-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Let’s dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computers—and it has nothing to do with what so-called “quantum coaches” teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoin’s security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computing’s Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. It’s a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoin’s Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoin’s blockchain.
- Lamport: Created in 1977, it’s considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoin’s Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the community’s constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoin’s future is not at risk—it is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 4870d550:110d6208
2025-03-10 16:24:25As many of you may know, The Progressive Bitcoiner has transitioned to a 501c3 nonprofit in the United States, based in Boston Massachusetts. We were always mission driven as a podcast, and I decided to take that mission, as well as my own passion as a progressive and my experience working in nonprofits for the past decade, and translate it into nonprofit.
Our mission is to increase Bitcoin awareness and adoption among progressives through education and funding progressive causes. I believe our mission is more important than ever, and today I’m asking for your help and partnership!
From our humble beginnings years ago as just a podcast, we were dedicated to amplifying progressive voices and bitcoin education tailored to a progressive audience because that was desperately lacking in the bitcoin media and education space. Additionally, a lot of left leaning media, politicians, and everyday people were believing and perpetuating myths about bitcoin being bad for the environment, being a right wing/libertarian project, only used for crime and terrorism, etc. While the narrative has improved some, I think all of us would agree we still have a long way to go.
Also take into consideration the recent election of Donald Trump as President of the United States, his support of bitcoin and bitcoin friendly policies, and how that may create a backlash and perpetuate false narratives left leaning folks and media believe and push against bitcoin. In one regard it’s silly to dismiss, or actively fight against, a neutral and open technology like bitcoin (with incredible benefits for people globally as a store of value, media of exchange, and beyond) just because you don’t like someone who uses it or promotes it. On the other hand, it is a real thing happening right now in left circles and mainstream media (just look at Rachel Maddow’s recent comments on the U.S. Strategic Bitcoin reserve).
This is why I think our mission and cause is more important than ever before, and why I’m asking for your help and partnership. Whether you consider yourself a progressive or left leaning person or not, our goal is to build a more diverse and robust constituency that understands bitcoin and will advocate for bitcoin rights in the U.S. that includes preserving privacy and freedom tech tools, bitcoin self-custody, and in general the ability for all americans to freely use and benefit from bitcoin. While many inroads have been made in bipartisan ways and support of bitcoin, we still have a long way to go and many of the most outspoken advocates of bitcoin continue to be right leaning individuals and politicians, while many of the most outspoken critics come from the left.
As Lyn Alden once said to me on our podcast, it’s critical to also support and protect your left flank as much as your right, which creates a stronger and more robust defense of whatever you're fighting for. For us, the fight for financial freedom and human rights is critical, and bitcoin is an integral part of this fight. We will work hard to fight any potential backlash from the left against bitcoin as they attach narratives to Bitcoin associating it with Trump (particularly as we watch elections in 2026 and 2028).
The way we combate this and grow bipartisan support for bitcoin is through media, our publications, traveling to and appearing on mainstream media, meeting with progressive lawmakers, staffers, and activists, to discuss Bitcoin in a way that resonates with progressives. Do we want just under half the country to think Bitcoin isn't for them, or have them believe mainstream media narratives about Bitcoin as a MAGA only movement? Of course we know that’s a crazy assertion, but many are perpetuating this narrative.
Through our own efforts, and partnerships with other bitcoin education and advocacy orgs in the space, we will build a more robust, and bipartisan coalition of bitcoin support in the United States. The only way we can do this is with your support and donation to help us increase our media and publication presence, fund progressive causes through our grant giving program, and increasing staff capacity at our organization to hit the ground running whether it’s in Boston, DC, LA and beyond.
Whether you are a progressive individual that agrees wholeheartedly with our cause and identifies with our content and work, or even if you’re a conservative who voted for Trump, but want to see more bipartisan support of Bitcoin and less unsubstantiated attacks against Bitcoin from left media and politicians, we ask for your support today. We don’t want to waste a moment on amplifying our message and getting to work building this support and educating the left on Bitcoin.
Consider donating today in Bitcoin or fiat https://progressivebitcoiner.org/donate/. If you are a Bitcoin business in the space also wanting to increase bipartisan support of Bitcoin by bringing in more progressives to the cause, we welcome and encourage your support either through media partnership via our podcast and publication, or by donation. Your donation is tax-deductible.
Thank you for your support and partnership. Remember, Bitcoin is for everyone! And we’re doing our part to ensure that progressives understand this. This is only the beginning!
Trey Walsh Executive Director, The Progressive Bitcoiner, Inc.
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 6bae33c8:607272e8
2025-03-10 16:21:56This draft took place last night (March 9). Once again I drew the 12 slot.
Here are the results:
Link to livestream. Link to BCL1.
1.12 Mookie Betts — I was hoping for Kyle Tucker or Corbin Carroll, but knew realistically that wasn’t likely to happen. So it was either a repeat of BCL1, wherein I went Julio Rodriguez and Jackson Chourio or mixing it up with Betts, who’s a better bet for runs and average at the cost of steals.
2.1 Jackson Chourio — I think 20-30 is his healthy floor, and there’s a chance he hits .300. Plus I like the home ballpark.
3.12 Austin Riley — He was going at the 1-2 turn last year, and nothing’s changed except that he got hurt after a slow start, but he’s healthy now. I also find third base to be scarce, and Riley gives you some batting average from the position too.
4.1 Chris Sale — I talked myself into Sale earlier in the day as he’d be going at the 1-2 turn like Paul Skenes and Tarik Skubal based on last year’s numbers. The market must assume he’s a higher injury risk, but that’s not necessarily the case given how hard Skubal and Skenes throw.
5.12 Raisel Iglesias — I love old warhorse closers on good teams. They’re not reliant on dominant stuff, and they know how to survive.
6.1 Yainer Diaz — I always hate rounds 5 and 6 — never see any value there, so sometimes I punt and take the premium catcher. Diaz gives you pop and major average from the position — remember the baseline for catcher batting average is much lower than that of the other positions.
7.12 Max Fried — I got him in BCL1 too, in the same spot. Just a solid pitcher who should get run support in a favorable stadium for lefties.
8.1 Cody Bellinger — First base is scarce, and I like Bellinger’s left-handed bat in Yankee Stadium. Plus he’s a sneaky source of stolen bases as first base-eligible players rarely run.
9.12 Hunter Brown — I missed out on Spencer Strider by a few picks, so I settled for Brown who dominated for two thirds of the year after a bad start.
10.1 Jake Burger — This was a tough call, but I wanted to fill up at corner while I had the chance, and Burger’s had two straight years of solid pop without killing your batting average, despite playing in Miami. I thought about Alex Bregman and even Marcus Semien, who somehow was still available.
11.12 J.T. Realmuto — My queue really emptied ahead of this turn — Sandy Alcantara, Bo Bichette, Shane McClanahan and Josh Lowe — but I was cool with JTR for a bounce-back year. He’s 34, but I expect him to run more now that he’s nine months removed from meniscus surgery and claims he feels as good as ever.
12.1 Sonny Gray — I preferred Alcantara or McClanahan, but Gray is an old warhorse who knows how to pitch and plays in a good park.
13.12 Kevin Gausman — I was thrilled to land him here. He had shoulder trouble last year, but he touched 96.2 in a spring training outing and appears healthy. Prior to last season, he was routinely an early round ace.
14.1 Kenley Jansen — Another old warhorse closer, who I also drafted in BCL1.
15.12 Zach Neto — I think Neto’s mispriced. He went 23-30 last year at age 23, and he’s expected back in April. Maybe I’m being cavalier about his return from shoulder surgery, but he’s already doing throwing drills and hasn’t had a setback.
16.1 Jordan Romano — I went for a third closer because the price was right. Chances are at least one of the other two misses time or loses the job at some point, so it’s nice to have a surplus of saves. Also, three closers are a nice luxury when your marginal starters have tough matchups.
17.12 Jackson Holliday — I needed a second baseman, and he is one. Seriously though, this is the time to swing for the fences on one of the league’s top prospects.
18.1 Brandon Nimmo — Maybe I should have taken Cedric Mullins instead because Nimmo’s banged up, but I needed an OF, and I got a bit stuck with the clock. Nimmo’s batting average should rebound, and he’s a great source of runs given his strong OBP.
19.12 TJ Friedl — Apparently, he’s leading off, and I needed the steals. I was short on OF through 17 rounds, so I decided to attack it with volume.
20.1 Nolan Jones — My second share of Jones, just too obvious given his 2023 season and home ballpark.
21.12 Jonathan India — He gets a ballpark downgrade, but he’ll run a little, and gives me needed MI depth.
22.1 Nick Lodolo — I drafted a lot of starters in the early-middle rounds, but I was still a bit thin. Lodolo’s a pedigreed young pitcher who misses bats.
23.12 Alec Burleson — I needed more outfield depth. Burleson provided some pop (21 HR), nine steals and a solid average last year. Maybe he’ll qualify at first base at some point too.
24.1 Roman Anthony — Another top prospect, potentially a good source of steals when he gets called up, hopefully sooner rather than later. Round 24 seems cheap for this kind of upside, but that’s where the market has him.
25.12 Evan Carter — Attacking outfield with volume. Carter was roughly a 10th-round pick last year after his 2023 post-season run. He stole bases in the minors too.
26.1 Dustin May — He’s competing for a rotation spot in LA and has always been very good when healthy.
27.12 Jacob Wilson — A solid prospect who has the shortstop job to himself in a bandbox ballpark. Plus I needed someone to fill in while Neto gets healthy.
28.1 Gerrit Cole — At the time, the results of his tests were not entirely known, so it was worth a shot. It looks like he’ll be the first drop. Prefer wasting a 28th to a 6th.
29.12 Gavin Lux — Former top prospect gets a big park upgrade, could qualify at a few positions before long. Also got him in BCL1.
30.1 Will Warren — Jack Kitchen, who’s running this team for me, asked me to get him in Round 30, so I did. He’s a candidate to replace Cole now.
Roster By Position:
C Yainer Diaz/J.T. Realmuto
1B Cody Bellinger
2B Jackson Holliday
3B Austin Riley
SS Zach Neto
CI Jake Burger
MI Jonathan India
OF Mookie Betts/Jackson Chourio/Brandon Nimmo/T.J. Friedl/Nolan Jones
UT Alec Burleson
SP Chris Sale/Max Fried/Hunter Brown/Sonny Gray/Kevin Gausman/Nick Lodolo
RP Raisel Iglesias/Kenley Jansen/Jordan Romano
B Roman Anthony/Evan Carter/Dustin May/Jacob Wilson/Gerrit Cole/Gavin Lux/Will Warren
-
@ e5de992e:4a95ef85
2025-03-10 16:18:21Many traders and investors fall into a dangerous mindset: thinking the market is "too cheap" and should go up, or "too expensive" and should go down.
This kind of thinking leads to forcing your view onto the market—which is one of the most expensive mistakes you can make. The market doesn’t care about your opinion. It moves based on supply, demand, liquidity, and psychology—not what you think it “should” do.
If you want to succeed in trading, you must learn to read and follow the market, not fight it.
The Market Doesn't Care About "Cheap" or "Expensive"
Let’s break this down:
1. Cheap Stocks Can Get Cheaper
- A stock dropping from $100 to $50 may look cheap.
- But if it’s in a strong downtrend, it can drop to $30, then $10.
- "Cheap" is never a reason to buy—you need confirmation that demand is returning.
2. Expensive Stocks Can Get Even More Expensive
- A stock at all-time highs may seem overpriced.
- But if demand keeps pushing it higher, it can go much further than most expect.
- "Overvalued" stocks can stay overvalued for years while continuing to climb.
📌 Example: Tesla (TSLA)
- In 2019, Tesla looked "overpriced" at $50 (split-adjusted)—many traders shorted it.
- By 2021, it hit $400—a 700%+ increase.
- Those who tried to force their bearish view onto the market lost everything.
The Cost of Fighting the Market
Forcing your bias onto the market is a losing game.
- If you short a stock just because it "looks too expensive," you might get squeezed.
- If you buy a stock just because it "looks too cheap," you might be catching a falling knife.
Instead, you must follow the price action and trade what’s actually happening—not what you think should happen.
How to Read and Follow the Market
1. Price Is the Truth
- The market’s job is to price in all available information—fundamentals, news, expectations, liquidity.
- Your job is to analyze what the market is actually doing, not what you think it should do.
- Uptrends = buyers are in control. Downtrends = sellers are in control.
2. Trend Matters More Than Your Opinion
- Uptrends tend to continue → Look for strong stocks making higher highs.
- Downtrends tend to continue → Avoid trying to catch the bottom.
- Sideways markets are uncertain → Wait for confirmation before acting.
3. Follow Strength, Avoid Weakness
- Strong stocks keep getting stronger—leaders emerge from healthy markets.
- Weak stocks keep getting weaker—avoid stocks in long-term downtrends.
- Always ask: "Is the market rewarding this trend?"
📌 Example: Nvidia (NVDA)
- Many thought NVDA was “too expensive” at $200 in early 2023.
- It kept running past $400, then $500—doubling in value.
- Those who followed the trend profited, while those who fought it got crushed.
Final Thoughts: Adapt or Lose
🚫 The market is never "too cheap" or "too expensive"—it just is.
🚫 Trying to force your view onto the market will cost you.
✅ Your job is to read the market, follow the trend, and adapt.The market rewards discipline, patience, and trend-following—not stubborn opinions.
💡 Action Step: Next time you feel the urge to fade a strong trend or buy a falling knife, ask yourself: "Am I trading my opinion or the actual market?"
Trade what’s happening—not what you wish would happen. 🚀
-
@ da0b9bc3:4e30a4a9
2025-03-10 15:50:05Hello Stackers!
It's Monday so we're back doing "Meta Music Mondays" 😉.
From before the territory existed there was just one post a week in a ~meta take over. Now each month we have a different theme and bring music from that theme.
This month is March and we're doing March Madness. So give me those Wacky and Weird crazy artists and songs. The weirder the better!
Let's have fun.
How about crazy yodel prog?
https://youtu.be/Obdv1jghXAE?si=8e4b7ISJg6pDGGBP
Talk Music. Share Tracks. Zap Sats.
originally posted at https://stacker.news/items/909253
-
@ 0463223a:3b14d673
2025-03-10 13:08:11Whilst starting out documenting coming off prescription drugs and an attempt at self improvement. I now understand that I want to write a weekly blog to clarify my thoughts and provide a means for self introspection and self improvement. It’s pretty narcissistic to be honest but I’m fine with that. I’m trying to be honest in my approach and it is what it is.
Some folks will write about economics, others culture war hot topics or how they stick raw egg up their arse for profit type diet advice. It’s unlikely I’ll approach any of those topics, there’s a lot of noise already and I don’t want to add to the pile.
Each week I will write a page of A4 and hope over time the writing style will improve. It’s coming from an extremely low base so I’m most optimistic about the upside potential!
I’ve been pretty hard on myself in the last week, folks who interact with me here may have noticed, my wife certainly has and it’s true. I’ve been an emotional wreck. For over a decade my brain chemistry was altered by drugs and my brain is not a comfortable place. Staying on the drugs was easy but it’s not the answer.
I notice it’s quite common for folks to say you should never speak ill of yourself here, words have power. On one level I agree, no one should beat themselves unnecessarily but I think it’s just as important to be self aware, understand where you have biases, where you have strengths and weaknesses. If you’re never hard on yourself, how do you improve? Only by facing problems face on is what I’m thinking.
I broke down in tears on a live stream last week, pretty embarrassing. The day before I’d seen footage of a gig I’d done in 2013 (I think), a gig that helped pave the way for some of the cool projects I’ve been involved with over the last decade. It was nothing fancy, just a night in a local pub. What truly broke my heart was seeing my late friend on drums. He committed suicide not long after that gig.
I was on such a high at that time. We had begun working with world class musicians, acts people had actually heard of, not Pop but credible artists. Our own band had just got its first national radio play and we’d been offered a deal to make an album with a reasonable advance. We were doing tonnes of gigs, studio sessions and having fun (at least I thought). Nothing glamorous, long sessions in low budget studios, gigs getting paid fuck all but we were DOING THINGS. We were doing what we’d always wanted to do. Make music.
So with that fresh in my memory I thought I’d try playing a record we’d made together on the stream, absolute car crash. I could barely speak. Music completely kicked my arse that day. After all this time, I’m still not over it.
Him dying like that kicked the shit out of me in ways I can’t begin to describe. I fell into a very deep depression myself after that and I was so fucking angry. I’d say more but I don’t feel comfortable talking about it, knowing whatever pain I feel, it’s nothing compared to the pain his family feel. They are very private people. I respect that.
It was around that time I started being medicated. I came very close to committing suicide myself and was talked out of driving my car off a cliff by the samaritans. Fun right!?
Aside from the music stuff, we were both working for a charity helping kids from tough backgrounds develop life skills through music. The week before his death we’d both lost a lot of hours work due to government cut backs. Cut backs that were put in place as our country was compelled to bail out a bunch of bankers. I’m STILL angry about that, but less so now.
I want to keep anything I earn as far away from the banks as is possible. Seriously, fuck them. Fuck them. Fuck them. Fortunately there is an opt out.
It’s unlikely I’ll say much more on the subject. Sure I could game Nostr by endless posting pictures of Michael Sailor but frankly, no. I have nothing in common with the guy. He gave up music because there was no money in it. Fuck him, his beats would suck anyway, he has no soul haha but hey, he’s enjoying himself and that’s good for h.
I don’t have thousands upon thousands of bitcoin but I have no money in the bank and thousands of Sats. Win!
-
@ a012dc82:6458a70d
2025-03-10 12:52:39The cryptocurrency landscape is witnessing a significant shift as institutional investors, led by giants like BlackRock, are increasingly venturing into Bitcoin, marking a new era in the digital asset's journey. This article delves into the recent acquisition spree where institutional entities have amassed a substantial 3.3% of Bitcoin's total supply, exploring the implications and potential outcomes of this trend. The movement signifies a departure from traditional investment paradigms, as these financial behemoths traditionally steered clear of highly volatile assets like Bitcoin. However, the changing economic landscape, marked by inflation fears and the search for non-correlated assets, has led these institutions to reconsider their stance. The involvement of firms like BlackRock not only brings substantial capital to the Bitcoin market but also signals to other institutional and retail investors that Bitcoin is a viable asset class. This shift is not merely about investment in digital assets but represents a broader acceptance of cryptocurrency as an integral part of the modern financial landscape.
Table of Contents
-
The Rise of Institutional Investment in Bitcoin
-
The 3.3% Supply Phenomenon
-
Implications of Institutional Holdings
-
Challenges and Controversies
-
The Road Ahead
-
Conclusion
-
FAQs
The Rise of Institutional Investment in Bitcoin
In recent years, Bitcoin has transitioned from a speculative investment for individual traders to a legitimate asset class attracting institutional investors. The introduction of Bitcoin exchange-traded funds (ETFs) has been a pivotal moment, providing a regulated and accessible avenue for institutional players to enter the cryptocurrency market. Companies like BlackRock, the world's largest asset manager, have led the charge, signaling a significant endorsement of Bitcoin's long-term value. This trend is reinforced by the growing dissatisfaction with traditional financial systems and the low-yield environment, driving institutions to seek alternative investments. The rise of institutional investment has been facilitated by improved regulatory clarity and the development of more sophisticated cryptocurrency services, including custody and trading solutions tailored for institutional needs. This wave of institutional interest is not just a fad but a reflection of a deeper understanding and acceptance of blockchain technology and its potential to revolutionize financial systems. As more institutions enter the market, we can expect to see a ripple effect, with increased innovation, product offerings, and perhaps even regulatory reforms tailored to accommodate the burgeoning asset class.
The 3.3% Supply Phenomenon
A recent report has shed light on a remarkable development: the combined applicants of 11 spot Bitcoin ETFs now hold approximately 3.3% of the total circulating Bitcoin supply. This group includes heavyweight financial institutions such as Grayscale, Fidelity, and Franklin Templeton, among others. This collective move by institutional investors to secure a sizable portion of Bitcoin's supply underscores their bullish outlook on the cryptocurrency's future. The strategic acquisition of such a significant portion of the supply is not just a vote of confidence in Bitcoin's value proposition; it also reflects a strategic positioning for future financial landscapes where digital assets play a central role. This accumulation can lead to a reduction in market liquidity, which, while potentially increasing volatility in the short term, may also lead to higher prices as demand continues to grow against a limited supply. The actions of these institutions highlight a strategic shift towards diversification and the recognition of Bitcoin as a digital gold, a hedge against inflation, and a new asset class with unique properties.
Implications of Institutional Holdings
The substantial acquisition of Bitcoin by institutional investors has several implications. Firstly, market stability is expected to improve as institutional investors are typically long-term holders, reducing the market's susceptibility to large, speculative price swings. Unlike retail investors, who may be prone to panic selling during market downturns, institutions are more likely to hold their positions through volatility, providing a stabilizing effect on the market. Secondly, the price impact, while not immediately evident, could manifest significantly in the long term. As institutions continue to accumulate Bitcoin, the reduced supply could lead to price increases, especially if retail and other institutional investors continue to enter the market. Thirdly, the legitimacy and adoption of Bitcoin are likely to increase as institutional involvement can be seen as an endorsement of its viability as an investment. However, this shift also brings challenges, such as potential centralization and the risk of large-scale market manipulation. The increased institutional presence in the Bitcoin market is a double-edged sword; while it brings legitimacy and stability, it also introduces new risks and challenges that the cryptocurrency community must navigate.
Challenges and Controversies
Despite the optimistic outlook, the move has not been without its challenges and controversies. The approval of Bitcoin ETFs by regulatory bodies like the SEC has been met with mixed reactions. SEC Chair Gary Gensler's comments highlighted the irony in approving spot Bitcoin ETFs, pointing out the potential for increased centralization and speculation in a market that values decentralization. This decision has sparked a debate within the cryptocurrency community about the future of Bitcoin and whether institutional involvement will dilute its foundational principles. Furthermore, the large-scale acquisition of Bitcoin by institutions could lead to a concentration of wealth and power within the ecosystem, which contradicts the decentralized ethos that Bitcoin was built upon. Additionally, there are concerns about the environmental impact of Bitcoin mining and whether institutional investors will push for more sustainable practices or exacerbate the issue. The entry of institutional investors into the Bitcoin space is a complex development that brings both opportunities and challenges, and its long-term impact remains to be seen.
The Road Ahead
As the market adjusts to the new reality of institutional involvement in Bitcoin, all eyes will be on the impact of these developments on the cryptocurrency's price, supply dynamics, and overall market structure. Additionally, the upcoming Bitcoin halving event in April is set to further influence the market, reducing the rate at which new Bitcoins are created and possibly leading to tighter supply conditions. This event could exacerbate the effects of institutional accumulation, potentially leading to significant price movements. The road ahead for Bitcoin is fraught with uncertainties and possibilities. The increasing institutional interest in Bitcoin is likely to continue shaping the cryptocurrency landscape, influencing everything from regulatory approaches to technological innovations within the space. As we move forward, the key will be balancing the benefits of institutional involvement with the need to preserve the decentralized, open nature of cryptocurrencies.
Conclusion
The acquisition of 3.3% of Bitcoin's supply by institutional investors marks a significant milestone in the cryptocurrency's evolution. As institutions like BlackRock and others bet big on Bitcoin, the landscape of digital assets is set to change dramatically. While challenges remain, the long-term outlook for Bitcoin appears more promising than ever, with institutional investment paving the way for broader acceptance and stability in the cryptocurrency market. However, as the market evolves, it will be crucial to monitor the impacts of this shift, ensuring that Bitcoin remains a tool for financial empowerment and innovation, rather than becoming an instrument of traditional financial systems. The journey of Bitcoin continues to unfold, and the involvement of institutional investors is just the latest chapter in its ongoing story.
FAQs
Why are institutional investors like BlackRock interested in Bitcoin? Institutional investors are turning to Bitcoin as a new asset class to diversify their portfolios, hedge against inflation, and capitalize on the potential for high returns. The growing acceptance of Bitcoin as a legitimate investment, improved regulatory clarity, and the development of institutional-grade trading and custody services have also contributed to this interest.
What does the 3.3% Bitcoin supply acquisition mean? The 3.3% supply acquisition refers to the combined total of Bitcoin currently held by the applicants of 11 spot Bitcoin ETFs. This significant holding indicates a strong belief in the future value of Bitcoin and represents a substantial portion of the total circulating supply, highlighting the growing influence of institutional investors in the cryptocurrency market.
How does institutional investment affect the Bitcoin market? Institutional investment is expected to bring more stability, reduce volatility, and increase market maturity. However, it could also lead to potential centralization and influence market dynamics, such as supply scarcity, which may drive up prices.
What are the challenges and controversies surrounding institutional investment in Bitcoin? Challenges include potential market manipulation, centralization of Bitcoin holdings, and deviation from Bitcoin's original ethos of decentralization. Controversies also arise from environmental concerns related to Bitcoin mining and the potential for increased speculation and volatility.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ d360efec:14907b5f
2025-03-10 12:34:35ภาพรวมสถานการณ์ : https://www.tradingview.com/chart/F8mO3cIx/
Bitcoin (BTC) ประสบกับการร่วงลงอย่างรุนแรง (sharp sell-off) ในวันที่ 10 มีนาคม 2568. การเคลื่อนไหวนี้, โดยเฉพาะอย่างยิ่งที่เห็นได้ชัดใน Timeframe 15 นาที, ได้ทำลายแนวรับสำคัญหลายระดับ และยืนยันถึงแนวโน้มขาลงในระยะสั้นอย่างชัดเจน. แม้ว่า Timeframe Day จะยังไม่ เสีย โครงสร้างขาขึ้นในระยะยาวไปทั้งหมด, แต่ก็แสดงสัญญาณเตือนที่สำคัญหลายประการ, รวมถึงแท่งเทียน Bearish Engulfing, Money Flow ที่เปลี่ยนเป็นลบ, และ Trend Strength ที่อ่อนแอลง. การวิเคราะห์นี้จะพิจารณาทุก Timeframe อย่างละเอียดเพื่อหากลยุทธ์ที่เหมาะสมกับความเสี่ยงที่สูงมากในปัจจุบัน.
การวิเคราะห์ทางเทคนิค (Technical Analysis):
-
Timeframe 15 นาที (15m) - เน้น:
- SMC (Smart Money Concepts): ราคา Breakout แนวรับสำคัญทั้งหมดลงมาอย่างรุนแรง. มีการสร้าง Lower Lows (LL) อย่างต่อเนื่อง. นี่แสดงถึงการควบคุมตลาดของแรงขายอย่างเบ็ดเสร็จ (complete dominance of selling pressure).
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (แนวต้าน): $68,000 (แนวรับเดิมที่ตอนนี้กลายเป็นแนวต้านสำคัญ), $69,000, $70,000.
- Sellside Liquidity (แนวรับ): ไม่มีแนวรับที่แข็งแกร่งในระยะใกล้. อาจมีแนวรับทางจิตวิทยา (psychological support) ที่ $60,000, และต่ำกว่านั้นที่ $58,000, $56,000. การระบุแนวรับที่ชัดเจนในสภาวะนี้เป็นเรื่องยาก.
- Money Flow: เป็นลบอย่างรุนแรง (Strong Outflow). นี่คือการยืนยันที่สำคัญที่สุดอย่างหนึ่งของแรงขาย.
- EMA (Exponential Moving Average): EMA 50 (สีเหลือง) อยู่ต่ำกว่า EMA 200 (สีขาว) อย่างชัดเจน, และระยะห่างระหว่างเส้นทั้งสองกำลังขยายออก. นี่คือสัญญาณ Bearish ที่แข็งแกร่ง.
- Trend Strength: เมฆสีแดงหนาแน่น, และมีสัญญาณ Sell อย่างชัดเจน.
- Chart Pattern: ไม่มีรูปแบบ Chart Pattern ใดๆ ที่บ่งบอกถึงการกลับตัวเป็นขาขึ้น (Bullish).
- สรุป 15m: แนวโน้มขาลงชัดเจนและแข็งแกร่งมาก.
-
Timeframe 4 ชั่วโมง (4H):
- SMC: ราคาอยู่ในช่วงการปรับฐาน (correction). ได้หลุดลงมาต่ำกว่า EMA 50 และกำลังทดสอบ EMA 200.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (แนวต้าน): $68,000 - $69,000.
- Sellside Liquidity (แนวรับ): EMA 200 (ประมาณ $60,000), $58,000 (บริเวณ Demand Zone ก่อนหน้า).
- Money Flow: เป็นลบ (Outflow).
- EMA: EMA 50 (สีเหลือง) ตัด EMA 200 (สีขาว) ลงมาแล้ว (Death Cross). นี่คือสัญญาณ Bearish ในระยะกลาง.
- Trend Strength: เมฆสีแดงบ่งบอกถึงแนวโน้มขาลงระยะกลาง.
- Chart Pattern: ไม่มีรูปแบบการกลับตัวที่เป็น Bullish ที่ชัดเจน.
- สรุป 4H: ยืนยันการปรับฐานในระยะกลาง. แนวโน้มเป็นขาลง.
-
Timeframe Day (Day):
- SMC: ยังไม่ เสียโครงสร้างขาขึ้นหลักในระยะยาว (คือ ยังไม่ได้ทำ Lower Low ที่ต่ำกว่า $59,000 - $60,000). อย่างไรก็ตาม, แท่งเทียนล่าสุดคือ Bearish Engulfing ซึ่งเป็นสัญญาณกลับตัวที่สำคัญ, และความรุนแรงของการร่วงลงบ่งบอกถึงความอ่อนแอที่เพิ่มขึ้น.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (แนวต้าน): $72,000, $75,000 (All-Time High).
- Sellside Liquidity (แนวรับ): $60,000 (แนวรับสำคัญทางจิตวิทยา, Low ก่อนหน้า), $58,000, และ $50,000 - $52,000 (EMA 200 และ Demand Zone).
- Money Flow: เริ่มเปลี่ยนเป็นลบ (Outflow). นี่เป็นการเปลี่ยนแปลงที่สำคัญและเป็นสัญญาณเตือนที่ร้ายแรง.
- EMA: EMA 50 (สีเหลือง) ยังคงอยู่เหนือ EMA 200 (สีขาว), แต่ระยะห่างระหว่างเส้นทั้งสองแคบลง.
- Trend Strength: เมฆสีเขียวเริ่มบางลง, และมีสัญญาณ Neutral (ก่อนหน้านี้), และตอนนี้มีสัญญาณ Sell.
- Chart Pattern: Bearish Engulfing - สัญญาณกลับตัวเป็นขาลงที่แข็งแกร่ง.
- สรุป Day: แนวโน้มระยะยาวยังคงเป็นขาขึ้นทางเทคนิค, แต่มีสัญญาณเตือนที่สำคัญหลายประการ, และมีความเสี่ยงสูงที่จะเปลี่ยนเป็นขาลง.
กลยุทธ์การเทรด (Trading Strategies):
-
Day Trade (15m):
- กลยุทธ์หลัก: Short Selling เท่านั้น. ความเสี่ยงสูงมาก.
- เงื่อนไข: รอการ Rebound (การดีดตัวขึ้นชั่วคราว) ไปยังแนวต้าน (เช่น EMA ใน TF 15m, หรือบริเวณ $68,000). จากนั้น, รอสัญญาณ Bearish ที่ชัดเจน (เช่น Bearish Engulfing, Evening Star, หรือการ Breakout ของ Rebound นั้นลงมา).
- Stop Loss: เหนือ Swing High ล่าสุดของการ Rebound อย่างเคร่งครัด.
- Take Profit: แนวรับทางจิตวิทยา ($60,000), หรือต่ำกว่านั้น ($58,000, $56,000). ไม่ควรถือยาว.
- คำเตือน: ห้ามสวนเทรนด์ (ห้าม Buy) โดยเด็ดขาด. ตลาดมีความผันผวนสูงมาก.
-
Swing Trade (4H):
- กลยุทธ์หลัก: Wait and See (รอดู). ยังไม่มีสัญญาณให้ Buy.
- เงื่อนไข: รอให้ราคาลงไปทดสอบแนวรับสำคัญ (EMA 200 ที่ประมาณ $60,000, หรือ $58,000). จากนั้น, ต้องเห็นสัญญาณการกลับตัวที่เป็น Bullish ที่ชัดเจนและแข็งแกร่ง (เช่น Bullish Engulfing, Hammer, Morning Star, พร้อม Volume สูง) จึงจะพิจารณาเข้า Buy.
- Stop Loss: ต่ำกว่าแนวรับที่เข้าซื้อ.
- Take Profit: แนวต้าน ($68,000 - $69,000), หรือสูงกว่านั้นหากแนวโน้มเปลี่ยน.
- คำเตือน: การเข้าซื้อที่แนวรับโดยไม่มีสัญญาณกลับตัวมีความเสี่ยงสูง.
-
Position Trade (Day):
- กลยุทธ์หลัก: Wait and See (รอดู). ยังเร็วเกินไปที่จะ Buy.
- เงื่อนไข: รอให้ราคาลงไปทดสอบแนวรับที่แข็งแกร่งมาก ($50,000 - $52,000, ซึ่งเป็น EMA 200 และ Demand Zone). จากนั้น, ต้องเห็นสัญญาณการกลับตัวที่เป็น Bullish ที่ชัดเจนมาก จึงจะพิจารณาเข้าซื้อ. หรือ, รอให้โครงสร้างตลาดเปลี่ยนเป็นขาขึ้นอีกครั้ง (สร้าง Higher High).
- Stop Loss: ต่ำกว่าแนวรับที่เข้าซื้อ.
- Take Profit: ขึ้นอยู่กับสัญญาณการกลับตัวและเป้าหมายระยะยาว.
- คำเตือน: การเข้าซื้อตอนนี้มีความเสี่ยงสูงมากที่ราคาจะลงต่อ.
สิ่งที่ต้องระวัง (Important Considerations):
- ความผันผวน (Volatility): ความผันผวนของ BTC สูงมากในช่วงนี้. การเคลื่อนไหวของราคาอาจรุนแรงและรวดเร็ว.
- ข่าว (News): ติดตามข่าวสารและเหตุการณ์ที่อาจส่งผลกระทบต่อตลาดคริปโตเคอร์เรนซี.
- False Breakouts/Dead Cat Bounces: ระวังการดีดตัวขึ้นชั่วคราว (Dead Cat Bounce) ก่อนที่จะร่วงลงต่อ.
- Risk Management: การบริหารความเสี่ยงเป็นสิ่งสำคัญที่สุด. ใช้ Stop Loss เสมอ. อย่า Overtrade (เทรดเกินตัว).
สรุป (Conclusion):
Bitcoin กำลังอยู่ในช่วงการปรับฐานที่รุนแรง. แนวโน้มระยะสั้น (15m) เป็นขาลงอย่างชัดเจน. แนวโน้มระยะกลาง (4H) ยืนยันการปรับฐาน. แนวโน้มระยะยาว (Day) เริ่มอ่อนแอลงและมีสัญญาณเตือนที่สำคัญ. กลยุทธ์ที่ดีที่สุดในตอนนี้คือการ Wait and See สำหรับนักลงทุนระยะกลางและยาว, ส่วน Day Trader ที่รับความเสี่ยงได้สูงมาก อาจพิจารณา Short Sell ตามเงื่อนไขที่เข้มงวด. การ Buy ในตอนนี้มีความเสี่ยงสูงมาก.
Disclaimer: การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว, ไม่ถือเป็นคำแนะนำในการลงทุน. ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ.
-
-
@ d360efec:14907b5f
2025-03-10 12:26:42$OKX: $BTC $USDT.P
https://www.tradingview.com/chart/F8mO3cIx/
Situation Overview:
Bitcoin (BTC) experienced a sharp sell-off on March 10, 2025. This movement, especially evident in the 15-minute timeframe, broke several key support levels and confirms a clear short-term downtrend. While the Daily timeframe has not completely broken its long-term uptrend structure, it shows significant warning signs, including a Bearish Engulfing candlestick, negative Money Flow, and weakened Trend Strength. This analysis will consider all timeframes in detail to find strategies appropriate for the current very high risk.
Technical Analysis:
-
15-Minute Timeframe (15m) - Focus:
- SMC (Smart Money Concepts): Price broke down through all key support levels with strong momentum. Continuous Lower Lows (LL) are being formed. This indicates complete dominance of selling pressure.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (Resistance): $68,000 (former support, now key resistance), $69,000, $70,000.
- Sellside Liquidity (Support): No strong support in the near term. Possible psychological support at $60,000, and below that at $58,000, $56,000. Identifying clear support in this condition is difficult.
- Money Flow: Strongly negative (Strong Outflow). This is one of the most important confirmations of selling pressure.
- EMA (Exponential Moving Average): EMA 50 (yellow) is clearly below EMA 200 (white), and the distance between the two lines is widening. This is a strong Bearish signal.
- Trend Strength: Thick red cloud, and a clear Sell signal.
- Chart Pattern: No chart patterns indicating a Bullish reversal.
- 15m Summary: The downtrend is clear and very strong.
-
4-Hour Timeframe (4H):
- SMC: Price is in a correction phase. It has broken below the EMA 50 and is testing the EMA 200.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (Resistance): $68,000 - $69,000.
- Sellside Liquidity (Support): EMA 200 (approximately $60,000), $58,000 (previous Demand Zone).
- Money Flow: Negative (Outflow).
- EMA: EMA 50 (yellow) crossed below EMA 200 (white) (Death Cross). This is a Bearish signal in the medium term.
- Trend Strength: Red cloud indicating a medium-term downtrend.
- Chart Pattern: No clear Bullish reversal pattern.
- 4H Summary: Confirms the medium-term correction. The trend is down.
-
Daily Timeframe (Day):
- SMC: The long-term uptrend structure is not yet broken (it has not made a Lower Low below $59,000 - $60,000). However, the latest candlestick is a Bearish Engulfing, which is a significant reversal signal, and the speed and strength of the drop indicate increasing weakness.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (Resistance): $72,000, $75,000 (All-Time High).
- Sellside Liquidity (Support): $60,000 (key psychological support, previous Low), $58,000, and $50,000 - $52,000 (EMA 200 and Demand Zone).
- Money Flow: Starting to turn negative (Outflow). This is a significant change and a serious warning sign.
- EMA: EMA 50 (yellow) is still above EMA 200 (white), but the distance between the lines is narrowing.
- Trend Strength: The green cloud is starting to thin, and there was a Neutral signal (previously), and now there is a Sell signal.
- Chart Pattern: Bearish Engulfing - a strong bearish reversal signal.
- Day Summary: The long-term trend is technically still up, but there are several significant warning signs, and there is a high risk of a trend change.
Trading Strategies:
-
Day Trade (15m):
- Main Strategy: Short Selling only. Very high risk.
- Conditions: Wait for a Rebound (temporary upward bounce) to resistance levels (such as the EMA on the 15m TF, or around $68,000). Then, wait for a clear Bearish signal (e.g., Bearish Engulfing, Evening Star, or a breakout of that Rebound to the downside).
- Stop Loss: Strictly above the most recent Swing High of the Rebound.
- Take Profit: Psychological support ($60,000), or lower ($58,000, $56,000). Do not hold for long.
- Warning: Do not counter-trend (do not Buy). The market is extremely volatile.
-
Swing Trade (4H):
- Main Strategy: Wait and See. There are no Buy signals.
- Conditions: Wait for the price to test key support levels (EMA 200 at around $60,000, or $58,000). Then, a clear and strong Bullish reversal signal must be seen (e.g., Bullish Engulfing, Hammer, Morning Star, with high volume) before considering a Buy.
- Stop Loss: Below the support level where you entered.
- Take Profit: Resistance levels ($68,000 - $69,000), or higher if the trend changes.
- Warning: Buying at support without a reversal signal is high risk.
-
Position Trade (Day):
- Main Strategy: Wait and See. It's too early to Buy.
- Conditions: Wait for the price to test very strong support levels ($50,000 - $52,000, which is the EMA 200 and a Demand Zone). Then, a very clear Bullish reversal signal must be seen before considering a Buy. Alternatively, wait for the market structure to turn bullish again (create a Higher High).
- Stop Loss: Below the support level where you entered.
- Take Profit: Depends on the reversal signal and long-term targets.
- Warning: Buying now has a very high risk of further downside.
Important Considerations:
- Volatility: BTC's volatility is extremely high during this period. Price movements can be severe and rapid.
- News: Monitor news and events that could affect the cryptocurrency market.
- False Breakouts/Dead Cat Bounces: Beware of temporary upward bounces (Dead Cat Bounces) before further declines.
- Risk Management: Risk management is paramount. Always use Stop Losses. Do not Overtrade (trade beyond your risk tolerance).
In summary, the Daily chart confirms that the recent sharp drop in BTC is not just a minor blip. It's a significant event that has weakened the uptrend and increased the likelihood of a deeper correction. Caution is paramount.
-
-
@ 4857600b:30b502f4
2025-03-10 12:09:35At this point, we should be arresting, not firing, any FBI employee who delays, destroys, or withholds information on the Epstein case. There is ZERO explanation I will accept for redacting anything for “national security” reasons. A lot of Trump supporters are losing patience with Pam Bondi. I will give her the benefit of the doubt for now since the corruption within the whole security/intelligence apparatus of our country runs deep. However, let’s not forget that probably Trump’s biggest mistakes in his first term involved picking weak and easily corruptible (or blackmailable) officials. It seemed every month a formerly-loyal person did a complete 180 degree turn and did everything they could to screw him over, regardless of the betrayal’s effect on the country or whatever principles that person claimed to have. I think he’s fixed his screening process, but since we’re talking about the FBI, we know they have the power to dig up any dirt or blackmail material available, or just make it up. In the Epstein case, it’s probably better to go after Bondi than give up a treasure trove of blackmail material against the long list of members on his client list.
-
@ 7d33ba57:1b82db35
2025-03-10 11:22:03Roque Nublo & Pico de las Nieves Gran Canaria’s Highest Points
🏞 Roque Nublo (1,813m)
One of the island’s most famous landmarks, this volcanic rock formation offers incredible views after a short (1.5 km) hike. It was once a sacred site for the indigenous Guanche people. On clear days, you can see Mount Teide in Tenerife.⛰ Pico de las Nieves (1,949m) – The Highest Point
A short drive from Roque Nublo, this is Gran Canaria’s highest peak. You’ll get 360° views of the island, including Roque Nublo and the deep ravines of the Caldera de Tejeda. Unlike Roque Nublo, you can drive almost to the top.
🌤 Best Time to Visit:
- Sunrise or sunset for stunning views.
- Bring layers—it can be chilly at higher altitudes.🚗 Getting There:
- Roque Nublo requires a short hike.
- Pico de las Nieves is accessible by car. -
@ 57d1a264:69f1fee1
2025-03-10 10:04:32A presentation by @jsonbits Jason Hester for the 40th CSUN Assistive Technology Conference -
March 10, 2025 – March 14, 2025
originally posted at https://stacker.news/items/908947
-
@ 57d1a264:69f1fee1
2025-03-10 09:35:17Here I am posting a document that presents the Business Model Canvas (BMC) created for “Nasi Goreng Semrawut”, a Micro, Small, and Medium Enterprise (MSME) in Kendal, Central Java, Indonesia. BMC is a strategic management and entrepreneurship tool. It allows us to visualize, assess, and modify business models. It is crucial to understand the core components of a business and how they interact. As a UX researcher, analyzing and understanding the business model is critical to aligning user needs with business goals. This BMC provides the basis for identifying opportunities to improve user experience and drive business growth.
I have broken it down into sections and grouped them carefully and I have clear reasons from a UX perspective why the groupings I have chosen are these points. I explain the UX side more fully on my portfolio website.
For my reflections on this project analyzing the Business Model Canvas of "Nasi Goreng Semrawut" through a UX lens reveals several opportunities for improvement. By focusing on user needs and behaviors, I can enhance the customer experience, streamline operations, and drive business growth. This analysis highlights the importance of integrating UX research into the strategic planning process. By understanding the business model, I can ensure that our UX efforts are aligned with business goals and deliver tangible results.
My website Portfolio👇 https://octoporto.framer.website/blog/business-model-canvas-nasi-goreng-semrawut
Link Project : https://www.figma.com/proto/5LZkoc2uSJ1RTaur4cDVCM/Business-Model-Canvas-Sego-Goreng-Semrawut?page-id=0%3A1&node-id=38-117&viewport=-170%2C587%2C0.16&t=8gt9qNV5G267Xq8B-1&scaling=scale-down&content-scaling=fixed&starting-point-node-id=20%3A3
mirorred from dribbble
originally posted at https://stacker.news/items/908920
-
@ 95cb4330:96db706c
2025-03-10 08:42:59Introduction: Why Small Actions Lead to Huge Success
Most people underestimate the power of small, consistent improvements over time. They chase quick wins and expect success overnight. But the truth is, the most successful people and businesses in the world rely on the power of compounding effort—making small, incremental improvements daily that scale into massive long-term results.
This principle, known as The Law of Compounding Effort, is embraced by Jeff Bezos, Sam Altman, and Peter Thiel. Instead of looking for instant success, they focus on building systems, habits, and investments that grow exponentially over time.
In this article, we’ll break down:
✔ What the Law of Compounding Effort is and why it works
✔ Examples from top entrepreneurs who applied it to build billion-dollar empires
✔ How you can use it to improve your own work, habits, and investments
What Is the Law of Compounding Effort?
The Law of Compounding Effort is based on a simple but powerful idea:
Small, consistent improvements in thinking, decision-making, and execution create exponential results over time.
Instead of trying to make huge leaps all at once, improving just 1% per day leads to massive growth over months and years.
Mathematically, it looks like this:
- If you improve 1% every day for a year → You’ll be 37x better than where you started.
- If you get 1% worse every day → You’ll lose almost all your progress.
This is why daily habits and small decisions matter more than big, one-time actions.
Examples of the Law of Compounding Effort in Action
1. Jeff Bezos and Amazon: Reinvesting for Long-Term Growth
Jeff Bezos didn’t build Amazon into a trillion-dollar empire overnight. He compounded small improvements for decades by:
- Reinvesting Amazon’s profits into better infrastructure, logistics, and technology.
- Focusing on customer obsession, constantly improving Amazon’s efficiency and convenience.
- Scaling AWS (Amazon Web Services) from a side project into the backbone of the internet, generating billions in profit.
Bezos was never focused on short-term profits—he compounded effort and reinvested resources into long-term scalability.
📌 Lesson: Instead of chasing quick money, build systems that get better and stronger over time.
2. Sam Altman and AI: Betting on the Future
Sam Altman, CEO of OpenAI, has built his career by compounding small breakthroughs in artificial intelligence:
- He funded AI research when others ignored it, knowing that small improvements would snowball.
- He scaled OpenAI’s models like GPT-4, refining them step by step to become industry-changing technologies.
- He invests in AI infrastructure, believing that today’s progress will lead to exponential advancements in the future.
Altman’s entire strategy is about playing the long game—knowing that AI’s compounding improvements will change everything.
📌 Lesson: The biggest future opportunities come from compounding small improvements today.
3. Peter Thiel and Facebook: The Power of Network Effects
Peter Thiel was one of the first investors in Facebook, putting in $500,000 when few people saw its potential.
Why? He understood the compounding nature of network effects:
- As more users joined Facebook, its value increased exponentially.
- More advertisers came, bringing more revenue and funding more innovation.
- Facebook scaled from a small project to a multi-billion-dollar company.
Thiel’s investment in Facebook was a classic compounding success—he saw the long-term potential, not just the short-term returns.
📌 Lesson: The best investments grow stronger over time—look for compounding effects in business, investing, and technology.
How to Apply the Law of Compounding Effort in Your Own Life
You don’t need to be a billionaire to apply this principle—compounding effort works in every area of life.
1. Improve 1% Every Day
If you get slightly better every day, the results compound into massive progress.
Ask yourself:
- What’s one skill I can improve today?
- How can I refine my decision-making?
- What process can I optimize for long-term growth?📌 Example: Investing → Instead of trying to "get rich quick," invest consistently, reinvest profits, and let your portfolio compound over years.
2. Focus on Scalable Actions
Not all work compounds. Focus on efforts that scale and grow over time, like:
✅ Building a brand → Content, reputation, and trust compound.
✅ Investing in automation → Systems that work for you 24/7.
✅ Compounding relationships → The right connections open exponential opportunities.📌 Example: Business Growth → Instead of doing one-time sales, build a repeatable system that grows without constant effort.
3. Avoid Negative Compounding
Just as small positive actions build up over time, bad habits and decisions compound negatively.
Ask yourself:
- Am I wasting time on low-value tasks?
- Am I making impulsive decisions instead of strategic ones?
- Am I neglecting habits that will improve my long-term growth?📌 Example: Health & Productivity → Small unhealthy choices compound into major problems later. But small positive habits compound into a strong body and sharp mind.
Final Thoughts: Small Wins, Big Results
The Law of Compounding Effort proves that success isn’t about big, flashy moves—it’s about consistent, focused progress over time.
🔹 Jeff Bezos built Amazon by reinvesting and compounding small efficiencies.
🔹 Sam Altman bet on AI, knowing that small breakthroughs would add up.
🔹 Peter Thiel invested in Facebook, recognizing its compounding network effects.And you can do the same.
💡 Action Step: Find one habit, process, or investment you can improve by 1% today. Stick with it, and let it compound over time.
Resources to Learn More
- 📖 The Power of Compounding – Farnam Street
- 🎥 Jeff Bezos on Long-Term Thinking – Harvard Business Review
- 📰 Sam Altman on Compounding Success – Blog
🚀 The best results don’t come from one big move. They come from small, consistent improvements over time. Start compounding today!
-
@ 95cb4330:96db706c
2025-03-10 08:34:05Introduction: The Power of the Few
Most people assume that effort and results follow a linear relationship—that every action contributes equally to success. However, reality follows a very different pattern: Power Laws.
The Power Law Principle, championed by thinkers like Peter Thiel and Jeff Bezos, states that a small number of key efforts drive the majority of outcomes. Instead of distributing energy evenly across tasks, investments, or decisions, the smartest individuals and companies focus on the few areas that truly matter—the ones that yield outsized returns.
In this article, we’ll explore:
✔ What the Power Law is and why it matters
✔ Examples of Power Laws in business and investing
✔ How to apply the Power Law Principle in your own work and life
What Is the Power Law?
The Power Law is a mathematical relationship where a small input leads to a disproportionately large output. It is the foundation of Pareto’s Principle (the 80/20 rule), which states that:
- 80% of results come from 20% of efforts
- 80% of revenue comes from 20% of customers
- 80% of profits come from 20% of investments
But Power Laws go even further. In reality, it’s not just 80/20—it’s often 90/10 or even 99/1.
In venture capital, for example, a handful of companies (like Facebook, Google, and Tesla) account for nearly all of the industry’s profits. If you had invested in 100 startups, it wouldn’t be the case that 20 of them returned good money—it would be that just one or two produced nearly all the profits, while the rest failed or broke even.
Power Laws appear everywhere in business, investing, technology, and even personal development.
Examples of the Power Law in Action
1. Venture Capital: Peter Thiel and Facebook
Peter Thiel, co-founder of PayPal and early investor in Facebook, built his fortune using Power Law thinking.
- In 2004, he invested $500,000 in Facebook—a small startup most people ignored.
- That one investment turned into billions of dollars, while dozens of other startups he backed failed.
- One bet made up for every loss—and much more.
Thiel himself says:
"We don’t live in a normal world. We live under a Power Law."
Venture capitalists don’t succeed by investing in 100 decent companies—they succeed by finding the 1 company that dominates an industry.
2. Jeff Bezos and AWS: One Decision That Built a Trillion-Dollar Empire
Amazon started as an online bookstore, but one decision made Amazon a tech giant: Amazon Web Services (AWS).
