals or organizations control their identifiers without relying on a central authority. DID systems are built on top of decentralized networks, such as blockchain or distributed ledgers, providing a secure and tamper-proof infrastructure for identity management.
DIDs aim to achieve the three properties of Zooko’s Triangle:
- Human-meaningful: While DIDs may not be human-meaningful due to their cryptographic nature, they can be associated with human-readable names or aliases.
- Decentralized: DIDs are managed on decentralized networks, removing the need for a central authority.
- Secure: The decentralized nature of DIDs, combined with cryptographic techniques, ensures that identifiers are unique, secure, and resistant to tampering.
In summary, Zooko’s Triangle presents a trade-off between human-meaningful, decentralized, and secure properties in naming systems. Decentralized Identifiers (DIDs) are an example of a system that seeks to overcome the traditional limitations of the triangle by leveraging decentralized networks and cryptographic techniques to provide a more comprehensive solution for digital identity management.
-
@ 22050dd3:480c11ea
2025-03-02 03:06:35Written by Keith Meola, Revised by Frank Corva
Situated 8 miles off the coast of Cancun surrounded by pristine turquoise waters is a small island called Isla Mujeres.
And when I say small, I mean small. It measures just 5 miles long by 0.5 miles wide.
The sliver of landmass has a lot going on, though. On it, you can find a lake, a bay, different beaches with unique waves, and various distinct areas.
There’s the calmer residential center, the active and more touristy “downtown”, and the tranquil and posh Southern tip, to describe a few.
12,600 people live on the island, and several hundred merchants and businesses operate there.
Of these businesses, 16 accept bitcoin.
At the beginning of 2024, this number was zero. So, how have so many people on the island been orange-pilled in such a short period of time?
A passionate Bitcoiner named Isabella (Isa) Santos, that's who. And she started doing this work at block height #829,750 (mined February 9, 2024). This is when BTC Isla was born.
BTC Isla
Isa started the work as a passion project. BTC Isla was slow to initially get off the ground, but, Isa began to pick up steam by the end of 2024. And now she is charging ahead with the help of visiting Bitcoiners.
The first visitor arrived in the Summer of 2024 and the number of visitors has been steadily increasing since then.
Within the first month of this year, 6 Bitcoiners from 4 countries have visited the island to see what is happening and partake in the movement. Those who have visited have split their time between attending meetups or volunteering and partaking in efforts to spread Bitcoin adoption. And Isa intends to welcome many more Bitcoiners to the island this year.
She also plans to continue to work tirelessly to not only onboard more merchants but to educate the freshly orange-pilled about how Bitcoin works and why it's so important.
One of the bitcoin-accepting merchants on the island
Bitcoin Education
Education is at the core of BTC Isla. In Isa's mind, Bitcoin education is necessary to truly empower the population.
It is one thing to accept bitcoin as a form of payment. It's another for people to truly understand what Bitcoin is and what it can do for them.
Isa teaches Bitcoin classes which are free to attend.
At the moment they are held at the Mayakita restaurant, which is also the usual spot for the Bitcoin meetups. Isa teaches the classes in Spanish using the Mi Primer Bitcoin curriculum.
This curriculum is an open-source diploma-based educational program created by the organization Mi Primer Bitcoin in El Salvador. Through their coursework, students are taught the essential knowledge to gain financial literacy and understand Bitcoin.
As of the time of writing, one cohort has already graduated and the second one is on its way!
BTC Isla class
Merchant Adoption
Adoption on the island is picking up steam in 2025. As mentioned, 16 merchants on the island currently accept bitcoin as payment.
And Isa is working to increase that number with the help of locals. Expats living on the island as well as students and graduated students help with adoption.
Thanks to the efforts of Isa and her team, it's now possible to visit the island and use bitcoin exclusively to pay for goods and services!
The majority of the merchants who accept bitcoin are food and drink vendors, but it is possible to pay for accommodation, transportation, and even some tours and shopping with bitcoin.
Visitors at a meetup
As I wrote, the number of visitors to the island is exploding in 2025. I recently had the opportunity and pleasure to visit the island and spent 2 weeks there observing and taking part In the project. I will be writing about my experiences on the island and with BTC Isla!
Gaining Attention
Big and exciting things are happening on the small island of Isla Mujeres.
What started as a solo passion project to “orange pill a whole island” is quickly gaining new members and it's attracting attention both on the island and around the globe.
Word is quickly spreading that something is brewing off the coast of Cancun.
Post-class picture, that's me in the white shirt
BTC Isla can be followed at the following handles:
-
@ 6e0ea5d6:0327f353
2025-03-02 03:02:20Every venture is a tremendous risk. In all your business endeavors, ask yourself: is the potential gain viable enough to outweigh the risk of loss? Courage must always align with intelligence. That is, every initiative should be based on a thorough study of the market, supply, and demand.
If the success of your plans depends on someone else's help, believe this: you have already failed. Do not wait for assistance, do not rely on the goodwill of others, and never trust promises of support. In the end, people are more likely to ignore you than to honor their word.
It will not be their fault in any way. However, it will be yours. Do not be disappointed in others—be disappointed in yourself for expecting too much from them. Engrave these words in your heart, and you will never have the spear of betrayal lodged in your back. When you are at rock bottom, the only thing that will fall from the sky is dirt. The best time to be courageous is when you have nothing left.
With that in mind, approach your problems with enthusiasm and determination! Keep your eyes open, your mouth shut, your heart still, and your spirit ready for war. Only lower your guard when they lower the lid of your coffin. Both failure and victory are direct results of your actions and how you navigate your personal circumstances. Take responsibility for your choices and mistakes, do not wallow in self-pity, and enjoy what you earn.
Expect nothing from others but disappointment, lies, and constant frustration. Anything good that comes your way—consider it a bonus.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ f3873798:24b3f2f3
2025-03-02 02:32:22Olá, caros leitores!
No meu Guia para Novatos do Nostr, mencionei brevemente o YakiHonne, um dos diversos clientes disponíveis no ecossistema Nostr. Hoje, quero aprofundar mais sobre esse cliente, destacando suas funcionalidades, vantagens, desvantagens e minha opinião final.
YakiHonne: O Melhor Cliente para Microblog no Nostr?
O YakiHonne se destaca por sua interface bem organizada e otimizada para leitura de artigos no Nostr. Um dos seus diferenciais é a seção de sugestões no canto superior da tela, que recomenda conteúdos relevantes e incentiva a exploração de novas postagens.
Caso você queira mais visibilidade na plataforma, existe a opção de pagar para destacar uma publicação através da funcionalidade> Note Paga, localizada na parte inferior da tela de criação de posts.
Além disso, o YakiHonne oferece diversas opções de publicação, cada uma com otimizações específicas.
Funcionalidades do YakiHonne
Ao clicar no botão "+", o usuário tem acesso às seguintes opções de postagens:
📌 Note
Equivalente às postagens instantâneas de redes sociais como X (antigo Twitter), onde os usuários compartilham pensamentos curtos e interagem rapidamente.
📝 Article
Voltado para microblogs e blogs, essa opção permite uma formatação mais detalhada dos textos, sendo ideal para quem quer produzir conteúdo mais elaborado.
🎥 Vídeo
Uma funcionalidade destinada à publicação de vídeos. Aparentemente, o YakiHonne busca ser um “YouTube descentralizado” dentro do Nostr, mas ainda não explorei essa opção a fundo. Se alguém já testou, sinta-se à vontade para compartilhar nos comentários.
🖥️ Smart Widget
Permite personalizar o layout do cliente para que a experiência de navegação e leitura fique mais intuitiva e agradável para cada usuário.
📚 Curation
Uma funcionalidade que possibilita a criação de curations, ou seja, coleções de artigos organizados por tema. Além disso, outras pessoas podem contribuir com artigos relacionados, tornando essa uma ferramenta colaborativa interessante.
Na minha opinião, a opção Article é a mais útil, pois permite criar textos bem estruturados.
Construindo um Artigo no YakiHonne
Na opção Article, há diversas ferramentas de formatação disponíveis, incluindo:
-
Negrito
-
Itálico
-
Hyperlink
-
Diferentes níveis de títulos (H1, H2, H3…)
-
<> Para realçar trechos de código ou termos específicos
-
" Para inserir citações destacadas
-
Sublinhado
-
f (parece criar um botão, mas precisa de ajustes)
-
Inserção de imagens via URL ou upload direto
-
Inteligência Artificial integrada para auxiliar na escrita
-
Smart Widget para melhor organização
Essas ferramentas tornam a experiência de escrever no YakiHonne mais completa e dinâmica.
Vantagens do YakiHonne
✅ Ótima otimização para textos – É um dos clientes mais completos para quem deseja produzir conteúdos bem estruturados. ✅ Interface intuitiva – A organização da plataforma facilita a navegação e a gestão das postagens. ✅ Ferramentas de divulgação – As opções de curadoria e destaques pagos ajudam a impulsionar conteúdos relevantes.
Desvantagens do YakiHonne
⚠️ Edição de texto precisa de melhorias – A opção de sublinhar altera o tamanho e a fonte do texto, o que não é ideal para destacar palavras estrangeiras corretamente. ⚠️ Botão "f" desconfigurado – A funcionalidade que aparentemente gera um botão ficou deformada no meu celular, sem possibilidade de ajuste.
Considerações Finais
O YakiHonne é um dos melhores clientes Nostr que já experimentei. Se você gosta de ler e escrever artigos, pode passar horas explorando os conteúdos da comunidade.
Além disso, acredito que no futuro haverá mais opções de monetização. Assim como outros clientes Nostr, o YakiHonne permite associar uma carteira de Bitcoin, possibilitando receber doações pelos conteúdos publicados.
Se você já testou esse cliente, deixe nos comentários sua experiências
-
-
@ e6817453:b0ac3c39
2023-08-12 15:41:59Organizational identifiers
Organizational identifiers have different sets of requirements and functions. It is not enough to have per-to-peer private communications. Organizations are more public, so we need publicly resolvable identifiers. DID:key satisfy this condition entirely but fails to fulfill the organization's needs.
- Organizations quite often act as issuers of credentials or attestations. For issuance, it is critical to have the possibility to rotate signing keys or even deactivate or delete identifiers if keys or issuer get compromised or to comply with security company policies.
