-
@ 97c70a44:ad98e322
2025-03-05 18:09:05So you've decided to join nostr! Some wide-eyed fanatic has convinced you that the "sun shines every day on the birds and the bees and the cigarette trees" in a magical land of decentralized, censorship-resistant freedom of speech - and it's waiting just over the next hill.
But your experience has not been all you hoped. Before you've even had a chance to upload your AI-generated cyberpunk avatar or make up exploit codenames for your pseudonym's bio, you've been confronted with a new concept that has left you completely nonplussed.
It doesn't help that this new idea might be called by any number of strange names. You may have been asked to "paste your nsec", "generate a private key", "enter your seed words", "connect with a bunker", "sign in with extension", or even "generate entropy". Sorry about that.
All these terms are really referring to one concept under many different names: that of "cryptographic identity".
Now, you may have noticed that I just introduced yet another new term which explains exactly nothing. You're absolutely correct. And now I'm going to proceed to ignore your complaints and talk about something completely different. But bear with me, because the juice is worth the squeeze.
Identity
What is identity? There are many philosophical, political, or technical answers to this question, but for our purposes it's probably best to think of it this way:
Identity is the essence of a thing. Identity separates one thing from all others, and is itself indivisible.
This definition has three parts:
- Identity is "essential": a thing can change, but its identity cannot. I might re-paint my house, replace its components, sell it, or even burn it down, but its identity as something that can be referred to - "this house" - is durable, even outside the boundaries of its own physical existence.
- Identity is a unit: you can't break an identity into multiple parts. A thing might be composed of multiple parts, but that's only incidental to the identity of a thing, which is a concept, not a material thing.
- Identity is distinct: identity is what separates one thing from all others - the concept of an apple can't be mixed with that of an orange; the two ideas are distinct. In the same way, a single concrete apple is distinct in identity from another - even if the component parts of the apple decompose into compost used to grow more apples.
Identity is not a physical thing, but a metaphysical thing. Or, in simpler terms, identity is a "concept".
I (or someone more qualified) could at this point launch into a Scholastic tangent on what "is" is, but that is, fortunately, not necessary here. The kind of identities I want to focus on here are not our actual identities as people, but entirely fictional identities that we use to extend our agency into the digital world.
Think of it this way - your bank login does not represent you as a complete person. It only represents the access granted to you by the bank. This access is in fact an entirely new identity that has been associated with you, and is limited in what it's useful for.
Other examples of fictional identities include:
- The country you live in
- Your social media persona
- Your mortgage
- Geographical coordinates
- A moment in time
- A chess piece
Some of these identites are inert, for example points in space and time. Other identies have agency and so are able to act in the world - even as fictional concepts. In order to do this, they must "authenticate" themselves (which means "to prove they are real"), and act within a system of established rules.
For example, your D&D character exists only within the collective fiction of your D&D group, and can do anything the rules say. Its identity is authenticated simply by your claim as a member of the group that your character in fact exists. Similarly, a lawyer must prove they are a member of the Bar Association before they are allowed to practice law within that collective fiction.
"Cryptographic identity" is simply another way of authenticating a fictional identity within a given system. As we'll see, it has some interesting attributes that set it apart from things like a library card or your latitude and longitude. Before we get there though, let's look in more detail at how identities are authenticated.
Certificates
Merriam-Webster defines the verb "certify" as meaning "to attest authoritatively". A "certificate" is just a fancy way of saying "because I said so". Certificates are issued by a "certificate authority", someone who has the authority to "say so". Examples include your boss, your mom, or the Pope.
This method of authentication is how almost every institution authenticates the people who associate with it. Colleges issue student ID cards, governments issue passports, and websites allow you to "register an account".
In every case mentioned above, the "authority" creates a closed system in which a document (aka a "certificate") is issued which serves as a claim to a given identity. When someone wants to access some privileged service, location, or information, they present their certificate. The authority then validates it and grants or denies access. In the case of an international airport, the certificate is a little book printed with fancy inks. In the case of a login page, the certificate is a username and password combination.
This pattern for authentication is ubiquitous, and has some very important implications.
First of all, certified authentication implies that the issuer of the certificate has the right to exclusive control of any identity it issues. This identity can be revoked at any time, or its permissions may change. Your social credit score may drop arbitrarily, or money might disappear from your account. When dealing with certificate authorities, you have no inherent rights.
Second, certified authentication depends on the certificate authority continuing to exist. If you store your stuff at a storage facility but the company running it goes out of business, your stuff might disappear along with it.
Usually, authentication via certificate authority works pretty well, since an appeal can always be made to a higher authority (nature, God, the government, etc). Authorities also can't generally dictate their terms with impunity without losing their customers, alienating their constituents, or provoking revolt. But it's also true that certification by authority creates an incentive structure that frequently leads to abuse - arbitrary deplatforming is increasingly common, and the bigger the certificate authority, the less recourse the certificate holder (or "subject") has.
Certificates also put the issuer in a position to intermediate relationships that wouldn't otherwise be subject to their authority. This might take the form of selling user attention to advertisers, taking a cut of financial transactions, or selling surveillance data to third parties.
Proliferation of certificate authorities is not a solution to these problems. Websites and apps frequently often offer multiple "social sign-in" options, allowing their users to choose which certificate authority to appeal to. But this only piles more value into the social platform that issues the certificate - not only can Google shut down your email inbox, they can revoke your ability to log in to every website you used their identity provider to get into.
In every case, certificate issuance results in an asymmetrical power dynamic, where the issuer is able to exert significant control over the certificate holder, even in areas unrelated to the original pretext for the relationship between parties.
Self-Certification
But what if we could reverse this power dynamic? What if individuals could issue their own certificates and force institutions to accept them?
Ron Swanson's counterexample notwithstanding, there's a reason I can't simply write myself a parking permit and slip it under the windshield wiper. Questions about voluntary submission to legitimate authorities aside, the fact is that we don't have the power to act without impunity - just like any other certificate authority, we have to prove our claims either by the exercise of raw power or by appeal to a higher authority.
So the question becomes: which higher authority can we appeal to in order to issue our own certificates within a given system of identity?
The obvious answer here is to go straight to the top and ask God himself to back our claim to self-sovereignty. However, that's not how he normally works - there's a reason they call direct acts of God "miracles". In fact, Romans 13:1 explicitly says that "the authorities that exist have been appointed by God". God has structured the universe in such a way that we must appeal to the deputies he has put in place to govern various parts of the world.
Another tempting appeal might be to nature - i.e. the material world. This is the realm in which we most frequently have the experience of "self-authenticating" identities. For example, a gold coin can be authenticated by biting it or by burning it with acid. If it quacks like a duck, walks like a duck, and looks like a duck, then it probably is a duck.
In most cases however, the ability to authenticate using physical claims depends on physical access, and so appeals to physical reality have major limitations when it comes to the digital world. Captchas, selfies and other similar tricks are often used to bridge the physical world into the digital, but these are increasingly easy to forge, and hard to verify.
There are exceptions to this rule - an example of self-certification that makes its appeal to the physical world is that of a signature. Signatures are hard to forge - an incredible amount of data is encoded in physical signatures, from strength, to illnesses, to upbringing, to personality. These can even be scanned and used within the digital world as well. Even today, most contracts are sealed with some simulacrum of a physical signature. Of course, this custom is quickly becoming a mere historical curiosity, since the very act of digitizing a signature makes it trivially forgeable.
So: transcendent reality is too remote to subtantiate our claims, and the material world is too limited to work within the world of information. There is another aspect of reality remaining that we might appeal to: information itself.
Physical signatures authenticate physical identities by encoding unique physical data into an easily recognizable artifact. To transpose this idea to the realm of information, a "digital signature" might authenticate "digital identities" by encoding unique "digital data" into an easily recognizable artifact.
Unfortunately, in the digital world we have the additional challenge that the artifact itself can be copied, undermining any claim to legitimacy. We need something that can be easily verified and unforgeable.
Digital Signatures
In fact such a thing does exist, but calling it a "digital signature" obscures more than it reveals. We might just as well call the thing we're looking for a "digital fingerprint", or a "digital electroencephalogram". Just keep that in mind as we work our way towards defining the term - we are not looking for something looks like a physical signature, but for something that does the same thing as a physical signature, in that it allows us to issue ourselves a credential that must be accepted by others by encoding privileged information into a recognizable, unforgeable artifact.
With that, let's get into the weeds.
An important idea in computer science is that of a "function". A function is a sort of information machine that converts data from one form to another. One example is the idea of "incrementing" a number. If you increment 1, you get 2. If you increment 2, you get 3. Incrementing can be reversed, by creating a complementary function that instead subtracts 1 from a number.
A "one-way function" is a function that can't be reversed. A good example of a one-way function is integer rounding. If you round a number and get
5
, what number did you begin with? It's impossible to know - 5.1, 4.81, 5.332794, in fact an infinite number of numbers can be rounded to the number5
. These numbers can also be infinitely long - for example rounding PI to the nearest integer results in the number3
.A real-life example of a useful one-way function is
sha256
. This function is a member of a family of one-way functions called "hash functions". You can feed as much data as you like intosha256
, and you will always get 256 bits of information out. Hash functions are especially useful because collisions between outputs are very rare - even if you change a single bit in a huge pile of data, you're almost certainly going to get a different output.Taking this a step further, there is a whole family of cryptographic one-way "trapdoor" functions that act similarly to hash functions, but which maintain a specific mathematical relationship between the input and the output which allows the input/output pair to be used in a variety of useful applications. For example, in Elliptic Curve Cryptography, scalar multiplication on an elliptic curve is used to derive the output.
"Ok", you say, "that's all completely clear and lucidly explained" (thank you). "But what goes into the function?" You might expect that because of our analogy to physical signatures we would have to gather an incredible amount of digital information to cram into our cryptographic trapdoor function, mashing together bank statements, a record of our heartbeat, brain waves and cellular respiration. Well, we could do it that way (maybe), but there's actually a much simpler solution.
Let's play a quick game. What number am I thinking of? Wrong, it's 82,749,283,929,834. Good guess though.
The reason we use signatures to authenticate our identity in the physical world is not because they're backed by a lot of implicit physical information, but because they're hard to forge and easy to validate. Even so, there is a lot of variation in a single person's signature, even from one moment to the next.
Trapdoor functions solve the validation problem - it's trivially simple to compare one 256-bit number to another. And randomness solves the problem of forgeability.
Now, randomness (A.K.A. "entropy") is actually kind of hard to generate. Random numbers that don't have enough "noise" in them are known as "pseudo-random numbers", and are weirdly easy to guess. This is why Cloudflare uses a video stream of their giant wall of lava lamps to feed the random number generator that powers their CDN. For our purposes though, we can just imagine that our random numbers come from rolling a bunch of dice.
To recap, we can get a digital equivalent of a physical signature (or fingerprint, etc) by 1. coming up with a random number, and 2. feeding it into our chosen trapdoor function. The random number is called the "private" part. The output of the trapdoor function is called the "public" part. These two halves are often called "keys", hence the terms "public key" and "private key".
And now we come full circle - remember about 37 years ago when I introduced the term "cryptographic identity"? Well, we've finally arrived at the point where I explain what that actually is.
A "cryptographic identity" is identified by a public key, and authenticated by the ability to prove that you know the private key.
Notice that I didn't say "authenticated by the private key". If you had to reveal the private key in order to prove you know it, you could only authenticate a public key once without losing exclusive control of the key. But cryptographic identities can be authenticated any number of times because the certification is an algorithm that only someone who knows the private key can execute.
This is the super power that trapdoor functions have that hash functions don't. Within certain cryptosystems, it is possible to mix additional data with your private key to get yet another number in such a way that someone else who only knows the public key can prove that you know the private key.
For example, if my secret number is
12
, and someone tells me the number37
, I can "combine" the two by adding them together and returning the number49
. This "proves" that my secret number is12
. Of course, addition is not a trapdoor function, so it's trivially easy to reverse, which is why cryptography is its own field of knowledge.What's it for?
If I haven't completely lost you yet, you might be wondering why this matters. Who cares if I can prove that I made up a random number?
To answer this, let's consider a simple example: that of public social media posts.
Most social media platforms function by issuing credentials and verifying them based on their internal database. When you log in to your Twitter (ok, fine, X) account, you provide X with a phone number (or email) and password. X compares these records to the ones stored in the database when you created your account, and if they match they let you "log in" by issuing yet another credential, called a "session key".
Next, when you "say" something on X, you pass along your session key and your tweet to X's servers. They check that the session key is legit, and if it is they associate your tweet with your account's identity. Later, when someone wants to see the tweet, X vouches for the fact that you created it by saying "trust me" and displaying your name next to the tweet.
In other words, X creates and controls your identity, but they let you use it as long as you can prove that you know the secret that you agreed on when you registered (by giving it to them every time).
Now pretend that X gets bought by someone even more evil than Elon Musk (if such a thing can be imagined). The new owner now has the ability to control your identity, potentially making it say things that you didn't actually say. Someone could be completely banned from the platform, but their account could be made to continue saying whatever the owner of the platform wanted.
In reality, such a breach of trust would quickly result in a complete loss of credibility for the platform, which is why this kind of thing doesn't happen (at least, not that we know of).
But there are other ways of exploiting this system, most notably by censoring speech. As often happens, platforms are able to confiscate user identities, leaving the tenant no recourse except to appeal to the platform itself (or the government, but that doesn't seem to happen for some reason - probably due to some legalese in social platforms' terms of use). The user has to start completely from scratch, either on the same platform or another.
Now suppose that when you signed up for X instead of simply telling X your password you made up a random number and provided a cryptographic proof to X along with your public key. When you're ready to tweet (there's no need to issue a session key, or even to store your public key in their database) you would again prove your ownership of that key with a new piece of data. X could then publish that tweet or not, along with the same proof you provided that it really came from you.
What X can't do in this system is pretend you said something you didn't, because they don't know your private key.
X also wouldn't be able to deplatform you as effectively either. While they could choose to ban you from their website and refuse to serve your tweets, they don't control your identity. There's nothing they can do to prevent you from re-using it on another platform. Plus, if the system was set up in such a way that other users followed your key instead of an ID made up by X, you could switch platforms and keep your followers. In the same way, it would also be possible to keep a copy of all your tweets in your own database, since their authenticity is determined by your digital signature, not X's "because I say so".
This new power is not just limited to social media either. Here are some other examples of ways that self-issued cryptographic identites transform the power dynamic inherent in digital platforms:
- Banks sometimes freeze accounts or confiscate funds. If your money was stored in a system based on self-issued cryptographic keys rather than custodians, banks would not be able to keep you from accessing or moving your funds. This system exists, and it's called bitcoin.
- Identity theft happens when your identifying information is stolen and used to take out a loan in your name, and without your consent. The reason this is so common is because your credentials are not cryptographic - your name, address, and social security number can only be authenticated by being shared, and they are shared so often and with so many counterparties that they frequently end up in data breaches. If credit checks were authenticated by self-issued cryptographic keys, identity theft would cease to exist (unless your private key itself got stolen).
- Cryptographic keys allow credential issuers to protect their subjects' privacy better too. Instead of showing your ID (including your home address, birth date, height, weight, etc), the DMV could sign a message asserting that the holder of a given public key indeed over 21. The liquor store could then validate that claim, and your ownership of the named key, without knowing anything more about you. Zero-knowledge proofs take this a step further.
In each of these cases, the interests of the property owner, loan seeker, or customer are elevated over the interests of those who might seek to control their assets, exploit their hard work, or surveil their activity. Just as with personal privacy, freedom of speech, and Second Amendment rights the individual case is rarely decisive, but in the aggregate realigned incentives can tip the scale in favor of freedom.
Objections
Now, there are some drawbacks to digital signatures. Systems that rely on digital signatures are frequently less forgiving of errors than their custodial counterparts, and many of their strengths have corresponding weaknesses. Part of this is because people haven't yet developed an intuition for how to use cryptographic identities, and the tools for managing them are still being designed. Other aspects can be mitigated through judicious use of keys fit to the problems they are being used to solve.
Below I'll articulate some of these concerns, and explore ways in which they might be mitigated over time.
Key Storage
Keeping secrets is hard. "A lie can travel halfway around the world before the truth can get its boots on", and the same goes for gossip. Key storage has become increasingly important as more of our lives move online, to the extent that password managers have become almost a requirement for keeping track of our digital lives. But even with good password management, credentials frequently end up for sale on the dark web as a consequence of poorly secured infrastructure.
Apart from the fact that all of this is an argument for cryptographic identities (since keys are shared with far fewer parties), it's also true that the danger of losing a cryptographic key is severe, especially if that key is used in multiple places. Instead of hackers stealing your Facebook password, they might end up with access to all your other social media accounts too!
Keys should be treated with the utmost care. Using password managers is a good start, but very valuable keys should be stored even more securely - for example in a hardware signing device. This is a hassle, and something additional to learn, but is an indispensable part of taking advantage of the benefits associated with cryptographic identity.
There are ways to lessen the impact of lost or stolen secrets, however. Lots of different techniques exist for structuring key systems in such a way that keys can be protected, invalidated, or limited. Here are a few:
- Hierarchical Deterministic Keys allow for the creation of a single root key from which multiple child keys can be generated. These keys are hard to link to the parent, which provides additional privacy, but this link can also be proven when necessary. One limitation is that the identity system has to be designed with HD keys in mind.
- Key Rotation allows keys to become expendable. Additional credentials might be attached to a key, allowing the holder to prove they have the right to rotate the key. Social attestations can help with the process as well if the key is embedded in a web of trust.
- Remote Signing is a technique for storing a key on one device, but using it on another. This might take the form of signing using a hardware wallet and transferring an SD card to your computer for broadcasting, or using a mobile app like Amber to manage sessions with different applications.
- Key sharding takes this to another level by breaking a single key into multiple pieces and storing them separately. A coordinator can then be used to collaboratively sign messages without sharing key material. This dramatically reduces the ability of an attacker to steal a complete key.
Multi-Factor Authentication
One method for helping users secure their accounts that is becoming increasingly common is "multi-factor authentication". Instead of just providing your email and password, platforms send a one-time use code to your phone number or email, or use "time-based one time passwords" which are stored in a password manager or on a hardware device.
Again, MFA is a solution to a problem inherent in account-based authentication which would not be nearly so prevalent in a cryptographic identity system. Still, theft of keys does happen, and so MFA would be an important improvement - if not for an extra layer of authentication, then as a basis for key rotation.
In a sense, MFA is already being researched - key shards is one way of creating multiple credentials from a single key. However, this doesn't address the issue of key rotation, especially when an identity is tied to the public key that corresponds to a given private key. There are two possible solutions to this problem:
- Introduce a naming system. This would allow identities to use a durable name, assigning it to different keys over time. The downside is that this would require the introduction of either centralized naming authorities (back to the old model), or a blockchain in order to solve Zooko's trilemma.
- Establish a chain of keys. This would require a given key to name a successor key in advance and self-invalidate, or some other process like social recovery to invalidate an old key and assign the identity to a new one. This also would significantly increase the complexity of validating messages and associating them with a given identity.
Both solutions are workable, but introduce a lot of complexity that could cause more trouble than it's worth, depending on the identity system we're talking about.
Surveillance
One of the nice qualities that systems based on cryptographic identities have is that digitally signed data can be passed through any number of untrusted systems and emerge intact. This ability to resist tampering makes it possible to broadcast signed data more widely than would otherwise be the case in a system that relies on a custodian to authenticate information.
The downside of this is that more untrusted systems have access to data. And if information is broadcast publicly, anyone can get access to it.
This problem is compounded by re-use of cryptographic identities across multiple contexts. A benefit of self-issued credentials is that it becomes possible to bring everything attached to your identity with you, including social context and attached credentials. This is convenient and can be quite powerful, but it also means that more context is attached to your activity, making it easier to infer information about you for advertising or surveillance purposes. This is dangerously close to the dystopian ideal of a "Digital ID".
The best way to deal with this risk is to consider identity re-use an option to be used when desirable, but to default to creating a new key for every identity you create. This is no worse than the status quo, and it makes room for the ability to link identities when desired.
Another possible approach to this problem is to avoid broadcasting signed data when possible. This could be done by obscuring your cryptographic identity when data is served from a database, or by encrypting your signed data in order to selectively share it with named counterparties.
Still, this is a real risk, and should be kept in mind when designing and using systems based on cryptographic identity. If you'd like to read more about this, please see this blog post.
Making Keys Usable
You might be tempted to look at that list of trade-offs and get the sense that cryptographic identity is not for mere mortals. Key management is hard, and footguns abound - but there is a way forward. With nostr, some new things are happening in the world of key management that have never really happened before.
Plenty of work over the last 30 years has gone into making key management tractable, but none have really been widely adopted. The reason for this is simple: network effect.
Many of these older key systems only applied the thinnest veneer of humanity over keys. But an identity is much richer than a mere label. Having a real name, social connections, and a corpus of work to attach to a key creates a system of keys that humans care about.
By bootstrapping key management within a social context, nostr ensures that the payoff of key management is worth the learning curve. Not only is social engagement a strong incentive to get off the ground, people already on the network are eager to help you get past any roadblocks you might face.
So if I could offer an action item: give nostr a try today. Whether you're in it for the people and their values, or you just want to experiment with cryptographic identity, nostr is a great place to start. For a quick introduction and to securely generate keys, visit njump.me.
Thanks for taking the time to read this post. I hope it's been helpful, and I can't wait to see you on nostr!
-
@ df478ecd:495107a7
2025-03-10 14:21:34I watched this, then immediately opened the window next to me. -
@ df478ecd:495107a7
2025-03-10 12:11:29{"pubkey":"8401fdf682b8e20befc9654dca4e9934697ea8c80326f4511129e7715da190b1","tags":[["i","podcast:item:guid:https:\/\/media.keypair.fm\/episodes\/13","https:\/\/fountain.fm\/episode\/fnu7bkNYGlJJ8X37Pze4"],["i","podcast:guid:https:\/\/media.keypair.fm\/feed","https:\/\/fountain.fm\/show\/QGEMm7FxXz5a4553Jhqr"]],"id":"4de5cf7ea9dced6e43ff860c79e7ad3050d3412ce331d265a2744d6d252d35ce","sig":"1818fbe88d2034cb69a84bf59e1b63bc9f5236bf926aebd1cdfd214d41ac82ea33cb15378373ad51acece2ff0c04d094ffc4c2b853e7672fc176e73c92f2a7d3","content":"Thanx you, you both. Interesting guest and talk.\n\nhttps:\/\/fountain.fm\/episode\/fnu7bkNYGlJJ8X37Pze4\n\nnostr:nevent1qvzqqqpxquqzpg2f7kvr05565r7laeuhuxku3rqr02zavvt35yzfy4fam4udrg9sr92at9","created_at":1741595583,"kind":1} -
@ df478ecd:495107a7
2025-03-10 12:09:40It was fun for us, too! -
@ 4857600b:30b502f4
2025-03-11 01:58:19Key Findings
- Researchers at the University of Cambridge discovered that aspirin can help slow the spread of certain cancers, including breast, bowel, and prostate cancers
- The study was published in the journal Nature
How Aspirin Works Against Cancer
- Aspirin blocks thromboxane A2 (TXA2), a chemical produced by blood platelets
- TXA2 normally weakens T cells, which are crucial for fighting cancer
- By inhibiting TXA2, aspirin "unleashes" T cells to more effectively target and destroy cancer cells
Supporting Evidence
- Previous studies showed regular aspirin use was linked to:
- 31% reduction in cancer-specific mortality in breast cancer patients
- 9% decrease in recurrence/metastasis risk
- 25% reduction in colon cancer risk
Potential Impact
- Aspirin could be particularly effective in early stages of cancer
- It may help prevent metastasis, which causes 90% of cancer fatalities
- As an inexpensive treatment, it could be more accessible globally than antibody-based therapies
Cautions
- Experts warn against self-medicating with aspirin
- Potential risks include internal bleeding and stomach ulcers
- Patients should consult doctors before starting aspirin therapy
Next Steps
- Large-scale clinical trials to determine which cancer types and patients would benefit most
- Development of new drugs that mimic aspirin's benefits without side effects
Citations: Natural News
-
@ 460c25e6:ef85065c
2025-02-25 15:20:39If you don't know where your posts are, you might as well just stay in the centralized Twitter. You either take control of your relay lists, or they will control you. Amethyst offers several lists of relays for our users. We are going to go one by one to help clarify what they are and which options are best for each one.
Public Home/Outbox Relays
Home relays store all YOUR content: all your posts, likes, replies, lists, etc. It's your home. Amethyst will send your posts here first. Your followers will use these relays to get new posts from you. So, if you don't have anything there, they will not receive your updates.
Home relays must allow queries from anyone, ideally without the need to authenticate. They can limit writes to paid users without affecting anyone's experience.
This list should have a maximum of 3 relays. More than that will only make your followers waste their mobile data getting your posts. Keep it simple. Out of the 3 relays, I recommend: - 1 large public, international relay: nos.lol, nostr.mom, relay.damus.io, etc. - 1 personal relay to store a copy of all your content in a place no one can delete. Go to relay.tools and never be censored again. - 1 really fast relay located in your country: paid options like http://nostr.wine are great
Do not include relays that block users from seeing posts in this list. If you do, no one will see your posts.
Public Inbox Relays
This relay type receives all replies, comments, likes, and zaps to your posts. If you are not getting notifications or you don't see replies from your friends, it is likely because you don't have the right setup here. If you are getting too much spam in your replies, it's probably because your inbox relays are not protecting you enough. Paid relays can filter inbox spam out.
Inbox relays must allow anyone to write into them. It's the opposite of the outbox relay. They can limit who can download the posts to their paid subscribers without affecting anyone's experience.
This list should have a maximum of 3 relays as well. Again, keep it small. More than that will just make you spend more of your data plan downloading the same notifications from all these different servers. Out of the 3 relays, I recommend: - 1 large public, international relay: nos.lol, nostr.mom, relay.damus.io, etc. - 1 personal relay to store a copy of your notifications, invites, cashu tokens and zaps. - 1 really fast relay located in your country: go to nostr.watch and find relays in your country
Terrible options include: - nostr.wine should not be here. - filter.nostr.wine should not be here. - inbox.nostr.wine should not be here.
DM Inbox Relays
These are the relays used to receive DMs and private content. Others will use these relays to send DMs to you. If you don't have it setup, you will miss DMs. DM Inbox relays should accept any message from anyone, but only allow you to download them.
Generally speaking, you only need 3 for reliability. One of them should be a personal relay to make sure you have a copy of all your messages. The others can be open if you want push notifications or closed if you want full privacy.
Good options are: - inbox.nostr.wine and auth.nostr1.com: anyone can send messages and only you can download. Not even our push notification server has access to them to notify you. - a personal relay to make sure no one can censor you. Advanced settings on personal relays can also store your DMs privately. Talk to your relay operator for more details. - a public relay if you want DM notifications from our servers.
Make sure to add at least one public relay if you want to see DM notifications.
Private Home Relays
Private Relays are for things no one should see, like your drafts, lists, app settings, bookmarks etc. Ideally, these relays are either local or require authentication before posting AND downloading each user\'s content. There are no dedicated relays for this category yet, so I would use a local relay like Citrine on Android and a personal relay on relay.tools.
Keep in mind that if you choose a local relay only, a client on the desktop might not be able to see the drafts from clients on mobile and vice versa.
Search relays:
This is the list of relays to use on Amethyst's search and user tagging with @. Tagging and searching will not work if there is nothing here.. This option requires NIP-50 compliance from each relay. Hit the Default button to use all available options on existence today: - nostr.wine - relay.nostr.band - relay.noswhere.com
Local Relays:
This is your local storage. Everything will load faster if it comes from this relay. You should install Citrine on Android and write ws://localhost:4869 in this option.
General Relays:
This section contains the default relays used to download content from your follows. Notice how you can activate and deactivate the Home, Messages (old-style DMs), Chat (public chats), and Global options in each.
Keep 5-6 large relays on this list and activate them for as many categories (Home, Messages (old-style DMs), Chat, and Global) as possible.
Amethyst will provide additional recommendations to this list from your follows with information on which of your follows might need the additional relay in your list. Add them if you feel like you are missing their posts or if it is just taking too long to load them.
My setup
Here's what I use: 1. Go to relay.tools and create a relay for yourself. 2. Go to nostr.wine and pay for their subscription. 3. Go to inbox.nostr.wine and pay for their subscription. 4. Go to nostr.watch and find a good relay in your country. 5. Download Citrine to your phone.