- In the early 2000s, Jeff Bezos realized that cloud computing could be the foundation of the internet.
- He shifted massive resources into AWS, even though it had nothing to do with selling books.
- AWS became the backbone of the internet, powering companies like Netflix, Airbnb, and even government agencies.
- Today, AWS generates over 60% of Amazon’s total profits, funding Amazon’s entire e-commerce business.
Without one key decision, Amazon might still just be an online retailer. But by following the Power Law, Bezos doubled down on what truly mattered—and that made all the difference.
3. Sam Altman and AI: Betting on the Future
Sam Altman, CEO of OpenAI, has focused his entire career on one high-upside opportunity: Artificial Intelligence (AI).
- Instead of investing in many different technologies, he put all his energy into AI.
- He believes AI will reshape every industry, making it one of the highest-upside bets in history.
- OpenAI’s ChatGPT is now one of the fastest-growing software products ever, with 100 million+ users in a matter of months.
Altman’s approach? Find the area with the biggest possible impact—and go all in.
How to Apply the Power Law Principle in Your Life
Most people waste time by treating all tasks equally. But if you want real success, you need to identify and focus on the few things that actually matter.
1. Identify the 20% That Drives 80% of Results
Ask yourself:
- What 20% of my efforts produce 80% of my success?
- Which investments or decisions have the biggest impact?
- What skills, relationships, or habits generate the highest returns?
2. Cut the Noise—Eliminate Low-Impact Tasks
Once you identify the high-impact areas, cut distractions mercilessly.
- In investing: Stop spreading your money across 20 mediocre bets. Instead, find the 1-2 asymmetric opportunities that could change everything.
- In business: Instead of launching 10 different products, focus on the one product that dominates your industry.
- In personal development: Instead of learning random skills, master one rare, valuable skill that sets you apart.
3. Double Down on What Works
Once you find what works, go all in.
- If a stock, business, or skill is compounding massively, allocate more resources to it.
- If an investment is performing exponentially better than others, increase your stake.
- If one product or strategy is dominating the market, scale it up aggressively.
Most people diversify too much because they’re afraid of missing out. But true success comes from concentrating on what actually works.
Final Thoughts: The Few That Matter
The Power Law is one of the most important concepts in business, investing, and life. The majority of success comes from a small number of actions—so the key is to:
✅ Find the few things that truly drive results
✅ Eliminate distractions and low-impact efforts
✅ Double down on what works and scale it massivelyThe difference between mediocrity and massive success is simple:
Most people work hard on everything. The smartest people work hard on the right things.
Start thinking in Power Laws—and you’ll see exponential results. 🚀
Resources to Learn More
- 📖 Understanding Power Laws – Farnam Street
- 🎥 Peter Thiel on Power Laws in Investing – NFX
- 📰 How to Apply Power Laws in Business – Medium
Action Step: 🔥 Look at your current projects, tasks, or investments. What is the 20% that drives 80% of your success? Cut the rest, and focus more on what truly matters.
Let me know what you think—drop a comment below! 🚀
-
@ b8af284d:f82c91dd
2025-03-10 08:28:07Liebe Abonnenten,
800 Milliarden Euro will die EU ausgeben, um die Ukraine und den Kontinent in ein “stählernes Stachelschwein” zu verwandeln. Deutschland selbst will künftig Verteidigungsausgaben aus der Schuldenbremse ausnehmen, was nichts anderes als eine unbegrenzte Kreditlinie für das Militär bedeutet. Hinzu kommt ein “Sondervermögen” in Höhe von 500 Milliarden Euro für Infrastruktur. Das klingt nach einem Spartopf, den man für schwere Zeiten angelegt hat. Es soll die Tatsache verschleiern, dass es sich dabei um Schulden handelt. Der vermutlich baldige Kanzler Friedrich Merz bricht damit sein Wahlversprechen, die Schuldenbremse einzuhalten. Beschließen soll das Paket noch ein abgewählter Bundestag, da im neuen wohl die Mehrheit fehlt.
Womit also ist zu rechnen, wenn demnächst fast eine Billion frisch gedruckte Euro in Drohnen, Panzer und Raketen investiert werden?
Das beste Beispiel der jüngeren Geschichte ist China: 2009 legte die chinesische Regierung das bisher größte Infrastrukturprojekt der Welt in Höhe von 440 Milliarden Euro auf. Finanziert wurde es durch günstige Kredite, die vor allem an Staatsunternehmen vergeben wurden. Nachdem die Welt nach der in den USA ausgelösten Immobilienkrise 2008 in die Rezession gerutscht war, „rettete“ dieses Paket die globale Konjunktur. China hatte zu diesem Zeitpunkt großen Bedarf an Flughäfen, Straßen und vor allem Zügen. Das Paket war riskant: Schier unbegrenztes Geld, das begrenzten Waren hinterherjagt, führt zu Inflation. Billige Kredite führen meist dazu, dass Unternehmen nicht mehr effizient wirtschaften, und Schuldenberge vor sich her wälzen.
Allerdings wurde das Geld in Produktivität investiert. Denn wenn Menschen und Waren einfacher reisen können, nimmt die Geschäftstätigkeit zu: Arbeitnehmer werden mobiler, Unternehmen konkurrenzfähiger, die Preise sinken. Die Investitionen lohnen sich also, weil sie zu mehr Wirtschaftswachstum führen. Vereinfacht gesagt: Die Schulden können zurückgezahlt werden, und am Ende bleibt noch mehr übrig. In diesem Fall führen Schulden nicht zu Inflation: Durch die gesteigerte Produktivität stehen jetzt sogar mehr Waren der Geldmenge gegenüber.
15 Jahre später kämpft die zweitgrößte Volkswirtschaft zwar noch immer mit den Problemen, die aus diesem Paket resultieren - die Immobilienkrise ist eine indirekte Folge davon. Trotzdem war das Programm ein Erfolg: die Städte, Flughäfen und vor allem Zugstrecken führten zu einer höheren wirtschaftlichen Aktivität oder Produktivität. China ist heute ein wesentlich moderneres Land als vor dem Paket, und verfügt über modernste und größte Netz aus Hochgeschwindigkeitszügen der Welt. Neue Schulden können positiv sein - wenn das Geld produktiv investiert wird.
Auch in Europa lassen sich mit dem Geld-Paket zunächst mehrere Probleme auf einmal lösen: Deutschland ist noch immer ein Industriestandort mit hohen Produktionskapazitäten. Werke der Auto- und Zulieferindustrie können theoretisch zur Waffenproduktion umfunktioniert werden. Immer noch besser als sie stillzulegen oder an die Chinesen zu verkaufen, werden viele Kommentatoren schreiben.
Allein in der deutschen Automobil-Zulieferindustrie sind im vergangenen Jahr über 19000 Arbeitsplätze verloren gegangen. Viele von den Entlassenen können nun Arbeit in der Rüstungsindustrie finden. Oder wie Hans Christoph Atzpodien, Hauptgeschäftsführer des Bundesverbandes der Deutschen Sicherheits- und Verteidigungsindustrie in der WirtschaftsWoche sagt:
„Das Motto muss lauten: Autos zu Rüstung! Anstatt einen volkswirtschaftlichen Schaden durch den Niedergang der Auto-Konjunktur zu beklagen, sollten wir versuchen, Produktionseinrichtungen und vor allem Fachkräfte aus dem Automobilsektor möglichst verträglich in den Defence-Bereich zu überführen“
Immerhin: ein großer Teil des Geldes soll auch in Infrastrukturprojekte fließen: Brücken, Bahn, Internetausbau. Deutschland, und damit Europa, wird in den kommenden Monaten also eine große Party feiern, die über die Tatsache hinwegtäuschen wird, dass man einen dummen Krieg verloren hat. In den kommenden Monaten werden sich Verbände und Organisationen um das Geld reißen. Das Geld wird ein auch kollektiv-psychologisches Ventil sein, um das eigene Versagen bei Corona, Klima und Ukraine vergessen zu machen.
Es gibt allerdings einen wesentlichen Unterschied zum chinesischen Stimulus-Paket 2009: Rüstungsgüter sind im Gegensatz zu Zugstrecken totes Kapital. Eine neue Drohne oder Panzer führt nicht zu mehr Produktivität, im Gegenteil: Kommen sie zum Einsatz, zerstören sie Brücken, Häuser, Straßen und töten Menschen. Die Produktivität sinkt also. Im besten Fall kann Militärgerät herumstehen und vor sich hin rosten. Auch dann aber ist es „totes Kapital“, das nichts zur Produktivität beiträgt. Kommt es zum Einsatz, stehen der nun verringerten Warenmenge eine noch größere Geldmenge gegenüber. Die Inflation steigt.
Schleichende Militarisierung
Auch gesellschaftlich wird das Paket mit seinem Blanko-Scheck für die Verteidigungsindustrie viel verändern: Es kommt zu einer „Eichung“ der Gesellschaft, eine kollektive Abscheu des gemeinsamen Feindes. Scharfmacher, eigentlich mittelmäßiger Akademiker und Bürokraten, wie Carlo Masala und Claudia Major werden eine noch größere Rolle im öffentlichen Diskurs spielen und die Talkshows dominieren, die von einer immer älter werdenden deutschen Bevölkerung geglotzt werden. Abweichende Meinungen auf Online-Plattformen zensiert, unter dem Vorwand, die Demokratie sei in Gefahr:
Da die Rüstungsindustrie dann eine wichtigere Rolle für die Gesamtwirtschaft spielt, wird ihr Einfluss auf die Politik in Form von Lobbyisten und Verbänden zunehmen. Politiker merken schnell, dass sie von der medialen Aufmerksamkeitsökonomie nach oben gespült werden, wenn sie immer radikalere Forderungen stellen. So empfahl der ehemalige Außenminister Joschka Fischer die Woche die Wiedereinführung der Wehrpflicht für Männer und Frauen. “Star-Ökonomin” Isabella Weber will die Kriegswirtschaft mitplanen:
\ Der Kontinent wird sich langsam wandeln von einem „Friedensprojekt“ zu einem „metallenen Stachelschwein“, ergo Kriegsprojekt, denn ohne dämonisierten Feind funktioniert das Programm nicht. Der Ton wird rauer, autoritärer, und die Meinungsfreiheit weiter eingeschränkt werden. Die seit 2020 eingeführten Werkzeuge zur soften Propaganda („kognitive Kriegsführung”) werden verfeinert und ausgebaut werden, sodass weiterhin 80 Prozent der Bevölkerung alle noch so antihumanen Maßnahmen gutheißen werden.
Und dann?
Wie Julian Assange einmal sagte: “Das Ziel ist kein erfolgreicher Krieg. Das Ziel ist ein endloser Krieg.” Der Konflikt muss weitergehen, ewig schwelen oder ein neuer gefunden werden, da sonst ein Teil der Wirtschaftsleistung kollabiert.
Nach ein, zwei oder auch erst drei Jahren, werden erste Probleme sichtbar. Die Party endet, der Kater setzt langsam ein. Die Finanzierung an den Kapitalmärkten wird für Deutschland immer kostspieliger. Der Schuldendienst wird einen größeren Teil des Haushalts einnehmen. Die Bürger müssen dies mitfinanzieren. Der voraussichtlich neue Bundeskanzler Friedrich Merz sprach bereits von der „Mobilisierung der deutschen Sparguthaben“.
\ Was im Ersten Weltkrieg „Kriegsanleihen“ hieß, wird einen schickeren Namen bekommen wie „olivgrüne Bonds“. You name it. Alternativ lässt sich ein Verteidigungs-Soli einführen, oder das Kindergeld streichen, wie kürzlich Ifo-Chef Clemens Fuest forderte.
Was kann man tun? Auf BlingBling geht es um konkrete Tipps, welche Anlagen von dieser Entwicklung profitieren werden. Außerdem geht es um die “Strategische Bitcoin Reserve”, die am Donnerstag beschlossen wurde.
-
@ da0b9bc3:4e30a4a9
2025-03-10 07:34:20Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/908874
-
@ fb8a5c6f:58ec79bd
2025-03-10 00:39:53I work in the film industry, and I absolutely love making movies—it’s where my heart is. I’m also passionate about bitcoin. For me, it’s not just about the thrill of "number go up," but a deeper realization over the past 12 years: inflation is a theft of our time and energy. Whether I’m writing or revising a script or thinking about the world we live in, I believe our lives shouldn’t get progressively more expensive just by existing.\ \ A few months ago, I saw a viral video that drove this home. A young guy shared how a month’s worth of groceries cost him $126 back in 2022. When he hit the "re-order" button for the same items in the summer of 2024—just two years later—it was $414. That’s staggering. People are working harder than ever, pouring their souls into their craft yet they can’t figure out why they’re not getting ahead. Inflation is a big part of the answer.\ \ It’s frustrating because it didn’t always used to be this way. Today, the Federal Reserve and the U.S. Treasury keep printing money out of thin air, devaluing what we earn and making life more expensive year after year. I understood the problem for a while, but it wasn’t until I discovered bitcoin that I found a solution. A fixed and finite currency. \ \ There will only ever be 21 million.\ \ Naturally, when you grasp what bitcoin is, you want to share it with the people you care about. I’ve been fortunate—my friends get it, and they’re doing great. My family, though? Not so much. Yesterday, my aunt suggested I talk to them as a group instead of one-on-one, like I’d been trying, so they could ask questions and discuss it together. I thought it was interesting idea, but money is such a personal topic. We all have to find our own path to understanding it, and bringing it up with family can get tricky—almost like pitching a script they’re not ready to hear.\ \ So, what did I do instead? I'm sharing these thoughts online and started a Youtube channel. Go figure. Don't judge too harshly though as it's a work in progress! 🫡\ \ It’s not so different from storytelling through film—just another way to share what matters.\ \ I don’t know how often I’ll write long form posts or make videos about bitcoin, but if I can help even one person pinpoint the problem and discover bitcoin along the way, I believe the world gets a little better. Bit by bit, person by person. Just like how a good movie can inspire, maybe this can too.
Fix the money, fix the world.\ ∞ / 21 million
-
@ f3873798:24b3f2f3
2025-03-10 00:32:44Recentemente, assisti a um vídeo que me fez refletir profundamente sobre o impacto da linguagem na hora de vender. No vídeo, uma jovem relatava sua experiência ao presenciar um vendedor de amendoim em uma agência dos Correios. O local estava cheio, as pessoas aguardavam impacientes na fila e, em meio a esse cenário, um homem humilde tentava vender seu produto. Mas sua abordagem não era estratégica; ao invés de destacar os benefícios do amendoim, ele suplicava para que alguém o ajudasse comprando. O resultado? Ninguém se interessou.
A jovem observou que o problema não era o produto, mas a forma como ele estava sendo oferecido. Afinal, muitas das pessoas ali estavam há horas esperando e perto do horário do almoço – o amendoim poderia ser um ótimo tira-gosto. No entanto, como a comunicação do vendedor vinha carregada de desespero, ele afastava os clientes ao invés de atraí-los. Esse vídeo me tocou profundamente.
No dia seguinte, ao sair para comemorar meu aniversário, vi um menino vendendo balas na rua, sob o sol forte. Assim como no caso do amendoim, percebi que as pessoas ao redor não se interessavam por seu produto. Ao se aproximar do carro, resolvi comprar dois pacotes. Mais do que ajudar, queria que aquele pequeno gesto servisse como incentivo para que ele continuasse acreditando no seu negócio.
Essa experiência me fez refletir ainda mais sobre o poder da comunicação em vendas. Muitas vezes, não é o produto que está errado, mas sim a forma como o vendedor o apresenta. Quando transmitimos confiança e mostramos o valor do que vendemos, despertamos o interesse genuíno dos clientes.
Como a Linguagem Impacta as Vendas?
1. O Poder da Abordagem Positiva
Em vez de pedir por ajuda, é importante destacar os benefícios do produto. No caso do amendoim, o vendedor poderia ter dito algo como: "Que tal um petisco delicioso enquanto espera? Um amendoim fresquinho para matar a fome até o almoço!"
2. A Emoção na Medida Certa
Expressar emoção é essencial, mas sem parecer desesperado. Os clientes devem sentir que estão adquirindo algo de valor, não apenas ajudando o vendedor.
3. Conheça Seu Público
Entender o contexto é fundamental. Se as pessoas estavam com fome e impacientes, uma abordagem mais objetiva e focada no benefício do produto poderia gerar mais vendas.
4. Autoconfiança e Postura
Falar com firmeza e segurança transmite credibilidade. O vendedor precisa acreditar no próprio produto antes de convencer o cliente a comprá-lo.
Conclusão
Vender é mais do que apenas oferecer um produto – é uma arte que envolve comunicação, percepção e estratégia. Pequenos ajustes na abordagem podem transformar completamente os resultados. Se o vendedor de amendoim tivesse apresentado seu produto de outra maneira, talvez tivesse vendido tudo rapidamente. Da mesma forma, se cada um de nós aprender a se comunicar melhor em nossas próprias áreas, poderemos alcançar muito mais sucesso.
E você? Já passou por uma experiência parecida?
-
@ 8d34bd24:414be32b
2025-03-10 00:16:01The Bible tells believers repeatedly that we are to share the gospel, make disciples, speak the truth, etc. We are to be His witnesses. The reason we don’t go straight to heaven when we are saved is that God has a purpose for our lives and that is to be a light drawing people to Him.
“…but you will receive power when the Holy Spirit has come upon you; and you shall be My witnesses both in Jerusalem, and in all Judea and Samaria, and even to the remotest part of the earth.” (Acts 1:8)
In order to be His witness, we have to know Him and know His word. When we don’t know His word, we can be misled and/or mislead others. We will fail in our mission to be witnesses if we don’t regularly study the Bible and spend time in prayer with our God.
As a result, we are no longer to be children, tossed here and there by waves and carried about by every wind of doctrine, by the trickery of men, by craftiness in deceitful scheming; but speaking the truth in love, we are to grow up in all aspects into Him who is the head, even Christ, from whom the whole body, being fitted and held together by what every joint supplies, according to the proper working of each individual part, causes the growth of the body for the building up of itself in love. (Ephesians 4:4-16) {emphasis mine}
In addition to knowing Him and His word, we need to be bold and unashamed.
Therefore do not be ashamed of the testimony of our Lord or of me His prisoner, but join with me in suffering for the gospel according to the power of God, who has saved us and called us with a holy calling, not according to our works, but according to His own purpose and grace which was granted us in Christ Jesus from all eternity, but now has been revealed by the appearing of our Savior Christ Jesus, who abolished death and brought life and immortality to light through the gospel, (2 Timothy 1:8-10) {emphasis mine}
We were called according to His purpose. His purpose was known before the creation of the world. We are not saved by works, but if we are saved, works should naturally proceed from the power of the Holy Spirit within us, as well as the thankfulness we should have because of what Jesus did for us.
The key point of our witness is obedience. We are a tool of God. We are to faithfully share the Gospel and the truth in God’s word, but we are not held accountable for the result of this witness. The results are due to God’s mercy and power and not due to anything we do.
But you shall speak My words to them whether they listen or not, for they are rebellious.
“Now you, son of man, listen to what I am speaking to you; do not be rebellious like that rebellious house. Open your mouth and eat what I am giving you.” (Ezekiel 2:7-8) {emphasis mine}
When we witness, some will listen and some will not. Some will accept Jesus with joy and some will reject Him in anger. That is not our concern. God calls whom He will and without His calling, nobody comes to Him.
And they took offense at Him. But Jesus said to them, “A prophet is not without honor except in his hometown and in his own household.” (Matthew 13:57)
One thing I’ve noticed is that the hardest people to witness to are family (not counting kids, but especially parents and siblings) and other people who have known us for a long time. They see what we were and not what we now are. There is baggage that can make for awkward dynamics. As someone once said to me, “It is hard to teach anyone or convince anyone who changed your diaper.”
I started with the Acts 1:8, “… be My witnesses both in Jerusalem, and in all Judea and Samaria, and even to the remotest part of the earth.” This is like saying “be My witnesses in my hometown, my state, my country, and even to the remotest part of the earth.” Our witness starts at home, then our community, and works it way out. Everyone can witness at home. We can all witness in our community as we go about our daily actions. It is important to have Christians that go to the “remotest part of the earth,” especially to unreached people groups, but that isn’t where most of us are sent. Most of us are called to witness to those around us daily.
For you are not being sent to a people of unintelligible speech or difficult language, but to the house of Israel, nor to many peoples of unintelligible speech or difficult language, whose words you cannot understand. But I have sent you to them who should listen to you; (Ezekiel 3:5-6) {emphasis mine}
God empowers some to be international missionaries, but He calls every Christian to be a life missionary. Sometimes this may just be living a life for Jesus that stands out in the culture. Sometimes this may be giving an in-depth treatise on the Gospel and the Bible. It will look differently in different seasons of life and on different days, but it should be a regular part of our life.
As we build relationships with people and show that we care about them, this usually gives us the opportunity to share with them why our lives look different. It demonstrates why we treat others well, why we are loving, and why we have joy, even when our circumstances don’t seem like they should lead to joy. Then when they ask why we are different, we can have the opportunity to tell why we have this joy and love and morality.
but sanctify Christ as Lord in your hearts, always being ready to make a defense to everyone who asks you to give an account for the hope that is in you, yet with gentleness and reverence; (1 Peter 3:5)
Although following a person and forcing them to listen to the Gospel is not the way to draw someone to Jesus, we need to not be silent about the truth. Not being pushy doesn’t mean being silent when someone is forcing their ungodly views on us or on others. Speaking up prevents evil voices from taking control. You also might be surprised to find that others didn’t like what was being said, but were too afraid to speak up because they thought everyone agreed with the speaker. When you speak up for the truth, it can give others courage to stand on their convictions and to draw closer to Jesus, whether this means they come to salvation or just draw closer to God.
Moreover, He said to me, “Son of man, take into your heart all My words which I will speak to you and listen closely. Go to the exiles, to the sons of your people, and speak to them and tell them, whether they listen or not, ‘Thus says the Lord God.’ ” (Ezekiel 3:10-11) {emphasis mine}
We are to speak the truth in love whether they listen or not. Some will listen, hear, and come to Jesus. Some will listen and reject what is said. We are only called to obey the call. God brings the increase. To God be the glory!
May God guide us and lead us in wisdom, love, and courage so that our light shines so brightly that many unsaved come to trust in Jesus Christ our Lord and that those who know Jesus, but have not matured, may grow in their faith, knowledge, and obedience to Jesus.
Trust Jesus
-
@ 4925ea33:025410d8
2025-03-09 22:56:19O que é melasma?
Segundo a Sociedade Brasileira de Dermatologia, o melasma é uma condição caracterizada pelo surgimento de manchas escuras na pele, mais comumente no rosto. No entanto, também pode ocorrer em outras áreas do corpo, como braços, pescoço e colo.
Essas manchas possuem tonalidade acastanhada, formato irregular e bem definido, sendo geralmente simétricas (iguais nos dois lados do rosto).
A causa exata do melasma ainda não é totalmente conhecida. De acordo com o Hospital Albert Einstein, essa condição está relacionada à superprodução de melanina (pigmento que dá cor à pele) ou à dilatação excessiva dos vasos sanguíneos, o que desencadeia inflamação em regiões específicas do rosto.
Os melasmas podem ser classificados em três tipos:
Epidérmico – Atinge a camada mais superficial da pele.
Dérmico – Ocorre nas camadas mais profundas.
Misto – Atinge tanto as camadas superficiais quanto as profundas.
A classificação do melasma é fundamental para a escolha do tratamento adequado.
Tratamento do melasma
O tratamento convencional envolve o uso de agentes clareadores, peelings químicos e cuidados preventivos, como a aplicação diária de protetor solar. Embora esses métodos sejam eficazes, podem ser agressivos para peles sensíveis. É aí que a aromaterapia surge como uma opção complementar, oferecendo uma abordagem mais natural e holística.
Como a Aromaterapia pode ajudar no tratamento do melasma?
A aromaterapia considera o corpo como um todo, tratando não apenas as manchas, mas também possíveis causas subjacentes, como desequilíbrios hormonais e inflamações. Além disso, os óleos essenciais possuem propriedades despigmentantes, cicatrizantes e regeneradoras da pele.
Óleos essenciais recomendados para melasma
Óleo essencial de Gerânio – Regula os hormônios femininos e auxilia no clareamento de manchas relacionadas ao envelhecimento.
Óleo essencial de Vetiver – Favorece a regeneração celular, ajudando a reduzir manchas e prevenir o ressecamento.
Óleo essencial de Copaíba – Possui ação anti-inflamatória e auxilia no controle da oleosidade.
Óleo essencial de Tea Tree (Melaleuca) – Ajuda a prevenir espinhas e melhora manchas causadas pela acne.
Óleo essencial de Lavanda– Com propriedades cicatrizantes e anti-inflamatórias, acelera a regeneração da pele.
Óleo essencial de Olíbano – Rico em antioxidantes, combate os sinais de envelhecimento e melhora a textura da pele.
Cuidados ao usar a aromaterapia no melasma
A aplicação direta de óleos essenciais na pele exige cuidado. Como o melasma pode estar associado a processos inflamatórios, o uso inadequado dos óleos pode piorar a condição ou até causar danos irreversíveis.
Dicas de segurança:
Sempre dilua os óleos essenciais em um óleo vegetal (como rosa mosqueta ou jojoba) antes da aplicação tópica.
Evite óleos essenciais cítricos (como limão e laranja) durante o dia, pois são fotossensíveis e podem manchar ainda mais a pele.
Consulte um aromaterapeuta ou dermatologista para um tratamento personalizado.
Se você gostou deste artigo, compartilhe com quem precisa saber mais sobre o poder da aromaterapia! E se tiver dúvidas, deixe seu comentário.
-
@ 732c6a62:42003da2
2025-03-09 22:36:26Não são recentes as táticas da esquerda de tentar reprimir intelectualmente seus opositores na base do deboche, da ironia, do desprezo e do boicote à credibilidade. Até Marx usava ironia para chamar os críticos de "burgueses iludidos". A diferença é que, no século XXI, trocaram o manifesto comunista por threads no Twitter e a dialética por memes de mau gosto.
A Falácia da Superioridade Moral
O debate sobre o "pobre de direita" no Brasil é contaminado por uma premissa tácita da esquerda: a ideia de que classes baixas só podem ter consciência política se aderirem a pautas progressistas. Quem ousa divergir é tratado como "traidor de classe", "manipulado", "ignorante", ou até vítimas de deboches como alguma pessoa com um qi em temperatura ambiente repetir diversas vezes "não é possível que ainda exista pobre de direita", "nunca vou entender pobre de direita", ou "pobre de direita é muito burro, rico eu até entendo", como se o autor dessas frases fosse o paladino dos mais oprimidos e pobres. Esse discurso, porém, não resiste a uma análise empírica, histórica ou sociológica.
Contexto Histórico: A Esquerda e o Mito do "Voto Consciente"
A noção de que o pobre deve votar na esquerda por "interesse de classe" é herança do marxismo ortodoxo, que via a política como mero reflexo da posição econômica. No entanto, a realidade é mais complexa:
- Dados do Latinobarómetro (2022): 41% dos brasileiros de baixa renda (até 2 salários mínimos) apoiam redução de impostos e maior liberdade econômica — pautas tradicionalmente associadas à direita.
- Pesquisa IPEC (2023): 58% dos pobres brasileiros priorizam "segurança pública" como principal demanda, acima de "distribuição de renda".
Esses números não são acidentais. Refletem uma mudança estrutural: o pobre moderno não é mais o "operário industrial" do século XX, mas um empreendedor informal, motorista de app, ou microempresário — figuras que valorizam autonomia e rejeitam paternalismo estatal. Eles dizem não entender o pobre de direita e que nunca vai entendê-los, mas o fato é que não entendem porque nunca conversaram com um sem fazer cara de psicólogo de posto de saúde. Sua "preocupação" é só uma máscara para esconder o desprezo por quem ousa pensar diferente do seu manual de "oprimido ideal".
Se ainda não entenderam:
Direita ≠ rico: Tem gente que trabalha 12h/dia e vota em liberal porque quer ser dono do próprio negócio, não pra pagar mais taxação pra você postar meme no Twitter.
Acham que são o Sherlock Holmes da pobreza: o palpite de que "o pobre é manipulado" é tão raso quanto sua compreensão de economia básica.
A Psicologia por Trás do Voto Conservador nas Periferias
A esquerda atribui o voto pobre em direita a "falta de educação" ou "manipulação midiática". Essa tese é não apenas elitista, mas cientificamente falsa:
Análise Psicológica Básica (para você que se acha o Paulo Freire):
- Síndrome do Branco Salvador: Acha que o pobre é uma criatura tão frágil que precisa de você pra pensar. Spoiler: ele não precisa.
- Viés da Superioridade Moral: "Se você é pobre e não concorda comigo, você é burro". Parabéns, recriou a escravidão intelectual.
- Efeito Dunning-Kruger: Não sabe o que é CLT, mas dá palpite sobre reforma trabalhista.- Estudo da Universidade de São Paulo (USP, 2021): Entre moradores de favelas, 63% associam políticas de segurança dura (como "bandido bom é bandido morto") à proteção de seus negócios e famílias. Para eles, a esquerda é "branda demais" com o crime.
- Pesquisa FGV (2020): 71% dos trabalhadores informais rejeitam aumentos de impostos, mesmo que para financiar programas sociais. Motivo: já sofrem com a burocracia estatal para legalizar seus negócios.
Esses dados revelam uma racionalidade prática: o pobre avalia políticas pelo impacto imediato em sua vida, não por abstrações ideológicas. Enquanto a esquerda fala em "reforma estrutural" e tenta importar discursos estrangeiros para debate, por exemplo, o tema irrelevante do pronome neutro, ele quer resolver problemas como:
- Violência (que afeta seu comércio);
- Impostos (que consomem até 40% do lucro de um camelô);
- Burocracia (que impede a legalização de sua barraca de pastel).
Religião, Valores e a Hipocrisia do "Ateísmo de Redes Sociais"
A esquerda subestima o papel da religião na formação política das classes baixas. No Brasil, 76% dos evangélicos são pobres (Datafolha, 2023), e suas igrejas promovem valores como:
- Família tradicional (contra pautas progressistas como ideologia de gênero em escolas);
- Auto-responsabilidade (ênfase em "trabalho duro" em vez de assistencialismo).Exemplo Concreto:
Nas favelas de São Paulo, pastores evangélicos são frequentemente eleitos a cargos locais com plataformas anticrime e pró-mercado. Para seus eleitores, a esquerda urbana (que defende descriminalização de drogas e críticas à polícia) representa uma ameaça ao seu estilo de vida.
A Esquerda e seu Desprezo pela Autonomia do Pobre
O cerne do debate é a incapacidade da esquerda de aceitar que o pobre possa ser autônomo. Algumas evidências:
O Caso dos Empreendedores Informais
- Segundo o IBGE (2023), 40% dos trabalhadores brasileiros estão na informalidade. Muitos veem o Estado como obstáculo, não aliado. Políticas de direita (como simplificação tributária) são mais atraentes para eles que o Bolsa Família.
A Ascensão do Conservadorismo Periférico
- Pessoas assim tem um pensamento simples. Sua mensagem: "Queremos empreender, não depender de político."
A Rejeição ao "Vitimismo"
- Pesquisa Atlas Intel (2022): 68% dos pobres brasileiros rejeitam o termo "vítima da sociedade". Preferem ser vistos como "lutadores".
A projeção freudiana "o pobre é burro porque eu sou inteligente"
O deboche esquerdista esconde um complexo de inferioridade disfarçado de superioridade moral. É a Síndrome do Salvador em sua forma mais patética:
- Passo 1: Assume-se que o pobre é um ser desprovido de agência.
- Passo 2: Qualquer desvio da narrativa é atribuído a "manipulação da elite".
- Passo 3: Quem critica o processo é chamado de "fascista".Exemplo Prático:
Quando uma empregada doméstica diz que prefere o livre mercado a programas sociais, a esquerda não pergunta "por quê?" — ela grita "lavagem cerebral!". A ironia? Essa mesma esquerda defende a autonomia feminina, exceto quando a mulher é pobre e pensa diferente.Dados Globais: O Fenômeno Não é Brasileiro
A ideia de que "pobre de direita" é uma anomalia é desmentida por evidências internacionais:
- Estados Unidos: 38% dos eleitores com renda abaixo de US$ 30k/ano votaram em Trump em 2020 (Pew Research). Motivos principais: conservadorismo social e rejeição a impostos. A esquerda: "vítimas da falsa consciência". Mais um detalhe: na última eleição de 2024, grande parte da classe "artística" milionária dos Estados Unidos, figuras conhecidas, promoveram em peso a Kamala Harris, do Partido Democrata. Percebe como a esquerda atual é a personificaçãoda burguesia e de só pensar na própria barriga?
- Argentina: Javier Milei, libertário radical, quando candidato, tinha forte apoio nas villas miseria (favelas). Seu lema — "O estado é um parasita" — ressoa entre quem sofria com inflação de 211% ao ano.
- Índia: O partido BJP (direita nacionalista) domina entre os pobres rurais, que associam a esquerda a elites urbanas desconectadas de suas necessidades.
A história que a esquerda tenta apagar: pobres de direita existem desde sempre
A esquerda age como se o "pobre de direita" fosse uma invenção recente do MBL, mas a realidade é que classes baixas conservadoras são regra, não exceção, na história mundial:
- Revolução Francesa (1789): Camponeses apoiaram a monarquia contra os jacobinos urbanos que queriam "libertá-los".
- Brasil Imperial: Escravos libertos que viraram pequenos proprietários rurais rejeitavam o abolicionismo radical — queriam integração, não utopia.Tradução:
Quando o pobre não segue o script, a esquerda inventa teorias conspiratórias.
A Hipocrisia da Esquerda Urbana e Universitária
Enquanto acusa o pobre de direita de "alienado", a esquerda brasileira é dominada por uma elite desconectada da realidade periférica:
- Perfil Socioeconômico: 82% dos filiados ao PSOL têm ensino superior completo (TSE, 2023). Apenas 6% moram em bairros periféricos.
- Prioridades Descoladas: Enquanto o pobre debate segurança e custo de vida, a esquerda pauta discussões como "linguagem não-binária em editais públicos" — tema irrelevante para quem luta contra o desemprego. Os grandes teóricos comunistas se reviram no túmulo quando veem o que a esquerda se tornou: não debatem os reais problemas do Brasil, e sim sobre suas próprias emoções.
"A esquerda brasileira trocou o operário pelo influencer progressista. O pobre virou um personagem de campanha, não um interlocutor real."
A diversidade de pensamento que a esquerda não suporta
A esquerda prega diversidade — desde que você seja diverso dentro de um checklist pré-aprovado. Pobre LGBTQ+? Herói. Pobre evangélico? Fascista. Pobre que abre MEI? "Peão do capitalismo". A realidade é que favelas e periferias são microcosmos de pluralidade ideológica, algo que assusta quem quer reduzir seres humanos a estereótipos.
Respostas aos Argumentos Esquerdistas (e Por que Falham)
"O pobre de direita é manipulado pela mídia!"
- Contradição: Se a mídia tradicional é dominada por elites (como alegam), por que grandes veículos são abertamente progressistas? A Record (evangélica) é exceção, não regra.
Contradição Central:
Como explicar que, segundo o Banco Mundial (2023), países com maior liberdade econômica (ex.: Chile, Polônia) reduziram a pobreza extrema em 60% nas últimas décadas, enquanto modelos estatizantes (ex.: Venezuela, Argentina com o governo peronista) afundaram na miséria? Simples: a esquerda prefere culpar o "neoliberalismo" a admitir que o pobre com o mínimo de consciência quer emprego, não esmola.Dado que Machuca:
- 71% das mulheres da periferia rejeitam o feminismo radical, associando-o a "prioridades distantes da realidade" (Instituto Locomotiva, 2023)."Ele vota contra os próprios interesses!"
- Falácia: Pressupõe que a esquerda define o que é o "interesse do pobre". Para um pai de família na Cidade de Deus, ter a boca de fogo fechada pode ser mais urgente que um aumento de 10% no Bolsa Família.
O pobre de direita não é uma anomalia. É o produto natural de um mundo complexo onde seres humanos têm aspirações, medos e valores diversos. Enquanto a esquerda insiste em tratá-lo como um projeto fracassado, ele está ocupado:
- Trabalhando para não depender do governo.
- Escolhendo religiões que dão sentido à sua vida.
- Rejeitando pautas identitárias que não resolvem o custo do gás de cozinha."É falta de educação política!"
- Ironia: Nos países nórdicos (modelo da esquerda), as classes baixas são as mais conservadoras. Educação não correlaciona com progressismo.
Por que o Debuste Precisa Acabar
A insistência em descredibilizar o pobre de direita revela um projeto de poder fracassado. A esquerda, ao substituir diálogo por deboche, perdeu a capacidade de representar quem mais precisaria dela. Enquanto isso, a direita — nem sempre por virtude, mas por pragmatismo — capturou o descontentamento de milhões com o status quo.
O pobre de direita existe porque ele não precisa da permissão do rico de esquerda para pensar. A incapacidade de entender isso só prova que a esquerda é a nova aristocracia.
Último Dado: Nas eleições de 2022, Tarcísio de Freitas (direita) venceu em 72% das favelas de São Paulo. O motivo? Seu discurso anti-burocracia e pró-microempreendedor.
A mensagem é clara: o pobre não é um projeto ideológico. É um agente político autônomo — e quem não entender isso continuará perdendo eleições.
A esquerda elitista não odeia o pobre de direita por ele ser "irracional". Odeia porque ele desafia o monopólio moral que ela construiu sobre a miséria alheia. Enquanto isso, o pobre segue sua vida, ignorando os berros de quem acha que sabem mais da sua vida que ele mesmo.
Pergunta Retórica (Para Incomodar):
Se a esquerda é tão sábia, por que não usa essa sabedoria para entender que pobre também cansa de ser tratado como cachorro que late no ritmo errado?
Fontes Citadas:
- Latinobarómetro (2022)
- IPEC (2023)
- USP (2021): "Segurança Pública e Percepções nas Favelas Cariocas"
- FGV (2020): "Informalidade e Tributação no Brasil"
- Datafolha (2023): "Perfil Religioso do Eleitorado Brasileiro"
- Atlas Intel (2022): "Autopercepção das Classes Baixas"
- Pew Research (2020): "Voting Patterns by Income in the U.S."
- TSE (2023): "Perfil Socioeconômico dos Filiados Partidários"
Leitura Recomendada para Esquerdistas:
- "Fome de Poder: Por que o Pobre Brasileiro Abandonou a Esquerda" (Fernando Schüller, 2023)
- "A Revolução dos Conservadores: Religião e Política nas Periferias" (Juliano Spyer, 2021)
- "Direita e Esquerda: Razões e Paixões" (Demétrio Magnoli, 2019) -
@ 878dff7c:037d18bc
2025-03-09 20:49:43Undocumented Commands Found in ESP32 Bluetooth Chip Used by Over a Billion Devices
Summary:
Researchers from Tarlogic Security have discovered 29 undocumented vendor-specific commands in the ESP32 microcontroller, manufactured by Espressif and widely used in over a billion IoT devices as of 2023. These hidden commands enable low-level control over Bluetooth functions, including memory manipulation (reading/writing RAM and Flash), MAC address spoofing (device impersonation), and LMP/LLCP packet injection. Such capabilities could allow attackers to spoof trusted devices, access unauthorized data, pivot to other networked devices, and establish long-term persistence. The issue, now tracked as CVE-2025-27840, was presented at RootedCON in Madrid. Espressif has not publicly documented these commands, raising concerns about potential exploitation.:contentReference[oaicite:0]{index=0}
Sources: BleepingComputer - 8 March 2025, Tarlogic - 6 March 2025, NVD - 8 March 2025
Fresh Flood Crisis Hits Gold Coast and Brisbane
Summary:
Brisbane's south, Ipswich, Logan, and the Gold Coast have been severely affected by Cyclone Alfred, resulting in significant flooding. An emergency alert advised residents in flood-prone areas to stay inside and seek higher ground. The cyclone, initially thought to have weakened, surprised many with destructive 100km/h winds. Brisbane experienced severe flash flooding, impacting homes, streets, and public transport. Heavy rainfall is anticipated to continue, with predictions of up to 500mm in the next 48 hours. While some schools and public services are resuming, many areas remain critically affected by power outages and infrastructure damage. Premier David Crisafulli emphasized the importance of safety and recovery efforts, urging continued caution.
Sources: The Courier-Mail - 10 March 2025, News.com.au - 10 March 2025
Thousands Without Power as Storm Alfred Lashes Queensland
Summary:
Tens of thousands of Australians in Queensland were left without power as the downgraded Tropical Cyclone Alfred brought heavy rains, damaging winds, and flooding. The Gold Coast was the hardest hit, with over 112,000 outages, while a total of approximately 316,540 people in southeast Queensland were affected. Despite preparations, the storm's severe conditions also impacted New South Wales, prompting significant efforts and responses from local and federal authorities. Prime Minister Anthony Albanese emphasized the serious flood risks in affected areas. The Bureau of Meteorology forecasted ongoing heavy rains and winds. Brisbane Airport reopened but warned of potential disruptions, and decisions regarding the reopening of about 1,000 schools affected by the weather were pending. The community spirit remained strong despite the adverse conditions. On Saturday, an individual died in northern New South Wales floodwaters, and a collision involving military vehicles resulted in injuries to several officers.
Sources: Reuters - 10 March 2025, AP News - 9 March 2025
Concerns Over Potential Advertising Bans by Minority Governments
Summary:
Australia's political landscape is shifting as disillusioned voters increasingly support independents and minor parties. This trend could lead to a minority Labor or Coalition government after the next federal election, creating potential uncertainties for businesses. Independent parties are advocating for broad advertising bans on industries such as gambling, alcohol, and unhealthy food, which could significantly impact the economy. These bans, especially on food and beverages, could devastate manufacturers and farmers, exacerbating the ongoing cost-of-living crisis. Current consumer research indicates that Australians prefer health education and subsidies for nutritious foods over further advertising prohibitions. Evidence from global instances suggests that such advertising bans have not effectively reduced obesity rates. In this volatile political and economic situation, pragmatic leadership is essential to balance public health and economic sustainability.
Sources: The Australian - 10 March 2025
Proposed Freeze on Tobacco Tax to Recover Government Funds
Summary:
A report from Tulipwood Economics for the Australian Association of Convenience Stores (AACS) suggests that freezing tobacco excise, allowing regulated vapes, and targeting illicit sellers could secure up to $18.6 billion in revenue for the Australian Federal Government. This revenue could fund essential public services such as schools, social housing, and hospitals. The report criticizes the current approach of frequent tax hikes on tobacco, noting that higher taxes have driven smokers towards the black market, increasing criminal activity and reducing government revenue. The opposition Coalition's plan to reintroduce regulated vapes and consider freezing tobacco taxes is praised for addressing the crisis. Master Grocers Australia also supports a tax freeze, emphasizing that the government's current policy inadvertently supports criminal enterprises. The call is for a significant policy rethink to ensure smokers use legal, taxed products, thereby benefiting Australia's economy and public health.
Sources: Herald Sun - 10 March 2025
U.S. Pentagon Nominee Questions Submarine Sales to Australia Amid Taiwan Tensions
Summary:
Elbridge Colby, nominated by President Trump for undersecretary of defense for policy, has raised concerns about the AUKUS agreement, which involves selling U.S. Virginia-class nuclear-powered submarines to Australia. Colby emphasizes the strategic importance of these submarines for defending Taiwan and highlights potential risks to U.S. forces if they are sold to Australia, citing production and deployment challenges. He suggests that Australia invest in other military capabilities instead.
Sources: The Guardian - 9 March 2025
Australia Faces Imminent U.S. Tariffs on Steel and Aluminium
Summary:
The United States is set to impose tariffs on Australian steel and aluminium starting Wednesday. Prime Minister Anthony Albanese is currently prioritizing the aftermath of Cyclone Alfred, while Trade Minister Don Farrell has not advanced plans to visit the U.S. to discuss the tariffs. Influential advisers to President Trump are urging against tariff exemptions for Australia, and there are concerns that negative comments from Australian officials may influence the U.S. stance on exemptions.
Sources: The Australian - 10 March 2025
Rising Refinery Emissions Raise Health Concerns in Geelong
Summary:
Residents in North Geelong, particularly David Dillon, have raised concerns over increasing sulfur dioxide emissions from the local Viva Energy refinery. Emissions have risen from 1,685,843 kg in 2017 to 2,528,475 kg in 2024. Health statistics indicate higher rates of lung conditions and heart disease in nearby communities. While Viva and the EPA assert that emissions are within legal limits, residents call for increased monitoring and scrutiny.
Sources: Herald Sun - 6th March 2025
Urgent Recall of Google Pixel 4a Smartphones Due to Fire Risk
Summary:
The Australian Competition and Consumer Commission (ACCC) has issued an urgent recall for Google Pixel 4a smartphones due to a potential fire hazard associated with battery overheating. Users are advised to ensure their devices have received the latest firmware update and may be eligible for refunds.
Sources: news.com.au - March 9, 2025
Peter Dutton Vows to Declare National Anti-Semitism Emergency
Summary:
Opposition Leader Peter Dutton has pledged that, if elected, a Coalition government under his leadership will declare a national emergency on anti-Semitism in Australia. He plans to incorporate education against Jewish hatred into the national curriculum, aligning with a comprehensive strategy proposed by the Executive Council of Australian Jewry (ECAJ). The ECAJ's 15-point plan includes the creation of a counter-terrorism taskforce to address anti-Semitic threats and public awareness campaigns. While the Coalition has endorsed federal responsibilities within the plan, a response from Prime Minister Anthony Albanese is pending. The ECAJ expects both parties to clarify their positions before the upcoming election to ensure leadership on this critical issue.
Sources: The Daily Telegraph - 10 March 2025
Newspoll Indicates Potential Hung Parliament in Upcoming Election
Summary:
A recent Newspoll suggests that while support for Prime Minister Anthony Albanese has risen, it may not be sufficient for Labor to secure a majority, pointing towards a likely hung parliament in the forthcoming federal election. The Coalition currently leads Labor by seven points in primary votes; however, a majority of voters perceive the Coalition as not yet ready to govern after a single term in opposition. Both major parties may need to seek support from independents and minor parties to form a minority government. Albanese holds a slight advantage as the preferred Prime Minister, leading Peter Dutton by nine points, while Dutton's approval ratings have declined. The survey highlights public skepticism regarding the Coalition's preparedness to govern, particularly among younger and middle-aged voters, as well as women.
Sources: The Australian - 10 March 2025
Treasurer Plans to Maintain Spending Levels in Upcoming Budget
Summary:
Treasurer Jim Chalmers intends to avoid significant spending cuts or new revenue measures in the forthcoming March budget. This approach aims to fund costly election commitments and provide cost-of-living relief packages, especially in light of the financial impact of Cyclone Alfred. The government plans to maintain increased spending on health, education, and emergency management services, with no major tax reforms anticipated. This strategy is expected to be a focal point in the lead-up to the anticipated election in May.
Sources: The Australian - March 10, 2025
Social Security Payments Set to Increase from March 20
Summary:
The latest indexation of social security payments will take effect on March 20, providing financial boosts to millions of Australians. Single aged pensioners will receive an additional $4.60 per fortnight, while couples will get an extra $7, bringing their payments to $1,149 and $866.10 respectively. JobSeeker recipients will also see increases, with singles receiving an extra $3.10 and couples $2.80 per fortnight. These adjustments aim to ease cost-of-living pressures and reflect the government's commitment to strengthening the social security system.
Sources: news.com.au - March 10, 2025
-
@ 401014b3:59d5476b
2025-03-09 20:16:31Alright, football heathens, it’s March 3, 2025, and we’re wading into the NFC South like it’s a gator-infested bayou with a keg on the bank. Free agency’s a sweaty mess, the draft’s a blind grab, and this division’s always a rollercoaster of hope and hilarity. The Bucs held it down in 2024, the Falcons flirted with glory, the Saints stayed scrappy, and the Panthers… well, they tried. Let’s slap some records on this mess and see who’s got the chops to take the South. Here we go, fam—grab a sweet tea and let’s roll.
Tampa Bay Buccaneers: 10-7 – Baker’s Still Cooking
The Bucs owned the NFC South in 2024, and 2025’s looking like another hot dish. Baker Mayfield’s slinging it to Mike Evans and Chris Godwin (if he's back), while Rachaad White keeps the ground game spicy (also contingent on him coming back). That defense—Vita Vea, Calijah Kancey—is a wall when healthy. Antoine Winfield Jr. might chase a payday, and the O-line’s got holes. Still, 10-7’s the call, division champs again. Tampa’s got that pirate swagger—good luck prying the crown off ‘em.
Atlanta Falcons: 9-8 – Penix’s Big Swing
The Falcons turned heads in 2024 with Kirk Cousins, but 2025’s likely a Michael Penix Jr.’s show. The rookie’s got Bijan Robinson, Drake London, and Kyle Pitts to play with—talk about a loaded sandbox. The defense—Grady Jarrett, A.J. Terrell—holds its own, but free agency could sting. Jessie Bates III might test the market, and the secondary’s thin. 9-8’s where they land, maybe a wildcard if Penix pops off. Atlanta’s close, but not quite king yet.
New Orleans Saints: 7-10 – Carr’s Last Hurrah?
The Saints hung around in 2024, and 2025’s a gritty grind. Derek Carr’s got Chris Olave and Rashid Shaheed to sling it to, but the run game’s a question mark without Alvin Kamara’s prime juice. The defense—with stars like Cam Jordan—still fight, but age is creeping, and free agency looms. Tyrann Mathieu might dip, and the cap’s a nightmare. 7-10’s the vibe—not awful, not great. New Orleans is treading water ‘til the rebuild hits.
Carolina Panthers: 5-12 – Bryce’s Baby Steps
The Panthers were a dumpster fire in 2024, but 2025’s got a flicker. Bryce Young’s got Xavier Legette to throw to, and Chuba Hubbard’s a sneaky RB gem. The defense—Jaycee Horn, Jadeveon Clowney—shows teeth, but the O-line’s shaky, and free agency might swipe Ejiro Evero’s scheme elsewhere. 5-12’s the harsh reality—progress, not playoffs. Carolina’s climbing, but it’s a slow crawl outta the basement.
The Final Jambalaya
The NFC South in 2025 is a Tampa takeover with a Falcon tease. The Bucs (10-7) snag the title because Baker’s got that dawg in him, the Falcons (9-8) flirt with a wildcard, the Saints (7-10) scrap by, and the Panthers (5-12) lag behind. Free agency’s the curveball—lose a stud, you’re sunk; keep ‘em, you’re sizzling. Hit me on X when I botch this, but this is my NFC South sermon. Let’s ride, degenerates.
-
@ c1e9ab3a:9cb56b43
2025-03-09 20:13:44Introduction
Since the mid-1990s, American media has fractured into two distinct and increasingly isolated ecosystems, each with its own Overton window of acceptable discourse. Once upon a time, Americans of different political leanings shared a common set of facts, even if they interpreted them differently. Today, they don’t even agree on what the facts are—or who has the authority to define them.
This divide stems from a deeper philosophical rift in how each side determines truth and legitimacy. The institutional left derives its authority from the expert class—academics, think tanks, scientific consensus, and mainstream media. The populist right, on the other hand, finds its authority in traditional belief systems—religion, historical precedent, and what many call "common sense." As these two moral and epistemological frameworks drift further apart, the result is not just political division but the emergence of two separate cultural nations sharing the same geographic space.