- Organizations often require a split between the Controller of the identifier and the Identifier subject or even a transfer of the identifier subject.
- Organizations must have complete control of infrastructure and effectively manage resources and costs. The price of a single identifier should be fixed, and the method of creating new identifiers should be scalable.
- One of the essential requirements is trust and governance and transparent mechanics of proving and binding an identifier to an organizational entity and creating trust relations.
- Access to Identifier management is quite often controlled by a group of users
Nonfunctional requirements
- portability
- interoperability
- scalability
- Autonomous and control
- security
In my previous articles, we talk about Autonomous identifiers and how they differ from regular DIDs.
To recap
Autonomous identifiers (AIDs) are DIDs generated algorithmically from a crypto- graphic key pair in such a way that they are self-certifying, i.e. the binding with the public key can be verified without the need to consult any external blockchain or third party. KERI is an example of a decentralized identity technology based entirely on AIDs. © https://trustoverip.org/blog/2023/01/05/the-toip-trust-spanning-protocol/
In a previous article, I show how to create and use a did:key as an Autonomous identifier that feet well to private person-to-person secure communication.
Architectures and protocols that build on top of AIDs have few critical properties
- self-hosting and self-contained
- self-certified and Autonomous
- portable
- interoperable
- full control of infrastructure
- cost management
Nowadays, I discovered a few AIDs methods
- did:key — self-contained and public
- did:peer — self-certified, upgradable but private
- KERI based did — we waiting for did:keri method to be announced soon, but KERI infrastructure could be used to build internals of did:peer or similar methods.
- did:web — public, self-certified, and self-hosted method, but still, we have active community discussion and critics as far as it fully relays to ownership of domain name that could be stolen or re-assigned.
So we have to choose from did:key did:web and I hope in a future from did:keri.
To move forward, we need to understand the DID architecture better and how all parts are connected.
In many cases of personal or sovereign entities Subject and the Controller are the same, but for Organisations, it could have a crucial difference.
DID Subject
The DID subject is the entity that the DID represents. It can be a person, organization, device, or other identifiable entity. The DID subject is associated with a unique DID that serves as a persistent, resolvable, and cryptographically verifiable identifier. The subject is the primary focus of the identity management process and typically has one or more DIDs associated with it.
DID Controller
The DID controller is the entity (person, organization, or device) that has the authority to manage the DID Document associated with a particular DID. The DID controller can update, revoke, or delegate control of the DID Document, which contains the public keys, service endpoints, and other information required for interacting with the DID subject.
In many cases, the DID subject and DID controller can be the same entity, especially for individual users who create and manage their DIDs. However, in some situations, the DID controller may differ from the DID subject, such as when an organization manages the DIDs on behalf of its employees or when an administrator manages a device.
In summary, the DID subject is the entity the DID represents, while the DID controller is the entity with authority to manage the associated DID Document. Depending on the specific use case and requirements, these roles can be held by the same or different entities.
Key Pair
It is simple from the first point of view. Key-Pair is an asymmetric public and private key. One of the main DID functions is the distribution of public keys. DIDDoccument could contain multiple public keys with authorization rules and key roles.
Identifier
Representation of did itself. is a part of DID URI.
DID:Key
did:key identifier
DID web
did:web
Relations
Relations between all parts of DID identifier can be illustrated in the following diagram. DID method dictate how DID identifier gets created, updated, deactivated, and resolved.
Focusing on the relations of the controller, key pairs, and the identifier is more interesting for us.
The most significant power and benefit of DID are decoupling a key pair from a controller and identifier. It allows the rotation of keys and changes the ownership of the identifier and its subject and controller. It is the main competitive advantage of DID and SSI over web3 wallets and raw keys.
The ideal case is KERI infrastructure that decouples all parties via cryptographic binding and protocols.
To discover more, read the paper.
We used did: keys as AID in the previous article. DID:key is a cryptographically bound identifier to the public key but cannot change the binding. As a result, keys couldn't be rotated in the future. The controller has no binding except to prove private key ownership via the signature-based protocol.
On the other side, DID:web does not have a cryptographic binding of an identifier to a key pair from one side. It gives an easy possibility to rotate keys but loses the verifiability of the identifier.
The most interesting part is the Controller to identifier binding in a did: web. It is based on proof of domain name ownership and website resource. As I mention, it has some security considerations and critics in a community. Still, at the same time, we get a critical mechanism that settles trust and connects identifiers to the organization entity.
The mechanism of web domain ownership is well-defined and easy to explain to other users, even outside of SSI and web5 domain. It is getting wider adoption and creating a lot of use cases for organizations. So it helps to create a trust relationship between an identifier and organizational entity in a very transparent, human-readable, and self-explained way — the identifier hosted on the corporate domain belongs to the organization. On another side, it makes the transfer of the controller almost impossible. That's why it is critical to differentiate between a subject and a controller.
I believe that did:web still covers a lot of organizational cases and is suitable for issuing Verifiable Credentials and attestations on behalf of organizations.
Step-by-step guide on how to create and manage did:web you could find in my article
More detailed step-by-step coding guide with the live example you could find in my SSI notebooks book
-
@ d3d74124:a4eb7b1d
2023-07-26 02:43:40This plan was GPT generated originally but then tweaked by myself as the idea fleshed itself out. All feedback welcome and encouraged.
Shenandoah Bitcoin
1. Executive Summary
Shenandoah Bitcoin is a for-profit community organization based in Frederick County, VA, uniquely blending the world of agriculture and STEM. Our mission is to foster community spirit, stimulate interest in agricultural technology, and promote understanding of Bitcoin, while providing enriching educational opportunities and ensuring sustainable business operations.
2. Company Description
Shenandoah Bitcoin is committed to delivering value to our local community. Our unique approach intertwines traditional agricultural practices, modern STEM concepts, and the world of digital currencies, specifically Bitcoin. Our activities cater to all age groups, focusing on fostering community engagement, hands-on learning experiences, and contributing to the overall welfare of our community.
What’s in a name?
Shenandoah Bitcoin. Shenandoah - an old and historied land. Bitcoin - a cutting edge technological advancement. Both encompass multiple industries, from energy and manufacturing, to farming and data centers. Both built using Proof of Work.
3. Services
We offer a range of services, including:
Family-friendly events: Agriculture, STEM, and Bitcoin-themed festivals, fairs, workshops, and community gatherings. Educational programs: Classes, seminars, and workshops on agricultural technology, STEM principles, and understanding and using Bitcoin. Facility Rentals: Spaces available for private events, business meetings, and community gatherings.
4. Membership Benefits
We offer tiered membership packages with benefits such as:
a. Silver Membership: Includes access to regular events, discounts on educational programs, and priority booking for facility rentals.
b. Gold Membership: All Silver benefits, free access to select educational programs, and further discounted facility rentals.
c. Platinum Membership: All Gold benefits, free access to all educational programs, highest priority and maximum discounts on facility rentals, and exclusive invitations to special events.
Member’s opting to pay in Bitcoin receive 10% off all pricing.
5. Market Analysis
Our primary market is the local community in Frederick County and Winchester, VA, which consists of various demographic groups. Our secondary market includes neighboring communities, tourists, businesses, and educational institutions interested in the intersection of agriculture, STEM, and Bitcoin. Understanding that facility use and events to be a drawing factor for all demographics, we outline demographic specific analysis below.
STEM professionals in the area may work remotely or commute toward DC and not interact much with their agricultural neighbors, but a desire for good quality food exists for many. In addition to events, drawing the STEM demographic in will be connections to CSAs, ranchers, and homesteaders for access to fresh locally grown food. Offering a child's play room adjacent to some office space, is a compelling benefit for the laptop class that is often in STEM professions.
Non-industrial food producers and homesteaders may not have the focus or resources for marketing and sales. By offering a physical touch point for them and direct connections to consumers, food producers benefit from membership. Having more options for drop off/pick up of various produced goods, makes it attractive for both the consumers and producers as coordination can be asynchronous.
Bitcoiners have a wide range of sub-demographics, including farmers and software engineers. Some travel hours over car and plane to attend bitcoin themed events. The topics of STEM and agriculture are of shared interest to non-trivially sized communities of bitcoiners. Having a physical touch point for bitcoiners will draw in some members just for that. Building fellowship is desired and sought in bitcoin.
5.1 Market Trends
The blending of agriculture, STEM fields, and Bitcoin is a unique concept with increasing interest in sustainable farming and ranching, food sovereignty, and health. Shenandoah Bitcoin is poised to tap into this growing interest and offer unique value to our community.
5.2 Market Needs
Our market requires initiatives that foster community engagement, promote understanding of agri-tech and Bitcoin, and provide a versatile space for events and learning.
6. Marketing and Sales Strategy
We will employ a blend of digital marketing, traditional advertising, and strategic partnerships. Our main marketing channels will be word of mouth, social media, local press, and our website. Partnerships with local small businesses, homesteaders, schools, agricultural organizations, and bitcoin companies will form a key part of our outreach strategy.
7. Organizational Structure
Shenandoah Bitcoin will be led by a CEO, supported by a management team responsible for daily operations, event planning, marketing, and community outreach. Event management and logistics will be handled by part-time staff and volunteers.
8. Financial Projections
Our revenue will be generated from membership fees, charges for events and educational programs, and facility rentals.
9. Funding Request
[If seeking additional funding, describe your needs and how the funds will be used]
10. Exit Strategy
Should it become necessary to dissolve the business, assets such as property, equipment, and any remaining cash reserves after meeting liabilities will be sold. Investors would receive their share of the remaining assets according to their proportion of ownership.
11. Conclusion
Shenandoah Bitcoin is a unique community organization bringing together agriculture, STEM, and Bitcoin in Frederick County, VA. Our distinctive approach is designed to deliver both profits and social impact, resonating strongly with our target market and positioning us for sustainable growth.