Then, on your relay lists, put:
Public Home/Outbox Relays: - nostr.wine - nos.lol or an in-country relay. -
.nostr1.com Public Inbox Relays - nos.lol or an in-country relay -
.nostr1.com DM Inbox Relays - inbox.nostr.wine -
.nostr1.com Private Home Relays - ws://localhost:4869 (Citrine) -
.nostr1.com (if you want) Search Relays - nostr.wine - relay.nostr.band - relay.noswhere.com
Local Relays - ws://localhost:4869 (Citrine)
General Relays - nos.lol - relay.damus.io - relay.primal.net - nostr.mom
And a few of the recommended relays from Amethyst.
Final Considerations
Remember, relays can see what your Nostr client is requesting and downloading at all times. They can track what you see and see what you like. They can sell that information to the highest bidder, they can delete your content or content that a sponsor asked them to delete (like a negative review for instance) and they can censor you in any way they see fit. Before using any random free relay out there, make sure you trust its operator and you know its terms of service and privacy policies.
-
@ 16f1a010:31b1074b
2025-02-19 20:57:59In the rapidly evolving world of Bitcoin, running a Bitcoin node has become more accessible than ever. Platforms like Umbrel, Start9, myNode, and Citadel offer user-friendly interfaces to simplify node management. However, for those serious about maintaining a robust and efficient Lightning node ⚡, relying solely on these platforms may not be the optimal choice.
Let’s delve into why embracing Bitcoin Core and mastering the command-line interface (CLI) can provide a more reliable, sovereign, and empowering experience.
Understanding Node Management Platforms
What Are Umbrel, Start9, myNode, and Citadel?
Umbrel, Start9, myNode, and Citadel are platforms designed to streamline the process of running a Bitcoin node. They offer graphical user interfaces (GUIs) that allow users to manage various applications, including Bitcoin Core and Lightning Network nodes, through a web-based dashboard 🖥️.
These platforms often utilize Docker containers 🐳 to encapsulate applications, providing a modular and isolated environment for each service.
The Appeal of Simplified Node Management
The primary allure of these platforms lies in their simplicity. With minimal command-line interaction, users can deploy a full Bitcoin and Lightning node, along with a suite of additional applications.
✅ Easy one-command installation
✅ Web-based GUI for management
✅ Automatic app updates (but with delays, as we’ll discuss)However, while this convenience is attractive, it comes at a cost.
The Hidden Complexities of Using Node Management Platforms
While the user-friendly nature of these platforms is advantageous, it can also introduce several challenges that may hinder advanced users or those seeking greater control over their nodes.
🚨 Dependency on Maintainers for Updates
One significant concern is the reliance on platform maintainers for updates. Since these platforms manage applications through Docker containers, users must wait for the maintainers to update the container images before they can access new features or security patches.
🔴 Delayed Bitcoin Core updates = potential security risks
🔴 Lightning Network updates are not immediate
🔴 Bugs and vulnerabilities may persist longerInstead of waiting on a third party, why not update Bitcoin Core & LND yourself instantly?
⚙️ Challenges in Customization and Advanced Operations
For users aiming to perform advanced operations, such as:
- Custom backups 📂
- Running specific CLI commands 🖥️
- Optimizing node settings ⚡
…the abstraction layers introduced by these platforms become obstacles.
Navigating through nested directories and issuing commands inside Docker containers makes troubleshooting a nightmare. Instead of a simple
bitcoin-cli
command, you must figure out how to execute it inside the container, adding unnecessary complexity.Increased Backend Complexity
To achieve frontend simplicity, these platforms make the backend more complex.
🚫 Extra layers of abstraction
🚫 Hidden logs and settings
🚫 Harder troubleshootingThe use of multiple Docker containers, custom scripts, and unique file structures can make system maintenance and debugging a pain.
This complication defeats the purpose of “making running a node easy.”
✅ Advantages of Using Bitcoin Core and Command-Line Interface (CLI)
By installing Bitcoin Core directly and using the command-line interface (CLI), you gain several key advantages that make managing a Bitcoin and Lightning node more efficient and empowering.
Direct Control and Immediate Updates
One of the biggest downsides of package manager-based platforms is the reliance on third-party maintainers to release updates. Since Bitcoin Core, Lightning implementations (such as LND, Core Lightning, or Eclair), and other related software evolve rapidly, waiting for platform-specific updates can leave you running outdated or vulnerable versions.
By installing Bitcoin Core directly, you remove this dependency. You can update immediately when new versions are released, ensuring your node benefits from the latest features, security patches, and bug fixes. The same applies to Lightning software—being able to install and update it yourself gives you full autonomy over your node’s performance and security.
🛠 Simplified System Architecture
Platforms like Umbrel and myNode introduce extra complexity by running Bitcoin Core and Lightning inside Docker containers. This means:
- The actual files and configurations are stored inside Docker’s filesystem, making it harder to locate and manage them manually.
- If something breaks, troubleshooting is more difficult due to the added layer of abstraction.
- Running commands requires jumping through Docker shell sessions, adding unnecessary friction to what should be a straightforward process.
Instead, a direct installation of Bitcoin Core, Lightning, and Electrum Server (if needed) results in a cleaner, more understandable system. The software runs natively on your machine, without containerized layers making things more convoluted.
Additionally, setting up your own systemd service files for Bitcoin and Lightning is not as complicated as it seems. Once configured, these services will run automatically on boot, offering the same level of convenience as platforms like Umbrel but without the unnecessary complexity.
Better Lightning Node Management
If you’re running a Lightning Network node, using CLI-based tools provides far more flexibility than relying on a GUI like the ones bundled with node management platforms.
🟢 Custom Backup Strategies – Running Lightning through a GUI-based node manager often means backups are handled in a way that is opaque to the user. With CLI tools, you can easily script automatic backups of your channels, wallets, and configurations.
🟢 Advanced Configuration – Platforms like Umbrel force certain configurations by default, limiting how you can customize your Lightning node. With a direct install, you have full control over: * Channel fees 💰 * Routing policies 📡 * Liquidity management 🔄
🟢 Direct Access to LND, Core Lightning, or Eclair – Instead of issuing commands through a GUI (which is often limited in functionality), you can use: *
lncli
(for LND) *lightning-cli
(for Core Lightning) …to interact with your node at a deeper level.Enhanced Learning and Engagement
A crucial aspect of running a Bitcoin and Lightning node is understanding how it works.
Using an abstraction layer like Umbrel may get a node running in a few clicks, but it does little to teach users how Bitcoin actually functions.
By setting up Bitcoin Core, Lightning, and related software manually, you will:
✅ Gain practical knowledge of Bitcoin nodes, networking, and system performance.
✅ Learn how to configure and manage RPC commands.
✅ Become less reliant on third-party developers and more confident in troubleshooting.🎯 Running a Bitcoin node is about sovereignty – learn how to control it yourself.
Become more sovereign TODAY
Many guides make this process straightforward K3tan has a fantastic guide on running Bitcoin Core, Electrs, LND and more.
- Ministry of Nodes Guide 2024
- You can find him on nostr
nostr:npub1txwy7guqkrq6ngvtwft7zp70nekcknudagrvrryy2wxnz8ljk2xqz0yt4xEven with the best of guides, if you are running this software,
📖 READ THE DOCUMENTATIONThis is all just software at the end of the day. Most of it is very well documented. Take a moment to actually read through the documentation for yourself when installing. The documentation has step by step guides on setting up the software. Here is a helpful list: * Bitcoin.org Bitcoin Core Linux install instructions * Bitcoin Core Code Repository * Electrs Installation * LND Documentation * LND Code Repository * CLN Documentation * CLN Code Repository
If you have any more resources or links I should add, please comment them . I want to add as much to this article as I can.
-
@ ed5774ac:45611c5c
2025-02-15 05:38:56Bitcoin as Collateral for U.S. Debt: A Deep Dive into the Financial Mechanics
The U.S. government’s proposal to declare Bitcoin as a 'strategic reserve' is a calculated move to address its unsustainable debt obligations, but it threatens to undermine Bitcoin’s original purpose as a tool for financial freedom. To fully grasp the implications of this plan, we must first understand the financial mechanics of debt creation, the role of collateral in sustaining debt, and the historical context of the petro-dollar system. Additionally, we must examine how the U.S. and its allies have historically sought new collateral to back their debt, including recent attempts to weaken Russia through the Ukraine conflict.
The Vietnam War and the Collapse of the Gold Standard
The roots of the U.S. debt crisis can be traced back to the Vietnam War. The war created an unsustainable budget deficit, forcing the U.S. to borrow heavily to finance its military operations. By the late 1960s, the U.S. was spending billions of dollars annually on the war, leading to a significant increase in public debt. Foreign creditors, particularly France, began to lose confidence in the U.S. dollar’s ability to maintain its value. In a dramatic move, French President Charles de Gaulle sent warships to New York to demand the conversion of France’s dollar reserves into gold, as per the Bretton Woods Agreement.
This demand exposed the fragility of the U.S. gold reserves. By 1971, President Richard Nixon was forced to suspend the dollar’s convertibility to gold, effectively ending the Bretton Woods system. This move, often referred to as the "Nixon Shock," declared the U.S. bankrupt and transformed the dollar into a fiat currency backed by nothing but trust in the U.S. government. The collapse of the gold standard marked the beginning of the U.S.’s reliance on artificial systems to sustain its debt. With the gold standard gone, the U.S. needed a new way to back its currency and debt—a need that would lead to the creation of the petro-dollar system.
The Petro-Dollar System: A New Collateral for Debt
In the wake of the gold standard’s collapse, the U.S. faced a critical challenge: how to maintain global confidence in the dollar and sustain its ability to issue debt. The suspension of gold convertibility in 1971 left the dollar as a fiat currency—backed by nothing but trust in the U.S. government. To prevent a collapse of the dollar’s dominance and ensure its continued role as the world’s reserve currency, the U.S. needed a new system to artificially create demand for dollars and provide a form of indirect backing for its debt.
The solution came in the form of the petro-dollar system. In the 1970s, the U.S. struck a deal with Saudi Arabia and other OPEC nations to price oil exclusively in U.S. dollars. In exchange, the U.S. offered military protection and economic support. This arrangement created an artificial demand for dollars, as countries needed to hold USD reserves to purchase oil. Additionally, oil-exporting nations reinvested their dollar revenues in U.S. Treasuries, effectively recycling petro-dollars back into the U.S. economy. This recycling of petrodollars provided the U.S. with a steady inflow of capital, allowing it to finance its deficits and maintain low interest rates.
To further bolster the system, the U.S., under the guidance of Henry Kissinger, encouraged OPEC to dramatically increase oil prices in the 1970s. The 1973 oil embargo and subsequent price hikes, masterminded by Kissinger, quadrupled the cost of oil, creating a windfall for oil-exporting nations. These nations, whose wealth surged significantly due to the rising oil prices, reinvested even more heavily in U.S. Treasuries and other dollar-denominated assets. This influx of petrodollars increased demand for U.S. debt, enabling the U.S. to issue more debt at lower interest rates. Additionally, the appreciation in the value of oil—a critical global commodity—provided the U.S. banking sector with the necessary collateral to expand credit generation. Just as a house serves as collateral for a mortgage, enabling banks to create new debt, the rising value of oil boosted the asset values of Western corporations that owned oil reserves or invested in oil infrastructure projects. This increase in asset values allowed these corporations to secure larger loans, providing banks with the collateral needed to expand credit creation and inject more dollars into the economy. However, these price hikes also caused global economic turmoil, disproportionately affecting developing nations. As the cost of energy imports skyrocketed, these nations faced mounting debt burdens, exacerbating their economic struggles and deepening global inequality.
The Unsustainable Debt Crisis and the Search for New Collateral
Fast forward to the present day, and the U.S. finds itself in a familiar yet increasingly precarious position. The 2008 financial crisis and the 2020 pandemic have driven the U.S. government’s debt to unprecedented levels, now exceeding $34 trillion, with a debt-to-GDP ratio surpassing 120%. At the same time, the petro-dollar system—the cornerstone of the dollar’s global dominance—is under significant strain. The rise of alternative currencies and the shifting power dynamics of a multipolar world have led to a decline in the dollar’s role in global trade, particularly in oil transactions. For instance, China now pays Saudi Arabia in yuan for oil imports, while Russia sells its oil and gas in rubles and other non-dollar currencies. This growing defiance of the dollar-dominated system reflects a broader trend toward economic independence, as nations like China and Russia seek to reduce their reliance on the U.S. dollar. As more countries bypass the dollar in trade, the artificial demand for dollars created by the petro-dollar system is eroding, undermining the ability of US to sustain its debt and maintain global financial hegemony.
In search of new collateral to carry on its unsustainable debt levels amid declining demand for the U.S. dollar, the U.S., together with its Western allies—many of whom face similar sovereign debt crises—first attempted to weaken Russia and exploit its vast natural resources as collateral. The U.S. and its NATO allies used Ukraine as a proxy to destabilize Russia, aiming to fragment its economy, colonize its territory, and seize control of its natural resources, estimated to be worth around $75 trillion. By gaining access to these resources, the West could have used them as collateral for the banking sector, enabling massive credit expansion. This, in turn, would have alleviated the sovereign debt crisis threatening both the EU and the U.S. This plan was not unprecedented; it mirrored France’s long-standing exploitation of its former African colonies through the CFA franc system.
For decades, France has maintained economic control over 14 African nations through the CFA franc, a currency pegged to the euro and backed by the French Treasury. Under this system, these African countries are required to deposit 50% of their foreign exchange reserves into the French Treasury, effectively giving France control over their monetary policy and economic sovereignty. This arrangement allows France to use African resources and reserves as implicit collateral to issue debt, keeping its borrowing costs low and ensuring demand for its bonds. In return, African nations are left with limited control over their own economies, forced to prioritize French interests over their own development. This neo-colonial system has enabled France to sustain its financial dominance while perpetuating poverty and dependency in its former colonies.
Just as France’s CFA franc system relies on the economic subjugation of African nations to sustain its financial dominance, the U.S. had hoped to use Russia’s resources as a lifeline for its debt-ridden economy. However, the plan ultimately failed. Russia not only resisted the sweeping economic sanctions imposed by the West but also decisively defeated NATO’s proxy forces in Ukraine, thwarting efforts to fragment its economy and seize control of its $75 trillion in natural resources. This failure left the U.S. and its allies without a new source of collateral to back their unsustainable debt levels. With this plan in ruins, the U.S. has been forced to turn its attention to Bitcoin as a potential new collateral for its unsustainable debt.
Bitcoin as Collateral: The U.S. Government’s Plan
The U.S. government’s plan to declare Bitcoin as a strategic reserve is a modern-day equivalent of the gold standard or petro-dollar system. Here’s how it would work:
-
Declaring Bitcoin as a Strategic Reserve: By officially recognizing Bitcoin as a reserve asset, the U.S. would signal to the world that it views Bitcoin as a store of value akin to gold. This would legitimize Bitcoin in the eyes of institutional investors and central banks.
-
Driving Up Bitcoin’s Price: To make Bitcoin a viable collateral, its price must rise significantly. The U.S. would achieve this by encouraging regulatory clarity, promoting institutional adoption, and creating a state-driven FOMO (fear of missing out). This would mirror the 1970s oil price hikes that bolstered the petro-dollar system.
-
Using Bitcoin to Back Debt: Once Bitcoin’s price reaches a sufficient level, the U.S. could use its Bitcoin reserves as collateral for issuing new debt. This would restore confidence in U.S. Treasuries and allow the government to continue borrowing at low interest rates.
The U.S. government’s goal is clear: to use Bitcoin as a tool to issue more debt and reinforce the dollar’s role as the global reserve currency. By forcing Bitcoin into a store-of-value role, the U.S. would replicate the gold standard’s exploitative dynamics, centralizing control in the hands of large financial institutions and central banks. This would strip Bitcoin of its revolutionary potential and undermine its promise of decentralization. Meanwhile, the dollar—in digital forms like USDT—would remain the primary medium of exchange, further entrenching the parasitic financial system.
Tether plays a critical role in this strategy. As explored in my previous article (here: [https://ersan.substack.com/p/is-tether-a-bitcoin-company]), Tether helps sustaining the current financial system by purchasing U.S. Treasuries, effectively providing life support for the U.S. debt machine during a period of declining demand for dollar-denominated assets. Now, with its plans to issue stablecoins on the Bitcoin blockchain, Tether is positioning itself as a bridge between Bitcoin and the traditional financial system. By issuing USDT on the Lightning Network, Tether could lure the poor in developing nations—who need short-term price stability for their day to day payments and cannot afford Bitcoin’s volatility—into using USDT as their primary medium of exchange. This would not only create an artificial demand for the dollar and extend the life of the parasitic financial system that Bitcoin was designed to dismantle but would also achieve this by exploiting the very people who have been excluded and victimized by the same system—the poor and unbanked in developing nations, whose hard-earned money would be funneled into sustaining the very structures that perpetuate their oppression.
Worse, USDT on Bitcoin could function as a de facto central bank digital currency (CBDC), where all transactions can be monitored and sanctioned by governments at will. For example, Tether’s centralized control over USDT issuance and its ties to traditional financial institutions make it susceptible to government pressure. Authorities could compel Tether to implement KYC (Know Your Customer) rules, freeze accounts, or restrict transactions, effectively turning USDT into a tool of financial surveillance and control. This would trap users in a system where every transaction is subject to government oversight, effectively stripping Bitcoin of its censorship-resistant and decentralized properties—the very features that make it a tool for financial freedom.
In this way, the U.S. government’s push for Bitcoin as a store of value, combined with Tether’s role in promoting USDT as a medium of exchange, creates a two-tiered financial system: one for the wealthy, who can afford to hold Bitcoin as a hedge against inflation, and another for the poor, who are trapped in a tightly controlled, surveilled digital economy. This perpetuates the very inequalities Bitcoin was designed to dismantle, turning it into a tool of oppression rather than liberation.
Conclusion: Prolonging the Parasitic Financial System
The U.S. government’s plan to declare Bitcoin as a strategic reserve is not a step toward financial innovation or freedom—it is a desperate attempt to prolong the life of a parasitic financial system that Bitcoin was created to replace. By co-opting Bitcoin, the U.S. would gain a new tool to issue more debt, enabling it to continue its exploitative practices, including proxy wars, economic sanctions, and the enforcement of a unipolar world order.
The petro-dollar system was built on the exploitation of oil-exporting nations and the global economy. A Bitcoin-backed system would likely follow a similar pattern, with the U.S. using its dominance to manipulate Bitcoin’s price and extract value from the rest of the world. This would allow the U.S. to sustain its current financial system, in which it prints money out of thin air to purchase real-world assets and goods, enriching itself at the expense of other nations.
Bitcoin was designed to dismantle this parasitic system, offering an escape hatch for those excluded from or exploited by traditional financial systems. By declaring Bitcoin a strategic reserve, the U.S. government would destroy Bitcoin’s ultimate purpose, turning it into another instrument of control. This is not a victory for Bitcoin or bitcoiners—it is a tragedy for financial freedom and global equity.
The Bitcoin strategic reserve plan is not progress—it is a regression into the very system Bitcoin was designed to dismantle. As bitcoiners, we must resist this co-option and fight to preserve Bitcoin’s original vision: a decentralized, sovereign, and equitable financial system for all. This means actively working to ensure Bitcoin is used as a medium of exchange, not just a store of value, to fulfill its promise of financial freedom.
-
-
@ 04c915da:3dfbecc9
2025-03-10 23:31:30Bitcoin has always been rooted in freedom and resistance to authority. I get that many of you are conflicted about the US Government stacking but by design we cannot stop anyone from using bitcoin. Many have asked me for my thoughts on the matter, so let’s rip it.
Concern
One of the most glaring issues with the strategic bitcoin reserve is its foundation, built on stolen bitcoin. For those of us who value private property this is an obvious betrayal of our core principles. Rather than proof of work, the bitcoin that seeds this reserve has been taken by force. The US Government should return the bitcoin stolen from Bitfinex and the Silk Road.
Usually stolen bitcoin for the reserve creates a perverse incentive. If governments see a bitcoin as a valuable asset, they will ramp up efforts to confiscate more bitcoin. The precedent is a major concern, and I stand strongly against it, but it should be also noted that governments were already seizing coin before the reserve so this is not really a change in policy.
Ideally all seized bitcoin should be burned, by law. This would align incentives properly and make it less likely for the government to actively increase coin seizures. Due to the truly scarce properties of bitcoin, all burned bitcoin helps existing holders through increased purchasing power regardless. This change would be unlikely but those of us in policy circles should push for it regardless. It would be best case scenario for American bitcoiners and would create a strong foundation for the next century of American leadership.
Optimism
The entire point of bitcoin is that we can spend or save it without permission. That said, it is a massive benefit to not have one of the strongest governments in human history actively trying to ruin our lives.
Since the beginning, bitcoiners have faced horrible regulatory trends. KYC, surveillance, and legal cases have made using bitcoin and building bitcoin businesses incredibly difficult. It is incredibly important to note that over the past year that trend has reversed for the first time in a decade. A strategic bitcoin reserve is a key driver of this shift. By holding bitcoin, the strongest government in the world has signaled that it is not just a fringe technology but rather truly valuable, legitimate, and worth stacking.
This alignment of incentives changes everything. The US Government stacking proves bitcoin’s worth. The resulting purchasing power appreciation helps all of us who are holding coin and as bitcoin succeeds our government receives direct benefit. A beautiful positive feedback loop.
Realism
We are trending in the right direction. A strategic bitcoin reserve is a sign that the state sees bitcoin as an asset worth embracing rather than destroying. That said, there is a lot of work left to be done. We cannot be lulled into complacency, the time to push forward is now, and we cannot take our foot off the gas. We have a seat at the table for the first time ever. Let's make it worth it.
We must protect the right to free usage of bitcoin and other digital technologies. Freedom in the digital age must be taken and defended, through both technical and political avenues. Multiple privacy focused developers are facing long jail sentences for building tools that protect our freedom. These cases are not just legal battles. They are attacks on the soul of bitcoin. We need to rally behind them, fight for their freedom, and ensure the ethos of bitcoin survives this new era of government interest. The strategic reserve is a step in the right direction, but it is up to us to hold the line and shape the future.
-
@ 1eb5d2c9:ee9e8d5f
2025-03-10 04:10:22XOiREtY5LISqq8nCQbh1/0MQvSovZMF33yzScQS8bvThlZXgFoSSzYmcXXLxYoJFJUo5oYmHfoEFfHTbSn7oxud4lGD+YhTaENZk+kvqjKMd79eiqiLMkLdpmIQguZ5r7Y1O/xnYdlwyreB9CBTozRG7QiLuPwn7sm3Qcad4OB1JhnbB8Twn/XsL697NxvxO4fpC65eTTqOPQRTEb8eCvfMlW8cHLzh3DoW7repi4ONyAiSqe2loKTLY4/I7uWCefRS3T16c8UztbHI61RdRxqVLRobH6fjsuAm0kXOfWvki8f+FEtwKY42RhpWDItoRW5sWoZIoKIqSR5IMu8GUzbsNOtvTPUJ41hP5mawXu5D46SOl8AoUM97Py4pbS8gWWkszGRdqaa45gat5K8WXHbDedOO9ITEeWmrEAU1g5/80jWDCUmRFbTCtuX3Qln5ga8mlV6MqR7rJlQZeNNgtpOnJrTvV7XK3IC5f4zgVxbkiB+JtNNmoOZT+q4O2QARgSaLGNoecAtVq2/Fru7ZYBrp39xb6wEincDpddrrrgEQHOrZNYPocedowEfdHamRirCA3Ftw0sbTn3aHbLc9l68C8tDVPRmsUb6d3vhAS/nntJh70oGhRlrryKvT3uneJAB2imigNokKnC5QRhJNWb6rf5QFROFesQqiju1XpNMhghupL4/Ivbe2TR45tuHUxMLa7Hns37jz5z2iCfYpEdqfAgpa3zJL3Hj7kKaAhAdKMptZu1d6CFjGSped+ksrXrHIQnz9hDMt0tLv7uujHpg==?iv=dpt/IB+VkjEBAIXtnYfKeQ== -
@ b8851a06:9b120ba1
2025-01-28 21:34:54Private property isn’t lines on dirt or fences of steel—it’s the crystallization of human sovereignty. Each boundary drawn is a silent declaration: This is where my will meets yours, where creation clashes against chaos. What we defend as “mine” or “yours” is no mere object but a metaphysical claim, a scaffold for the unfathomable complexity of voluntary exchange.
Markets breathe only when individuals anchor their choices in the inviolable. Without property, there is no negotiation—only force. No trade—only taking. The deed to land, the title to a car, the seed of an idea: these are not static things but frontiers of being, where human responsibility collides with the infinite permutations of value.
Austrian economics whispers what existentialism shouts: existence precedes essence. Property isn’t granted by systems; it’s asserted through action, defended through sacrifice, and sanctified through mutual recognition. A thing becomes “owned” only when a mind declares it so, and others—through reason or respect—refrain from crossing that unseen line.
Bitcoin? The purest ledger of this truth. A string of code, yes—but one that mirrors the unyielding logic of property itself: scarce, auditable, unconquerable. It doesn’t ask permission. It exists because sovereign minds choose it to.
Sigh. #nostr
I love #Bitcoin. -
@ f4db5270:3c74e0d0
2025-01-23 18:09:14Hi Art lover! 🎨🫂💜 You may not know it yet but all of the following paintings are available in #Bitcoin on my website: https://isolabell.art/#shop
For info and prices write to me in DM and we will find a good deal! 🤝
ON THE ROAD AGAIN 40x50cm, Oil on canvas Completed January 23, 2025
SUN OF JANUARY 40x50cm, Oil on canvas Completed January 14, 2025
THE BLUE HOUR 40x50cm, Oil on canvas Completed December 14, 2024
LIKE A FRAGMENT OF ETERNITY 50x40cm, Oil on canvas Completed December 01, 2024
WHERE WINTER WHISPERS 50x40cm, Oil on canvas Completed November 07, 2024
L'ATTESA DI UN MOMENTO 40x40cm, Oil on canvas Completed October 29, 2024
LE COSE CHE PENSANO 40x50cm, Oil on paper Completed October 05, 2024
TWILIGHT'S RIVER 50x40cm, Oil on canvas Completed September 17, 2024
GOLD ON THE OCEAN 40x50cm, Oil on paper Completed September 08, 2024
SUSSURRI DI CIELO E MARE 50x40cm, Oil on paper Completed September 05, 2024
THE END OF A WONDERFUL WEEKEND 40x30cm, Oil on board Completed August 12, 2024
FIAMME NEL CIELO 60x35cm, Oil on board Completed July 28, 2024
INIZIO D'ESTATE 50x40cm, Oil on cradled wood panel Completed July 13, 2024
OMBRE DELLA SERA 50x40cm, Oil on cradled wood panel Completed June 16, 2024
NEW ZEALAND SUNSET 80x60cm, Oil on canvas board Completed May 28, 2024
VENICE 50x40cm, Oil on board Completed May 4, 2024
CORNWALL 50x40cm, Oil on board Completed April 26, 2024
DOCKS ON SUNSET 40x19,5cm, Oil on board Completed March 14, 2024
SOLITUDE 30x30cm, Oil on cradled wood panel Completed March 2, 2024
LULLING WAVES 40x30cm, Oil on cradled wood panel Completed January 14, 2024
MULATTIERA IN AUTUNNO 30x30cm, Oil on cradled wood panel
TRAMONTO A KOS 40x40cm, oil on board canvas
HIDDEN SMILE 40x40cm, oil on board
INIZIO D'AUTUNNO 40x40cm, oil on canvas
BOE NEL LAGO 30x30cm, oil on canvas board
BARCHE A RIPOSO 40x40cm, oil on canvas board
IL RISVEGLIO 30x40cm, oil on canvas board
LA QUIETE PRIMA DELLA TEMPESTA 30x40cm, oil on canvas board
LAMPIONE SUL LAGO 30x30cm, oil on canvas board
DUE NELLA NEVE 60x25cm, oil on board
UNA CAREZZA 30x30cm, oil on canvas board
REBEL WAVES 44x32cm, oil on canvas board
THE SCREAMING WAVE 40x30cm, oil on canvas board
"LA DONZELLETTA VIEN DALLA CAMPAGNA..." 30x40cm, oil on canvas board
LIGHTHOUSE ON WHITE CLIFF 30x40cm, oil on canvas board
-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Let’s dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computers—and it has nothing to do with what so-called “quantum coaches” teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoin’s security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computing’s Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. It’s a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoin’s Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoin’s blockchain.
- Lamport: Created in 1977, it’s considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoin’s Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the community’s constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoin’s future is not at risk—it is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ a296b972:e5a7a2e8
2025-03-10 23:07:09Warum gibt es Menschen, die, statt die Gelegenheit zu ergreifen, Frieden zu schaffen, den Krieg nicht beenden wollen? Wie verkommen müssen die Charaktere sein, die die Aussicht auf Macht und Geld über den Wert auch nur eines einzigen Menschen stellen?