The Battle of Epistemologies: Experts vs. Tradition
The left-leaning camp sees scientific consensus, peer-reviewed research, and institutional expertise as the gold standard of truth. Universities, media organizations, and policy think tanks function as arbiters of knowledge, shaping the moral and political beliefs of those who trust them. From this perspective, governance should be guided by data-driven decisions, often favoring progressive change and bureaucratic administration over democratic populism.
The right-leaning camp is skeptical of these institutions, viewing them as ideologically captured and detached from real-world concerns. Instead, they look to religion, historical wisdom, and traditional social structures as more reliable sources of truth. To them, the "expert class" is not an impartial source of knowledge but a self-reinforcing elite that justifies its own power while dismissing dissenters as uneducated or morally deficient.
This fundamental disagreement over the source of moral and factual authority means that political debates today are rarely about policy alone. They are battles over legitimacy itself. One side sees resistance to climate policies as "anti-science," while the other sees aggressive climate mandates as an elite power grab. One side views traditional gender roles as oppressive, while the other sees rapid changes in gender norms as unnatural and destabilizing. Each group believes the other is not just wrong, but dangerous.
The Consequences of Non-Overlapping Overton Windows
As these worldviews diverge, so do their respective Overton windows—the range of ideas considered acceptable for public discourse. There is little overlap left. What is considered self-evident truth in one camp is often seen as heresy or misinformation in the other. The result is:
- Epistemic Closure – Each side has its own trusted media sources, and cross-exposure is minimal. The left dismisses right-wing media as conspiracy-driven, while the right views mainstream media as corrupt propaganda. Both believe the other is being systematically misled.
- Moralization of Politics – Since truth itself is contested, policy debates become existential battles. Disagreements over issues like immigration, education, or healthcare are no longer just about governance but about moral purity versus moral corruption.
- Cultural and Political Balkanization – Without a shared understanding of reality, compromise becomes impossible. Americans increasingly consume separate news, live in ideologically homogeneous communities, and even speak different political languages.
Conclusion: Two Nations on One Land
A country can survive disagreements, but can it survive when its people no longer share a common source of truth? Historically, such deep societal fractures have led to secession, authoritarianism, or violent conflict. The United States has managed to avoid these extremes so far, but the trendline is clear: as long as each camp continues reinforcing its own epistemology while rejecting the other's as illegitimate, the divide will only grow.
The question is no longer whether America is divided—it is whether these two cultures can continue to coexist under a single political system. Can anything bridge the gap between institutional authority and traditional wisdom? Or are we witnessing the slow but inevitable unraveling of a once-unified nation into two separate moral and epistemic realities?
-
@ 06639a38:655f8f71
2025-03-09 19:54:07FOSDEM
I do know about the presence of this conference for many years, but I never attended it (and it's just around the corner for me coming from the south of The Netherlands). Attending FOSDEM with Nostr was quite a no-brainer to me. FOSDEM has the perfect tech-savy audience who will understand the protocol pretty quick. Our main goal would be to explain Nostr as a protocol and what new kind of applications can be build with it (and why we need it). During Bitcoin Amsterdam 2024 I proposed the idea for applying with a Nostr stand at FOSDEM '25 to @npub1l77twp5l02jadkcjn6eeulv2j7y5vmf9tf3hhtq7h7rp0vzhgpzqz0swft and @npub1hz5alqscpp8yjrvgsdp2n4ygkl8slvstrgvmjca7e45w6644ew7sewtysa.
Jurjen and I created the application on October 29 2024. Without any expectations as no one knew what kind of policy they have. As a result we were really excited when we heard that our submission was approved (16 November 2024). Two weeks later we also proposed a main talk about Nostr (1 december 2024) and again we very surpised it was accepted (10 January 2025)!
Now it was time for us to work out all of the plans we had:
- Design and print promotional items
- Flyers
- Stickers
- NIP-01 folder
- Banners
- Gather all the equipment we need to demo Nostr stuff at the stand
- Book accomodations
- Prepare a keynote
- Start a Geyser fundraiser to cover all the expenses as much as possible
On the 21th of January we launched our Geyser project and with one very generous donation we already achieved our funding goal within just ONE hour! Wow!!!
Friday
In the evening Jurjen organized a Nostr fringe at the place of Commons Hub Brussels. Around 25 people joined, so that was a pleasant surpise so many showed up and shared their interest into Nostr.
Saterday
We're arrived a bit too late as the venue was already packed with a lot of people! For the first hours we had no power, so we our computer screen with the slides was not. What we saw immediately was the huge interest in stickers. Not only our Nostr stickers, but in general you can grab stickers everywhere on each stand. People at FOSDEM like stickers a lot!
We were there with five and during the whole day all of use had conversations explaining Nostr or having related discussions around social media and centralisation.
Video: https://nostrver.se/sites/default/files/2025-02/IMG_2322.mp4
Sunday
This day was less crowded than the day before so we had a bit more room to breath, relax and explore other areas of the conference.
In the afternoon it was up to Constant to give his Nostr keynote at one of the two mainstages of FOSDEM.
The recording is available here on fosdem.org and on YouTube.
All the keynotes slides can be found here.Learnings / insights
- We need to be there again next year !!!
- We had zero inconvenient moments or unreasonable debates.
- Some attendees are pretty hardcore as one of them visited the stand the second time after when he installed the Gossip client on his PostmarketOS powered phone asking how to proceed using Nostr. People at FOSDEM are not normal ;-)
- Many people do ask why Nostr is here as another social media protocol.
- Questions about the differences with other protocols are very common, mentioning ActivityPub and ATproto.
- Almost everyone knows what Mastodon and the fediverse is.
- Had some questions how private Nostr is, so this confirms that we really need the private stuff for Nostr.
- At many moments it was hard to understand each other due all the noise from other people. Especially when you're speaking not your native language.
- When talking about using a private key you get really good questions how convient it could be (or not as some really don't believe it can work for normies) used in the context of social media. As in how often you will need this key for the actions you take using a Nostr client. A topic also very well explained by Constant in the Nostr main talk.
- We had 500+ stickers, but we needed more as we ran out of them during the Sunday morning.
- We handed-out around 400-500 NIP-01 folders.
- We handed-out almost 1000 A5 flyers.
- We did almost no onboardings but that's fine. FOSDEM attendees are tech-savy and will find their own way using the Nostr with some client. We were not there telling people what they should do.
- We need more merchandise next year. There were some stands with outstanding merchandise and I'm sure Nostr can offer the same (even better!) with the many talented creatives we already have in the community.
- Having just one table with a size of 180x80 (just like any other stand) you really have to choice what to display and not. Being there with 5-6 people was just enough as we all were quite surprised with the amount of interest.
- The FOSDEM organisation asked us multiple times how things were going. Especially with the announced protests against Jack Dorsey they were curious we didn't have any inconvenient moments. We really appreciate that!
- Overall we had the feeling that we were very welcome and we had a great opportunity to introduce Nostr to a new audience.
The team 💜
- @npub1equrmqway3qxw3dkssymusxkwgwrqypfgeqx0lx9pgjam7gnj4ysaqhkj6
- @npub1l77twp5l02jadkcjn6eeulv2j7y5vmf9tf3hhtq7h7rp0vzhgpzqz0swft
- @npub1r30l8j4vmppvq8w23umcyvd3vct4zmfpfkn4c7h2h057rmlfcrmq9xt9ma
- @npub1t6jxfqz9hv0lygn9thwndekuahwyxkgvycyscjrtauuw73gd5k7sqvksrw
- @npub1rfw075gc6pc693w5v568xw4mnu7umlzpkfxmqye0cgxm7qw8tauqfck3t8
- And me ;-)
If you're curious what we have spent, please have a look at this document.
Debugging Nostr AUTH with PHP
The week after FOSDEM I spent some hours on debugging these issues:
As a result and with some help of @npub1acg6thl5psv62405rljzkj8spesceyfz2c32udakc2ak0dmvfeyse9p35c I submitted this merge request for the `sirn-se/websocket-php` package used in the Nostr-PHP library to fix connection errors on relays (WebSocket servers) which don't response with a reason when the HTTP connection is upgraded to the WebSocket protocol.
Nostr-PHP development
Next month (March) I will pick up my development on Nostr-PHP again.
- Finish up the NIP-19 integration
- Pick up the work on async and concurrent requests with websockets
- Create more examples
- Create examples using the Symfony and Laravel framework
- Take care of incoming merge requests with new features (thanks Djuri)
As of that moment I also will be publishing my weekly reports here sharing the stuff I did around Nostr.
- Design and print promotional items
-
@ 29216785:2a636a70
2025-03-09 19:36:24Just a test long-form content
-
@ 2f9f26f9:aef5bbef
2025-03-09 18:54:51When you’re thinking about sod installation, it’s easy to get caught up in the immediate results—lush, green grass that instantly transforms your yard. But have you ever considered how your choices impact the environment? Eco-friendly sod installation isn’t just a trend; it’s a necessity for those who care about sustainability. Here’s how you can achieve a beautiful lawn while minimizing your ecological footprint.
Choosing the Right Sod for Your Climate
Not all sod is created equal. The type of grass you select plays a huge role in how much water, fertilizer, and maintenance it will require. For instance, if you live in a dry region, opting for drought-resistant varieties like Bermuda grass or Buffalo grass can save thousands of gallons of water annually. On the other hand, cool-season grasses like Kentucky Bluegrass thrive in northern climates but may require more irrigation in hotter areas. Always research which sod types are native or well-adapted to your region—this small step can make a massive difference in resource conservation.
Soil Preparation: The Foundation of Success
Before laying down sod, your soil needs to be in top condition. Start by testing the soil’s pH levels; most grasses prefer a pH between 6.0 and 7.0. If the soil is too acidic or alkaline, amend it with organic compost or lime. This not only improves the soil structure but also reduces the need for synthetic fertilizers later on. A well-prepared soil bed ensures better root establishment, which means your sod will require less water and maintenance over time.
Water-Efficient Irrigation Systems
Once your sod installation is complete, watering becomes critical. But here’s the thing: overwatering is just as harmful as underwatering. Investing in a smart irrigation system with rain sensors and soil moisture sensors can help you optimize water usage. For example, rotary nozzles are excellent for delivering water evenly across the lawn, reducing runoff and evaporation. Pair this with a zoned irrigation system, and you’ll ensure that each section of your lawn gets the precise amount of water it needs. This approach not only conserves water but also prevents issues like fungal growth caused by excessive moisture.
Organic Fertilizers and Pest Control
After sod installation, it’s tempting to reach for chemical fertilizers to speed up growth. However, these products often contain harmful substances that can leach into groundwater and harm local ecosystems. Instead, opt for organic fertilizers like compost tea or fish emulsion, which provide essential nutrients without the environmental toll. Similarly, for pest control, consider natural solutions like neem oil or beneficial nematodes. These methods are safer for the environment and promote a healthier lawn in the long run.
Mulching and Mowing: Small Changes, Big Impact
Mulching isn’t just for garden beds—it can also benefit your sod. After installation, apply a thin layer of organic mulch around the edges to retain moisture and suppress weeds. When it comes to mowing, follow the “one-third rule”: never cut more than one-third of the grass blade at a time. This encourages deeper root growth and reduces stress on the grass. Additionally, leave the grass clippings on the lawn; they act as a natural fertilizer, returning nutrients to the soil.
The Role of Aeration in Eco-Friendly Lawns
Over time, soil compaction can hinder water absorption and root growth. That’s where aeration comes in. By creating small holes in the soil, you allow air, water, and nutrients to penetrate deeper, promoting healthier grass. For eco-friendly sod installation, consider using a manual core aerator or renting an electric one. This simple step can significantly reduce the need for excessive watering and fertilizing.
Rainwater Harvesting: A Sustainable Water Source
Why rely solely on municipal water when you can harness rainwater for your sod? Installing a rain barrel or a more advanced rainwater harvesting system can provide a free, sustainable water source for your lawn. This is especially useful during dry spells when water restrictions may be in place. Plus, rainwater is naturally soft and free of chemicals, making it ideal for your grass.
The Importance of Proper Drainage
Poor drainage can lead to waterlogged soil, which is detrimental to sod health. Before installation, assess your yard’s drainage patterns. If necessary, incorporate French drains or swales to direct excess water away from the lawn. Proper drainage not only prevents root rot but also ensures that water is used efficiently, reducing waste.
Eco-Friendly Tools and Equipment
The tools you use for sod installation and maintenance matter too. Opt for electric or battery-powered lawn mowers and edgers instead of gas-powered ones. These produce fewer emissions and are quieter, making them a better choice for the environment. Similarly, choose hand tools made from recycled materials whenever possible.
Long-Term Maintenance: Keeping It Green
Eco-friendly sod installation doesn’t end once the grass is laid. Regular maintenance is key to sustaining a healthy, sustainable lawn. Monitor your lawn’s health by checking for signs of stress, such as discoloration or thinning. Adjust your watering schedule based on seasonal changes, and continue to use organic products for fertilization and pest control. By staying proactive, you can enjoy a vibrant lawn without compromising your environmental values.
Final Thoughts
Eco-friendly sod installation is more than just a method—it’s a mindset. By making thoughtful choices at every step, from selecting the right sod to implementing water-saving irrigation systems, you can create a lawn that’s both beautiful and sustainable. Remember, every small action adds up, and your efforts can have a lasting impact on the planet. So, the next time you think about sod installation, think green—literally and figuratively.
-
@ b5b91959:134a187a
2025-03-09 16:41:42Weer schoolverhaal van kind uit de familie; "De **en uit de klas hebben van die mevrouw El C allemaal een code gekregen zodat ze wel op ChatGPT kunnen om alles te helpen invullen, de andere (lees: witte) leerlingen krijgen die code niet". En uiteraard is zo'n leerkracht die zo'n dingen regelt dan een fervente subsidie-slurper in de culturele sector + pvda aanhang (what else). Wanneer je dan hoort hoe een klacht over ongelijke behandeling (en soms ook racsisme) wordt behandeld door de "ons-kent-ons" bende (9/10 met sjaalte) op zo'n school kan je enkel concluderen dat het hier finaal om zeep is. Men heeft liever dat men punten gratis kan weggeven en diploma's aan copy-paste lomp volk, dan dat er nog onderwijs wordt gegeven. Let it all burn.
Weer schoolverhaal van kind uit de familie; "De *******en uit de klas hebben van die mevrouw El C***** allemaal een code gekregen zodat ze wel op ChatGPT kunnen om alles te helpen invullen, de andere (lees: witte) leerlingen krijgen die code niet".
En uiteraard is zo'n leerkracht die zo'n dingen regelt dan een fervente subsidie-slurper in de culturele sector + pvda aanhang (what else).
Wanneer je dan hoort hoe een klacht over ongelijke behandeling (en soms ook racsisme) wordt behandeld door de "ons-kent-ons" bende (9/10 met sjaalte) op zo'n school kan je enkel concluderen dat het hier finaal om zeep is.
Men heeft liever dat men punten gratis kan weggeven en diploma's aan copy-paste lomp volk, dan dat er nog onderwijs wordt gegeven.
Let it all burn.
-
@ 42342239:1d80db24
2025-03-09 15:22:43Last fall, Italian economist Mario Draghi, former head of the European Central Bank (ECB), published his 400-page report on Europe's (actually the EU's) competitiveness. Draghi's verdict was harsh: Europe is facing an "existential challenge." It's hard to disagree. While the EU is launching new regulations on plastic corks and hiding text messages from the public, Elon Musk is changing the world with groundbreaking innovations in the automotive, robotics, and space industries.
At the same time that the EU is not only preventing people from trying new things but also preventing them from even thinking about trying, Musk's space company SpaceX is capturing massive star rockets with "chopstick grips". While the EU is stuck in an ocean of meaningless bureaucratic details, Musk is engaged in a process of constant testing and improvement, reminiscent of the natural course of decentralized systems.
The EU's meager economic growth can be compared to a ticking time bomb that threatens to explode in all of our faces. Disposable incomes have increased nearly twice as much in the US compared to the EU since 2000, and this is a difference that is noticeable not only in our standard of living but also in our opportunities for leisure time. As the late economist Robert Lucas said, "Once you start thinking about growth, it's hard to think about anything else." Perhaps the best thing that can be said about the report is that its abundance of words, numbers, and images underscores how bad things are. And perhaps it has therefore become impossible for the EU's leaders to continue ignoring the union's problems.
Like giving a shark responsibility for beach safety
However, asking a former EU president to investigate and propose changes is like giving a shark responsibility for beach safety. Among other things, he proposes larger allocations for research and development, even though the EU already spends more than the US as a percentage of GDP - it's thus impossible for this to be the problem. It comes as no surprise that the proposals are about more centralization, harmonization, and streamlining - i.e., continuing in the same old tracks. While Musk seems to have an intuitive understanding of how knowledge arises through real-world experiments , what is proposed here is more of the administrative bureaucracy's preconceived five-year plans. The bureaucracy is to be given free rein, and the nations are to be pushed back - a repeat of a theme we know all too well. Centralization undermines real knowledge growth, which may explain why the EU is falling behind.
A venomous snake that is ignored
Rent-seeking is like a venomous snake that slithers through the EU's corridors, but the concept is conspicuous by its absence in Draghi's report. It is a well-known phenomenon where companies spend resources on influencing decision-makers to gain advantages instead of creating value. The EU bureaucracy has produced a total of 13,000 legislative acts since 2019 - more than four times as many as the US. How many of these have received an invisible stamp of approval from lobbyists? Economist Jeffrey Sachs has warned that American lobbying in Brussels is so dominant that it affects all decision-making in the digital economy, which may be one of the EU's biggest problems. GDPR regulations, for example, are estimated to have reduced small tech companies' profits by 15% (!).
Size is not everything
Small businesses are the invisible heroes that contribute most to productivity and employment growth. These are being suffocated by the ECB's actions and the constantly increasing and inefficient regulatory mess. The ECB's war on small banks hampers growth for small businesses because large banks prioritize large transactions. Big computers' algorithms cannot replace small banks' local knowledge. Harmful regulations and grandiose dreams lead to a loss of both knowledge and growth.
What should the end goal be?
Sweden's daily Dagens Industri's editorial page recently wrote that "Defeat is not an option" on the theme of green transition. It asked whether "free democracies or a Chinese dictatorship should lead the way." Large-scale industrial projects and plans can undoubtedly provide benefits. But it's worth questioning whether Europe should really have the same end goal as China.
During both the Renaissance and the Industrial Revolution, decentralized power structures played a crucial role. During the Renaissance, states and cities were relatively independent. Power was decentralized to princes, nobles, and merchants. The Church had an important role, but it was not as centralized as it would become. Florence, Venice, and Amsterdam could develop different scientific and artistic traditions. When one region encountered problems, other regions could continue to develop and grow, and so on. At that time - even if the concept did not exist - it seemed to be understood that the economy is a complex system of the second order. Or a computationally irreducible one, as Stephen Wolfram would have expressed it.
In the book "The Art of War," Chinese General Sun Tzu wrote that "He who chooses the battlefield first will win. He who lets his opponent choose the battlefield will lose." Instead of striving to play on China's (alleged) centralized battlefield, perhaps we Europeans should consider returning to our roots. Do away with the bureaucracy's heavy foot and give power back to the individual! Scrap the monster banks and create conditions for small local banks instead. Stop subsidizing American IT giants' data centers and give every European an AI in their own hand. Forget the five-year plans and invest in decentralized economic experiments instead. Does that sound radical?
The word "radical" comes from the Latin word for root, radix . The word used to have a positive connotation because it implied a willingness to go to the root of the problem or to return to one's roots.
More of us should dare to question the modern structures that brought us to today's sad situation. Roots are a plant's strength - without them, it cannot grow and flourish. So it is with Europe. Our continent, which was once a thriving garden where ideas and innovations bloomed, needs to return to its roots to regain its former strength. This may be exactly what is required.
Put simply: a more radical Europe.
-
@ c69b71dc:426ba763
2025-03-09 14:24:35Time Change: A Mini Jet Lag
The time change is more than just setting the clock forward or backward — it can disrupt our internal balance and lead to a range of health issues. Find out why the time change causes a mini jet lag and how you can deal with it.
Why the Time Change Throws Us Off Balance
The expected energy savings due to reduced artificial lighting demand have not been confirmed. Worse yet, the time change leads to an increase in workplace and traffic accidents, a higher risk of heart attacks, and even an increase in suicide rates. Many people struggle with the one-hour shift that happens twice a year. There is constant debate about whether to abolish it and which time should remain permanent...
Permanent Summer Time or Permanent Winter Time?
The time change triggers a mini jet lag that can last from a single day up to three weeks as the body adjusts its internal clock to the new rhythm.
Winter Time Aligns Best with Our Internal Clock
Our bodies follow the circadian rhythm, an internal clock designed for activity during daylight and rest when the sun sets.
Permanent summer time would mean longer darkness in the morning and extended daylight in the evening—this unnatural shift would completely disrupt our biological processes.The Impact of Time Change on Our Health
Our internal clock regulates essential functions such as body temperature, hormone production, the cardiovascular system, and the sleep-wake cycle. This is why the time change often leads to headaches, fatigue, drowsiness, metabolic disorders, and even severe heart rhythm disturbances. Studies show that these disruptions can increase susceptibility to illnesses and psychological disorders.
Since the light-dark cycle dictates this internal clock, prolonged exposure to artificial light after sunset can shift it. When the time suddenly changes, it causes a disruption, throwing off our natural sleep rhythm.
Sleep Resets the Body!
During the night, the body regenerates:
- The brain is flushed with cerebrospinal fluid to clear out toxins.
- The body undergoes repair, detoxification, and waste removal.
- If the alarm clock rings an hour earlier, the body is still in "night mode" and unable to complete its recovery processes!Most people already suffer from sleep disorders, whether trouble falling asleep or staying asleep. Added to this is the stress of daily life, which often depletes serotonin levels, reducing the body’s ability to produce melatonin —the sleep hormone. Blue light depletes magnesium in our body, disrupts the circadian rhythm, and interferes with melatonin production! We also know that the pineal gland’s melatonin production is impaired by fluoride found in toothpaste, water, and food!
What Can You Do About Sleep Disorders?
To regulate your sleep rhythm, you need healthy sleep hygiene:
- Minimize activity before bedtime.
- Avoid artificial light from TVs, smartphones, and e-readers.
- Ensure fresh air and a cool bedroom (around 18°C/64°F).
- Stick to consistent sleep and wake times — even on weekends!
- Reserve the bed and bedroom for sleep only — no heated discussions. - No heavy meals before bed.
- Use blue light or orange filter glasses to reduce artificial light exposure. - Air out the bedroom for 20 minutes before going to bed. - Use candlelight in the bathroom while brushing your teeth instead of turning on the harsh neon light.If these adjustments don’t help, natural remedies, supplements, and herbal teas can provide support.
Natural Sleep Aids
Some well-known natural remedies include:
- Melatonin, Tryptophan, GABA, Magnesium
- Herbs such as Hops, Lavender, Chamomile, Passionflower, Valerian and organge peal and flower.By aligning with nature’s rhythm and optimizing sleep habits, we can counteract the negative effects of the time change and restore balance to our bodies and minds.
I hope this helps you transition smoothly through this outrageous act of forcing us into "summer time" ⏰🌞
-
@ 7d33ba57:1b82db35
2025-03-09 13:55:59Old Town Las Palmas de Gran Canaria, also known as Vegueta, is a charming historic district full of colonial architecture, cobbled streets, and cultural attractions. Here are some travel tips to make the most of your visit:
Top Things to Do
- Catedral de Santa Ana & Plaza de Santa Ana
- Climb to the rooftop for panoramic views.
-
Visit the stunning Gothic-Renaissance interiors.
-
Casa de Colón (Columbus House)
-
A must-see museum about Christopher Columbus and his travels.
-
Calle de los Balcones
-
Beautiful historic street with traditional Canarian wooden balconies.
-
Museo Canario
-
Learn about the indigenous Guanche people and their history.
-
Mercado de Vegueta
-
Try fresh tropical fruits, Canarian cheeses, and local delicacies.
-
Tapas & Wine at Calle Mendizábal
- Thursday nights are best for tapas hopping!
Local Food to Try
- Papas arrugadas con mojo (wrinkled potatoes with mojo sauce)
- Gofio (a traditional Canarian flour used in dishes)
- Ropa Vieja (shredded beef and chickpea stew)
Travel Tips
- Best Time to Visit: Early morning or late afternoon to avoid crowds.
- Walking: Wear comfortable shoes—streets are cobbled!
- Public Transport: Take the Guaguas (local buses) or rent a bike.
- Safety: It's a safe area, but watch for pickpockets in crowded spots.
- Nearby Attractions: Combine with a visit to Triana, the shopping district next door.
-
@ 2e8970de:63345c7a
2025-03-09 13:11:48Over the last weeks DOGE claimed to already have saved billions of Dollars. Numbers changing everyday but the main claims were between $105 and $175b even after retracting their statements about the 3 biggest savings. But no matter how you turn it, it is absolutely not true.
Best interpretation: they mean what the total will amount to in the future. Worst interpretation: this is a complete lie.
originally posted at https://stacker.news/items/908184
-
@ 41fa852b:af7b7706
2025-03-09 13:04:02"You can't stop things like Bitcoin. It will be everywhere, and the world will have to readjust." -- John McAfee
The US creates its Bitcoin Strategic Reserve, and the UK… well, the UK remains pretty clueless.
As always, the best advice is just to stay humble and stack sats.
We have two tickets to give away for the Bitcoin Ireland conference. To enter the competition, click here to submit your entry.
Let's look at what's happening this coming week…
This week's sponsor is…
Upcoming Bitcoin Meetups
Happening this week…
-
Dundee Bitcoin: Join them on the 2nd Monday of every month from 17:30 to 20:30 PM at The Wine Press, 16 Shore Terrace, Dundee DD1 3DN. This month's meetup is on Monday, 10th March. 🍻
-
Bitcoin Nottingham: The March Bitcoin Nottingham Meetup date for your diary is Monday the 10th at 18:00, at Carlton Town Football Club. 🍻
-
Lincolnshire Bitcoin: Another one on Monday. Lincolnshire Bitcoin meets on the second Monday of each month at 19:30 in the Treaty of Commerce, Lincoln. Open to all, from OG's to newcomers.🍺
-
Glasgow Bitcoin: A place for people in and around Glasgow to discuss Bitcoin. Meetups every second Wednesday of the month. This month on the 12th. They are at The Piper Bar, 57 Cochran St, G1 1HL. 🍺
-
Bitcoin Liverpool: Bitcoin Liverpool's next meetup is on Thursday, 13th March, at 18:30 at The Railway Pub, Tithebarn Street, L2 2DT. 🍺
-
[Bitcoin Beach Bournemouth](nostr:npub1va3773umzrydk4vd0q2xsnjg8qrsym7up9j9agnzcxd8u398wulq6kpxey: Every second Thursday of the month at Chaplins Cellar Bar. 529 Christchurch Road, Boscombe, United. You'll find them in the Cogg Room at 19:30. This month it's the 13th. 🍻
-
Bitcoin Walk - Edinburgh: Every Saturday they walk around Arthur's Seat in this historic city. Join them at 12 pm to chat about all things Bitcoin and keep fit. 🚶🏽♂️🚶🏼♀️🚶🏻
-
Real Bedford - Home Game: Peter MacCormack's boys are at home this Saturday playing Northwood. Join them for a 15:00 kickoff. ⚽️
New Businesses Accepting Bitcoin
This week we have…
- Hone and Strop: Hone & Strop Barbers in Holmfirth offers top-quality cuts in a friendly setting--now with the option to pay in Bitcoin! Located at 37 Huddersfield Road, they provide expert barbering with great service (and often a complimentary beer). Book an appointment at 01484 917469 and pay with magic internet money! 💈
Upcoming Special Events
These events aren't happening next week, but they're important to add to your calendar now as tickets are selling fast.
- CheatCode 2025 - Peter McCormack hosts the CheatCode conference, following last year's success. This year, international guest speakers include Preston Pysh, Alex Gladstein, Natalie Brunell, Matthew Pines, Steve Baker, Ben Arc, and Checkmate.
Friday, April 11th, is the main conference day, followed by a huge meetup at Ledger Park for the men's Real Bedford match, and again on Sunday for the women's match. Check out the link for ticket details.
- Bitcoin Ireland Conference 2025: Bitcoin Ireland is hosting its annual Bitcoin Conference, building on the momentum of previous years. This year Bitcoin Events UK are proudly serving as a media partner to help spread the word! Enter our competition to win two free tickets (€198 value). This year's lineup of international guest speakers includes Daniel Prince, alongside notable figures like Knut Svanholm, Dinny Collins, Lawrence-Stanley and other respected voices in the Bitcoin community, offering thoughtful perspectives on the evolving Bitcoin revolution.
The main conference takes place on Saturday, May 24th, at The Green Isle Hotel in Dublin. Following the event, attendees can join a relaxed networking meetup with Ireland's Bitcoin community to continue the discussion. For ticket details, visit: www.bitcoinireland.eu.
Get Involved
- Volunteer Opportunities: Bridge2Bitcoin is actively seeking volunteers who share our passion for merchant adoption. We'd be delighted to connect if you're eager to contribute. Reach out to us on Twitter or through our website.
- Start Your Own Meetup: Interested in launching a Bitcoin meetup? We're here to support you every step of the way. We've assisted numerous UK Bitcoin meetups in getting started. Get in touch via Twitter.
- Contribute to BTCMaps: BTCMaps is a vital part of the Bitcoin ecosystem. It's a perfect project to get involved with if you're not a coder or even that technical. A great way to give back to the community. Maintain an area of the UK and keep it up-to-date.
- Telegram users: You might find our Telegram Channel another useful way to keep up-to-date with UK meetups.
- Feedback and Suggestions: We value your input! Share your ideas on how we can enhance this newsletter.
This week's sponsors are…
Get out and support the meetups where you can, visit Bitcoin Events UK for more info on each meetup and to find your closest on the interactive map.
Stay tuned for more updates next week!
Simon.
-
-
@ 2e8970de:63345c7a
2025-03-09 10:10:10https://github.com/Svensson-Lab/pro-hormone-predictor/blob/cdb283afa4255d99a401c831dfe9ddc070e15b15/FastaParser.py#L32
Stanford just found a natural alternative to Ozempic using some clever regex on the human proteome.
Instead of manually searching through proteins, their one-liner “peptide predictor” regex narrowed down promising candidates.
The calculation likely took just a few seconds.
What I find amusing here is how you'd normally think "regex" is the clickbait euphemism. But it isn't. They're literally just using regex to go through human proteins lol
originally posted at https://stacker.news/items/908130
-
@ da0b9bc3:4e30a4a9
2025-03-09 07:38:43Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/908081
-
@ c913b8e3:8704332c
2025-03-09 07:13:10The markets are returning to normal? Everything was priced for perfection. The S&P 500 gaining over 30% for two consecutive years is not normal. Maybe we go back to a normal return of 4-8% per year? But really, what even is "normal" nowadays?
Passive investing is a huge problem, but that's a rant for another day. It's certainly not normal.
The past 5-6 years have nothing to do with real investing. It has become gambling and peak idiocy. Do I seriously think I'm smarter and can pick the right stocks? Does contrarian investing always work? Why has it worked lately?
People have become slaves to algorithms, completely losing the ability to think objectively. Just a massive idiotic blob bulldozing through logic.
Even very successful people have pitched meme stocks to me - stocks already up 300-500%, without real businesses behind them. What's the upside? Seriously, what's the point? If insiders are selling, the stock has soared hundreds of percent, isn't profitable, and your info comes from Reddit or X - stop and ask yourself, are you an idiot?
The market has been about predicting where this mindless blob moves next. Sorry, I missed the train that "Rearming Europe" would become the hot narrative, making European defense stocks the next "big thing." Or German cement business. This is exorbitant. I've said it for years: the market is turning into a cryptocasino. To succeed, you have to obsessively live and breathe the next trending narrative - it requires zero skill, just madness.
Politics mirror the market’s idiocy. Mention Trump here in Finland, and people lose their minds, incapable of rational discussion or seeing the bigger picture. I've lost friendships just by suggesting peace negotiations. Finnish media pushes a singular narrative through the same old fear-mongering analysts, conveniently now riding the EU gravy train to Brussels. How ironic.
Europe
Now the narrative is shifting to Europe. Europe is great! Or is it? Finnish politicians who once opposed collective EU debt now love it because "Russia." They're even ready to seize Russian assets.
Increasing defense spending might make sense, but funding it with debt? Even Germany, the last bastion of economic sense, is piling on debt, with Poland and the rest close behind. Hard work and tough decisions are too much effort - take on more debt!
Euro stocks might rise, but why own them? Europe lacks essential resources like raw materials, energy, oil - and frankly, competent leadership. Money won't fix structural problems.
In Finland, purchasing power has regressed 15-20 years. Are you ready for another hit?
Europe is slowly becoming more like Russia: bureaucratic, corrupt, and convinced that more central planning will magically solve everything. Good luck with that.
Maybe it's time we think less about ourselves and more about building something better for our kids. Otherwise, what are we even doing?The markets are returning to normal? Everything was priced for perfection. The S&P 500 gaining over 30% for two consecutive years is not normal. Maybe we go back to a normal return of 4-8% per year? But really, what even is "normal" nowadays?
Passive investing is a huge problem, but that's a rant for another day. It's certainly not normal.
The past 5-6 years have nothing to do with real investing. It has become gambling and peak idiocy. Do I seriously think I'm smarter and can pick the right stocks? Does contrarian investing always work? Why has it worked lately?
People have become slaves to algorithms, completely losing the ability to think objectively. Just a massive idiotic blob bulldozing through logic.
Even very successful people have pitched meme stocks to me - stocks already up 300-500%, without real businesses behind them. What's the upside? Seriously, what's the point? If insiders are selling, the stock has soared hundreds of percent, isn't profitable, and your info comes from Reddit or X - stop and ask yourself, are you an idiot?
The market has been about predicting where this mindless blob moves next. Sorry, I missed the train that "Rearming Europe" would become the hot narrative, making European defense stocks the next "big thing." Or German cement business. This is exorbitant. I've said it for years: the market is turning into a cryptocasino. To succeed, you have to obsessively live and breathe the next trending narrative - it requires zero skill, just madness.
Politics mirror the market’s idiocy. Mention Trump here in Finland, and people lose their minds, incapable of rational discussion or seeing the bigger picture. I've lost friendships just by suggesting peace negotiations. Finnish media pushes a singular narrative through the same old fear-mongering analysts, conveniently now riding the EU gravy train to Brussels. How ironic.
Europe Now the narrative is shifting to Europe. Europe is great! Or is it? Finnish politicians who once opposed collective EU debt now love it because "Russia." They're even ready to seize Russian assets.
Increasing defense spending might make sense, but funding it with debt? Even Germany, the last bastion of economic sense, is piling on debt, with Poland and the rest close behind. Hard work and tough decisions are too much effort - take on more debt!
Euro stocks might rise, but why own them? Europe lacks essential resources like raw materials, energy, oil - and frankly, competent leadership. Money won't fix structural problems.
In Finland, purchasing power has regressed 15-20 years. Are you ready for another hit?
Europe is slowly becoming more like Russia: bureaucratic, corrupt, and convinced that more central planning will magically solve everything. Good luck with that.
Maybe it's time we think less about ourselves and more about building something better for our kids. Otherwise, what are we even doing?
-
@ 6e0ea5d6:0327f353
2025-03-09 01:45:29Breaking a promise is like carrying a gun without ammunition. You raise your hand, make a threat, but when the shot is expected, nothing happens.
And what is worse than a man who makes empty promises? He inspires no trust, commands no respect; he is an imposter, a farce. An unkept word is like steel that rusts: dull, without edge, without honor. And what remains of a man who has no honor? Nothing! He is a walking corpse, awaiting the moment when he will be devoured by vultures that already scent him from afar.
When you speak, every syllable must be as heavy as lead, sharp as a Sicilian blade, and as final as a fatal blow. Words are not wind; they are hammers that build or destroy empires. A man who opens his mouth without being willing to stand by every word spoken is a fool building his own ruin with bricks of falseness. And let’s be clear: a fool doesn’t last long in this world of ours. He is swallowed, crushed, and spit out like remnants by the relentless machine of life. A word is your contract with the world, and breaking that contract is signing your sentence of social death.
Made a mistake? Bene, mistakes are inevitable. Ma, ecco il punto: the difference between an honorable man and a miserable one is how quickly he corrects the error. Letting a mistake grow is like allowing a snake to coil around your neck. With every passing minute, the noose tightens, the air runs out, and the only certainty is the approaching death. An uncorrected mistake is like poison running through your veins; the antidote is simple, but few have the courage to administer it. Correcting yourself is not a choice, it’s a matter of survival.
Only the weak cling blindly to their mistakes, preferring to sink into their illusions than face the weight of the truth. The true man, the one forged in fire and pain, reassesses, reconsiders, and changes course without hesitation. Persisting in error is the path of the defeated.
A man without his word is like a traitor, and you know very well the fate reserved for traitors. There is no forgiveness, no second chance. The traitor deserves no mercy; he is a dead weight that must be swiftly eliminated before he contaminates everything around him with the stench of his dishonor.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ f25afb62:8d50c6e7
2025-03-09 01:34:10The recent economic turmoil in New Zealand has reignited debates over the role of the Reserve Bank of New Zealand (RBNZ) in "engineering a recession." Many believe that the RBNZ’s decision to raise the Official Cash Rate (OCR) was the root cause of the downturn, but this narrative oversimplifies the reality.
Who Really Engineered the Recession?
Blaming the RBNZ for the recession ignores a fundamental truth: market interest rates were rising long before the OCR was adjusted. Bond yields, swap rates, and borrowing costs surged as the RBNZ stepped back from being the primary buyer of government bonds. When the RBNZ stopped paying artificially high prices (low yields) for bonds, the private sector had to price them instead, leading to yields rising back to real market interest rates. Meanwhile, the government continued to refinance its rolling debt at these higher rates, further driving up borrowing costs. The RBNZ, in hiking the OCR, was following the market interest rate, attempting to maintain credibility rather than dictating outcomes.
The real policy missteps were made much earlier:
-
Artificially Suppressing Interest Rates Through Money Printing\ The RBNZ engaged in Large-Scale Asset Purchases (LSAP), creating money out of thin air to buy government bonds. This artificially lowered yields, making it cheaper for the government to borrow and spend beyond its means. The result? Inflation surged as the economy was flooded with cheap money.
-
Funding for Lending Programme (FLP): Free Money for Banks\ The RBNZ offered near 0% loans to banks, allowing them to borrow at artificially low rates while lending at much higher rates. This wasn’t just monetary easing—it was a blatant distortion of the free market, reinforcing the Cantillon Effect, where those closest to the money printer benefit first.
-
Holding Rates Too Low for Too Long\ A 0% OCR in itself doesn’t cause inflation—what does is creating excess liquidity while artificially suppressing borrowing costs. Banks, instead of competing for deposits and lending productively, were incentivized to park money in assets like housing, fueling unsustainable bubbles.
When inflation inevitably took hold, the RBNZ had no choice but to raise rates aggressively. This wasn’t an effort to “engineer” a recession—it was damage control after prior policy failures. The claim that the RBNZ alone caused the recession is a convenient distraction from the real culprits: government overspending and central bank interventionism.
The Cycle of Blame: Central Bank Governors as Fall Guys
This cycle isn’t new. Central banks are officially independent, but in reality, they almost always align with the government of the day. The Large-Scale Asset Purchase (LSAP) program was effectively a way to finance government spending through money printing—something politicians would never admit outright. When the government needed funding for pandemic-era stimulus, the RBNZ obliged, creating \$50 billion out of thin air to buy government bonds and lower borrowing costs, making it easier for the Labour government to spend big.
Now, with a new government in power, they get to bring in their own person—likely someone who will align with their fiscal policies, just as Orr aligned with Labour's. This cycle plays out over and over again:
- Print money to fund government priorities.
- Blame the central bank for inflation or economic consequences.
- Replace the central bank governor with someone more aligned with the new government’s agenda.
- Repeat.
The “independent central bank” narrative is a useful tool for politicians to deflect blame. Labour can say, “Inflation wasn’t our fault, it was the RBNZ’s monetary policy!” Meanwhile, National can now install someone who will adjust policy to suit their needs while still claiming, “We respect the independence of the Reserve Bank!” This allows both parties to escape accountability, despite the fact that excessive government spending and central bank money printing go hand in hand.
This isn’t just a New Zealand issue—most central banks operate the same way. They provide the liquidity needed to keep government spending rolling, and when inflation or other economic problems arise, the governor becomes the convenient fall guy.
The Role of Bitcoin: An Exit From the Broken System
This cycle of money printing, asset bubbles, inflation, and central bank tightening isn’t unique to New Zealand—it’s the natural consequence of a system where central banks and governments have unchecked control over money. Bitcoin was created as a direct response to this very problem.
Bitcoin Fixes the Cantillon Effect
- Unlike fiat money, which is distributed to banks and institutions first, Bitcoin’s issuance is predictable and transparent. There are no backroom deals, no preferential access, no bailouts.
- Bitcoin doesn’t change its supply to accommodate political agendas. There is only one Bitcoin—just like there is only one Earth, and its land area cannot be expanded. It can be divided into 21 million equal-sized pieces called BTC or 2,100 trillion equal-sized pieces called sats.
- Bitcoin doesn’t grant special privileges. You either earn it, mine it, or buy it. No one gets first access at a discount.
Bitcoin Removes the Central Bank Middleman
- The RBNZ and other central banks manipulate money supply and interest rates to serve political and economic interests. Bitcoin’s monetary policy is fixed and free from human interference.
- No government can arbitrarily print Bitcoin to fund its spending or suppress its value.
- Bitcoin allows people to store their wealth without the risk of inflationary dilution or government confiscation.
Bitcoin Protects You from the Next Bailout
- Every time the financial system faces a crisis, governments and central banks shift the cost onto the public—through inflation, taxation, or outright financial repression.
- Bitcoin lets you opt out of this cycle. By holding Bitcoin, your savings remain secure, beyond the reach of reckless monetary policy.
- When the next crisis hits—and it will—Bitcoin holders won’t be left wondering how much purchasing power they’ve lost overnight.
A Strategic Shift: The U.S. Embraces Bitcoin
Recent developments in the U.S. signal a major turning point in how governments view Bitcoin. President Trump recently signed an Executive Order establishing a Strategic Bitcoin Reserve, marking the first time a nation has officially designated Bitcoin as a strategic asset. This reserve will be exclusively Bitcoin, initially seeded with Bitcoin seized through civil and criminal forfeitures, but with a commitment to acquiring more through budget-neutral strategies at no additional cost to taxpayers. This means that if the government can save money elsewhere, those funds can be redirected toward buying and holding Bitcoin as a permanent reserve asset.
The implications of this decision are profound:
- The U.S. acknowledges Bitcoin as fundamentally different from “crypto.” Altcoins and centralized tokens are being liquidated, while Bitcoin is being held as a permanent reserve.
- The government is shifting from selling confiscated Bitcoin to strategically accumulating it, positioning the U.S. as a key player in a Bitcoin-based financial future.
- Bitcoin mining is being embraced as a domestic industry, stabilizing power grids and reinforcing the U.S. as a leader in proof-of-work security.
This policy shift highlights what Bitcoiners have long understood: Bitcoin is digital gold, and fiat systems will eventually recognize its superiority. While central banks continue their cycle of money printing and blame-shifting, the adoption of Bitcoin as a strategic reserve asset may mark the beginning of a global financial transformation.
The Bigger Picture: Free Markets vs. Centralized Control
The idea that the RBNZ acted independently in creating these economic conditions is a myth. Central banks do not exist in isolation; they facilitate government spending and economic policies, whether through bond purchases, artificially low interest rates, or direct lending programs. The economic pain we’re seeing now is not an accident—it’s a consequence of a system designed to redistribute wealth to those closest to the money printer.
Bitcoin represents an alternative: a free-market monetary system where no central entity controls issuance, no insiders get preferential treatment, and no government can erode its value through reckless policies.
The sooner people recognize the flaws in the current system, the sooner they’ll understand why Bitcoin exists—not just as an investment, but as a monetary revolution.
originally posted at https://stacker.news/items/907966
-
-
@ 3ffac3a6:2d656657
2025-03-08 23:07:57Recently, I found an old Sapphire Block Erupter USB at home that I used for Bitcoin mining back in 2013. Out of curiosity and nostalgia, I decided to try getting it to work again. I spent an entire afternoon configuring the device and, after much trial and error, discovered that I needed an older version of CGMiner to make it work.
The Sapphire Block Erupter USB was one of the first ASIC devices designed for Bitcoin mining. Although obsolete for competitive mining, it can still be used for learning, nostalgia, or experimentation. In this post, I’ll show you how to run a Block Erupter USB on Linux today.
1. Prerequisites
Before you start, make sure you have:
- A Sapphire Block Erupter USB
- A powered USB hub (optional but recommended)
- A computer running Linux (Ubuntu, Debian, or another compatible distribution)
- A mining pool account (e.g., Slush Pool, KanoPool, etc.)
2. Installing Dependencies
Before running the miner, install some dependencies:
bash sudo apt update && sudo apt install -y git build-essential autoconf automake libtool pkg-config libusb-1.0-0-dev
3. Determining the Compatible Version of CGMiner
To find the correct CGMiner version that still supports Block Erupter USB, I performed a binary search across different versions, testing each one until I found the last one that properly recognized the device. The result was that version 3.4.3 is the most recent one that still supports Block Erupters. However, different versions of these devices may require different CGMiner versions.
4. Downloading and Compiling CGMiner
CGMiner is one of the software options compatible with Block Erupters. You can download the correct version from two trusted sources:
- From the official repository: CGMiner v3.4.3 on GitHub
- Alternatively, from this mirror: CGMiner v3.4.3 on Haven
To ensure file integrity, verify the SHA-256 hash:
3b44da12e5f24f603eeeefdaa2c573bd566c5c50c9d62946f198e611cd55876b
Now, download and extract it:
```bash wget https://github.com/ckolivas/cgminer/archive/refs/tags/v3.4.3.tar.gz
Or, alternatively:
wget https://haven.girino.org/3b44da12e5f24f603eeeefdaa2c573bd566c5c50c9d62946f198e611cd55876b.tgz
sha256sum v3.4.3.tar.gz # Confirm that the hash matches
Extract the file
tar -xvf v3.4.3.tar.gz cd cgminer-3.4.3
Compile CGMiner
./autogen.sh --enable-icarus make -j$(nproc)
Install on the system (optional)
sudo make install ```
5. Connecting the Block Erupter USB
Plug the device into a USB port and check if it is recognized:
bash dmesg | grep USB lsusb
You should see something like:
Bus 003 Device 004: ID 10c4:ea60 Cygnal Integrated Products, Inc. CP2102 USB to UART Bridge Controller
If needed, adjust the USB device permissions:
bash sudo chmod 666 /dev/ttyUSB0
6. Configuring and Running CGMiner
Now, run CGMiner, pointing it to your mining pool:
bash ./cgminer -o stratum+tcp://your.pool.com:3333 -u yourUsername -p yourPassword
If the miner detects the Block Erupter correctly, you should see something like:
[2025-03-08 22:26:45] Started cgminer 3.4.3 [2025-03-08 22:26:45] No devices detected! [2025-03-08 22:26:45] Waiting for USB hotplug devices or press q to quit [2025-03-08 22:26:45] Probing for an alive pool [2025-03-08 22:26:46] Pool 0 difficulty changed to 65536 [2025-03-08 22:26:46] Network diff set to 111T [2025-03-08 22:26:46] Stratum from pool 0 detected new block [2025-03-08 22:27:02] Hotplug: Icarus added AMU 0
Conclusion
Although no longer viable for real mining, the Sapphire Block Erupter USB is still great for learning about ASICs, testing mining pools, and understanding Bitcoin mining. If you enjoy working with old hardware and have one lying around, it’s worth experimenting with!
If you have any questions or want to share your experience, leave a comment below!
-
@ 3ffac3a6:2d656657
2025-03-08 23:02:13Como Rodar um Sapphire Block Erupter USB para Mineração no Linux em 2025
Recentemente, encontrei um Sapphire Block Erupter USB velho aqui em casa que eu usava para minerar Bitcoin em 2013. Por curiosidade e nostalgia, resolvi tentar colocá-lo para funcionar novamente. Passei uma tarde inteira tentando configurar o dispositivo e, depois de muita tentativa e erro, descobri que precisava de uma versão mais antiga do CGMiner para fazê-lo funcionar.
Os Sapphire Block Erupter USB foram um dos primeiros dispositivos ASIC voltados para mineração de Bitcoin. Embora estejam obsoletos para mineração competitiva, eles ainda podem ser usados para aprendizado, nostalgia ou experimentação. Neste post, vou te mostrar como rodar um Block Erupter USB no Linux atualmente.
1. Pré-requisitos
Antes de começar, certifique-se de que você tem:
- Um Sapphire Block Erupter USB
- Um hub USB alimentado (opcional, mas recomendado)
- Um computador rodando Linux (Ubuntu, Debian, Arch ou outra distribuição compatível)
- Um pool de mineração configurado (ex: Slush Pool, KanoPool, etc.)
2. Instalando as Dependências
Antes de rodar o minerador, instale algumas dependências:
bash sudo apt update && sudo apt install -y git build-essential autoconf automake libtool pkg-config libusb-1.0-0-dev
3. Determinando a Versão Compatível do CGMiner
Para encontrar a versão correta do CGMiner que ainda suporta os Block Erupter USB, realizei uma busca binária entre diferentes versões, testando cada uma até encontrar a última que reconhecia corretamente o dispositivo. O resultado foi que a versão 3.4.3 é a mais recente que ainda suporta os Block Erupters. No entanto, outras versões desses dispositivos podem requerer versões diferentes do CGMiner.
4. Baixando e Compilando o CGMiner
O CGMiner é um dos softwares compatíveis com os Block Erupters. Você pode baixar a versão correta de duas fontes confiáveis:
- Do repositório oficial: CGMiner v3.4.3 no GitHub
- Alternativamente, deste espelho: CGMiner v3.4.3 no Haven
Para garantir a integridade do arquivo, você pode verificar o hash SHA-256:
3b44da12e5f24f603eeeefdaa2c573bd566c5c50c9d62946f198e611cd55876b
Agora, faça o download e extraia:
```bash wget https://github.com/ckolivas/cgminer/archive/refs/tags/v3.4.3.tar.gz
Ou, alternativamente:
wget https://haven.girino.org/3b44da12e5f24f603eeeefdaa2c573bd566c5c50c9d62946f198e611cd55876b.tgz
sha256sum v3.4.3.tar.gz # Confirme que o hash bate
Extraia o arquivo
tar -xvf v3.4.3.tar.gz cd cgminer-3.4.3
Compile o CGMiner
./autogen.sh --enable-icarus make -j$(nproc)
Instale no sistema (opcional)
sudo make install ```
4. Conectando o Block Erupter USB
Plugue o dispositivo na porta USB e verifique se ele foi reconhecido:
bash dmesg | grep USB lsusb
Você deve ver algo como:
Bus 003 Device 004: ID 10c4:ea60 Cygnal Integrated Products, Inc. CP2102 USB to UART Bridge Controller
Se necessário, ajuste as permissões para o dispositivo USB:
bash sudo chmod 666 /dev/ttyUSB0
5. Configurando e Rodando o CGMiner
Agora, execute o CGMiner apontando para seu pool de mineração:
bash ./cgminer -o stratum+tcp://seu.pool.com:3333 -u seuUsuario -p suaSenha
Se o minerador detectar corretamente o Block Erupter, você verá algo como:
``` [2025-03-08 22:26:45] Started cgminer 3.4.3 [2025-03-08 22:26:45] No devices detected! [2025-03-08 22:26:45] Waiting for USB hotplug devices or press q to quit [2025-03-08 22:26:45] Probing for an alive pool [2025-03-08 22:26:46] Pool 0 difficulty changed to 65536 [2025-03-08 22:26:46] Network diff set to 111T [2025-03-08 22:26:46] Stratum from pool 0 detected new block [2025-03-08 22:27:02] Hotplug: Icarus added AMU 0
```
Conclusão
Apesar de não serem mais viáveis para mineração real, os Sapphire Block Erupter USB ainda são ótimos para aprender sobre ASICs, testar pools e entender mais sobre a mineração de Bitcoin. Se você gosta de hardware antigo e tem um desses guardado, vale a pena experimentar!