-
@ d5c3d063:4d1159b3
2025-03-02 02:29:00ทำไมคนที่ด่าเรา ถึงเป็นคนที่ทุกข์...ลองนึกภาพคนที่กำลังมีความสุขดูสิ... เขาจะมีเวลามานั่งด่าใครไหม
วันหนึ่ง...ผมนั่งอยู่ในร้านกาแฟ มองออกไปเห็นชายคนหนึ่งกำลังมีปากเสียงกับพนักงานร้าน เขาพูดจาเสียงดัง หน้าตาบึ้งตึง ดูหงุดหงิดอย่างเห็นได้ชัด พนักงานสาวที่ถูกตำหนิพยายามขอโทษ และอธิบายเหตุผลของเธอด้วยน้ำเสียงสุภาพ แต่ชายคนนั้นยังคงไม่พอใจ เดินออกจากร้านไปด้วยอารมณ์ขุ่นมัว ทิ้งบรรยากาศตึงเครียดไว้เบื้องหลัง
!(image)[https://m.primal.net/PQdY.png]
พนักงานสาวถอนหายใจเบา ๆ แล้วหันกลับมาทำงานต่อราวกับไม่มีอะไรเกิดขึ้น ผมอดสงสัยไม่ได้ว่าทำไมเธอถึงดูไม่ทุกข์ร้อนกับเหตุการณ์เมื่อครู่นี้เลย
"ไม่เป็นไรค่ะ เขาคงมีเรื่องให้กังวลอยู่แล้ว" เธอตอบเมื่อผมถาม
คำพูดนั้นทำให้ผมหยุดคิด...
ในชีวิตของเรา คงไม่มีใครไม่เคยถูกตำหนิ ถูกต่อว่า หรือถูกพูดจาไม่ดีใส่ บางครั้งอาจเป็นเพียงคำพูดที่ไม่ได้ตั้งใจ บางครั้งอาจเป็นอารมณ์โกรธที่ถูกระบายออกมาโดยไม่เลือกที่หมาย แต่หากเราหยุดดูให้ดี เราจะพบว่าคนที่กำลังโกรธ ดุด่าหรือตำหนิใครสักคน มักจะเป็นคนที่กำลังเผชิญกับความทุกข์อยู่แล้ว
คนที่มาด่าเรา อาจจะกำลังเหนื่อยล้าจากปัญหาส่วนตัว อาจจะผิดหวังในบางสิ่ง อาจจะรู้สึกไม่เป็นที่ยอมรับ อาจจะเครียดจากเรื่องในครอบครัว และบางครั้ง…อาจจะไม่ได้มีเจตนาร้าย เพียงแต่เขาไม่รู้จะจัดการกับอารมณ์ของตัวเองยังไง
...และเมื่อเผชิญกับคำพูดที่ไม่ดี เรามีทางเลือกอยู่เสมอ...
-
ตอบโต้กลับไป บางครั้งเราโกรธและเผลอพูดอะไรออกไปตามอารมณ์ สิ่งนี้อาจทำให้เกิดความรู้สึกไม่ดีทั้งสองฝ่าย บางครั้งเราชนะการโต้เถียง แต่กลับแพ้ที่ความสงบในใจ
-
ปล่อยผ่าน และเข้าใจ การเข้าใจว่า "คนที่ด่าเรา เขานั่นแหละทุกข์" ไม่ได้หมายความว่าเราต้องยอมรับการถูกกระทำที่ไม่เหมาะสม แต่หมายถึงการไม่เอาคำพูดเหล่านั้นมาเป็นภาระของตัวเอง
-
มองลึกลงไปให้เห็นเจตนา บางครั้งคนที่ตำหนิเราอาจจะต้องการให้เราปรับปรุงในบางเรื่อง อารมณ์ของเขาอาจจะไม่ดี แต่หากเราแยกเนื้อหาจากอารมณ์ออกมาได้ เราอาจพบว่ามีบางอย่างที่เราสามารถเรียนรู้ได้
ท้ายที่สุด คำพูดของใครก็ไม่สำคัญเท่ากับสิ่งที่เราบอกกับตัวเอง
หากเรามั่นคงพอ คำพูดที่รุนแรงจะเป็นเพียงเสียงที่ผ่านเข้ามาแล้วผ่านไป หากเรามีเมตตา คำพูดที่ไม่ดีจะเป็นบทเรียนให้เราเข้าใจมนุษย์มากขึ้น หากเรารู้เท่าทันอารมณ์ตัวเอง คำพูดเหล่านั้นก็จะไม่มีอิทธิพลต่อเรา
"ไม่เป็นไรค่ะ เขาคงมีเรื่องให้กังวลอยู่แล้ว"
ผมนั่งจิบกาแฟพลางคิดตามคำพูดนั้นแล้วพบว่ามันเป็นเรื่องจริง คนที่มาด่าเรา อาจจะต้องการกำลังใจมากกว่าที่เราคิดก็ได้...
Siamstr
-
-
@ d2e97f73:ea9a4d1b
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ eb35d9c0:6ea2b8d0
2025-03-02 00:55:07I had a ton of fun making this episode of Midnight Signals. It taught me a lot about the haunting of the Bell family and the demise of John Bell. His death was attributed to the Bell Witch making Tennessee the only state to recognize a person's death to the supernatural.
If you enjoyed the episode, visit the Midnight Signals site. https://midnightsignals.net
Show Notes
Journey back to the early 1800s and the eerie Bell Witch haunting that plagued the Bell family in Adams, Tennessee. It began with strange creatures and mysterious knocks, evolving into disembodied voices and violent attacks on young Betsy Bell. Neighbors, even Andrew Jackson, witnessed the phenomena, adding to the legend. The witch's identity remains a mystery, sowing fear and chaos, ultimately leading to John Bell's tragic demise. The haunting waned, but its legacy lingers, woven into the very essence of the town. Delve into this chilling story of a family's relentless torment by an unseen force.
Transcript
Good evening, night owls. I'm Russ Chamberlain, and you're listening to midnight signals, the show, where we explore the darkest corners of our collective past. Tonight, our signal takes us to the early 1800s to a modest family farm in Adams, Tennessee. Where the Bell family encountered what many call the most famous haunting in American history.
Make yourself comfortable, hush your surroundings, and let's delve into this unsettling tale. Our story begins in 1804, when John Bell and his wife Lucy made their way from North Carolina to settle along the Red River in northern Tennessee. In those days, the land was wide and fertile, mostly unspoiled with gently rolling hills and dense woodland.
For the Bells, John, Lucy, and their children, The move promised prosperity. They arrived eager to farm the rich soil, raise livestock, and find a peaceful home. At first, life mirrored [00:01:00] that hope. By day, John and his sons worked tirelessly in the fields, planting corn and tending to animals, while Lucy and her daughters managed the household.
Evenings were spent quietly, with scripture readings by the light of a flickering candle. Neighbors in the growing settlement of Adams spoke well of John's dedication and Lucy's gentle spirit. The Bells were welcomed into the Fold, a new family building their future on the Tennessee Earth. In those early years, the Bells likely gave little thought to uneasy rumors whispered around the region.
Strange lights seen deep in the woods, soft cries heard by travelers at dusk, small mysteries that most dismissed as product of the imagination. Life on the frontier demanded practicality above all else, leaving little time to dwell on spirits or curses. Unbeknownst to them, events on their farm would soon dominate not only their lives, but local lore for generations to come.[00:02:00]
It was late summer, 1817, when John Bell's ordinary routines took a dramatic turn. One evening, in the waning twilight, he spotted an odd creature near the edge of a tree line. A strange beast resembling part dog, part rabbit. Startled, John raised his rifle and fired, the shot echoing through the fields. Yet, when he went to inspect the spot, nothing remained.
No tracks, no blood, nothing to prove the creature existed at all. John brushed it off as a trick of falling light or his own tired eyes. He returned to the house, hoping for a quiet evening. But in the days that followed, faint knocking sounds began at the windows after sunset. Soft scratching rustled against the walls as if curious fingers or claws tested the timbers.
The family's dog barked at shadows, growling at the emptiness of the yard. No one considered it a haunting at first. Life on a rural [00:03:00] farm was filled with pests, nocturnal animals, and the countless unexplained noises of the frontier. Yet the disturbances persisted, night after night, growing a little bolder each time.
One evening, the knocking on the walls turned so loud it woke the entire household. Lamps were lit, doors were open, the ground searched, but the land lay silent under the moon. Within weeks, the unsettling taps and scrapes evolved into something more alarming. Disembodied voices. At first, the voices were faint.
A soft murmur in rooms with no one in them. Betsy Bell, the youngest daughter, insisted she heard her name called near her bed. She ran to her mother and her father trembling, but they found no intruder. Still, The voice continued, too low for them to identify words, yet distinct enough to chill the blood.
Lucy Bell began to fear they were facing a spirit, an unclean presence that had invaded their home. She prayed for divine [00:04:00] protection each evening, yet sometimes the voice seemed to mimic her prayers, twisting her words into a derisive echo. John Bell, once confident and strong, grew unnerved. When he tried reading from the Bible, the voice mocked him, imitating his tone like a cruel prankster.
As the nights passed, disturbances gained momentum. Doors opened by themselves, chairs shifted with no hand to move them, and curtains fluttered in a room void of drafts. Even in daytime, Betsy would find objects missing, only for them to reappear on the kitchen floor or a distant shelf. It felt as if an unseen intelligence roamed the house, bent on sowing chaos.
Of all the bells, Betsy suffered the most. She was awakened at night by her hair being yanked hard enough to pull her from sleep. Invisible hands slapped her cheeks, leaving red prints. When she walked outside by day, she heard harsh whispers at her ear, telling her she would know [00:05:00] no peace. Exhausted, she became withdrawn, her once bright spirit dulled by a ceaseless fear.
Rumors spread that Betsy's torment was the worst evidence of the haunting. Neighbors who dared spend the night in the Bell household often witnessed her blankets ripped from the bed, or watched her clutch her bruised arms in distress. As these accounts circulated through the community, people began referring to the presence as the Bell Witch, though no one was certain if it truly was a witch's spirit or something else altogether.
In the tightly knit town of Adams, word of the strange happenings at the Bell Farm soon reached every ear. Some neighbors offered sympathy, believing wholeheartedly that the family was besieged by an evil force. Others expressed skepticism, guessing there must be a logical trick behind it all. John Bell, ordinarily a private man, found himself hosting visitors eager to witness the so called witch in action.
[00:06:00] These visitors gathered by the parlor fireplace or stood in darkened hallways, waiting in tense silence. Occasionally, the presence did not appear, and the disappointed guests left unconvinced. More often, they heard knocks vibrating through the walls or faint moans drifting between rooms. One man, reading aloud from the Bible, found his words drowned out by a rasping voice that repeated the verses back at him in a warped, sing song tone.