Wie es aussieht, scheint Europa derzeit die Zentrale der Idioten zu sein. Der Gedanke, dass diese verirrten Seelen die Geschicke der europäischen Länder leiten und die Menschen sich ihren wirren Ergüssen unterzuordnen haben, kann einem schier den Verstand rauben.
Statt dass Europa Wasser beisteuert, den Brand zu löschen, macht es genau das Gegenteil, es sucht nach einer Flüssigkeit, die als bester Brandbeschleuniger bekannt ist.
Mit etwas anderen Vorzeichen erinnert das an die Vorzeit des 1. Weltkrieges, in der offiziell, keiner den Krieg wollte, und dann war er doch da. Es gibt ein interessantes Buch: „Zeitgeschichtliche Betrachtungen“ von Rudolf Steiner, Gesamtausgabe 173 a, in der man sehr viel über die Vorkriegszeit erfahren kann. Man kann Parallelen zu heute finden, wie die Zeit vor Ausbruch des Ukraine-Konflikts im Februar 2022, die Zeit seit dem Maidan in 2014 und die jahrelange NATO-Osterweiterung einfach ausgeblendet wird. Ähnliches ist auch für die Vorgeschichte des 2. Weltkriegs zu finden, der vor allem seinen Anfang in den Versailler Verträgen nach dem 1. Weltkrieg findet.
Die Ereignisse überschlagen sich zurzeit und man kommt kaum noch hinterher. Man fragt sich, ob Macron (Young Global Leader) neue Anweisungen vom WEF erhalten hat, um die „kreative Zerstörung“ voranzutreiben.
Wer flüstert Blackrock-Merz jeden Tag etwas anderes ins Ohr? Merz, der noch nicht einmal Kanzler ist, und schon am weiteren Abstieg Deutschlands arbeitet. Wirtschaftlich, generationsübergreifend und dem einstigen Ansehen Deutschlands in der Welt entgegen. Er hat noch nicht einmal den Schwur geleistet, Schaden vom deutschen Volk abzuwenden und bricht ihn schon vorauseilend.
Und nicht zum ersten Mal zieht Groß-Britannien maßgeblich an den Strippen, das den Verlust des Empires wohl bis heute immer noch nicht überwunden zu haben scheint.
Sie alle führen sich auf, wie ein Michelin-Männchen, vollgepumpt mit Nichts, nach außen massig auftretend, aber innen eben nur heiße Luft.
Was steckt hinter dieser Großkotzigkeit, wo doch auch die Großmäuler wissen müssten, dass keine Substanz dahintersteckt. Man soll keine medizinischen Vergleiche anstellen, aber man kommt auf nichts anderes, als dass es sich hier um ein psychologisches Problem handeln muss. Was hat diesen Größenwahn ausgelöst?
Bis auf viel zu wenige Ausnahmen, liest Europa George Orwells „1984“ als Bedienungsanleitung, statt als Warnung. Krieg ist Frieden. Lüge ist Wahrheit.
In der Höhle sitzt die vielköpfige Hydra. Der unsterbliche Kopf in der Mitte mit Betonfrisur, Kosename Röschen. Doch auch Betonfrisuren halten nicht ewig. Schon gar nicht in der Politik. Hoffentlich findet sich bald ein Weg, die Hydra auszuhungern. Das könnte klappen, wenn Deutschland vollkommen am Boden liegt. Fällt Deutschland, fällt auch die EU. Wunder können geschehen!
Es gibt Anzeichen dafür, dass die USA Europa in die Volljährigkeit entlassen wollen. Die wildgewordenen europäischen Streithähne sind ganz offensichtlich mit dieser Verantwortung und der Aussicht auf eine neue Freiheit hoffnungslos überfordert. Sie scheitern schon beim ersten Versuch, eine erwachsene, eigenständige, verantwortungsvolle Entscheidung zu treffen. Im Sinne und zum Wohle der europäischen Völker.
Stattdessen benehmen sie sich wie Pubertierende, die bockig und unreif, mit dem Fuß auf den Boden stampfen, „Ich will aber!“ schreien, und sich wundern, dass sie nicht mit am Tisch der Erwachsenen sitzen dürfen.
Wenn sie einen Friedensplan hätten, der sich an der Realität orientiert, dürften sie schon. Haben sie aber nicht. Stattdessen schmieden sie eine Gemeinschaft der Willigen, genauer gesagt, eine Gemeinschaft der Kriegswilligen. Alles über die Köpfe derjenigen hinweg, die keinen Krieg wollen, für alle Beteiligten, entgegen der Mehrheit der Europäer, die Frieden wollen. Das Bürokratie-Monster EU verschlingt seine eigenen Kinder.
Es wird versucht, mit dem Digital Services Act kritische Stimmen mundtot zu machen. Jeder, der nicht für die Idiotien der EU ist, ist gegen sie. Der einzige, der das Kind beim Namen genannt hat, war bislang J. D. Vance auf der Sicherheitskonferenz in München. Die Zustände in Rumänien geben eine Vorschau darauf, was den Rest in Europa noch erwarten könnte, wenn bei Wahlen nicht das herauskommt, was sich die autokratisch verkommene sogenannte Polit-Elite wünscht. Auf der Bundesrepublik Deutschland steht zwar noch Demokratie drauf, es ist aber kaum noch welche drin. Dieses Land ist auf dem besten Wege dahin, dass das zweite D in DDR genauso wenig wert wird, wie es dort war.
Gegenkräfte werden von denen, die sagen, sie bekämpfen die Delegitimierung des Staates delegitimiert. Projektion als Machterhalt auf allen Ebenen.
Wenn ein Staat sich zu sehr mit der Wirtschaft verbindet, ist das Faschismus. In der einst in aller Welt hochangesehenen Wirtschaftsmacht Deutschland nennt man das Public Private Partnership. Es bilden sich Strukturen einer neuen Regierungsform, die Elemente aus Faschismus, Autokratie, Kommunismus, Sozialismus und Technokratie enthält, für die es noch keinen Namen gibt. Demokratur käme dem momentan am nächsten.
Alle einst demokratischen Systeme in Europa, bis auf wenige Ausnahmen, sind mit einem Ungeist vergiftet worden, der spätestens mit dem C-Ereignis aus der Flasche entwichen ist.
Die USA waren nie, NIE, unsere Freunde! Ein Land hat keine Freunde, sondern nur Interessen. Die USA wollten nie, dass man mit ihnen an einem Strang zieht, sie wollten in erster Linie immer nur ihre eigenen Pläne durchziehen, und wenn man Glück hatte, kam der betreffende Staat darin vor. Weil sie die Möglichkeiten dazu hatten, wurde die Nachkriegsordnung nach deren Vorstellungen gestaltet. In Deutschland und Italien hatte man die Befürchtung, dass der Kommunismus Überhand nehmen könnte. Daher hat man Deutschland durch den Marshall-Plan angefüttert, um eine Konsumgesellschaft heranwachsen zu lassen, die bräsig und satt konsumiert und sich ansonsten wenig für den Erhalt der Demokratie einsetzen will. Perfektioniert durch die Wahl-Shows alle vier Jahre, die die Demokratie-Simulation lange aufrechterhalten hat.
Die Deutschen, Täter und Opfer zugleich, traumatisiert, haben fleißig, wie die Deutschen nun mal sind, das Land wieder aufgebaut, sich einen gewissen Wohlstand erarbeitet. Wie die kleinen Kinder, die glauben, wenn sie brav sind, dann wird der Vati, Uncle Sam, die Welt, sie doch ganz bald ganz sicher wieder liebhaben.
Es mag ja sein, dass es mit einer zweiten Amtszeit Trumps, direkt im Anschluss an die erste, keinen Ukraine-Krieg gegeben hätte. Beweisen können wir es nicht. Hinterher kann man viel erzählen. Die sicher guten Friedensbemühungen Trumps geschehen nicht in erster Linie aus Menschenliebe, sondern genauso, wie immer, in Fortführung der US-amerikanischen Geschichte, in allererster Linie aus einem staatlichen Interesse heraus. Das ist legitim, aber das muss man erkennen. Der Krieg in der Ukraine ist ein Stellvertreterkrieg zwischen den USA und Russland. Trump hat es selber zugegeben. Weil die USA erkannt haben, dass er nicht zu gewinnen ist, haben sie nach einer Lösung gesucht, wie sie sich gesichtswahrend wieder einmal aus der Affaire ziehen können, und da kommen die sehr engagierten Friedensverhandlungen gerade recht. Und Trumps Seltenerden-Deal ist nur die andere Seite der Medaille, auch wie immer: Erst alles kurz und klein hauen und am Militär verdienen, dann am Wiederaufbau ein zweites Mal verdienen (Siehe Naher Osten und die Ölvorkommen). Dabei spielt es fast keine Rolle, das Biden Trump die Suppe eingebrockt hat, die er jetzt auszulöffeln hat. Das kommt ihm eher zugute, weil er so als Friedensengel in die Geschichte eingehen wird. Vielleicht ist das sein Ziel, seinem Alter entsprechend, etwas Bleibendes hinterlassen zu wollen. Vermutlich sogar erfolgreicher, als der klägliche Versuch von „Mutti“, die mit ihrem materiell dicken, geistig sehr dünnen Buch, den Eingang in die Geschichte vorzugeben versuchte.
Alles gut und fein. Am Ende ist es das wichtigste, dass dieses sinnlose Opfern von Menschenleben aufhört. Dazu ist jedes Mittel recht. Wer wäre nicht dafür? Dank dafür gebührt dann Trump so oder so. Man darf jedoch nicht der Täuschung erliegen, dass das alles nur aus reiner Nächstenliebe geschehen würde. Wenn dem so wäre, hätte es in den USA nicht die Sprengung des WTCs inkl. Nebengebäuden und auch nicht den geschehen lassenden Angriff auf Pearl Harbor gegeben. Es gehört zur US-amerikanischen Mentalität alles sehr theatralisch aufzubauschen, mit viel Tam Tam, Pathos und Kulissen im Zuckerbäcker-Stile. Nicht umsonst ist die Filmindustrie in Hollywood so erfolgreich. Nicht umsonst müssen Filme von der Militärbehörde freigegeben werden. „Independence Day“ ist ein gutes Beispiel, wie wieder einmal ein tapferer Amerikaner in Selbstaufopferung die ganze Welt rettet. Was für eine Gehirnverkleisterung aus Pathos-Schmalz!
Russland kann der Westen, der sogenannte „Wertewesten“ nicht vorwerfen, dass es keine lupenreine Demokratie ist. Welcher Staat im Westen beweisen kann, dass dies für ihn zutrifft, der werfe den ersten Stein. Entgegen dem Haufen wildgewordener Handfeger im Westen kann man aber sagen, dass Putin bisher sehr besonnen vorgegangen ist, und dass es ein Glück für die Welt ist, dass er mit Lawrow einen sehr erfahrenen und diplomatisch brillanten Außenminister hat, der sich allenthalben nur mit der scheidenden feministischen Außen-Dings Deutschlands messen kann (Satire aus). Nach wie vor gehen von Russland nicht die aller geringsten Anzeichen aus, dass es vorhat, Europa in irgendeiner Weise angreifen zu wollen. Im Gegenteil, es wird immer wieder bekräftigt, dass es hierfür weder einen Anlass noch ein Interesse gibt. Und trotzdem tut man im Westen so, als ob der Russe kurz davorsteht, die Adria zu verminen, in der Normandie eine Invasion zu starten und gleichzeitig erneut vor den Toren Berlins zu stehen. Was für ein Schwachsinn. Polen tut sich derzeit besonders mit seiner Psychose hervor, in dem es Mann und Reiter aufstockt, weil es in seinem Geiste schon russische Marschlieder in der Ferne zu hören glaubt. Man denkt wohl, es sei besser, schon einmal die Feuerwehr loszuschicken, obwohl noch gar kein Brand gemeldet ist.
Die derzeitigen Universal-Dilettanten in den Parlamenten erkennen schon wieder nicht (absichtlich oder nicht?), dass es die eigentliche Aufgabe Europas wäre, zwischen den USA im Westen und Russland im Osten, als Brückenbauer aufzutreten. Hier kommt Deutschland eine besondere Rolle zu. Gemeinsam mit Österreich und der Schweiz, als gemeinsamer deutscher Kulturraum, müsste es die Gelegenheit ergreifen, sich der Neutralität anzuschließen, denn das ist der eigentliche Sinn des Ausspruchs: Am deutschen Wesen soll die Welt genesen. Das ist geistig gemeint, nicht in Form von Kriegstüchtigkeit und Aufrüstung! Das ist die eigentliche Aufgabe der Denker und Dichter. Friedensstiftend und friedenssichernd, umsichtig und besonnen aufzutreten, statt wie Frankreich, als Yorkshire-Terrier einen Bären anzukläffen, oder mit einer deutschen Hexe, die auf Taurus-Raketen reitet, dem Panzer-Toni, oder dem Herrn Kriegsgewitter, die Ukraine weiter in ihrem Untergang unterstützen zu wollen, als ob sie allesamt im Blutrausch wären.
Die Karten werden derzeit neu gemischt. Kräfteverhältnisse verändern sich. Es knarrt und knarzt an allen Enden. Statt, wie man es von einer sogenannten zivilisierten Welt erwarten könnte, dies mit den Mitteln der Diplomatie zu lösen, werden die Keulen der Neandertaler ausgegraben und man begibt sich wieder einmal zurück in die Steinzeit. In der Menschheitsentwicklung sind wir noch nicht sehr weit gekommen. Bewusstseinsentwicklung Fehlanzeige. Die archaischen Urkräfte entfalten immer noch ihre Wirkung. Spruch meines weisen Großvaters: Dumm geboren und nichts dazugelernt. Recht hat er.
Auch wir Menschen sollten uns verändern. Wir sollten bessere Demokraten werden, in dem wir mehr Verantwortung für unsere Freiheit übernehmen, statt die anderen machen zu lassen. Was wir davon haben, haben wir ja in der C-Zeit gesehen. Ein Anfang wäre schon, wenn wir auf die Propaganda in den Alt-Medien verzichten würden. Viele wollen von der C-Zeit, die uns allen noch in den Knochen sitzt, nichts mehr wissen. Sie wollen ihr altes Leben zurückhaben und ihrem Tagwerk nachgehen. Nicht nur die Gen-Behandelten, sondern inzwischen auch viele Impf-Verzichter.
Schlechte Nachrichten: Die alten Zeiten kommen nicht zurück, es gibt keinen Anknüpfungspunkt. Und das ist gut so!
Verdrängen und Behäbigkeit sind die beste Voraussetzung dafür, dass unsere Freiheit scheibchenweise, dünn, wie man eine Cacchiatore aufschneidet, immer mehr unter die Räder kommt. Die Think-Tanks, die sich schon lange mit dem Verhalten der Menschen auseinandersetzen, rechnen mit der anerzogenen Bequemlichkeit im Denken und Handeln.
Das sollte man sich klarmachen. Jeder demokratisch orientierte Mensch sollte etwas Zeit erübrigen, und wenn der Tag noch so stressig war, sich mit den Themen zu beschäftigen, die derzeit unser aller Leben in Bahnen lenken könnten, die wir alle nicht wollen. Die tagesschau ist hierfür ungeeignet. Wenn die Falle erst einmal zugeschnappt ist, ist ein Herauskommen um so schwerer. Unsere Vorfahren haben nicht umsonst die Freiheit mit ihrem Blut erkämpft. Denen sind wir etwas schuldig. Daran sollten wir uns wieder mehr erinnern. Wehret den Anfängen, die jetzt schon ein gutes Stück vorangekommen sind!
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ c1e9ab3a:9cb56b43
2025-03-10 21:56:07Introduction
Throughout human history, the pyramids of Egypt have fascinated scholars, archaeologists, and engineers alike. Traditionally thought of as tombs for pharaohs or religious monuments, alternative theories have speculated that the pyramids may have served advanced technological functions. One such hypothesis suggests that the pyramids acted as large-scale nitrogen fertilizer generators, designed to transform arid desert landscapes into fertile land.
This paper explores the feasibility of such a system by examining how a pyramid could integrate thermal convection, electrolysis, and a self-regulating breeder reactor to sustain nitrogen fixation processes. We will calculate the total power requirements and estimate the longevity of a breeder reactor housed within the structure.
The Pyramid’s Function as a Nitrogen Fertilizer Generator
The hypothesized system involves several key processes:
- Heat and Convection: A fissile material core located in the King's Chamber would generate heat, creating convection currents throughout the pyramid.
- Electrolysis and Hydrogen Production: Water sourced from subterranean channels would undergo electrolysis, splitting into hydrogen and oxygen due to electrical and thermal energy.
- Nitrogen Fixation: The generated hydrogen would react with atmospheric nitrogen (N₂) to produce ammonia (NH₃), a vital component of nitrogen-based fertilizers.
Power Requirements for Continuous Operation
To maintain the pyramid’s core at approximately 450°C, sufficient to drive nitrogen fixation, we estimate a steady-state power requirement of 23.9 gigawatts (GW).
Total Energy Required Over 10,000 Years
Given continuous operation over 10,000 years, the total energy demand can be calculated as:
[ \text{Total time} = 10,000 \times 365.25 \times 24 \times 3600 \text{ seconds} ]
[ \text{Total time} = 3.16 \times 10^{11} \text{ seconds} ]
[ \text{Total energy} = 23.9 \text{ GW} \times 3.16 \times 10^{11} \text{ s} ]
[ \approx 7.55 \times 10^{21} \text{ J} ]
Using a Self-Regulating Breeder Reactor
A breeder reactor could sustain this power requirement by generating more fissile material than it consumes. This reduces the need for frequent refueling.
Pebble Bed Reactor Design
- Self-Regulation: The reactor would use passive cooling and fuel expansion to self-regulate temperature.
- Breeding Process: The reactor would convert thorium-232 into uranium-233, creating a sustainable fuel cycle.
Fissile Material Requirements
Each kilogram of fissile material releases approximately 80 terajoules (TJ) (or 8 × 10^{13} J/kg). Given a 35% efficiency rate, the usable energy per kilogram is:
[ \text{Usable energy per kg} = 8 \times 10^{13} \times 0.35 = 2.8 \times 10^{13} \text{ J/kg} ]
[ \text{Fissile material required} = \frac{7.55 \times 10^{21}}{2.8 \times 10^{13}} ]
[ \approx 2.7 \times 10^{8} \text{ kg} = 270,000 \text{ tons} ]
Impact of a Breeding Ratio
If the reactor operates at a breeding ratio of 1.3, the total fissile material requirement would be reduced to:
[ \frac{270,000}{1.3} \approx 208,000 \text{ tons} ]
Reactor Size and Fuel Replenishment
Assuming a pebble bed reactor housed in the King’s Chamber (~318 cubic meters), the fuel cycle could be sustained with minimal refueling. With a breeding ratio of 1.3, the reactor could theoretically operate for 10,000 years with occasional replenishment of lost material due to inefficiencies.
Managing Scaling in the Steam Generation System
To ensure long-term efficiency, the water supply must be conditioned to prevent mineral scaling. Several strategies could be implemented:
1. Natural Water Softening Using Limestone
- Passing river water through limestone beds could help precipitate out calcium bicarbonate, reducing hardness before entering the steam system.
2. Chemical Additives for Scaling Prevention
- Chelating Agents: Compounds such as citric acid or tannins could be introduced to bind calcium and magnesium ions.
- Phosphate Compounds: These interfere with crystal formation, preventing scale adhesion.
3. Superheating and Pre-Evaporation
- Pre-Evaporation: Water exposed to extreme heat before entering the system would allow minerals to precipitate out before reaching the reactor.
- Superheated Steam: Ensuring only pure vapor enters the steam cycle would prevent mineral buildup.
- Electrolysis of Superheated Steam: Using multi-million volt electrostatic fields to ionize and separate minerals before they enter the steam system.
4. Electrostatic Control for Scaling Mitigation
- The pyramid’s hypothesized high-voltage environment could ionize water molecules, helping to prevent mineral deposits.
Conclusion
If the Great Pyramid were designed as a self-regulating nitrogen fertilizer generator, it would require a continuous 23.9 GW energy supply, which could be met by a breeder reactor housed within its core. With a breeding ratio of 1.3, an initial load of 208,000 tons of fissile material would sustain operations for 10,000 years with minimal refueling.
Additionally, advanced water treatment techniques, including limestone filtration, chemical additives, and electrostatic control, could ensure long-term efficiency by mitigating scaling issues.
While this remains a speculative hypothesis, it presents a fascinating intersection of energy production, water treatment, and environmental engineering as a means to terraform the ancient world.
-
@ 7e538978:a5987ab6
2024-10-02 13:57:31Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoin’s Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isn’t just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but it’s not just about gameplay; it’s about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? That’s where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, we’ll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Let’s explore how LNbits transforms payment processing and why it’s quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The game’s current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duel’s efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbits’ tools means that game developers don’t need to worry about building custom payment systems from scratch—they can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the game’s developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the game’s logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Network’s complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distribution—ensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their project’s needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible nature—everything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether you’re developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbits’ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isn’t just a payment tool — it’s a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ 878dff7c:037d18bc
2025-03-10 21:49:27Wall Street Decline Signals Potential Recession Risks
### Summary:
Wall Street experienced significant losses, with the Nasdaq recording its largest fall since 2022, heightening concerns about a potential recession. This downturn is expected to impact global markets, including Australia's ASX, which is poised to open lower. Economists attribute the market volatility to escalating trade tensions and uncertainty surrounding US economic policies.
Sources: ABC News - March 11, 2025, Financial Review - March 11, 2025
China's DeepSeek R1 AI Model Signals New Space Race
Summary:
China's launch of the DeepSeek R1 AI model underscores a new phase in the space race, highlighting advancements in artificial intelligence and space exploration. This development reflects China's strategic investments in AI and space technologies, including satellite systems and Mars missions. The West is urged to respond with increased investments and strategic partnerships to maintain technological leadership and national security.
Sources: New York Post - 11th March 2025
Australia's Urgent Need to Scale Up in Technology
Summary:
Daniel Petre, a leading Australian tech innovator, emphasizes the critical need for Australia to scale up in technology to avoid being left behind. He highlights that advancements in AI, climate tech, and biotech will drive the next decade of innovation. Petre stresses the importance of investing in research and development, fostering a conducive environment for innovation, and ensuring inclusive growth to maintain a high GDP and stable society.
Sources: The Australian - 11th March 2025
Political Controversy Over Fabricated Terror Plot
Summary:
A controversy erupted over a suspected terror plot involving an explosive-laden caravan found in Dural, NSW, initially described as a potential "mass casualty event" by NSW Premier Chris Minns. Authorities later revealed the plot was fabricated by criminals to create fear and benefit personally. The Prime Minister, Anthony Albanese, and senior government officials were reportedly not informed for ten days, leading to criticism from opposition leader Peter Dutton. Home Affairs Minister Tony Burke claimed Dutton had been misled by organized crime figures. Investigations revealed no real threat, but the discovery had a negative impact on the Jewish community, highlighting issues of anti-Semitism. Despite arrests, those directly involved in the fabricated plot remain at large.
Sources: News.com.au - March 11, 2025, The Guardian - March 11, 2025
Senator Lambie Calls for Expulsion of US Military Personnel
Summary:
Tasmanian Senator Jacqui Lambie appeared on Channel 9's Today show, making a bold demand for Australia to threaten shutting down the Pine Gap military base and expel US spies and marines. This was in response to the US planning to impose hefty tariffs on Australian exports and due to perceived disloyalty exemplified by the US president’s handling of Ukraine. Lambie emphasized that Pine Gap, a key asset for US intelligence and missile defense, is critical for America’s security and its potential closure could serve as a powerful negotiating tool. She also expressed concerns about President Trump's commitment to US-Australia security alliances and urged Australian independence in defense strategies. Pine Gap, established in the 1960s, plays a significant role in global surveillance and military operations, and its potential closure could impact the US’s intelligence capabilities significantly. The situation underlines growing tensions and the importance of reassessing national security and international relations.
Sources: News.com.au - March 11, 2025
Emergency Services Respond to Hundreds of Incidents
Summary:
Emergency services have been actively responding to numerous incidents related to the severe weather. Over the weekend, approximately 500 events were reported, including fallen trees and flooding. The community's preparedness has aided response efforts, but authorities continue to urge residents to remain vigilant, adhere to warnings, and avoid driving through floodwaters.
Sources: Courier Mail - March 10, 2025
Superannuation Access for Home Purchases Divides Major Parties
Summary:
The policy on using superannuation for home purchases is a significant point of contention between Australia's major political parties. The Australian Labor Party (ALP) is firmly against early super access for home buying, whereas the Coalition supports allowing super savers to withdraw up to $50,000 for this purpose. While surveys indicate a slight majority in favor, critics argue the policy might increase house prices and debt levels, citing New Zealand's similar program, which hasn't significantly improved affordability and may have unintended negative effects. Home affordability remains a critical issue, with current figures showing the highest difficulty in purchasing a first home since 1996.
Sources: The Australian - March 11, 2025
Russia Warns Australia Against Deploying Peacekeeping Troops to Ukraine
Summary:
Russia has issued stern warnings to Australia regarding potential deployment of peacekeeping troops to Ukraine. The Russian embassy in Canberra labeled such plans as "unacceptable," cautioning that it could lead to "grave consequences" and urging Australia to "avoid trouble." Despite these warnings, Australian Foreign Minister Penny Wong emphasized Australia's commitment to supporting Ukraine and stated that any request for a peacekeeping mission would be considered. Prime Minister Anthony Albanese expressed openness to joining a peacekeeping coalition, contingent upon a formal request. Opinions within Australia vary, with some opposition figures opposing troop deployment, while the government continues to support Ukraine through various means, including military assistance and potential peacekeeping missions under the UN.
Sources: News.com.au - 11 March 2025, The Guardian - 11 March 2025
Malcolm Turnbull Criticizes Trump's Tariff Threats Amid Rising Tensions
Summary:
Former Australian Prime Minister Malcolm Turnbull has criticized US President Donald Trump, accusing him of extortion and bullying, which may affect Australia's chances of securing a tariff exemption. Turnbull argued that conceding to Trump's behavior would lead to more bullying and that Trump's actions are aiding adversaries like China by alienating US allies. Trump responded by labeling Turnbull a weak and ineffective leader. Despite the tension, Australia's Deputy Prime Minister Richard Marles continues to advocate for a tariff exemption, emphasizing the mutual benefits of free trade with the US.
Sources: The Guardian - 11 March 2025, News.com.au - 11 March 2025
COVID-19 Continues to Impact Australia's Mortality Rates
Summary:
Nearly five years after the World Health Organization declared COVID-19 a pandemic, new research by the Burnet Institute reveals that the virus continues to affect Australia's mortality rates. The study estimates an excess mortality of 31,000 deaths between January 2020 and November 2024, attributed to undiagnosed cases and long-term health effects. Currently, approximately 20 more Australians die each day from COVID-19 compared to pre-pandemic times. The report emphasizes the need for more research into long COVID and improved global disease prevention infrastructure. Australia's initiative to establish a permanent Centre for Disease Control underscores the importance of preventive health measures. The ongoing effects of COVID-19 highlight the necessity for enhanced response and preparedness for future pandemics.
Sources: The Australian - March 11, 2025
Financial Support Announced for Workers Affected by Cyclone Alfred
Summary:
The Australian government has introduced financial assistance for workers impacted by ex-Tropical Cyclone Alfred. Eligible individuals who lost income due to the cyclone can access up to 13 weeks of support, aligning with the JobSeeker unemployment benefits scheme at A$778 per fortnight. Additionally, a one-time A$1,000 disaster payment has been declared to aid recovery efforts.
Sources: Reuters - 11 March 2025
-
@ 6316050a:a5e43cbe
2025-03-10 21:47:13Asi como en Abril 2024 comenzamos a escribir sobre bitcoin porque se acercaba un momento histórico, hoy dan ganas de inscribir este, porque parece otro momento histórico y con importante incidencia en el valor de BTC y en su propuesta de valor futuro. En abril, si se acuerdan, se producía un nuevo halving de Bitcoin, lo que implicó que la emisión diaria de las monedas pasaba de 900 BTC por día a 450. Esto implicaba que la generación ("minado") anual de BTC, pasaría a ser menor que la del oro desde ese momento. El oro minado en la actualidad produce un aumento anual de su stock de entre 1.5% y 3% y bitcoin tiene en la actualidad un aumento anual de su cantidad del 0.84%. Si lo pensamos como una moneda, ese 20 de Abril se convirtió en la moneda más fuerte del planeta, en lo que respecta a tasa de emisión anual.
¿Y qué pasó ahora?