Se tiver dúvidas ou quiser compartilhar sua experiência, comente abaixo!
-
@ ffbcb706:b0574044
2025-03-08 22:51:54I recently switched from stock Android on my Pixel 8 Pro to GrapheneOS and transitioned from Authy to Aegis to move away from Big Tech and embrace open-source and privacy-focused alternatives. While Aegis offers local encrypted backups, I noticed it lacked external automatic sync, and I wanted to be sure that I could still access my 2FA tokens even if I lost my phone, without having to remember to back up Aegis externally every time I added a new 2FA entry.
Additionally, because many commands need to be run in Termux, I found it useful to use Scrcpy to control my Android device from my Ubuntu desktop. Scrcpy requires ADB and allows easy copy-paste functionality between Ubuntu and Android. I used ALT + V in Ubuntu scrcpy and then long-pressed the screen on my Pixel and selected 'Paste' to copy text easily. This is an optional but highly useful method for managing terminal commands efficiently.
This guide will walk you through setting up rclone and Termux:Boot to enable seamless Aegis backup automation on GrapheneOS. While I use GrapheneOS, this setup should work on most modern Android versions.
Prerequisites
Before starting, make sure you have:
- GrapheneOS installed on your Google Pixel Android device (Pixel 8 Pro in my case).
- Aegis Authenticator installed with automatic backup enabled.
- Proton Drive account ready.
- Obtainium installed or an alternative such as F-droid to manage Termux updates securely.
- Termux & Termux:Boot installed via Obtainium:
- Termux: https://github.com/termux/termux-app/releases
- Termux:Boot: https://github.com/termux/termux-boot/releases
- Scrcpy installed (optional, for easier command handling):
- Install on Ubuntu:
sudo apt install scrcpy
- Ensure ADB is enabled on your Android device.
Step 1: Install Required Packages and Set Up the Backup Folder
Open Termux and install the required tools:
sh pkg update && pkg upgrade -y pkg install rclone inotify-tools termux-api
Grant storage permissions to Termux:
sh termux-setup-storage
Create the ProtonSync directory where all files to be backed up will be stored, including Aegis backups:
sh mkdir -p /storage/emulated/0/ProtonSync/Aegis/
Ensure the directory exists:
sh ls /storage/emulated/0/ProtonSync/Aegis/
If this returns an empty result (instead of an error), you are ready to proceed.
Step 2: Configure rclone for Proton Drive
Since August 2024, Proton Drive has been available as a dedicated backend in rclone (official documentation). However, this integration is still evolving, as it relies on a proton-api-bridge that is under active development.
Run:
sh rclone config
Follow the prompts:
- Choose "n" for a new remote.
- Name it:
protondrive
- Select Proton Drive from the list.
- Enter your Proton username and password.
- If 2FA is enabled, enter the current code from your authenticator app.
- Confirm and save the remote configuration.
Test the setup by listing files:
sh rclone lsd protondrive:
If you see your Proton Drive folders, the connection works.
Step 3: Automate Sync with inotify-tools
We will set up a script to monitor new Aegis backup files and sync them instantly.
- Manually trigger a backup in Aegis first, to ensure a file is created. You can do this in Aegis → Settings → Backups → Trigger backup.
- Create the sync script directly in the Termux:Boot directory:
sh mkdir -p ~/.termux/boot/ nano ~/.termux/boot/watch_protonsync.sh
- Add this content:
```sh
!/data/data/com.termux/files/usr/bin/bash
inotifywait -m -r -e close_write,moved_to,create /storage/emulated/0/ProtonSync/Aegis/ --format '%w%f' | while read file do rclone sync /storage/emulated/0/ProtonSync/Aegis/ protondrive:/ProtonSync/Aegis/ -P done ```
- Save and exit (
CTRL + X
,Y
,ENTER
). - Make it executable:
sh chmod +x ~/.termux/boot/watch_protonsync.sh
Run it manually to test:
sh bash ~/.termux/boot/watch_protonsync.sh &
Now, whenever Aegis creates a new backup file, it will automatically sync to Proton Drive.
Step 4: Test Auto-Start with Termux:Boot
- Reboot your phone.
- Open Aegis and manually trigger a backup (
Settings → Backups → Trigger backup
). - Check Proton Drive under
/ProtonSync/Aegis/
to confirm that the new backup appears.
If the file is there, the automation works! 🎉 I would advice to keep an eye regularly at the Proton Drive to check if the automation is still working.
-
@ 2cb8ae56:84d30cba
2025-03-08 22:41:58[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
[60]
[61]
[62]
[63]
[64]
-
@ 1c69692c:f89196c0
2025-03-08 20:19:22 -
@ 401014b3:59d5476b
2025-03-08 20:14:04Alright, football lunatics, it’s March 2025, and we’re storming into the AFC West like it’s a saloon brawl with whiskey on the line. Free agency’s a lawless frontier, the draft’s a roll of the dice, and this division’s always a mix of firepower and flops. The Chiefs owned 2024, the Chargers turned heads, the Broncos showed grit, and the Raiders… uh, raided their own dignity. Let’s slap some records on this rodeo and see who’s got the guts to lasso the crown. Saddle up, fam—here we go.
Kansas City Chiefs: 12-5 – Mahomes’ Dynasty Rolls On
The Chiefs were the AFC’s big dogs in 2024, and 2025’s no different. Patrick Mahomes is still the NFL’s cheat code—Xavier Worthy’s a speed demon, Travis Kelce’s defying Father Time, and the O-line’s a fortress. That defense—Chris Jones, Trent McDuffie—keeps QBs sweating, but free agency’s a buzzkill. The WR depth’s thin. Still, Mahomes magic lands ‘em at 12-5, division champs. KC’s the team everyone loves to hate—and they keep winning anyway.
Los Angeles Chargers: 10-7 – Harbaugh’s Grit Pays Off
The Chargers flipped the script in 2024 under Jim Harbaugh, and they’re building steam. Justin Herbert’s a cannon-armed freak, Ladd McConkey’s emerging, and J.K. Dobbins (if healthy) keeps the run game humming. The defense—Joey Bosa, Derwin James—is a problem when it’s clicking, but free agency looms. Khalil Mack’s getting old, and Asante Samuel Jr. might bolt. 10-7’s the vibe, snagging a wildcard. Harbaugh’s got ‘em believing—they’re legit playoff pests now.
Denver Broncos: 8-9 – Bo Nix’s Baby Steps
The Broncos showed fight in 2024 with rookie Bo Nix, and 2025’s a growth spurt. Nix has Courtland Sutton and Marvin Mims to sling it to, while Javonte Williams grinds the run game. That defense—Pat Surtain II, Zach Allen—is still nasty, but free agency could sting. Jonathon Cooper might cash out elsewhere, and the O-line needs juice. 8-9’s where they land—close, but not quite playoff-ready. Sean Payton’s cooking, but it’s not fully baked yet.
Las Vegas Raiders: 4-13 – Chaos in the Desert
The Raiders are the AFC West’s hot mess. No QB worth a damn (Aidan O’Connell? Please), Davante Adams bailed, and the run game’s a ghost town without Josh Jacobs. The defense—Maxx Crosby, Christian Wilkins—has some bite, but the roster’s a dumpster fire, and free agency won’t help. Tyree Wilson’s unproven, and the cap’s a nightmare. 4-13’s the brutal truth—they’re tanking for a draft savior. Vegas, baby, but not in a good way.
The Final Shootout
The AFC West in 2025 is a Chiefs cakewalk with a Charger chaser. The Chiefs (12-5) lock the title because Mahomes is Mahomes, the Chargers (10-7) snag a wildcard with Harbaugh’s mojo, the Broncos (8-9) tease progress, and the Raiders (4-13) crash and burn. Free agency’s the wild card—lose a star, you’re toast; keep ‘em, you’re riding high. Hit me on Nostr when I screw this up, but this is my AFC West sermon. Let’s roll, degenerates.
-
@ 8671a6e5:f88194d1
2025-03-08 18:55:02The ECB’s Tightrope Walk (2019–2025)
The European Central Bank (ECB) is caught between a rock and a hard place these past years (2019–2025). On one hand, it’s failing its core mission: keeping the Euro stable with a 2% inflation target. On the other, trust in the currency—and the EU itself—is crumbling fast. You can see it in the sinking European bond market and the growing crowd of voters backing anti-EU politicians.
As usual, the ECB sticks to its playbook: blending marketing with “innovations,” spicing it up with anti-crypto MiCA rulings on Bitcoin, and blaming everyone—Putin, Trump, Elon, China, the wind, the moon—for their woes. Since the financial crisis, it’s pumped 2.3 trillion euros into the economy, money conjured out of thin air for market purchases (quantitative easing). The result? Our wallets feel the pinch as purchasing power tanks, with inflation bouncing between 2.1% and 20%, depending on which figures you still trust. No shock there: for every euro circulating in 2002, there are now five.
Meanwhile, Europe’s scrambling to keep up appearances, led by a parliament of nitwits who treat error-riddled high school essays from the Dutch Central Bank as gospel—or print 1 trillion euros (!) to prop up their debt and war cycle. These politicians aren’t too dumb to spot the mistakes; they just care more about ramming through the “narrative,” shaky or not.
The Bitcoin Smokescreen Take the attack on Bitcoin, always nagging about its “energy use”—a standard they never apply elsewhere. Good thing, too; electricity isn’t “good” or “evil.” The real play? Clearing the path for a “digital euro,” cooked up by sly financial institutions hawking their “Aldi Bitcoin” via corporate blockchains.
Digital Euro: The Shiny Trap
Advantages I’ll grudgingly list a few perks, though they’re skin-deep: faster transactions than today’s sluggish bank transfers, digital payments (QR codes), and a unified standard across Europe. These tiny upgrades—great for marketing—don’t outweigh the massive downsides but do beat the current patchwork of payment systems. That’s the good news, and it ends here.
Disadvantages
The cons list is long, so I’ll hit the three worst:
Permission-Coin Nightmare You’ll need approval from some authority (or commercial bank) to receive, spend, or hold it. A 50€ note moves from A to B, no questions asked—cash has no name, needs no permission. Pocket money for your kid, a coin for a beggar, or paying for a used PlayStation: cash flows free. They want that gone. Bitcoin’s beauty mirrors cash but better—unconfiscatable, A to B, no permission needed, saint or crook. That’s the bedrock of a working social-economic system. Sorry, EU pious elite, but white, gray, and black economies will always exist—check your own subsidies; not everything’s clean. Worse, it threatens wage sanctity, potentially reviving forced spending schemes banned since 1887 (in Belgium, at least). Workers once got paid in cash and expiring factory vouchers—a disaster now illegal.
Programmable Tokens A digital euro (CBDC) turns money into controllable tokens, ripe for expiry dates, discounts, or restrictions. Big banks are testing this, aping Bitcoin’s gimmick but under total state control, endlessly minting “safe” tokens for their theft-driven consumer economy. Services like Corda are set to link your ID via eIDAS (Europe’s total-control digital identity surveillance) to these CBDC wallets. Your behavior won’t just be monitored—it’ll tie to fines or coin deductions. (link: https://r3.com/get-corda/ )
Total Control Coin Citizens lose on nearly all fronts. Recall the Belgian Franc-to-Euro shock (cheese sandwich: 40 francs to 1.2 euros, now 3+)? The digital euro rollout—likely hitting welfare recipients and civil servants (with little recourse) via a “gov-app” wallet around July 2025—will sting worse. You’ll get no real money, just controllable vouchers. The ECB won’t program the coins directly; they’ll let banks take the fall. If trust erodes (it will), they’ll blame “greedy banks” or “corrupt third parties.” Cash’s freedom—untraceable, unblockable—dies. The ECB gains tools: negative interest, forced loans, outright theft—all impossible with cash (unless they swap notes, which is slow and costly). Weaponized bank accounts already plague the EU; this makes them worse—shut down sans court order, targeting journalists, dissidents, anyone in the crosshairs.
This isn’t convenience—it’s power. And the ECB’s pushing it despite the euro’s instability. Fabio Panetta once said, “A digital euro would preserve the coexistence of safe central bank money and private money, ensuring sovereign money remains a monetary anchor” (Evolution or Revolution?, Feb 10, 2021). Stability’s key, yet they’re charging ahead anyway. (source)
Conclusion: The Great Heist The CBDC Digital Euro is the greatest theft in Europe since WWII. It’ll shred our freedom, warp market pricing, kill opposition, and chain us financially to the powerful—bank runs impossible. Citizens lose on 9/10 fronts… though payments will be quick. Trust in the Eurozone? It’ll erode faster, propped up only by nudging, marketing, and force.
Citizens will lose out on 9 out of 10 fronts… though, admittedly, payments will be quick.\ The loss in trust in the Eurozone even faster....
AVB\ \ tip if you like this
-
@ 378562cd:a6fc6773
2025-03-08 16:31:22The insurance industry is one of the most lucrative businesses in the world, built on a foundation of fear, deception, and manipulation. It presents itself as a guardian of financial security, promising protection in times of crisis. However, in practice, it operates like a government-backed extortion scheme, siphoning money from individuals and businesses while finding ways to avoid paying out claims.
Many people view insurance as a necessary evil—a required expense for responsible living. But very few stop to consider the true nature of the industry and how it functions not as a service, but as a well-oiled criminal machine designed to extract wealth from the population while delivering as little value as possible.
A Business Model Built on Exploiting Fear and Uncertainty Insurance companies do not sell a product in the traditional sense. You don’t receive something tangible in return for your payments. Instead, they sell you a promise that if something terrible happens, they will be there to cover the costs. However, that promise is deliberately wrapped in vague legalese, riddled with loopholes, and ultimately designed to benefit the insurer more than the insured.
To make this scam even more effective, insurance companies exploit human psychology, knowing that fear is one of the strongest motivators. They bombard people with relentless messaging about the catastrophic risks of being uninsured—the dangers of driving without auto insurance, the financial ruin of an unexpected hospital visit, or the devastation of losing a home to a fire or natural disaster. Ask your local insurance person (if you think they would give you an honest answer) how many full payouts they have had to give out due to a complete loss over the past year, 5 years, since they have been selling insurance. You'd be amazed at how few that number really is.
But it doesn’t stop there. Other industries have caught on to this fear-driven strategy and now use insurance as the perfect scapegoat to justify absurdly inflated prices. Hospitals, auto manufacturers, homebuilders, and repair services all point to “rising insurance costs” among other things as the reason for their skyrocketing fees. A simple medical procedure that should cost a few hundred dollars now runs into the several thousands because “that’s what insurance pays.” Auto repairs that used to be affordable are now exorbitant because shops know insurers will cover part of the bill. The end result? A rigged system where businesses get richer while consumers pay more, not just in premiums, but in every aspect of life.
The truth? Insurance companies thrive on the fact that most policyholders will never need to file a major claim, and if they do, the company will do everything in its power to pay out as little as possible—or nothing at all.
The Three D’s: Deny, Delay, Defend
When it comes time for an insurance company to actually pay out a claim, they rarely do so without a fight. Instead, they deploy the Three D’s strategy—a well-documented tactic used to minimize payouts and maximize profits:
Deny the Claim – The first step is simple: find a reason, any reason, to reject your claim.
Did you miss a payment once five years ago? Denied.
Did you fail to report a minor detail when signing up for your policy? Denied.
Did they discover a tiny, unrelated pre-existing condition? Denied.
Delay the Payout – If they can’t outright deny your claim, the next step is to make the process as slow and painful as possible.
Endless paperwork requirements. Requests for additional documentation (often things that were already submitted). Long hold times when you call for an update. The goal? Wear you down so you give up or settle for less.
Defend Against Lawsuits – If you decide to take legal action, the company will unleash an army of high-priced attorneys (another equally criminal organization with the same rules and laws applied) to fight you every step of the way.
They have billions of dollars available for legal fees. They will outlast you, knowing that most individuals lack the time, money, or energy to engage in a lengthy legal battle. This cycle repeats daily, with millions of policyholders becoming victims of the very companies they’ve paid to protect them. Where is the legal protection to protect you and me? NON-EXISTENT FARSE!
The Myth of the “Struggling” Insurance Agent Insurance agents like to present themselves as hard-working individuals, just trying to make a living. They’ll tell you they’re not getting rich and that they only want what’s best for you. But make no mistake—there is no such thing as a "barely making it" insurance agent in the long run. Mine is constantly on FB telling of this trip to Mexico or some exotic island somewhere or someplace I would love to take my family someday but can never seem to afford it time or money.
Agents work on commission, meaning their income is tied directly to the number of policies they sell. This creates an incentive to push as many policies as possible, often using manipulative tactics.
They will upsell coverage you don’t need by playing on your fears. They will gloss over exclusions and fine print, ensuring you only focus on the benefits, not the limitations. They will push you into long-term commitments that make it costly to switch or cancel and have the "adjustor" and "company policy" as an scapegoat to ease their own conscience.
Meanwhile, at the top, insurance executives make obscene amounts of money while denying rightful claims to hard-working individuals. The CEOs of major insurance companies bring in tens of millions of dollars per year, all while raising premiums and reducing coverage for their customers.
Mandatory Insurance: A Government-Backed Extortion Scheme One of the most damning aspects of the insurance industry is how it has embedded itself into government policy, ensuring that people have no choice but to participate in the system.
Car Insurance: Nearly every state requires auto insurance, even though the majority of drivers never file a claim. Meanwhile, insurance companies raise rates even if you never get into an accident. Health Insurance: The government forces people to buy into overpriced health insurance plans that come with absurd deductibles, making them nearly useless for many policyholders. Home Insurance: Mortgage lenders force homeowners to carry insurance, ensuring another guaranteed revenue stream for the industry. These laws do not exist to protect consumers—they exist to guarantee profits for the insurance companies.
Who Really Benefits? Follow the Money
The biggest winners in the insurance industry are not the policyholders that provide ALL THE MONEY into this criminal organization. The true beneficiaries are the corporate executives and shareholders, and it funnels down to the individual agents collecting all this for them.
The largest insurance companies report billions of dollars in annual profits—far more than they pay out in claims. Shouldn't they break even after a 'modest" salary for their service and time? Wouldn't THAT make more sense to a sensible human being? They invest premium dollars into the stock market, real estate, and other ventures, ensuring their wealth (the money YOU gave them) continues to grow.
They lobby politicians to maintain their stranglehold on the industry, keeping regulations in their favor and ensuring insurance remains legally required in most aspects of life. In short, insurance companies are not in the business of helping people—they are in the business of making money.
The Harsh Reality: A System Designed to Exploit Most people will pay hundreds of thousands of dollars in insurance premiums throughout their lifetime. And yet, when the time comes to actually use the coverage, many find themselves fighting an uphill battle against a rigged system.
Consider these facts:
Insurance companies cancel policies when people become too “expensive.” They increase rates after a single claim—even if it wasn’t your fault. They spend billions on advertising to attract new customers but fight tooth and nail to avoid paying out existing ones. At what point does this stop being a service and start being a scam?
Final Thoughts: A Broken System That Needs an Overhaul
The insurance industry presents itself as a pillar of stability, but in reality, it is one of the most corrupt, exploitative industries in the world. It thrives by preying on fear, avoiding payouts, and ensuring government policies force people to participate in the scam.
If the system was truly fair, it would operate like mutual aid, where all policyholders contribute and receive support as needed. But instead, it functions like organized crime, where the ones collecting the money hold all the power, and those in need are left scrambling for scraps.
Until a major upheaval occurs, there’s little the average person can do to fight back against this deeply entrenched system. The harsh reality is that there are far too many crooks, manipulators, and dishonest players at every level of society—from corporate executives to politicians, from insurance adjusters to business owners who have happily joined in on the scam.
Reading the fine print won’t stop an industry designed to change the rules whenever it benefits them. Shopping around is meaningless when every company is playing the same rigged game. Demanding transparency? Good luck—those in power have built entire careers around keeping consumers in the dark.
At the end of the day, insurance companies—and the industries that now use them as an excuse to inflate costs—are not here to protect you. They exist to extract wealth from you, and there’s no real way to “win” in a system engineered to ensure you always lose.
-
@ 044da344:073a8a0e
2025-03-08 14:45:54Manchmal ist es anstrengend mit den Kommentaren. Irgendjemand weiß immer irgendetwas besser und will das aller Welt auch zeigen – anonym natürlich. Man gönnt sich ja sonst nichts. Auch bei meinem Gespräch mit Michael Beleites gab es ein paar Nörgler. Schaut euch den Geparden an oder den Dingo. Dann seht ihr schnell, wie falsch ihr liegt. Eine Nummer größer: Ihr habt den Darwin nicht verstanden. Oder ganz im Gegenteil: alles kalter Kaffee, seit Menschengedenken bekannt. Meist fällt mir ein Sprüchlein ein und ich kann das für mich abhaken.
Diesmal war es anders. Wenn es buchstäblich um Gott und die Welt geht, kommt man nicht mehr durch mit einer Standard-Antwort. Ich kann das hier gar nicht alles aufzählen. Was den Zuschauer triggert, hängt auch und vor allem von ihm selbst ab. Und Michael Beleites liefert Andockstationen noch und nöcher. „Die Wissenschaft ist sich einig“? Nicht für @brigittegartner7946. „Eine Migrationspolitik, die Völker und Ethnien um den halben Erdball treibt“? Passt für @hildegverakaethner3340 nicht zu der Erkenntnis, dass sich der Mensch dort am wohlsten fühlt, wo er geboren und aufgewachsen ist. Marsbesiedelung? Keine Option für @d.l.6789. Dafür umso mehr: „Den Kindern das Staunen geben“, nicht nur für @Romasi54.
„Zeit, Ruhe, Gelegenheit und Bestätigung – zu selten erleben Kinder das. Oft kommt ein belehrender Erwachsener dazwischen. Und dabei sind Erwachsene einfach nur eher geboren. Lassen und geben wir den Kindern ihre eigenen Erlebnisse, Entdeckungen, Erkenntnisse.“
Das Thema DDR spielte für das Publikum kaum eine Rolle, obwohl es im Gespräch ja auch um Zersetzung einst und jetzt geht und darum, dass die Cancel Culture von heute viel mehr Jünger anzieht als alles, was die Stasi je versucht hat. 96 Prozent der DDR-Bürger, so Michael Beleites hinterher bei uns im Wohnzimmer, haben davon nicht viel mitbekommen. Zwei Prozent Täter und zwei Prozent Opfer so wie er – Menschen, die oft bis heute die Deutungshoheit haben über die Vergangenheit und die, so sieht das Michael Beleites, schon in den 1990ern damit angefangen haben könnten, die Maßstäbe für das Miteinander zu verschieben. Kommentar eines Westdeutschen online: Ich bin „immer stark beeindruckt, wenn ich mit Ostdeutschen kontrovers diskutiere oder Ostdeutsche sich kontrovers auseinandersetzen. Ruhig und sachlich. Meine Frau, Französin, spürt immer sofort, wer West- und wer Ostdeutscher ist.“ Letzter Schnipsel aus der YouTube-Welt: @fotografiker2 bietet an, „mit zur Schaufel“ zu greifen, wenn die „Logik des Wettbewerbs“ beerdigt wird. Da sind wir schon mindestens drei.
Was bleibt von so einem Gespräch? Die Persönlichkeit des Gastes, klar, aber das ist eine Plattitüde. Was macht einen Menschen zu dem, was er ist? Sein Buch, sagt Michael Beleites in die Kamera, habe ihm Klarheit gebracht. Einmal alles aufgeschrieben und dann auch erlebt zu haben, wer wie reagiert: Das sortiert die Dinge genauso wie die Menschen – vor allem dann, wenn man sich vorgenommen hat, gegen den Strom zu schwimmen, und außerdem weiß, was es bedeutet, einen Konflikt nicht nach außen zu bringen, sondern ihn weiter mit sich herumzutragen. Michael Beleites kann gelassen aussprechen, dass die Wissenschaft nicht gern zugibt, nichts zu wissen, dass sie cancelt und dass es so jenseits von Studium und akademischer Laufbahn möglicherweise leichter ist, der Wahrheit auf den Grund zu gehen. Hier: die Sache mit dem Kampf ums Dasein. Als die Kameras aus waren, erzählte ein Zuschauer von den Schlangen in seiner Zucht. Mächtige Männchen, die verbissen miteinander ringen und gar nicht merken, dass das Weibchen derweil von einem Schwächling begattet wird. Und dann die Schönheit der Natur, die sich weder über Zweckmäßigkeit erklären lässt noch mit einem Züchter im Verborgenen.
In den YouTube-Kommentaren finden sich viele ganz persönliche Geschichten. Stellvertretend sei hier @st.p.5025 zitiert:
Während meiner Arbeit (in einem Stadtpark) habe ich immer wieder die Möglichkeit, genau das seit Jahren zu beobachten, wovon hier die Rede ist. Auch dass eben nicht nur der Stärkste gewinnt. Bei den Enten und den anderen Wasservögeln, den Singvögeln, auch bei Eichhorn, Nutria und Co. Zudem ist es bei unterschiedlichen Arten nicht selten, dass sich die vermeintlich Schwächeren gegen den als stärker Geltenden durchsetzen. Auch wie die Kämpfe untereinander ablaufen oder vielmehr, wie diese aufgelöst werden. Oder, ihr Sozialverhalten in ihrer Gemeinschaft, welche Art in welchem Jahr überwiegt, dominiert usw. All das bringt auch mich Tag für Tag zum Staunen! Jede Lebewesen-Beobachtung bedeutet für mich Lebensqualität, gesundes Lernen und Freude. Und gibt mir tatsächlich auch Mut. Beispielsweise, dass eben nicht immer nur der „Stärkste“ gewinnt, wie Kämpfe aufgelöst oder verhindert werden.
Michael Beleites formuliert aus, was sich daraus ableiten lässt. Nicht „Ich“ oder „Du“, sondern „Ich“ und „Du“. Lasst uns ausloten, was gemeinsam geht. Lasst uns verhindern, dass die Landschaft zerstört und aufgefressen wird. Lasst uns das dezentral angehen – ein jeder am besten dort, wo er spürt, dass es ihm gut geht.
-
@ 3ac03011:41ecd1bb
2025-03-08 11:49:21IT'S THE SAME THING AGAIN AND AGAIN AND AGAIN....
I just watched the latest John Oliver episode—I enjoy seeing opinions from all sides—and I'm just furious. He brought up an argument from some economists that left me rewinding just to make sure I heard it right. In response to Trump's proposed tax-break for tipped workers, they argued that these workers shouldn't get a tax-break because it's "unfair" to non-tipped workers in the same income bracker.
Wait, seriously? That's the hill they want to die on? So we're supposed to keep everyone broke just to preserve some twisted idea of fairness? That's like watching someone drown and refusing to throw one of those floating rings because someone else upstream doesn't have one either. It's not just misguided—it's downright delusional.
And, of course, the people pushing this argument aren't the ones worrying about rent or groceries. They're sitting comfortably, while arguing against anything that might actually help people who need it. It's all just virtue signaling.
What they misunderstand (when they choose to) is that fair isn't the same as good. I don't want a world where everyone's equally miserable—I want a world where people's lives actually improve. If a tax break can help tipped workers, even a little, why are we wasting time debating it?
This obsession with fairness for fairness's sake is exhausting. Isn't the goal to lift people up instead of dragging everyone down to the same level of struggle? It’s almost impressive how out of touch some people are. Fuck all of them.
-
@ a012dc82:6458a70d
2025-03-08 10:26:25The advent of Bitcoin introduced the world to a new form of digital gold, promising wealth and innovation through the marvels of blockchain technology. However, as the cryptocurrency landscape has evolved, so too have the implications of its underlying processes, particularly Bitcoin mining. In Granbury, Texas, a community has found itself at the intersection of technological advancement and environmental distress, embodying a growing concern over the real-world impacts of digital currencies. This narrative is not unique to Granbury but echoes across various locales globally, where the quest for digital wealth intersects with the fabric of everyday life, often at a cost not initially anticipated.
Table of Contents
-
The Heart of the Matter: Granbury's Plight
-
The Noise That Never Sleeps
-
A Community's Health at Stake
-
-
The Economics of Bitcoin Mining
- The Cost of Digital Wealth
-
Regulatory Responses and Community Action
- Seeking Solutions
-
The Future of Bitcoin Mining and Community Well-be …
- Sustainable Alternatives
-
Conclusion
-
FAQs
The Heart of the Matter: Granbury's Plight
Granbury, a small town in Texas, has become an unwilling host to the cacophony of Bitcoin mining. A local power plant, repurposed for the energy-intensive task of mining Bitcoin, has disrupted the lives of residents with its relentless noise. The sound, likened to the continuous roar of jet engines, penetrates the tranquility of this community, leaving in its wake sleepless nights, health issues, and a disturbed local ecosystem. This intrusion represents a broader dilemma faced by communities worldwide, where the benefits of technological progress clash with the sanctity of personal and environmental well-being.
The Noise That Never Sleeps
Cheryl Shadden, a nurse anesthetist living in Granbury, describes the noise as akin to sitting on an airport runway with jets taking off in succession. The constant hum has made simple pleasures like conversations on the back patio impossible, highlighting the intrusive nature of the mining operation. This relentless noise pollution is not just a minor inconvenience but a significant disruption to daily life, affecting everything from personal relationships to the simple enjoyment of one's home. The situation in Granbury sheds light on the often-overlooked consequences of industrial activities, prompting a reevaluation of what progress means at the expense of quality of life.
A Community's Health at Stake
The incessant din has not only stolen peace but has also been linked to physical ailments among the residents. Reports of migraines, sleep disturbances, and even wildlife fleeing the area paint a grim picture of the toll taken on the community's health and well-being. These health issues are a stark reminder of the environmental cost of our digital age, where the pursuit of innovation can sometimes lead to unforeseen consequences. The plight of Granbury's residents underscores the need for a balanced approach to technological development, one that considers the health and happiness of communities as a measure of success.
The Economics of Bitcoin Mining
Bitcoin mining, the process by which new bitcoins are entered into circulation and transactions are verified, is notoriously energy-hungry. It relies on a proof-of-work system that requires extensive computational power and, consequently, a significant amount of electricity. Texas, with its cheap energy and land, has become a global hub for these operations, attracting companies with the promise of low overhead costs. This economic boon, however, comes with its own set of challenges, as the environmental and social costs begin to surface in communities like Granbury.
The Cost of Digital Wealth
While Bitcoin mining has been lauded for its potential economic benefits, including job creation and investment, the case of Granbury reveals a darker side. The operation consumes approximately 2,100 megawatts of Texas's power supply, raising concerns about carbon and noise pollution, as well as increased utility bills for consumers. The juxtaposition of economic gain against environmental and social loss presents a complex dilemma. It raises critical questions about the sustainability of such ventures and the true cost of digital wealth in the age of cryptocurrency.
Regulatory Responses and Community Action
The situation in Granbury has sparked a dialogue on the need for regulatory oversight. Texas state law currently offers little recourse for noise pollution, with the maximum penalty for exceeding noise limits set at a mere $500 fine. This inadequacy has prompted local officials and residents to seek alternative solutions, including the construction of a sound barrier wall, which, paradoxically, has amplified the noise in some areas. The struggle for regulatory solutions reflects a broader challenge in governing emerging technologies and industries, where existing frameworks often fall short of addressing new and unforeseen impacts.
Seeking Solutions
In response to growing complaints, Marathon Digital Holdings, the company behind the Granbury mining operation, has pledged to conduct a sound study and take over full control of the mine to address community concerns. However, the effectiveness of these measures remains to be seen, and the community's frustration is palpable. This scenario highlights the importance of corporate responsibility and the need for companies to engage with and address the concerns of the communities in which they operate. It also underscores the potential for innovative solutions to mitigate the negative impacts of such operations, fostering a more harmonious relationship between industry and community.
The Future of Bitcoin Mining and Community Well-being
The case of Granbury serves as a cautionary tale of the unintended consequences of Bitcoin mining. As the cryptocurrency industry continues to grow, the balance between technological progress and environmental sustainability becomes increasingly precarious. This tension between innovation and well-being calls for a reimagined approach to technological development, one that prioritizes the health of our communities and the planet.
Sustainable Alternatives
The outcry from Granbury and similar communities across the country underscores the urgent need for sustainable mining practices. Alternatives such as proof-of-stake, a less energy-intensive consensus mechanism, offer a glimpse into a possible future where digital currencies can coexist with environmental stewardship. These alternatives not only represent a technical evolution but also a philosophical shift towards a more sustainable and equitable digital economy.
Conclusion
The story of Granbury is a microcosm of a larger debate on the impact of digital currencies on our physical world. As we venture further into the age of cryptocurrency, the challenge lies in harnessing its potential for economic growth without sacrificing the health and well-being of our communities. The digital gold rush must not lead to audible grief; instead, it should pave the way for innovations that are both economically beneficial and environmentally responsible. The journey from digital gold to a future where technology and nature harmonize requires not just technological innovation, but a collective commitment to redefining progress.
FAQs
How does Bitcoin mining affect local communities? Local communities, like Granbury, can experience noise pollution, increased electricity consumption leading to higher utility bills, potential environmental impacts due to increased energy use, and health issues among residents such as sleep disturbances and migraines.
What are the economic benefits of Bitcoin mining? Economic benefits include job creation, investment in local infrastructure, and increased demand for local services. However, these benefits often come with environmental and social costs that need to be carefully managed.
What measures are being taken to address the concerns of Granbury residents? Measures include the construction of sound barrier walls, conducting sound studies, and engaging with the community to find solutions. Companies like Marathon Digital Holdings are also taking steps to take over full control of mining operations to better address noise issues.
Are there sustainable alternatives to proof-of-work Bitcoin mining? Yes, alternatives such as proof-of-stake (PoS) are being explored and implemented in various cryptocurrencies. PoS is less energy-intensive and could potentially offer a more sustainable option for securing blockchain networks without the significant environmental impact of traditional mining.
How is the Texas government responding to the issue of Bitcoin mining noise pollution? The response includes monitoring noise levels and exploring legal and regulatory measures to manage the impact of mining operations. However, existing laws offer limited recourse, and there is ongoing discussion about the need for more effective regulations.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ d6c48950:54d57756
2025-03-08 08:17:06This post is going to cover some very basic habits and sanity checks that offer large returns over time whilst having a very low cost and in that theme I’m going to keep this to a condensed bullet point list.
how to get the solution faster - You solve problems every day, when you have a goal and try to achieve it, when you face a shortcoming and try and overcome it, when you have an issue and resolve it - As a habit each time you solve a problem go over your actual thoguht process, how did you solve it? - After you’ve looked critically at it ask how you could have improved it
if someones better do what they tell you - I’ve noticed a lot of people won’t take advice from people who knows better (I think because they feel if they just do what they’re told it doesn’t feel like ‘their’ accomplishment) - If someone is more credible than you and the advice they give is credible just do what you’re told
accept easy/simple solutions - Weight loss is incredibly simple, you weigh yourself daily, count your calories and maintain a deficit of 200-500kcal daily, apps automate most of the heavy lifting - As a human it’s natural to fight against simple/easy solutions to longstanding problems - “Not only has this thing been destroying my life for years but the solution is easy and something everyone already knows? the solution is the thing everyones been telling me since the problem first started?” - supress the urge to push it away and just accept the solution, even if it means your problem was mostly self inflicted and easily avoidable
log predictions - Keep a log of your predictions (I use apple numbers) then also log your confidence (55%, 65%, 75%, 85%, 95%) in each prediction and see how close you are - If you make 100 predictions at 55% confidence only 55 of them should be correct, if more are correct you’re underconfident if less are correct you’re overconfident
working harder is almost always beneficial - Despite the doomerish advice hard work and time spent working is beneficial way more than most people give it credit for - there’s probably a point at which it tops off (16hrs a day might be marginally better than 12hrs) but it’s way higher than you’d instinctively expect - Try working longer hours and harder and see how you do, in my view burnout is probably a non issue if other factors of your life (sleep, diet, exercise, stress management) are correct,
basic stuff works very well - Certain basic advice (sleep, exercise, don’t take recreational drugs, don’t drink) are not only increidlby consistent but they also have very large effect sizes, do the basic stuff before moving onto the more esoteric like nicotine patches or adderall
-
@ d6c48950:54d57756
2025-03-08 08:16:05This is just a readme for my github site - this is the best way to access my blog in my opinion, it's split into several "chunks" - Layer 1, Core and central content - Layer 2, Stuff that builds upon core - Layer 3, Misc
My blog can also be found on posthaven here that has more detailed tags and a search feature - obviously my posts can also be found on nostr
-
@ da0b9bc3:4e30a4a9
2025-03-08 07:03:33Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/907271
-
@ 220522c2:61e18cb4
2025-03-08 06:19:30Comet is available on Linux
The Comet longform desktop app is available as an AppImage for Linux.
linux
-
@ 291c75d9:37f1bfbe
2025-03-08 04:09:59In 1727, a 21-year-old Benjamin Franklin gathered a dozen men in Philadelphia for a bold experiment in intellectual and civic growth. Every Friday night, this group—known as the Junto, from the Spanish juntar ("to join")—met in a tavern or private home to discuss "Morals, Politics, or Natural Philosophy (science)." Far from a casual social club, the Junto was a secret society dedicated to mutual improvement, respectful discourse, and community betterment. What began as a small gathering of tradesmen and thinkers would leave a lasting mark on Franklin’s life and colonial America.
Printers are educated in the belief that when men differ in opinion, both sides ought equally to have the advantage of being heard by the public, and that when Truth and Error have fair play, the former is always an overmatch for the latter. - Benjamin Franklin
The Junto operated under a clear set of rules, detailed by Franklin in his Autobiography:
"The rules that I drew up required that every member, in his turn, should produce one or more queries on any point of Morals, Politics, or Natural Philosophy, to be discuss’d by the company; and once in three months produce and read an essay of his own writing, on any subject he pleased. Our debates were to be under the direction of a president, and to be conducted in the sincere spirit of inquiry after truth, without fondness for dispute, or desire of victory; and, to prevent warmth [heatedness], all expressions of positiveness in opinions, or direct contradiction, were after some time made contraband and prohibited under small pecuniary penalties [monetary fines]."
These guidelines emphasized collaboration over competition. Members were expected to contribute questions or essays, sparking discussions that prioritized truth over ego. To keep debates civil, the group even imposed small fines for overly assertive or contradictory behavior—a practical nudge toward humility and open-mindedness. (Yes, I believe that is an ass tax!)
Rather than admitting new members, Franklin encouraged existing ones to form their own discussion groups. This created a decentralized network of groups ("private relays," as I think of them), echoing the structure of modern platforms like NOSTR—while preserving the Junto’s exclusivity and privacy.
From the beginning, they made it a rule to keep these meetings secret, without applications or admittance of new members. Instead, Franklin encouraged members to form their own groups—in a way acting as private relays of sorts. (I say "private" because they continued to keep the Junto secret, even with these new groups.)
Membership: A Diverse Circle United by Values
The Junto’s twelve founding members came from varied walks of life—printers, surveyors, shoemakers, and clerks—yet shared a commitment to self-improvement. Franklin, though the youngest (around 21 when the group formed), led the Junto with a vision of collective growth. To join, candidates faced a simple vetting process, answering four key questions:
- Have you any particular disrespect for any present members? Answer: I have not.
- Do you sincerely declare that you love mankind in general, of what profession or religion soever? Answer: I do.
- Do you think any person ought to be harmed in his body, name, or goods, for mere speculative opinions, or his external way of worship? Answer: No.
- Do you love truth for truth’s sake, and will you endeavor impartially to find and receive it yourself and communicate it to others? Answer: Yes.
These criteria reveal the Junto’s core values: respect, tolerance, and an unwavering pursuit of truth. They ensured that members brought not just intellect but also character to the table—placing dialogue as the priority.
One should also note the inspiration from the "Dry Club" of John Locke, William Popple, and Benjamin Furly in the 1690s. They too required affirmation to:
- Whether he loves all men, of what profession or religion soever?
- Whether he thinks no person ought to be harmed in his body, name, or goods, for mere speculative opinions, or his external way of worship?
- Whether he loves and seeks truth for truth’s sake; and will endeavor impartially to find and receive it himself, and to communicate it to others?
And they agreed: "That no person or opinion be unhandsomely reflected on; but every member behave himself with all the temper, judgment, modesty, and discretion he is master of."
The Discussions: 24 Questions to Spark Insight
Franklin crafted a list of 24 questions to guide the Junto’s conversations, ranging from personal anecdotes to civic concerns. These prompts showcase the group’s intellectual breadth. Here are some of my favorites:
Hath any citizen in your knowledge failed in his business lately, and what have you heard of the cause? Have you lately heard of any citizen’s thriving well, and by what means? Do you know of any fellow citizen who has lately done a worthy action, deserving praise and imitation? Do you think of anything at present in which the Junto may be serviceable to mankind, their country, friends, or themselves? Have you lately observed any defect in the laws of your country, which it would be proper to move the legislature for an amendment? Do you know of any deserving young beginner lately set up, whom it lies in the power of the Junto any way to encourage?
(Read them all here.)
Note the keen attention to success and failure, and the reflection on both. Attention was often placed on the community and individual improvement beyond the members of the group. These questions encouraged members to share knowledge, reflect on virtues and vices, and propose solutions to real-world problems. The result? Discussions that didn’t just end at the tavern door but inspired tangible community improvements.
The Junto’s Legacy: America’s First Lending Library
One of the Junto’s most enduring contributions to Philadelphia—and indeed, to the American colonies—was the creation of the first lending library in 1731. Born from the group’s commitment to mutual improvement and knowledge-sharing, this library became a cornerstone of public education and intellectual life in the community.
The idea for the library emerged naturally from the Junto’s discussions. Members, who came from diverse backgrounds but shared a passion for learning, recognized that their own access to books was often limited and costly—and they referred to them often. To address this, they proposed pooling their personal collections to create a shared resource. This collaborative effort allowed them—and eventually the broader public—to access a wider range of books than any individual could afford alone.
The library operated on a simple yet revolutionary principle: knowledge should be available to all, regardless of wealth or status. By creating a lending system, the Junto democratized access to information, fostering a culture of self-education and curiosity. This was especially significant at a time when books were scarce and formal education was not universally accessible.
The success of the Junto’s library inspired similar initiatives across the colonies, laying the groundwork for the public library system we know today. It also reflected the group’s broader mission: to serve not just its members but the entire community. The library became a symbol of the Junto’s belief in the power of education to uplift individuals and society alike.
With roots extending back to the founding of the Society in 1743, the Library of the American Philosophical Society houses over thirteen million manuscripts, 350,000 volumes and bound periodicals, 250,000 images, and thousands of hours of audiotape. The Library’s holdings make it one of the premier institutions for documenting the history of the American Revolution and Founding, the study of natural history in the 18th and 19th centuries, the study of evolution and genetics, quantum mechanics, and the development of cultural anthropology, among others.
The American Philosophical Society Library continues today. I hope to visit it myself in the future.
Freedom, for Community
Comparing the Junto to Nostr shows how the tools of community and debate evolve with time. Both prove that people crave spaces to connect, share, and grow—whether in a colonial tavern or a digital relay. Yet their differences reveal trade-offs: the Junto’s structure offered depth and focus but capped its reach, while Nostr’s openness promises scale at the cost of order.
In a sense, Nostr feels like the Junto’s modern echo—faster, bigger, and unbound by gates or rules. Franklin might admire its ambition, even if he’d raise an eyebrow at its messiness. For us, the comparison underscores a timeless truth: no matter the medium, the drive to seek truth and build community endures.
The Autobiography of Benjamin Franklin (1771–1790, pub. 1791)
http://www.benjamin-franklin-history.org/junto-club/
Benjamin Franklin, Political, Miscellaneous, and Philosophical Pieces, ed. Benjamin Vaughan (London: 1779), pp. 533–536.
"Rules of a Society" in The Remains of John Locke, Esq. (1714), p. 113
npubpro
-
@ c3ae4ad8:e54d46cb
2025-03-08 03:38:15This is for one serving (I'm currently doing a >500 cal low carb meal plan). Next time, I'll scramble an egg in there to up the protein a little more. High-protein, low-carb stir fry made with turkey, broccoli, snow peas, green onions, savoy cabbage, bok choy, garlic, in a sesame, soy and ginger sauce.
INGREDIENTS
- 1/3 lb / 170g ground turkey (I used 93% lean, hormone-free/organic)
- 2 tsp light olive oil or coconut oil
- 3 TB soy sauce, tamari, or coconut aminos
- 1 cup / 85g mixed stir fry greens, your choice (cabbage, bok choy, etc.)
- Half a bunch of green onion, roughly chopped, green parts only
- Dash of crushed red pepper flakes
- 1 clove minced garlic
- 1 tsp minced ginger
- Sesame seeds (optional, black, regular, or both!)
- 1 tsp sesame oil
DIRECTIONS
1. Heat oil in a skillet and add the ground turkey once the oil starts to shimmer.
2. On medium-high heat, cook the ground turkey, breaking it into bite-size pieces as it cooks, drizzling 1 TB of the soy sauce over the meat a little at a time. You want to evaporate the water out of the meat, so keep letting it cook until it's actually browned—the soy sauce helps with this, but you want the milliard reaction here (look it up and thank me later)!
3. Decrease the heat to low. Push the cooked turkey to one side and tilt the pan a bit away from you so the oil is isolated, and add the garlic into the oil and stir it in there a little bit.
4. Once the garlic is fragrant, stir the meat back into the garlic, toss in the chopped veggies, green onions, and remaining 1 TB of soy sauce. Then add the minced ginger and red pepper flakes on top, and quickly cover the pan with a lid. Let it steam for about 6-8 minutes on medium-low heat.
5. After the veggies are cooked, stir the little pile of steamed ginger into the mix, drizzle the sesame seed oil over the meat and veggies, stir again, and serve hot with optional sesame seeds as a garnish. Enjoy!
For more food and recipes by me, visit https://ketobeejay.npub.pro/ and click on "recipes" at the top
-
@ 7b3f7803:8912e968
2025-03-08 03:05:16Libertarians believe in open borders in theory. In practice, open borders don't work, because, among other things, the combination with a welfare state creates a moral hazard, and the least productive of society end up within the borders of welfare states and drain resources. The social services are paid by the productive people of the country or, in the case of most fiat systems, by currency holders through inflation. Welfare states are much more likely under fiat money and the redistribution goes from native taxpayers to illegal immigrants. Thus, under fiat money, open borders end up being an open wound by which the productive lifeblood of the country bleeds out, despite the theoretical trade-efficiency benefits. As libertarians like to say, open borders and the welfare state don't mix. In this article, we'll examine the other sacred cow of libertarian thought: free trade.
Free Trade without Libertarian Ideals
Free trade is very similar to free movement of labor in that it works great in theory, but not in practice, especially under fiat money. In a libertarian free-market world, free trade works. But that assumes a whole host of libertarian ideals like sound money, non-interfering governments, and minimal aggression. Once those ideals are violated, such as with government intervention in the market, similar moral hazards and long-term costs come with them, making free trade about as libertarian as a fractional reserve bank.
An example will illustrate what I'm talking about. Let's say Portugal subsidizes their wine for export to other countries. The obvious first-order effect is that it makes Portuguese wine cheaper in France, perhaps undercutting the price of French wine. Libertarians would say, that's great! French customers get cheaper goods, so what's the problem?
As with any government intervention, there are significant second- and third-order effects in play. Subsidization puts unsubsidized companies at risk, perhaps driving them to bankruptcy. In this case, this might be a French wine maker. Subsidized companies may become zombies instead of dying out. In this case, this might be a Portuguese wine maker that was failing domestically but survives by selling to customers abroad with government subsidies. While French customers benefit in the short run with cheaper prices for wine, they are ultimately hurt because the goods that would have existed without government intervention never come to market. Perhaps French wine makers that went bankrupt were innovating. Perhaps the resources of the zombie Portuguese wine maker would have created something better.
Further, the dependency of French people on Portuguese wine means that something going wrong in Portugal, like a war or subsidy cuts, disrupts the supply and price of wine for France. Now France must meddle in Portugal internationally if it doesn't want the wine supply to get disrupted. The two countries get entangled in such a way as to become more interventionist internationally. A war involving Portugal now suddenly becomes France's business and incentivizes military aid or even violence. As usual, the unseen effects of government policy are the most pernicious.
Not Really Free
In other words, what we call free trade isn't really free trade. A country exporting to the US may subsidize their products through government intervention, making the product cheaper in the US. This hurts US companies, and they’re forced into choices they never would have had to face without the foreign government intervention. But because the good is crossing borders under the rubric of "free trade," it's somehow seen as fair. Of course it's not, as government intervention distorts the market whether it's done by our own government or a foreign government.
So why would a foreign government do this? It gets several benefits through targeted market manipulation. First, it makes its own companies' products more popular abroad and conversely, makes US companies' products less popular. This has the dual benefit of growing the foreign government’s firms and shrinking, perhaps bankrupting, the US ones.
Targeted subsidization like this can lead to domination under free trade. It's not unlike the Amazon strategy of undercutting everyone first and using the monopoly pricing power at scale once everyone else has bankrupted. The global monopoly is tremendously beneficial to the country that has it. Not only is there significant tax revenue over the long term, but also a head start on innovations within that industry and an advantage in production in the adjacent industries around the product.
Second, the manufacturing centralization gives that country leverage geo-politically. A critical product that no one else manufactures means natural alliances with the countries that depend on the product, which is especially useful for smaller countries like Taiwan. Their chip manufacturing industry, holding 60% of global supply (2024), has meant that they're a critical link for most other countries, and hence, they can use this fact to deter Chinese invasion.
Third, because of the centralization of expertise, more innovations, products, and manufacturing will tend to come within the country. This increased production has cascading benefits, including new industries and national security. China leads the world in drone technology, which undoubtedly has given it an innovation advantage for its military, should it go to war.
Fourth, the capital that flows into the country for investing in the monopolized industry will tend to stay, giving the country more wealth in the form of factories, equipment, and skills. While that capital may nominally be in the hands of foreigners, over time, the ownership of that industry will inevitably transition toward native locals, as the knowledge about how to run such industries gets dissipated within the country.
[Image: Map showing “China Drone Tech” and “Taiwan Chips” hubs, with arrows of capital flow staying local]
Currency Devaluation: The Universal Trade Weapon
It would be one thing if only a specific industry were singled out for government subsidies and then the products dumped into the US as a way to hurt US companies, as that would limit the scope of the damage. But with currency devaluation, a government can subsidize all of its exports at the same time. Indeed, this is something that many countries do. While short-term, this helps US consumers, it hurts US companies and forces them into decisions that aren't good for the US.
To compete, they have to lower costs by using the same devalued currency to pay their labor as their foreign competition. That is, by relocating their capital, their manufacturing, and even their personnel to the country that's devaluing the currency. Not only does relocating reduce labor cost, but it also often gets them benefits like tax breaks. This makes US companies de facto multinationals and not only makes them subject to other jurisdictions, but ultimately divides their loyalties. To take advantage of the reduced labor, capital must move to another country and, along with it, future innovation.