Each new account that left the bell farm seemed to confirm the unearthly intelligence behind the torment. It was no longer mere noises or poltergeist pranks. This was something with a will and a voice. Something that could think and speak on its own. Months of sleepless nights wore down the Bell family.
John's demeanor changed. The weight of the haunting pressed on him. Lucy, steadfast in her devotion, prayed constantly for deliverance. The [00:07:00] older Bell children, seeing Betsy attacked so frequently, tried to shield her but were powerless against an enemy that slipped through walls. Farming tasks were delayed or neglected as the family's time and energy funneled into coping with an unseen assailant.
John Bell began experiencing health problems that no local healer could explain. Trembling hands, difficulty swallowing, and fits of dizziness. Whether these ailments arose from stress or something darker, they only reinforced his sense of dread. The voice took to mocking him personally, calling him by name and snickering at his deteriorating condition.
At times, he woke to find himself pinned in bed, unable to move or call out. Despite it all, Lucy held the family together. Soft spoken and gentle, she soothed Betsy's tears and administered whatever remedies she could to John. Yet the unrelenting barrage of knocks, whispers, and violence within her own home tested her faith [00:08:00] daily.
Amid the chaos, Betsy clung to one source of joy, her engagement to Joshua Gardner, a kind young man from the area. They hoped to marry and begin their own life, perhaps on a parcel of the Bell Land or a new farmstead nearby. But whenever Joshua visited the Bell Home, The unseen spirit raged. Stones rattled against the walls, and the door slammed as if in warning.
During quiet walks by the river, Betsy heard the voice hiss in her ear, threatening dire outcomes if she ever were to wed Joshua. Night after night, Betsy lay awake, her tears soaked onto her pillow as she wrestled with the choice between her beloved fiancé and this formidable, invisible foe. She confided in Lucy, who offered comfort but had no solution.
For a while, Betsy and Joshua resolved to stand firm, but the spirit's fury only escalated. Believing she had no alternative, Betsy broke off the engagement. Some thought the family's [00:09:00] torment would subside if the witches demands were met. In a cruel sense, it seemed to succeed. With Betsy's engagement ended, the spirit appeared slightly less focused on her.
By now, the Bell Witch was no longer a mere local curiosity. Word of the haunting spread across the region and reached the ears of Andrew Jackson, then a prominent figure who would later become president. Intrigued, or perhaps skeptical, he traveled to Adams with a party of men to witness the phenomenon firsthand.
According to popular account, the men found their wagon inexplicably stuck on the road near the Bell property, refusing to move until a disembodied voice commanded them to proceed. That night, Jackson's men sat in the Bell parlor, determined to uncover fraud if it existed. Instead, they found themselves subjected to jeering laughter and unexpected slaps.
One boasted of carrying a special bullet that could kill any spirit, only to be chased from the house in terror. [00:10:00] By morning, Jackson reputedly left, shaken. Although details vary among storytellers, the essence of his experience only fueled the legend's fire. Some in Adams took to calling the presence Kate, suspecting it might be the spirit of a neighbor named Kate Batts.
Rumors pointed to an old feud or land dispute between Kate Batts and John Bell. Whether any of that was true, or Kate Batts was simply an unfortunate scapegoat remains unclear. The entity itself, at times, answered to Kate when addressed, while at other times denying any such name. It was a puzzle of contradictions, claiming multiple identities.
A wayward spirit, a demon, or a lost soul wandering in malice. No single explanation satisfied everyone in the community. With Betsy's engagement to Joshua broken, the witch devoted increasing attention to John Bell. His health declined rapidly in 1820, marked by spells of near [00:11:00] paralysis and unremitting pain.
Lucy tended to him day and night. Their children worried and exhausted, watched as their patriarch grew weaker, his once strong presence withering under an unseen hand. In December of that year, John Bell was found unconscious in his bed. A small vial of dark liquid stood nearby. No one recognized its contents.
One of his sons put a single drop on the tongue of the family cat, which died instantly. Almost immediately, the voice shrieked in triumph, boasting that it had given John a final, fatal dose. That same day, John Bell passed away without regaining consciousness, leaving his family both grief stricken and horrified by the witch's brazen gloating.
The funeral drew a large gathering. Many came to mourn the respected farmer. Others arrived to see whether the witch would appear in some dreadful form. As pallbearers lowered John Bell's coffin, A jeering laughter rippled across the [00:12:00] mourners, prompting many to look wildly around for the source. Then, as told in countless retellings, the voice broke into a rude, mocking song, echoing among the gravestones and sending shudders through the crowd.
In the wake of John Bell's death, life on the farm settled into an uneasy quiet. Betsy noticed fewer night time assaults. And the daily havoc lessened. People whispered that the witch finally achieved its purpose by taking John Bell's life. Then, just as suddenly as it had arrived, the witch declared it would leave the family, though it promised to return in seven years.
After a brief period of stillness, the witch's threat rang true. Around 1828, a few of the Bells claimed to hear light tapping or distant murmurs echoing in empty rooms. However, these new incidents were mild and short lived compared to the previous years of torment. Soon enough, even these faded, leaving the bells [00:13:00] with haunted memories, but relative peace.
Near the bell property stood a modest cave by the Red River, a spot often tied to the legend. Over time, people theorized that cave's dark recesses, though the bells themselves rarely ventured inside. Later visitors and locals would tell of odd voices whispering in the cave or strange lights gliding across the damp stone.
Most likely, these stories were born of the haunting's lingering aura. Yet, they continued to fuel the notion that the witch could still roam beyond the farm, hidden beneath the earth. Long after the bells had ceased to hear the witch's voice, the story lived on. Word traveled to neighboring towns, then farther, into newspapers and traveler anecdotes.
The tale of the Tennessee family plagued by a fiendish, talkative spirit captured the imagination. Some insisted the Bell Witch was a cautionary omen of what happens when old feuds and injustices are left [00:14:00] unresolved. Others believed it was a rare glimpse of a diabolical power unleashed for reasons still unknown.
Here in Adams, people repeated the story around hearths and campfires. Children were warned not to wander too far near the old bell farm after dark. When neighbors passed by at night, they might hear a faint rustle in the bush or catch a flicker of light among the trees, prompting them to walk faster.
Hearts pounding, minds remembering how once a family had suffered greatly at the hands of an unseen force. Naturally, not everyone agreed on what transpired at the Bell farm. Some maintained it was all too real, a case of a vengeful spirit or malignant presence carrying out a personal vendetta. Others whispered that perhaps a member of the Bell family had orchestrated the phenomenon with cunning trickery, though that failed to explain the bruises on Betsy, the widespread witnesses, or John's mysterious death.
Still, others pointed to the possibility of an [00:15:00] unsettled spirit who had attached itself to the land for reasons lost to time. What none could deny was the tangible suffering inflicted on the Bells. John Bell's slow decline and Betsy's bruises were impossible to ignore. Multiple guests, neighbors, acquaintances, even travelers testified to hearing the same eerie voice that threatened, teased and recited scripture.
In an age when the supernatural was both feared and accepted, the Bell Witch story captured hearts and sparked endless speculation. After John Bell's death, the family held onto the farm for several years. Betsy, robbed of her engagement to Joshua, eventually found a calmer path through life, though the memory of her tormented youth never fully left her.
Lucy, steadfast and devout to the end, kept her household as best as she could, unwilling to surrender her faith even after all she had witnessed. Over time, the children married and started families of their own, [00:16:00] quietly distancing themselves from the tragedy that had defined their upbringing.
Generations passed, the farm changed hands, the Bell House was repurposed and renovated, and Adams itself transformed slowly from a frontier settlement into a more established community. Yet the name Bellwitch continued to slip into conversation whenever strange knocks were heard late at night or lonely travelers glimpsed inexplicable lights in the distance.
The story refused to fade, woven into the identity of the land itself. Even as the first hand witnesses to the haunting aged and died, their accounts survived in letters, diaries, and recollections passed down among locals. Visitors to Adams would hear about the famed Bell Witch, about the dreadful death of John Bell, the heartbreak of Betsy's broken engagement, and the brazen voice that filled nights with fear.
Some folks approached the story with reverence, others with skepticism. But no one [00:17:00] denied that it shaped the character of the town. In the hush of a moonlit evening, one might stand on that old farmland, fields once tilled by John Bell's callous hands, now peaceful beneath the Tennessee sky. And imagine the entire family huddled in the house, listening with terrified hearts for the next knock on the wall.
It's said that if you pause long enough, you might sense a faint echo of their dread, carried on a stray breath of wind. The Bell Witch remains a singular chapter in American folklore, a tale of a family besieged by something unseen, lethal, and uncannily aware. However one interprets the events, whether as vengeful ghosts, demonic presence, or some other unexplainable force, the Bell Witch.
Its resonance lies in the very human drama at its core. Here was a father undone by circumstances he could not control. A daughter tormented in her own home, in a close knit household tested by relentless fear. [00:18:00] In the end, the Bell Witch story offers a lesson in how thin the line between our daily certainties and the mysteries that defy them.
When night falls, and the wind rattles the shutters in a silent house, we remember John Bell and his family, who discovered that the safe haven of home can become a battlefield against forces beyond mortal comprehension. I'm Russ Chamberlain, and you've been listening to Midnight Signals. May this account of the Bell Witch linger with you as a reminder that in the deepest stillness of the night, Anything seems possible.
Even the unseen tapping of a force that seeks to make itself known. Sleep well, if you dare.
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 5725c4a8:6ba4f820
2025-03-01 23:41:24!(image)[https://i.nostr.build/iuWXGIaA91wMTFJg.jpg] I've been seeing some posts from (I think new) Bitcoiners complaining about the recent volatility of Bitcoin, sometimes in dismay about the price, and sometimes in dismay that they have no "dry powder" available to buy the dip. With inflation being such a huge problem, cost of living has a very real effect on our ability to stack sats, so some creative thinking is in order. My hope is that this post can share a little bit of wisdom that I have found to work for me in my own quest to accumulate as much Bitcoin as I can. If you want to skip to the meat of this article, scroll down My Strategy. As the standard disclosure goes: this is not financial or investment advice.