Entre ayer y hoy Trump emitió un decreto para generar una Reserva Soberana de Bitcoin en el tesoro de USA. En principio esto no es un disparador importante para su precio en el corto plazo (de hecho hoy bajó) porque está reserva está conformada en principio por los bitcoins que Estados Unidos ya tiene en su poder, obtenidos de incautaciones en causas judiciales. Sólo dice que no venderá esos bitcoin, que es una cantidad significativa (200000 BTC o 17.6 billions USD) pero no particularmente grande. Lo que sí me parece importante es que el estado más poderoso del mundo, establece a bitcoin como una forma de oro digital, lo suma a sus reservas y lo valida mundialmente.
¿Qué implicancias podría tener esto?
A mediano plazo, que van hacer los bancos centrales de los demás paises? Hasta ahora, me consta que los fondos soberanos de Suiza y Noruega, compraron bitcoin para su cartera de tenencias. El Salvador compra bitcoin de manera ad-hoc y ahora tiene una controversia con el FMI, que no quiere que lo haga. Y el reino de Butham mina bitcoin con excedentes de energía hidroeléctrica y lo incorpora también a sus reservas. Pero ahora que lo hace USA, ¿Qué pasará con la adopción de los demás paises? ¿Que harán Japón, Europa y los BRICS, con los bitcoins incautados? Esto puede implicar el comienzo de la adopción de bitcoin por parte de los estados Nación. Puede marcar el comienzo de la disputa real entre bitcoin y oro como reservas de valor.
-
@ 7d33ba57:1b82db35
2025-03-10 19:32:10Gran Canaria’s Best Urban Beach
Playa de Las Canteras is the crown jewel of Las Palmas de Gran Canaria, stretching over 3 kilometers along the city’s coastline. Known for its golden sand, crystal-clear waters, and lively promenade, it’s often considered one of the best urban beaches in Europe. Whether you want to swim, surf, snorkel, or simply relax, Las Canteras has something for everyone.
🌊 Beach Zones & Activities
1️⃣ Northern End – Calm Waters & Snorkeling
The northern section of the beach is protected by "La Barra", a natural volcanic reef that breaks the waves, creating a calm, lagoon-like area. This makes it ideal for swimming, snorkeling, and paddleboarding.
✅ Best for: Families, snorkelers, and sunbathers
✅ Marine Life: Tropical fish, crabs, and small rays
✅ Rentals Available: Snorkeling gear, kayaks, and paddleboards2️⃣ Central Area – Best for Relaxing & Walking
The middle stretch of Las Canteras is perfect for lounging on the sand or taking a leisurely walk along the Paseo de Las Canteras, the beachfront promenade lined with restaurants, bars, and shops.
✅ Best for: Beachgoers looking to relax
✅ Beach services: Sun loungers and umbrellas available
✅ Food & Drink: Plenty of beachside cafés and seafood restaurants
3️⃣ Southern End (La Cícer) – Surfing & Local Vibes
At the southernmost part of Las Canteras is La Cícer, the island’s main surfing spot. Here, you’ll find consistent waves and a more laid-back, local atmosphere.
✅ Best for: Surfers and adventure seekers
✅ Surf Schools: Perfect for beginners
✅ Younger crowd & street art vibe🌅 Sunset at Playa de Las Canteras
Las Canteras is famous for its breathtaking sunsets, especially near La Puntilla, where the golden hues reflect over the Atlantic. The promenade comes alive in the evening with street musicians, performers, and lively terraces.
🏝 Why Playa de Las Canteras is a Must-Visit
Playa de Las Canteras is more than just a beach—it’s a way of life in Las Palmas. Whether you’re swimming in turquoise waters, sipping coffee on the promenade, surfing at La Cícer, or watching the sunset, this beach perfectly blends relaxation and local culture.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 401014b3:59d5476b
2025-03-10 19:29:13Alright, football fanatics, it’s March 2025, and we’re charging into the AFC South like it’s a BBQ cookoff with a side of bourbon. Free agency’s a hot mess, the draft’s a coin flip, and this division’s always a blender of breakout stars and breakdowns. The Texans owned 2024, the Colts stayed feisty, the Titans showed grit, and the Jags… well, they Jagged. Let’s toss some records on this rodeo and see who’s got the grit to claim the South. Here we go, fam—fire up the grill.
Houston Texans: 11-6 – Stroud’s Still the Stud
The Texans ran the AFC South in 2024, and hopefully 2025 will be C.J. Stroud’s coronation. The kid’s slinging it to Nico Collins and Tank Dell like it’s nothing, while Joe Mixon keeps the run game thumping. That defense—Will Anderson Jr., Derek Stingley Jr.—is a buzzsaw when it’s on, but free agency’s a wild card. Dameron Pierce might chase a bag, and the O-line needs depth. Still, 11-6’s the call, division champs. Houston’s got that swagger—good luck knocking ‘em off.
Indianapolis Colts: 9-8 – Richardson’s Redemption Arc
The Colts hung tough in 2024, and 2025’s Anthony Richardson’s big shot. He’s got Jonathan Taylor bulldozing defenses, Michael Pittman Jr. hauling in bombs, and Josh Downs stretching the field. The defense—Kwity Paye, DeForest Buckner—brings heat, but free agency could bite. Julian Blackmon might bolt, and the secondary’s shaky. 9-8’s the vibe, maybe a wildcard if Richardson cuts the turnovers. Indy’s scrappy—they’re nipping at Houston’s heels.
Tennessee Titans: 7-10 – Levis’ Learning Curve
The Titans showed some spine in 2024, and 2025’s Will Levis’ proving ground. He’s throwing to Calvin Ridley and Tyler Boyd, with Tony Pollard keeping the run game honest. The defense—Jeffery Simmons is nasty when he clicks, but Harold Landry looks headed to the Patriots. L’Jarius Sneed should stay, but depth’s thin. 7-10’s where they land—not great, not awful. Tennessee’s building, but it’s not playoff time yet.
Jacksonville Jaguars: 5-12 – Trevor’s Tough Luck
The Jags were a mess in 2024, and 2025’s not much sunnier. Trevor Lawrence has Brian Thomas Jr. downfield, but they need to replace Evan Engram. The run game’s blah without Travis Etienne firing on all cylinders. The defense—Josh Hines-Allen, Travon Walker—has juice, but the O-line’s a sieve, and free agency might swipe Foye Oluokun. 5-12’s the harsh truth—too much chaos, not enough wins. Liam Cohen’s dreaming of better days.
The Final Hoedown
The AFC South in 2025 is a Houston hootenanny with a Colt kicker. The Texans (11-6) take the crown because Stroud’s a baller, the Colts (9-8) tease a wildcard, the Titans (7-10) scrap it out, and the Jags (5-12) flounder. Free agency’s the twist—lose a star, you’re toast; keep ‘em, you’re smoking. Hit me on Nostr when I muff this, but this is my AFC South gospel. Let’s roll, degenerates.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 7d33ba57:1b82db35
2025-03-10 19:15:01A Guide to Gran Canaria’s Wild Side
Tamadaba Natural Park, one of Gran Canaria’s most pristine and untouched natural areas, offers breathtaking hiking trails through ancient Canarian pine forests, dramatic cliffs, deep ravines, and stunning coastal views. Located in the northwest of the island.
🥾 Best Hiking Trails in Tamadaba Natural Park
1️⃣ Agaete to Tamadaba Summit Trail
- Distance: ~12 km round trip
- Duration: ~5-6 hours
- Difficulty: Moderate to challenging
- Elevation Gain: ~1,200m
- Start: Agaete or San Pedro
- Highlights:
✅ Ascend from the lush Valle de Agaete into dense pine forests
✅ Spectacular views over the Agaete Valley and the Atlantic Ocean
✅ Lookout points such as Mirador Llanos de la Mimbre
✅ One of the best hikes for a full mountain-to-sea experience
2️⃣ Tamadaba Forest & Risco Faneque Trail (Best for Views)
- Distance: ~8 km round trip
- Duration: ~4 hours
- Difficulty: Moderate
- Elevation Gain: ~500m
- Start: Llanos de la Mimbre parking area
- Highlights:
✅ One of the highest coastal cliffs in Europe (1,027m high!)
✅ Stunning panoramic views of the Atlantic, Agaete, and Tenerife
✅ Well-marked trail through the Canarian pine forest
✅ A shorter but rewarding option for amazing landscapes
3️⃣ Guayedra Loop – Mountains to the Beach (Best for Variety)
- Distance: ~12 km loop
- Duration: ~4-5 hours
- Difficulty: Moderate to challenging
- Elevation Gain: ~800m
- Start: San Pedro or Agaete
- Highlights:
✅ Mix of forest, ravines, and coastal trails
✅ Stunning views from Tamadaba’s cliffs
✅ Descend to Guayedra Beach, a remote black-sand beach
✅ Coastal return trail with breathtaking ocean views
4️⃣ Circular Route: Tamadaba Pine Forest & Viewpoints (Best for Nature Lovers)
- Distance: ~10 km loop
- Duration: ~4-5 hours
- Difficulty: Moderate
- Elevation Gain: ~600m
- Start: Llanos de la Mimbre parking area
- Highlights:
✅ Deep forest immersion—perfect for a peaceful hike
✅ Explore ancient Canarian pines and native plants
✅ Multiple miradors (viewpoints) overlooking the coastline
✅ Good for hikers looking for a quiet, nature-focused trail
🌤 Essential Hiking Tips for Tamadaba
✅ Bring Plenty of Water & Snacks – No shops or water sources on the trails.
✅ Wear Sturdy Shoes – Some sections are rocky and uneven.
✅ Check the Weather – The mountains can be cool, windy, or misty, even if it’s hot at the coast.
✅ Navigation – Trails are generally marked, but offline maps (e.g., Maps.me or AllTrails) are useful.
✅ Respect Nature – Tamadaba is a protected area, so leave no trace.
🚗 Getting to Tamadaba Natural Park
- By Car:
- From Las Palmas: ~1.5-hour drive via GC-2 and GC-200.
- From Agaete: ~30-minute drive to Llanos de la Mimbre trailhead.
- By Bus:
- Take Global Bus 103 from Las Palmas to Agaete.
- Then taxi or hike up to the trailhead.
Why Hike in Tamadaba?
🌿 One of the most unspoiled areas in Gran Canaria
🏔 Diverse landscapes: mountains, forests, and coastal cliffs
👣 Well-marked trails for all hiking levels
🌊 Breathtaking views over the Atlantic and neighboring islands -
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 126a29e8:d1341981
2025-03-10 19:13:30Si quieres saber más sobre Nostr antes de continuar, te recomendamos este enlace donde encontrarás información más detallada: https://njump.me/
Nstart
Prácticamente cualquier cliente o aplicación Nostr permite crear una identidad o cuenta. Pero para este tutorial vamos a usar Nstart ya que ofrece información que ayuda a entender qué es Nostr y en qué se diferencia respecto a redes sociales convencionales.
Además añade algunos pasos importantes para mantener nuestras claves seguras.Recomendamos leer el texto que se muestra en cada pantalla de la guía.
Pronto estará disponible en español pero mientras tanto puedes tirar de traductor si el inglés no es tu fuerte.1. Welcome to Nostr
Para empezar nos dirigimos a start.njump.me desde cualquier navegador en escritorio o móvil y veremos esta pantalla de bienvenida. Haz clic en Let’s Start → https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/653d521476fa34785cf19fe098b131b7b2a0b1bdaf1fd28e65d7cf31a757b3d8.webp
2. Nombre o Alias
Elige un nombre o alias (que podrás cambiar en cualquier momento).
El resto de campos son opcionales y también puedes rellenarlos/editarlos en cualquier otro momento.
Haz clic en Continue →3. Your keys are ready
https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/e7ee67962749b37d94b139f928afad02c2436e8ee8ea886c4f7f9f0bfa28c8d9.webp ¡Ya tienes tu par de claves! 🙌
a. La npub es la clave pública que puedes compartir con quien quieras.
b. Clic en Save my nsec para descargar tu clave privada. Guárdala en un sitio seguro, por ejemplo un gestor de contraseñas.
c. Selecciona la casilla “I saved the file …” y haz clic en Continue →4. Email backup
Opcionalmente puedes enviarte una copia cifrada de tu clave privada por email. Rellena la casilla con tu mail y añade una contraseña fuerte.
Apunta la contraseña o añádela a tu gestor de contraseñas para no perderla.
En caso de no recibir el mail revisa tu bandeja de correo no deseado o Spam5. Multi Signer Bunker
Ahora tienes la posibilidad de dividir tu nsec en 3 usando una técnica llamada FROST. Clic en Activate the bunker → Esto te dará un código búnker que puedes usar para iniciar sesión en muchas aplicaciones web, móviles y de escritorio sin exponer tu nsec.
De hecho, algunos clientes solo permiten iniciar sesión mediante código búnker por lo que te recomendamos realizar este paso.
Igualmente puedes generar un código búnker para cada cliente con una app llamada Amber, de la que te hablamos más delante.
Si alguna vez pierdes tu código búnker siempre puedes usar tu nsec para crear uno nuevo e invalidar el antiguo.
Clic en Save my bunker (guárdalo en un lugar seguro) y después en Continue →6. Follow someone
Opcionalmente puedes seguir a los usuarios propuestos. Clic en Finish →
¡Todo listo para explorar Nostr! 🙌
Inicia sesión en algún cliente
Vamos a iniciar sesión con nuestra recien creada identidad en un par de clientes (nombre que reciben las “aplicaciones” en Nostr).
Hemos escogido estos 2 como ejemplo y porque nos gustan mucho pero dale un vistazo a NostrApps para ver una selección más amplia:
Escritorio
Para escritorio hemos escogido Chachi, el cliente para chats grupales y comunidades de nuestro compañero nostr:npub107jk7htfv243u0x5ynn43scq9wrxtaasmrwwa8lfu2ydwag6cx2quqncxg → https://chachi.chat/ https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/79f589150376f4bb4a142cecf369657ccba29150cee76b336d9358a2f4607b5b.webp Haz clic en Get started https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/2a6654386ae4e1773a7b3aa5b0e8f6fe8eeaa728f048bf975fe1e6ca38ce2881.webp Si usas extensión de navegador como Alby, nos2x o nos2x-Fox clica en Browser extension De lo contrario, localiza el archivo Nostr bunker que guardaste en el paso 5 de la guía Nstart y pégalo en el campo Remote signer
¡Listo! Ahora clica en Search groups para buscar grupos y comunidades a las que te quieras unir. Por ejemplo, tu comunidad amiga: Málaga 2140 ⚡ https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/eae881ac1b88232aa0b078e66d5dea75b0c142db7c4dd7decdbfbccb0637b7fe.webp
Comunidades recomendadas
Te recomendamos unirte a estas comunidades en Chachi para aprender y probar todas las funcionalidades que se vayan implementando:
Si conoces otras comunidades a tener en cuenta, dínoslo en un comentario 🙏
Móvil
Como cliente móvil hemos escogido Amethyst por ser de los más top en cuanto a diseño, tipos de eventos que muestra y mantenimiento. → https://www.amethyst.social/ ← Solo está disponible para Android por lo que si usas iOS te recomendamos Primal o Damus.
Además instalaremos Amber, que nos permitirá mantener nuestra clave privada protegida en una única aplicación diseñada específicamente para ello. → https://github.com/greenart7c3/Amber ←
Las claves privadas deben estar expuestas al menor número de sistemas posible, ya que cada sistema aumenta la superficie de ataque
Es decir que podremos “iniciar sesión” en todas las aplicaciones que queramos sin necesidad de introducir en cada una de ellas nuestra clave privada ya que Amber mostrará un aviso para autorizar cada vez.
Amber
- La primera vez que lo abras te da la posibilidad de usar una clave privada que ya tengas o crear una nueva identidad Nostr. Como ya hemos creado nuestra identidad con Nstart, copiaremos la nsec que guardamos en el paso 3.b y la pegaremos en Amber tras hacer clic en Use your private key. https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/e489939b853d6e3853f10692290b8ab66ca49f5dc1928846e16ddecc3f46250e.webp
- A continuación te permite elegir entre aprobar eventos automáticamente (minimizando el número de interrupciones mientras interactúas en Nostr) o revisar todo y aprobar manualmente, dándote mayor control sobre cada app. https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/c55cbcbb1e6f9d706f2ce6dbf4cf593df17a5e0004dca915bb4427dfc6bdbf92.webp
- Tras clicar en Finish saltará un pop-up que te preguntará si permites que Amber te envíe notificaciones. Dale a permitir para que te notifique cada vez que necesite permiso para firmar con tu clave privada algún evento. https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/3744fb66f89833636743db0edb4cfe3316bf2d91c465af745289221ae65fc795.webp Eso es todo. A partir de ahora Amber se ejecutará en segundo plano y solicitará permisos cuando uses cualquier cliente Nostr.
Amethyst
- Abre Amethyst, selecciona la casilla “I accept the terms of use” y clica en Login with Amber https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/90fc2684a6cd1e85381aa1f4c4c2c0d7fef0b296ddb35a5c830992d6305dc465.webp
- Amber solicitará permiso para que Amethyst lea tu clave pública y firme eventos en tu nombre. Escoge si prefieres darle permiso para acciones básicas; si quieres aprobar manualmente cada permiso o si permites que firme automáticamente todas las peticiones. https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/a5539da297e8595fd5c3cb3d3d37a7dede6a16e00adf921a5f93644961a86a92.webp ¡Ya está! 🎉 Después de clicar en Grant Permissions verás tu timeline algo vacío. A continuación te recomendamos algunos usuarios activos en Nostr por si quieres seguirles.
A quién seguir
Pega estas claves públicas en la barra Search o busca usuarios por su alias.
nostr:npub1zf4zn6qcrstx8tnprn3g2avtpz68tnupkd35m53hhq35e5f5rxqskppwpd
nostr:npub107jk7htfv243u0x5ynn43scq9wrxtaasmrwwa8lfu2ydwag6cx2quqncxg
nostr:npub1yn3hc8jmpj963h0zw49ullrrkkefn7qxf78mj29u7v2mn3yktuasx3mzt0
nostr:npub1gzuushllat7pet0ccv9yuhygvc8ldeyhrgxuwg744dn5khnpk3gs3ea5ds
nostr:npub1vxz5ja46rffch8076xcalx6zu4mqy7gwjd2vtxy3heanwy7mvd7qqq78px
nostr:npub1a2cww4kn9wqte4ry70vyfwqyqvpswksna27rtxd8vty6c74era8sdcw83a
nostr:npub149p5act9a5qm9p47elp8w8h3wpwn2d7s2xecw2ygnrxqp4wgsklq9g722q
nostr:npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg
nostr:npub17u5dneh8qjp43ecfxr6u5e9sjamsmxyuekrg2nlxrrk6nj9rsyrqywt4tp
nostr:npub1dergggklka99wwrs92yz8wdjs952h2ux2ha2ed598ngwu9w7a6fsh9xzpc
Si te ha parecido útil, comparte con quien creas que puede interesarle ¡Gracias!
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ d68401a8:11aad383
2025-03-10 17:52:27In order to acquire Handshake names, you first need to purchase Handshake coins. The true value of the Handshake network is in the names, but coins are necessary since they act as a utility token. As with Bitcoin, mining blocks rewards HNS coins, and these monetary rewards incentivize miners to enforce network security.
There are a few general exchanges where you can get HNS coins (Gate.io, MEXC, CoinEx). But if you don't want to deal with general exchanges, and as long as you have Bitcoin, you can use two specific exchanges:
- namebase.io
- https://🤝 (only accessible with a Handshake resolver, such as Fingertip)
Both work great, and if you don't already have an account with any of the previously mentioned general exchanges, I would definitely recommend using one of these two to get HNS coins, or even both.
1. Getting HNS coins on Namebase
Namebase is the most well-known Handshake registrar, where you can bid on, buy, sell, and manage Handshake domains effortlessly. Besides that, you can also deposit Bitcoin and exchange it for HNS coins easily. It is probably the easiest way.
You can use the "Buy" option from the "Buy/Sell HNS" menu. This option allows you to:
- Set a specific amount of Bitcoin to send, which will be converted into an approximate amount of HNS coins.
- Add your Bitcoin address in case a refund is needed.
- Proceed with the payment to the displayed address.
You can also use "Namebase Pro", found in the same drop-down menu. Simply click the "Deposit" button, select "BTC", and send the desired amount of Bitcoin to the displayed address. Once it arrives, you can exchange it in the trading terminal whenever you want.
The advantage of this option is that Bitcoin is not instantly traded into HNS; instead, you receive Bitcoin and can exchange it for HNS whenever you like, or resend the Bitcoin back to your address.
2. Getting HNS coins on 🤝
The 🤝 platform is a trading site developed by the same creator of ShakeStation.io (a great alternative to Namebase that you should also try). Getting Handshake with this option takes a bit more steps than Namebase, but it offers greater privacy if that’s important to you. Also, keep in mind that it is only accessible if you have a Handshake resolver.
Once you have created your account, go to the "Listings" section on the site. There are a few trading pairs and combinations, but for our case, we need to select "Handshake" under "Offering" since that's what we want to get, and "Bitcoin" under "Accepting" since that's what we are giving. You will see several offers and the amount of BTC you need to send.
Go to the "Account" menu, then "Deposit," and send the desired amount of BTC to the displayed address.
Once your Bitcoin is already in your account, you just need to purchase the desired listing:
After receiving the HNS coins, you now can send your HNS coins to your wallet of choice to store them or use them (buying domains, renewing...).
Before withdrawing from 🤝, you will need to set up the two-factor option. Click the "setup" button, and enter any password in the field. Then, to withdraw, you will need to enter the password you wrote. There is an standard fee of $1 for withdrawals.
A few more things about 🤝:
- Create Listings: In the previous example, we purchased an already existing listing, but you can create your own. The advantage is that you decide the price ratio; the disadvantage is that you have to wait until someone buys it. Meanwhile, buying a listing is more straightforward.
- You can't purchase listings partially: Keep in mind that you must buy a full listing. For example, if someone is offering 10,000 HNS in exchange for Bitcoin, you cannot buy just 5,000—you have to buy the full 10,000 HNS listing.
- Public or Private Listings: If you want your offer to be public, it must appear without the lock symbol. If you see a lock symbol, it means the listing is private. You need to edit the listing, leave the password field blank, and save. Once this is done, your listing will be publicly available.
And that’s it! 🎉
Whatever path you have chosen, once you have acquired HNS coins, you are now ready to buy HNS names and use them to be part of a self-sovereign DNS root zone.
_________________
Final notes about acquiring domains:
There are essentially 3 options to acquire names: one fully self-custodial (Bob Wallet) and two custodial (Namebase.io and Shakestation.io).
The two custodial options are great since make things easier, but I believe users must be also encouraged to try Bob Wallet, which is a fully functional Handshake wallet where beside storing coins and names, you can also bid on Handshake domains directly on-chain. Here's a great tutorial on how to do it: https://skyinclude.com/bobwallet
_________________
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ d68401a8:11aad383
2025-03-10 17:22:14What do you need?
- A Handshake top-level domain
- Bob wallet (with at least 10 HNS)
- Varo account
- GitHub account
1. Own a Handshake domain
First, you need to have a domain stored in your personal wallet (Bob Wallet).
We don’t cover how to obtain a domain name, but it’s not difficult. You can bid for domains using Bob Wallet, which is a self-custodial method that allows you to interact directly with the blockchain. Alternatively, you can use a custodial service like Namebase.io or ShakeStation.io. If you opt for a custodial service, both platforms work well and significantly simplify the process. However, keep in mind that you will need to transfer your domain to your Bob Wallet. This transfer typically takes about a day, so be patient.
2. Create A Varo Account
Varo is a service that allows you to connect your self-custodied domain to a DNS nameserver, enabling you to manage your domain records without losing custody of your name. At any time, you can use your Bob Wallet to delete all records associating your domain with Varo, effectively breaking the connection. Varo is developed by eskimo.software. You can access Varo in both the ICANN and HNS root zones:
3. Connect your domain with Varo
Once your domain is in your Bob wallet, you need to connect it to Varo. Go to your Varo account > Add site > type the domain you own, and press the "+" button.
Your domain should appear under "External Domains". Next, go to "Manage", where you’ll find two subsections named "Nameservers" and "DNSSEC". These are the records you need to add to your domain in Bob Wallet to connect it with Varo.
In Bob Wallet go to "Domain Manager", press on your domain, a new screen will open. In the "Records" section, add the records provided by Varo:
- Add 2 NS records, with the value of ns1.varo. and ns2.varo.
- Add 1 DS record, with whatever string of value you have in your Varo account
Once done you need to "Submit" the changes. It will take approximately 10 minutes to update (the time it takes for each block to be created on the Handshake network). After 10–20 minutes, you should be able to see the new records on any HNS explorer, such as Niami.io.
To test if the connection is proper, you can add a "redirect" record on Varo. A redirect record is a type of DNS record used to redirect a domain or subdomain to another URL. In this example, I will redirect the domain "nostr.belikebill", to my Primal nostr address "https://primal.net/galetaire".
- Type: REDIRECT
- Name: nostr.yourdomain
- Content: the URL of destination
Once completed, it will take about 6 hours for the changes to go live. Yes, it might seem like a long time, but domains are not like money—you’re not meant to move them around constantly. If your new address, "nostr.yourdomain" or "http://nostr.yourdomain.hns.to", redirects to your desired URL, your domain and Varo are successfully connected.
4. Create a GitHub account
Create or go to your GitHub account, create a "New repository", put the name of your choice, and "create".
4.1 Create an index file
At your new repository, click on the "Add file" > "Create new file" button.
Name the file "index.html" and type some HTML content into the editor. Like:
<h1>Hi, It's me!</h1>
Commit changes.
4.2 Repository Settings
Click on the "Settings" tab and scroll down to the GitHub "Pages" section. Select the main branch source "/root" and click on the "Save" button.
After 5 minutes, you can refresh the Pages section, and at the top, you will see an information message indicating that your site is live at a URL similar to this: https://youraccount.github.io/yourrepository, visit the site. At this point, your website is online.
In the "Pages" section, go to "Custom Domain" and add your desired domain. Note that it must be a second-level domain (e.g.,
something.yourdomain
). GitHub will not recognize a pure top-level domain:- hi.yourdomain, for example.
Because it’s not an ICANN domain, GitHub will tell you it doesn’t work, but it actually does. Even though it will always show as "DNS Check in Progress," your site will be online. It will take around 30 minutes for the site to go live.
5. Set up your domain as the address for your site
Finally, you need to connect Varo with GitHub. Go to you Varo account > "Manage" for your domain, and add an "A" record:
- Type: A
- Name: hi.yourdomain
- Content: 185.199.111.153 (this is the IP address of GitHub)
As for the "Redirect" record, the update will take 6 hours to go live. But after that time, your site will be online at your domain address:
- http://hi.yourdomain/
- http://hi.yourdomain.hns.to (hns.to is a bridge to see HNS addresses trough ICANN addresses).
Congrats! The next step is to personalize your website (at this point only the "index.html"), you can ask some AI to create you one, copy paste, and done!
You can see mine at http://hi.galetaire, any doubt hit the comment section :D.
-
@ 2e8970de:63345c7a
2025-03-10 16:26:31originally posted at https://stacker.news/items/909307
-
@ 4870d550:110d6208
2025-03-10 16:24:25As many of you may know, The Progressive Bitcoiner has transitioned to a 501c3 nonprofit in the United States, based in Boston Massachusetts. We were always mission driven as a podcast, and I decided to take that mission, as well as my own passion as a progressive and my experience working in nonprofits for the past decade, and translate it into nonprofit.
Our mission is to increase Bitcoin awareness and adoption among progressives through education and funding progressive causes. I believe our mission is more important than ever, and today I’m asking for your help and partnership!
From our humble beginnings years ago as just a podcast, we were dedicated to amplifying progressive voices and bitcoin education tailored to a progressive audience because that was desperately lacking in the bitcoin media and education space. Additionally, a lot of left leaning media, politicians, and everyday people were believing and perpetuating myths about bitcoin being bad for the environment, being a right wing/libertarian project, only used for crime and terrorism, etc. While the narrative has improved some, I think all of us would agree we still have a long way to go.
Also take into consideration the recent election of Donald Trump as President of the United States, his support of bitcoin and bitcoin friendly policies, and how that may create a backlash and perpetuate false narratives left leaning folks and media believe and push against bitcoin. In one regard it’s silly to dismiss, or actively fight against, a neutral and open technology like bitcoin (with incredible benefits for people globally as a store of value, media of exchange, and beyond) just because you don’t like someone who uses it or promotes it. On the other hand, it is a real thing happening right now in left circles and mainstream media (just look at Rachel Maddow’s recent comments on the U.S. Strategic Bitcoin reserve).