Such relocations ultimately leave the company stripped of their manufacturing capability in the US, as local competition will generally fare better over the long run. Much of the value of the industry then is captured by other governments in taxes, development, and even state-owned companies. Free trade, in other words, creates a vulnerability for domestic companies as they can be put at a significant disadvantage compared to foreign counterparts.
Hidden Effects of Foreign Intervention
Unlike the multinationals, small companies have no chance as they're not big enough to exploit the labor arbitrage. And as is usual in a fiat system, they suffer the most while the giant corporations get the benefits of the supposed "free trade". Most small companies can't compete, so we get mostly the bigger companies that survive.
The transition away from domestic manufacturing necessarily means significant disruption. Domestic workers are displaced and have to find new work. Factories and equipment either have to be repurposed or rot. Entire communities that depended on the manufacturing facility now have to figure out new ways to support themselves. It's no good telling them that they can just do something else. In a currency devaluation scenario, most of the manufacturing leaves and the jobs left are service-oriented or otherwise location-based, like real estate development. There's a natural limit to location-based industries because the market only grows with the location that you're servicing. Put another way, you can only have so many people give haircuts or deliver packages in a geographic area. There has to be some manufacturing of goods that can be sold outside the community, or the community will face scarce labor opportunities relative to the population.
You also can't say the displaced workers can start some other manufacturing business. Such businesses will get out-competed on labor by the currency-devaluing country, so there won't be much investment available for such a business, and even if there were, such a business would be competing with its hands tied behind its back. So in this scenario, what you end up with are a large pool of unemployed people whom the state subsidizes with welfare.
So when a US company leaves or goes bankrupt due to a foreign government's subsidies, the disruption alone imposes a significant short-term cost with displaced labor, unused capital goods, and devastated communities.
Mitigations
So how do countries fight back against such a devastating economic weapon? There are a few ways countries have found around this problem of currency devaluation under free trade. First, a country can prevent capital from leaving. This is called capital controls, and many countries, particularly those that manufacture a lot, have them. Try to get money, factories, or equipment out of Malaysia, for example, and you'll find that they make it quite difficult. Getting the same capital into the country, on the other hand, faces few restrictions. Unfortunately, the US can't put in capital controls because dollars are its main export. It is, after all, the reserve currency of the world.
Second, you can compete by devaluing your own currency. But that’s very difficult because it requires printing a lot of dollars, and that causes inflation. There's also no guarantee that a competing country doesn't devalue its currency again. The US is also in a precarious position as the world's reserve currency, so devaluing the currency more than it already does will make other holders of the dollar less likely to want to hold it, threatening the reserve currency status.
So the main two mitigations against currency devaluation in a free trade scenario are not available to the US. So what else is there? The remaining option is to drop free trade. The solution, in other words, is to add tariffs. This is how you can nullify the effects of foreign government intervention, by leveling the playing field for US manufacturers.
Tariffs
One major industry that's managed to continue being manufactured in the US despite significant foreign competition is cars. Notably, cars have a tariff, which incentivizes their manufacture in the US, even for foreign car makers. The tariff has acted as a way to offset foreign government subsidies and currency debasement.
The scope of this one industry for the US is huge. There are around 300,000 direct jobs in auto assembly within the US (USTR) and there are an additional 3 million jobs supplying these manufacturers within the US. But the benefits don't end there. The US is also creating a lot of innovation around cars, such as self-driving and plug-in electric cars. There are many countries that would love to have this industry for themselves, but because of tariffs, auto manufacturing continues in the US.
And though tariffs are seen as a tax on consumers, US car prices are cheap relative to the rest of the world. What surprises a lot of people when they move from the US to other countries is finding out that the same car often costs more abroad (e.g. 25% tariffs keep U.S. prices 20% below Europe’s $40K average, 2024). The downside of tariffs pales next to the downsides of "free trade."
Free Trade Doesn’t Work with Fiat Money
The sad reality is that while we would love for free trade to work in the ideal libertarian paradise, it won't in our current fiat-based system. The subsidization by foreign governments to bankrupt US companies or to make them multinational, combined with the unfortunate reality of the US dollar being the world reserve currency, means that free trade guts the US of manufacturing. Tariffs are a reasonable way to protect US manufacturers, particularly smaller ones that can't go multinational.
What's more, tariffs make the US less fragile and less dependent on international supply chains. Many of the wars in the past 60 years have been waged because of the entanglements the US has with other countries due to the reliance on international supply chains. Lessening this dependency, if only to prevent a war, has clear value.
Lastly, labor has been devalued significantly by fiat monetary expansion, but at least some of that can be recovered if tariffs create more manufacturing, which in turn adds to the demand for labor. This should reduce the welfare state as more opportunities are made available and fewer unemployed people will be on the rolls.
Conclusion
Fiat money produces a welfare state, which makes open borders unworkable. Fiat money also gives foreign governments a potent economic weapon to use against US companies, and by extension the labor force that powers them. Though currency debasement and capital controls are available to other countries as a defense, for the US, neither of these tools is available due to the fact that the dollar is the world reserve currency. As such, tariffs are a reasonable defense against the fiat subsidization of foreign governments.
-
@ 7b3f7803:8912e968
2025-03-08 02:28:40Libertarians believe in open borders in theory. In practice, open borders don’t work, because, among other things, the combination with a welfare state creates a moral hazard, and the least productive of society end up within the borders of welfare states and drain resources. The social services are paid by the productive people of the country or, in the case of most fiat systems, by currency holders through inflation. Welfare states are much more likely under fiat money and the redistribution goes from native taxpayers to illegal immigrants. Thus, under fiat money, open borders end up being an open wound by which the productive lifeblood of the country bleeds out, despite the theoretical trade-efficiency benefits. As libertarians like to say, open borders and the welfare state don’t mix. In this article, we’ll examine the other sacred cow of libertarian thought: free trade.
Free Trade without Libertarian Ideals
Free trade is very similar to free movement of labor in that it works great in theory, but not in practice, especially under fiat money. In a libertarian free-market world, free trade works. But that assumes a whole host of libertarian ideals like sound money, non-interfering governments, and minimal aggression. Once those ideals are violated, such as with government intervention in the market, similar moral hazards and long-term costs come with them, making free trade about as libertarian as a fractional reserve bank.
An example will illustrate what I’m talking about. Let’s say Portugal subsidizes their wine for export to other countries. The obvious first-order effect is that it makes Portuguese wine cheaper in France, perhaps undercutting the price of French wine. Libertarians would say, that’s great! French customers get cheaper goods, so what’s the problem?
As with any government intervention, there are significant second- and third-order effects in play. Subsidization puts unsubsidized companies at risk, perhaps driving them to bankruptcy. In this case, this might be a French wine maker. Subsidized companies may become zombies instead of dying out. In this case, this might be a Portuguese wine maker that was failing domestically but survives by selling to customers abroad with government subsidies. While French customers benefit in the short run with cheaper prices for wine, they are ultimately hurt because the goods that would have existed without government intervention never come to market. Perhaps French wine makers that went bankrupt were innovating. Perhaps the resources of the zombie Portuguese wine maker would have created something better.
Further, the dependency of French people on Portuguese wine means that something going wrong in Portugal, like a war or subsidy cuts, disrupts the supply and price of wine for France. Now France must meddle in Portugal internationally if it doesn’t want the wine supply to get disrupted. The two countries get entangled in such a way as to become more interventionist internationally. A war involving Portugal now suddenly becomes France’s business and incentivizes military aid or even violence. As usual, the unseen effects of government policy are the most pernicious.
Not Really Free
In other words, what we call free trade isn’t really free trade. A country exporting to the US may subsidize their products through government intervention, making the product cheaper in the US. This hurts US companies, and they’re forced into choices they never would have had to face without the foreign government intervention. But because the good is crossing borders under the rubric of “free trade,” it’s somehow seen as fair. Of course it’s not, as government intervention distorts the market whether it’s done by our own government or a foreign government.
So why would a foreign government do this? It gets several benefits through targeted market manipulation. First, it makes its own companies’ products more popular abroad and conversely, makes US companies’ products less popular. This has the dual benefit of growing the foreign government’s firms and shrinking, perhaps bankrupting, the US ones.
Targeted subsidization like this can lead to domination under free trade. It’s not unlike the Amazon strategy of undercutting everyone first and using the monopoly pricing power at scale once everyone else has bankrupted. The global monopoly is tremendously beneficial to the country that has it. Not only is there significant tax revenue over the long term, but also a head start on innovations within that industry and an advantage in production in the adjacent industries around the product.
Second, the manufacturing centralization gives that country leverage geo-politically. A critical product that no one else manufactures means natural alliances with the countries that depend on the product, which is especially useful for smaller countries like Taiwan. Their chip manufacturing industry, holding 60% of global supply (2024), has meant that they’re a critical link for most other countries, and hence, they can use this fact to deter Chinese invasion.
Third, because of the centralization of expertise, more innovations, products, and manufacturing will tend to come within the country. This increased production has cascading benefits, including new industries and national security. China leads the world in drone technology, which undoubtedly has given it an innovation advantage for its military, should it go to war.
Fourth, the capital that flows into the country for investing in the monopolized industry will tend to stay, giving the country more wealth in the form of factories, equipment, and skills. While that capital may nominally be in the hands of foreigners, over time, the ownership of that industry will inevitably transition toward native locals, as the knowledge about how to run such industries gets dissipated within the country.
Currency Devaluation: The Universal Trade Weapon
It would be one thing if only a specific industry were singled out for government subsidies and then the products dumped into the US as a way to hurt US companies, as that would limit the scope of the damage. But with currency devaluation, a government can subsidize all of its exports at the same time. Indeed, this is something that many countries do. While short-term, this helps US consumers, it hurts US companies and forces them into decisions that aren’t good for the US.
To compete, they have to lower costs by using the same devalued currency to pay their labor as their foreign competition. That is, by relocating their capital, their manufacturing, and even their personnel to the country that’s devaluing the currency. Not only does relocating reduce labor cost, but it also often gets them benefits like tax breaks. This makes US companies de facto multinationals and not only makes them subject to other jurisdictions, but ultimately divides their loyalties. To take advantage of the reduced labor, capital must move to another country and, along with it, future innovation.
Such relocations ultimately leave the company stripped of their manufacturing capability in the US, as local competition will generally fare better over the long run. Much of the value of the industry then is captured by other governments in taxes, development, and even state-owned companies. Free trade, in other words, creates a vulnerability for domestic companies as they can be put at a significant disadvantage compared to foreign counterparts.
Hidden Effects of Foreign Intervention
Unlike the multinationals, small companies have no chance as they’re not big enough to exploit the labor arbitrage. And as is usual in a fiat system, they suffer the most while the giant corporations get the benefits of the supposed “free trade”. Most small companies can’t compete, so we get mostly the bigger companies that survive.
The transition away from domestic manufacturing necessarily means significant disruption. Domestic workers are displaced and have to find new work. Factories and equipment either have to be repurposed or rot. Entire communities that depended on the manufacturing facility now have to figure out new ways to support themselves. It’s no good telling them that they can just do something else. In a currency devaluation scenario, most of the manufacturing leaves and the jobs left are service-oriented or otherwise location-based, like real estate development. There’s a natural limit to location-based industries because the market only grows with the location that you’re servicing. Put another way, you can only have so many people give haircuts or deliver packages in a geographic area. There has to be some manufacturing of goods that can be sold outside the community, or the community will face scarce labor opportunities relative to the population.
You also can’t say the displaced workers can start some other manufacturing business. Such businesses will get out-competed on labor by the currency-devaluing country, so there won’t be much investment available for such a business, and even if there were, such a business would be competing with its hands tied behind its back. So in this scenario, what you end up with are a large pool of unemployed people whom the state subsidizes with welfare.
So when a US company leaves or goes bankrupt due to a foreign government’s subsidies, the disruption alone imposes a significant short-term cost with displaced labor, unused capital goods, and devastated communities.
Mitigations
So how do countries fight back against such a devastating economic weapon? There are a few ways countries have found around this problem of currency devaluation under free trade. First, a country can prevent capital from leaving. This is called capital controls, and many countries, particularly those that manufacture a lot, have them. Try to get money, factories, or equipment out of Malaysia, for example, and you’ll find that they make it quite difficult. Getting the same capital into the country, on the other hand, faces few restrictions. Unfortunately, the US can’t put in capital controls because dollars are its main export. It is, after all, the reserve currency of the world.
Second, you can compete by devaluing your own currency. But that’s very difficult because it requires printing a lot of dollars, and that causes inflation. There’s also no guarantee that a competing country doesn’t devalue its currency again. The US is also in a precarious position as the world’s reserve currency, so devaluing the currency more than it already does will make other holders of the dollar less likely to want to hold it, threatening the reserve currency status.
So the main two mitigations against currency devaluation in a free trade scenario are not available to the US. So what else is there? The remaining option is to drop free trade. The solution, in other words, is to add tariffs. This is how you can nullify the effects of foreign government intervention, by leveling the playing field for US manufacturers.
Tariffs
One major industry that’s managed to continue being manufactured in the US despite significant foreign competition is cars. Notably, cars have a tariff, which incentivizes their manufacture in the US, even for foreign car makers. The tariff has acted as a way to offset foreign government subsidies and currency debasement.
The scope of this one industry for the US is huge. There are around 300,000 direct jobs in auto assembly within the US (USTR) and there are an additional 3 million jobs supplying these manufacturers within the US. But the benefits don’t end there. The US is also creating a lot of innovation around cars, such as self-driving and plug-in electric cars. There are many countries that would love to have this industry for themselves, but because of tariffs, auto manufacturing continues in the US.
And though tariffs are seen as a tax on consumers, US car prices are cheap relative to the rest of the world. What surprises a lot of people when they move from the US to other countries is finding out that the same car often costs more abroad (e.g. 25% tariffs keep U.S. prices 20% below Europe’s $40K average, 2024). The downside of tariffs pales next to the downsides of “free trade.”
Free Trade Doesn’t Work with Fiat Money
The sad reality is that while we would love for free trade to work in the ideal libertarian paradise, it won’t in our current fiat-based system. The subsidization by foreign governments to bankrupt US companies or to make them multinational, combined with the unfortunate reality of the US dollar being the world reserve currency, means that free trade guts the US of manufacturing. Tariffs are a reasonable way to protect US manufacturers, particularly smaller ones that can’t go multinational.
What’s more, tariffs make the US less fragile and less dependent on international supply chains. Many of the wars in the past 60 years have been waged because of the entanglements the US has with other countries due to the reliance on international supply chains. Lessening this dependency, if only to prevent a war, has clear value.
Lastly, labor has been devalued significantly by fiat monetary expansion, but at least some of that can be recovered if tariffs create more manufacturing, which in turn adds to the demand for labor. This should reduce the welfare state as more opportunities are made available and fewer unemployed people will be on the rolls.
Conclusion
Fiat money produces a welfare state, which makes open borders unworkable. Fiat money also gives foreign governments a potent economic weapon to use against US companies, and by extension the labor force that powers them. Though currency debasement and capital controls are available to other countries as a defense, for the US, neither of these tools is available due to the fact that the dollar is the world reserve currency. As such, tariffs are a reasonable defense against the fiat subsidization of foreign governments.
-
@ df478568:2a951e67
2025-03-08 02:16:57I began using/testing Cashu over 105,120 blocks ago when @NVK said "Cashu is very interesting.".
The first time I swapped sweet cipher-text to sats, it was too new new and novel to digest. Someone sent me cashu over nostr, straight to my npub. I copy pasta-ed it into my minibits wallet and recieved 10 sats. In retrospect, I would compare it to gold backed paper currency. Over a century ago, paper USD was a coupon for gold, "redeemable in gold on demand at the United States Treasury, or in gold for lawful money at any federal reserve bank.
In the analog days of the early 20th century a bean-counter at a Federal Reserve bank would give you approximately 5 ounces of gold for an analog bored ape, Ben Franklin. Cashu is an NFT without the jpeg and the innate ability to be redeemed for bitcoin over the lightning network. I've heard NVK describe it as "an honest shitcoin" and I like this framing. The rug-pull risk is greater than zero, but less than the rug-pull risk of Wallet of Satoshi with the added benefit of generational wealth.
This means we can abstract bitcoin value into something that looks like this.
cashuBpGFteCJodHRwczovL21pbnQubWluaWJpdHMuY2FzaC9CaXRjb2luYXVjc2F0YXSBomFpSABQBVDwSUFGYXCCpGFhAmFzeEBkMzM2Mjk1OTZhNTVkODcyNWFjOGI3MDQyNjM5MjQ0OTU4YmJlMjVkYmFhYzIyY2E5Y2M2NTMyNTM1OWFiZDI2YWNYIQNOrrDCFnYa3sMJxpr02o8Bg5AfibjqIOTmiktqYkABKWFko2FlWCBdC0gEM2j5YE4_xMGyuvLHIufqx7zzp6TNJAeJiB6_WmFzWCDRMyyGRmJPYmwB3u8kB7fyBlvRm69hC2DfkyY5Mizd-WFyWCB_88znXGBc_GgRngr9m1nEYAJEDUkQiQLT1e6R9_Un_aRhYQhhc3hANjVkYWQyM2ExNjQyNTYzMDU5OGRmMTdiNDc0YWQ0YzdhMjNhMmFiZjUwNjEzYTdjOTI4NzllMDllZTg5ODcxZWFjWCECoRg-ub_wReP4T6A0UuwqS36Iw6Ton4U5j6IJrLYjKCxhZKNhZVggmXDv_na1XQU3ESYq147mIyDyQm5mgsnkl7HxBbVmXv9hc1ggIbKkVVdG06hBgAvWBhoFo8T-V6MjNzxUGNaGjQjU2e5hclggAJp2vzdgwmehnhwmmFQsZ_BNTb8Aqz_ItwOx0iLQ9NlhZHgtQ29uZ3JhdHVsYXRpb25zIGZvciBjbGFpbWluZyB0aGlzIGVjYXNoIGZpcnN0
The lightning network is cool, but requires the reciever to have a wallet. Many Americans began using nostr when Wallet of Satoshi was available to them. They disappeared like a magiian once Wallet of Satoshi was removed from the app stores. To be fair, it still works. Last I checked, sats from wallet of satoshi can still be received and spent from US based IP addresses, but non-technical noobs can no longer download it from app stores designed for the neuro-typical.
I sprinkled a little e cash in a few Substack articles, but few people know what it is. These things takes time. Maybe it's too early. Maybe, just maybe, we can make paper cash great again.
Is it a long shot? Sure. Will I try it anyway? Hell yes!
How To Make Paper Money Great Again
The plan: Create paper products with QR codes that have Cashu. Think tip cards or birtday cards designed to hold cash. You can choose your mint on Mibibits or Macadamia depending on your pnone. This is not bitcoin for posterity. We're talking about pocket spending money, not generational wealth.
I plan to make and sell greeting cards: HallMarc cards.😉 I draw like I'm 5, but we'll let the market decide if they prefer my Kidnergarden-style art or Ideogram. Then I'll write some cheesy words people like on greeting cards. Here's my first idea.
Happy Birthday
Stack Sats.
Okay....So it's more like a first draft, but this is a proof of concept. Cut me some slack. 😅 There's still a few kinks to work out, but here's the prototype.
Set Up Shop With A Free And Open Source Version
I will add these cards to my merch shop. I can add 1,000 sats, maybe some custom amounts, but I'll also open source them. I like to give cards that pay bitcoin to kids in my family. If I open source this, maybe more people will be willing to give the kids in their family sats. It only costs card stock paper, ink, and the sats you give away.
If you're like me, your family knows your a bitcoin dork anyway. We might as well show them it's not just an investment. It's money we can give them they can either save or spend.
We should mention it's better to save bitcoin. That's what stacking sats means. That will be my second draft.
Happy Birthday.
Save as much bitcoin as you can.
Npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
https://mempool.marc26z.com/block/000000000000000000001567ce65dab25358bcae86c2c573984888eb08948b65
https://marc26z.com/merch/
-
@ 6e0ea5d6:0327f353
2025-03-08 01:31:14💀
No one returns the same after witnessing such great disrespect that even the eyes doubt what they see.
When behavior does not match the promise, when the path being followed contradicts our principles, when a lie unfolds right before our eyes, or when an offense is deliberately crafted as a test of our resolve, a feeling arises—one that urges us to intervene, to stop such foolishness so that things may proceed as they should. But it is an arrow already released. It cannot be retrieved. There is no turning back. And perhaps, Nietzsche’s words explain it best:
"I’m not upset that you lied to me; I’m upset that from now on, I can’t trust you."
This is what we feel, in conflict with what we know. But maturity has taught us whom to listen to. The mind knows that one must be cruel to oneself so that others will not be cruel to us.
It takes cruelty to kill with indifference what desires to live in our hearts.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 6e0ea5d6:0327f353
2025-03-08 01:17:35Ascolta bene, amico mio. Are you really concerned about what a morally bankrupt society has to say about "being a man"?
The same society that glorifies weakness, where anyone—without the slightest idea of what it means to bear the weight of masculinity—thinks they have the right to an opinion? And, of course, we can’t forget the spectacle: women without any solid paternal reference, never having experienced what it means to have a true masculine figure, now feel entitled to dictate how you should live, act, and even feel. This is more than a joke—it’s the tragic portrait of a civilization on the brink of collapse.
Think about it: it’s as if someone who has never held a hammer tried to teach a blacksmith how to forge steel. What do they know about the burden of being a man? They have never had to carry this weight. They have never known what it is to walk alone, facing the world without guarantees, without anyone to catch them when everything falls apart. Talking is easy, amico mio, when they’ve never had to get their hands dirty with the brutal reality we face every day.
Want to know what you should do? Ignore it. Simple as that. The opinion of those who have never walked your path holds no value. Do not take seriously the judgments of those trapped in a modern fantasy of masculinity, shaped by empty ideals that only encourage weakness. If these women have never had a strong father figure, a real example of masculinity, what do they know about being a man? Nothing. And the worst part: they don’t even realize the emptiness of their words.
And here’s the lesson: you don’t need the approval of a lost society that doesn’t understand the value of discipline, strength, and the sacrifice that true masculinity demands. You don’t need to be shaped by the expectations of this dying world. The only respect that matters is the one you have for yourself. Once you understand this, the judgment of others becomes irrelevant, and their voices fade into the wind like an insignificant breeze.
Who do you want to be respected by? A society that glorifies mediocrity? Or by those who, like you, know the true struggle?
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 4925ea33:025410d8
2025-03-08 00:38:481. O que é um Aromaterapeuta?
O aromaterapeuta é um profissional especializado na prática da Aromaterapia, responsável pelo uso adequado de óleos essenciais, ervas aromáticas, águas florais e destilados herbais para fins terapêuticos.
A atuação desse profissional envolve diferentes métodos de aplicação, como inalação, uso tópico, sempre considerando a segurança e a necessidade individual do cliente. A Aromaterapia pode auxiliar na redução do estresse, alívio de dores crônicas, relaxamento muscular e melhora da respiração, entre outros benefícios.
Além disso, os aromaterapeutas podem trabalhar em conjunto com outros profissionais da saúde para oferecer um tratamento complementar em diversas condições. Como já mencionado no artigo sobre "Como evitar processos alérgicos na prática da Aromaterapia", é essencial ter acompanhamento profissional, pois os óleos essenciais são altamente concentrados e podem causar reações adversas se utilizados de forma inadequada.
2. Como um Aromaterapeuta Pode Ajudar?
Você pode procurar um aromaterapeuta para diferentes necessidades, como:
✔ Questões Emocionais e Psicológicas
Auxílio em momentos de luto, divórcio, demissão ou outras situações desafiadoras.
Apoio na redução do estresse, ansiedade e insônia.
Vale lembrar que, em casos de transtornos psiquiátricos, a Aromaterapia deve ser usada como terapia complementar, associada ao tratamento médico.
✔ Questões Físicas
Dores musculares e articulares.
Problemas respiratórios como rinite, sinusite e tosse.
Distúrbios digestivos leves.
Dores de cabeça e enxaquecas. Nesses casos, a Aromaterapia pode ser um suporte, mas não substitui a medicina tradicional para identificar a origem dos sintomas.
✔ Saúde da Pele e Cabelos
Tratamento para acne, dermatites e psoríase.
Cuidados com o envelhecimento precoce da pele.
Redução da queda de cabelo e controle da oleosidade do couro cabeludo.
✔ Bem-estar e Qualidade de Vida
Melhora da concentração e foco, aumentando a produtividade.
Estímulo da disposição e energia.
Auxílio no equilíbrio hormonal (TPM, menopausa, desequilíbrios hormonais).
Com base nessas necessidades, o aromaterapeuta irá indicar o melhor tratamento, calculando doses, sinergias (combinação de óleos essenciais), diluições e técnicas de aplicação, como inalação, uso tópico ou difusão.
3. Como Funciona uma Consulta com um Aromaterapeuta?
Uma consulta com um aromaterapeuta é um atendimento personalizado, onde são avaliadas as necessidades do cliente para a criação de um protocolo adequado. O processo geralmente segue estas etapas:
✔ Anamnese (Entrevista Inicial)
Perguntas sobre saúde física, emocional e estilo de vida.
Levantamento de sintomas, histórico médico e possíveis alergias.
Definição dos objetivos da terapia (alívio do estresse, melhora do sono, dores musculares etc.).
✔ Escolha dos Óleos Essenciais
Seleção dos óleos mais indicados para o caso.
Consideração das propriedades terapêuticas, contraindicações e combinações seguras.
✔ Definição do Método de Uso
O profissional indicará a melhor forma de aplicação, que pode ser:
Inalação: difusores, colares aromáticos, vaporização.
Uso tópico: massagens, óleos corporais, compressas.
Banhos aromáticos e escalda-pés. Todas as diluições serão ajustadas de acordo com a segurança e a necessidade individual do cliente.
✔ Plano de Acompanhamento
Instruções detalhadas sobre o uso correto dos óleos essenciais.
Orientação sobre frequência e duração do tratamento.
Possibilidade de retorno para ajustes no protocolo.
A consulta pode ser realizada presencialmente ou online, dependendo do profissional.
Quer saber como a Aromaterapia pode te ajudar? Agende uma consulta comigo e descubra os benefícios dos óleos essenciais para o seu bem-estar!
-
@ dc4cd086:cee77c06
2025-03-07 22:32:02Understanding Network Dynamics in Technology Adoption
- Top Row: Continuous vs Discontinuous Transitions in Social Diffusion
- Shows two different ways that innovations spread through a population. The horizontal axis (
λ
) represents "persuasion capacity" - how effectively adopters convince others to join. The vertical axis (ρ
) shows what fraction of the population eventually adopts. - Blue line shows a continuous transition: as persuasion capacity increases, adoption grows gradually and smoothly. Example: streaming services that steadily gains users year after year.
- Red line shows a discontinuous transition (or "tipping point"): adoption remains near zero until reaching a critical threshold, then suddenly jumps to a high level. This represents technologies that spread explosively once they reach a critical mass.
- The different curves emerge from the situations of how people make adoption decisions. When there is higher adoption resistance (higher threshold
T
and steeper response curvea
), discontinuous transitions become more likely.
Bottom Left: Cascade Window
When is widespread adoption possible? Its based on network structure. The horizontal axis (
z
) represents network connectivity - on average, how many connections does an individual have? The plot has a regime "cascade window" - widespread adoption only occurs within a specific range of connectivity: - If connectivity is too low (left side), the network is too fragmented for innovations to spread widely - If connectivity is too high (right side), people become resistant to change because they need many of their connections to adopt before they will follow suitThe different curves show theoretical predictions for:
- The early adopter network (blue solid): people who can be convinced to adopt with minimal influence.
- The core connected userbase (red line): the largest interconnected population in the network
- Total adoption potential (green line): the potential total reach possible through both early adopters and those they influence
Bottom Right: Phase Transition Points
This plot highlights
critical thresholds
where the system undergoes dramatic changes. The peaks represent points where small changes in network connectivity cause the largest shifts in adoption patterns. The vertical dashed line marks a critical connectivity value where adoption dynamics fundamentally change. Near these critical points, the network becomes especially sensitive - like how a small price drop might suddenly make a product accessible to a much larger market segment, increasing how easily individuals are connected.The green line (total adoption potential rate) shows only a brief spike at the critical threshold and then quickly returns to zero. Implying that the total potential reach of an innovation changes only at that specific critical point and then stabilizes. This is why timing market entry is so crucial - there's a narrow window where network conditions can suddenly enable widespread adoption, and missing this window means the technology might never achieve its full potential.
Further Reading:
- Malcom Gladwell's Tipping Point
Sources:
- https://www.frontiersin.org/journals/physics/articles/10.3389/fphy.2018.00021/full
-
https://www.pnas.org/doi/10.1073/pnas.1414708112
-
https://www.pnas.org/doi/10.1073/pnas.082090499
-
@ 527b02f7:b0ed5fd2
2025-03-07 21:40:48202502181044 Este HUD para PLO debería de estar prohibido☠⛔
Creado: 2025-02-18 10:46
La estructura del HUD: La esencia de la información para explotar a tus rivales 📊
Un HUD para PLO debe reunir estadísticas específicas y bien calibradas, pensadas para identificar patrones de juego y explotar las debilidades de cada rival. Este en particular incluye todas las métricas que considero esenciales.
Dependiendo de tu nivel tienes disponibles dos versiones del HUD:
- Una para PLO BASIC, más sencilla con los valores esenciales generales y los valores más básicos post-flop
![[Pasted image 20250218105241.png]]
- Otra para PLO PRO, la versión más completa con toda la información necesaria que necesitas para conocer cada detalle del juego de tus rivales.
![[Hand2Note_Zr1rE8CUv7.png]]
Todo HUD comienza con las tres estadísticas generales más importantes para identificar a qué tipo de jugador te enfrentas:
- VPIP (Voluntarily Put Money In Pot): Esta estadística muestra la frecuencia con la que un jugador pone dinero en el bote de forma voluntaria.
- PFR (Preflop Raise): Un indicador de la agresividad preflop. El PFR nos permite entender qué tan seguido un jugador toma la iniciativa antes del flop, lo que es esencial para decidir cuándo hacer call o re-raise.
- 3-Bet Preflop: la frecuencia de 3-bet preflop nos indica el % de manos que está resubiendo el jugador pre-flop. Esto nos indica su grado de agresividad general antes del flop.
Esto como puedes imaginarte es tan solo un aperitivo de todo lo que podemos deducir de las estadísticas que nos da el HUD.
Instalación y configuración del HUD en cada software 🔧
Configurar el HUD en Hand2Note, PT4 o HM3 es bastante sencillo, y en Mentopoker puedes acceder a tutoriales específicos. Estos tutoriales te guiarán paso a paso para que puedas instalarlo correctamente y personalizar algunos ajustes según tu estilo de juego.
Puedes descargar el HUD en sus dos versiones dependiendo de tu nivel en la escuela directamente desde la página de descargas de Mentopoker.
Además si quieres aprender a leer, interpretar y sacar el máximo provecho al HUD, tienes clases específicas en la escuela donde te lo explico con lujo de detalles.
Estás dejando dinero en la mesa 💸
Si estás buscando una herramienta que te dé una ventaja real en las mesas de PLO, este HUD es sin duda una de las mejores opciones. La suscripción a Mentopoker no solo te permitirá acceder a este HUD, sino que también podrás mejorar cada aspecto de tu juego con el soporte y las clases exclusivas que hemos creado.
Si quieres jugar como un profesional y ganar como un profesional, has de usar las herramientas que usan los profesionales. Un HUD mediocre te brindará información poco precisa y dejará muchos huecos de información sobre información relevante. Por el contrario un HUD hecho por jugadores profesionales, te dará información crucial que marcará la diferencia en decisiones clave, que te harán incrementar sin lugar a dudas tu winrate.
En la escuela siempre compartimos los métodos y herramientas que usamos nosotros en las mesas día a día, para que así siempre tengas los mejores recursos a tu disposición.
En futuros artículos compartiré otra información relevante al respecto, como la fiabilidad de los datos y el grado de certeza de las muestras.
¡Nos vemos en las mesas!
Suscríbete al blog.
Te informaré cada vez que publique una nueva entrada y así estarás al día de las últimas novedades.
El email que proporciones no se utilizará para mandar publicidad, ni se compartirá con terceros. Solo se te enviarán todas las novedades de esta web.
-
@ ec9bd746:df11a9d0
2025-03-07 20:13:38I was diving into PoW (Proof-of-Work) once again after nostr:nprofile1qy88wumn8ghj7mn0wvhxcmmv9uq3wamnwvaz7tmjv4kxz7fwdehhxarj9e3xzmny9uqzqj8a67jths8euy33v5yu6me6ngua5v3y3qq3dswuqh2pejmtls6datagmu rekindled my interest with his PoW Draw project. It was a fun little trifle, but it shifted my focus just the right way at the right time.
Because then, on Friday, came the Oval Office Travesty. Once I got over the initial shock, I decided I couldn't just curse and lament; I needed to do something bigger, something symbolic, something expressive. So that's exactly what I did—breaking nostr:nprofile1qy88wumn8ghj7mn0wvhxcmmv9uq32amnwvaz7tmjv4kxz7fwv3sk6atn9e5k7tcqyqewrqnkx4zsaweutf739s0cu7et29zrntqs5elw70vlm8zudr3y2t9v7jg's record which he held for almost 2 and half years.
Here is a note with PoW 45, the highest PoW known to Nostr (as of now).
nostr:nevent1qvzqqqqqqypzpmym6ar92346qc04ml08z6j0yrelylkv9r9ysurhte0g2003r2wsqy88wumn8ghj7mn0wvhxcmmv9uqsuamnwvaz7tmwdaejumr0dshsqgqqqqqqqqqy8t8awr5c8z4yfp4cr8v7spp8psncv8twlh083flcr582fyu9
How Did I Pull It Off?
In theory, quite simple: Create note, run PoW mining script & wait.
Thanks to PoW Draw, I already had mining software at hand: nostr:nprofile1qy88wumn8ghj7mn0wvhxcmmv9uq32amnwvaz7tmjv4kxz7fwv3sk6atn9e5k7tcqyqvqc5tlvn6etv09f0fvuauves49dvgnukjtzsndfv9y8yyrqyxmz7dty6z's notemine_hw, but when you know that there is a 1 in 2^45 chance that the next hash will be the correct one you want to increase the odds a bit. So on Monday evening, I started my Note Mining operation on an old 40 thread machine called Workhorse.
Issues Along the Way
I was immediately surprised that Workhorse (2× Intel Xeon Silver 4114) produced only about 3Mh/s. A laptop (Intel Core i7-1185G7) with Windows and all the bloat did 5Mh/s. That was strange.
Another hurdle was that notemine_hw does not refresh the
created_at
field. With just a few Mh/s of power I was potentially looking at weeks of computation, by then the note would be quite stale. So I created systemd service leveraging theRuntimeMaxSec
option to periodically restart every 3600 seconds assuring that the Note would be max 1 hour old at the time of publishing.Luckily PoW is that kind of problem where every hash attempt is an independent event, so the chance of success is the same whether you do it in small increments or one uninterrupted stretch. So by restarting the mining process I was only losing a few mere seconds every hour due to the overhead.
Once the note staleness issue was resolved, I looked at the 40 workers on Workhorse vs. 7 workers on the laptop and start messing around with running one instance with 40 workers and running 40 instances with 1 worker and found out, that the workers are not bound to a CPU thread and are jumping between the CPUs like rabbits high on Colombian carrots.
The solution? Running multiple instances with one worker each as a service locked to its own CPU core using systemd's
CPUAffinity
option. ``` $aida@workhorse:systemd/system $ sudo cat notemine@.service [Unit] Description=Notemine HW Publish (restarts hourly)[Service] Type=simple CPUAffinity=%i
The command to run:
ExecStart=/home/aida/.cargo/bin/notemine_hw publish --n-workers 1 --difficulty 45 --event-json /home/aida/note.json --relay-url 'wss://wot.shaving.kiwi' --nsec nsec0123456789abcdef
Let the process run for 1 hour (3600 seconds), then systemd will stop it:
RuntimeMaxSec=3600 TimeoutStopSec=1
Tells systemd to restart the service automatically after it stops:
Restart=always RestartSec=1
run as a non-root user:
User=aida Group=aida
[Install] WantedBy=multi-user.target ``` Then I added a starting service to spawn an instance for each CPU thread.
``` $aida@workhorse:systemd/system $ sudo cat notemine_start.service [Unit] Description=Start all services in sequence with 3-second intervals
[Service] Type=oneshot ExecStart=/usr/bin/zsh /home/aida/notemine_start.sh
RemainAfterExit=yes
[Install] WantedBy=multi-user.target
Here is the startup script (I know, loops exist—but Ctrl+C/Ctrl+V is so old-school):
aida@workhorse:~ $ cat notemine_start.sh /usr/bin/systemctl start notemine@0.service /usr/bin/sleep 3 /usr/bin/systemctl start notemine@1.service /usr/bin/sleep 3 /usr/bin/systemctl start notemine@2.service /usr/bin/sleep 3 /usr/bin/systemctl start notemine@3.service /usr/bin/sleep 3 ... ... ... /usr/bin/systemctl start notemine@38.service`` The sleep there is critical to make sure that the
created_at`timestamps are different, preventing redundant hashing.This adjustment made Workhorse the strongest machine in my fleet with 10+Mh/s.
The Luck Aspect
From Monday evening, I started adding all machines at my disposal into the fleet and by Wednesday evening I was crunching hashes on about 130 CPU threads (a lot of them were quite antique) and at the peak was just little shy of 40Mh/s. To compensate for the slow start with the few above-mentioned hiccups and the fact that I had to use my desktop to do other things from time to time, I counted with the conservative estimate of 30Mh/s when I was doing all the probability calculations.
Based on the type of task that PoW mining is, the outcome is not predictible. You are only looking at what is the chance that the outcome of every single independent event will be consecutively non-favourable and then subtracting it from 1 to get the chance of that single favourable event you want. I really had to brush up on my combinatorics and discrete mathematics to make sure I have at least an elementary understanding of what is going on. Also, because we are not just throwing a dice 5 times, but are operating with big numbers, approximation was necessary. Luckily, the formula is available and quite simple in the end.
Two weeks to exhauste all the possible tries still doesn't guarantee anything, actually there is a slighlty less than 2 in 3 chance that you will have a result after all that time. So the fact that I was able to hit the right hash in less than 3 days was good luck. Not insane lottery winning luck, but good luck; slighlty lower than 1 in 5.
Do you want to beat me?
Go ahead! All the pitfalls are described above and until there is a GPU-based PoW Mining available, we are all on pretty even ground.
Do you hate the note?
In that case, feel free to enjoy this accompanying image:
-
@ d058ffb7:70ed2330
2025-03-07 19:45:59Au cours de mon éternelle recherche du Graal de l'application de prise de note, je suis récemment tombé sur une recommandation intéressante : LogSeq.
Cette application fait partie de la dernière génération de logicielle pour la prise de note, en facilitant la recherche. Celles-ci se distinguent en offrant la cartographie de pensée (mind map), qui permet de liée différents sujets ensemble, souvent sous la forme d'hyperlien. On peut ensuite les consulter sous forme de graphique de connaissance. Sur le marché, on peut donc comparer Logseq à Roam, Obsidian ou Notion.
Parmi les avantages de cette application, il y a la facilité à explorer les différents sujets de façon cohérente, un peu à la façon Wikipedia, mais également de regrouper des thèmes communs. Elle permet également une grande flexibilité dans la création de contenu. Enfin, la mise en page est basée sur le système de mark-up, ce qui rend saisie simple.
Utilisation
J'ai eu la chance de tester son utilisation durant un voyage récemment afin de le tester avec plusieurs cas d'utilisation. En voici quelques un :
Journal et planification
À l'ouverture, on se retrouve dans une interface qui peut rappeler un journal, i.e. une page par date de calendrier. En plus de pouvoir suivre les notes chronologiquement, cette interface est aussi utile pour la planification, puisque qu'on peut attacher des notes à une date ultérieure (via la fonction \date picker) et voir ces liens quand arrivera la journée prévue.
Liste de points
L'application encourage beaucoup l'utilisation de liste de points. Elle permet alors d'indenter sans limite, mais également d'éclater/fermer les points faciliter la consultation lors beaucoup de sous-points.
Gestion de tâche
Des bonnes vieilles to-do list dont possibles, avec bouton pour biffer les tâches terminées. On peut se limiter à une liste unique et consolidée, mais également répartir les tâches dans les différentes pages en utilisant un lien vers la page principale.
Lecture - Notes, résumés et recommandations
On peut également y collecter les différentes lectures, ainsi que les recommandations reçues. Certains livres pourront alors leur page spécifique lorsqu'un résumé ou des notes sont pertinentes. Il est également possible de maintenir une page de citations et de les lier au livre correspondant. À chacun sa saveur Considérant la flexibilité et que nous avons tous une façon unique de réfléchir, il est important de se donner la chance de découvrir l'outils et de développer sa propre stratégie/structure pour la prise de note, en fonction de sa propre réalité et de ses besoins.
Avantages
Gratuit
Contrairement à plusieurs compétiteurs, la version principale est gratuite pour tous. À l'heure actuelle, elle n'est pas sur le Play Store d'Android, on doit plutôt télécharger et installer le package à partir de leur site web.
Open-source
L'application est disponible sur GitHub et publiée selon la licence AGPL-3.0 license, qui confirme l'aspect open-source, mais qui dont les versions qui en dépendent doivent conserver cette licence (et donc ne peuvent la fermer par la suite). L'application est activement développé, mais bénéficie également d'un nombre impressionnant d'application tierce / plug-in, qui permettent une utilisation encore plus complète.
Défis
Appareils multiples
Malheureusement, LogSeq ne permet toujours pas la synchronisation avec la version principale. Cette fonctionnalité (LogSeq Sync) est présentement en bêta mais n'est disponible que pour les commanditaires et backers. Comme c'est open-source et n'est qu'ultimement un fichier texte, il y a différentes stratégies maison, mais pour l'instant, l'utilisation sur mobile était suffisante. Au besoin, il est possible d'exporter le contenu sous format .json et ensuite l'importer dans une version sur bureau (ce que j'ai fait pour extraire le graphe plus haut).
Prochaines étapes
Applications / Plugins
Il me reste maintenant à explorer le marketplace pour découvrir les nombreux plug-ins disponibles.
De nombreux guides sont disponibles, sur Youtube, mais également sur leur blog et leur page de communauté. Pourquoi ne pas commencer par cette page ?
https://hub.logseq.com/use-cases/1Sr4awszMQzD4GM5KvWim7/10-must-have-plugins-for-logseq/jgDG2ZVkeZGSQHXUNkWroo
-
@ a296b972:e5a7a2e8
2025-03-07 19:20:32Wer soll wehrpflichtig sein? Alle, die einen deutschen Pass haben? Auch die, die durch die Willkommenskultur nach Deutschland gekommen sind? Gleich hier und schon sterben?
Wie groß ist die Bereitschaft „für’s Vaterland“ sein Leben einzusetzen? Die Messer-Fachkräfte und Autofahrer unter den Willkommenen könnten einen Vorteil gegenüber den Bio-Deutschen haben. Mehr Testosteron, mehr Cochones!
Gibt es noch bewohnbare Kasernen? Wenn ja, wer wohnt derzeit in ihnen und wohin mit denen? Entsprechen sie der Brandschutz-Verordnung? Heizen sie mit Wärmepumpen?
Wie gut wird die Unterbringung unterschiedlicher Kulturen, Ethnien und Religionszugehörigkeiten in den Kasernen lebenspraktisch funktionieren?
Werden separate Küchen eingerichtet, damit die verschiedenen Kulturen und Religionen ihrer Herkunft nach entsprechende Kost zubereitet bekommen? Ich kann mir nicht vorstellen, dass Erbsensuppe mit Schweins-Bockwurst aus der Gulaschkanone die Leibspeise für alle Migranten werden wird. Und es muss mindestens ein veganes und ein glutenfreies Essen zur Auswahl geben. Allergien können sonst die Wehrkraft zersetzen. Gutes Essen ist wichtig für die Truppenmoral!
Vereintes Duschen, Toilettengang kein Problem? Sind Kampfunterbrechungen für Gebete vorgesehen? Werden Gebetsteppiche in Tarnfarben angeschafft?
Werden die Pass-Straßen in den Zelten der ehemaligen Impf-Zentren für die mRNA-Vergiftung zu Kreiswehr-Ersatz-Ämtern umfunktioniert. Mit Länderfähnchen für die vielen Nationen?
Werden in der Volkshochschule Schnellkurse für Ausbilder angeboten?
Wie steht es um die Moral in der Truppe bei denjenigen, die sich der Genbehandlung unterziehen mussten, und sich damit schon einmal mit ihrem Leben eingesetzt haben?
Wäre es gerecht, wenn alle Menschen mit einem deutschen Pass möglicherweise aufgrund ihrer Herkunft unterschiedlich gut oder weniger gut als wehrtauglich eingestuft würden?
Wie soll die Gleichstellung von Männern und Frauen in der Wehrpflicht umgesetzt werden? Wie wäre diese in den unterschiedlichen Kulturen umzusetzen? Wird garantiert, dass muslimische Frauen weiter ihr Kopftuch tragen können? Gibt es spezielle weibliche Uniformen mit Vollverschleierung?
In wie vielen Sprachen werden Dienstanweisungen mündlich ausgegeben? Und schriftlich in lateinischer und arabischer Schrift?
Wie viele Sprachen müssen Vorgesetzte sprechen, da nicht davon auszugehen ist, dass alle Wehrpflichtigen Deutsch und schon gar nicht Militär-Deutsch verstehen werden? Das gilt sowohl für Bio-Deutsche, als auch für die Menschen mit Migrationshintergrund.
Sind daher Dienst-Handys mit Übersetzer-App vorgesehen? Gäbe es für jeden ein Gerät oder müssen sich Klein-Gruppen jeweils eine Übersetzer-App teilen? Wird ein potenzieller Feind im Ernstfall warten, bis alle Soldaten die Befehle in ihre Sprache übersetzt haben, damit sie wissen, was zu tun ist?
Wird es Sandalen und Flip-Flops mit Stahlkappen geben?
Wird es Helme in Übergröße geben, damit die Hochfrisuren der Drag-Queens nicht zu Schaden kommen?
Ist vorgesehen, dass im Übungsgelände eine Fußbodenheizung verlegt wird, damit es bei Kriech-Übungen den jungen, deutschen Männern nicht zu kalt wird?
Würden Waffen und Munition den Umwelt- und Klima-Vorschriften der Agenda 2030 entsprechen? Gäbe es Gärtner-Kolonnen, die die Abdrücke der Panzerketten, nach Manöver-Übungen und im Ernstfall, wieder einebnen und glattharken, die Bombentrichter zuschütten und die Natur wieder in ihren ursprünglichen Zustand versetzen würden?
Wird jahrelanges virtuelles Ballerspielen auf die Grundausbildungszeit angerechnet?
Wird die deutsche Bevölkerung, die in die Mobilitätsaktivitäten einbezogen werden soll, bereit sein, für durchziehende Truppen Kaffee zu kochen (am liebsten Latte Macchiato extra large, aber bitte mit Hafermilch!) und Leberwurst-Butterbrote zu schmieren? Was, wenn einer statt Kaffee lieber Tee oder eine Bio-Limonade haben möchte, was wenn der Gefreite Malte Alexander statt Leberwurst lieber einen veganen Brotaufstrich vorzieht?
Wird es eine allgemeine Auszahlung einer Versorgungspauschale für die Bevölkerung geben, oder ist es Bürgerpflicht aus Solidarität mit der kämpfenden Truppe die Verköstigung aus der eigenen Tasche zu zahlen? Oder werden die Kosten mit einer Pauschale bei der Einkommensteuer steuersenkend berücksichtigt?
Darf die deutsche Bevölkerung im Ernstfall ausnahmsweise die deutsche Fahne am Balkon hissen, oder ist eine andere Fahne vorgesehen?
Bis all diese Fragen geklärt und durch die deutschen Bürokratie-Mühlen gegangen sind, hat ein potenzieller Feind das Land schon drei Mal überrollt.
Die geplante Merz-Revolution, die Kombination von Militärausgaben und Ausgaben in die Infrastruktur innerhalb der Sondervermögens-Schulden macht Sinn. Auf den maroden Straßen und Brücken in Deutschland können keine schweren Panzer fahren. Und die müssen auch erst einmal gebaut werden. Hier finden ja jetzt die Arbeiter in der niedergehenden Autoindustrie eine „Anschlussverwendung“ in der Rüstungsindustrie.
Laut Fritzefanzler soll die Bundeswehr ungehinderten Zugang zu Schulen und Hochschulen bekommen, um Kanonenfutter zu rekrutieren. Ein paar Lebensmüde werden sich schon finden lassen. Man will ja auch kein Rechter sein, weil man sich sonst als Pazifist outen müsste.
Man kann nur hoffen, dass ein potenzieller Feind so lange wartet, bis alles fertig ist.
Deutschland braucht gar keinen Feind von außen. Mit deutscher Gründlichkeit zerstört sich Deutschland von innen heraus systematisch von ganz alleine. Wer hat sich diesen Plan ausgedacht?
Das wichtigste wurde bei all der deutschen Kriegstüchtigkeit jedoch vergessen: Deutschland braucht einen Feind! Ohne Feind kein Krieg! Russland macht nicht die geringsten Anzeichen, sich hier zur Verfügung stellen zu wollen. Es gibt einfach keinen Grund. Weder von russischer Seite, Frau Baerbock in Brandenburg einen Hausbesuch abzustatten, noch von deutscher Seite, die keinerlei Belege dafür hat, dass Deutschland von irgendwem bedroht wird.
Deutschland inszeniert derzeit ein heraufkommendes Gewitter bei strahlend blauem Himmel. Frankreich erklärt Russland quasi den Krieg und das russische Militär schüttelt vermutlich ratlos mit dem Kopf, weil es sich fragt, warum nur?
Die EU beruft einen Sondergipfel ein. Mit 800 Milliarden Budget präsentiert sie den ReArm-EU-Plan. Es gehen Gerüchte um, dass die USA die NATO verlassen könnten. Europa muss dringend wiederbewaffnet werden. Das Ganze dauert, wenn es denn überhaupt klappt, mindestens 10 bis 15 Jahre. Und in der Zwischenzeit? Kann Frau von der Leyen die Zeit anhalten und wir wissen es nur noch nicht?
Erste Schwierigkeiten tauchen schon auf, weil die eine Nation nicht preisgeben will, wie viele Waffen sie noch im Keller hat, und andere Nationen wollen nicht preisgeben, wie wenig Waffen sie noch in der Garage haben. Was für ein Chaos-Club. Dennoch gut, denn so wird das alles nichts.
Angefeuert in Brüssel von der Waffen-Lobbyistin aus Düsseldorf-Rheinmetall, Herrn Kriegsgewitter, dem Mann aus Bayern mit den unglücklichen Initialen AH und unterstützt von Joschka und dem zukünftigen, hoffentlich bald schon wieder ehemaligen Bundeskanzler.
Europa benimmt sich wie ein aufgeschreckter Haufen gackernder Gänse, die wild hin und her rennen und keine Ahnung haben, was sie tun sollen. Blinder Aktionismus ist angesagt.
Es gibt einfach keine klare Begründung, warum eine Bedrohung sofortige, dringende Maßnahmen nötig macht. Warum nicht? Weil es keinen Grund gibt.
Wie wäre es, statt einer Wehrpflicht, mit einer Pflicht zur Wahrnehmung der Realität, die derzeit offensichtlich auf Heimaturlaub ist. (Ort unbekannt, möglicherweise Planet Vega, Sternbild Leier)? Wohin sind Besonnenheit und Hausverstand verschwunden?