A little about me and where I'm coming from
I'm part of the 2022 class of Bitcoiners. I'm very new to this community.But I have gone down the Bitcoin rabbit hole, I have read Saifdean's The Bitcoin Standard and The Fiat Standard, and I have spent many many hundreds of hours listening to podcasts on Bitcoin and Austrian economics (which I discovered at about the same time). All this to say, despite the work that I have put in thus far, take this with a grain of salt and use your own reasoning to determine if this strategy or any ideas derived from it are right for you.
Dollar Cost Averaging
Dollar Cost Averaging (DCA) is the practice of setting a recurring buy order of a stock or commodity. Such orders, once set, will continue to execute at the set frequency until the buyer's selected termination date, or until a set amount has been reached, or until no more funds are available in the buyer's account from which to buy. DCA takes advantage of the fact that for a long term growth asset (like Bitcoin), the average price will always tend to go up over time despite intermittent volatility. By not trying watch for or time the dips and highs, DCAing not only makes it easier to accumulate Bitcoin, but it is very effective in the long term and reduces a lot of potential stress from trying to game the market volatility. One more important point is that as this method utilizes averaging, the closer that the buyer can match the actual price curve over time, the greater the benefit from the average growth of that price curve. This means that for two recurring buy orders, using the same amount of fiat in the buying pool, if one has more frequent buys and the other has less frequent buys, even if they spent the same amount at the end of the buying period, the order with more frequent buys will experience the greater value from the average growth of the asset being purchased.
This is in contrast to limit orders, in which they buyer attempts to gauge what price action will occur in the future, or "smash buying" in which the buyer tries to watch and time the market to place real-time orders. As these are not the focus of this strategy, I won't go into detail about them. But if you understand DCA and why it works, I assume that you can also reason for yourself about the effectiveness and utility of these other buying methods.
Each of these methods can occasionally be successful, I'm not saying that there is not place for them. In fact, I use these too, but they are used in a tactical manner, and I try to be careful to make sure that using these do not interrupt my DCA strategy.
Savings Allocation
I may update this in the future, based on changes in my financial situation, the larger landscape, and whatproducts/tools are available. Note that I'm not rich. I work for a tech startup which is gaining traction, and if it is successful then that may change. But for now I operate with limited financial resources to use for stacking sats. But still, I stack sats. I say this to clarify why this strategy works for me, and hopefully to establish that this will work for you if you also have limited income but have the ability and desire to accumulate Bitcoin for yourself.
I have a consistent amount of money coming in on a regular basis, and this is an important part of my calculus. Similarly, I have consistent bills going out. The difference between these are my subsistence and discretionary spending. Subsistence spending being money that I spend on food and other nutrients, and discretionary spending is what I spend on the things that I want but don't need.
I'm not at a point where I've managed to completely cut out my discretionary spending, but I do try to limit it as much as I can. Similarly, I'm proactive about finding good deals on food (especially beef). Then I can allocate more money to savings. It is this savings allocation that I use for buying Bitcoin.
My DCA Strategy
!(image)[https://i.nostr.build/augZsY8EVEAsdP34.png] My strategy begins with the money from each pay check that I want to allocate to savings (which in my case all goes to buying Bitcoin). It also hinges on DCA, and is strongly inspired by the sayings "stay humble and stack sats", and that "time in the market beats timing the market". I am not a professional trader, nor do I aspire to be one. As such, I want to maximize my time in the market without stressing myself out.
Allocating funds for DCA: First, find the amount for each pay period that you will use to buy Bitcoin, but don't immediately use it to buy, yet. Next, you need to find the frequency by which you will buy, and how much. I recommend the most frequent recurring buy option that you can find.
To do this, you need to find the DCA options available on the exchanges that you use. As a Bitcoin maximalist, I use Bitcoin focused exchanges. As a man with limited available funds for this use, I want the ability to DCA in fairly small amounts, but as frequently as possible. I find that River and Strike are excellent exchanges for this. Each of these exchanges currently allow buying as frequently as once-per-hour. River has a minimum of $1 per purchase. Strike can go even lower, I have a friend who I convinced to adopt this strategy and he started out with an hourly recurring buy of $0.05 per hour.
Having been a Bitcoiner for a little while now, I also find that it is useful to have additional funds set aside for "smash buys" to take advantage of major dips, such as the one that we are currently experiencing (I'm writing this on March 1st, 2025).
Using River as an example: The minimal buy on River, as stated above, is $1 per hour. There are 24 hours in a day, and 14 days in a pay period (for me). Then the minimum amount to allocate on River is $1/hour x 24 hours/day x 14 days/period = $336 per period.
You can change the dollar amount or number of days as are appropriate for your own goals and circumstances.
If you have a lower total available amount, you can use this version of the formula to find the recurring buy amount on Strike (or whichever other platform allows sub-dollar recurring buys): Recurring Buy = (available funds) / (number of hours over which to buy)
In truth, I use Strike as well, but I have another reason for choosing River in this example: I mentioned having a DCA strategy which keeps a reserve of "dry powder" so that you can also buy the dip.
You may benefit from keeping some reserve of savings in USD. It's something we simply can't get away from at this time of continued fiat dominance. This allows you to pull from the fiat reserve rather than selling any accumulated Bitcoin in cases of emergency (like car problems, or a family member needing help).
Last year, River announced a feature by which any cash kept on their exchange would earn 3.8% interest, which is paid in Bitcoin. This strategy works with other exchanges, but using River means that interest accumulation can also be leveraged (and it is much better than a typical bank savings account).
This is the final part of the strategy: put the rest of your savings into River and let it accumulate interest in Bitcoin. This reserve then becomes your dry powder. Use it at your discretion, save for emergencies, or use it to "smash buy" the dip, but do it without compromising your DCA setup. DON'T CANCEL your DCA, keep it going and take advantage of it's average growth. You don't know when the price will dip, and you don't know when it will go back up again. If it is difficult for you to maintain discipline and not spend your DCA reserve (since River doesn't split it into buckets for you), a variation of this strategy is to DCA-stack on another exchange so that it's not in the same pool as your fiat reserve.
When all else fails, just keep calm, stay humble, and stack sats. !(image)[https://i.nostr.build/pko6uWkq3rf0y0io.png]
I hope that someone finds this helpful. If you have your own personalized strategy, I'd love to hear about it in the comments.
-
@ 34c0a532:5d3638e4
2023-03-16 13:14:53Most bitcoiners have their own, much different definition of what it means to orange pill a person. I’ve seen mentions of getting a taxi driver to download a lightning wallet and sending the payment in sats to them. Is that truly orange-pilling? Hmm… no. It is a great first step, but what makes you believe that that person won’t go on to shitcoins after learning about the ease of using cryptocurrency?
So, let’s define what that is in the terms of this guide.
To orange pill someone means to get them to take the first step into learning about bitcoin, money, self-custody, being sovereign, and to teach them to start questioning the world of lies we’ve been fed our entire lives.
Too poetic? Okay, here’s a more specific one:
To orange pill someone means showing them how to send and receive a bitcoin transaction, explain to them the importance of keeping their seed words safe, and showing them more articles, books and guides so they can go further down the rabbit hole.
I think that’s better, don’t you?
No matter what your definition of orange-pilling is, let’s discuss a few things first.
Orange-pilling comes from the scene in the Matrix where Morpheus offers the blue and the red pill to Neo.
This your last chance. After this there is no turning back. You take the blue pill, the story ends. You wake up in your bed and believe whatever you want to. You take the red pill, you stay in Wonderland, and I show you how deep the rabbit hole goes. Remember, all I’m offering is the truth. Nothing more. ~ Morpheus
The fact that the terms comes from the Matrix is absolutely perfect, because the Matrix is based on Plato’s Allegory of the Cave. Everybody knows the Matrix so let’s talk about the Cave. Inside the cave, people are chained up, in the dark. The only thing they can do is talk to each other and stare forward, where there’s a dim light on the cave’s wall. Someone is moving around objects, throwing shadows on the wall. The people can never see the three-dimensional object, they can only see a shadow, a projection of it, so their world is limited by that knowledge.
Someday a group of people manage to break out of the Cave. They go out into the light, their eyes hurt, the world is massive, they get a panic attack by the lack of a rock ceiling on top of them. It’s vast, it’s too much to bear. And they run back into the cave and tell everyone what they saw, that it’s too bright, too open, too much everything. Objects are real, there’s light everywhere and colours. So many colours, not just the flame, the rock and the shadow.
And they don’t believe them. Maybe they even get angry at them and attack them. Who are these fools to claim that the world is not what they think it is? Who are they to suggest that we’ve all been lied to all our lives?
And that’s the first thing you need to keep in mind when trying to orange pill someone.
Why do some people find it so hard to believe in bitcoin?
The answer is simple. It’s because understanding bitcoin requires acknowledging you’ve been tricked your entire life.
The culture shock is real, I’ve been through it. The stages are as follows:
What is money? You start to learn what money really is, and how fundamentally flawed the Keynesian system has become. You see that the only way forward is by a hard money standard, whether that’s gold or bitcoin. Then you realise that in a world of information, the only logical step is bitcoin. Then why bitcoin? You start to read about it’s properties. It’s antifragile, decentralised. Why is that important? Nobody can control, it great. Why is it like gold that can be attached to an email? Then there’s the anger and disbelief. We’ve been fooled. Why doesn’t everybody see this? You read everything about bitcoin, you listen to podcasts, talk on bitcoin twitter and nostr with other plebs. Nobody seems to have all the answers but they make far more sense than the lies of the mainstream media. You talk to your friends and family, you come off as crazy at best. As I said, you have to acknowledge the trauma the other person is going through. It’s a culture shock, and not many want to go through with it. Think of Plato’s Allegory of the Cave, people who got out into the world went back and told everyone that there’s more to life than the shadows on the wall. Or, the same allegory being told by the Matrix, with Cypher wanting to go back, to forget.
We call that Bitcoin Derangement Syndrome, BDS. It’s hilarious but it’s so real. Many early bitcoiners, people who have spend years of their lives either advocating for it or working on it, some making or losing fortunes in the process, go back to the fiat world, shift gears completely, rant and rave against bitcoin and dive back in the Matrix, the Cave, taking the blue pill. They want to be fiat rich, they lie and delude themselves that everything is okay in the world and if they get just enough money they’d be okay.