This is why I think our mission and cause is more important than ever before, and why I’m asking for your help and partnership. Whether you consider yourself a progressive or left leaning person or not, our goal is to build a more diverse and robust constituency that understands bitcoin and will advocate for bitcoin rights in the U.S. that includes preserving privacy and freedom tech tools, bitcoin self-custody, and in general the ability for all americans to freely use and benefit from bitcoin. While many inroads have been made in bipartisan ways and support of bitcoin, we still have a long way to go and many of the most outspoken advocates of bitcoin continue to be right leaning individuals and politicians, while many of the most outspoken critics come from the left.
As Lyn Alden once said to me on our podcast, it’s critical to also support and protect your left flank as much as your right, which creates a stronger and more robust defense of whatever you're fighting for. For us, the fight for financial freedom and human rights is critical, and bitcoin is an integral part of this fight. We will work hard to fight any potential backlash from the left against bitcoin as they attach narratives to Bitcoin associating it with Trump (particularly as we watch elections in 2026 and 2028).
The way we combate this and grow bipartisan support for bitcoin is through media, our publications, traveling to and appearing on mainstream media, meeting with progressive lawmakers, staffers, and activists, to discuss Bitcoin in a way that resonates with progressives. Do we want just under half the country to think Bitcoin isn't for them, or have them believe mainstream media narratives about Bitcoin as a MAGA only movement? Of course we know that’s a crazy assertion, but many are perpetuating this narrative.
Through our own efforts, and partnerships with other bitcoin education and advocacy orgs in the space, we will build a more robust, and bipartisan coalition of bitcoin support in the United States. The only way we can do this is with your support and donation to help us increase our media and publication presence, fund progressive causes through our grant giving program, and increasing staff capacity at our organization to hit the ground running whether it’s in Boston, DC, LA and beyond.
Whether you are a progressive individual that agrees wholeheartedly with our cause and identifies with our content and work, or even if you’re a conservative who voted for Trump, but want to see more bipartisan support of Bitcoin and less unsubstantiated attacks against Bitcoin from left media and politicians, we ask for your support today. We don’t want to waste a moment on amplifying our message and getting to work building this support and educating the left on Bitcoin.
Consider donating today in Bitcoin or fiat https://progressivebitcoiner.org/donate/. If you are a Bitcoin business in the space also wanting to increase bipartisan support of Bitcoin by bringing in more progressives to the cause, we welcome and encourage your support either through media partnership via our podcast and publication, or by donation. Your donation is tax-deductible.
Thank you for your support and partnership. Remember, Bitcoin is for everyone! And we’re doing our part to ensure that progressives understand this. This is only the beginning!
Trey Walsh Executive Director, The Progressive Bitcoiner, Inc.
-
@ 6bae33c8:607272e8
2025-03-10 16:21:56This draft took place last night (March 9). Once again I drew the 12 slot.
Here are the results:
Link to livestream. Link to BCL1.
1.12 Mookie Betts — I was hoping for Kyle Tucker or Corbin Carroll, but knew realistically that wasn’t likely to happen. So it was either a repeat of BCL1, wherein I went Julio Rodriguez and Jackson Chourio or mixing it up with Betts, who’s a better bet for runs and average at the cost of steals.
2.1 Jackson Chourio — I think 20-30 is his healthy floor, and there’s a chance he hits .300. Plus I like the home ballpark.
3.12 Austin Riley — He was going at the 1-2 turn last year, and nothing’s changed except that he got hurt after a slow start, but he’s healthy now. I also find third base to be scarce, and Riley gives you some batting average from the position too.
4.1 Chris Sale — I talked myself into Sale earlier in the day as he’d be going at the 1-2 turn like Paul Skenes and Tarik Skubal based on last year’s numbers. The market must assume he’s a higher injury risk, but that’s not necessarily the case given how hard Skubal and Skenes throw.
5.12 Raisel Iglesias — I love old warhorse closers on good teams. They’re not reliant on dominant stuff, and they know how to survive.
6.1 Yainer Diaz — I always hate rounds 5 and 6 — never see any value there, so sometimes I punt and take the premium catcher. Diaz gives you pop and major average from the position — remember the baseline for catcher batting average is much lower than that of the other positions.
7.12 Max Fried — I got him in BCL1 too, in the same spot. Just a solid pitcher who should get run support in a favorable stadium for lefties.
8.1 Cody Bellinger — First base is scarce, and I like Bellinger’s left-handed bat in Yankee Stadium. Plus he’s a sneaky source of stolen bases as first base-eligible players rarely run.
9.12 Hunter Brown — I missed out on Spencer Strider by a few picks, so I settled for Brown who dominated for two thirds of the year after a bad start.
10.1 Jake Burger — This was a tough call, but I wanted to fill up at corner while I had the chance, and Burger’s had two straight years of solid pop without killing your batting average, despite playing in Miami. I thought about Alex Bregman and even Marcus Semien, who somehow was still available.
11.12 J.T. Realmuto — My queue really emptied ahead of this turn — Sandy Alcantara, Bo Bichette, Shane McClanahan and Josh Lowe — but I was cool with JTR for a bounce-back year. He’s 34, but I expect him to run more now that he’s nine months removed from meniscus surgery and claims he feels as good as ever.
12.1 Sonny Gray — I preferred Alcantara or McClanahan, but Gray is an old warhorse who knows how to pitch and plays in a good park.
13.12 Kevin Gausman — I was thrilled to land him here. He had shoulder trouble last year, but he touched 96.2 in a spring training outing and appears healthy. Prior to last season, he was routinely an early round ace.
14.1 Kenley Jansen — Another old warhorse closer, who I also drafted in BCL1.
15.12 Zach Neto — I think Neto’s mispriced. He went 23-30 last year at age 23, and he’s expected back in April. Maybe I’m being cavalier about his return from shoulder surgery, but he’s already doing throwing drills and hasn’t had a setback.
16.1 Jordan Romano — I went for a third closer because the price was right. Chances are at least one of the other two misses time or loses the job at some point, so it’s nice to have a surplus of saves. Also, three closers are a nice luxury when your marginal starters have tough matchups.
17.12 Jackson Holliday — I needed a second baseman, and he is one. Seriously though, this is the time to swing for the fences on one of the league’s top prospects.
18.1 Brandon Nimmo — Maybe I should have taken Cedric Mullins instead because Nimmo’s banged up, but I needed an OF, and I got a bit stuck with the clock. Nimmo’s batting average should rebound, and he’s a great source of runs given his strong OBP.
19.12 TJ Friedl — Apparently, he’s leading off, and I needed the steals. I was short on OF through 17 rounds, so I decided to attack it with volume.
20.1 Nolan Jones — My second share of Jones, just too obvious given his 2023 season and home ballpark.
21.12 Jonathan India — He gets a ballpark downgrade, but he’ll run a little, and gives me needed MI depth.
22.1 Nick Lodolo — I drafted a lot of starters in the early-middle rounds, but I was still a bit thin. Lodolo’s a pedigreed young pitcher who misses bats.
23.12 Alec Burleson — I needed more outfield depth. Burleson provided some pop (21 HR), nine steals and a solid average last year. Maybe he’ll qualify at first base at some point too.
24.1 Roman Anthony — Another top prospect, potentially a good source of steals when he gets called up, hopefully sooner rather than later. Round 24 seems cheap for this kind of upside, but that’s where the market has him.
25.12 Evan Carter — Attacking outfield with volume. Carter was roughly a 10th-round pick last year after his 2023 post-season run. He stole bases in the minors too.
26.1 Dustin May — He’s competing for a rotation spot in LA and has always been very good when healthy.
27.12 Jacob Wilson — A solid prospect who has the shortstop job to himself in a bandbox ballpark. Plus I needed someone to fill in while Neto gets healthy.
28.1 Gerrit Cole — At the time, the results of his tests were not entirely known, so it was worth a shot. It looks like he’ll be the first drop. Prefer wasting a 28th to a 6th.
29.12 Gavin Lux — Former top prospect gets a big park upgrade, could qualify at a few positions before long. Also got him in BCL1.
30.1 Will Warren — Jack Kitchen, who’s running this team for me, asked me to get him in Round 30, so I did. He’s a candidate to replace Cole now.
Roster By Position:
C Yainer Diaz/J.T. Realmuto
1B Cody Bellinger
2B Jackson Holliday
3B Austin Riley
SS Zach Neto
CI Jake Burger
MI Jonathan India
OF Mookie Betts/Jackson Chourio/Brandon Nimmo/T.J. Friedl/Nolan Jones
UT Alec Burleson
SP Chris Sale/Max Fried/Hunter Brown/Sonny Gray/Kevin Gausman/Nick Lodolo
RP Raisel Iglesias/Kenley Jansen/Jordan Romano
B Roman Anthony/Evan Carter/Dustin May/Jacob Wilson/Gerrit Cole/Gavin Lux/Will Warren
-
@ e5de992e:4a95ef85
2025-03-10 16:18:21Many traders and investors fall into a dangerous mindset: thinking the market is "too cheap" and should go up, or "too expensive" and should go down.
This kind of thinking leads to forcing your view onto the market—which is one of the most expensive mistakes you can make. The market doesn’t care about your opinion. It moves based on supply, demand, liquidity, and psychology—not what you think it “should” do.
If you want to succeed in trading, you must learn to read and follow the market, not fight it.
The Market Doesn't Care About "Cheap" or "Expensive"
Let’s break this down:
1. Cheap Stocks Can Get Cheaper
- A stock dropping from $100 to $50 may look cheap.
- But if it’s in a strong downtrend, it can drop to $30, then $10.
- "Cheap" is never a reason to buy—you need confirmation that demand is returning.
2. Expensive Stocks Can Get Even More Expensive
- A stock at all-time highs may seem overpriced.
- But if demand keeps pushing it higher, it can go much further than most expect.
- "Overvalued" stocks can stay overvalued for years while continuing to climb.
📌 Example: Tesla (TSLA)
- In 2019, Tesla looked "overpriced" at $50 (split-adjusted)—many traders shorted it.
- By 2021, it hit $400—a 700%+ increase.
- Those who tried to force their bearish view onto the market lost everything.
The Cost of Fighting the Market
Forcing your bias onto the market is a losing game.
- If you short a stock just because it "looks too expensive," you might get squeezed.
- If you buy a stock just because it "looks too cheap," you might be catching a falling knife.
Instead, you must follow the price action and trade what’s actually happening—not what you think should happen.
How to Read and Follow the Market
1. Price Is the Truth
- The market’s job is to price in all available information—fundamentals, news, expectations, liquidity.
- Your job is to analyze what the market is actually doing, not what you think it should do.
- Uptrends = buyers are in control. Downtrends = sellers are in control.
2. Trend Matters More Than Your Opinion
- Uptrends tend to continue → Look for strong stocks making higher highs.
- Downtrends tend to continue → Avoid trying to catch the bottom.
- Sideways markets are uncertain → Wait for confirmation before acting.
3. Follow Strength, Avoid Weakness
- Strong stocks keep getting stronger—leaders emerge from healthy markets.
- Weak stocks keep getting weaker—avoid stocks in long-term downtrends.
- Always ask: "Is the market rewarding this trend?"
📌 Example: Nvidia (NVDA)
- Many thought NVDA was “too expensive” at $200 in early 2023.
- It kept running past $400, then $500—doubling in value.
- Those who followed the trend profited, while those who fought it got crushed.
Final Thoughts: Adapt or Lose
🚫 The market is never "too cheap" or "too expensive"—it just is.
🚫 Trying to force your view onto the market will cost you.
✅ Your job is to read the market, follow the trend, and adapt.The market rewards discipline, patience, and trend-following—not stubborn opinions.
💡 Action Step: Next time you feel the urge to fade a strong trend or buy a falling knife, ask yourself: "Am I trading my opinion or the actual market?"
Trade what’s happening—not what you wish would happen. 🚀
-
@ da0b9bc3:4e30a4a9
2025-03-10 15:50:05Hello Stackers!
It's Monday so we're back doing "Meta Music Mondays" 😉.
From before the territory existed there was just one post a week in a ~meta take over. Now each month we have a different theme and bring music from that theme.
This month is March and we're doing March Madness. So give me those Wacky and Weird crazy artists and songs. The weirder the better!
Let's have fun.
How about crazy yodel prog?
https://youtu.be/Obdv1jghXAE?si=8e4b7ISJg6pDGGBP
Talk Music. Share Tracks. Zap Sats.
originally posted at https://stacker.news/items/909253
-
@ 0463223a:3b14d673
2025-03-10 13:08:11Whilst starting out documenting coming off prescription drugs and an attempt at self improvement. I now understand that I want to write a weekly blog to clarify my thoughts and provide a means for self introspection and self improvement. It’s pretty narcissistic to be honest but I’m fine with that. I’m trying to be honest in my approach and it is what it is.
Some folks will write about economics, others culture war hot topics or how they stick raw egg up their arse for profit type diet advice. It’s unlikely I’ll approach any of those topics, there’s a lot of noise already and I don’t want to add to the pile.
Each week I will write a page of A4 and hope over time the writing style will improve. It’s coming from an extremely low base so I’m most optimistic about the upside potential!
I’ve been pretty hard on myself in the last week, folks who interact with me here may have noticed, my wife certainly has and it’s true. I’ve been an emotional wreck. For over a decade my brain chemistry was altered by drugs and my brain is not a comfortable place. Staying on the drugs was easy but it’s not the answer.
I notice it’s quite common for folks to say you should never speak ill of yourself here, words have power. On one level I agree, no one should beat themselves unnecessarily but I think it’s just as important to be self aware, understand where you have biases, where you have strengths and weaknesses. If you’re never hard on yourself, how do you improve? Only by facing problems face on is what I’m thinking.
I broke down in tears on a live stream last week, pretty embarrassing. The day before I’d seen footage of a gig I’d done in 2013 (I think), a gig that helped pave the way for some of the cool projects I’ve been involved with over the last decade. It was nothing fancy, just a night in a local pub. What truly broke my heart was seeing my late friend on drums. He committed suicide not long after that gig.
I was on such a high at that time. We had begun working with world class musicians, acts people had actually heard of, not Pop but credible artists. Our own band had just got its first national radio play and we’d been offered a deal to make an album with a reasonable advance. We were doing tonnes of gigs, studio sessions and having fun (at least I thought). Nothing glamorous, long sessions in low budget studios, gigs getting paid fuck all but we were DOING THINGS. We were doing what we’d always wanted to do. Make music.
So with that fresh in my memory I thought I’d try playing a record we’d made together on the stream, absolute car crash. I could barely speak. Music completely kicked my arse that day. After all this time, I’m still not over it.
Him dying like that kicked the shit out of me in ways I can’t begin to describe. I fell into a very deep depression myself after that and I was so fucking angry. I’d say more but I don’t feel comfortable talking about it, knowing whatever pain I feel, it’s nothing compared to the pain his family feel. They are very private people. I respect that.
It was around that time I started being medicated. I came very close to committing suicide myself and was talked out of driving my car off a cliff by the samaritans. Fun right!?
Aside from the music stuff, we were both working for a charity helping kids from tough backgrounds develop life skills through music. The week before his death we’d both lost a lot of hours work due to government cut backs. Cut backs that were put in place as our country was compelled to bail out a bunch of bankers. I’m STILL angry about that, but less so now.
I want to keep anything I earn as far away from the banks as is possible. Seriously, fuck them. Fuck them. Fuck them. Fortunately there is an opt out.
It’s unlikely I’ll say much more on the subject. Sure I could game Nostr by endless posting pictures of Michael Sailor but frankly, no. I have nothing in common with the guy. He gave up music because there was no money in it. Fuck him, his beats would suck anyway, he has no soul haha but hey, he’s enjoying himself and that’s good for h.
I don’t have thousands upon thousands of bitcoin but I have no money in the bank and thousands of Sats. Win!
-
@ a012dc82:6458a70d
2025-03-10 12:52:39The cryptocurrency landscape is witnessing a significant shift as institutional investors, led by giants like BlackRock, are increasingly venturing into Bitcoin, marking a new era in the digital asset's journey. This article delves into the recent acquisition spree where institutional entities have amassed a substantial 3.3% of Bitcoin's total supply, exploring the implications and potential outcomes of this trend. The movement signifies a departure from traditional investment paradigms, as these financial behemoths traditionally steered clear of highly volatile assets like Bitcoin. However, the changing economic landscape, marked by inflation fears and the search for non-correlated assets, has led these institutions to reconsider their stance. The involvement of firms like BlackRock not only brings substantial capital to the Bitcoin market but also signals to other institutional and retail investors that Bitcoin is a viable asset class. This shift is not merely about investment in digital assets but represents a broader acceptance of cryptocurrency as an integral part of the modern financial landscape.
Table of Contents
-
The Rise of Institutional Investment in Bitcoin
-
The 3.3% Supply Phenomenon
-
Implications of Institutional Holdings
-
Challenges and Controversies
-
The Road Ahead
-
Conclusion
-
FAQs
The Rise of Institutional Investment in Bitcoin
In recent years, Bitcoin has transitioned from a speculative investment for individual traders to a legitimate asset class attracting institutional investors. The introduction of Bitcoin exchange-traded funds (ETFs) has been a pivotal moment, providing a regulated and accessible avenue for institutional players to enter the cryptocurrency market. Companies like BlackRock, the world's largest asset manager, have led the charge, signaling a significant endorsement of Bitcoin's long-term value. This trend is reinforced by the growing dissatisfaction with traditional financial systems and the low-yield environment, driving institutions to seek alternative investments. The rise of institutional investment has been facilitated by improved regulatory clarity and the development of more sophisticated cryptocurrency services, including custody and trading solutions tailored for institutional needs. This wave of institutional interest is not just a fad but a reflection of a deeper understanding and acceptance of blockchain technology and its potential to revolutionize financial systems. As more institutions enter the market, we can expect to see a ripple effect, with increased innovation, product offerings, and perhaps even regulatory reforms tailored to accommodate the burgeoning asset class.
The 3.3% Supply Phenomenon
A recent report has shed light on a remarkable development: the combined applicants of 11 spot Bitcoin ETFs now hold approximately 3.3% of the total circulating Bitcoin supply. This group includes heavyweight financial institutions such as Grayscale, Fidelity, and Franklin Templeton, among others. This collective move by institutional investors to secure a sizable portion of Bitcoin's supply underscores their bullish outlook on the cryptocurrency's future. The strategic acquisition of such a significant portion of the supply is not just a vote of confidence in Bitcoin's value proposition; it also reflects a strategic positioning for future financial landscapes where digital assets play a central role. This accumulation can lead to a reduction in market liquidity, which, while potentially increasing volatility in the short term, may also lead to higher prices as demand continues to grow against a limited supply. The actions of these institutions highlight a strategic shift towards diversification and the recognition of Bitcoin as a digital gold, a hedge against inflation, and a new asset class with unique properties.
Implications of Institutional Holdings
The substantial acquisition of Bitcoin by institutional investors has several implications. Firstly, market stability is expected to improve as institutional investors are typically long-term holders, reducing the market's susceptibility to large, speculative price swings. Unlike retail investors, who may be prone to panic selling during market downturns, institutions are more likely to hold their positions through volatility, providing a stabilizing effect on the market. Secondly, the price impact, while not immediately evident, could manifest significantly in the long term. As institutions continue to accumulate Bitcoin, the reduced supply could lead to price increases, especially if retail and other institutional investors continue to enter the market. Thirdly, the legitimacy and adoption of Bitcoin are likely to increase as institutional involvement can be seen as an endorsement of its viability as an investment. However, this shift also brings challenges, such as potential centralization and the risk of large-scale market manipulation. The increased institutional presence in the Bitcoin market is a double-edged sword; while it brings legitimacy and stability, it also introduces new risks and challenges that the cryptocurrency community must navigate.
Challenges and Controversies
Despite the optimistic outlook, the move has not been without its challenges and controversies. The approval of Bitcoin ETFs by regulatory bodies like the SEC has been met with mixed reactions. SEC Chair Gary Gensler's comments highlighted the irony in approving spot Bitcoin ETFs, pointing out the potential for increased centralization and speculation in a market that values decentralization. This decision has sparked a debate within the cryptocurrency community about the future of Bitcoin and whether institutional involvement will dilute its foundational principles. Furthermore, the large-scale acquisition of Bitcoin by institutions could lead to a concentration of wealth and power within the ecosystem, which contradicts the decentralized ethos that Bitcoin was built upon. Additionally, there are concerns about the environmental impact of Bitcoin mining and whether institutional investors will push for more sustainable practices or exacerbate the issue. The entry of institutional investors into the Bitcoin space is a complex development that brings both opportunities and challenges, and its long-term impact remains to be seen.
The Road Ahead
As the market adjusts to the new reality of institutional involvement in Bitcoin, all eyes will be on the impact of these developments on the cryptocurrency's price, supply dynamics, and overall market structure. Additionally, the upcoming Bitcoin halving event in April is set to further influence the market, reducing the rate at which new Bitcoins are created and possibly leading to tighter supply conditions. This event could exacerbate the effects of institutional accumulation, potentially leading to significant price movements. The road ahead for Bitcoin is fraught with uncertainties and possibilities. The increasing institutional interest in Bitcoin is likely to continue shaping the cryptocurrency landscape, influencing everything from regulatory approaches to technological innovations within the space. As we move forward, the key will be balancing the benefits of institutional involvement with the need to preserve the decentralized, open nature of cryptocurrencies.
Conclusion
The acquisition of 3.3% of Bitcoin's supply by institutional investors marks a significant milestone in the cryptocurrency's evolution. As institutions like BlackRock and others bet big on Bitcoin, the landscape of digital assets is set to change dramatically. While challenges remain, the long-term outlook for Bitcoin appears more promising than ever, with institutional investment paving the way for broader acceptance and stability in the cryptocurrency market. However, as the market evolves, it will be crucial to monitor the impacts of this shift, ensuring that Bitcoin remains a tool for financial empowerment and innovation, rather than becoming an instrument of traditional financial systems. The journey of Bitcoin continues to unfold, and the involvement of institutional investors is just the latest chapter in its ongoing story.
FAQs
Why are institutional investors like BlackRock interested in Bitcoin? Institutional investors are turning to Bitcoin as a new asset class to diversify their portfolios, hedge against inflation, and capitalize on the potential for high returns. The growing acceptance of Bitcoin as a legitimate investment, improved regulatory clarity, and the development of institutional-grade trading and custody services have also contributed to this interest.
What does the 3.3% Bitcoin supply acquisition mean? The 3.3% supply acquisition refers to the combined total of Bitcoin currently held by the applicants of 11 spot Bitcoin ETFs. This significant holding indicates a strong belief in the future value of Bitcoin and represents a substantial portion of the total circulating supply, highlighting the growing influence of institutional investors in the cryptocurrency market.
How does institutional investment affect the Bitcoin market? Institutional investment is expected to bring more stability, reduce volatility, and increase market maturity. However, it could also lead to potential centralization and influence market dynamics, such as supply scarcity, which may drive up prices.
What are the challenges and controversies surrounding institutional investment in Bitcoin? Challenges include potential market manipulation, centralization of Bitcoin holdings, and deviation from Bitcoin's original ethos of decentralization. Controversies also arise from environmental concerns related to Bitcoin mining and the potential for increased speculation and volatility.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ d360efec:14907b5f
2025-03-10 12:34:35ภาพรวมสถานการณ์ : https://www.tradingview.com/chart/F8mO3cIx/
Bitcoin (BTC) ประสบกับการร่วงลงอย่างรุนแรง (sharp sell-off) ในวันที่ 10 มีนาคม 2568. การเคลื่อนไหวนี้, โดยเฉพาะอย่างยิ่งที่เห็นได้ชัดใน Timeframe 15 นาที, ได้ทำลายแนวรับสำคัญหลายระดับ และยืนยันถึงแนวโน้มขาลงในระยะสั้นอย่างชัดเจน. แม้ว่า Timeframe Day จะยังไม่ เสีย โครงสร้างขาขึ้นในระยะยาวไปทั้งหมด, แต่ก็แสดงสัญญาณเตือนที่สำคัญหลายประการ, รวมถึงแท่งเทียน Bearish Engulfing, Money Flow ที่เปลี่ยนเป็นลบ, และ Trend Strength ที่อ่อนแอลง. การวิเคราะห์นี้จะพิจารณาทุก Timeframe อย่างละเอียดเพื่อหากลยุทธ์ที่เหมาะสมกับความเสี่ยงที่สูงมากในปัจจุบัน.
การวิเคราะห์ทางเทคนิค (Technical Analysis):
-
Timeframe 15 นาที (15m) - เน้น:
- SMC (Smart Money Concepts): ราคา Breakout แนวรับสำคัญทั้งหมดลงมาอย่างรุนแรง. มีการสร้าง Lower Lows (LL) อย่างต่อเนื่อง. นี่แสดงถึงการควบคุมตลาดของแรงขายอย่างเบ็ดเสร็จ (complete dominance of selling pressure).
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (แนวต้าน): $68,000 (แนวรับเดิมที่ตอนนี้กลายเป็นแนวต้านสำคัญ), $69,000, $70,000.
- Sellside Liquidity (แนวรับ): ไม่มีแนวรับที่แข็งแกร่งในระยะใกล้. อาจมีแนวรับทางจิตวิทยา (psychological support) ที่ $60,000, และต่ำกว่านั้นที่ $58,000, $56,000. การระบุแนวรับที่ชัดเจนในสภาวะนี้เป็นเรื่องยาก.
- Money Flow: เป็นลบอย่างรุนแรง (Strong Outflow). นี่คือการยืนยันที่สำคัญที่สุดอย่างหนึ่งของแรงขาย.
- EMA (Exponential Moving Average): EMA 50 (สีเหลือง) อยู่ต่ำกว่า EMA 200 (สีขาว) อย่างชัดเจน, และระยะห่างระหว่างเส้นทั้งสองกำลังขยายออก. นี่คือสัญญาณ Bearish ที่แข็งแกร่ง.
- Trend Strength: เมฆสีแดงหนาแน่น, และมีสัญญาณ Sell อย่างชัดเจน.
- Chart Pattern: ไม่มีรูปแบบ Chart Pattern ใดๆ ที่บ่งบอกถึงการกลับตัวเป็นขาขึ้น (Bullish).
- สรุป 15m: แนวโน้มขาลงชัดเจนและแข็งแกร่งมาก.
-
Timeframe 4 ชั่วโมง (4H):
- SMC: ราคาอยู่ในช่วงการปรับฐาน (correction). ได้หลุดลงมาต่ำกว่า EMA 50 และกำลังทดสอบ EMA 200.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (แนวต้าน): $68,000 - $69,000.
- Sellside Liquidity (แนวรับ): EMA 200 (ประมาณ $60,000), $58,000 (บริเวณ Demand Zone ก่อนหน้า).
- Money Flow: เป็นลบ (Outflow).
- EMA: EMA 50 (สีเหลือง) ตัด EMA 200 (สีขาว) ลงมาแล้ว (Death Cross). นี่คือสัญญาณ Bearish ในระยะกลาง.
- Trend Strength: เมฆสีแดงบ่งบอกถึงแนวโน้มขาลงระยะกลาง.
- Chart Pattern: ไม่มีรูปแบบการกลับตัวที่เป็น Bullish ที่ชัดเจน.
- สรุป 4H: ยืนยันการปรับฐานในระยะกลาง. แนวโน้มเป็นขาลง.
-
Timeframe Day (Day):
- SMC: ยังไม่ เสียโครงสร้างขาขึ้นหลักในระยะยาว (คือ ยังไม่ได้ทำ Lower Low ที่ต่ำกว่า $59,000 - $60,000). อย่างไรก็ตาม, แท่งเทียนล่าสุดคือ Bearish Engulfing ซึ่งเป็นสัญญาณกลับตัวที่สำคัญ, และความรุนแรงของการร่วงลงบ่งบอกถึงความอ่อนแอที่เพิ่มขึ้น.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (แนวต้าน): $72,000, $75,000 (All-Time High).
- Sellside Liquidity (แนวรับ): $60,000 (แนวรับสำคัญทางจิตวิทยา, Low ก่อนหน้า), $58,000, และ $50,000 - $52,000 (EMA 200 และ Demand Zone).
- Money Flow: เริ่มเปลี่ยนเป็นลบ (Outflow). นี่เป็นการเปลี่ยนแปลงที่สำคัญและเป็นสัญญาณเตือนที่ร้ายแรง.
- EMA: EMA 50 (สีเหลือง) ยังคงอยู่เหนือ EMA 200 (สีขาว), แต่ระยะห่างระหว่างเส้นทั้งสองแคบลง.
- Trend Strength: เมฆสีเขียวเริ่มบางลง, และมีสัญญาณ Neutral (ก่อนหน้านี้), และตอนนี้มีสัญญาณ Sell.