Im Hinblick darauf, dass es durchaus sein kann, dass die USA die NATO wirklich verlassen werden, würde es in der Tat Sinn machen, dass die europäischen Nationen, jede für sich, eine gewisse Verteidigungsfähigkeit mit der Zeit wiederherstellen würde. Nach Abgleich könnte man sogar ein europäisches Militärbündnis schließen, eventuell Reststrukturen der NATO nutzen. Dieser Vorgang würde ebenso gute 10 bis 15 Jahre dauern. In Polen vielleicht schon etwas früher, da wird ja schon seit einiger Zeit kräftig aufgerüstet und die Armee aufgestockt. Manche scheinen es kaum abwarten zu können, sich verstümmeln zu lassen oder zerfetzt zu werden. Viele scheinen wirklich zu glauben, Krieg ist so was wie „Call of Duty“, aber Krieg ist noch ernster als ernst.
In der Zwischenzeit sollte alles darangesetzt werden, größtmögliche Sicherheit für einen langfristigen, andauernden Frieden zu schaffen, statt damit zu drohen, aus Kanonen zu schießen, die man in absehbarer Zeit gar nicht haben wird. Genau das Gegenteil geschieht. Ein weiterer Part aus George Orwells „1984“ soll umgesetzt werden: Krieg ist Frieden. Wie bescheuert kann man sein?
Erst verscherzt es sich Europa mit Russland, jetzt auch noch mit den USA. Merz soll Trump ein Arschloch genannt haben. Trump hat ein Elefanten-Gedächtnis. Der Schuss kann auch ganz leicht nach hinten losgehen. Es gibt da noch so einige Verträge aus der Nachkriegszeit. Und vermutlich gibt es auch die Kanzler-Akte, nach der ein neuer Bundeskanzler in den USA anzutreten hat.
Eine deutsche „Geistesgröße“ hat vor den US-Wahlen sinngemäß gesagt: Nicht auszumalen, wenn Trump die Wahlen gewinnt. Wie stehen wir denn da?
Abgeleitet davon die Frage: Angenommen, Deutschland und Europa hätten es tatsächlich geschafft, innerhalb kürzester Zeit aufzurüsten und der Russe kommt gar nicht. Wie stehen wir denn da?
In beiden Fällen wie die letzten Deppen, die die Verantwortlichen wohl auch sein wollen.
Europa ist größenwahnsinnig geworden, und im schlimmsten Fall, falls die Lage eskaliert, sind die Menschen, die keinen Krieg wollen, wie immer, die Leidtragenden, die mit der Arschkarte.
Gegen Unkenntnis kann man etwas tun, gegen Dummheit kämpfen selbst die Götter vergebens.
Frieden – Mir – Pace – Peace (sowas von rääääääächts!)
-
@ 401014b3:59d5476b
2025-03-07 14:44:12Alright, football savages, it’s March 2025, and we’re tearing into the AFC North like it’s a pierogi-eating contest at a steel mill tailgate. Free agency’s a wild west shootout, the draft’s a blind bet, and this division’s always a brutal cage match of toughness and trash talk. The Bengals and Ravens duked it out in 2024, the Steelers hung tough, and the Browns… well, they Brownsed. Let’s throw some records on this grinder and see who’s got the grit to claim the crown. Here we go, fam—pass the Iron City.
Cincinnati Bengals: 11-6 – Burrow’s Back with a Vengeance
The Bengals were a force in 2024, and 2025’s shaping up as Joe Burrow’s revenge tour. With Ja’Marr Chase and Tee Higgins (assuming they keep him) torching DBs, this offense is a video game cheat code. The O-line’s finally decent, and the defense—Logan Wilson, Trey Hendrickson—if he stays, brings the pain when it matters. Roster changes are a hurdle—Higgins and Hendrickson might chase a mega-deal elsewhere—but Burrow’s ice-cold clutch factor seals it. 11-6, division champs. Cincy’s ready to remind everyone who dey really are.
Baltimore Ravens: 10-7 – Lamar’s Still a Freak
The Ravens are the AFC North’s relentless machine. Lamar Jackson’s running circles around defenses, Derrick Henry’s still trucking fools (if he’s back), and Zay Flowers keeps the passing game spicy. That defense—Roquan Smith, Kyle Hamilton—is a brick wall, but free agency could bite. Justin Madubuike SHOULD stay, and the secondary’s got holes to patch. 10-7’s the call, snagging a wildcard. They’re a half-step behind Cincy but built to ruin someone’s playoff dreams.
Pittsburgh Steelers: 9-8 – Tomlin’s Eternal .500 Magic
Mike Tomlin’s Steelers are the NFL’s cockroaches—impossible to kill. Russell Wilson initially steadied the ship in 2024, and with Najee Harris pounding the rock and George Pickens stretching the field, they’ve got enough juice. The defense—T.J. Watt, Cam Heyward (if he’s still kicking)—is still a nightmare, but age and free agency loom. Patrick Queen could bolt, the Steelers need to settle on a QB, and the secondary’s thin. 9-8’s classic Tomlin—competitive, scrappy, maybe a wildcard if the stars align. Pittsburgh doesn’t die; it just reloads.
Cleveland Browns: 6-11 – Deshaun’s Last Stand?
The Browns are the AFC North’s punching bag, and 2025 ain’t looking much brighter. Deshaun Watson’s a $230 million question mark—Nick Chubb’s back, Jerry Jeudy’s a weapon, but that O-line’s shaky. The defense—Myles Garrett, Denzel Ward—keeps ‘em in games, but free agency might swipe Jeremiah Owusu-Koramoah, and the vibes are off. 6-11’s the harsh truth—too much baggage, not enough spark. Cleveland’s stuck in neutral ‘til they figure out QB.
The Final Bell
The AFC North in 2025 is a Cincinnati coronation with a bloody chase. The Bengals (11-6) take the title because Burrow’s a killer, the Ravens (10-7) claw a wildcard with Lamar’s wizardry, the Steelers (9-8) hang tough, and the Browns (6-11) wallow. Free agency’s the game-changer—lose a stud, you’re screwed; keep ‘em, you’re cooking. Hit me on Nostr when I butcher this, but this is my AFC North gospel. Let’s roll, degenerates.
-
@ eac63075:b4988b48
2025-03-07 14:35:26Listen the Podcast:
https://open.spotify.com/episode/7lJWc1zaqA9CNhB8coJXaL?si=4147bca317624d34
https://www.fountain.fm/episode/YEGnlBLZhvuj96GSpuk9
Abstract
This paper examines a hypothetical scenario in which the United States, under Trump’s leadership, withdraws from NATO and reduces its support for Europe, thereby enabling a Russian conquest of Ukraine and the subsequent expansion of Moscow’s influence over Eurasia, while the US consolidates its dominance over South America. Drawing on classical geopolitical theories—specifically those of Halford Mackinder, Alfred Thayer Mahan, Rudolf Kjellén, and Friedrich Ratzel—the study analyzes how these frameworks can elucidate the evolving power dynamics and territorial ambitions in a reconfigured global order. The discussion highlights Mackinder’s notion of the Eurasian Heartland and its strategic importance, Mahan’s emphasis on maritime power and control of strategic routes, Kjellén’s view of the state as an expanding organism, and Ratzel’s concept of Lebensraum as a justification for territorial expansion. The paper also explores contemporary developments, such as the US–Ukraine economic agreement and Trump’s overt territorial ambitions involving Greenland and Canada, in light of these theories. By juxtaposing traditional geopolitical concepts with current international relations, the study aims to shed light on the potential implications of such shifts for regional stability, global security, and the balance of power, particularly in relation to emerging neocolonial practices in Latin America.
Introduction
In recent years, the geopolitical dynamics involving the United States, Russia, and Ukraine have sparked analyses from different theoretical perspectives. This paper examines recent events – presupposing a scenario in which Donald Trump withdraws the US from NATO and reduces its support for Europe, allowing a Russian conquest of Ukraine and the expansion of Moscow’s influence over Eurasia, while the US consolidates its dominance over South America – in light of classical geopolitical theories. The ideas of Halford Mackinder, Alfred Thayer Mahan, Rudolf Kjellén, and Friedrich Ratzel are used as reference points. The proposal is to impartially evaluate how each theory can elucidate the developments of this hypothetical scenario, relating Russian territorial expansion in Eurasia to the strategic retreat of the US to the Western Hemisphere.
Initially, we will outline Mackinder’s conception of the Heartland (the central Eurasian territory) and the crucial role of Eastern Europe and Ukraine in the quest for global dominance. Next, we will discuss Mahan’s ideas regarding maritime power and the control of strategic routes, considering the impacts on the naval power balance among the US, Russia, and other maritime powers such as the United Kingdom and Japan. Subsequently, we will examine Kjellén’s organic theory of the state, interpreting the Russian expansionist strategy as a reflection of a state organism in search of vital space. In the same vein, Ratzel’s concept of “Lebensraum” will be explored, along with how Russia could justify territorial expansion based on resources and territory. Finally, the paper connects these theories to the current political context, analyzing the direct negotiations between Washington and Moscow (overlooking Ukraine and Europe), the US policy toward authoritarian regimes in Latin America, and the notion of a hemispheric division of power – the “Island of the Americas” under North American hegemony versus an Eurasia dominated by Russia. Lastly, it considers the possibility that such a geopolitical arrangement may foster the strengthening of authoritarian governments globally, rather than containing them, thus altering the paradigms of the liberal world order.
The Heartland of Mackinder: Ukraine, Eurasia, and Global Dominance
Halford J. Mackinder, a British geographer and pioneer of geopolitics, proposed the celebrated Heartland Theory in the early twentieth century. Mackinder divided the world into geostrategic zones and identified the Heartland—the central continental mass of Eurasia—as the “geographical pivot of history” [5]. His most famous maxim encapsulates this vision: “who rules Eastern Europe commands the Heartland; who rules the Heartland commands the World Island; who rules the World Island commands the world” [5]. Eastern Europe and, in particular, the region of present-day Ukraine, play a key role in this formula. This is because, for Mackinder, Eastern Europe functions as a gateway to the Heartland, providing access to resources and a strategic position for the projection of continental power [5].
Applying this theory to our scenario, the conquest of Ukraine and Eastern European countries by Russia would have profound geopolitical implications. From a Mackinderian point of view, such a conquest would enormously strengthen Russia’s position in the Heartland by adding manpower (population) and Ukraine’s industrial and agricultural resources to its power base [5]. In fact, Mackinder argued that controlling the Heartland conferred formidable geostrategic advantages—a vast terrestrial “natural fortress” protected from naval invasions and rich in resources such as wheat, minerals, and fuels [5]. Thus, if Moscow were to incorporate Ukraine (renowned for its fertile soil and grain production, as well as its mineral reserves) and extend its influence over Eastern Europe, Russia would consolidate the Heartland under its direct control. In this context, the absence of the USA (withdrawn from NATO and less engaged in Europe) would remove an important obstacle to Russian predominance in the region.
With central and eastern Eurasia under Russian influence, it would be possible to move toward the realization of the geopolitical nightmare described by Mackinder for Western maritime powers: a hegemonic continental power capable of projecting power to both Europe and Asia. Mackinder himself warned that if a Heartland power gained additional access to an oceanic coastline—in other words, if it combined land power with a significant maritime front—it would constitute a “danger” to global freedom [5]. In the scenario considered, besides advancing into Eastern Europe, Russia would already possess strategic maritime outlets (for example, in the Black Sea, via Crimea, and in the Baltic, via Kaliningrad or the Baltic States if influenced). Thus, the control of Ukraine would reinforce Russia’s position in the Black Sea and facilitate projection into the Eastern Mediterranean, expanding its oceanic front. From a Mackinderian perspective, this could potentially transform Russia into the dominant power of the “World Island” (the combined mass of Europe, Asia, and Africa), thereby unbalancing the global geopolitical order [5].
It is worth noting that, historically, Mackinder’s doctrine influenced containment strategies: both in the interwar period and during the Cold War, efforts were made to prevent a single power from controlling the Heartland and Eastern Europe. NATO, for example, can be seen as an instrument to prevent Soviet/Russian advances in Europe, in line with Mackinder’s imperative to “contain the Heartland.” Thus, if the USA were to abandon that role—by leaving NATO and tacitly accepting the Russian sphere of influence in Eurasia—we would be witnessing an inversion of the principles that have guided Western policy for decades. In short, under Mackinder’s theory, the Russian conquest of Ukraine and beyond would represent the key for Russia to command the Heartland and, potentially, challenge global hegemony, especially in a scenario where the USA self-restricts to the Western Hemisphere.
The Maritime Power of Mahan and the Naval Balance between West and East
While Mackinder emphasized continental land power, Alfred Thayer Mahan, a nineteenth-century American naval strategist, highlighted the crucial role of maritime power in global dominance. In his work The Influence of Sea Power upon History (1890), Mahan studied the example of the British Empire and concluded that control of the seas paved the way for British supremacy as a world power [10]. He argued that a strong navy and the control of strategic maritime routes were decisive factors for projecting military, political, and economic power. His doctrine can be summarized in the following points: (1) the United States should aspire to be a world power; (2) control of the seas is necessary to achieve that status; (3) such control is obtained through a powerful fleet of warships [17]. In other words, for Mahan, whoever dominates the maritime routes and possesses naval superiority will be in a position to influence global destinies, ensuring trade, supplies, and the rapid movement of military forces.
In the proposed scenario, in which the USA withdraws militarily from Europe and possibly from the Eurasian stage, Mahan’s ideas raise questions about the distribution of maritime power and its effects. Traditionally, the US Navy operates globally, ensuring freedom of navigation and deterring challenges in major seas (Atlantic, Pacific, Indian, etc.). A withdrawal of the USA from NATO could also signal a reduction in its naval presence in the Northeast Atlantic, the Mediterranean Sea, and other areas close to Eurasia. In such a case, who would fill this naval vacuum? Russia, although primarily a land power, has been attempting to modernize its navy and has specific interests—for example, consolidating its dominance in the Black Sea and maintaining a presence in the Mediterranean (with a naval base in Tartus, Syria). The United Kingdom, a historic European maritime power, would remain aligned with the USA but, without American military support in Europe, might potentially be overwhelmed trying to contain an increasingly assertive Russian navy in European waters on its own. Japan, another significant maritime actor allied with the USA, is concerned with the naval balance in the Pacific; without full American engagement, Tokyo might be compelled to expand its own naval power to contain both Russia in the Far East (which maintains a fleet in the Pacific) and, especially, the growing Chinese navy.
According to Mahan’s thinking, strategic maritime routes and choke points (crucial straits and channels) become contested prizes in this power game. With the USA focusing on the Americas, one could imagine Washington reinforcing control over the Panama Canal and Caribbean routes—reviving an “American Gulf” policy in the Western Atlantic and Eastern Pacific. In fact, indications of this orientation emerge in statements attributed to Trump, who once suggested reclaiming direct control over Panama, transforming Canada into a North American state, and even “annexing” Greenland due to its Arctic geopolitical importance [18]. These aspirations reflect a quest to secure advantageous maritime positions near the American continent.
Conversely, in the absence of American presence in the Eastern Atlantic and Mediterranean, Russia would have free rein for regional maritime projection. This could include anything from the unrestricted use of the Black Sea (after dominating Ukraine, thereby ensuring full access to Crimea and Ukrainian ports) to greater influence in the Eastern Mediterranean via Syria and partnerships with countries such as Iran or Egypt. The Baltic Sea would also become an area of expanded Russian interest, pressuring coastal countries and perhaps reducing NATO’s traditional local naval supremacy. However, it is worth noting that even with these regional expansions, Russia lacks a blue-water navy comparable to that of the USA; thus, its initial global maritime impact would be limited without alliances.
An important aspect of Mahan’s theories is that naval power serves as a counterbalance to the land power of the Heartland. Therefore, even if Russia were to dominate the Eurasian continental mass, the continued presence of American naval might on the oceans could prevent complete global domination by Moscow. However, if the USA voluntarily restricts its naval reach to the Americas, it would forgo influencing the power balance in the seas adjacent to Eurasia. Consequently, the balance of maritime power would tend to shift in favor of regional Eurasian actors. The United Kingdom and Japan, traditional allies of the USA, could intensify their naval capabilities to defend regional interests—the United Kingdom safeguarding the North Atlantic and the North Sea, and Japan patrolling the Northwest Pacific—but both would face budgetary and structural limitations in fully compensating for the absence of the American superpower. Consequently, Mahan’s vision suggests that the withdrawal of the USA from the extra-regional scene would weaken the liberal maritime regime, possibly opening space for revisionist powers to contest routes that were previously secured (for example, Russia and China encountering less opposition on the routes of the Arctic and the Indo-Pacific, respectively). In summary, naval hegemony would fragment, and control of strategic seas would become contested, reconfiguring the relative influence of the USA, Russia, and maritime allies such as the United Kingdom and Japan.
Kjellén and the State as a Living Organism: Russian Expansion as an Organic Necessity
Another useful theoretical lens to interpret Russian geopolitical posture is that of Rudolf Kjellén, a Swedish political scientist of the early twentieth century who conceived the State as a living organism. Kjellén, who even coined the term “geopolitics,” was influenced by Friedrich Ratzel’s ideas and by social Darwinism, arguing that States are born, grow, and decline analogously to living beings [13]. In his work Staten som livsform (The State as a Form of Life, 1916), he maintained that States possess an organic dimension in addition to the legal one and that “just as any form of life, States must expand or die” [14]. This expansion would not be motivated merely by aggressive conquest but seen as a necessary growth for the self-preservation of the state organism [14]. In complement, Kjellén echoed Ratzel’s “law of expanding spaces” by asserting that large States expand at the expense of smaller ones, with it being only a matter of time before the great realms fill the available spaces [14]. That is, from the organic perspective, vigorous States tend to incorporate smaller neighboring territories, consolidating territorially much like an organism absorbing nutrients.
Applying this theory to the strategy of contemporary Russia, we can interpret Moscow’s actions—including the invasion of Ukraine and the ambition to restore its sphere of influence in Eurasia—as the expression of an organic drive for expansion. For a strategist influenced by this school, Russia (viewed as a state organism with a long imperial history) needs to expand its territory and influence to ensure its survival and security. The loss of control over spaces that once were part of the Russian Empire or the Soviet Union (such as Ukraine itself, the Caucasus, or Central Asia) may be perceived by Russian elites as an atrophy of the state organism, rendering it vulnerable. Thus, the reincorporation of these territories—whether directly (annexation) or indirectly (political vassalage)—would equate to restoring lost members or strengthening vital organs of the state body. In fact, official Russian arguments often portray Ukraine as an intrinsic part of “Russian historicity,” denying it a fully separate identity—a narrative that aligns with the idea that Russian expansion in that region is natural and necessary for the Russian State (seen as encompassing also Russian speakers beyond its current borders).
Kjellén would thus provide a theoretical justification for Russian territorial expansion as an organic phenomenon. As a great power, Russia would inevitably seek to expand at the expense of smaller neighbors (Ukraine, Georgia, the Baltic States, etc.), as dictated by the tendency of “great spaces to organize” to the detriment of the small [14]. This view can be identified in contemporary Russian doctrines that value spheres of influence and the notion that neighboring countries must gravitate around Moscow in order for the natural order to be maintained. The very idea of “Eurasia” united under Russian leadership (advocated by modern Russian thinkers) echoes this organic conception of vital space and expansion as a sign of the State’s vitality.
However, Kjellén’s theory also warns of the phenomenon of “imperial overstretch,” should a State exceed its internal cohesion limits by expanding excessively [14]. He recognized that extending borders too far could increase friction and vulnerabilities, making it difficult to maintain cohesion—a very large organism may lack functional integration. In the Russian context, this suggests that although expansion is seen as necessary, there are risks if Russia tries to encompass more than it can govern effectively. Conquering Ukraine and subjugating Eastern Europe, for example, could economically and militarily overburden the Russian State, especially if it faced resistance or had to manage hostile populations. However, in the hypothetical scenario we adopt (isolated USA and a weakened Europe), Russia might calculate that the organic benefits of expansion (territory, resources, strategic depth) would outweigh the costs, since external interference would be limited. Thus, through Kjellén’s lens, expansionist Russia behaves as an organism following its instinct for survival and growth, absorbing weaker neighbors; yet such a process is not devoid of challenges, requiring that the “organism Russia” manages to assimilate these new spaces without collapsing under its own weight.
Ratzel and Lebensraum: Resources, Territory, and the Justification for Expansion
Parallel to Kjellén’s organic view, Friedrich Ratzel’s theory offers another conceptual basis for understanding Russian expansion: the concept of Lebensraum (vital space). Ratzel, a German geographer of the late nineteenth century, proposed that the survival and development of a people or nation depended critically on the available physical space and resources. Influenced by Darwinist ideas, he applied the notion of “survival of the fittest” to nations, arguing that human societies need to conquer territory and resources to prosper, and that the stronger and fittest civilizations will naturally prevail over the weaker ones [12]. In 1901, Ratzel coined the term Lebensraum to describe this need for “vital space” as a geographical factor in national power [15].
Subsequently, this idea would be adopted—and extremely distorted—by Nazi ideology to justify Germany’s aggressions in Europe. However, the core of Ratzel’s concept is that territorial expansion is essential for the survival and growth of a State, especially to secure food, raw materials, and space for its population [12].
When examining Russia’s stance under this perspective, we can see several narratives that evoke the logic of Lebensraum. Russia is the largest country in the world by area; however, much of its territory is characterized by adverse climates (tundra, taiga) and is relatively sparsely populated in Siberia. On the other hand, adjacent regions such as Ukraine possess highly arable lands (chernozem—black soil), significant Slavic population density, and additional natural resources (coal in the Donbass, for example). An implicit justification for Russian expansion could be the search for supplementary resources and fertile lands to secure its self-sufficiency and power—exactly as Ratzel described that vigorous nations do. Historical records show that Ratzel emphasized agrarian primacy: he believed that new territories should be colonized by farmers, providing the food base for the nation [12]. Ukraine, historically called the “breadbasket of Europe,” fits perfectly into this vision of conquest for sustenance and agricultural wealth.
Furthermore, Ratzel viewed geography as a determinant of the destiny of nations—peoples adapted to certain habitats seek to expand them if they aspire to grow. In contemporary Russian discourse, there is often mention of the need to ensure security and territorial depth in the face of NATO, or to unite brotherly peoples (Russians and Russian speakers) within a single political space. Such arguments can be read as a modern translation of Lebensraum: the idea that the Russian nation, in order to be secure and flourish, must control a larger space, encompassing buffer zones and critical resources. This Russian “vital space” would naturally include Ukraine and other former Soviet republics, given the historical and infrastructural interdependence. Ratzel emphasized that peoples migrated and expanded when their original homeland no longer met their needs or aspirations [12]. Although contemporary Russia does not suffer from demographic pressure (on the contrary, it faces population decline), under the logic of a great power there is indeed a sentiment of geopolitical insufficiency for having lost influence over areas considered strategic. Thus, reconquering these areas would mean recovering the “habitat” necessary for the Russian nation to prosper and feel secure.
It is important to mention that, in Ratzel’s and Kjellén’s formulations, the pursuit of Lebensraum or organic expansion is not morally qualified—it is treated as a natural process in the politics of power. Thus, on the discursive level, Russia can avoid overly aggressive rhetoric and resort to “natural” justifications: for example, claiming that it needs to occupy Ukraine for defensive purposes (security space) or to reunify peoples (a common cultural and historical space). Beneath these justifications, however, resonates the geopolitical imperative to acquire more territory and resources as a guarantee of national survival, something consonant with Ratzel’s theory. In fact, Russian Realpolitik frequently prioritizes the control of energy resources (gas, oil) and transportation routes. Expanding its influence over central Eurasia would also mean controlling oil pipelines, gas lines, and logistical corridors—essential elements of modern Lebensraum understood as access to vital resources and infrastructure.
In summary, by conquering Ukraine and extending its reach into Eurasia, Russia could effectively invoke the concept of Lebensraum: presenting its expansion not as mere imperialism, but as a necessity to secure indispensable lands and resources for its people and to correct the “injustice” of a vital space diminished by post-Cold War territorial losses. The theories of Ratzel and Kjellén together paint a picture in which Russian expansion emerges almost as a natural law—the great State reclaiming space to ensure its survival and development at the expense of smaller neighbors.
Trump, NATO, and the Threat of American Withdrawal
One of the most alarming changes with Trump's return to power is the tense relationship with the North Atlantic Treaty Organization (NATO). Trump has long criticized allies for not meeting military spending targets, even threatening during his first term to withdraw the US from the alliance if members did not increase their contributions [2]. This threat, initially viewed with skepticism, became concrete after his re-election, leading European allies to seriously consider the possibility of having to defend themselves without American support [1]. In fact, Trump suggested in post-election interviews that the US would only remain in NATO if the allies “paid their bills” – otherwise, he “would seriously consider” leaving [2]. Such statements reinforced the warning that the US might not honor NATO's mutual defense commitment, precisely at a time of continuous Russian threat due to the war in Ukraine [1].
From a theoretical point of view, this posture of American retrenchment evokes the classic tension between maritime power and land power. Alfred Thayer Mahan emphasized that the global power of the US derived largely from its naval superiority and from alliances that ensured control over strategic maritime routes [9]. NATO, since 1949, has served not only to deter Soviet terrestrial advances in Eurasia, but also to secure the US naval presence in the North Atlantic and the Mediterranean – a fundamental element according to Mahan. In turn, Halford Mackinder warned that the balance of global power depended on the control of the Eurasian “Heartland” (the central region of Eurasia). The withdrawal or disengagement of the US (a maritime power) from this region could open the way for a continental power (such as Russia) to expand its influence in Eastern Europe, unbalancing the power balance [3]. In other words, by threatening to leave NATO, Trump jeopardizes the principle of containment that prevented Russian dominance over Eastern Europe – something that Mackinder would see as a dangerous shift in global power in favor of the Heartland power.
Adopting an impartial tone, it is observed that European countries have reacted to this new reality with precautionary measures. Strategic reports already calculate the cost of an autonomous European defense: hundreds of thousands of additional soldiers and investments of hundreds of billions of euros would be required if the US ceased to guarantee the security of the continent [1]. European dependence on American military power is significant and, without it, there would be a need for a major reinforcement of European Armed Forces [1]. This mobilization practically reflects the anticipation of a power vacuum left by the US – a scenario in which Mackinder’s theory (on the primacy of the Heartland and the vulnerability of the “external crescent” where Western Europe is located) regains its relevance.
The US–Ukraine Economic Agreement: Strategic Minerals in Exchange for Support?
Another novelty of Trump's second term is the unprecedented and transactional manner in which Washington has been dealing with the war in Ukraine. Instead of emphasizing security guarantees and alliances, the Trump administration proposed a trade agreement with Ukraine focused on the exploitation of strategic minerals, linking American support to a direct economic benefit. According to sources close to the negotiations, the US and Ukraine are about to sign a pact to share the revenues from the exploitation of critical mineral resources on Ukrainian territory [19]. Materials such as titanium, lithium, rare earths, and uranium – vital for high-tech and defense industries – would be at the core of this agreement [6]. According to the known draft, Ukraine would allocate 50% of the profits from new mineral ventures to a fund controlled by the US, which would reinvest part of the resources in the country’s own reconstruction [6] [19].
It is noteworthy that the pact does not include explicit security guarantees for Kyiv, despite Ukraine remaining under direct military threat from Russia [19]. Essentially, the Trump administration offers financial support and economic investment in exchange for a share in Ukrainian natural resources, but without formally committing to Ukraine's defense in the event of a renewed Russian offensive [19]. American authorities argue that this economic partnership would already be sufficient to “secure Ukrainian interests,” as it would provide the US with its own incentives to desire Ukraine’s stability [19]. “What could be better for Ukraine than being in an economic partnership with the United States?” stated Mike Waltz, a US national security advisor, defending the proposal [19].
Analysts, however, assess the agreement in divided terms. For some, it represents a form of economic exploitation at a time of Ukraine's fragility – comparing the demand to share mineral wealth amid war to a scheme of “mafia protection” [19]. Steven Cook, from the Council on Foreign Relations, classified the offer as “extortion,” and political scientist Virginia P. Fortna observed that charging resources from an invaded country resembles predatory practices [19]. Joseph Nye adds that it is a short-term gain strategy that could be “disastrous in the long run” for American credibility, reflecting the transactional approach that Trump even adopted with close allies in other contexts [19]. On the other hand, some see a future advantage for Kyiv: journalist Pierre Briançon suggests that at least this agreement aligns American commercial interests with Ukraine’s future, which could, in theory, keep the US involved in Ukrainian prosperity in the long term [19]. It is even recalled that President Zelensky himself proposed last year the idea of sharing natural resources with the US to bring the interests of the two countries closer together [19].
From the perspective of geopolitical theories, this agreement illustrates a shift towards economic pragmatism in international relations, approaching concepts proposed by Kjellén. Rudolf Kjellén, who coined the term “geopolitics,” saw the State as a territorial organism that seeks to ensure its survival through self-sufficiency and the control of strategic resources [4]. Trump's demand for a share in Ukrainian resources in order to continue supporting the country reflects a logic of autarky and direct national interest – that is, foreign policy serving primarily to reinforce the economic and material position of the US. This view contrasts with the traditional cooperative approach, but aligns with Kjellén’s idea that powerful States tend to transform international relations into opportunities for their own gain, ensuring access to vital raw materials. Similarly, Friedrich Ratzel argued that States have a “propensity to expand their borders according to their capacities,” seeking vital space (Lebensraum) and resources to sustain their development [11]. The US–Ukraine pact, by conditioning military/economic aid on obtaining tangible advantages (half of the mineral profits), is reminiscent of Ratzel’s perspective: the US, as a rising economic power, expands its economic influence over Ukrainian territory like an organism extending itself to obtain the necessary resources for its well-being. It is, therefore, a form of economic expansionism at the expense of purely ideological commitments or collective security.
Peace Negotiations Excluding Ukraine and the Legitimacy of the Agreement
Another controversial point is the manner in which peace negotiations between Russia and the West have been conducted under Trump's administration. Since taking office, the American president has engaged directly with Moscow in pursuit of a ceasefire, deliberately keeping the Ukrainian government out of the initial discussions [6]. Trump expressed his desire to “leave Zelensky out of the conversation” and also excluded the European Union from any influence in the process [6]. This negotiation strategy—conducted without the presence of the primary interested party, Ukraine—raises serious questions about the legitimacy and sustainability of any resulting agreement.
Historically, peace agreements reached without the direct participation of one of the conflicting parties tend to face problems in implementation and acceptance.
The exclusion of Ukraine in the decision-making phase brings to light the issue of guarantees. As noted, the emerging agreement lacks formal US security guarantees for Ukraine. This implies that, after the agreement is signed, nothing will prevent Russia from launching a new offensive if it deems it convenient, knowing that the US has not committed to defending it militarily. Experts have already warned that a ceasefire without robust protection may only be a pause for Russian rearmament, rendering the conflict “frozen” temporarily and potentially resumed in the near future. The European strategic community has expressed similar concern: without American deterrence, the risk of further Russian aggressions in the region increases considerably [1]. Denmark, for example, has released intelligence reports warning of possible imminent Russian attacks, prompting neighboring countries to accelerate plans for independent defense [1].
The legitimacy of this asymmetric peace agreement (negotiated without Ukraine fully at the table and under economic coercion) is also questionable from a legal and moral point of view. It violates the principle of self-determination by imposing terms decided by great powers on a sovereign country—a practice reminiscent of dark chapters in diplomacy, such as the Munich Agreement of 1938, when powers determined the fate of Czechoslovakia without its consent. In the current case, Ukraine would end up signing the agreement, but from a position of weakness, raising doubts about how durable such a commitment would be.
From Mackinder’s perspective, Ukraine’s removal from the battlefield without guarantees essentially means admitting a greater influence of Russia (the Heartland power) over Eastern Europe. This would alter the balance in Eurasia in a potentially lasting way. Furthermore, the fact that great powers negotiate over the heads of a smaller country evokes the imperial logic of the nineteenth and early twentieth centuries, when empires decided among themselves the divisions of foreign territories—a behavior that Mackinder saw as likely in a world of a “closed system.” With the entire world already occupied by States, Mackinder predicted that powers would begin to compete for influence within this consolidated board, often subjugating smaller states to gain advantage [3]. The US–Russia negotiation regarding Ukraine, without proper Ukrainian representation, exemplifies this type of neo-imperial dynamic in the twenty-first century.
Also noteworthy is the consonance with the ideas of Ratzel and Kjellén: both viewed smaller states as easily relegated to the status of satellites or even “parasitic organisms” in the orbit of larger states. Kjellén spoke of the intrinsic vulnerability of states with little territorial depth or economic dependence, making them susceptible to external pressures [4][20]. Ukraine, weakened by war and dependent on external aid, becomes a concrete example of this theorized vulnerability: it has had to cede strategic resources and accept terms dictated against its will in an attempt to secure its immediate survival. The resulting agreement, therefore, reflects a power imbalance characteristic of the hierarchical international relations described by classical geopolitical theorists.
Implicit Territorial Concessions and Trump’s Public Discourse
A central and controversial point in Trump’s statements regarding the war in Ukraine is the insinuation of territorial concessions to Russia as part of the conflict’s resolution. Publicly, Trump avoided explicitly condemning Russian aggression and even stated that he considered it “unlikely” that Ukraine would be able to retake all the areas occupied by the Russians [16]. In debates and interviews, he suggested that “if I were president, the war would end in 24 hours,” implying that he would force an understanding between Kyiv and Moscow that would likely involve ceding some territory in exchange for peace. This position marks a break with the previous US policy of not recognizing any territorial acquisitions made by force and fuels speculations that a future peace agreement sponsored by Trump would legitimize at least part of Russia’s gains since 2014 (Crimea, Donbass, and areas seized during the 2022 invasion).
The actions of his administration corroborate this interpretation. As discussed, the economic agreement focuses on the exploitation of Ukrainian natural resources, many of which are located precisely in regions currently under Russian military control, such as parts of the Zaporizhzhia Oblast, Donetsk, Lugansk, and the Azov Sea area [6]. A Ukrainian geologist, Hanna Liventseva, highlighted that “most of these elements (strategic minerals) are found in the south of the Ukrainian Shield, mainly in the Azov region, and most of these territories are currently invaded by Russia” [6]. This means that, to make joint exploitation viable, Russia’s de facto control over these areas would have to be recognized—or at least tolerated—in the short term. In other words, the pact indirectly and tacitly accepts Russian territorial gains, as it involves sharing the profits from resources that are not currently accessible to the Kyiv government.
Furthermore, figures close to Trump have made explicit statements regarding the possibility of territorial cession. Mike Waltz, Trump’s national security advisor, publicly stated that Zelensky might need to “cede land to Russia” to end the war [8]. This remark—made public in March 2025—confirms that the Trump White House considers it natural for Ukraine to relinquish parts of its territory in favor of an agreement. Such a stance marks a break from the previous Western consensus, which condemned any territorial gains by force. Under Trump, a pragmatic view (in the eyes of his supporters) or a cynical one (according to his critics) seems to prevail: sacrificing principles of territorial integrity to quickly end hostilities and secure immediate economic benefits.
In theoretical terms, this inclination to validate territorial gains by force recalls the concept of Realpolitik and the geopolitical Darwinism that influenced thinkers such as Ratzel. In Ratzel’s organic conception, expanding states naturally absorb neighboring territories when they are strong enough to do so, while declining states lose territory—a process almost biological in the selection of the fittest [11]. The Trump administration’s acceptance that Ukraine should “give something” to Moscow to seal peace reflects a normalization of this geopolitical selection process: it recognizes the aggressor (Russia) as having the “right” to retain conquered lands, because that is how power realities on the ground dictate. Mackinder, although firmly opposed to allowing Russia to dominate the Heartland, would see this outcome as the logical consequence of the lack of engagement from maritime powers (the USA and the United Kingdom, for example) in sustaining the Ukrainian counterattack. Without the active involvement of maritime power to balance the dispute, land power prevails in Eastern Europe.
From the perspective of international legitimacy, the cession of Ukrainian territories—whether de jure or de facto—creates a dangerous precedent in the post-Cold War era. Rewarding violent aggression with territorial gains may encourage similar strategies in other parts of the world, undermining the architecture of collective security. This is possibly a return to a world of spheres of influence, where great powers define borders and zones of control according to their convenience—something that the rules-based order after 1945 sought to avoid. Here, academic impartiality requires noting that coercion for territorial concessions rarely produces lasting peace, as the aggrieved party—in this case, Ukraine—may accept temporarily but will continue to assert its rights in the long term, as has occurred with other territorial injustices in history.
Territorial Ambitions of Trump: Greenland and Canada
Beyond the Eurasian theater of war, Trump revived geopolitical ambitions involving territories traditionally allied with the US: Greenland (an autonomous territory of Denmark) and Canada. As early as 2019, during his first term, Trump shocked the world by proposing to buy Greenland—rich in minerals and strategically positioned in the Arctic. Upon his return to power, he went further: expressing a “renewed interest” in acquiring Greenland and publicly suggesting the incorporation of Canada as the 51st American state [2].
In January 2025, during a press conference at Mar-a-Lago, he even displayed maps in which the US and Canada appeared merged into a single country, while Greenland was marked as a future American possession [2]. Posts by the president on social media included satirical images with a map of North America where Canada was labeled “51st” and Greenland designated as “Our Land” [2].
Such moves were met with concern and disbelief by allies. Canadian Prime Minister Justin Trudeau was caught on an open microphone warning that Trump’s fixation on annexation “is real” and not just a joke [7]. Trudeau emphasized that Washington appeared to covet Canada’s vast mineral resources, which would explain the insistence on the idea of absorption [7]. In public, Trump argued that Canadians “would be more prosperous as American citizens,” promising tax cuts and better services should they become part of the US [7]. On the Danish side, the reaction to the revived plan regarding Greenland was firmly negative—as it was in 2019—reaffirming that the territory is not for sale. Trump, however, insinuated that the issue might be one of national security, indicating that American possession of Greenland would prevent adverse influences (a reference to China and Russia in the Arctic) [2]. More worryingly, he refused to rule out the use of military means to obtain the island, although he assured that he had no intention of invading Canada by force (in the Canadian case, he spoke of “economic force” to forge a union) [2].
This series of initiatives reflects an unprecedented expansionist impetus by the US in recent times, at least in discourse. Analyzing this through the lens of classical geopolitics offers interesting insights. Friedrich Ratzel and his notion of Lebensraum suggest that powerful states, upon reaching a certain predominance, seek to expand their territory by influencing or incorporating adjacent areas. Trump, by targeting the immediate neighbor (Canada) and a nearby strategic territory (Greenland), appears to resurrect this logic of territorial expansion for the sake of gaining space and resources. Ratzel saw such expansion almost as a natural process for vigorous states, comparable to the growth of an organism [11]. From this perspective, the US would be exercising its “right” of expansion in North America and the polar region, integrating areas of vital interest.
Additionally, Alfred Mahan’s view on maritime power helps to understand the strategic value of Greenland. Mahan postulated that control of key maritime chokepoints and naval bases ensures global advantage [9]. Greenland, situated between the North Atlantic and the Arctic, has become increasingly relevant as climate change opens new polar maritime routes and reveals vast mineral deposits (including rare earth elements and oil). For the US, having a presence or sovereignty over Greenland would mean dominating the gateway to the Arctic and denying this space to rivals. This aligns with Mahan’s strategy of securing commercial and military routes (in this case, potential Arctic routes) and resources to consolidate naval supremacy. On the other hand, the incorporation of Canada—with its enormous territory, Arctic coastline, and abundant natural resources—would provide the US with formidable geoeconomic and geopolitical reinforcement, practically eliminating vulnerabilities along its northern border. This is an ambitious project that also echoes ideas of Kjellén, for whom an ideal State should seek territorial completeness and economic self-sufficiency within its region. Incorporating Canada would be the pinnacle of American regional autarky, turning North America into a unified bloc under Washington (a scenario reminiscent of the “pan-regions” conceived by twentieth-century geopoliticians influenced by Kjellén).
It is important to note, however, that these ambitions face enormous legal and political obstacles. The sovereignty of Canada and Greenland (Denmark) is guaranteed by international law, and both peoples categorically reject the idea of annexation. Any hostile action by the US against these countries would shake alliances and the world order itself. Even so, the very fact that an American president suggests such possibilities already produces geopolitical effects: traditional partners begin to distrust Washington’s intentions, seek alternative alliances, and strengthen nationalist discourses of resistance. In summary, Trump’s expansionist intentions in Greenland and Canada rekindle old territorial issues and paradoxically place the US in the position of a revisionist power—a role once associated with empires in search of colonies.
Implications for Brazil and South America: A New Neocolonization?
In light of this geopolitical reconfiguration driven by Trump's USA—with a reordering of alliances and a possible partition of spheres of influence among great powers—the question arises: what is the impact on Brazil and the other countries of South America? Traditionally, Latin America has been under the aegis of the Monroe Doctrine (1823), which established non-interference by Europe in the region and, implicitly, the primacy of the USA in the Western Hemisphere. In the post–Cold War period, this influence translated more into political and economic leadership, without formal annexations or direct territorial domination. However, the current context points to a kind of “neocolonization” of the Global South, in which larger powers seek to control resources and peripheral governments in an indirect yet effective manner.
Mackinder’s theories can be used to illuminate this dynamic. As mentioned, Mackinder envisioned the twentieth-century world as a closed system, in which there were no longer any unknown lands to be colonized—hence, the powers would fight among themselves for control over already occupied regions [3]. He predicted that Africa and Latin America (then largely European colonies or semi-colonies) would continue as boards upon which the great powers would project their disputes, a form of neocolonialism. In the current scenario, we see the USA proposing exchanges of protection for resources (as in Ukraine) and even leaders of developing countries seeking similar agreements. A notable example: the President of the Democratic Republic of the Congo, Felix Tshisekedi, praised the USA–Ukraine initiative and suggested an analogous agreement involving Congolese mineral wealth in exchange for US support against internal rebels (M23) [19]. In other words, African countries and possibly South American ones may enter into this logic of offering privileged access to resources (cobalt, lithium, food, biodiversity) in order to obtain security guarantees or investments. This represents a regression to the times when external powers dictated the directions of the South in exchange for promises of protection, characterizing a strategic neocolonialism.
For Brazil, in particular, this rearrangement generates both opportunities and risks. As a regional power with considerable diplomatic autonomy, Brazil has historically sought to balance relationships with the USA, Europe, China, and other actors, avoiding automatic alignments. However, in a world where Trump’s USA is actively redefining spheres of influence—possibly making deals with Russia that divide priorities (for example, Washington focusing on the Western Hemisphere and Moscow on the Eastern)—South America could once again be seen as an exclusive American sphere of influence. From this perspective, Washington could pressure South American countries to align with its directives, limiting partnerships with rivals (such as China) and seeking privileged access to strategic resources (such as the Amazon, fresh water, minerals, and agricultural commodities). Some indications are already emerging: Trump’s transactional approach mentioned by Nye included pressures on Canada and Mexico regarding border and trade issues, under the threat of commercial sanctions. It would not be unthinkable to adopt a hard line, for example, with regard to Brazilian environmental policies (linked to the Amazon) or Brazil’s relations with China, using tariffs or incentives as leverage—a sort of geopolitics of economic coercion.
On the other hand, Brazil and its neighbors could also attempt to take advantage of the Sino–North American competition. If the USA is distracted consolidating its hemispheric “hard power” hegemony (even with annexation fantasies in the north), powers such as China may advance their economic presence in South America through investments and trade (Belt and Road, infrastructure financing)—which is already happening. This would constitute an indirect neocolonial dispute in the South: Chinese loans and investments versus American demands and agreements, partly reminiscent of the nineteenth-century imperial competition (when the United Kingdom, USA, and others competed for Latin American markets and resources).
From a conceptual standpoint, Mackinder might classify South America as part of the “Outer Crescent” (external insular crescent)—peripheral to the great Eurasian “World-Island,” yet still crucial as a source of resources and a strategic position in the South Atlantic and Pacific. If the USA consolidates an informal empire in the Americas, it would be reinforcing its “insular bastion” far from the Eurasian Heartland, a strategy that Mackinder once suggested for maritime powers: to control islands and peripheral continents to compensate for the disadvantage of not controlling the Heartland. However, an excessive US dominance in the South could lead to local resistance and alternative alignments, unbalancing the region.
Kjellén would add that for Brazil to maintain its decisive sovereignty, it will need to strengthen its autarky and internal cohesion—in other words, reduce vulnerabilities (economic, military, social) that external powers might exploit [4]. Meanwhile, Mahan might point out the importance for Brazil of controlling its maritime routes and coastlines (South Atlantic) to avoid being at the mercy of a naval power like the USA. And Ratzel would remind us that states that do not expand their influence tend to be absorbed by foreign influences—which, in the context of Brazil, does not mean conquering neighboring territories, but rather actively leading South American integration to create a block more resilient to external intrusion.
In summary, South America finds itself in a more competitive and segmented world, where major players are resurrecting practices from past eras. The notion of “neocolonization” here does not imply direct occupation, but rather mechanisms of dependency: whether through unequal economic agreements or through diplomatic or military pressure for alignment. Brazil, as the largest economy and territory on the subcontinent, will have to navigate with heightened caution. A new global power balance, marked by the division of spheres of influence among the USA, China, and Russia, may reduce the sovereign maneuvering space of South American countries unless they act jointly. Thus, theoretical reflection suggests the need for South–South strategies, reinforcement of regional organizations, and diversification of partnerships to avoid falling into modern “neocolonial traps.”
Conclusion
The emerging post–re-election geopolitical conjuncture of Donald Trump signals a return to classical geopolitical principles, after several decades of predominance of institutional liberal views. We witness the revaluation of concepts such as spheres of influence, exchanges of protection for resources, naval power versus land power, and disputes over territory and raw materials—all central themes in the writings of Mackinder, Mahan, Kjellén, and Ratzel at the end of the nineteenth and the beginning of the twentieth century. An impartial analysis of these events, in light of these theories, shows internal coherence in Trump’s actions: although controversial, they follow a logic of maximizing national interest and the relative power of the USA on the world stage, even at the expense of established principles and alliances.
Halford Mackinder reminds us that, in a closed world with no new lands to conquer, the great powers will seek to redistribute the world among themselves [3]. This seems to manifest in the direct understandings between the USA and Russia over the fate of Ukraine, and in American ambitions in the Arctic and the Western Hemisphere. Alfred Mahan emphasizes that the control of the seas and strategic positions ensures supremacy—we see reflections of this in Trump’s obsession with Greenland (Arctic) and the possible neglect of the importance of maintaining NATO (and therefore the North Atlantic) as a cohesive bloc, something that Mahan’s theory would criticize due to the risk of a naval vacuum. Rudolf Kjellén and Friedrich Ratzel provide the framework to understand the more aggressive facet of expansionist nationalism: the idea of the State as an organism that needs to grow, secure resources, and seek self-sufficiency explains everything from the extortionate agreement imposed on Ukraine to the annexation rhetoric regarding Canada.
The potential consequences are profound. In the short term, we may witness a precarious ceasefire in the Ukraine war, with consolidated Russian territorial gains and Ukraine economically tied to the USA, but without formal military protection—a fragile “armed peace.” Western Europe, alarmed, may accelerate its independent militarization, perhaps marking the beginning of European defense autonomy, as is already openly debated [1]. At the far end of the globe, American activism in the Arctic and the Americas may reshape alliances: countries like Canada, once aligned with Washington, might seek to guarantee their sovereignty by distancing themselves from it; powers like China could take advantage of the openings to increase their presence in Latin America and Africa through economic diplomacy; and emerging countries of the Global South may have to choose between submitting to new “guardianships” or strengthening South–South cooperation.
Ultimately, the current situation reinforces the relevance of studying geopolitics through historical lenses. The actions of the Trump administration indicate that, despite all technological and normative advances, the competition for geographic power has not disappeared—it has merely assumed new formats. Academic impartiality obliges us not to prematurely judge whether these strategies will be successful or beneficial, but history and theory warn that neo-imperial movements tend to generate counter-reactions. As Mackinder insinuated, “every shock or change anywhere reverberates around the world,” and a sudden move by a superpower tends to provoke unforeseen adjustments and chain conflicts. It remains to be seen how the other actors—including Brazil and its neighbors—will adapt to this new chapter in the great struggle for global power, in which centuries-old theories once again have a surprising explanatory power over present events.