But they won’t. This is real, and no matter how many lies they tell themselves things will not change unless we change them ourselves. Babies are dying, that’s true. In wars, in artificially induced poverty, in carrying on with the Keynesian ways of thinking of endless imperial expansion and exploitation.
I’ll be honest, bitcoin rewires your brain.
Do you really wanna force that on people?
Yes?
Then let’s read on.
Why is it sometimes so hard to explain, persuade or convince people about bitcoin? Here’s a harsh truth. It’s because you’re the counterparty risk.
When your car breaks down, you go to a mechanic, you seek expert knowledge. He tells you what’s wrong and you generally accept it. Why? Because unless you’re an expert on cars, you don’t have pre-existing knowledge about this specific situation. Nature abhors a vacuum. The mechanic’s knowledge and expertise fills up that vacuum of knowledge.
Why is it different with bitcoin, then?
Because most people believe they already understand money. There’s no vacuum for their knowledge to fill. Like a woman going to a male gynecologist thinking she knows better because she’s the one with the female body, a nocoiner believes they know better because, see? They have been handling and making money all their lives! Who are you to claim things aren’t how they used to think they are?
Yes, sure. You’re the one with the female body, you’re the one with the wallet. But have you actually taken the time to study it? Have you invested the necessary six years in medical school or the 100 hours it takes to grasp bitcoin?
No.
But they don’t accept that. When you make statements about bitcoin, it collides with their pre-existing frame of reference. When that happens, their mind reflexively casts doubts on the new information, actively fights it and rejects it, because it doesn’t conform to what they know. Their mind is the bearer asset, you are the counterparty risk.
Okay, great. How do you overcome this, then?
By taking the time with them. You can’t force someone to get orange-pilled, it’s not shoving knowledge down their throats. They have to do it themselves, so you start small. Plant a seed. Make them question what they know. That tiny seed, just like in Inception, will grow and push aside the other propaganda in their minds, leaving some space for new information to fill the void.
“Why did they stop having money backed by gold?”
That’s one seed.
“Who prints all these new billions?”
Another. Take your pick, it depends on the person you’re talking to.
A good question makes the nocoiner access their accepted knowledge. They usually think they have the answer and you should listen to it, not shutting it down. Ask them to research it further, to back their claims, to look things up. If they don’t have the knowledge, a new vacuum is created and their curiosity will want to fill it up.
Nocoiner: Bitcoin isn’t backed by anything.
You: Okay. Then what would make good money in its place?
Make them talk by asking questions. As they talk, they’ll realise they have massive gaps in their knowledge. You can help them then, but they themselves have to fill up those gaps by asking more questions and getting them to talk more. Why? Because if someone tells something to themselves they will believe it much easier than having you say it to them. Try and lead them to conclusion, a revelation.
When persuading someone, the person talking the most is the one really getting persuaded. Why? Because when you talk you engrave those words into your brain as facts.
Nocoiner: Bitcoin wastes too much energy.
You: How do you determine how much is too much energy to use?
You will never change their minds, they have to change it themselves. You can only help show them the way, they’re the ones that have to do it. Questions are the key to that process.
Tell them less, ask more.
What questions make people curious about bitcoin? You never know, it depends on what ails the person. Think about their pain. If they’re living in Turkey or Argentina, for example, their pain is massive inflation. You might say, “You’re already using USD to protect your monetary value against inflation, right? How about adding BTC to the mix?”
People in those countries generally grasp this concept a lot quicker. The local lira is the crap kind of money, they spend it often. The USD is the good kind of money, they save it, spending it only when absolutely necessary. And gold is the best kind, keeping it hidden in safes and mattresses. Only to be spent in an emergency. They don’t have the financial privilege to insulate them from the need for bitcoin, they already get these layers of hardness in their money, so bitcoin is a lot easier for them.
“What is money?” is another good question. Most people will answer it, and of course it will be flawed and all over the place. Then you might say, “It’s the promise of future value,” and then discuss how bitcoin has a monetary policy that’s planned out for the next 120 years and how nodes and miners facilitate that design. And especially point out how hard it is to change.
“What happened in 1971?” That’s a good one. Get them to look up the fiat monetary system and figure out how it’s not backed by anything. Get them angry at the Keynesian economists, how they’ve ruined entire countries. 2008 money crisis? Inevitable, under the fiat standard. Forget about bitcoin, point your finger towards the rot. It’s all historical fact, they can’t call you a conspiracy theorist. Most people still think that money is backed by gold. Get them to tell it to other people, see their reactions.
This was a part of my guide. Let me know what you think. Soon to be posted at https://georgesaoulidis.com/how-to-orange-pill-people/
-
@ f33c8a96:5ec6f741
2025-03-01 23:25:22Setting Up Your Code Editor
Introduction
In this lesson, we'll set up the most fundamental tool in your development journey: your code editor. This is where you'll spend most of your time writing, testing, and debugging code, so it's crucial to get comfortable with it from the start.
What is an IDE?
Definition
An IDE (Integrated Development Environment) is a software application that provides comprehensive facilities for software development. Think of it as your complete workshop for writing code.
Key Components
- Code Editor
- Where you write and edit code
- Provides syntax highlighting
- Helps with code formatting
-
Makes code easier to read and write
-
Compiler/Interpreter
- Runs your code
- Translates your code into executable instructions
-
Helps test your applications
-
Debugging Tools
- Help find and fix errors
- Provide error messages and suggestions
- Make problem-solving easier
Setting Up Visual Studio Code
Why VS Code?
- Free and open-source
- Lightweight yet powerful
- Excellent community support
- Popular among developers
- Great for beginners and experts alike
Installation Steps
- Visit code.visualstudio.com
- Download the version for your operating system
- Run the installer
- Follow the installation prompts
Essential VS Code Features
1. Interface Navigation
- File Explorer (Ctrl/Cmd + Shift + E)
- Browse and manage your files
- Create new files and folders
-
Navigate your project structure
-
Search (Ctrl/Cmd + Shift + F)
- Find text across all files
- Replace text globally
-
Search with regular expressions
-
Source Control (Ctrl/Cmd + Shift + G)
- Track changes in your code
- Commit and manage versions
- Integrate with Git
2. Terminal Integration
To open the integrated terminal: - Use
Ctrl + `
(backtick) - Or View → Terminal from the menu - Basic terminal commands:bash ls # List files (dir on Windows) cd # Change directory clear # Clear terminal code . # Open VS Code in current directory
3. Essential Extensions
Install these extensions to enhance your development experience: 1. ESLint - Helps find and fix code problems - Enforces coding standards - Improves code quality
- Prettier
- Automatically formats your code
- Maintains consistent style
-
Saves time on formatting
-
Live Server
- Runs your web pages locally
- Auto-refreshes on save
- Great for web development
Important Keyboard Shortcuts
Ctrl/Cmd + S # Save file Ctrl/Cmd + C # Copy Ctrl/Cmd + V # Paste Ctrl/Cmd + Z # Undo Ctrl/Cmd + Shift + P # Command palette Ctrl/Cmd + P # Quick file open
Writing Your First Code
Let's create and run a simple HTML file:
- Create a new file (
index.html
) - Add basic HTML content:
```html
Hello World!
``` 3. Save the file (Ctrl/Cmd + S) 4. Open in browser or use Live Server
Best Practices
1. File Organization
- Keep related files together
- Use clear, descriptive names
- Create separate folders for different projects
2. Regular Saving
- Save frequently (Ctrl/Cmd + S)
- Watch for the unsaved dot indicator
- Enable auto-save if preferred
3. Terminal Usage
- Get comfortable with basic commands
- Use the integrated terminal
- Practice navigation and file operations
Troubleshooting Common Issues
1. Installation Problems
- Ensure you have admin rights
- Check system requirements
- Use official download sources
2. Extension Issues
- Keep extensions updated
- Disable conflicting extensions
- Restart VS Code after installation
3. Performance
- Don't install too many extensions
- Regular restart of VS Code
- Keep your system updated
Next Steps
- Practice Navigation
- Create and manage files
- Use the integrated terminal
-
Try keyboard shortcuts
-
Customize Your Editor
- Explore themes
- Adjust font size
-
Configure auto-save
-
Prepare for Next Lesson
- Keep VS Code open
- Get comfortable with the interface
- Practice basic operations
Additional Resources
Remember: Your code editor is your primary tool as a developer. Take time to get comfortable with it, and don't worry about mastering everything at once. Focus on the basics we covered in the video, and you'll naturally learn more features as you need them.
Happy coding! 🚀
-
@ aa55a479:f7598935
2023-02-20 13:44:48Nostrica is the shit.
-
@ f33c8a96:5ec6f741
2025-03-01 23:24:35CSS Fundamentals: Styling Your First Webpage
Introduction
In our previous lesson, we created the structure of our webpage with HTML. Now, we'll learn how to style it using CSS (Cascading Style Sheets). While HTML provides the bones of our webpage, CSS adds the visual presentation - the colors, layouts, spacing, and overall aesthetics.
What is CSS?
Definition
CSS (Cascading Style Sheets) is a stylesheet language that controls the visual presentation of HTML documents. Think of it like the paint, decorations, and interior design of a house - it determines how everything looks and is arranged.