- Chart Pattern: Bearish Engulfing - สัญญาณกลับตัวเป็นขาลงที่แข็งแกร่ง.
- สรุป Day: แนวโน้มระยะยาวยังคงเป็นขาขึ้นทางเทคนิค, แต่มีสัญญาณเตือนที่สำคัญหลายประการ, และมีความเสี่ยงสูงที่จะเปลี่ยนเป็นขาลง.
กลยุทธ์การเทรด (Trading Strategies):
-
Day Trade (15m):
- กลยุทธ์หลัก: Short Selling เท่านั้น. ความเสี่ยงสูงมาก.
- เงื่อนไข: รอการ Rebound (การดีดตัวขึ้นชั่วคราว) ไปยังแนวต้าน (เช่น EMA ใน TF 15m, หรือบริเวณ $68,000). จากนั้น, รอสัญญาณ Bearish ที่ชัดเจน (เช่น Bearish Engulfing, Evening Star, หรือการ Breakout ของ Rebound นั้นลงมา).
- Stop Loss: เหนือ Swing High ล่าสุดของการ Rebound อย่างเคร่งครัด.
- Take Profit: แนวรับทางจิตวิทยา ($60,000), หรือต่ำกว่านั้น ($58,000, $56,000). ไม่ควรถือยาว.
- คำเตือน: ห้ามสวนเทรนด์ (ห้าม Buy) โดยเด็ดขาด. ตลาดมีความผันผวนสูงมาก.
-
Swing Trade (4H):
- กลยุทธ์หลัก: Wait and See (รอดู). ยังไม่มีสัญญาณให้ Buy.
- เงื่อนไข: รอให้ราคาลงไปทดสอบแนวรับสำคัญ (EMA 200 ที่ประมาณ $60,000, หรือ $58,000). จากนั้น, ต้องเห็นสัญญาณการกลับตัวที่เป็น Bullish ที่ชัดเจนและแข็งแกร่ง (เช่น Bullish Engulfing, Hammer, Morning Star, พร้อม Volume สูง) จึงจะพิจารณาเข้า Buy.
- Stop Loss: ต่ำกว่าแนวรับที่เข้าซื้อ.
- Take Profit: แนวต้าน ($68,000 - $69,000), หรือสูงกว่านั้นหากแนวโน้มเปลี่ยน.
- คำเตือน: การเข้าซื้อที่แนวรับโดยไม่มีสัญญาณกลับตัวมีความเสี่ยงสูง.
-
Position Trade (Day):
- กลยุทธ์หลัก: Wait and See (รอดู). ยังเร็วเกินไปที่จะ Buy.
- เงื่อนไข: รอให้ราคาลงไปทดสอบแนวรับที่แข็งแกร่งมาก ($50,000 - $52,000, ซึ่งเป็น EMA 200 และ Demand Zone). จากนั้น, ต้องเห็นสัญญาณการกลับตัวที่เป็น Bullish ที่ชัดเจนมาก จึงจะพิจารณาเข้าซื้อ. หรือ, รอให้โครงสร้างตลาดเปลี่ยนเป็นขาขึ้นอีกครั้ง (สร้าง Higher High).
- Stop Loss: ต่ำกว่าแนวรับที่เข้าซื้อ.
- Take Profit: ขึ้นอยู่กับสัญญาณการกลับตัวและเป้าหมายระยะยาว.
- คำเตือน: การเข้าซื้อตอนนี้มีความเสี่ยงสูงมากที่ราคาจะลงต่อ.
สิ่งที่ต้องระวัง (Important Considerations):
- ความผันผวน (Volatility): ความผันผวนของ BTC สูงมากในช่วงนี้. การเคลื่อนไหวของราคาอาจรุนแรงและรวดเร็ว.
- ข่าว (News): ติดตามข่าวสารและเหตุการณ์ที่อาจส่งผลกระทบต่อตลาดคริปโตเคอร์เรนซี.
- False Breakouts/Dead Cat Bounces: ระวังการดีดตัวขึ้นชั่วคราว (Dead Cat Bounce) ก่อนที่จะร่วงลงต่อ.
- Risk Management: การบริหารความเสี่ยงเป็นสิ่งสำคัญที่สุด. ใช้ Stop Loss เสมอ. อย่า Overtrade (เทรดเกินตัว).
สรุป (Conclusion):
Bitcoin กำลังอยู่ในช่วงการปรับฐานที่รุนแรง. แนวโน้มระยะสั้น (15m) เป็นขาลงอย่างชัดเจน. แนวโน้มระยะกลาง (4H) ยืนยันการปรับฐาน. แนวโน้มระยะยาว (Day) เริ่มอ่อนแอลงและมีสัญญาณเตือนที่สำคัญ. กลยุทธ์ที่ดีที่สุดในตอนนี้คือการ Wait and See สำหรับนักลงทุนระยะกลางและยาว, ส่วน Day Trader ที่รับความเสี่ยงได้สูงมาก อาจพิจารณา Short Sell ตามเงื่อนไขที่เข้มงวด. การ Buy ในตอนนี้มีความเสี่ยงสูงมาก.
Disclaimer: การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว, ไม่ถือเป็นคำแนะนำในการลงทุน. ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ.
-
-
@ d360efec:14907b5f
2025-03-10 12:26:42$OKX: $BTC $USDT.P
https://www.tradingview.com/chart/F8mO3cIx/
Situation Overview:
Bitcoin (BTC) experienced a sharp sell-off on March 10, 2025. This movement, especially evident in the 15-minute timeframe, broke several key support levels and confirms a clear short-term downtrend. While the Daily timeframe has not completely broken its long-term uptrend structure, it shows significant warning signs, including a Bearish Engulfing candlestick, negative Money Flow, and weakened Trend Strength. This analysis will consider all timeframes in detail to find strategies appropriate for the current very high risk.
Technical Analysis:
-
15-Minute Timeframe (15m) - Focus:
- SMC (Smart Money Concepts): Price broke down through all key support levels with strong momentum. Continuous Lower Lows (LL) are being formed. This indicates complete dominance of selling pressure.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (Resistance): $68,000 (former support, now key resistance), $69,000, $70,000.
- Sellside Liquidity (Support): No strong support in the near term. Possible psychological support at $60,000, and below that at $58,000, $56,000. Identifying clear support in this condition is difficult.
- Money Flow: Strongly negative (Strong Outflow). This is one of the most important confirmations of selling pressure.
- EMA (Exponential Moving Average): EMA 50 (yellow) is clearly below EMA 200 (white), and the distance between the two lines is widening. This is a strong Bearish signal.
- Trend Strength: Thick red cloud, and a clear Sell signal.
- Chart Pattern: No chart patterns indicating a Bullish reversal.
- 15m Summary: The downtrend is clear and very strong.
-
4-Hour Timeframe (4H):
- SMC: Price is in a correction phase. It has broken below the EMA 50 and is testing the EMA 200.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (Resistance): $68,000 - $69,000.
- Sellside Liquidity (Support): EMA 200 (approximately $60,000), $58,000 (previous Demand Zone).
- Money Flow: Negative (Outflow).
- EMA: EMA 50 (yellow) crossed below EMA 200 (white) (Death Cross). This is a Bearish signal in the medium term.
- Trend Strength: Red cloud indicating a medium-term downtrend.
- Chart Pattern: No clear Bullish reversal pattern.
- 4H Summary: Confirms the medium-term correction. The trend is down.
-
Daily Timeframe (Day):
- SMC: The long-term uptrend structure is not yet broken (it has not made a Lower Low below $59,000 - $60,000). However, the latest candlestick is a Bearish Engulfing, which is a significant reversal signal, and the speed and strength of the drop indicate increasing weakness.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (Resistance): $72,000, $75,000 (All-Time High).
- Sellside Liquidity (Support): $60,000 (key psychological support, previous Low), $58,000, and $50,000 - $52,000 (EMA 200 and Demand Zone).
- Money Flow: Starting to turn negative (Outflow). This is a significant change and a serious warning sign.
- EMA: EMA 50 (yellow) is still above EMA 200 (white), but the distance between the lines is narrowing.
- Trend Strength: The green cloud is starting to thin, and there was a Neutral signal (previously), and now there is a Sell signal.
- Chart Pattern: Bearish Engulfing - a strong bearish reversal signal.
- Day Summary: The long-term trend is technically still up, but there are several significant warning signs, and there is a high risk of a trend change.
Trading Strategies:
-
Day Trade (15m):
- Main Strategy: Short Selling only. Very high risk.
- Conditions: Wait for a Rebound (temporary upward bounce) to resistance levels (such as the EMA on the 15m TF, or around $68,000). Then, wait for a clear Bearish signal (e.g., Bearish Engulfing, Evening Star, or a breakout of that Rebound to the downside).
- Stop Loss: Strictly above the most recent Swing High of the Rebound.
- Take Profit: Psychological support ($60,000), or lower ($58,000, $56,000). Do not hold for long.
- Warning: Do not counter-trend (do not Buy). The market is extremely volatile.
-
Swing Trade (4H):
- Main Strategy: Wait and See. There are no Buy signals.
- Conditions: Wait for the price to test key support levels (EMA 200 at around $60,000, or $58,000). Then, a clear and strong Bullish reversal signal must be seen (e.g., Bullish Engulfing, Hammer, Morning Star, with high volume) before considering a Buy.
- Stop Loss: Below the support level where you entered.
- Take Profit: Resistance levels ($68,000 - $69,000), or higher if the trend changes.
- Warning: Buying at support without a reversal signal is high risk.
-
Position Trade (Day):
- Main Strategy: Wait and See. It's too early to Buy.
- Conditions: Wait for the price to test very strong support levels ($50,000 - $52,000, which is the EMA 200 and a Demand Zone). Then, a very clear Bullish reversal signal must be seen before considering a Buy. Alternatively, wait for the market structure to turn bullish again (create a Higher High).
- Stop Loss: Below the support level where you entered.
- Take Profit: Depends on the reversal signal and long-term targets.
- Warning: Buying now has a very high risk of further downside.
Important Considerations:
- Volatility: BTC's volatility is extremely high during this period. Price movements can be severe and rapid.
- News: Monitor news and events that could affect the cryptocurrency market.
- False Breakouts/Dead Cat Bounces: Beware of temporary upward bounces (Dead Cat Bounces) before further declines.
- Risk Management: Risk management is paramount. Always use Stop Losses. Do not Overtrade (trade beyond your risk tolerance).
In summary, the Daily chart confirms that the recent sharp drop in BTC is not just a minor blip. It's a significant event that has weakened the uptrend and increased the likelihood of a deeper correction. Caution is paramount.
-
-
@ 4857600b:30b502f4
2025-03-10 12:09:35At this point, we should be arresting, not firing, any FBI employee who delays, destroys, or withholds information on the Epstein case. There is ZERO explanation I will accept for redacting anything for “national security” reasons. A lot of Trump supporters are losing patience with Pam Bondi. I will give her the benefit of the doubt for now since the corruption within the whole security/intelligence apparatus of our country runs deep. However, let’s not forget that probably Trump’s biggest mistakes in his first term involved picking weak and easily corruptible (or blackmailable) officials. It seemed every month a formerly-loyal person did a complete 180 degree turn and did everything they could to screw him over, regardless of the betrayal’s effect on the country or whatever principles that person claimed to have. I think he’s fixed his screening process, but since we’re talking about the FBI, we know they have the power to dig up any dirt or blackmail material available, or just make it up. In the Epstein case, it’s probably better to go after Bondi than give up a treasure trove of blackmail material against the long list of members on his client list.
-
@ 7d33ba57:1b82db35
2025-03-10 11:22:03Roque Nublo & Pico de las Nieves Gran Canaria’s Highest Points
🏞 Roque Nublo (1,813m)
One of the island’s most famous landmarks, this volcanic rock formation offers incredible views after a short (1.5 km) hike. It was once a sacred site for the indigenous Guanche people. On clear days, you can see Mount Teide in Tenerife.⛰ Pico de las Nieves (1,949m) – The Highest Point
A short drive from Roque Nublo, this is Gran Canaria’s highest peak. You’ll get 360° views of the island, including Roque Nublo and the deep ravines of the Caldera de Tejeda. Unlike Roque Nublo, you can drive almost to the top.
🌤 Best Time to Visit:
- Sunrise or sunset for stunning views.
- Bring layers—it can be chilly at higher altitudes.🚗 Getting There:
- Roque Nublo requires a short hike.
- Pico de las Nieves is accessible by car. -
@ 57d1a264:69f1fee1
2025-03-10 10:04:32A presentation by @jsonbits Jason Hester for the 40th CSUN Assistive Technology Conference -
March 10, 2025 – March 14, 2025
originally posted at https://stacker.news/items/908947
-
@ 57d1a264:69f1fee1
2025-03-10 09:35:17Here I am posting a document that presents the Business Model Canvas (BMC) created for “Nasi Goreng Semrawut”, a Micro, Small, and Medium Enterprise (MSME) in Kendal, Central Java, Indonesia. BMC is a strategic management and entrepreneurship tool. It allows us to visualize, assess, and modify business models. It is crucial to understand the core components of a business and how they interact. As a UX researcher, analyzing and understanding the business model is critical to aligning user needs with business goals. This BMC provides the basis for identifying opportunities to improve user experience and drive business growth.
I have broken it down into sections and grouped them carefully and I have clear reasons from a UX perspective why the groupings I have chosen are these points. I explain the UX side more fully on my portfolio website.
For my reflections on this project analyzing the Business Model Canvas of "Nasi Goreng Semrawut" through a UX lens reveals several opportunities for improvement. By focusing on user needs and behaviors, I can enhance the customer experience, streamline operations, and drive business growth. This analysis highlights the importance of integrating UX research into the strategic planning process. By understanding the business model, I can ensure that our UX efforts are aligned with business goals and deliver tangible results.
My website Portfolio👇 https://octoporto.framer.website/blog/business-model-canvas-nasi-goreng-semrawut
Link Project : https://www.figma.com/proto/5LZkoc2uSJ1RTaur4cDVCM/Business-Model-Canvas-Sego-Goreng-Semrawut?page-id=0%3A1&node-id=38-117&viewport=-170%2C587%2C0.16&t=8gt9qNV5G267Xq8B-1&scaling=scale-down&content-scaling=fixed&starting-point-node-id=20%3A3
mirorred from dribbble
originally posted at https://stacker.news/items/908920
-
@ 95cb4330:96db706c
2025-03-10 08:42:59Introduction: Why Small Actions Lead to Huge Success
Most people underestimate the power of small, consistent improvements over time. They chase quick wins and expect success overnight. But the truth is, the most successful people and businesses in the world rely on the power of compounding effort—making small, incremental improvements daily that scale into massive long-term results.
This principle, known as The Law of Compounding Effort, is embraced by Jeff Bezos, Sam Altman, and Peter Thiel. Instead of looking for instant success, they focus on building systems, habits, and investments that grow exponentially over time.
In this article, we’ll break down:
✔ What the Law of Compounding Effort is and why it works
✔ Examples from top entrepreneurs who applied it to build billion-dollar empires
✔ How you can use it to improve your own work, habits, and investments
What Is the Law of Compounding Effort?
The Law of Compounding Effort is based on a simple but powerful idea:
Small, consistent improvements in thinking, decision-making, and execution create exponential results over time.
Instead of trying to make huge leaps all at once, improving just 1% per day leads to massive growth over months and years.
Mathematically, it looks like this:
- If you improve 1% every day for a year → You’ll be 37x better than where you started.
- If you get 1% worse every day → You’ll lose almost all your progress.
This is why daily habits and small decisions matter more than big, one-time actions.
Examples of the Law of Compounding Effort in Action
1. Jeff Bezos and Amazon: Reinvesting for Long-Term Growth
Jeff Bezos didn’t build Amazon into a trillion-dollar empire overnight. He compounded small improvements for decades by:
- Reinvesting Amazon’s profits into better infrastructure, logistics, and technology.
- Focusing on customer obsession, constantly improving Amazon’s efficiency and convenience.
- Scaling AWS (Amazon Web Services) from a side project into the backbone of the internet, generating billions in profit.
Bezos was never focused on short-term profits—he compounded effort and reinvested resources into long-term scalability.
📌 Lesson: Instead of chasing quick money, build systems that get better and stronger over time.
2. Sam Altman and AI: Betting on the Future
Sam Altman, CEO of OpenAI, has built his career by compounding small breakthroughs in artificial intelligence:
- He funded AI research when others ignored it, knowing that small improvements would snowball.
- He scaled OpenAI’s models like GPT-4, refining them step by step to become industry-changing technologies.
- He invests in AI infrastructure, believing that today’s progress will lead to exponential advancements in the future.
Altman’s entire strategy is about playing the long game—knowing that AI’s compounding improvements will change everything.
📌 Lesson: The biggest future opportunities come from compounding small improvements today.
3. Peter Thiel and Facebook: The Power of Network Effects
Peter Thiel was one of the first investors in Facebook, putting in $500,000 when few people saw its potential.
Why? He understood the compounding nature of network effects:
- As more users joined Facebook, its value increased exponentially.
- More advertisers came, bringing more revenue and funding more innovation.
- Facebook scaled from a small project to a multi-billion-dollar company.
Thiel’s investment in Facebook was a classic compounding success—he saw the long-term potential, not just the short-term returns.
📌 Lesson: The best investments grow stronger over time—look for compounding effects in business, investing, and technology.
How to Apply the Law of Compounding Effort in Your Own Life
You don’t need to be a billionaire to apply this principle—compounding effort works in every area of life.
1. Improve 1% Every Day
If you get slightly better every day, the results compound into massive progress.
Ask yourself:
- What’s one skill I can improve today?
- How can I refine my decision-making?
- What process can I optimize for long-term growth?📌 Example: Investing → Instead of trying to "get rich quick," invest consistently, reinvest profits, and let your portfolio compound over years.
2. Focus on Scalable Actions
Not all work compounds. Focus on efforts that scale and grow over time, like:
✅ Building a brand → Content, reputation, and trust compound.
✅ Investing in automation → Systems that work for you 24/7.
✅ Compounding relationships → The right connections open exponential opportunities.📌 Example: Business Growth → Instead of doing one-time sales, build a repeatable system that grows without constant effort.
3. Avoid Negative Compounding
Just as small positive actions build up over time, bad habits and decisions compound negatively.
Ask yourself:
- Am I wasting time on low-value tasks?
- Am I making impulsive decisions instead of strategic ones?
- Am I neglecting habits that will improve my long-term growth?📌 Example: Health & Productivity → Small unhealthy choices compound into major problems later. But small positive habits compound into a strong body and sharp mind.
Final Thoughts: Small Wins, Big Results
The Law of Compounding Effort proves that success isn’t about big, flashy moves—it’s about consistent, focused progress over time.
🔹 Jeff Bezos built Amazon by reinvesting and compounding small efficiencies.
🔹 Sam Altman bet on AI, knowing that small breakthroughs would add up.
🔹 Peter Thiel invested in Facebook, recognizing its compounding network effects.And you can do the same.
💡 Action Step: Find one habit, process, or investment you can improve by 1% today. Stick with it, and let it compound over time.
Resources to Learn More
- 📖 The Power of Compounding – Farnam Street
- 🎥 Jeff Bezos on Long-Term Thinking – Harvard Business Review
- 📰 Sam Altman on Compounding Success – Blog
🚀 The best results don’t come from one big move. They come from small, consistent improvements over time. Start compounding today!
-
@ 95cb4330:96db706c
2025-03-10 08:34:05Introduction: The Power of the Few
Most people assume that effort and results follow a linear relationship—that every action contributes equally to success. However, reality follows a very different pattern: Power Laws.
The Power Law Principle, championed by thinkers like Peter Thiel and Jeff Bezos, states that a small number of key efforts drive the majority of outcomes. Instead of distributing energy evenly across tasks, investments, or decisions, the smartest individuals and companies focus on the few areas that truly matter—the ones that yield outsized returns.
In this article, we’ll explore:
✔ What the Power Law is and why it matters
✔ Examples of Power Laws in business and investing
✔ How to apply the Power Law Principle in your own work and life
What Is the Power Law?
The Power Law is a mathematical relationship where a small input leads to a disproportionately large output. It is the foundation of Pareto’s Principle (the 80/20 rule), which states that:
- 80% of results come from 20% of efforts
- 80% of revenue comes from 20% of customers
- 80% of profits come from 20% of investments
But Power Laws go even further. In reality, it’s not just 80/20—it’s often 90/10 or even 99/1.
In venture capital, for example, a handful of companies (like Facebook, Google, and Tesla) account for nearly all of the industry’s profits. If you had invested in 100 startups, it wouldn’t be the case that 20 of them returned good money—it would be that just one or two produced nearly all the profits, while the rest failed or broke even.
Power Laws appear everywhere in business, investing, technology, and even personal development.
Examples of the Power Law in Action
1. Venture Capital: Peter Thiel and Facebook
Peter Thiel, co-founder of PayPal and early investor in Facebook, built his fortune using Power Law thinking.
- In 2004, he invested $500,000 in Facebook—a small startup most people ignored.
- That one investment turned into billions of dollars, while dozens of other startups he backed failed.
- One bet made up for every loss—and much more.
Thiel himself says:
"We don’t live in a normal world. We live under a Power Law."
Venture capitalists don’t succeed by investing in 100 decent companies—they succeed by finding the 1 company that dominates an industry.
2. Jeff Bezos and AWS: One Decision That Built a Trillion-Dollar Empire
Amazon started as an online bookstore, but one decision made Amazon a tech giant: Amazon Web Services (AWS).
- In the early 2000s, Jeff Bezos realized that cloud computing could be the foundation of the internet.
- He shifted massive resources into AWS, even though it had nothing to do with selling books.
- AWS became the backbone of the internet, powering companies like Netflix, Airbnb, and even government agencies.
- Today, AWS generates over 60% of Amazon’s total profits, funding Amazon’s entire e-commerce business.
Without one key decision, Amazon might still just be an online retailer. But by following the Power Law, Bezos doubled down on what truly mattered—and that made all the difference.
3. Sam Altman and AI: Betting on the Future
Sam Altman, CEO of OpenAI, has focused his entire career on one high-upside opportunity: Artificial Intelligence (AI).
- Instead of investing in many different technologies, he put all his energy into AI.
- He believes AI will reshape every industry, making it one of the highest-upside bets in history.
- OpenAI’s ChatGPT is now one of the fastest-growing software products ever, with 100 million+ users in a matter of months.
Altman’s approach? Find the area with the biggest possible impact—and go all in.
How to Apply the Power Law Principle in Your Life
Most people waste time by treating all tasks equally. But if you want real success, you need to identify and focus on the few things that actually matter.
1. Identify the 20% That Drives 80% of Results
Ask yourself:
- What 20% of my efforts produce 80% of my success?
- Which investments or decisions have the biggest impact?
- What skills, relationships, or habits generate the highest returns?
2. Cut the Noise—Eliminate Low-Impact Tasks
Once you identify the high-impact areas, cut distractions mercilessly.
- In investing: Stop spreading your money across 20 mediocre bets. Instead, find the 1-2 asymmetric opportunities that could change everything.
- In business: Instead of launching 10 different products, focus on the one product that dominates your industry.
- In personal development: Instead of learning random skills, master one rare, valuable skill that sets you apart.
3. Double Down on What Works
Once you find what works, go all in.
- If a stock, business, or skill is compounding massively, allocate more resources to it.
- If an investment is performing exponentially better than others, increase your stake.
- If one product or strategy is dominating the market, scale it up aggressively.
Most people diversify too much because they’re afraid of missing out. But true success comes from concentrating on what actually works.
Final Thoughts: The Few That Matter
The Power Law is one of the most important concepts in business, investing, and life. The majority of success comes from a small number of actions—so the key is to:
✅ Find the few things that truly drive results
✅ Eliminate distractions and low-impact efforts
✅ Double down on what works and scale it massivelyThe difference between mediocrity and massive success is simple:
Most people work hard on everything. The smartest people work hard on the right things.
Start thinking in Power Laws—and you’ll see exponential results. 🚀
Resources to Learn More
- 📖 Understanding Power Laws – Farnam Street
- 🎥 Peter Thiel on Power Laws in Investing – NFX
- 📰 How to Apply Power Laws in Business – Medium
Action Step: 🔥 Look at your current projects, tasks, or investments. What is the 20% that drives 80% of your success? Cut the rest, and focus more on what truly matters.
Let me know what you think—drop a comment below! 🚀
-
@ b8af284d:f82c91dd
2025-03-10 08:28:07Liebe Abonnenten,
800 Milliarden Euro will die EU ausgeben, um die Ukraine und den Kontinent in ein “stählernes Stachelschwein” zu verwandeln. Deutschland selbst will künftig Verteidigungsausgaben aus der Schuldenbremse ausnehmen, was nichts anderes als eine unbegrenzte Kreditlinie für das Militär bedeutet. Hinzu kommt ein “Sondervermögen” in Höhe von 500 Milliarden Euro für Infrastruktur. Das klingt nach einem Spartopf, den man für schwere Zeiten angelegt hat. Es soll die Tatsache verschleiern, dass es sich dabei um Schulden handelt. Der vermutlich baldige Kanzler Friedrich Merz bricht damit sein Wahlversprechen, die Schuldenbremse einzuhalten. Beschließen soll das Paket noch ein abgewählter Bundestag, da im neuen wohl die Mehrheit fehlt.
Womit also ist zu rechnen, wenn demnächst fast eine Billion frisch gedruckte Euro in Drohnen, Panzer und Raketen investiert werden?
Das beste Beispiel der jüngeren Geschichte ist China: 2009 legte die chinesische Regierung das bisher größte Infrastrukturprojekt der Welt in Höhe von 440 Milliarden Euro auf. Finanziert wurde es durch günstige Kredite, die vor allem an Staatsunternehmen vergeben wurden. Nachdem die Welt nach der in den USA ausgelösten Immobilienkrise 2008 in die Rezession gerutscht war, „rettete“ dieses Paket die globale Konjunktur. China hatte zu diesem Zeitpunkt großen Bedarf an Flughäfen, Straßen und vor allem Zügen. Das Paket war riskant: Schier unbegrenztes Geld, das begrenzten Waren hinterherjagt, führt zu Inflation. Billige Kredite führen meist dazu, dass Unternehmen nicht mehr effizient wirtschaften, und Schuldenberge vor sich her wälzen.
Allerdings wurde das Geld in Produktivität investiert. Denn wenn Menschen und Waren einfacher reisen können, nimmt die Geschäftstätigkeit zu: Arbeitnehmer werden mobiler, Unternehmen konkurrenzfähiger, die Preise sinken. Die Investitionen lohnen sich also, weil sie zu mehr Wirtschaftswachstum führen. Vereinfacht gesagt: Die Schulden können zurückgezahlt werden, und am Ende bleibt noch mehr übrig. In diesem Fall führen Schulden nicht zu Inflation: Durch die gesteigerte Produktivität stehen jetzt sogar mehr Waren der Geldmenge gegenüber.
15 Jahre später kämpft die zweitgrößte Volkswirtschaft zwar noch immer mit den Problemen, die aus diesem Paket resultieren - die Immobilienkrise ist eine indirekte Folge davon. Trotzdem war das Programm ein Erfolg: die Städte, Flughäfen und vor allem Zugstrecken führten zu einer höheren wirtschaftlichen Aktivität oder Produktivität. China ist heute ein wesentlich moderneres Land als vor dem Paket, und verfügt über modernste und größte Netz aus Hochgeschwindigkeitszügen der Welt. Neue Schulden können positiv sein - wenn das Geld produktiv investiert wird.
Auch in Europa lassen sich mit dem Geld-Paket zunächst mehrere Probleme auf einmal lösen: Deutschland ist noch immer ein Industriestandort mit hohen Produktionskapazitäten. Werke der Auto- und Zulieferindustrie können theoretisch zur Waffenproduktion umfunktioniert werden. Immer noch besser als sie stillzulegen oder an die Chinesen zu verkaufen, werden viele Kommentatoren schreiben.
Allein in der deutschen Automobil-Zulieferindustrie sind im vergangenen Jahr über 19000 Arbeitsplätze verloren gegangen. Viele von den Entlassenen können nun Arbeit in der Rüstungsindustrie finden. Oder wie Hans Christoph Atzpodien, Hauptgeschäftsführer des Bundesverbandes der Deutschen Sicherheits- und Verteidigungsindustrie in der WirtschaftsWoche sagt:
„Das Motto muss lauten: Autos zu Rüstung! Anstatt einen volkswirtschaftlichen Schaden durch den Niedergang der Auto-Konjunktur zu beklagen, sollten wir versuchen, Produktionseinrichtungen und vor allem Fachkräfte aus dem Automobilsektor möglichst verträglich in den Defence-Bereich zu überführen“
Immerhin: ein großer Teil des Geldes soll auch in Infrastrukturprojekte fließen: Brücken, Bahn, Internetausbau. Deutschland, und damit Europa, wird in den kommenden Monaten also eine große Party feiern, die über die Tatsache hinwegtäuschen wird, dass man einen dummen Krieg verloren hat. In den kommenden Monaten werden sich Verbände und Organisationen um das Geld reißen. Das Geld wird ein auch kollektiv-psychologisches Ventil sein, um das eigene Versagen bei Corona, Klima und Ukraine vergessen zu machen.