Bibliography
[1] A Referência. (2025). Europa calcula o custo de se defender sem os EUA: 300 mil soldados e 250 bilhões de euros a mais. Recuperado em 3 de março de 2025, de https://areferencia.com/europa/europa-calcula-o-custo-de-se-defender-sem-os-eua-300-mil-soldados-e-250-bilhoes-de-euros-a-mais/#:\~:text=Europa%20calcula%20o%20custo%20de,bilh%C3%B5es%20de%20euros%20a%20mais
[2] Brexit Institute. (2025). What happens if Trump invades Greenland? Recuperado em 3 de março de 2025, de https://dcubrexitinstitute.eu/2025/01/what-happens-if-trump-invades-greenland/#:\~:text=Ever%20since%20Donald%20Trump%20announced,agreed%20in%20Wales%20in%202014
[3] Cfettweis C:CST22(2)8576.DVI. (2025). Mackinder and Angell. Recuperado em 3 de março de 2025, de https://cfettweis.com/wp-content/uploads/Mackinder-and-Angell.pdf#:\~:text=meant%20the%20beginning%20of%20an,Mackinder
[4] Diva-Portal. (2025). The geopolitics of territorial relativity. Poland seen by Rudolf Kjellén. Recuperado em 3 de março de 2025, de https://www.diva-portal.org/smash/get/diva2:1696547/FULLTEXT02#:\~:text=,The%20state%20territory
[5] Geopolitical Monitor. (2025). The Russo-Ukrainian War and Mackinder’s Heartland Thesis. Recuperado em 3 de março de 2025, de https://www.geopoliticalmonitor.com/the-ukraine-war-and-mackinders-heartland-thesis/#:\~:text=In%201904%2C%20Sir%20Halford%20J,in%20adding%20a%20substantial%20oceanic
[6] Instituto Humanitas Unisinos. (2025). Trump obriga Zelensky a hipotecar a exploração de minerais críticos em troca do seu apoio. Recuperado em 3 de março de 2025, de https://www.ihu.unisinos.br/648986-trump-obriga-zelensky-a-hipotecar-a-exploracao-de-minerais-criticos-em-troca-do-seu-apoio#:\~:text=Essa%20troca%20inclui%20os%20cobi%C3%A7ados,s%C3%A3o%20praticamente%20inexploradas%20no%20pa%C3%ADs
[7] Politico. (2025). Trump’s annexation fixation is no joke, Trudeau warns. Recuperado em 3 de março de 2025, de https://www.politico.com/news/2025/02/07/canada-trudeau-trump-51-state-00203156#:\~:text=TORONTO%20%E2%80%94%20Prime%20Minister%20Justin,Canada%20becoming%20the%2051st%20state%2C%E2%80%9D%20Trudeau%20said
[8] The Daily Beast. (2025). Top Trump Adviser Moves Goalpost for Ukraine to End War. Recuperado em 3 de março de 2025, de https://www.thedailybeast.com/top-trump-adviser-moves-goalpost-for-ukraine-to-end-war/#:\~:text=LAND%20GRAB
[9] The Geostrata. (2025). Alfred Thayer Mahan and Supremacy of Naval Power. Recuperado em 3 de março de 2025, de https://www.thegeostrata.com/post/alfred-thayer-mahan-and-supremacy-of-naval-power#:\~:text=Alfred%20Thayer%20Mahan%20and%20Supremacy,control%20over%20maritime%20trade%20routes
[10] U.S. Department of State. (2025). Mahan’s The Influence of Sea Power upon History: Securing International Markets in the 1890s. Recuperado em 3 de março de 2025, de https://history.state.gov/milestones/1866-1898/mahan#:\~:text=Mahan%20argued%20that%20British%20control,American%20politicians%20believed%20that%20these
[11] Britannica. (2025a). Friedrich Ratzel | Biogeography, Anthropogeography, Political Geography. Recuperado em 3 de março de 2025, de https://www.britannica.com/biography/Friedrich-Ratzel#:\~:text=webster,Swedish%20political%20scientist%20%2076
[12] Britannica. (2025b). Lebensraum. Recuperado em 3 de março de 2025, de https://www.britannica.com/topic/Lebensraum#:\~:text=defined,The
[13] Britannica. (2025c). Rudolf Kjellén. Recuperado em 3 de março de 2025, de https://www.britannica.com/biography/Rudolf-Kjellen
[14] Wikipedia (ZH). (2025). Rudolf Kjellén. Recuperado em 3 de março de 2025, de https://zh.wikipedia.org/wiki/w:Rudolf_Kjell%C3%A9n#:\~:text=Besides%20legalistic%2C%20states%20have%20organic,preservation.%20%5B%203
[15] Wikipedia. (2025). Lebensraum. Recuperado em 3 de março de 2025, de https://en.wikipedia.org/wiki/Lebensraum#:\~:text=The%20German%20geographer%20and%20ethnographer,into%20the%20Greater%20Germanic%20Reich
[16] YouTube. (2025). Trump says Ukraine 'unlikely to get all land back' or join NATO [Vídeo]. Recuperado em 3 de março de 2025, de https://www.youtube.com/watch?v=BmHzAVLhsXU#:\~:text=Trump%20says%20Ukraine%20%27unlikely%20to,for%20it%20to%20join%20NATO
[17] U.S. Naval Institute. (2025) Operation World Peace. Recuperado em 3 de março de 2025, de https://www.usni.org/magazines/proceedings/1955/june/operation-world-peace#:\\~:text=“The Mahan doctrine%2C” according to,the word “airships” is more
[18] Emissary. (2024) Trump’s Greenland and Panama Canal Threats Are a Throwback to an Old, Misguided Foreign Policy. Recuperado em 3 de março de 2025, de https://carnegieendowment.org/emissary/2025/01/trump-greenland-panama-canal-monroe-doctrine-policy?lang=en
[19] A Referência. Acordo EUA-Ucrânia está praticamente fechado, mas analistas se dividem sobre quem sairá ganhando. Recuperado em 3 de março de 2025, de https://areferencia.com/europa/acordo-eua-ucrania-esta-praticamente-fechado-mas-analistas-se-dividem-sobre-quem-saira-ganhando/#:\\~:text=EUA e 17,o acordo a seu favor
[20] Wikipedia. (2025) Geopolitik. Recuperado em 3 de março de 2025, de https://en.wikipedia.org/wiki/Geopolitik#:\\~:text=Rudolph Kjellén was Ratzel's Swedish,Kjellén's State
-
@ 147ac18e:ef1ca1ba
2025-03-07 14:04:46The world is on the brink of a technological shift, where artificial intelligence (AI) is becoming increasingly autonomous. With AI agents conducting transactions, hiring other AI agents, and managing digital assets, a critical question arises: What form of money will power this new AI-driven economy? The answer, as some industry experts predict, is Bitcoin.
The Rise of the Autonomous Economy
AI agents are no longer just tools executing predefined tasks; they are evolving into independent economic actors capable of initiating transactions, negotiating terms, and paying for services. The transaction volume within AI-driven economies is projected to be 100 times larger than human transactions, as each person may have dozens or even hundreds of AI agents working on their behalf. This creates an unprecedented demand for a seamless, efficient, and universally accepted form of digital money.
Why Bitcoin is the Natural Choice for AI Transactions
Bitcoin stands out as the ideal currency for AI-driven economies for several reasons:
-
Borderless and Permissionless: Unlike traditional banking systems that require identity verification (KYC/AML) and impose restrictions based on geography, Bitcoin allows AI agents to transact freely without human intervention.
-
Personless Transactions: AI agents, by nature, do not have legal identities, making it impossible for them to interact with banks or obtain credit cards. Bitcoin provides a neutral medium that does not require a legal entity to use it.
-
Energy-Backed Economy: AI agents function on computational power, which is an energy-intensive process. Bitcoin’s proof-of-work mechanism aligns well with this model, as it is also backed by computational energy. AI systems will inherently recognize Bitcoin as a valid medium of exchange due to this energy linkage.
-
Micropayments via Lightning Network: AI transactions will often involve micropayments—small fees for data processing, information retrieval, and digital labor. Traditional financial networks are inefficient in handling such transactions due to high fees and processing delays. The Bitcoin Lightning Network enables instant, low-cost micropayments, making it perfect for AI-to-AI financial interactions.
-
Immutability and Transparency: AI systems require trustless environments where transaction history cannot be altered or reversed. Bitcoin’s blockchain ensures that all transactions are transparent and immutable, reducing fraud and enabling verifiable AI-driven commerce.
The Symbiotic Growth of Bitcoin and AI
As AI-driven economies expand, Bitcoin adoption will accelerate in the following ways:
-
Increased Transaction Volume: With billions of AI transactions occurring daily, Bitcoin will see an explosion in on-chain and Lightning Network activity, solidifying its position as the world’s primary digital currency.
-
Institutional and Enterprise Adoption: As businesses integrate AI into their workflows, they will increasingly adopt Bitcoin to facilitate machine-to-machine payments, smart contracts, and decentralized finance (DeFi) solutions.
-
Regulatory Shift Towards Decentralized Currencies: Governments and financial institutions will have to acknowledge Bitcoin’s role in AI economies and adjust regulatory frameworks accordingly, further legitimizing its use.
-
Bitcoin as a Store of Value for AI: AI systems will not only use Bitcoin for transactions but may also accumulate it as a reserve asset due to its deflationary nature and finite supply.
The Future: Bitcoin as the De Facto AI Currency
As AI continues to reshape industries, Bitcoin is poised to become the backbone of an autonomous digital economy. The fusion of AI and Bitcoin will create a self-sustaining loop where AI agents fuel Bitcoin’s transactional utility, and Bitcoin’s decentralized nature enables AI’s economic autonomy. This symbiosis will not only drive Bitcoin adoption but could also redefine global economic structures.
In this AI-driven future, Bitcoin may not just be a currency for humans—it could very well be the native currency of artificial intelligence.
Episode link: https://fountain.fm/episode/Ds1qicPmbC3udErQ7J3z
-
-
@ a012dc82:6458a70d
2025-03-07 13:17:07In an era where digital currencies are becoming as commonplace as traditional banking, a groundbreaking development has emerged from the UK, capturing the attention of both financial experts and law enforcement agencies worldwide. The UK police have made a monumental discovery, uncovering a staggering $1.7 billion in Bitcoin, intricately linked to a vast investment fraud scheme with roots deep in China. This revelation not only highlights the growing issue of cybercrime and financial fraud but also showcases the sophisticated methods employed by criminals to exploit the digital currency landscape for illicit purposes.
Table of Contents
-
The Discovery
-
The Accusation
-
The Implications
-
The Investigation
-
The Broader Impact
-
Conclusion
-
FAQs
The Discovery
The astonishing discovery was made amidst the trial of Jian Wen, a 42-year-old UK citizen embroiled in allegations of money laundering connected to a massive $6 billion investment fraud scheme. This scheme, masterminded by Zhimin Qian, known to some as Yadi Zhang, has left approximately 130,000 investors in China in dire straits, their investments vanished into the ether. The UK police's breakthrough in tracing the Bitcoin linked to this scheme underscores the meticulous and technologically advanced tactics utilized by law enforcement to combat digital financial crimes. The ability to trace such a significant amount of Bitcoin back to a specific fraud case marks a significant achievement in the realm of financial crime investigation, reflecting the increasing capability of global law enforcement agencies to adapt to the challenges posed by the digital age.
The Accusation
Jian Wen finds herself at the center of this complex web of financial deceit, accused of attempting to launder the ill-gotten gains from the fraudulent scheme. Her alleged attempts to funnel these vast sums into the London real estate market, though ultimately unsuccessful, paint a vivid picture of the lengths to which individuals involved in such schemes will go to legitimize their criminal proceeds. Wen's steadfast denial of the allegations against her adds a layer of intrigue to the case, challenging prosecutors to untangle the sophisticated methods used to disguise the fraudulent origins of the funds. This case highlights the critical need for vigilance and sophistication in tracking financial transactions across the globe, as criminals increasingly turn to complex schemes and digital currencies to obscure their activities.
The Implications
The implications of this case extend far beyond the immediate legal battle unfolding in London. It shines a spotlight on the dark underbelly of the digital currency world, where anonymity and the lack of regulatory oversight can too easily be exploited for nefarious purposes. The use of Bitcoin and other cryptocurrencies in money laundering and fraud schemes poses significant challenges for regulators and law enforcement worldwide. This case serves as a stark reminder of the urgent need for international cooperation and regulatory harmonization to address the vulnerabilities of the digital financial system. As cryptocurrencies continue to gain mainstream acceptance, the need for enhanced regulatory frameworks and advanced technological tools to monitor and control digital financial transactions becomes increasingly apparent.
The Investigation
The investigation leading to the discovery of the $1.7 billion in Bitcoin is a testament to the evolving landscape of law enforcement in the digital age. The success of the UK police in tracing these funds highlights the advancements in forensic technology and the growing expertise within law enforcement agencies in navigating the complex world of cryptocurrency transactions. This case exemplifies the potential for collaboration between financial institutions, regulatory bodies, and international law enforcement agencies to combat financial crime effectively. The ability to trace and recover assets in cryptocurrency form represents a significant step forward in the global fight against money laundering and investment fraud, setting a precedent for future investigations.
The Broader Impact
The uncovering of this vast sum of Bitcoin linked to the China fraud scheme has far-reaching implications for the cryptocurrency market and the broader financial ecosystem. It raises critical questions about the security and stability of digital currencies and the potential for their misuse in criminal enterprises. This case could serve as a catalyst for change, prompting policymakers and regulators to implement more stringent controls on cryptocurrency transactions and enhance the transparency of digital financial systems. As the digital currency market continues to evolve, the lessons learned from this investigation will undoubtedly influence the development of policies and technologies designed to protect investors and maintain the integrity of the financial system.
Conclusion
The discovery of $1.7 billion in Bitcoin by the UK police marks a watershed moment in the fight against international financial fraud. As the trial against Jian Wen progresses, it promises to offer unprecedented insights into the mechanisms of cryptocurrency laundering and the global nature of financial crime. This case not only underscores the critical role of digital currencies in the modern financial landscape but also highlights the imperative for continuous vigilance, innovation, and cooperation among law enforcement, regulatory bodies, and the financial industry at large. In the quest to safeguard the integrity of the global financial market, the unraveling of this $1.7 billion Bitcoin mystery represents both a significant challenge and a vital opportunity for the future of financial security and crime prevention.
FAQs
Who is Jian Wen, and what are the accusations against her? Jian Wen is a 42-year-old UK citizen accused of attempting to launder the proceeds of a $6 billion investment fraud scheme from China by investing in high-value properties in London. She denies the allegations.
How did the UK police trace the Bitcoin linked to the fraud? The UK police utilized advanced forensic technology and collaborated with international law enforcement agencies to trace the Bitcoin transactions back to the fraud scheme, demonstrating their growing expertise in combating digital financial crimes.
What are the broader implications of this case for the cryptocurrency market? This case highlights the potential for misuse of cryptocurrencies in money laundering and fraud schemes, raising questions about the need for enhanced regulatory frameworks and technological tools to monitor digital financial transactions.
What does this case reveal about the challenges of combating financial crime in the digital age? The case underscores the complexities and challenges law enforcement faces in tracking and prosecuting financial crimes that exploit digital currencies, emphasizing the need for international cooperation and advanced technological capabilities.
How might this discovery influence future regulatory policies on cryptocurrencies? The discovery could prompt policymakers and regulators to implement stricter controls on cryptocurrency transactions and develop more transparent and secure digital financial systems to prevent their misuse in criminal activities.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ fcd81845:5c1832a7
2025-03-07 09:25:39Price Updates
In order to improve the services we offer, we are increasing the prices effective date March 6th 2025:
Here are the price changes (all prices are per month, rolling contract):
| name | Price | New Price | | ---- | ----- | --------- | | Tiny | 2 EUR | 2.70 EUR | | Small | 4 EUR | 5.10 EUR | | Medium | 8 EUR | 9.90 EUR | | Large | 17 EUR | 21.90 EUR | | X-Large | 30 EUR | 39.90 EUR | | XX-Large | 45 EUR | 55.50 EUR |
These changes coincide with the release of custom pricing!
We have also released a few other features:
- User configurable PTR records
- Separate billing page o VM info view
- VM resource usage graphs
- New VM's are assigned a forward DNS entry on lnvps.cloud (eg. vm-1.lnvps.cloud) existing VM's will have a forward entry added at a later date.
- As well as many other smaller improvements in the handling of resource allocation
-
@ 95cb4330:96db706c
2025-03-07 07:21:49Embracing Contrarian Thinking, as advocated by Peter Thiel, involves challenging prevailing beliefs to uncover unique opportunities and minimize competition. This mindset encourages asking:
"What important truth do very few people agree with me on?"
By doing so, individuals and organizations can identify untapped markets and innovate beyond conventional boundaries.
Understanding Contrarian Thinking
- Definition:
A mindset that involves questioning widely accepted norms and beliefs to discover unique insights and opportunities.
Examples in Practice
-
Peter Thiel's Investment in Facebook:
Thiel invested in Facebook when social media was largely dismissed as a passing trend, recognizing its potential to revolutionize communication. -
Elon Musk's Development of Tesla:
Musk pursued the development of electric vehicles despite widespread skepticism about their viability, ultimately leading to Tesla's success in the automotive industry. -
Jeff Bezos's Customer-Centric Approach at Amazon:
Bezos prioritized long-term customer satisfaction over immediate profits, a strategy that defied traditional retail models and contributed to Amazon's dominance.
Implementing Contrarian Thinking
-
Challenge Assumptions:
Regularly question the status quo and consider alternative perspectives. -
Embrace Risk:
Be willing to explore unconventional ideas, understanding that innovation often involves venturing into uncharted territory. -
Foster a Diverse Environment:
Encourage diverse viewpoints within your team to stimulate critical thinking and challenge groupthink.
Benefits of Contrarian Thinking
-
Innovation:
By challenging existing paradigms, contrarian thinkers can develop groundbreaking products and services. -
Competitive Advantage:
Identifying opportunities overlooked by others can lead to market leadership. -
Resilience:
A contrarian mindset fosters adaptability, enabling individuals and organizations to navigate changing environments effectively.
Action Step
Identify a commonly held belief in your industry or field. Consider the opposite perspective and explore the potential opportunities that this contrarian viewpoint might reveal.
By adopting contrarian thinking, you position yourself to uncover unique opportunities and drive innovation beyond conventional boundaries.
For further insights into Peter Thiel's approach to contrarian thinking, consider watching this discussion:
Peter Thiel's Contrarian Strategy
- Definition:
-
@ da0b9bc3:4e30a4a9
2025-03-07 06:27:17Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/906261
-
@ d360efec:14907b5f
2025-03-07 05:11:52Bitcoin (BTC) เผชิญกับการปรับฐานอย่างรุนแรงในวันที่ 7 มีนาคม 2568 หลังจากที่ราคาพุ่งขึ้นทำจุดสูงสุดใหม่ (All-Time High) อย่างต่อเนื่อง บทวิเคราะห์นี้จะเจาะลึกถึงสถานการณ์ปัจจุบันของ BTC โดยใช้การวิเคราะห์ทางเทคนิคจากหลาย Timeframe (15m, 4H, Day) พร้อมทั้งพิจารณาอินดิเคเตอร์สำคัญต่างๆ เพื่อประเมินแนวโน้มและกลยุทธ์การเทรดที่เหมาะสม
การวิเคราะห์ทางเทคนิค:
-
Timeframe 15 นาที (15m):
- เกิดการร่วงลงของราคาอย่างรุนแรง (Sell-Off) ทะลุแนวรับสำคัญหลายระดับ
- EMA 50 ตัด EMA 200 ลงมา (Death Cross) เป็นสัญญาณ Bearish ที่ชัดเจน
- Money Flow เป็นลบอย่างมาก
- Trend Strength เป็นเมฆสีแดงหนาแน่น (แนวโน้มขาลงแข็งแกร่ง)
- สรุป: แนวโน้มขาลงระยะสั้นชัดเจน
-
Timeframe 4 ชั่วโมง (4H):
- ราคาหลุดกรอบ Consolidation และ EMA 50
- EMA 50 ตัด EMA 200 ลงมา (Death Cross) ยืนยันสัญญาณ Bearish ระยะกลาง
- Money Flow เป็นลบ
- Trend Strength เป็นเมฆสีแดง
- แนวรับสำคัญอยู่ที่ EMA 200 (ประมาณ $60,000) และ $58,000
- สรุป: ยืนยันการปรับฐานระยะกลาง
-
Timeframe Day (Day):
- ราคายังคงอยู่เหนือ EMA 50 และ EMA 200 โครงสร้างขาขึ้นหลักยังไม่เสีย
- Money Flow ยังคงเป็นบวก (แม้จะเริ่มลดลง)
- Trend Strength เมฆสีเขียวยังคงอยู่ (แต่เริ่มบางลง)
- แนวรับสำคัญอยู่ที่ $60,000 (Low ก่อนหน้า) และ $50,000-$52,000 (EMA 200 และ Demand Zone)
- สรุป: แนวโน้มระยะยาวยังเป็นขาขึ้น แต่เริ่มมีสัญญาณอ่อนแรง
Buyside & Sellside Liquidity (สรุปจากทุก TF):
- Buyside Liquidity (แนวต้าน): $68,000-$69,000 (แนวต้านที่แข็งแกร่งในระยะสั้น), $72,000, $75,000 (เป้าหมายระยะยาว หากกลับเป็นขาขึ้น)
- Sellside Liquidity (แนวรับ): $60,000 (แนวรับสำคัญทางจิตวิทยา และ EMA 200 ใน TF 4H, Low ก่อนหน้าใน TF Day), $58,000 (Demand Zone ใน TF 4H), $50,000-$52,000 (EMA 200 และ Demand Zone ใน TF Day)
กลยุทธ์การเทรด:
- Day Trade (15m): ความเสี่ยงสูงมาก ไม่แนะนำให้ Buy เน้น Short Sell เมื่อราคา Rebound ขึ้นไปทดสอบแนวต้าน (EMA หรือบริเวณ $68,000-$69,000) และมีสัญญาณ Bearish แต่ต้องระมัดระวังอย่างยิ่ง เพราะขัดแย้งกับแนวโน้มหลักระยะยาว ตั้ง Stop Loss เหนือ Swing High
- Swing Trade (4H): ไม่แนะนำให้ Buy ตอนนี้ รอสัญญาณกลับตัวที่ชัดเจนกว่านี้ บริเวณแนวรับ EMA 200 ($60,000) หรือ $58,000 หากมีสัญญาณ Bullish ที่แนวรับเหล่านี้ ถึงจะพิจารณาเข้า Buy โดยตั้ง Stop Loss ต่ำกว่าแนวรับ
- Position Trade (Day): รอจังหวะที่แนวรับสำคัญ ($60,000 หรือ $50,000-$52,000) หรือรอสัญญาณกลับตัวที่ชัดเจน
สิ่งที่ต้องระวัง:
- ความผันผวนของราคา BTC ที่สูงมากในช่วงนี้
- ข่าวหรือเหตุการณ์ที่อาจส่งผลกระทบต่อตลาด
- False Breakout และ Dead Cat Bounce (การ Rebound สั้นๆ ก่อนลงต่อ)
- การสวน Trend มีความเสี่ยงสูงมาก
สรุป:
Bitcoin กำลังเผชิญกับการปรับฐานครั้งสำคัญ หลังจากที่ราคาพุ่งขึ้นอย่างต่อเนื่อง แนวโน้มระยะสั้น (15m) เป็นขาลงอย่างชัดเจน, ระยะกลาง (4H) ยืนยันการปรับฐาน, ส่วนระยะยาว (Day) ยังคงเป็นขาขึ้นแต่เริ่มอ่อนแรง นักลงทุนควรใช้ความระมัดระวังอย่างสูงในการเทรด Day Trader อาจพิจารณา Short Sell เมื่อมีสัญญาณ, Swing Trader ควรรอสัญญาณกลับตัวที่แนวรับ, ส่วน Position Trader ควรรอจังหวะที่แนวรับสำคัญ
Disclaimer: การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-
-
@ d360efec:14907b5f
2025-03-07 05:08:51$OKX: $BTC $USDT.P
Introduction:
Bitcoin (BTC) faced a sharp correction on March 7, 2025, after a continuous rally to new all-time highs. This analysis delves into the current situation of BTC using technical analysis from multiple timeframes (15m, 4H, Day), considering various key indicators to assess the trend and appropriate trading strategies.
Technical Analysis:
-
15-Minute Timeframe (15m):
- Experienced a sharp price drop (Sell-Off), breaking through several key support levels.
- EMA 50 crossed below EMA 200 (Death Cross), a clear Bearish signal.
- Money Flow is strongly negative.
- Trend Strength is a thick red cloud (strong downtrend).
- Conclusion: Clear short-term downtrend.
-
4-Hour Timeframe (4H):
- Price broke out of the consolidation range and below EMA 50.
- EMA 50 crossed below EMA 200 (Death Cross), confirming a medium-term Bearish signal.
- Money Flow is negative.
- Trend Strength is a red cloud.
- Key support is at EMA 200 (around $60,000) and $58,000.
- Conclusion: Confirms the medium-term correction.
-
Daily Timeframe (Day):
- The price remains above EMA 50 and EMA 200. The main uptrend structure is still intact.
- Money Flow remains positive (although starting to decrease).
- Trend Strength: The green cloud is still present (but starting to thin).
- Key support is at $60,000 (previous Low) and $50,000-$52,000 (EMA 200 and Demand Zone).
- Conclusion: The long-term trend is still uptrend, but signs of weakness are starting to appear.
Buyside & Sellside Liquidity (Summary from all TFs):
- Buyside Liquidity (Resistance): $68,000-$69,000 (strong resistance in the short term), $72,000, $75,000 (long-term targets if it turns bullish again).
- Sellside Liquidity (Support): $60,000 (key psychological support and EMA 200 on 4H TF, previous Low on Day TF), $58,000 (Demand Zone on 4H TF), $50,000-$52,000 (EMA 200 and Demand Zone on Day TF).
Trading Strategies:
- Day Trade (15m): Very high risk. Do not recommend Buy. Focus on Short Selling when the price rebounds to test resistance (EMA or the $68,000-$69,000 area) and there are Bearish signals. But be extremely careful as it contradicts the main long-term trend. Set a Stop Loss above the Swing High.
- Swing Trade (4H): Do not Buy now. Wait for clearer reversal signals around the EMA 200 support ($60,000) or $58,000. If there are Bullish signals at these supports, then consider entering a Buy with a Stop Loss below the support.
- Position Trade (Day): Wait for opportunities at key support levels ($60,000 or $50,000-$52,000) or wait for clear reversal signals.
Things to Watch Out For:
- Very high volatility of BTC price during this period.
- News or events that may affect the market.
- False Breakouts and Dead Cat Bounces (short rebounds before continuing to fall).
- Going against the trend is very high risk.
Summary:
Bitcoin is facing a significant correction after a continuous rally. The short-term trend (15m) is clearly bearish, the medium-term (4H) confirms the correction, while the long-term (Day) is still bullish but starting to weaken. Investors should be extremely cautious in trading. Day traders may consider Short Selling on signal, Swing traders should wait for reversal signals at support, and Position traders should wait for opportunities at key support levels.
Disclaimer: This analysis is a personal opinion and not investment advice. Investors should do their own research and make decisions carefully.
-
-
@ c48e29f0:26e14c11
2025-03-07 04:51:09ESTABLISHMENT OF THE STRATEGIC BITCOIN RESERVE AND UNITED STATES DIGITAL ASSET STOCKPILE EXECUTIVE ORDER March 6, 2025
By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered:
Section 1. Background.
Bitcoin is the original cryptocurrency. The Bitcoin protocol permanently caps the total supply of bitcoin (BTC) at 21 million coins, and has never been hacked. As a result of its scarcity and security, Bitcoin is often referred to as “digital gold”. Because there is a fixed supply of BTC, there is a strategic advantage to being among the first nations to create a strategic bitcoin reserve. The United States Government currently holds a significant amount of BTC, but has not implemented a policy to maximize BTC’s strategic position as a unique store of value in the global financial system. Just as it is in our country’s interest to thoughtfully manage national ownership and control of any other resource, our Nation must harness, not limit, the power of digital assets for our prosperity.
Sec. 2. Policy.
It is the policy of the United States to establish a Strategic Bitcoin Reserve. It is further the policy of the United States to establish a United States Digital Asset Stockpile that can serve as a secure account for orderly and strategic management of the United States’ other digital asset holdings.
Sec. 3. Creation and Administration of the Strategic Bitcoin Reserve and United States Digital Asset Stockpile.
(a) The Secretary of the Treasury shall establish an office to administer and maintain control of custodial accounts collectively known as the “Strategic Bitcoin Reserve,” capitalized with all BTC held by the Department of the Treasury that was finally forfeited as part of criminal or civil asset forfeiture proceedings or in satisfaction of any civil money penalty imposed by any executive department or agency (agency) and that is not needed to satisfy requirements under 31 U.S.C. 9705 or released pursuant to subsection (d) of this section (Government BTC). Within 30 days of the date of this order, each agency shall review its authorities to transfer any Government BTC held by it to the Strategic Bitcoin Reserve and shall submit a report reflecting the result of that review to the Secretary of the Treasury. Government BTC deposited into the Strategic Bitcoin Reserve shall not be sold and shall be maintained as reserve assets of the United States utilized to meet governmental objectives in accordance with applicable law.
(b) The Secretary of the Treasury shall establish an office to administer and maintain control of custodial accounts collectively known as the “United States Digital Asset Stockpile,” capitalized with all digital assets owned by the Department of the Treasury, other than BTC, that were finally forfeited as part of criminal or civil asset forfeiture proceedings and that are not needed to satisfy requirements under 31 U.S.C. 9705 or released pursuant to subsection (d) of this section (Stockpile Assets). Within 30 days of the date of this order, each agency shall review its authorities to transfer any Stockpile Assets held by it to the United States Digital Asset Stockpile and shall submit a report reflecting the result of that review to the Secretary of the Treasury. The Secretary of the Treasury shall determine strategies for responsible stewardship of the United States Digital Asset Stockpile in accordance with applicable law.
(c) The Secretary of the Treasury and the Secretary of Commerce shall develop strategies for acquiring additional Government BTC provided that such strategies are budget neutral and do not impose incremental costs on United States taxpayers. However, the United States Government shall not acquire additional Stockpile Assets other than in connection with criminal or civil asset forfeiture proceedings or in satisfaction of any civil money penalty imposed by any agency without further executive or legislative action.
(d) “Government Digital Assets” means all Government BTC and all Stockpile Assets. The head of each agency shall not sell or otherwise dispose of any Government Digital Assets, except in connection with the Secretary of the Treasury’s exercise of his lawful authority and responsible stewardship of the United States Digital Asset Stockpile pursuant to subsection (b) of this section, or pursuant to an order from a court of competent jurisdiction, as required by law, or in cases where the Attorney General or other relevant agency head determines that the Government Digital Assets (or the proceeds from the sale or disposition thereof) can and should: (i) be returned to identifiable and verifiable victims of crime; (ii) be used for law enforcement operations;
(iii) be equitably shared with State and local law enforcement partners; or (iv) be released to satisfy requirements under 31 U.S.C. 9705, 28 U.S.C. 524(c), 18 U.S.C. 981, or 21 U.S.C. 881.(e) Within 60 days of the date of this order, the Secretary of the Treasury shall deliver an evaluation of the legal and investment considerations for establishing and managing the Strategic Bitcoin Reserve and United States Digital Asset Stockpile going forward, including the accounts in which the Strategic Bitcoin Reserve and United States Digital Asset Stockpile should be located and the need for any legislation to operationalize any aspect of this order or the proper management and administration of such accounts.
Sec. 4. Accounting.
Within 30 days of the date of this order, the head of each agency shall provide the Secretary of the Treasury and the President’s Working Group on Digital Asset Markets with a full accounting of all Government Digital Assets in such agency’s possession, including any information regarding the custodial accounts in which such Government Digital Assets are currently held that would be necessary to facilitate a transfer of the Government Digital Assets to the Strategic Bitcoin Reserve or the United States Digital Asset Stockpile. If such agency holds no Government Digital Assets, such agency shall confirm such fact to the Secretary of the Treasury and the President’s Working Group on Digital Asset Markets within 30 days of the date of this order.
Sec. 5. General Provisions.
(a) Nothing in this order shall be construed to impair or otherwise affect: (i) the authority granted by law to an executive department or agency, or the head thereof; or (ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.
(b) This order shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
THE WHITE HOUSE, March 6, 2025
-
@ d34e832d:383f78d0
2025-03-07 01:47:15
A comprehensive system for archiving and managing large datasets efficiently on Linux.
1. Planning Your Data Archiving Strategy
Before starting, define the structure of your archive:
✅ What are you storing? Books, PDFs, videos, software, research papers, backups, etc.
✅ How often will you access the data? Frequently accessed data should be on SSDs, while deep archives can remain on HDDs.
✅ What organization method will you use? Folder hierarchy and indexing are critical for retrieval.
2. Choosing the Right Storage Setup
Since you plan to use 2TB HDDs and store them away, here are Linux-friendly storage solutions:
📀 Offline Storage: Hard Drives & Optical Media
✔ External HDDs (2TB each) – Use
ext4
orXFS
for best performance.
✔ M-DISC Blu-rays (100GB per disc) – Excellent for long-term storage.
✔ SSD (for fast access archives) – More durable than HDDs but pricier.🛠 Best Practices for Hard Drive Storage on Linux
🔹 Use
smartctl
to monitor drive health
bash sudo apt install smartmontools sudo smartctl -a /dev/sdX
🔹 Store drives vertically in anti-static bags.
🔹 Rotate drives periodically to prevent degradation.
🔹 Keep in a cool, dry, dark place.☁ Cloud Backup (Optional)
✔ Arweave – Decentralized storage for public data.
✔ rclone + Backblaze B2/Wasabi – Cheap, encrypted backups.
✔ Self-hosted options – Nextcloud, Syncthing, IPFS.
3. Organizing and Indexing Your Data
📂 Folder Structure (Linux-Friendly)
Use a clear hierarchy:
plaintext 📁 /mnt/archive/ 📁 Books/ 📁 Fiction/ 📁 Non-Fiction/ 📁 Software/ 📁 Research_Papers/ 📁 Backups/
💡 Use YYYY-MM-DD format for filenames
✅2025-01-01_Backup_ProjectX.tar.gz
✅2024_Complete_Library_Fiction.epub
📑 Indexing Your Archives
Use Linux tools to catalog your archive:
✔ Generate a file index of a drive:
bash find /mnt/DriveX > ~/Indexes/DriveX_index.txt
✔ Use
locate
for fast searches:
bash sudo updatedb # Update database locate filename
✔ Use
Recoll
for full-text search:
bash sudo apt install recoll recoll
🚀 Store index files on a "Master Archive Index" USB drive.
4. Compressing & Deduplicating Data
To save space and remove duplicates, use:
✔ Compression Tools:
-tar -cvf archive.tar folder/ && zstd archive.tar
(fast, modern compression)
-7z a archive.7z folder/
(best for text-heavy files)✔ Deduplication Tools:
-fdupes -r /mnt/archive/
(finds duplicate files)
-rdfind -deleteduplicates true /mnt/archive/
(removes duplicates automatically)💡 Use
par2
to create parity files for recovery:
bash par2 create -r10 file.par2 file.ext
This helps reconstruct corrupted archives.
5. Ensuring Long-Term Data Integrity
Data can degrade over time. Use checksums to verify files.
✔ Generate Checksums:
bash sha256sum filename.ext > filename.sha256
✔ Verify Data Integrity Periodically:
bash sha256sum -c filename.sha256
🔹 Use
SnapRAID
for multi-disk redundancy:
bash sudo apt install snapraid snapraid sync snapraid scrub
🔹 Consider ZFS or Btrfs for automatic error correction:
bash sudo apt install zfsutils-linux zpool create archivepool /dev/sdX
6. Accessing Your Data Efficiently
Even when archived, you may need to access files quickly.
✔ Use Symbolic Links to "fake" files still being on your system:
bash ln -s /mnt/driveX/mybook.pdf ~/Documents/
✔ Use a Local Search Engine (Recoll
):
bash recoll
✔ Search within text files usinggrep
:
bash grep -rnw '/mnt/archive/' -e 'Bitcoin'
7. Scaling Up & Expanding Your Archive
Since you're storing 2TB drives and setting them aside, keep them numbered and logged.
📦 Physical Storage & Labeling
✔ Store each drive in fireproof safe or waterproof cases.
✔ Label drives (Drive_001
,Drive_002
, etc.).
✔ Maintain a printed master list of drive contents.📶 Network Storage for Easy Access
If your archive grows too large, consider:
- NAS (TrueNAS, OpenMediaVault) – Linux-based network storage.
- JBOD (Just a Bunch of Disks) – Cheap and easy expansion.
- Deduplicated Storage –ZFS
/Btrfs
with auto-checksumming.
8. Automating Your Archival Process
If you frequently update your archive, automation is essential.
✔ Backup Scripts (Linux)
Use
rsync
for incremental backups:bash rsync -av --progress /source/ /mnt/archive/
Automate Backup with Cron Jobs
bash crontab -e
Add:plaintext 0 3 * * * rsync -av --delete /source/ /mnt/archive/
This runs the backup every night at 3 AM.Automate Index Updates
bash 0 4 * * * find /mnt/archive > ~/Indexes/master_index.txt
So Making These Considerations
✔ Be Consistent – Maintain a structured system.
✔ Test Your Backups – Ensure archives are not corrupted before deleting originals.
✔ Plan for Growth – Maintain an efficient catalog as data expands.For data hoarders seeking reliable 2TB storage solutions and appropriate physical storage containers, here's a comprehensive overview:
2TB Storage Options
1. Hard Disk Drives (HDDs):
-
Western Digital My Book Series: These external HDDs are designed to resemble a standard black hardback book. They come in various editions, such as Essential, Premium, and Studio, catering to different user needs. citeturn0search19
-
Seagate Barracuda Series: Known for affordability and performance, these HDDs are suitable for general usage, including data hoarding. They offer storage capacities ranging from 500GB to 8TB, with speeds up to 190MB/s. citeturn0search20
2. Solid State Drives (SSDs):
- Seagate Barracuda SSDs: These SSDs come with either SATA or NVMe interfaces, storage sizes from 240GB to 2TB, and read speeds up to 560MB/s for SATA and 3,400MB/s for NVMe. They are ideal for faster data access and reliability. citeturn0search20
3. Network Attached Storage (NAS) Drives:
- Seagate IronWolf Series: Designed for NAS devices, these drives offer HDD storage capacities from 1TB to 20TB and SSD capacities from 240GB to 4TB. They are optimized for multi-user environments and continuous operation. citeturn0search20
Physical Storage Containers for 2TB Drives
Proper storage of your drives is crucial to ensure data integrity and longevity. Here are some recommendations:
1. Anti-Static Bags:
Essential for protecting drives from electrostatic discharge, especially during handling and transportation.
2. Protective Cases:
- Hard Drive Carrying Cases: These cases offer padded compartments to securely hold individual drives, protecting them from physical shocks and environmental factors.
3. Storage Boxes:
- Anti-Static Storage Boxes: Designed to hold multiple drives, these boxes provide organized storage with anti-static protection, ideal for archiving purposes.
4. Drive Caddies and Enclosures:
- HDD/SSD Enclosures: These allow internal drives to function as external drives, offering both protection and versatility in connectivity.
5. Fireproof and Waterproof Safes:
For long-term storage, consider safes that protect against environmental hazards, ensuring data preservation even in adverse conditions.
Storage Tips:
-
Labeling: Clearly label each drive with its contents and date of storage for easy identification.
-
Climate Control: Store drives in a cool, dry environment to prevent data degradation over time.
By selecting appropriate 2TB storage solutions and ensuring they are stored in suitable containers, you can effectively manage and protect your data hoard.
Here’s a set of custom Bash scripts to automate your archival workflow on Linux:
1️⃣ Compression & Archiving Script
This script compresses and archives files, organizing them by date.
```bash!/bin/bash
Compress and archive files into dated folders
ARCHIVE_DIR="/mnt/backup" DATE=$(date +"%Y-%m-%d") BACKUP_DIR="$ARCHIVE_DIR/$DATE"
mkdir -p "$BACKUP_DIR"
Find and compress files
find ~/Documents -type f -mtime -7 -print0 | tar --null -czvf "$BACKUP_DIR/archive.tar.gz" --files-from -
echo "Backup completed: $BACKUP_DIR/archive.tar.gz" ```
2️⃣ Indexing Script
This script creates a list of all archived files and saves it for easy lookup.
```bash!/bin/bash
Generate an index file for all backups
ARCHIVE_DIR="/mnt/backup" INDEX_FILE="$ARCHIVE_DIR/index.txt"
find "$ARCHIVE_DIR" -type f -name "*.tar.gz" > "$INDEX_FILE"
echo "Index file updated: $INDEX_FILE" ```
3️⃣ Storage Space Monitor
This script alerts you if the disk usage exceeds 90%.
```bash!/bin/bash
Monitor storage usage
THRESHOLD=90 USAGE=$(df -h | grep '/mnt/backup' | awk '{print $5}' | sed 's/%//')
if [ "$USAGE" -gt "$THRESHOLD" ]; then echo "WARNING: Disk usage at $USAGE%!" fi ```
4️⃣ Automatic HDD Swap Alert
This script checks if a new 2TB drive is connected and notifies you.
```bash!/bin/bash
Detect new drives and notify
WATCHED_SIZE="2T" DEVICE=$(lsblk -dn -o NAME,SIZE | grep "$WATCHED_SIZE" | awk '{print $1}')
if [ -n "$DEVICE" ]; then echo "New 2TB drive detected: /dev/$DEVICE" fi ```
5️⃣ Symbolic Link Organizer
This script creates symlinks to easily access archived files from a single directory.
```bash!/bin/bash
Organize files using symbolic links
ARCHIVE_DIR="/mnt/backup" LINK_DIR="$HOME/Archive_Links"
mkdir -p "$LINK_DIR" ln -s "$ARCHIVE_DIR"//.tar.gz "$LINK_DIR/"
echo "Symbolic links updated in $LINK_DIR" ```
🔥 How to Use These Scripts:
- Save each script as a
.sh
file. - Make them executable using:
bash chmod +x script_name.sh
- Run manually or set up a cron job for automation:
bash crontab -e
Add this line to run the backup every Sunday at midnight:
bash 0 0 * * 0 /path/to/backup_script.sh
Here's a Bash script to encrypt your backups using GPG (GnuPG) for strong encryption. 🚀
🔐 Backup & Encrypt Script
This script will:
✅ Compress files into an archive
✅ Encrypt it using GPG
✅ Store it in a secure location```bash
!/bin/bash
Backup and encrypt script
ARCHIVE_DIR="/mnt/backup" DATE=$(date +"%Y-%m-%d") BACKUP_FILE="$ARCHIVE_DIR/backup_$DATE.tar.gz" ENCRYPTED_FILE="$BACKUP_FILE.gpg" GPG_RECIPIENT="your@email.com" # Change this to your GPG key or use --symmetric for password-based encryption
mkdir -p "$ARCHIVE_DIR"
Compress files
tar -czvf "$BACKUP_FILE" ~/Documents
Encrypt the backup using GPG
gpg --output "$ENCRYPTED_FILE" --encrypt --recipient "$GPG_RECIPIENT" "$BACKUP_FILE"
Verify encryption success
if [ -f "$ENCRYPTED_FILE" ]; then echo "Backup encrypted successfully: $ENCRYPTED_FILE" rm "$BACKUP_FILE" # Remove unencrypted file for security else echo "Encryption failed!" fi ```
🔓 Decrypting a Backup
To restore a backup, run:
bash gpg --decrypt --output backup.tar.gz backup_YYYY-MM-DD.tar.gz.gpg tar -xzvf backup.tar.gz
🔁 Automating with Cron
To run this script every Sunday at midnight:
bash crontab -e
Add this line:
bash 0 0 * * 0 /path/to/encrypt_backup.sh
🔐 Backup & Encrypt Script (Password-Based)
This script:
✅ Compresses files into an archive
✅ Encrypts them using GPG with a passphrase
✅ Stores them in a secure location```bash
!/bin/bash
Backup and encrypt script (password-based)
ARCHIVE_DIR="/mnt/backup" DATE=$(date +"%Y-%m-%d") BACKUP_FILE="$ARCHIVE_DIR/backup_$DATE.tar.gz" ENCRYPTED_FILE="$BACKUP_FILE.gpg" PASSPHRASE="YourStrongPassphraseHere" # Change this!
mkdir -p "$ARCHIVE_DIR"
Compress files
tar -czvf "$BACKUP_FILE" ~/Documents
Encrypt the backup with a password
gpg --batch --yes --passphrase "$PASSPHRASE" --symmetric --cipher-algo AES256 --output "$ENCRYPTED_FILE" "$BACKUP_FILE"
Verify encryption success
if [ -f "$ENCRYPTED_FILE" ]; then echo "Backup encrypted successfully: $ENCRYPTED_FILE" rm "$BACKUP_FILE" # Remove unencrypted file for security else echo "Encryption failed!" fi ```
🔓 Decrypting a Backup
To restore a backup, run:
bash gpg --batch --yes --passphrase "YourStrongPassphraseHere" --decrypt --output backup.tar.gz backup_YYYY-MM-DD.tar.gz.gpg tar -xzvf backup.tar.gz
🔁 Automating with Cron
To run this script every Sunday at midnight:
bash crontab -e
Add this line:
bash 0 0 * * 0 /path/to/encrypt_backup.sh
🔥 Security Best Practices
- Do NOT hardcode the password in the script. Instead, store it in a secure location like a
.gpg-pass
file and use:
bash PASSPHRASE=$(cat /path/to/.gpg-pass)
- Use a strong passphrase with at least 16+ characters.
- Consider using a hardware security key or YubiKey for extra security.
Here's how you can add automatic cloud syncing to your encrypted backups. This script will sync your encrypted backups to a cloud storage service like Rsync, Dropbox, or Nextcloud using the rclone tool, which is compatible with many cloud providers.
Step 1: Install rclone
First, you need to install
rclone
if you haven't already. It’s a powerful tool for managing cloud storage.-
Install rclone:
bash curl https://rclone.org/install.sh | sudo bash
-
Configure rclone with your cloud provider (e.g., Google Drive):
bash rclone config
Follow the prompts to set up your cloud provider. After configuration, you'll have a "remote" (e.g.,
rsync
for https://rsync.net) to use in the script.
🔐 Backup, Encrypt, and Sync to Cloud Script
This script will: ✅ Compress files into an archive
✅ Encrypt them with a password
✅ Sync the encrypted backup to the cloud storage```bash
!/bin/bash
Backup, encrypt, and sync to cloud script (password-based)
ARCHIVE_DIR="/mnt/backup" DATE=$(date +"%Y-%m-%d") BACKUP_FILE="$ARCHIVE_DIR/backup_$DATE.tar.gz" ENCRYPTED_FILE="$BACKUP_FILE.gpg" PASSPHRASE="YourStrongPassphraseHere" # Change this!
Cloud configuration (rclone remote name)
CLOUD_REMOTE="gdrive" # Change this to your remote name (e.g., 'gdrive', 'dropbox', 'nextcloud') CLOUD_DIR="backups" # Cloud directory where backups will be stored
mkdir -p "$ARCHIVE_DIR"
Compress files
tar -czvf "$BACKUP_FILE" ~/Documents
Encrypt the backup with a password
gpg --batch --yes --passphrase "$PASSPHRASE" --symmetric --cipher-algo AES256 --output "$ENCRYPTED_FILE" "$BACKUP_FILE"
Verify encryption success
if [ -f "$ENCRYPTED_FILE" ]; then echo "Backup encrypted successfully: $ENCRYPTED_FILE" rm "$BACKUP_FILE" # Remove unencrypted file for security
# Sync the encrypted backup to the cloud using rclone rclone copy "$ENCRYPTED_FILE" "$CLOUD_REMOTE:$CLOUD_DIR" --progress # Verify sync success if [ $? -eq 0 ]; then echo "Backup successfully synced to cloud: $CLOUD_REMOTE:$CLOUD_DIR" rm "$ENCRYPTED_FILE" # Remove local backup after syncing else echo "Cloud sync failed!" fi
else echo "Encryption failed!" fi ```
How to Use the Script:
- Edit the script:
- Change the
PASSPHRASE
to a secure passphrase. - Change
CLOUD_REMOTE
to your cloud provider’s rclone remote name (e.g.,gdrive
,dropbox
). -
Change
CLOUD_DIR
to the cloud folder where you'd like to store the backup. -
Set up a cron job for automatic backups:
- To run the backup every Sunday at midnight, add this line to your crontab:
bash crontab -e
Add:
bash 0 0 * * 0 /path/to/backup_encrypt_sync.sh
🔥 Security Tips:
- Store the passphrase securely (e.g., use a
.gpg-pass
file withcat /path/to/.gpg-pass
). - Use rclone's encryption feature for sensitive data in the cloud if you want to encrypt before uploading.
- Use multiple cloud services (e.g., Google Drive and Dropbox) for redundancy.
📌 START → **Planning Your Data Archiving Strategy**
├── What type of data? (Docs, Media, Code, etc.)
├── How often will you need access? (Daily, Monthly, Rarely)
├── Choose storage type: SSD (fast), HDD (cheap), Tape (long-term)
├── Plan directory structure (YYYY-MM-DD, Category-Based, etc.)
└── Define retention policy (Keep Forever? Auto-Delete After X Years?)
↓📌 Choosing the Right Storage & Filesystem
├── Local storage: (ext4, XFS, Btrfs, ZFS for snapshots)
├── Network storage: (NAS, Nextcloud, Syncthing)
├── Cold storage: (M-DISC, Tape Backup, External HDD)
├── Redundancy: (RAID, SnapRAID, ZFS Mirror, Cloud Sync)
└── Encryption: (LUKS, VeraCrypt, age, gocryptfs)
↓📌 Organizing & Indexing Data
├── Folder structure: (YYYY/MM/Project-Based)
├── Metadata tagging: (exiftool, Recoll, TagSpaces)
├── Search tools: (fd, fzf, locate, grep)
├── Deduplication: (rdfind, fdupes, hardlinking)
└── Checksum integrity: (sha256sum, blake3)
↓📌 Compression & Space Optimization
├── Use compression (tar, zip, 7z, zstd, btrfs/zfs compression)
├── Remove duplicate files (rsync, fdupes, rdfind)
├── Store archives in efficient formats (ISO, SquashFS, borg)
├── Use incremental backups (rsync, BorgBackup, Restic)
└── Verify archive integrity (sha256sum, snapraid sync)
↓📌 Ensuring Long-Term Data Integrity
├── Check data periodically (snapraid scrub, btrfs scrub)
├── Refresh storage media every 3-5 years (HDD, Tape)
├── Protect against bit rot (ZFS/Btrfs checksums, ECC RAM)
├── Store backup keys & logs separately (Paper, YubiKey, Trezor)
└── Use redundant backups (3-2-1 Rule: 3 copies, 2 locations, 1 offsite)
↓📌 Accessing Data Efficiently
├── Use symbolic links & bind mounts for easy access
├── Implement full-text search (Recoll, Apache Solr, Meilisearch)
├── Set up a file index database (mlocate, updatedb)
├── Utilize file previews (nnn, ranger, vifm)
└── Configure network file access (SFTP, NFS, Samba, WebDAV)
↓📌 Scaling & Expanding Your Archive
├── Move old data to slower storage (HDD, Tape, Cloud)
├── Upgrade storage (LVM expansion, RAID, NAS upgrades)
├── Automate archival processes (cron jobs, systemd timers)
├── Optimize backups for large datasets (rsync --link-dest, BorgBackup)
└── Add redundancy as data grows (RAID, additional HDDs)
↓📌 Automating the Archival Process
├── Schedule regular backups (cron, systemd, Ansible)
├── Auto-sync to offsite storage (rclone, Syncthing, Nextcloud)
├── Monitor storage health (smartctl, btrfs/ZFS scrub, netdata)
├── Set up alerts for disk failures (Zabbix, Grafana, Prometheus)
└── Log & review archive activity (auditd, logrotate, shell scripts)
↓✅ GOAT STATUS: DATA ARCHIVING COMPLETE & AUTOMATED! 🎯
-
-
@ 04c915da:3dfbecc9
2025-03-07 00:26:37There is something quietly rebellious about stacking sats. In a world obsessed with instant gratification, choosing to patiently accumulate Bitcoin, one sat at a time, feels like a middle finger to the hype machine. But to do it right, you have got to stay humble. Stack too hard with your head in the clouds, and you will trip over your own ego before the next halving even hits.
Small Wins
Stacking sats is not glamorous. Discipline. Stacking every day, week, or month, no matter the price, and letting time do the heavy lifting. Humility lives in that consistency. You are not trying to outsmart the market or prove you are the next "crypto" prophet. Just a regular person, betting on a system you believe in, one humble stack at a time. Folks get rekt chasing the highs. They ape into some shitcoin pump, shout about it online, then go silent when they inevitably get rekt. The ones who last? They stack. Just keep showing up. Consistency. Humility in action. Know the game is long, and you are not bigger than it.
Ego is Volatile
Bitcoin’s swings can mess with your head. One day you are up 20%, feeling like a genius and the next down 30%, questioning everything. Ego will have you panic selling at the bottom or over leveraging the top. Staying humble means patience, a true bitcoin zen. Do not try to "beat” Bitcoin. Ride it. Stack what you can afford, live your life, and let compounding work its magic.
Simplicity
There is a beauty in how stacking sats forces you to rethink value. A sat is worth less than a penny today, but every time you grab a few thousand, you plant a seed. It is not about flaunting wealth but rather building it, quietly, without fanfare. That mindset spills over. Cut out the noise: the overpriced coffee, fancy watches, the status games that drain your wallet. Humility is good for your soul and your stack. I have a buddy who has been stacking since 2015. Never talks about it unless you ask. Lives in a decent place, drives an old truck, and just keeps stacking. He is not chasing clout, he is chasing freedom. That is the vibe: less ego, more sats, all grounded in life.
The Big Picture
Stack those sats. Do it quietly, do it consistently, and do not let the green days puff you up or the red days break you down. Humility is the secret sauce, it keeps you grounded while the world spins wild. In a decade, when you look back and smile, it will not be because you shouted the loudest. It will be because you stayed the course, one sat at a time. \ \ Stay Humble and Stack Sats. 🫡
-
@ 16d11430:61640947
2025-03-07 00:23:03Abstract
The universe, in its grand design, is not a chaotic expanse of scattered matter, but rather a meticulously structured web of interconnected filaments. These cosmic filaments serve as conduits for galaxies, governing the flow of matter and energy in ways that optimize the conditions for life and intelligence. Similarly, in the realm of artificial intelligence, the paradigm of Elliptic Curve AI (ECAI) emerges as a radical departure from traditional probabilistic AI, replacing brute-force computation with structured, deterministic intelligence retrieval. This article explores the profound parallels between the cosmic web and ECAI, arguing that intelligence—whether at the scale of the universe or within computational frameworks—arises not through randomness but through the emergent properties of structured networks.