Key Concepts
- Styling Capabilities
- Fonts and typography
- Colors and backgrounds
- Margins and padding
- Element sizes
- Visual effects
-
Layout and positioning
-
Cascading Nature
- Styles can be inherited from parent elements
- Multiple styles can apply to the same element
- Specificity determines which styles take precedence
- Styles "cascade" down through your document
Basic CSS Syntax
css selector { property: value; }
Example:
css h1 { color: blue; font-size: 24px; margin-bottom: 20px; }
Connecting CSS to HTML
Method 1: External Stylesheet (Recommended)
html <link rel="stylesheet" href="style.css">
Method 2: Internal CSS
```html
```
Method 3: Inline CSS (Use Sparingly)
```html
Title
```
The Box Model
Every HTML element is treated as a box in CSS, with:
┌──────────────────────┐ │ Margin │ │ ┌──────────────┐ │ │ │ Border │ │ │ │ ┌──────────┐ │ │ │ │ │ Padding │ │ │ │ │ │ ┌──────┐ │ │ │ │ │ │ │ │ │ │ │ │ │ │ │Content│ │ │ │ │ │ │ │ │ │ │ │ │ │ │ └──────┘ │ │ │ │ │ └──────────┘ │ │ │ └──────────────┘ │ └──────────────────────┘
- Content: The actual content of the element
- Padding: Space between content and border
- Border: The border around the padding
- Margin: Space outside the border
CSS Units
Absolute Units
px
- pixelspt
- pointscm
- centimetersmm
- millimetersin
- inches
Relative Units
%
- percentage relative to parentem
- relative to font-sizerem
- relative to root font-sizevh
- viewport heightvw
- viewport width
Practical Example: Styling Our Webpage
1. Basic Page Setup
css body { min-height: 100vh; margin: 0; font-family: Arial, sans-serif; background-color: #f0f0f0; display: flex; flex-direction: column; }
2. Header Styling
css header { background-color: #333; color: white; padding: 20px; text-align: center; }
3. Main Content Area
css main { max-width: 800px; margin: 0 auto; padding: 20px; flex: 1; }
4. Footer Styling
css footer { background-color: #333; color: white; padding: 10px; text-align: center; }
Layout with Flexbox
Basic Concept
Flexbox is a modern layout system that makes it easier to create flexible, responsive layouts.
Key Properties
css .container { display: flex; flex-direction: row | column; justify-content: center | space-between | space-around; align-items: center | flex-start | flex-end; }
Common Use Cases
- Centering content
- Creating navigation bars
- Building responsive layouts
- Equal-height columns
- Dynamic spacing
Best Practices
1. Organization
- Use consistent naming conventions
- Group related styles together
- Comment your code for clarity
- Keep selectors simple and specific
2. Performance
- Avoid unnecessary specificity
- Use shorthand properties when possible
- Minimize redundant code
- Consider load time impact
3. Maintainability
- Use external stylesheets
- Follow a consistent formatting style
- Break large stylesheets into logical files
- Document important design decisions
Debugging CSS
Common Tools
- Browser Developer Tools
- Element inspector
- Style inspector
- Box model viewer
Common Issues
- Specificity conflicts
- Inheritance problems
- Box model confusion
- Flexbox alignment issues
Exercises
1. Style Modifications
Try modifying these properties in your stylesheet: ```css / Change colors / header { background-color: #4a90e2; }
/ Adjust spacing / main { padding: 40px; }
/ Modify typography / h1 { font-size: 32px; font-weight: bold; } ```
2. Layout Challenge
Create a card layout using Flexbox: ```css .card-container { display: flex; justify-content: space-between; gap: 20px; }
.card { flex: 1; padding: 20px; background: white; border-radius: 8px; box-shadow: 0 2px 4px rgba(0,0,0,0.1); } ```
Additional Resources
Learning Tools
- Flexbox Froggy - Interactive Flexbox learning game
- CSS-Tricks - Excellent CSS reference and tutorials
- MDN CSS Documentation
Practice Projects
- Style your personal webpage
- Create a responsive navigation menu
- Build a flexible card layout
- Design a custom button style
Remember: CSS is both an art and a science. Don't be afraid to experiment and break things - that's how you'll learn the most. The key is to start simple and gradually add complexity as you become more comfortable with the basics.
Next up, we'll dive into JavaScript to add interactivity to our webpage! 🚀
-
@ f33c8a96:5ec6f741
2025-03-01 23:23:54JavaScript: Building Your First Interactive Web App
Introduction
In this lesson, we'll bring our web pages to life by adding dynamic functionality with JavaScript. We'll build a real-world application that displays and updates Bitcoin prices in real-time, teaching core JavaScript concepts along the way.
Project Overview: Bitcoin Price Tracker
We'll build a web application that: - Displays current Bitcoin price - Updates automatically every 3 seconds - Allows currency switching - Includes interactive controls - Shows current date/time
Core JavaScript Concepts
1. Variables and Data Types
```javascript // Variables can be declared with let or const let currentCurrency = "USD"; // Can be changed const interval = 3000; // Cannot be changed
// Basic data types const price = 45000; // Number const isVisible = true; // Boolean const currency = "USD"; // String ```
2. DOM Manipulation
```javascript // Getting elements const priceElement = document.getElementById('price'); const button = document.getElementById('refresh-button');
// Modifying content priceElement.textContent =
${price} ${currency}
;// Changing styles priceElement.style.display = 'none'; ```
3. Event Listeners
```javascript // Basic click handler button.addEventListener('click', () => { fetchBitcoinPrice(); });
// Change event for select elements selector.addEventListener('change', (event) => { handleCurrencyChange(event.value); }); ```
4. Async Operations & Fetch API
javascript async function fetchBitcoinPrice() { try { const response = await fetch(apiUrl); const data = await response.json(); updatePrice(data.price); } catch (error) { console.error('Error:', error); } }
Project Structure
HTML Setup
```html
Bitcoin Price Tracker Current Bitcoin Price
The price is:
```
Core Functionality Implementation
- Setting Up the Timer ```javascript // Update price every 3 seconds setInterval(fetchBitcoinPrice, 3000);
// Update date/time every second setInterval(updateDateTime, 1000); ```
-
Currency Selection
javascript function handleCurrencyChange(newCurrency) { currentCurrency = newCurrency; fetchBitcoinPrice(); }
-
Toggle Visibility
javascript function togglePriceVisibility() { const price = document.getElementById('price'); price.style.display = price.style.display === 'none' ? 'inline' : 'none'; }
Best Practices
1. Error Handling
- Always use try/catch with async operations
- Provide meaningful error messages
- Handle edge cases gracefully
2. Code Organization
- Keep functions focused and small
- Use meaningful variable names
- Group related functionality
- Add comments for clarity
3. Performance
- Avoid unnecessary DOM updates
- Use appropriate update intervals
- Clean up intervals when not needed
Common Challenges & Solutions
1. API Issues
javascript // Handle API failures gracefully catch (error) { priceElement.textContent = 'Price unavailable'; console.error('API Error:', error); }
2. Currency Formatting
javascript function formatPrice(price, currency) { return new Intl.NumberFormat('en-US', { style: 'currency', currency: currency }).format(price); }
3. Time Zones
javascript function getLocalTime() { return new Date().toLocaleString(); }
Extending the Project
Consider adding these features for practice: 1. Price change indicators (up/down arrows) 2. Historical price chart 3. Multiple cryptocurrency support 4. Price alerts 5. Local storage for settings
Debugging Tips
Using Console
javascript console.log('Price fetched:', price); console.error('Error occurred:', error); console.table(priceHistory);
Chrome DevTools
- Network tab for API calls
- Console for errors
- Elements for DOM inspection
- Sources for debugging
Additional Resources
- MDN JavaScript Guide
- JavaScript.info
- CoinGecko API Documentation
- Chrome DevTools Documentation
Next Steps
- Add styling with CSS
- Implement additional features
- Learn about React for more complex applications
- Explore other APIs and cryptocurrencies
Remember: The best way to learn is by doing. Don't be afraid to break things and experiment with the code. The developer console is your friend for debugging and understanding what's happening in your application.
Happy coding! 🚀
-
@ 634bd19e:2247da9b
2023-02-15 08:00:45かけるのこれ? 日本語入力の取り扱いイベントがおかしいw
-
@ f33c8a96:5ec6f741
2025-03-01 23:23:36Setting Up Git and GitHub: A Developer's Foundation
Lesson Overview
In this lesson, we'll establish one of the most important foundations of your development journey: version control with Git and GitHub. This knowledge will enable you to track your code, back it up in the cloud, and start building your developer portfolio.
Prerequisites
- Visual Studio Code installed
- Terminal/Command Line basics
- GitHub account (we'll create one in this lesson)
Key Learning Objectives
- Understand what Git and GitHub are and why they're essential
- Set up Git locally and connect it to GitHub
- Learn basic Git commands and workflow
- Create your first repository and commit
- Establish good Git habits for your developer journey
What is Git and GitHub?
Git: Your Local Version Control
- A version control system that tracks code changes over time
- Prevents accidental overwrites of your work
- Enables multiple developers to work on the same project safely
- Runs locally on your machine
GitHub: Your Code in the Cloud
- A web-based platform that extends Git
- Cloud storage for your code repositories
- Enables code sharing and collaboration
- Includes features like:
- Issue tracking
- Pull requests
- Project management tools
- Code review capabilities
Why Use GitHub?
1. Portfolio Building
- Acts as your "proof of work" as a developer
- Shows your coding activity through contribution graphs
- Demonstrates your consistency and dedication
- Serves as a public showcase of your projects
2. Collaboration and Learning
- Access millions of open-source projects
- Learn from other developers' code
- Contribute to real-world projects
- Get feedback on your code
- Work effectively in teams
3. Code Safety and Access
- All your code is safely stored in the cloud
- Access your projects from anywhere
- Never lose your work due to computer issues
Essential GitHub Terminology
| Term | Definition | |------|------------| | Repository (Repo) | A folder containing your project files and version history | | Commit | A saved change or addition to your code | | Staging | Marking changes to be included in your next commit | | Push | Sending your local commits to GitHub | | Branch | A separate version of your code for new features or experiments | | Pull Request (PR) | A request to merge changes from one branch to another | | Clone | Creating a local copy of a remote repository | | Fork | Creating your own copy of someone else's repository |
Hands-on Practice
Setting Up Git
- Install Git from https://git-scm.com/downloads
- Configure your identity:
bash git config --global user.name "Your Name" git config --global user.email "your.email@example.com"
Your First Repository
- Create a new repository on GitHub named "hello-world"
- Initialize Git locally:
bash git init git add . git commit -m "My first commit" git remote add origin <your-repository-url> git push -u origin main
Basic Git Workflow Quick Reference
Pushing Code to GitHub
```bash
1. Stage your changes
git add .