Es gibt allerdings einen wesentlichen Unterschied zum chinesischen Stimulus-Paket 2009: Rüstungsgüter sind im Gegensatz zu Zugstrecken totes Kapital. Eine neue Drohne oder Panzer führt nicht zu mehr Produktivität, im Gegenteil: Kommen sie zum Einsatz, zerstören sie Brücken, Häuser, Straßen und töten Menschen. Die Produktivität sinkt also. Im besten Fall kann Militärgerät herumstehen und vor sich hin rosten. Auch dann aber ist es „totes Kapital“, das nichts zur Produktivität beiträgt. Kommt es zum Einsatz, stehen der nun verringerten Warenmenge eine noch größere Geldmenge gegenüber. Die Inflation steigt.
Schleichende Militarisierung
Auch gesellschaftlich wird das Paket mit seinem Blanko-Scheck für die Verteidigungsindustrie viel verändern: Es kommt zu einer „Eichung“ der Gesellschaft, eine kollektive Abscheu des gemeinsamen Feindes. Scharfmacher, eigentlich mittelmäßiger Akademiker und Bürokraten, wie Carlo Masala und Claudia Major werden eine noch größere Rolle im öffentlichen Diskurs spielen und die Talkshows dominieren, die von einer immer älter werdenden deutschen Bevölkerung geglotzt werden. Abweichende Meinungen auf Online-Plattformen zensiert, unter dem Vorwand, die Demokratie sei in Gefahr:
Da die Rüstungsindustrie dann eine wichtigere Rolle für die Gesamtwirtschaft spielt, wird ihr Einfluss auf die Politik in Form von Lobbyisten und Verbänden zunehmen. Politiker merken schnell, dass sie von der medialen Aufmerksamkeitsökonomie nach oben gespült werden, wenn sie immer radikalere Forderungen stellen. So empfahl der ehemalige Außenminister Joschka Fischer die Woche die Wiedereinführung der Wehrpflicht für Männer und Frauen. “Star-Ökonomin” Isabella Weber will die Kriegswirtschaft mitplanen:
\ Der Kontinent wird sich langsam wandeln von einem „Friedensprojekt“ zu einem „metallenen Stachelschwein“, ergo Kriegsprojekt, denn ohne dämonisierten Feind funktioniert das Programm nicht. Der Ton wird rauer, autoritärer, und die Meinungsfreiheit weiter eingeschränkt werden. Die seit 2020 eingeführten Werkzeuge zur soften Propaganda („kognitive Kriegsführung”) werden verfeinert und ausgebaut werden, sodass weiterhin 80 Prozent der Bevölkerung alle noch so antihumanen Maßnahmen gutheißen werden.
Und dann?
Wie Julian Assange einmal sagte: “Das Ziel ist kein erfolgreicher Krieg. Das Ziel ist ein endloser Krieg.” Der Konflikt muss weitergehen, ewig schwelen oder ein neuer gefunden werden, da sonst ein Teil der Wirtschaftsleistung kollabiert.
Nach ein, zwei oder auch erst drei Jahren, werden erste Probleme sichtbar. Die Party endet, der Kater setzt langsam ein. Die Finanzierung an den Kapitalmärkten wird für Deutschland immer kostspieliger. Der Schuldendienst wird einen größeren Teil des Haushalts einnehmen. Die Bürger müssen dies mitfinanzieren. Der voraussichtlich neue Bundeskanzler Friedrich Merz sprach bereits von der „Mobilisierung der deutschen Sparguthaben“.
\ Was im Ersten Weltkrieg „Kriegsanleihen“ hieß, wird einen schickeren Namen bekommen wie „olivgrüne Bonds“. You name it. Alternativ lässt sich ein Verteidigungs-Soli einführen, oder das Kindergeld streichen, wie kürzlich Ifo-Chef Clemens Fuest forderte.
Was kann man tun? Auf BlingBling geht es um konkrete Tipps, welche Anlagen von dieser Entwicklung profitieren werden. Außerdem geht es um die “Strategische Bitcoin Reserve”, die am Donnerstag beschlossen wurde.
-
@ da0b9bc3:4e30a4a9
2025-03-10 07:34:20Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/908874
-
@ fb8a5c6f:58ec79bd
2025-03-10 00:39:53I work in the film industry, and I absolutely love making movies—it’s where my heart is. I’m also passionate about bitcoin. For me, it’s not just about the thrill of "number go up," but a deeper realization over the past 12 years: inflation is a theft of our time and energy. Whether I’m writing or revising a script or thinking about the world we live in, I believe our lives shouldn’t get progressively more expensive just by existing.\ \ A few months ago, I saw a viral video that drove this home. A young guy shared how a month’s worth of groceries cost him $126 back in 2022. When he hit the "re-order" button for the same items in the summer of 2024—just two years later—it was $414. That’s staggering. People are working harder than ever, pouring their souls into their craft yet they can’t figure out why they’re not getting ahead. Inflation is a big part of the answer.\ \ It’s frustrating because it didn’t always used to be this way. Today, the Federal Reserve and the U.S. Treasury keep printing money out of thin air, devaluing what we earn and making life more expensive year after year. I understood the problem for a while, but it wasn’t until I discovered bitcoin that I found a solution. A fixed and finite currency. \ \ There will only ever be 21 million.\ \ Naturally, when you grasp what bitcoin is, you want to share it with the people you care about. I’ve been fortunate—my friends get it, and they’re doing great. My family, though? Not so much. Yesterday, my aunt suggested I talk to them as a group instead of one-on-one, like I’d been trying, so they could ask questions and discuss it together. I thought it was interesting idea, but money is such a personal topic. We all have to find our own path to understanding it, and bringing it up with family can get tricky—almost like pitching a script they’re not ready to hear.\ \ So, what did I do instead? I'm sharing these thoughts online and started a Youtube channel. Go figure. Don't judge too harshly though as it's a work in progress! 🫡\ \ It’s not so different from storytelling through film—just another way to share what matters.\ \ I don’t know how often I’ll write long form posts or make videos about bitcoin, but if I can help even one person pinpoint the problem and discover bitcoin along the way, I believe the world gets a little better. Bit by bit, person by person. Just like how a good movie can inspire, maybe this can too.
Fix the money, fix the world.\ ∞ / 21 million
-
@ f3873798:24b3f2f3
2025-03-10 00:32:44Recentemente, assisti a um vídeo que me fez refletir profundamente sobre o impacto da linguagem na hora de vender. No vídeo, uma jovem relatava sua experiência ao presenciar um vendedor de amendoim em uma agência dos Correios. O local estava cheio, as pessoas aguardavam impacientes na fila e, em meio a esse cenário, um homem humilde tentava vender seu produto. Mas sua abordagem não era estratégica; ao invés de destacar os benefícios do amendoim, ele suplicava para que alguém o ajudasse comprando. O resultado? Ninguém se interessou.
A jovem observou que o problema não era o produto, mas a forma como ele estava sendo oferecido. Afinal, muitas das pessoas ali estavam há horas esperando e perto do horário do almoço – o amendoim poderia ser um ótimo tira-gosto. No entanto, como a comunicação do vendedor vinha carregada de desespero, ele afastava os clientes ao invés de atraí-los. Esse vídeo me tocou profundamente.
No dia seguinte, ao sair para comemorar meu aniversário, vi um menino vendendo balas na rua, sob o sol forte. Assim como no caso do amendoim, percebi que as pessoas ao redor não se interessavam por seu produto. Ao se aproximar do carro, resolvi comprar dois pacotes. Mais do que ajudar, queria que aquele pequeno gesto servisse como incentivo para que ele continuasse acreditando no seu negócio.
Essa experiência me fez refletir ainda mais sobre o poder da comunicação em vendas. Muitas vezes, não é o produto que está errado, mas sim a forma como o vendedor o apresenta. Quando transmitimos confiança e mostramos o valor do que vendemos, despertamos o interesse genuíno dos clientes.
Como a Linguagem Impacta as Vendas?
1. O Poder da Abordagem Positiva
Em vez de pedir por ajuda, é importante destacar os benefícios do produto. No caso do amendoim, o vendedor poderia ter dito algo como: "Que tal um petisco delicioso enquanto espera? Um amendoim fresquinho para matar a fome até o almoço!"
2. A Emoção na Medida Certa
Expressar emoção é essencial, mas sem parecer desesperado. Os clientes devem sentir que estão adquirindo algo de valor, não apenas ajudando o vendedor.
3. Conheça Seu Público
Entender o contexto é fundamental. Se as pessoas estavam com fome e impacientes, uma abordagem mais objetiva e focada no benefício do produto poderia gerar mais vendas.
4. Autoconfiança e Postura
Falar com firmeza e segurança transmite credibilidade. O vendedor precisa acreditar no próprio produto antes de convencer o cliente a comprá-lo.
Conclusão
Vender é mais do que apenas oferecer um produto – é uma arte que envolve comunicação, percepção e estratégia. Pequenos ajustes na abordagem podem transformar completamente os resultados. Se o vendedor de amendoim tivesse apresentado seu produto de outra maneira, talvez tivesse vendido tudo rapidamente. Da mesma forma, se cada um de nós aprender a se comunicar melhor em nossas próprias áreas, poderemos alcançar muito mais sucesso.
E você? Já passou por uma experiência parecida?
-
@ 8d34bd24:414be32b
2025-03-10 00:16:01The Bible tells believers repeatedly that we are to share the gospel, make disciples, speak the truth, etc. We are to be His witnesses. The reason we don’t go straight to heaven when we are saved is that God has a purpose for our lives and that is to be a light drawing people to Him.
“…but you will receive power when the Holy Spirit has come upon you; and you shall be My witnesses both in Jerusalem, and in all Judea and Samaria, and even to the remotest part of the earth.” (Acts 1:8)
In order to be His witness, we have to know Him and know His word. When we don’t know His word, we can be misled and/or mislead others. We will fail in our mission to be witnesses if we don’t regularly study the Bible and spend time in prayer with our God.
As a result, we are no longer to be children, tossed here and there by waves and carried about by every wind of doctrine, by the trickery of men, by craftiness in deceitful scheming; but speaking the truth in love, we are to grow up in all aspects into Him who is the head, even Christ, from whom the whole body, being fitted and held together by what every joint supplies, according to the proper working of each individual part, causes the growth of the body for the building up of itself in love. (Ephesians 4:4-16) {emphasis mine}
In addition to knowing Him and His word, we need to be bold and unashamed.
Therefore do not be ashamed of the testimony of our Lord or of me His prisoner, but join with me in suffering for the gospel according to the power of God, who has saved us and called us with a holy calling, not according to our works, but according to His own purpose and grace which was granted us in Christ Jesus from all eternity, but now has been revealed by the appearing of our Savior Christ Jesus, who abolished death and brought life and immortality to light through the gospel, (2 Timothy 1:8-10) {emphasis mine}
We were called according to His purpose. His purpose was known before the creation of the world. We are not saved by works, but if we are saved, works should naturally proceed from the power of the Holy Spirit within us, as well as the thankfulness we should have because of what Jesus did for us.
The key point of our witness is obedience. We are a tool of God. We are to faithfully share the Gospel and the truth in God’s word, but we are not held accountable for the result of this witness. The results are due to God’s mercy and power and not due to anything we do.
But you shall speak My words to them whether they listen or not, for they are rebellious.
“Now you, son of man, listen to what I am speaking to you; do not be rebellious like that rebellious house. Open your mouth and eat what I am giving you.” (Ezekiel 2:7-8) {emphasis mine}
When we witness, some will listen and some will not. Some will accept Jesus with joy and some will reject Him in anger. That is not our concern. God calls whom He will and without His calling, nobody comes to Him.
And they took offense at Him. But Jesus said to them, “A prophet is not without honor except in his hometown and in his own household.” (Matthew 13:57)
One thing I’ve noticed is that the hardest people to witness to are family (not counting kids, but especially parents and siblings) and other people who have known us for a long time. They see what we were and not what we now are. There is baggage that can make for awkward dynamics. As someone once said to me, “It is hard to teach anyone or convince anyone who changed your diaper.”
I started with the Acts 1:8, “… be My witnesses both in Jerusalem, and in all Judea and Samaria, and even to the remotest part of the earth.” This is like saying “be My witnesses in my hometown, my state, my country, and even to the remotest part of the earth.” Our witness starts at home, then our community, and works it way out. Everyone can witness at home. We can all witness in our community as we go about our daily actions. It is important to have Christians that go to the “remotest part of the earth,” especially to unreached people groups, but that isn’t where most of us are sent. Most of us are called to witness to those around us daily.
For you are not being sent to a people of unintelligible speech or difficult language, but to the house of Israel, nor to many peoples of unintelligible speech or difficult language, whose words you cannot understand. But I have sent you to them who should listen to you; (Ezekiel 3:5-6) {emphasis mine}
God empowers some to be international missionaries, but He calls every Christian to be a life missionary. Sometimes this may just be living a life for Jesus that stands out in the culture. Sometimes this may be giving an in-depth treatise on the Gospel and the Bible. It will look differently in different seasons of life and on different days, but it should be a regular part of our life.
As we build relationships with people and show that we care about them, this usually gives us the opportunity to share with them why our lives look different. It demonstrates why we treat others well, why we are loving, and why we have joy, even when our circumstances don’t seem like they should lead to joy. Then when they ask why we are different, we can have the opportunity to tell why we have this joy and love and morality.
but sanctify Christ as Lord in your hearts, always being ready to make a defense to everyone who asks you to give an account for the hope that is in you, yet with gentleness and reverence; (1 Peter 3:5)
Although following a person and forcing them to listen to the Gospel is not the way to draw someone to Jesus, we need to not be silent about the truth. Not being pushy doesn’t mean being silent when someone is forcing their ungodly views on us or on others. Speaking up prevents evil voices from taking control. You also might be surprised to find that others didn’t like what was being said, but were too afraid to speak up because they thought everyone agreed with the speaker. When you speak up for the truth, it can give others courage to stand on their convictions and to draw closer to Jesus, whether this means they come to salvation or just draw closer to God.
Moreover, He said to me, “Son of man, take into your heart all My words which I will speak to you and listen closely. Go to the exiles, to the sons of your people, and speak to them and tell them, whether they listen or not, ‘Thus says the Lord God.’ ” (Ezekiel 3:10-11) {emphasis mine}
We are to speak the truth in love whether they listen or not. Some will listen, hear, and come to Jesus. Some will listen and reject what is said. We are only called to obey the call. God brings the increase. To God be the glory!
May God guide us and lead us in wisdom, love, and courage so that our light shines so brightly that many unsaved come to trust in Jesus Christ our Lord and that those who know Jesus, but have not matured, may grow in their faith, knowledge, and obedience to Jesus.
Trust Jesus
-
@ 4925ea33:025410d8
2025-03-09 22:56:19O que é melasma?
Segundo a Sociedade Brasileira de Dermatologia, o melasma é uma condição caracterizada pelo surgimento de manchas escuras na pele, mais comumente no rosto. No entanto, também pode ocorrer em outras áreas do corpo, como braços, pescoço e colo.
Essas manchas possuem tonalidade acastanhada, formato irregular e bem definido, sendo geralmente simétricas (iguais nos dois lados do rosto).
A causa exata do melasma ainda não é totalmente conhecida. De acordo com o Hospital Albert Einstein, essa condição está relacionada à superprodução de melanina (pigmento que dá cor à pele) ou à dilatação excessiva dos vasos sanguíneos, o que desencadeia inflamação em regiões específicas do rosto.
Os melasmas podem ser classificados em três tipos:
Epidérmico – Atinge a camada mais superficial da pele.
Dérmico – Ocorre nas camadas mais profundas.
Misto – Atinge tanto as camadas superficiais quanto as profundas.
A classificação do melasma é fundamental para a escolha do tratamento adequado.
Tratamento do melasma
O tratamento convencional envolve o uso de agentes clareadores, peelings químicos e cuidados preventivos, como a aplicação diária de protetor solar. Embora esses métodos sejam eficazes, podem ser agressivos para peles sensíveis. É aí que a aromaterapia surge como uma opção complementar, oferecendo uma abordagem mais natural e holística.
Como a Aromaterapia pode ajudar no tratamento do melasma?
A aromaterapia considera o corpo como um todo, tratando não apenas as manchas, mas também possíveis causas subjacentes, como desequilíbrios hormonais e inflamações. Além disso, os óleos essenciais possuem propriedades despigmentantes, cicatrizantes e regeneradoras da pele.
Óleos essenciais recomendados para melasma
Óleo essencial de Gerânio – Regula os hormônios femininos e auxilia no clareamento de manchas relacionadas ao envelhecimento.
Óleo essencial de Vetiver – Favorece a regeneração celular, ajudando a reduzir manchas e prevenir o ressecamento.
Óleo essencial de Copaíba – Possui ação anti-inflamatória e auxilia no controle da oleosidade.
Óleo essencial de Tea Tree (Melaleuca) – Ajuda a prevenir espinhas e melhora manchas causadas pela acne.
Óleo essencial de Lavanda– Com propriedades cicatrizantes e anti-inflamatórias, acelera a regeneração da pele.
Óleo essencial de Olíbano – Rico em antioxidantes, combate os sinais de envelhecimento e melhora a textura da pele.
Cuidados ao usar a aromaterapia no melasma
A aplicação direta de óleos essenciais na pele exige cuidado. Como o melasma pode estar associado a processos inflamatórios, o uso inadequado dos óleos pode piorar a condição ou até causar danos irreversíveis.
Dicas de segurança:
Sempre dilua os óleos essenciais em um óleo vegetal (como rosa mosqueta ou jojoba) antes da aplicação tópica.
Evite óleos essenciais cítricos (como limão e laranja) durante o dia, pois são fotossensíveis e podem manchar ainda mais a pele.
Consulte um aromaterapeuta ou dermatologista para um tratamento personalizado.
Se você gostou deste artigo, compartilhe com quem precisa saber mais sobre o poder da aromaterapia! E se tiver dúvidas, deixe seu comentário.
-
@ 732c6a62:42003da2
2025-03-09 22:36:26Não são recentes as táticas da esquerda de tentar reprimir intelectualmente seus opositores na base do deboche, da ironia, do desprezo e do boicote à credibilidade. Até Marx usava ironia para chamar os críticos de "burgueses iludidos". A diferença é que, no século XXI, trocaram o manifesto comunista por threads no Twitter e a dialética por memes de mau gosto.
A Falácia da Superioridade Moral
O debate sobre o "pobre de direita" no Brasil é contaminado por uma premissa tácita da esquerda: a ideia de que classes baixas só podem ter consciência política se aderirem a pautas progressistas. Quem ousa divergir é tratado como "traidor de classe", "manipulado", "ignorante", ou até vítimas de deboches como alguma pessoa com um qi em temperatura ambiente repetir diversas vezes "não é possível que ainda exista pobre de direita", "nunca vou entender pobre de direita", ou "pobre de direita é muito burro, rico eu até entendo", como se o autor dessas frases fosse o paladino dos mais oprimidos e pobres. Esse discurso, porém, não resiste a uma análise empírica, histórica ou sociológica.
Contexto Histórico: A Esquerda e o Mito do "Voto Consciente"
A noção de que o pobre deve votar na esquerda por "interesse de classe" é herança do marxismo ortodoxo, que via a política como mero reflexo da posição econômica. No entanto, a realidade é mais complexa:
- Dados do Latinobarómetro (2022): 41% dos brasileiros de baixa renda (até 2 salários mínimos) apoiam redução de impostos e maior liberdade econômica — pautas tradicionalmente associadas à direita.
- Pesquisa IPEC (2023): 58% dos pobres brasileiros priorizam "segurança pública" como principal demanda, acima de "distribuição de renda".
Esses números não são acidentais. Refletem uma mudança estrutural: o pobre moderno não é mais o "operário industrial" do século XX, mas um empreendedor informal, motorista de app, ou microempresário — figuras que valorizam autonomia e rejeitam paternalismo estatal. Eles dizem não entender o pobre de direita e que nunca vai entendê-los, mas o fato é que não entendem porque nunca conversaram com um sem fazer cara de psicólogo de posto de saúde. Sua "preocupação" é só uma máscara para esconder o desprezo por quem ousa pensar diferente do seu manual de "oprimido ideal".
Se ainda não entenderam:
Direita ≠ rico: Tem gente que trabalha 12h/dia e vota em liberal porque quer ser dono do próprio negócio, não pra pagar mais taxação pra você postar meme no Twitter.
Acham que são o Sherlock Holmes da pobreza: o palpite de que "o pobre é manipulado" é tão raso quanto sua compreensão de economia básica.
A Psicologia por Trás do Voto Conservador nas Periferias
A esquerda atribui o voto pobre em direita a "falta de educação" ou "manipulação midiática". Essa tese é não apenas elitista, mas cientificamente falsa:
Análise Psicológica Básica (para você que se acha o Paulo Freire):
- Síndrome do Branco Salvador: Acha que o pobre é uma criatura tão frágil que precisa de você pra pensar. Spoiler: ele não precisa.
- Viés da Superioridade Moral: "Se você é pobre e não concorda comigo, você é burro". Parabéns, recriou a escravidão intelectual.
- Efeito Dunning-Kruger: Não sabe o que é CLT, mas dá palpite sobre reforma trabalhista.- Estudo da Universidade de São Paulo (USP, 2021): Entre moradores de favelas, 63% associam políticas de segurança dura (como "bandido bom é bandido morto") à proteção de seus negócios e famílias. Para eles, a esquerda é "branda demais" com o crime.
- Pesquisa FGV (2020): 71% dos trabalhadores informais rejeitam aumentos de impostos, mesmo que para financiar programas sociais. Motivo: já sofrem com a burocracia estatal para legalizar seus negócios.
Esses dados revelam uma racionalidade prática: o pobre avalia políticas pelo impacto imediato em sua vida, não por abstrações ideológicas. Enquanto a esquerda fala em "reforma estrutural" e tenta importar discursos estrangeiros para debate, por exemplo, o tema irrelevante do pronome neutro, ele quer resolver problemas como:
- Violência (que afeta seu comércio);
- Impostos (que consomem até 40% do lucro de um camelô);
- Burocracia (que impede a legalização de sua barraca de pastel).
Religião, Valores e a Hipocrisia do "Ateísmo de Redes Sociais"
A esquerda subestima o papel da religião na formação política das classes baixas. No Brasil, 76% dos evangélicos são pobres (Datafolha, 2023), e suas igrejas promovem valores como:
- Família tradicional (contra pautas progressistas como ideologia de gênero em escolas);
- Auto-responsabilidade (ênfase em "trabalho duro" em vez de assistencialismo).Exemplo Concreto:
Nas favelas de São Paulo, pastores evangélicos são frequentemente eleitos a cargos locais com plataformas anticrime e pró-mercado. Para seus eleitores, a esquerda urbana (que defende descriminalização de drogas e críticas à polícia) representa uma ameaça ao seu estilo de vida.
A Esquerda e seu Desprezo pela Autonomia do Pobre
O cerne do debate é a incapacidade da esquerda de aceitar que o pobre possa ser autônomo. Algumas evidências:
O Caso dos Empreendedores Informais
- Segundo o IBGE (2023), 40% dos trabalhadores brasileiros estão na informalidade. Muitos veem o Estado como obstáculo, não aliado. Políticas de direita (como simplificação tributária) são mais atraentes para eles que o Bolsa Família.
A Ascensão do Conservadorismo Periférico
- Pessoas assim tem um pensamento simples. Sua mensagem: "Queremos empreender, não depender de político."
A Rejeição ao "Vitimismo"
- Pesquisa Atlas Intel (2022): 68% dos pobres brasileiros rejeitam o termo "vítima da sociedade". Preferem ser vistos como "lutadores".
A projeção freudiana "o pobre é burro porque eu sou inteligente"
O deboche esquerdista esconde um complexo de inferioridade disfarçado de superioridade moral. É a Síndrome do Salvador em sua forma mais patética:
- Passo 1: Assume-se que o pobre é um ser desprovido de agência.
- Passo 2: Qualquer desvio da narrativa é atribuído a "manipulação da elite".
- Passo 3: Quem critica o processo é chamado de "fascista".Exemplo Prático:
Quando uma empregada doméstica diz que prefere o livre mercado a programas sociais, a esquerda não pergunta "por quê?" — ela grita "lavagem cerebral!". A ironia? Essa mesma esquerda defende a autonomia feminina, exceto quando a mulher é pobre e pensa diferente.Dados Globais: O Fenômeno Não é Brasileiro
A ideia de que "pobre de direita" é uma anomalia é desmentida por evidências internacionais:
- Estados Unidos: 38% dos eleitores com renda abaixo de US$ 30k/ano votaram em Trump em 2020 (Pew Research). Motivos principais: conservadorismo social e rejeição a impostos. A esquerda: "vítimas da falsa consciência". Mais um detalhe: na última eleição de 2024, grande parte da classe "artística" milionária dos Estados Unidos, figuras conhecidas, promoveram em peso a Kamala Harris, do Partido Democrata. Percebe como a esquerda atual é a personificaçãoda burguesia e de só pensar na própria barriga?
- Argentina: Javier Milei, libertário radical, quando candidato, tinha forte apoio nas villas miseria (favelas). Seu lema — "O estado é um parasita" — ressoa entre quem sofria com inflação de 211% ao ano.
- Índia: O partido BJP (direita nacionalista) domina entre os pobres rurais, que associam a esquerda a elites urbanas desconectadas de suas necessidades.
A história que a esquerda tenta apagar: pobres de direita existem desde sempre
A esquerda age como se o "pobre de direita" fosse uma invenção recente do MBL, mas a realidade é que classes baixas conservadoras são regra, não exceção, na história mundial:
- Revolução Francesa (1789): Camponeses apoiaram a monarquia contra os jacobinos urbanos que queriam "libertá-los".
- Brasil Imperial: Escravos libertos que viraram pequenos proprietários rurais rejeitavam o abolicionismo radical — queriam integração, não utopia.Tradução:
Quando o pobre não segue o script, a esquerda inventa teorias conspiratórias.
A Hipocrisia da Esquerda Urbana e Universitária
Enquanto acusa o pobre de direita de "alienado", a esquerda brasileira é dominada por uma elite desconectada da realidade periférica:
- Perfil Socioeconômico: 82% dos filiados ao PSOL têm ensino superior completo (TSE, 2023). Apenas 6% moram em bairros periféricos.
- Prioridades Descoladas: Enquanto o pobre debate segurança e custo de vida, a esquerda pauta discussões como "linguagem não-binária em editais públicos" — tema irrelevante para quem luta contra o desemprego. Os grandes teóricos comunistas se reviram no túmulo quando veem o que a esquerda se tornou: não debatem os reais problemas do Brasil, e sim sobre suas próprias emoções.
"A esquerda brasileira trocou o operário pelo influencer progressista. O pobre virou um personagem de campanha, não um interlocutor real."
A diversidade de pensamento que a esquerda não suporta
A esquerda prega diversidade — desde que você seja diverso dentro de um checklist pré-aprovado. Pobre LGBTQ+? Herói. Pobre evangélico? Fascista. Pobre que abre MEI? "Peão do capitalismo". A realidade é que favelas e periferias são microcosmos de pluralidade ideológica, algo que assusta quem quer reduzir seres humanos a estereótipos.
Respostas aos Argumentos Esquerdistas (e Por que Falham)
"O pobre de direita é manipulado pela mídia!"
- Contradição: Se a mídia tradicional é dominada por elites (como alegam), por que grandes veículos são abertamente progressistas? A Record (evangélica) é exceção, não regra.
Contradição Central:
Como explicar que, segundo o Banco Mundial (2023), países com maior liberdade econômica (ex.: Chile, Polônia) reduziram a pobreza extrema em 60% nas últimas décadas, enquanto modelos estatizantes (ex.: Venezuela, Argentina com o governo peronista) afundaram na miséria? Simples: a esquerda prefere culpar o "neoliberalismo" a admitir que o pobre com o mínimo de consciência quer emprego, não esmola.Dado que Machuca:
- 71% das mulheres da periferia rejeitam o feminismo radical, associando-o a "prioridades distantes da realidade" (Instituto Locomotiva, 2023)."Ele vota contra os próprios interesses!"