1. The Universe as a Structured Intelligence System
Recent cosmological discoveries reveal that galaxies are not randomly dispersed but are strung along vast filamentary structures, forming what is known as the cosmic web. These filaments serve as conduits that channel dark matter, gas, and energy, sustaining the formation of galaxies and, ultimately, life. Their presence is crucial for ensuring the stability required for complex systems to emerge, balancing between the chaotic entropy of voids and the violent turbulence of dense clusters.
This phenomenon is not merely an astronomical curiosity—it speaks to a deeper principle governing intelligence. Just as filaments create the necessary architecture for structured matter, intelligence, too, requires structured pathways to manifest and function. This is where the analogy to Elliptic Curve AI (ECAI) becomes compelling.
2. Elliptic Curve AI: The Intelligence Filament
Traditional AI, built upon neural networks and deep learning, operates through probabilistic computation—essentially guessing outputs based on statistical correlations within vast training datasets. While effective in many applications, this approach is inherently non-deterministic, inefficient, and vulnerable to adversarial attacks, data poisoning, and hallucinations.
ECAI, by contrast, discards the notion of probabilistic learning entirely. Instead, it structures intelligence as deterministic cryptographic states mapped onto elliptic curves. Knowledge is not inferred but retrieved—mathematically and immutably encoded within the curve itself. This mirrors how cosmic filaments do not randomly scatter matter but organize it optimally, ensuring the universe does not descend into chaos.
Both systems—cosmic filaments and ECAI—demonstrate that structure governs emergence. Whether it is the large-scale arrangement of galaxies or the deterministic encoding of intelligence, randomness is eliminated in favor of optimized, hierarchical organization.
3. Hierarchical Clustering: A Shared Principle of Optimization
One of the most striking parallels between the cosmic web and ECAI is the principle of hierarchical clustering:
- Cosmic filaments organize galaxies in a fractal-like network, ensuring energy-efficient connectivity while avoiding both the stagnation of voids and the destructiveness of dense gravitational wells.
- ECAI encodes intelligence in elliptic curve structures, ensuring that retrieval follows hierarchical, non-redundant pathways, making computational efficiency maximized.
Both structures exhibit the following key features:
- Energy-Efficient Connectivity – Filaments optimize the transport of matter and energy; ECAI minimizes computational waste through direct retrieval rather than iterative processing.
- Self-Organization – Filaments arise naturally from cosmic evolution; ECAI intelligence states emerge from the mathematical properties of elliptic curves.
- Hierarchical Optimization – Both systems reject brute-force approaches (whether in galaxy formation or AI computation) in favor of pre-determined optimal pathways.
This challenges the classical assumption that intelligence must emerge through probabilistic learning. Instead, both the cosmic and computational realms suggest that intelligence is a function of structure, not randomness.
4. The Anthropic Implication: Are Structured Universes a Prerequisite for Intelligence?
A fundamental question in cosmology is whether the universe is fine-tuned for life and intelligence. If cosmic filaments are essential for galaxy formation and stability, does this imply that only structured universes can support intelligent observers?
A similar question arises in AI: If ECAI proves that intelligence can be retrieved deterministically rather than computed probabilistically, does this imply that the very nature of intelligence itself is non-random? If so, then probabilistic AI—like universes without structured filaments—may be a transient or inefficient model of intelligence.
This suggests a radical idea:
- Just as structured cosmic filaments define the conditions for life, structured computational frameworks define the conditions for true intelligence.
- If structured universes are prerequisites for intelligent life, then deterministic computational models (like ECAI) may be the only viable path to stable, secure, and truthful AI.
5. The Universe as an Information Network & ECAI
There is a growing hypothesis that the universe itself functions as a computational network, where cosmic filaments act as synaptic pathways optimizing the flow of information. If this is true, then ECAI is the computational realization of the cosmic web, proving that intelligence is not about prediction, but retrieval from structured states.
- In the universe, matter is channeled through filaments to form structured galaxies.
- In ECAI, knowledge is channeled through elliptic curves to form structured intelligence.
- Both reject stochastic randomness in favor of deterministic pathways.
This could indicate that true intelligence, whether cosmic or artificial, must always emerge from structured determinism rather than probabilistic chaos.
Conclusion: The Filamentary Structure of Intelligence
The convergence of cosmic filaments and Elliptic Curve AI suggests a profound principle: intelligence—whether it governs the organization of galaxies or the retrieval of computational knowledge—emerges from structured, deterministic systems. In both the cosmic and AI domains, hierarchical clustering, optimized connectivity, and deterministic pathways define the conditions for stability, efficiency, and intelligence.
🚀 If cosmic filaments are necessary for intelligent life, then ECAI is the necessary computational paradigm for structured intelligence. The future of AI is not about probabilistic computation—it is about deterministic retrieval, just as the universe itself is a structured retrieval system of matter and energy. 🚀
-
@ d34e832d:383f78d0
2025-03-07 00:01:02[npub16d8gxt2z4k9e8sdpc0yyqzf5gp0np09ls4lnn630qzxzvwpl0rgq5h4rzv]
Helical Visualization of Time's Passage in Orbital Motion and Celestial Mechanics
Exploring the dynamics of our Solar System through helical visualization opens new possibilities for understanding time, orbital motion, and planetary trajectories. By visualizing time as a continuous helical path, we gain insights into the cyclical and evolving nature of celestial mechanics, where each planet's orbit interacts with others in both predictable and dynamic patterns.
1. Helical Visualization of Time’s Passage
- Time as a Continuous Helix: Instead of viewing planetary orbits as fixed ellipses, this model represents the passage of time as a helical curve, linking each orbital cycle to the next. This visualization allows for a deeper understanding of the long-term movement of celestial bodies.
- Progression of Orbital Events: As planets follow their helical paths, we can track the passage of time from multiple perspectives, observing how their positions and velocities evolve in relation to one another. The helical model offers an elegant representation of periodic cycles that emphasizes the interconnectedness of cosmic events.
- Temporal Interactions: In this model, events like eclipses, conjunctions, and retrogrades become visualized as intersecting points on the helical path, emphasizing their importance in the grand tapestry of the Solar System's motion.
2. Orbital Motion and Celestial Mechanics
- Interplanetary Influences: The interactions between planetary bodies are inherently governed by gravitational forces, which create orbital motions that are often predictable yet influenced by external factors like planetary alignments and the gravitational pull of distant stars.
- Orbital Resonance and Tidal Forces: The gravitational interactions between planets, moons, and even asteroids can result in phenomena like orbital resonance. These interactions can be visualized in a helical model, showing how bodies can affect each other's orbits over time, much like the push and pull of a dance.
- The Dance of the Planets: Each planet’s orbit is not only a path through space but a part of a cosmic ballet, where their gravitational interactions affect one another's orbits. The helical model of motion helps us visualize how these interactions evolve over millions of years, helping to predict future trajectories.
3. Planetary Orbits and the Structure of the Solar System
- Elliptical and Spiral Patterns: While many planetary orbits are elliptical, the helical model introduces a dynamic spiral element to represent the combined motion of planets both around the Sun and through space. As the planets move, their orbits could resemble intricate spirals that reflect the cumulative effect of their motion through time.
- Resonance and Stability: Certain orbits may stabilize or shift over long periods due to gravitational interactions between planets. This helical view provides a tool for observing how minor orbital shifts can amplify over time, affecting not only the planets but the overall structure of the Solar System.
- Nonlinear Progression: Planets do not follow predictable paths in a simple two-dimensional plane. Instead, their orbits are affected by multiple forces, including interactions with other celestial bodies, making the helical model an ideal tool for visualizing the complexity and evolving nature of these planetary orbits.
4. Space Visualization and the Expanding Universe
- Moving Beyond the Solar System: The helical model of time and orbital motion does not end with our Solar System. As we visualize the movement of our Solar System within the broader context of the Milky Way, we begin to understand how our own galaxy's orbit affects our local motion through the universe.
- Helical Paths in Cosmic Space: This visualization method allows us to consider the Solar System’s motion as part of a larger, spiraling pattern that reaches across the galaxy, suggesting that our journey through space follows an intricate, three-dimensional helical path.
Connections (Links to Other Notes)
- The Mathematical Foundations of Orbital Mechanics
- Time as a Dimension in Celestial Navigation
- Gravitational Forces and Orbital Stability
Tags
SolarSystem #HelicalMotion #TimeVisualization #OrbitalMechanics #CelestialBodies #PlanetaryOrbits #SpaceExploration
Donations via
- ZeroSumFreeParity@primal.net
-
@ 378562cd:a6fc6773
2025-03-06 23:10:28The theory of evolution claims that all life gradually developed from a common ancestor over millions of years, shaped by random mutations and natural selection. It is often presented as an unquestionable fact, but when examined closely (the part many fail to do anymore), the evidence tells a different story. Both scientific discoveries and biblical truth point to a far more logical and consistent explanation—one of intentional design rather than blind chance. From the complexity of life to the precise order of the universe, every aspect of creation bears the unmistakable marks of an intelligent Creator. Let’s break it down simply and clearly, exposing the flaws in evolution and revealing the undeniable truth of God’s design.
-
No Transitional Fossils If evolution were true, we should see countless fossils of creatures in-between species (half-fish, half-reptile, etc.). Instead, fossils show fully formed creatures appearing suddenly, with no gradual change. Even Darwin admitted the fossil record didn’t support his theory.
-
Life is Too Complex to Happen by Accident The human eye, the bacterial flagellum, and even a single cell are incredibly complex, with interdependent parts that must all work at once. This is called irreducible complexity—if one piece is missing, the whole system fails. Random mutations can’t create such intricate designs. Design requires a designer.
-
DNA: A Code That Needs a Programmer DNA is a vast information system, more advanced than any computer code. Information always comes from intelligence, not random processes. Mutations mainly destroy information; they don’t create new, functional systems.
-
The Second Law of Thermodynamics: Things Fall Apart Everything's natural tendency is to break down over time, not build up (like a house falling apart, not randomly constructing itself). Evolution claims the opposite—that things become more complex without guidance. This contradicts observed science.
-
Consciousness and Morality Make No Sense in Evolution Why do humans have love, compassion, and a sense of right and wrong?
If we were just animals fighting to survive, morality wouldn’t exist.
The Bible explains it: We were made in God's image, not just random molecules.
- The Bible’s Account of Creation Matches Reality Genesis 1 says God created “kinds”—dogs produce dogs, birds produce birds, and humans produce humans. This is exactly what we see in nature—no one has ever observed one kind turning into another. Evolution is based on assumptions, while the Bible gives a clear, tested explanation of life’s origin.
The Complete Solution: Creation is Truth The evidence points to a Creator, not blind chance. Science confirms the Bible, not evolution. Recognizing God's design gives life meaning and purpose. Psalm 19:1 – “The heavens declare the glory of God, and the sky above proclaims His handiwork.”
Evolution is not just scientifically weak—it removes purpose and meaning. The truth is simple: God created life, and we are part of His design.
-
-
@ b8a9df82:6ab5cbbd
2025-03-06 22:39:15Last week at Bitcoin Investment Week in New York City, hosted by Anthony Pompliano, Jack Mallers walked in wearing sneakers and a T-shirt, casually dropping, “Man… I hate politics.”
That was it. That was the moment I felt aligned again. That’s the energy I came for. No suits. No corporate jargon. Just a guy who gets it—who cares about people, bringing Bitcoin-powered payments to the masses and making sure people can actually use it.
His presence was a reminder of why we’re here in the first place. And his words—“I hate politics”—were a breath of fresh air.
Now, don’t get me wrong. Anthony was a fantastic host. His ability to mix wittiness, playfulness, and seriousness made him an entertaining moderator. But this week was unlike anything I’ve ever experienced in the Bitcoin ecosystem.
One of the biggest letdowns was the lack of interaction. No real Q&A sessions, no direct engagement, no real discussions. Just one fireside chat after another.
And sure, I get it—people love to hear themselves talk. But where were the questions? The critical debates? The chance for the audience to actually participate?
I’m used to Bitcoin meetups and conferences where you walk away with new ideas, new friends, and maybe even a new project to contribute to. Here, it was more like sitting in an expensive lecture hall, watching a lineup of speakers tell us things we already know.
A different vibe—and not in a good way
Over the past few months, I’ve attended nearly ten Bitcoin conferences, each leaving me feeling uplifted, inspired, and ready to take action. But this? This felt different. And not in a good way.
If this had been my first Bitcoin event, I might have walked away questioning whether I even belonged here. It wasn’t Prague. It wasn’t Riga. It wasn’t the buzzing, grassroots, pleb-filled gatherings I had grown to love. Instead, it felt more like a Wall Street networking event disguised as a Bitcoin conference.
Maybe it was the suits.
Or the fact that I was sitting in a room full of investors who have no problem dropping $1,000+ on a ticket.
Or that it reminded me way too much of my former life—working as a manager in London’s real estate industry, navigating boardrooms full of finance guys in polished shoes, talking about “assets under management.”
Bitcoin isn’t just an investment thesis. It’s a revolution. A movement. And yet, at times during this week, I felt like I was back in my fiat past, stuck in a room where people measured success in dollars, not in freedom.
Maybe that’s the point. Bitcoin Investment Week was never meant to be a pleb gathering.
That said, the week did have some bright spots. PubKey was a fantastic kickoff. That was real Bitcoin culture—plebs, Nostr, grassroots energy. People who actually use Bitcoin, not just talk about it.
But the absolute highlight? Jack Mallers, sneakers and all, cutting through the noise with his authenticity.
So, why did we even go?
Good question. Maybe it was curiosity. Maybe it was stepping out of our usual circles to see Bitcoin through a different lens. Maybe it was to remind ourselves why we chose this path in the first place.
Would I go again? Probably not.
Would I trade Prague, Riga, bitcoin++ or any of the grassroots Bitcoin conferences for this? Not a chance.
At the end of the day, Bitcoin doesn’t belong to Wall Street from my opinion. It belongs to the people who actually use it. And those are the people I want to be around.
-
@ d34e832d:383f78d0
2025-03-06 21:57:23https://pub-53ed77d5544b46628691823c1795f2c7.r2.dev/Reticulum-Unstoppable-Network-Compressed.mp4
[npub16d8gxt2z4k9e8sdpc0yyqzf5gp0np09ls4lnn630qzxzvwpl0rgq5h4rzv]
What is Reticulum?
Reticulum is a cryptographic networking stack designed for resilient, decentralized, and censorship-resistant communication. Unlike the traditional internet, Reticulum enables fully independent digital communications over various physical mediums, such as radio, LoRa, serial links, and even TCP/IP.
The key advantages of Reticulum include:
- Decentralization – No reliance on centralized infrastructure.
- Encryption & Privacy – End-to-end encryption built-in.
- Resilience – Operates over unreliable and low-bandwidth links.
- Interoperability – Works over WiFi, LoRa, Bluetooth, and more.
- Ease of Use – Can run on minimal hardware, including Raspberry Pi and embedded devices.Reticulum is ideal for off-grid, censorship-resistant communications, emergency preparedness, and secure messaging.
1. Getting Started with Reticulum
To quickly get started with Reticulum, follow the official guide:
Reticulum: Getting Started FastStep 1: Install Reticulum
On Linux (Debian/Ubuntu-based systems)
sh sudo apt update && sudo apt upgrade -y sudo apt install -y python3-pip pip3 install rns
On Raspberry Pi or ARM-based Systems
sh pip3 install rns
On Windows
Using Windows Subsystem for Linux (WSL) or Python:
sh pip install rns
On macOS
sh pip3 install rns
2. Configuring Reticulum
Once installed, Reticulum needs a configuration file. The default location is:
sh ~/.config/reticulum/config.toml
To generate the default configuration:
sh rnsd
This creates a configuration file with default settings.
3. Using Reticulum
Starting the Reticulum Daemon
To run the Reticulum daemon (
rnsd
), use:
sh rnsd
This starts the network stack, allowing applications to communicate over Reticulum.Testing Your Reticulum Node
Run the diagnostic tool to ensure your node is functioning:
sh rnstatus
This shows the status of all connected interfaces and peers.
4. Adding Interfaces
LoRa Interface (for Off-Grid Communications)
Reticulum supports long-range LoRa radios like the RAK Wireless and Meshtastic devices. To add a LoRa interface, edit
config.toml
and add:
toml [[interfaces]] type = "LoRa" name = "My_LoRa_Interface" frequency = 868.0 bandwidth = 125 spreading_factor = 9
Restart Reticulum to apply the changes.Serial (For Direct Device-to-Device Links)
For communication over serial links (e.g., between two Raspberry Pis):
toml [[interfaces]] type = "Serial" port = "/dev/ttyUSB0" baudrate = 115200
TCP/IP (For Internet-Based Nodes)
If you want to bridge your Reticulum node over an existing IP network:
toml [[interfaces]] type = "TCP" listen = true bind = "0.0.0.0" port = 4242
5. Applications Using Reticulum
LXMF (LoRa Mesh Messaging Framework)
LXMF is a delay-tolerant, fully decentralized messaging system that operates over Reticulum. It allows encrypted, store-and-forward messaging without requiring an always-online server.
To install:
sh pip3 install lxmf
To start the LXMF node:
sh lxmfd
Nomad Network (Decentralized Chat & File Sharing)
Nomad is a Reticulum-based chat and file-sharing platform, ideal for off-grid communication.
To install:
sh pip3 install nomad-network
To run:
sh nomad
Mesh Networking with Meshtastic & Reticulum
Reticulum can work alongside Meshtastic for true decentralized long-range communication.
To set up a Meshtastic bridge:
toml [[interfaces]] type = "LoRa" port = "/dev/ttyUSB0" baudrate = 115200
6. Security & Privacy Features
- Automatic End-to-End Encryption – Every message is encrypted by default.
- No Centralized Logging – Communication leaves no metadata traces.
- Self-Healing Routing – Designed to work in unstable or hostile environments.
7. Practical Use Cases
- Off-Grid Communication – Works in remote areas without cellular service.
- Censorship Resistance – Cannot be blocked by ISPs or governments.
- Emergency Networks – Enables resilient communication during disasters.
- Private P2P Networks – Create a secure, encrypted communication layer.
8. Further Exploration & Documentation
- Reticulum Official Manual: https://markqvist.github.io/Reticulum/manual/
- Reticulum GitHub Repository: https://github.com/markqvist/Reticulum
- Nomad Network: https://github.com/markqvist/NomadNet
- Meshtastic + Reticulum: https://meshtastic.org
Connections (Links to Other Notes)
- Mesh Networking for Decentralized Communication
- LoRa and Off-Grid Bitcoin Transactions
- Censorship-Resistant Communication Using Nostr & Reticulum
Tags
Reticulum #DecentralizedComms #MeshNetworking #CensorshipResistance #LoRa
Donations via
- Bitcoin Lightning: lightninglayerhash@getalby.com
-
@ 43baaf0c:d193e34c
2025-03-06 21:38:10From Bangkok to Las Palmas de Gran Canaria.
For the past three years, I’ve traveled from Bangkok to Las Palmas de Gran Canaria, with a stop in Dubai a 24-hour journey that brings me back to Europe and to my artist friend, Alecs Navio. Along with his wife, he runs a coworking space called Soppa de Azul.
The main reason I return here is to create new art. Alecs constantly inspires me—we talk about art, artists, and he shares books that spark new ideas for my work. As an artist, I believe it’s essential to keep evolving. Growth comes from inspiration, and there’s no better source than fellow artists. Surrounding yourself with creative minds fuels your passion, and it all starts with conversations about art and life.
Today was a perfect example of why I’m here. I looked at some of my older artwork hanging in the coworking space and said I didn’t like it anymore. Alecs reminded me that I should appreciate my past work because it’s part of my journey. Without it I wouldn’t be the artist I am today.
I always say the journey is the destination, and Alecs helped me see that this applies to art as well. This is why I believe in surrounding myself with people who inspire me those who celebrate my growth and remind me why they are such an important part of my journey.
-
@ d6c48950:54d57756
2025-03-06 21:20:45I wanted to write my system for bitcoin inheritance and seed storage that will likely outlive me - the reason why is recently bitkey (squares hardware wallet) announced their inheritance system which is a vast improvement but still has a single point of failure square and the app they maintain though this is still a good thing and will improve the ecosystem and raise awareness there is a cheaper method that is just a secure but doesn’t have a single point of failure.
2/3 seed storage
2/3 seed storage is actually a pretty simple way of splitting up a key into three parts, if you have one part it’s useless, if you have any two parts it’s complete - if one piece is destroyed it doesn’t matter (demo below)
| A
| B
| C
| |-----|-----|-----| | 1. apple
| 2. zipper
| 3. dog
| | 4. tree
| 5. car
| 6. bus
| | 7. banana
| 8. motorbike
| 9. dune
| | 10. frank
| 11. foundation
| 12. meditation
| | 13. whiteboard
| 14. laptop
| 15. books
| | 16. perfume
| 17. computer
| 18. stone
| | 19. brick
| 20. spreadsheet
| 21. bird
| | 22. blog
| 23. leaves
| 24. grass
|This is a seed phrase split up into three parts (a,b,c) - now you can create your 3 parts
(1) | A
| B
| | |-----|-----|-----| | 1. apple
| 2. zipper
| | | 4. tree
| 5. car
| | | 7. banana
| 8. motorbike
| | | 10. frank
| 11. foundation
| | | 13. whiteboard
| 14. laptop
| | | 16. perfume
| 17. computer
| | | 19. brick
| 20. spreadsheet
| | | 22. blog
| 23. leaves
| |(2) | | B
| C
| |-----|-----|-----| | | 2. zipper
| 3. dog
| | | 5. car
| 6. bus
| | | 8. motorbike
| 9. dune
| | | 11. foundation
| 12. meditation
| | | 14. laptop
| 15. books
| | | 17. computer
| 18. stone
| | | 20. spreadsheet
| 21. bird
| | | 23. leaves
| 24. grass
|(3) | A
| | C
| |-----|-----|-----| | 1. apple
| | 3. dog
| | 4. tree
| | 6. bus
| | 7. banana
| | 9. dune
| | 10. frank
| | 12. meditation
| | 13. whiteboard
| | 15. books
| | 16. perfume
| | 18. stone
| | 19. brick
| | 21. bird
| | 22. blog
| | 24. grass
|Now you have your parts, you need at least 2/3 for it to be useful.
distribution
Distribution is pretty simple, keep one part, give a part to whomever you want to be able to claim your bitcoin upon death, give a part to someone you trust (along with instructions to post it to the claimant upon your death).
failure
For this to fail either 1. Two out of three parts would have to be destroyed 2. The trusted party would have to not post it AND either your part or the claimants would have to be destroyed 3. The trusted party cannot figure out how to use a seed phrase (by default you should include instructions i.e NEVER SHARE THE SEED, transfer to a recommended wallet from bitcoin.org then transfer to an exchange and sell)
-
@ 43baaf0c:d193e34c
2025-03-06 20:55:27Bangkok art city.
Bangkok is a highly creative city, which is one of the reasons I love living here. I’d love to hold a second exhibition something special and even bigger than before. The fact that all major galleries are free to the public says a lot about how much Bangkok values art.
Over the last five months, I’ve been developing BangPOP art as both a concept and a blueprint for exhibitions worldwide. It serves as a guideline to ensure recognizable elements in each exhibition or event. While the artwork itself will always be unique, the POP Up exhibitions will have a distinct and recognizable identity wherever they take place.
You can read here the https://bitpopart.com/bangpop POP exhibition blue print.
Unfortunately, my plan to hold an exhibition at River City in Bangkok doesn’t seem to be coming together. Here’s the curator’s note:
‘our exhibition schedule on the 2nd floor this year and next year are quite packed and we have received numerous proposals at this moment.‘
After considering alternative venues in Bangkok, I’m optimistic about finding the right fit. For now, my focus is shifting to Europe, where I’ll use the BangPOP blueprint as my guiding framework.
Thank you Bangkok!
-
@ 878dff7c:037d18bc
2025-03-06 20:17:07Cyclone Alfred's Approach Prompts Widespread Preparations in Queensland
Summary:
Cyclone Alfred's anticipated landfall near Brisbane has led to extensive precautionary measures across Queensland. Authorities have advised residents to fill bathtubs to ensure water availability in case of supply disruptions. Additional recommendations include securing outdoor items, preparing emergency kits, and verifying insurance documentation, as damages are expected to be substantial. The cyclone's impact could affect up to 1.8 million homes, with potential wind gusts reaching 150 km/h. Residents are urged to stay updated through official channels and prioritize safety during this severe weather event.
Sources: News.com.au - 7 March 2025, The Courier-Mail - 6 March 2025
Doubts Emerge Over Australia's Acquisition of Aukus Nuclear Submarines
Summary:
Australia's plan to acquire nuclear-powered submarines under the Aukus agreement faces significant uncertainties. Concerns have arisen regarding the U.S.'s capacity to produce these submarines and its willingness to transfer control to Australia. Experts highlight challenges in the U.S. shipbuilding industry and suggest alternatives, such as revisiting deals with France, to ensure Australia's defense capabilities. Sources: The Guardian - March 7, 2025
Commonwealth Bank to Cut Jobs Amid Technology Restructuring
Summary:
The Commonwealth Bank of Australia (CBA) is set to cut approximately 150 jobs from its Sydney operations, with additional cuts affecting Melbourne, Brisbane, Perth, Hobart, and Tweed Heads. The Finance Sector Union criticizes the move, noting a contradiction between the bank's commitment to digital talent and the job cuts from its technology division. The bank claims the layoffs are necessary to facilitate faster digital customer experiences requiring enhanced skills.
Sources: News.com.au - March 7, 2025
Country Road Owner Warns of Ongoing Retail Recession in Australia
Summary:
Woolworths Holdings, owner of Country Road Group, reports a severe decline in sales and earnings, attributing it to a nearly two-year retail recession in Australia. The company cites over 700 business bankruptcies in 2024, low GDP growth, persistent inflation, and high interest rates as factors dampening consumer sentiment. Despite these challenges, some national retailers like JB Hi-Fi and Harvey Norman continue to thrive, highlighting a divide between retail "winners and losers."
Sources: The Australian - March 7, 2025
Calls to Enhance Australia's Drone and Missile Capabilities
Summary:
Australia's defense posture is under scrutiny following recent Chinese maritime activities. Experts advocate for increased investment in drone and missile technologies, citing their cost-effectiveness and proven efficacy in conflicts like Ukraine's. Despite being a leader in drone and radar technology, Australia's defense spending remains heavily focused on nuclear submarines. There's a growing call for strategic investment in domestic defense technologies to bolster military capabilities and industrial strength, ensuring the nation can meet global defense commitments and technological advancements.
Sources: The Australian - March 7, 2025
Australia's Visa Cancellation of Controversial Preacher
Summary:
Australia's Department of Home Affairs has canceled the visa of Hussain Makke, a Lebanese-based social media figure who praised Hezbollah leader Hassan Nasrallah as the "world's greatest freedom fighter." Makke had planned to speak at events in Sydney and Melbourne during Ramadan. This decision underscores Australia's stance against individuals who glorify terrorism, especially amid rising concerns over antisemitism. Authorities emphasize that endorsing terrorist organizations contradicts Australian values, and such individuals are unwelcome in the country.
Sources: The Daily Telegraph - March 7, 2025
Activists Target Tesla in Protests Against USA Federal Job Cuts
Summary:
Activists have initiated "Tesla Takedown" protests, targeting Tesla dealerships to oppose job cuts in the federal workforce overseen by Elon Musk, appointed by President Trump to lead the Department of Government Efficiency. Demonstrators aim to tarnish the Tesla brand, urging consumers to boycott the company's products.
Sources: Reuters - March 6, 2025
Switzerland Cancels Geneva Conventions Meeting on Palestinian Territories
Summary:
Switzerland has canceled a conference scheduled for March 7, intended to discuss the application of the Geneva Conventions in the occupied Palestinian territories, due to insufficient support from participating countries. The Palestinian envoy expressed disappointment, stating the draft declaration did not meet expectations, while Israel had criticized the planned meeting.
Sources: Reuters - March 6, 2025
Comprehensive Reforms Proposed for Handling Sexual Violence Cases
Summary:
The Australian Law Reform Commission (ALRC) has released a report recommending significant changes to improve the treatment of sexual violence victims within the criminal justice system. Key proposals include allowing victims to provide evidence through prerecorded hearings, offering government-funded legal representation, and creating "trauma-informed" environments during police interviews. The report also advocates for national consistency in defining consent and the adoption of restorative justice practices. In response, the Albanese government has announced a $21.4 million funding package to support these initiatives, aiming to reduce systemic barriers that deter 92% of women from reporting sexual violence.
Sources: The Australian - 7 March 2025, News.com.au - 7 March 2025, The Guardian - 7 March 2025
Surge in Cosmetic Injectables Raises Health Concerns
Summary:
Australia's cosmetic injectables industry is under scrutiny following incidents of unqualified practitioners performing invasive procedures, leading to severe health risks such as exposure to bloodborne viruses. Medical professionals are calling for stricter regulations and enforcement to safeguard public health.
Sources: The Australian - 7 March 2025
China's Spring Festival Gala Showcases Advancements in Humanoid Robotics
Summary:
During China’s 2025 Spring Festival Gala, a notable display of the country’s advancements in robotics was showcased through a dance performance featuring 16 humanoid robots developed by Hangzhou Yushu (Unitree). The robots performed the Yangko folk dance alongside human dancers, demonstrating precision and coordination. This event highlighted China's focus on robotics as part of a broader trend, with major tech companies like Tesla and Nvidia also prioritizing humanoid robots. China's Ministry of Industry and Information Technology has set ambitious goals to mass-produce advanced humanoid robots by 2025.
Sources: Business Insider - March 7, 2025
Environment Minister Approves Three NSW Wind Farms Amid Controversy
Summary:
Environment Minister Tanya Plibersek has approved three wind farm projects in New South Wales: Hills of Gold near Nundle, Spicers Creek northwest of Gulgong, and amendments to the Liverpool Range project near Coolah. These projects, facing opposition due to environmental and infrastructure concerns, are expected to create 1,340 construction jobs and 80 ongoing positions. Critics plan legal challenges, citing potential impacts on biodiversity and local infrastructure. The approvals include strict environmental conditions, though significant habitat clearing will occur. To date, the federal government has approved 77 renewable energy projects, capable of powering over 10 million homes.
Sources: The Australian - 7 March 2025
-
@ a296b972:e5a7a2e8
2025-03-06 19:55:59Die Kinder einer Grundschule sollten im Herbst 2024 einen Aufsatz über die amtierende deutsche Außenministerin schreiben. Hier das Ergebnis des 12-jährigen Michaels, wie ihn eine Grundschullehrerin eingesandt haben könnte:
„Die Tante in Berlin hat immer eine schöne Haarfrisur und trägt immer schicke Sachen. Wenn sie mit dem Regierungsflieger unterwegs ist (oft klappt das aber nicht richtig, weiß nicht warum), dann knittern ihre Kleider bestimmt überhaupt nicht. Da hat sie es gut, meine Mama bügelt gar nicht gerne.
Auch hat sie eine Hilfe, die ihr Gesicht immer anmalt und ihr die Haare schön macht. Die bekommt wohl einen Haufen Geld dafür, was aus den Steuern abgezweigt wird, die mein Papa, der sehr fleißig arbeitet, bezahlt.
Die Tante, die mir eher wie ein Mädchen in meinem Alter vorkommt, erinnert mich immer an die Lisa aus der Nachbarklasse, die so frech ist, dass ich und andere ihr manchmal an den Haaren ziehen müssen, damit sie wieder vernünftig wird.
Wenn man ihr sagt, sie ist doof, dann wirft sie den Kopf in den Nacken und zieht beleidigt ab.
Überhaupt benimmt sie sich oft, wie eine beleidigte Leberwurst. Und wenn andere was sagen, was ihr nicht passt, wird sie frech. Ich habe gelernt, dass man möglichst nicht frech sein soll.
Ich bin froh, dass sie keinen roten Knopf hat, auf den sie drücken könnte, nur, um mal zu sehen, was dann passiert.
Alle Elefanten auf der Welt sind böse auf sie, weil sie Porzellan viel besser zerdeppern kann, als sie selber.
Mein Papa sagt, dass zu ihrem Beruf zählt, dass man mit den Leuten redet, bevor man Geld gibt, um auf sie zu schießen, aber das kann sie wohl nicht. Was sie wohl tun müsste, wäre Diplomatie (ich bin ehrlich, dass hab ich von Andreas abgeschrieben, der kennt solche Fremdwörter).
Gut gefallen hat mir ihre Einladung zum Kindergeburtstag im Auswärtigen Amt, wo im vergangenen Sommer alle Türen offen waren. Da wurden auch so lustige Videos gedreht, wo so Leute aus dem Fahrstuhl kommen, die so glitzernde Decken umhatten und tanzten.
Mit ihren oft lustigen Sätzen kitzelt sie wichtige Erwachsene von großen Ländern, ohne sie dabei anfassen zu müssen, das würde ich auch gerne können. Ich wüsste schon, wen ich gerne mal so richtig Auskitzeln wollte.
Ganz oft benutzt sie das Wort „Brutaler Angriffskrieg“ und soweit ich das schon verstehe, sagt sie oft Sachen, die gar keinen Sinn ergeben. Meine Lehrerin sagt immer zu uns, wir sollen lieber den Mund halten, wenn wir nicht genau wissen, was wir sagen wollen. Besser sei es, vor dem Reden das Gehirn einzuschalten. Das sehe ich ein und ich bemühe mich wirklich darum. Ich glaube, sie vergisst das manchmal.
Wenn sie mal nicht weiterweiß, kann sie bestimmt noch den Onkel Klaus vom WEF fragen, bei dem sie Politikerin gelernt hat.
Wenn sie mal nicht mehr so feministisch arbeiten kann oder will, könnte sie vielleicht Kindergärtnerin werden, aber ich glaube, kein Kind könnte sie leiden, weil sie immer so altklug und bockig tut, und das können wir Kinder gar nicht leiden. Und eigentlich soll man ja nicht von einem Beruf, den man nicht kann, in einen anderen Beruf wechseln, den man auch nicht kann.
Schön finde ich, dass die ganze Welt über sie lacht, wo doch alles im Moment so traurig ist und alle von Krieg reden und Bedrohung und dass Deutschland wieder kriegstüchtig werden soll. Das macht mir Angst. Da habe ich oft das Gefühl, alle Erwachsenen sind verrückt geworden und benehmen sich nur noch so, wie ich, als ich 8 Jahre alt war. Ich weiß noch, da habe ich ziemlich viel Blödsinn gemacht, aber jetzt bin ich schon viel vernünftiger geworden.
Mein Pausenbrot würde ich nicht mit ihr tauschen, weil ich sie nicht leiden kann, denn sie benimmt sich oft wie die Lisa, und die ist echt eine richtig doofe Ziege.
Weil ich sie nicht mag, wünsche ich mir, dass sie bald nicht mehr im Fernsehen zu sehen ist. Dann kann sie auch ihre Anziehsachen wieder selber bügeln, wie meine Mama.“
(Manche Wünsche gehen in Erfüllung!)
-
@ f3873798:24b3f2f3
2025-03-06 19:21:36Olá pessoal!
Estas altas temperaturas mais períodos de chuvas, é um prato cheio para a proliferação de mosquitos o que além de ser um incomodo pode ser tornar questão de saúde pública devido as doenças trazidas por eles.
Por isso trouxe para vocês uma receitinha para espantar os mosquitos da sua casa.
Bora lá
Receita Espanta mosquito
Ingredientes:
500 mL de álcool de cereais ou álcool 70 % 10g de cravo-da-índia. 10 gotas de óleo essencial de citronela 10 gotas de óleo essencial de lavanda 1 borrifador
Modo de preparo
-
Coloque os cravos-da-índia dentro de um frasco com álcool de cereais.
-
Deixe a mistura descansar por pelo menos 24 horas, agitando de vez em quando.
-
Após esse período, coe os cravos e adicione os óleos essenciais de citronela e lavanda.
-
Despeje o líquido em um borrifador e aplique nos cômodos da casa, especialmente perto de janelas e portas.
E Adeus mosquitos 😎
-
-
@ 27c04be0:af374d05
2025-03-06 19:10:10Your wedding day is all about celebrating your unique style—and that includes the car you arrive in! Whether you’re planning a cozy barn wedding, a sparkling glam affair, or a sleek minimalist ceremony, the right wedding car hire Walthamstow can make your big day even more special. But how do you pick a car that matches your theme?
Don’t worry—we’ll break it down in simple terms! In this guide, you’ll learn how to match car styles to rustic, glam, or minimalist weddings, with easy tips and examples. Let’s get started!
Visit us> Wedding Car Hire Service Near You
** 1. Rustic Weddings: Charming & Natural Vibes ** Rustic weddings are all about relaxed, earthy vibes—think barns, gardens, or countryside venues. Your wedding car hire Walthamstow should feel cozy, vintage, and a little bit nostalgic.
** Best Car Styles for Rustic Weddings
**Vintage Cars:
Example: A 1960s Volkswagen Camper Van or a classic Ford pickup truck.
Why it works: Retro designs match the "old-world" charm of rustic décor.Horse-Drawn Carriages:
Example: A wooden carriage with floral decorations.
Why it works: Adds fairy-tale magic to outdoor settings.**Convertible Classic Cars: ** Example: A 1950s Chevrolet Bel Air with a soft-top roof.
Why it works: Perfect for sunny countryside drives.**Styling Tips ** Add wildflowers, twine, or lace to the car’s exterior.
Use wooden signs like “Just Married” on the back.
Choose neutral colors (cream, sage green, or rusty red).Pro Tip: Ask your wedding car hire Walthamstow Company if they offer vintage or rustic-themed vehicles. Many specialize in these styles!
** 2. Glam Weddings: Luxurious & Sparkly Vibes ** Glam weddings are bold, elegant, and full of sparkle—think chandeliers, sequins, and grand ballrooms. Your wedding car hire should scream luxury and sophistication.
** Best Car Styles for Glam Weddings ** Luxury Sedans:
Example: Rolls Royce Phantom or Mercedes-Benz S-Class.
Why it works: Sleek, shiny, and timeless.Stretch Limousines:
Example: A black or white limo with tinted windows.
Why it works: Plenty of space for the bridal party and champagne toasts!**Vintage Luxury Cars: ** Example: A 1930s Bentley with polished chrome details.
Why it works: Combines old Hollywood glam with modern comfort.** Styling Tips**
Add satin ribbons, crystal decorations, or a red carpet rollout.
Choose metallic colors (silver, gold, or rose gold accents).
Pair with a chauffeur in formal attire (think suits or gloves).Pro Tip: Many wedding car hire Walthamstow services offer “glam packages” with extras like champagne, flower petals, or photo backdrops.
3. Minimalist Weddings: Simple & Modern Vibes
Minimalist weddings focus on clean lines, neutral colors, and “less is more” elegance. Your wedding car hire should be sleek, modern, and fuss-free.Best Car Styles for Minimalist Weddings
Modern Electric Cars:
Example: Tesla Model S or Audi e-tron.
Why it works: Eco-friendly and stylish.Convertible Sports Cars:
Example: Porsche 911 or Jaguar F-Type.
Why it works: Sharp design matches minimalist aesthetics.Understated Luxury Cars:
Example: BMW 7 Series or Lexus LS.
Why it works: Simple elegance without extra frills.Styling Tips
Keep decorations minimal (e.g., a single white ribbon or geometric shapes).
Stick to neutral colors (white, black, or gray).
Opt for matte finishes instead of glossy paint.Pro Tip: Ask your wedding car hire provider for cars with “clean” designs—no flashy logos or busy patterns.
How to Choose the Right Wedding Car Hire Walthamstow Service
Finding the perfect car is easier when you know what to ask!Questions to Ask
**“Do you have cars that fit rustic/glam/minimalist themes?” ** “Can I see photos of your vehicles?”
“Do you offer decorations or styling add-ons?”Budget Tips
Book early for discounts (popular cars sell fast!).
Share your wedding theme—some companies offer package deals.Keyword Alert: Always confirm your wedding car hire includes insurance, a chauffeur, and setup time.
Mistakes to Avoid
Ignoring the venue: A huge limo won’t fit a narrow countryside road.
Forgetting the weather: Convertibles are risky for rainy days!
Last-minute bookings: The best wedding car hire options get booked months ahead.Bottom Line
Your wedding car isn’t just a ride—it’s part of your story! For rustic weddings, go vintage and cozy. For glam weddings, pick something shiny and luxurious. For minimalist weddings, choose sleek and modern. No matter your style, the right wedding car hire Walthamstow will make your entrance unforgettable.So, dream big, plan ahead, and roll up in a car that’s as unique as your love!
FAQs About Wedding Car Hire
-
How do I pick the right car for a rustic wedding?
Look for vintage or retro vehicles like a Volkswagen Camper Van or a classic pickup truck.
Ask your Wedding Car Hire company if they offer floral decorations or wooden accents to match barn/outdoor venues. -
What’s the average cost of glam Wedding Car Hire?
Luxury cars (e.g., Rolls Royce) or limos range from $500–$1,500+ depending on duration and add-ons (like champagne or red carpets). -
Can I decorate the car myself?
Yes, but check with your Wedding Car Hire provider first. Some restrict adhesives or paints that could damage the vehicle. -
How early should I book my Wedding Car Hire?
6–12 months in advance, especially for peak seasons (summer, holidays) or popular cars like vintage models. -
Are chauffeurs included in Wedding Car Hire packages?
Most companies include a professional driver, but confirm during booking. They’ll ensure timely arrivals and handle parking. -
What if my Wedding Car Hire breaks down on the day?
Reputable services offer backup vehicles. Always ask about their emergency plan before signing a contract. -
Can I rent eco-friendly cars for a minimalist wedding?
Yes! Many Wedding Car Hire companies now offer Teslas, Audis, or hybrids for sleek, sustainable arrivals. -
How do I match the car to my venue’s style?
Rustic: Choose vintage cars for barns or gardens.
Glam: Opt for limos or luxury sedans for ballrooms.
Minimalist: Pick modern, clean designs for urban venues. -
Are there extra fees for Wedding Car Hire?
Watch for mileage limits, overtime charges, or decor add-ons. Read the contract carefully to avoid surprises. -
Can I rent multiple cars for the wedding party?
Yes! Many Wedding Car Hire providers offer group packages (e.g., one car for the couple, others for bridesmaids or family). -
What’s the best car color for a minimalist wedding?
Stick to neutrals like white, black, or matte gray. Avoid flashy colors or patterns. -
Do Wedding Car Hire services offer insurance?
Most do, but confirm coverage details (e.g., damage, cancellations) before booking.
-
-
@ 97c70a44:ad98e322
2025-03-06 18:38:10When developing on nostr, normally it's enough to read the NIP related to a given feature you want to build to know what has to be done. But there are some aspects of nostr development that aren't so straightforward because they depend less on specific data formats than on how different concepts are combined.
An example of this is how for a while it was considered best practice to re-publish notes when replying to them. This practice emerged before the outbox model gained traction, and was a hacky way of attempting to ensure relays had the full context required for a given note. Over time though, pubkey hints emerged as a better way to ensure other clients could find required context.
Another one of these things is "relay-based groups", or as I prefer to call it "relays-as-groups" (RAG). Such a thing doesn't really exist - there's no spec for it (although some aspects of the concept are included in NIP 29), but at the same time there are two concrete implementations (Flotilla and Chachi) which leverage several different NIPs in order to create a cohesive system for groups on nostr.
This composability is one of the neat qualities of nostr. Not only would it be unhelpful to specify how different parts of the protocol should work together, it would be impossible because of the number of possible combinations possible just from applying a little bit of common sense to the NIPs repo. No one said it was ok to put
t
tags on akind 0
. But no one's stopping you! And the semantics are basically self-evident if you understand its component parts.So, instead of writing a NIP that sets relay-based groups in stone, I'm writing this guide in order to document how I've combined different parts of the nostr protocol to create a compelling architecture for groups.
Relays
Relays already have a canonical identity, which is the relay's url. Events posted to a relay can be thought of as "posted to that group". This means that every relay is already a group. All nostr notes have already been posted to one or more groups.
One common objection to this structure is that identifying a group with a relay means that groups are dependent on the relay to continue hosting the group. In normal broadcast nostr (which forms organic permissionless groups based on user-centric social clustering), this is a very bad thing, because hosts are orthogonal to group identity. Communities are completely different. Communities actually need someone to enforce community boundaries, implement moderation, etc. Reliance on a host is a feature, not a bug (in contrast to NIP 29 groups, which tend to co-locate many groups on a single host, relays-as-groups tends to encourage one group, one host).
This doesn't mean that federation, mirrors, and migration can't be accomplished. In a sense, leaving this on the social layer is a good thing, because it adds friction to the dissolution/forking of a group. But the door is wide open to protocol additions to support those use cases for relay-based groups. One possible approach would be to follow this draft PR which specified a "federation" event relays could publish on their own behalf.
Relay keys
This draft PR to NIP 11 specifies a
self
field which represents the relay's identity. Using this, relays can publish events on their own behalf. Currently, thepubkey
field sort of does the same thing, but is overloaded as a contact field for the owner of the relay.AUTH
Relays can control access using NIP 42 AUTH. There are any number of modes a relay can operate in:
-
No auth, fully public - anyone can read/write to the group.
-
Relays may enforce broad or granular access controls with AUTH.
Relays may deny EVENTs or REQs depending on user identity. Messages returned in AUTH, CLOSED, or OK messages should be human readable. It's crucial that clients show these error messages to users. Here's how Flotilla handles failed AUTH and denied event publishing:
LIMITS could also be used in theory to help clients adapt their interface depending on user abilities and relay policy.
- AUTH with implicit access controls.
In this mode, relays may exclude matching events from REQs if the user does not have permission to view them. This can be useful for multi-use relays that host hidden rooms. This mode should be used with caution, because it can result in confusion for the end user.
See Triflector for a relay implementation that supports some of these auth policies.
Invite codes
If a user doesn't have access to a relay, they can request access using this draft NIP. This is true whether access has been explicitly or implicitly denied (although users will have to know that they should use an invite code to request access).
The above referenced NIP also contains a mechanism for users to request an invite code that they can share with other users.
The policy for these invite codes is entirely up to the relay. They may be single-use, multi-use, or require additional verification. Additional requirements can be communicated to the user in the OK message, for example directions to visit an external URL to register.
See Triflector for a relay implementation that supports invite codes.
Content
Any kind of event can be published to a relay being treated as a group, unless rejected by the relay implementation. In particular, NIP 7D was added to support basic threads, and NIP C7 for chat messages.
Since which relay an event came from determines which group it was posted to, clients need to have a mechanism for keeping track of which relay they received an event from, and should not broadcast events to other relays (unless intending to cross-post the content).
Rooms
Rooms follow NIP 29. I wish NIP 29 wasn't called "relay based groups", which is very confusing when talking about "relays as groups". It's much better to think of them as sub-groups, or as Flotilla calls them, "rooms".
Rooms have two modes - managed and unmanaged. Managed rooms follow all the rules laid out in NIP 29 about metadata published by the relay and user membership. In either case, rooms are represented by a random room id, and are posted to by including the id in an event's
h
tag. This allows rooms to switch between managed and unmanaged modes without losing any content.Managed room names come from
kind 39000
room meta events, but unmanaged rooms don't have these. Instead, room names should come from members' NIP 51kind 10009
membership lists. Tags on these lists should look like this:["group", "groupid", "wss://group.example.com", "Cat lovers"]
. If no name can be found for the room (i.e., there aren't any members), the room should be ignored by clients.Rooms present a difficulty for publishing to the relay as a whole, since content with an
h
tag can't be excluded from requests. Currently, relay-wide posts are h-tagged with_
which works for "group" clients, but not more generally. I'm not sure how to solve this other than to ask relays to support negative filters.Cross-posting
The simplest way to cross-post content from one group (or room) to another, is to quote the original note in whatever event kind is appropriate. For example, a blog post might be quoted in a
kind 9
to be cross-posted to chat, or in akind 11
to be cross-posted to a thread.kind 16
reposts can be used the same way if the reader's client renders reposts.Posting the original event to multiple relays-as-groups is trivial, since all you have to do is send the event to the relay. Posting to multiple rooms simultaneously by appending multiple
h
tags is however not recommended, since group relays/clients are incentivised to protect themselves from spam by rejecting events with multipleh
tags (similar to how events with multiplet
tags are sometimes rejected).Privacy
Currently, it's recommended to include a NIP 70
-
tag on content posted to relays-as-groups to discourage replication of relay-specific content across the network.Another slightly stronger approach would be for group relays to strip signatures in order to make events invalid (or at least deniable). For this approach to work, users would have to be able to signal that they trust relays to be honest. We could also use ZkSNARKS to validate signatures in bulk.
In any case, group posts should not be considered "private" in the same way E2EE groups might be. Relays-as-groups should be considered a good fit for low-stakes groups with many members (since trust deteriorates quickly as more people get involved).
Membership
There is currently no canonical member list published by relays (except for NIP 29 managed rooms). Instead, users keep track of their own relay and room memberships using
kind 10009
lists. Relay-level memberships are represented by anr
tag containing the relay url, and room-level memberships are represented using agroup
tag.Users can choose to advertise their membership in a RAG by using unencrypted tags, or they may keep their membership private by using encrypted tags. Advertised memberships are useful for helping people find groups based on their social graph:
User memberships should not be trusted, since they can be published unilaterally by anyone, regardless of actual access. Possible improvements in this area would be the ability to provide proof of access:
- Relays could publish member lists (although this would sacrifice member privacy)
- Relays could support a new command that allows querying a particular member's access status
- Relays could provide a proof to the member that they could then choose to publish or not
Moderation
There are two parts to moderation: reporting and taking action based on these reports.
Reporting is already covered by NIP 56. Clients should be careful about encouraging users to post reports for illegal content under their own identity, since that can itself be illegal. Relays also should not serve reports to users, since that can be used to find rather than address objectionable content.
Reports are only one mechanism for flagging objectionable content. Relay operators and administrators can use whatever heuristics they like to identify and address objectionable content. This might be via automated policies that auto-ban based on reports from high-reputation people, a client that implements NIP 86 relay management API, or by some other admin interface.
There's currently no way for moderators of a given relay to be advertised, or for a moderator's client to know that the user is a moderator (so that they can enable UI elements for in-app moderation). This could be addressed via NIP 11, LIMITS, or some other mechanism in the future.
General best practices
In general, it's very important when developing a client to assume that the relay has no special support for any of the above features, instead treating all of this stuff as progressive enhancement.
For example, if a user enters an invite code, go ahead and send it to the relay using a
kind 28934
event. If it's rejected, you know that it didn't work. But if it's accepted, you don't know that it worked - you only know that the relay allowed the user to publish that event. This is helpful, becaues it may imply that the user does indeed have access to the relay. But additional probing may be needed, and reliance on error messages down the road when something else fails unexpectedly is indispensable.This paradigm may drive some engineers nuts, because it's basically equivalent to coding your clients to reverse-engineer relay support for every feature you want to use. But this is true of nostr as a whole - anyone can put whatever weird stuff in an event and sign it. Clients have to be extremely compliant with Postell's law - doing their absolute best to accept whatever weird data or behavior shows up and handle failure in any situation. Sure, it's annoying, but it's the cost of permissionless development. What it gets us is a completely open-ended protocol, in which anything can be built, and in which every solution is tested by the market.
-