2. Commit your changes with a message
git commit -m "Describe your changes here"
3. Push to GitHub
git push ```
Getting Code from GitHub
```bash
If you already have the repository locally:
git pull
If you need to download a repository:
git clone https://github.com/username/repository.git ```
Building Good Habits
Daily Git Practice
- Make it a goal to push code every day
- Even small changes count
- Use your GitHub contribution graph as motivation
- Track your progress over time
Best Practices
- Commit often with clear messages
- Pull before you start working
- Push your changes when you finish
- Keep each project in its own repository
- Include README files to explain your projects
Common Issues and Solutions
"No upstream branch" Error
If you see this error when pushing:
bash git push --set-upstream origin main
Changes Not Showing Up
- Check if changes are staged:
bash git status
- Make sure you've committed:
bash git commit -m "Your message"
- Verify you've pushed:
bash git push
Exercise: Start Your Journey
- Create your GitHub account if you haven't already
- Set up Git locally using the commands we covered
- Create your first repository named "hello-world"
- Make your first commit
- Push your code to GitHub
- Make a habit of pushing code daily
Additional Resources
- GitHub Documentation
- Git Documentation
- Practice with GitHub Learning Lab
Next Steps
- Start tracking all your code projects with Git
- Begin building your portfolio on GitHub
- Join the open-source community
- Collaborate with other developers
Remember: Every developer started where you are now. The key is consistency and persistence. Make pushing code to GitHub a daily habit, and you'll be amazed at your progress over time.
Happy coding! 🚀
-
@ f33c8a96:5ec6f741
2025-03-01 23:23:04What is HTML?
HTML (HyperText Markup Language) is the foundation of all webpages. Think of it as the framing of a house - it provides the basic structure that everything else builds upon.
Key Concepts
- HTML is a markup language, not a programming language
- It tells browsers how to structure web content
- Every HTML element is like a building block
- Browsers interpret HTML to display content
The Building Analogy
When building a webpage, think of it like constructing a house: - HTML: The framing and structure (walls, rooms, layout) - CSS: The design elements (paint, decorations, styling) - JavaScript: The functionality (plumbing, electrical, moving parts)
Basic HTML Structure
1. HTML Boilerplate
Every webpage starts with a basic template:
```html
Your Page Title ```
2. Understanding the Parts
<!DOCTYPE html>
: Tells browsers this is an HTML5 document<html>
: The root element of the page<head>
: Contains metadata about the document<body>
: Contains the visible content
Essential HTML Elements
1. Headings
HTML has six levels of headings: ```html
Main Title
Subtitle
Section Header
Smallest Heading
```
2. Paragraphs
```html
This is a paragraph of text. It can contain as much text as you need.
```
3. Images
html <img src="path-to-image.jpg" alt="Description of image" width="300">
4. Links
html <a href="https://example.com">Click here</a>
HTML Attributes
Attributes provide additional information or modify HTML elements:
html <tag attribute="value">Content</tag>
Common attributes: -
src
: Source path for images -href
: Destination for links -alt
: Alternative text for images -class
: CSS class names -id
: Unique identifier -style
: Inline CSS stylesSemantic HTML
What is Semantic HTML?
Semantic HTML uses meaningful tags that describe their content's purpose. This improves: - Accessibility - SEO (Search Engine Optimization) - Code readability - Maintainability
Common Semantic Elements
```html
```
Non-Semantic vs Semantic Example
Instead of: ```html
```
Use: ```html
```
Building Your First Webpage
1. Basic Structure
```html
My First Webpage Welcome to My First Webpage!
About Me
Hi, I'm learning web development with PlebDevs!
My Interests
I'm interested in Bitcoin, programming, and building cool stuff!
```
Best Practices
1. Structure
- Use proper indentation
- Keep code organized and readable
- Use semantic elements when possible
- Include all required elements (
DOCTYPE
,html
,head
,body
)
2. Content
- Use appropriate heading levels (start with
h1
) - Write descriptive
alt
text for images - Keep content meaningful and organized
- Use comments to explain complex sections
3. Accessibility
- Use semantic HTML elements
- Provide alternative text for images
- Maintain a logical heading structure
- Ensure content makes sense when read linearly
Common Issues and Solutions
Problem: Images Not Loading
```html
```
Problem: Links Not Working
```html
Click here ```
Next Steps
- Practice Building
- Create a personal webpage about yourself
- Include different types of content (text, images, links)
-
Use semantic HTML elements
-
Experiment with Structure
- Try different layouts
- Use various HTML elements
-
Pay attention to semantic meaning
-
Prepare for CSS
- Think about how you want your page to look
- Consider what styles you'll want to add
- Plan your layout structure
Exercise: Create Your Profile Page
Try creating a simple profile page using what you've learned:
- Use the HTML boilerplate
- Add a header with your name
- Include an "About Me" section
- Add a photo (if you want)
- List your interests or goals
- Add a footer with contact information
Remember to: - Use semantic HTML - Include appropriate headings - Add descriptive alt text for images - Keep your code clean and well-organized
Additional Resources
Remember: HTML is the foundation of web development. Take time to understand these basics well, as they'll serve as the building blocks for everything else you'll learn. Happy coding! 🚀
-
@ f33c8a96:5ec6f741
2025-03-01 23:21:44Welcome to PlebDevs Starter Course
Course Mission
Welcome to the PlebDevs starter course! I'm Austin, the founder of PlebDevs, and I'll be walking you through this short intro starter course that will get you up and running and interacting with the rest of the content on the platform. If you're here, I'm assuming you're new to coding or just starting out. If you already have experience and have your bearings down, there's lots more intermediate and advanced content on the platform. This course is designed for absolute beginners.
Course Goals
Overall PlebDevs Goals
- Learn how to code
- Build Bitcoin/Lightning/Nostr apps
- Become a developer
This is a big journey with a lot of pieces and things to learn. The starter course is going to get you on that path as quickly as possible and make it a smooth journey.
Starter Course Objectives
- Give you an easy, high-level overview of the dev journey
- Get you set up and comfortable in a development environment where you'll write and ship code
- Give you basic experience in the languages covered in our courses and workshops
There's lots of material out there that will just tell you exactly what to do and not explain why but I want you to actually understand for yourself. I want you to have a good mental model of what this journey is going to be like, what it's going to be like actually writing and pushing code. And then we're going to start getting our hands dirty and gain real experience.
What is a PlebDev?
Origins and Philosophy
I started using the term "PlebDev" a few years ago to describe a unique approach to learning development in the Bitcoin space. It represents:
- Inclusive Learning: Anyone can become a developer, regardless of background
- Growth Mindset: Embracing the journey from beginner to professional
- Practical Focus: Emphasizing real-world application development
- Community Support: Learning and growing together
Key Characteristics
- 🌱 Growth-Focused: PlebDevs are always learning and improving
- 🎯 App-Centric: Focus on building applications rather than protocol development
- 🆕 Embrace Being New: Being a new developer is infinitely better than being on the sidelines
- 🤝 Community-Driven: Bitcoin/Lightning/Nostr ecosystem needs more plebdevs like you!
Our Learning Approach
Core Principles
- Lower Barriers
- Simplify complex concepts
- Focus on practical understanding
-
Build confidence through action
-
Project-Based Learning
- Learn by doing
- Create real applications
-
Build a portfolio as you learn
-
MVP (Minimum Viable Product) Focus
- Start with core functionality
- Get things working first
-
Iterate and improve
-
Actionable Knowledge
- Focus on the 20% that delivers 80% of results
- Learn what you can use right away
- Build practical skills
Teaching Methods
- Detailed concept breakdowns
- Line-by-line code explanations
- Interactive learning
- 1:1 support available
- Community-driven progress
Course Structure
The Learning Path
Instead of the traditional bottom-up approach, we use a project-focused method:
🏔️ Advanced Skills 🏔️ Projects & Practice 🏔️ Core Concepts 🏔️ Development Environment 🏔️ Getting Started
We'll create checkpoints through projects, allowing you to: - Verify your understanding - Build your portfolio - See real progress - Have reference points for review
Student Expectations
What We Expect From You
- High Agency: Take ownership of your learning journey
- Active Participation: Engage with the material and community
- Persistence: Push through challenges
- Curiosity: Ask questions and explore concepts
What You Can Expect From Us
- Clear, practical instruction
- Comprehensive support
- Real-world applications
- Community backing
Getting Started
Next Steps
- Ensure you're ready to commit to learning
- Set up your development environment (next lesson)
- Join our community
- Start building!
Resources and Support
Where to Get Help
- plebdevs.com
Tips for Success
- Push code daily, even if it is small.
- Focus on understanding rather than memorizing.
- Build projects that interest you.
- Engage with the community.
- Don't be afraid to ask questions.
Remember
You don't need to become a "10x developer" overnight. The goal is to start writing code, build useful things, and gradually improve. Every expert was once a beginner, and the journey of a thousand miles begins with a single line of code.
Ready to begin? Let's dive into the next lesson where we'll set up your development environment! 🚀
-
@ 6260f29f:2ee2fcd4
2025-03-01 22:48:31PlebDevs ⚡️
A one-of-a-kind developer education, content, and community platform built on Nostr and fully Lightning integrated.
https://plebdevs.comOverview
PlebDevs is an open-source platform that combines educational content, community interaction, and Bitcoin/Lightning integration. The platform publishes content to Nostr and actively pulls from Nostr relays, creating a distributed, interoperable trail of Documents, Videos, and Courses.
Technical Implementation
Nostr Integration
- Content Distribution: Implements NIP-23 for rich multimedia content embedding
- Content Encryption: Paid content bodies are encrypted while maintaining metadata visibility
- Authentication:
- Multi-method signup (NIP-07, Email, GitHub, Anonymous)
- Ephemeral keypair generation for non-Nostr users
- Account linking and recovery system
- Lists & Courses: NIP-51 implementation for structured content organization
- Monetization: NIP-99 for digital content sales
- Automated Subscriptions: NIP-47 (Nostr Wallet Connect) for recurring payments
- Badge System: NIP-58 for automated achievement rewards
- Identity: NIP-05 for custom platform identities
- Additional NIPs: Implements NIP-01, NIP-19, NIP-39, NIP-57
Platform Architecture
- Content Management:
- Draft system with preview capabilities
- Parameterized replaceable events
- Multi-format support (Markdown, Video, Mixed Media)
- Course builder with drag-and-drop ordering
- User Management:
- Profile synchronization with Nostr
- Activity tracking and progress monitoring
- Custom relay configuration
- Wallet connection management
- Admin Features:
- Protected admin routes based on pubkey configuration
- Content creation and management interface
- Draft/publish workflow
- Course assembly tools