- Falácia: Pressupõe que a esquerda define o que é o "interesse do pobre". Para um pai de família na Cidade de Deus, ter a boca de fogo fechada pode ser mais urgente que um aumento de 10% no Bolsa Família.
O pobre de direita não é uma anomalia. É o produto natural de um mundo complexo onde seres humanos têm aspirações, medos e valores diversos. Enquanto a esquerda insiste em tratá-lo como um projeto fracassado, ele está ocupado:
- Trabalhando para não depender do governo.
- Escolhendo religiões que dão sentido à sua vida.
- Rejeitando pautas identitárias que não resolvem o custo do gás de cozinha."É falta de educação política!"
- Ironia: Nos países nórdicos (modelo da esquerda), as classes baixas são as mais conservadoras. Educação não correlaciona com progressismo.
Por que o Debuste Precisa Acabar
A insistência em descredibilizar o pobre de direita revela um projeto de poder fracassado. A esquerda, ao substituir diálogo por deboche, perdeu a capacidade de representar quem mais precisaria dela. Enquanto isso, a direita — nem sempre por virtude, mas por pragmatismo — capturou o descontentamento de milhões com o status quo.
O pobre de direita existe porque ele não precisa da permissão do rico de esquerda para pensar. A incapacidade de entender isso só prova que a esquerda é a nova aristocracia.
Último Dado: Nas eleições de 2022, Tarcísio de Freitas (direita) venceu em 72% das favelas de São Paulo. O motivo? Seu discurso anti-burocracia e pró-microempreendedor.
A mensagem é clara: o pobre não é um projeto ideológico. É um agente político autônomo — e quem não entender isso continuará perdendo eleições.
A esquerda elitista não odeia o pobre de direita por ele ser "irracional". Odeia porque ele desafia o monopólio moral que ela construiu sobre a miséria alheia. Enquanto isso, o pobre segue sua vida, ignorando os berros de quem acha que sabem mais da sua vida que ele mesmo.
Pergunta Retórica (Para Incomodar):
Se a esquerda é tão sábia, por que não usa essa sabedoria para entender que pobre também cansa de ser tratado como cachorro que late no ritmo errado?
Fontes Citadas:
- Latinobarómetro (2022)
- IPEC (2023)
- USP (2021): "Segurança Pública e Percepções nas Favelas Cariocas"
- FGV (2020): "Informalidade e Tributação no Brasil"
- Datafolha (2023): "Perfil Religioso do Eleitorado Brasileiro"
- Atlas Intel (2022): "Autopercepção das Classes Baixas"
- Pew Research (2020): "Voting Patterns by Income in the U.S."
- TSE (2023): "Perfil Socioeconômico dos Filiados Partidários"
Leitura Recomendada para Esquerdistas:
- "Fome de Poder: Por que o Pobre Brasileiro Abandonou a Esquerda" (Fernando Schüller, 2023)
- "A Revolução dos Conservadores: Religião e Política nas Periferias" (Juliano Spyer, 2021)
- "Direita e Esquerda: Razões e Paixões" (Demétrio Magnoli, 2019) -
@ 878dff7c:037d18bc
2025-03-09 20:49:43Undocumented Commands Found in ESP32 Bluetooth Chip Used by Over a Billion Devices
Summary:
Researchers from Tarlogic Security have discovered 29 undocumented vendor-specific commands in the ESP32 microcontroller, manufactured by Espressif and widely used in over a billion IoT devices as of 2023. These hidden commands enable low-level control over Bluetooth functions, including memory manipulation (reading/writing RAM and Flash), MAC address spoofing (device impersonation), and LMP/LLCP packet injection. Such capabilities could allow attackers to spoof trusted devices, access unauthorized data, pivot to other networked devices, and establish long-term persistence. The issue, now tracked as CVE-2025-27840, was presented at RootedCON in Madrid. Espressif has not publicly documented these commands, raising concerns about potential exploitation.:contentReference[oaicite:0]{index=0}
Sources: BleepingComputer - 8 March 2025, Tarlogic - 6 March 2025, NVD - 8 March 2025
Fresh Flood Crisis Hits Gold Coast and Brisbane
Summary:
Brisbane's south, Ipswich, Logan, and the Gold Coast have been severely affected by Cyclone Alfred, resulting in significant flooding. An emergency alert advised residents in flood-prone areas to stay inside and seek higher ground. The cyclone, initially thought to have weakened, surprised many with destructive 100km/h winds. Brisbane experienced severe flash flooding, impacting homes, streets, and public transport. Heavy rainfall is anticipated to continue, with predictions of up to 500mm in the next 48 hours. While some schools and public services are resuming, many areas remain critically affected by power outages and infrastructure damage. Premier David Crisafulli emphasized the importance of safety and recovery efforts, urging continued caution.
Sources: The Courier-Mail - 10 March 2025, News.com.au - 10 March 2025
Thousands Without Power as Storm Alfred Lashes Queensland
Summary:
Tens of thousands of Australians in Queensland were left without power as the downgraded Tropical Cyclone Alfred brought heavy rains, damaging winds, and flooding. The Gold Coast was the hardest hit, with over 112,000 outages, while a total of approximately 316,540 people in southeast Queensland were affected. Despite preparations, the storm's severe conditions also impacted New South Wales, prompting significant efforts and responses from local and federal authorities. Prime Minister Anthony Albanese emphasized the serious flood risks in affected areas. The Bureau of Meteorology forecasted ongoing heavy rains and winds. Brisbane Airport reopened but warned of potential disruptions, and decisions regarding the reopening of about 1,000 schools affected by the weather were pending. The community spirit remained strong despite the adverse conditions. On Saturday, an individual died in northern New South Wales floodwaters, and a collision involving military vehicles resulted in injuries to several officers.
Sources: Reuters - 10 March 2025, AP News - 9 March 2025
Concerns Over Potential Advertising Bans by Minority Governments
Summary:
Australia's political landscape is shifting as disillusioned voters increasingly support independents and minor parties. This trend could lead to a minority Labor or Coalition government after the next federal election, creating potential uncertainties for businesses. Independent parties are advocating for broad advertising bans on industries such as gambling, alcohol, and unhealthy food, which could significantly impact the economy. These bans, especially on food and beverages, could devastate manufacturers and farmers, exacerbating the ongoing cost-of-living crisis. Current consumer research indicates that Australians prefer health education and subsidies for nutritious foods over further advertising prohibitions. Evidence from global instances suggests that such advertising bans have not effectively reduced obesity rates. In this volatile political and economic situation, pragmatic leadership is essential to balance public health and economic sustainability.
Sources: The Australian - 10 March 2025
Proposed Freeze on Tobacco Tax to Recover Government Funds
Summary:
A report from Tulipwood Economics for the Australian Association of Convenience Stores (AACS) suggests that freezing tobacco excise, allowing regulated vapes, and targeting illicit sellers could secure up to $18.6 billion in revenue for the Australian Federal Government. This revenue could fund essential public services such as schools, social housing, and hospitals. The report criticizes the current approach of frequent tax hikes on tobacco, noting that higher taxes have driven smokers towards the black market, increasing criminal activity and reducing government revenue. The opposition Coalition's plan to reintroduce regulated vapes and consider freezing tobacco taxes is praised for addressing the crisis. Master Grocers Australia also supports a tax freeze, emphasizing that the government's current policy inadvertently supports criminal enterprises. The call is for a significant policy rethink to ensure smokers use legal, taxed products, thereby benefiting Australia's economy and public health.
Sources: Herald Sun - 10 March 2025
U.S. Pentagon Nominee Questions Submarine Sales to Australia Amid Taiwan Tensions
Summary:
Elbridge Colby, nominated by President Trump for undersecretary of defense for policy, has raised concerns about the AUKUS agreement, which involves selling U.S. Virginia-class nuclear-powered submarines to Australia. Colby emphasizes the strategic importance of these submarines for defending Taiwan and highlights potential risks to U.S. forces if they are sold to Australia, citing production and deployment challenges. He suggests that Australia invest in other military capabilities instead.
Sources: The Guardian - 9 March 2025
Australia Faces Imminent U.S. Tariffs on Steel and Aluminium
Summary:
The United States is set to impose tariffs on Australian steel and aluminium starting Wednesday. Prime Minister Anthony Albanese is currently prioritizing the aftermath of Cyclone Alfred, while Trade Minister Don Farrell has not advanced plans to visit the U.S. to discuss the tariffs. Influential advisers to President Trump are urging against tariff exemptions for Australia, and there are concerns that negative comments from Australian officials may influence the U.S. stance on exemptions.
Sources: The Australian - 10 March 2025
Rising Refinery Emissions Raise Health Concerns in Geelong
Summary:
Residents in North Geelong, particularly David Dillon, have raised concerns over increasing sulfur dioxide emissions from the local Viva Energy refinery. Emissions have risen from 1,685,843 kg in 2017 to 2,528,475 kg in 2024. Health statistics indicate higher rates of lung conditions and heart disease in nearby communities. While Viva and the EPA assert that emissions are within legal limits, residents call for increased monitoring and scrutiny.
Sources: Herald Sun - 6th March 2025
Urgent Recall of Google Pixel 4a Smartphones Due to Fire Risk
Summary:
The Australian Competition and Consumer Commission (ACCC) has issued an urgent recall for Google Pixel 4a smartphones due to a potential fire hazard associated with battery overheating. Users are advised to ensure their devices have received the latest firmware update and may be eligible for refunds.
Sources: news.com.au - March 9, 2025
Peter Dutton Vows to Declare National Anti-Semitism Emergency
Summary:
Opposition Leader Peter Dutton has pledged that, if elected, a Coalition government under his leadership will declare a national emergency on anti-Semitism in Australia. He plans to incorporate education against Jewish hatred into the national curriculum, aligning with a comprehensive strategy proposed by the Executive Council of Australian Jewry (ECAJ). The ECAJ's 15-point plan includes the creation of a counter-terrorism taskforce to address anti-Semitic threats and public awareness campaigns. While the Coalition has endorsed federal responsibilities within the plan, a response from Prime Minister Anthony Albanese is pending. The ECAJ expects both parties to clarify their positions before the upcoming election to ensure leadership on this critical issue.
Sources: The Daily Telegraph - 10 March 2025
Newspoll Indicates Potential Hung Parliament in Upcoming Election
Summary:
A recent Newspoll suggests that while support for Prime Minister Anthony Albanese has risen, it may not be sufficient for Labor to secure a majority, pointing towards a likely hung parliament in the forthcoming federal election. The Coalition currently leads Labor by seven points in primary votes; however, a majority of voters perceive the Coalition as not yet ready to govern after a single term in opposition. Both major parties may need to seek support from independents and minor parties to form a minority government. Albanese holds a slight advantage as the preferred Prime Minister, leading Peter Dutton by nine points, while Dutton's approval ratings have declined. The survey highlights public skepticism regarding the Coalition's preparedness to govern, particularly among younger and middle-aged voters, as well as women.
Sources: The Australian - 10 March 2025
Treasurer Plans to Maintain Spending Levels in Upcoming Budget
Summary:
Treasurer Jim Chalmers intends to avoid significant spending cuts or new revenue measures in the forthcoming March budget. This approach aims to fund costly election commitments and provide cost-of-living relief packages, especially in light of the financial impact of Cyclone Alfred. The government plans to maintain increased spending on health, education, and emergency management services, with no major tax reforms anticipated. This strategy is expected to be a focal point in the lead-up to the anticipated election in May.
Sources: The Australian - March 10, 2025
Social Security Payments Set to Increase from March 20
Summary:
The latest indexation of social security payments will take effect on March 20, providing financial boosts to millions of Australians. Single aged pensioners will receive an additional $4.60 per fortnight, while couples will get an extra $7, bringing their payments to $1,149 and $866.10 respectively. JobSeeker recipients will also see increases, with singles receiving an extra $3.10 and couples $2.80 per fortnight. These adjustments aim to ease cost-of-living pressures and reflect the government's commitment to strengthening the social security system.
Sources: news.com.au - March 10, 2025
-
@ 401014b3:59d5476b
2025-03-09 20:16:31Alright, football heathens, it’s March 3, 2025, and we’re wading into the NFC South like it’s a gator-infested bayou with a keg on the bank. Free agency’s a sweaty mess, the draft’s a blind grab, and this division’s always a rollercoaster of hope and hilarity. The Bucs held it down in 2024, the Falcons flirted with glory, the Saints stayed scrappy, and the Panthers… well, they tried. Let’s slap some records on this mess and see who’s got the chops to take the South. Here we go, fam—grab a sweet tea and let’s roll.
Tampa Bay Buccaneers: 10-7 – Baker’s Still Cooking
The Bucs owned the NFC South in 2024, and 2025’s looking like another hot dish. Baker Mayfield’s slinging it to Mike Evans and Chris Godwin (if he's back), while Rachaad White keeps the ground game spicy (also contingent on him coming back). That defense—Vita Vea, Calijah Kancey—is a wall when healthy. Antoine Winfield Jr. might chase a payday, and the O-line’s got holes. Still, 10-7’s the call, division champs again. Tampa’s got that pirate swagger—good luck prying the crown off ‘em.
Atlanta Falcons: 9-8 – Penix’s Big Swing
The Falcons turned heads in 2024 with Kirk Cousins, but 2025’s likely a Michael Penix Jr.’s show. The rookie’s got Bijan Robinson, Drake London, and Kyle Pitts to play with—talk about a loaded sandbox. The defense—Grady Jarrett, A.J. Terrell—holds its own, but free agency could sting. Jessie Bates III might test the market, and the secondary’s thin. 9-8’s where they land, maybe a wildcard if Penix pops off. Atlanta’s close, but not quite king yet.
New Orleans Saints: 7-10 – Carr’s Last Hurrah?
The Saints hung around in 2024, and 2025’s a gritty grind. Derek Carr’s got Chris Olave and Rashid Shaheed to sling it to, but the run game’s a question mark without Alvin Kamara’s prime juice. The defense—with stars like Cam Jordan—still fight, but age is creeping, and free agency looms. Tyrann Mathieu might dip, and the cap’s a nightmare. 7-10’s the vibe—not awful, not great. New Orleans is treading water ‘til the rebuild hits.
Carolina Panthers: 5-12 – Bryce’s Baby Steps
The Panthers were a dumpster fire in 2024, but 2025’s got a flicker. Bryce Young’s got Xavier Legette to throw to, and Chuba Hubbard’s a sneaky RB gem. The defense—Jaycee Horn, Jadeveon Clowney—shows teeth, but the O-line’s shaky, and free agency might swipe Ejiro Evero’s scheme elsewhere. 5-12’s the harsh reality—progress, not playoffs. Carolina’s climbing, but it’s a slow crawl outta the basement.
The Final Jambalaya
The NFC South in 2025 is a Tampa takeover with a Falcon tease. The Bucs (10-7) snag the title because Baker’s got that dawg in him, the Falcons (9-8) flirt with a wildcard, the Saints (7-10) scrap by, and the Panthers (5-12) lag behind. Free agency’s the curveball—lose a stud, you’re sunk; keep ‘em, you’re sizzling. Hit me on X when I botch this, but this is my NFC South sermon. Let’s ride, degenerates.
-
@ c1e9ab3a:9cb56b43
2025-03-09 20:13:44Introduction
Since the mid-1990s, American media has fractured into two distinct and increasingly isolated ecosystems, each with its own Overton window of acceptable discourse. Once upon a time, Americans of different political leanings shared a common set of facts, even if they interpreted them differently. Today, they don’t even agree on what the facts are—or who has the authority to define them.
This divide stems from a deeper philosophical rift in how each side determines truth and legitimacy. The institutional left derives its authority from the expert class—academics, think tanks, scientific consensus, and mainstream media. The populist right, on the other hand, finds its authority in traditional belief systems—religion, historical precedent, and what many call "common sense." As these two moral and epistemological frameworks drift further apart, the result is not just political division but the emergence of two separate cultural nations sharing the same geographic space.
The Battle of Epistemologies: Experts vs. Tradition
The left-leaning camp sees scientific consensus, peer-reviewed research, and institutional expertise as the gold standard of truth. Universities, media organizations, and policy think tanks function as arbiters of knowledge, shaping the moral and political beliefs of those who trust them. From this perspective, governance should be guided by data-driven decisions, often favoring progressive change and bureaucratic administration over democratic populism.
The right-leaning camp is skeptical of these institutions, viewing them as ideologically captured and detached from real-world concerns. Instead, they look to religion, historical wisdom, and traditional social structures as more reliable sources of truth. To them, the "expert class" is not an impartial source of knowledge but a self-reinforcing elite that justifies its own power while dismissing dissenters as uneducated or morally deficient.
This fundamental disagreement over the source of moral and factual authority means that political debates today are rarely about policy alone. They are battles over legitimacy itself. One side sees resistance to climate policies as "anti-science," while the other sees aggressive climate mandates as an elite power grab. One side views traditional gender roles as oppressive, while the other sees rapid changes in gender norms as unnatural and destabilizing. Each group believes the other is not just wrong, but dangerous.
The Consequences of Non-Overlapping Overton Windows
As these worldviews diverge, so do their respective Overton windows—the range of ideas considered acceptable for public discourse. There is little overlap left. What is considered self-evident truth in one camp is often seen as heresy or misinformation in the other. The result is:
- Epistemic Closure – Each side has its own trusted media sources, and cross-exposure is minimal. The left dismisses right-wing media as conspiracy-driven, while the right views mainstream media as corrupt propaganda. Both believe the other is being systematically misled.
- Moralization of Politics – Since truth itself is contested, policy debates become existential battles. Disagreements over issues like immigration, education, or healthcare are no longer just about governance but about moral purity versus moral corruption.
- Cultural and Political Balkanization – Without a shared understanding of reality, compromise becomes impossible. Americans increasingly consume separate news, live in ideologically homogeneous communities, and even speak different political languages.
Conclusion: Two Nations on One Land
A country can survive disagreements, but can it survive when its people no longer share a common source of truth? Historically, such deep societal fractures have led to secession, authoritarianism, or violent conflict. The United States has managed to avoid these extremes so far, but the trendline is clear: as long as each camp continues reinforcing its own epistemology while rejecting the other's as illegitimate, the divide will only grow.
The question is no longer whether America is divided—it is whether these two cultures can continue to coexist under a single political system. Can anything bridge the gap between institutional authority and traditional wisdom? Or are we witnessing the slow but inevitable unraveling of a once-unified nation into two separate moral and epistemic realities?
-
@ 06639a38:655f8f71
2025-03-09 19:54:07FOSDEM
I do know about the presence of this conference for many years, but I never attended it (and it's just around the corner for me coming from the south of The Netherlands). Attending FOSDEM with Nostr was quite a no-brainer to me. FOSDEM has the perfect tech-savy audience who will understand the protocol pretty quick. Our main goal would be to explain Nostr as a protocol and what new kind of applications can be build with it (and why we need it). During Bitcoin Amsterdam 2024 I proposed the idea for applying with a Nostr stand at FOSDEM '25 to @npub1l77twp5l02jadkcjn6eeulv2j7y5vmf9tf3hhtq7h7rp0vzhgpzqz0swft and @npub1hz5alqscpp8yjrvgsdp2n4ygkl8slvstrgvmjca7e45w6644ew7sewtysa.
Jurjen and I created the application on October 29 2024. Without any expectations as no one knew what kind of policy they have. As a result we were really excited when we heard that our submission was approved (16 November 2024). Two weeks later we also proposed a main talk about Nostr (1 december 2024) and again we very surpised it was accepted (10 January 2025)!
Now it was time for us to work out all of the plans we had:
- Design and print promotional items
- Flyers
- Stickers
- NIP-01 folder
- Banners
- Gather all the equipment we need to demo Nostr stuff at the stand
- Book accomodations
- Prepare a keynote
- Start a Geyser fundraiser to cover all the expenses as much as possible
On the 21th of January we launched our Geyser project and with one very generous donation we already achieved our funding goal within just ONE hour! Wow!!!
Friday
In the evening Jurjen organized a Nostr fringe at the place of Commons Hub Brussels. Around 25 people joined, so that was a pleasant surpise so many showed up and shared their interest into Nostr.
Saterday
We're arrived a bit too late as the venue was already packed with a lot of people! For the first hours we had no power, so we our computer screen with the slides was not. What we saw immediately was the huge interest in stickers. Not only our Nostr stickers, but in general you can grab stickers everywhere on each stand. People at FOSDEM like stickers a lot!
We were there with five and during the whole day all of use had conversations explaining Nostr or having related discussions around social media and centralisation.
Video: https://nostrver.se/sites/default/files/2025-02/IMG_2322.mp4
Sunday
This day was less crowded than the day before so we had a bit more room to breath, relax and explore other areas of the conference.
In the afternoon it was up to Constant to give his Nostr keynote at one of the two mainstages of FOSDEM.
The recording is available here on fosdem.org and on YouTube.
All the keynotes slides can be found here.Learnings / insights
- We need to be there again next year !!!
- We had zero inconvenient moments or unreasonable debates.
- Some attendees are pretty hardcore as one of them visited the stand the second time after when he installed the Gossip client on his PostmarketOS powered phone asking how to proceed using Nostr. People at FOSDEM are not normal ;-)
- Many people do ask why Nostr is here as another social media protocol.
- Questions about the differences with other protocols are very common, mentioning ActivityPub and ATproto.
- Almost everyone knows what Mastodon and the fediverse is.
- Had some questions how private Nostr is, so this confirms that we really need the private stuff for Nostr.
- At many moments it was hard to understand each other due all the noise from other people. Especially when you're speaking not your native language.
- When talking about using a private key you get really good questions how convient it could be (or not as some really don't believe it can work for normies) used in the context of social media. As in how often you will need this key for the actions you take using a Nostr client. A topic also very well explained by Constant in the Nostr main talk.
- We had 500+ stickers, but we needed more as we ran out of them during the Sunday morning.
- We handed-out around 400-500 NIP-01 folders.
- We handed-out almost 1000 A5 flyers.
- We did almost no onboardings but that's fine. FOSDEM attendees are tech-savy and will find their own way using the Nostr with some client. We were not there telling people what they should do.
- We need more merchandise next year. There were some stands with outstanding merchandise and I'm sure Nostr can offer the same (even better!) with the many talented creatives we already have in the community.
- Having just one table with a size of 180x80 (just like any other stand) you really have to choice what to display and not. Being there with 5-6 people was just enough as we all were quite surprised with the amount of interest.
- The FOSDEM organisation asked us multiple times how things were going. Especially with the announced protests against Jack Dorsey they were curious we didn't have any inconvenient moments. We really appreciate that!
- Overall we had the feeling that we were very welcome and we had a great opportunity to introduce Nostr to a new audience.
The team 💜
- @npub1equrmqway3qxw3dkssymusxkwgwrqypfgeqx0lx9pgjam7gnj4ysaqhkj6
- @npub1l77twp5l02jadkcjn6eeulv2j7y5vmf9tf3hhtq7h7rp0vzhgpzqz0swft
- @npub1r30l8j4vmppvq8w23umcyvd3vct4zmfpfkn4c7h2h057rmlfcrmq9xt9ma
- @npub1t6jxfqz9hv0lygn9thwndekuahwyxkgvycyscjrtauuw73gd5k7sqvksrw
- @npub1rfw075gc6pc693w5v568xw4mnu7umlzpkfxmqye0cgxm7qw8tauqfck3t8
- And me ;-)
If you're curious what we have spent, please have a look at this document.
Debugging Nostr AUTH with PHP
The week after FOSDEM I spent some hours on debugging these issues:
As a result and with some help of @npub1acg6thl5psv62405rljzkj8spesceyfz2c32udakc2ak0dmvfeyse9p35c I submitted this merge request for the `sirn-se/websocket-php` package used in the Nostr-PHP library to fix connection errors on relays (WebSocket servers) which don't response with a reason when the HTTP connection is upgraded to the WebSocket protocol.
Nostr-PHP development
Next month (March) I will pick up my development on Nostr-PHP again.
- Finish up the NIP-19 integration
- Pick up the work on async and concurrent requests with websockets
- Create more examples
- Create examples using the Symfony and Laravel framework
- Take care of incoming merge requests with new features (thanks Djuri)
As of that moment I also will be publishing my weekly reports here sharing the stuff I did around Nostr.
- Design and print promotional items
-
@ 29216785:2a636a70
2025-03-09 19:36:24Just a test long-form content
-
@ 2f9f26f9:aef5bbef
2025-03-09 18:54:51When you’re thinking about sod installation, it’s easy to get caught up in the immediate results—lush, green grass that instantly transforms your yard. But have you ever considered how your choices impact the environment? Eco-friendly sod installation isn’t just a trend; it’s a necessity for those who care about sustainability. Here’s how you can achieve a beautiful lawn while minimizing your ecological footprint.
Choosing the Right Sod for Your Climate
Not all sod is created equal. The type of grass you select plays a huge role in how much water, fertilizer, and maintenance it will require. For instance, if you live in a dry region, opting for drought-resistant varieties like Bermuda grass or Buffalo grass can save thousands of gallons of water annually. On the other hand, cool-season grasses like Kentucky Bluegrass thrive in northern climates but may require more irrigation in hotter areas. Always research which sod types are native or well-adapted to your region—this small step can make a massive difference in resource conservation.
Soil Preparation: The Foundation of Success
Before laying down sod, your soil needs to be in top condition. Start by testing the soil’s pH levels; most grasses prefer a pH between 6.0 and 7.0. If the soil is too acidic or alkaline, amend it with organic compost or lime. This not only improves the soil structure but also reduces the need for synthetic fertilizers later on. A well-prepared soil bed ensures better root establishment, which means your sod will require less water and maintenance over time.
Water-Efficient Irrigation Systems
Once your sod installation is complete, watering becomes critical. But here’s the thing: overwatering is just as harmful as underwatering. Investing in a smart irrigation system with rain sensors and soil moisture sensors can help you optimize water usage. For example, rotary nozzles are excellent for delivering water evenly across the lawn, reducing runoff and evaporation. Pair this with a zoned irrigation system, and you’ll ensure that each section of your lawn gets the precise amount of water it needs. This approach not only conserves water but also prevents issues like fungal growth caused by excessive moisture.
Organic Fertilizers and Pest Control
After sod installation, it’s tempting to reach for chemical fertilizers to speed up growth. However, these products often contain harmful substances that can leach into groundwater and harm local ecosystems. Instead, opt for organic fertilizers like compost tea or fish emulsion, which provide essential nutrients without the environmental toll. Similarly, for pest control, consider natural solutions like neem oil or beneficial nematodes. These methods are safer for the environment and promote a healthier lawn in the long run.
Mulching and Mowing: Small Changes, Big Impact
Mulching isn’t just for garden beds—it can also benefit your sod. After installation, apply a thin layer of organic mulch around the edges to retain moisture and suppress weeds. When it comes to mowing, follow the “one-third rule”: never cut more than one-third of the grass blade at a time. This encourages deeper root growth and reduces stress on the grass. Additionally, leave the grass clippings on the lawn; they act as a natural fertilizer, returning nutrients to the soil.
The Role of Aeration in Eco-Friendly Lawns
Over time, soil compaction can hinder water absorption and root growth. That’s where aeration comes in. By creating small holes in the soil, you allow air, water, and nutrients to penetrate deeper, promoting healthier grass. For eco-friendly sod installation, consider using a manual core aerator or renting an electric one. This simple step can significantly reduce the need for excessive watering and fertilizing.
Rainwater Harvesting: A Sustainable Water Source
Why rely solely on municipal water when you can harness rainwater for your sod? Installing a rain barrel or a more advanced rainwater harvesting system can provide a free, sustainable water source for your lawn. This is especially useful during dry spells when water restrictions may be in place. Plus, rainwater is naturally soft and free of chemicals, making it ideal for your grass.
The Importance of Proper Drainage
Poor drainage can lead to waterlogged soil, which is detrimental to sod health. Before installation, assess your yard’s drainage patterns. If necessary, incorporate French drains or swales to direct excess water away from the lawn. Proper drainage not only prevents root rot but also ensures that water is used efficiently, reducing waste.
Eco-Friendly Tools and Equipment
The tools you use for sod installation and maintenance matter too. Opt for electric or battery-powered lawn mowers and edgers instead of gas-powered ones. These produce fewer emissions and are quieter, making them a better choice for the environment. Similarly, choose hand tools made from recycled materials whenever possible.
Long-Term Maintenance: Keeping It Green
Eco-friendly sod installation doesn’t end once the grass is laid. Regular maintenance is key to sustaining a healthy, sustainable lawn. Monitor your lawn’s health by checking for signs of stress, such as discoloration or thinning. Adjust your watering schedule based on seasonal changes, and continue to use organic products for fertilization and pest control. By staying proactive, you can enjoy a vibrant lawn without compromising your environmental values.
Final Thoughts
Eco-friendly sod installation is more than just a method—it’s a mindset. By making thoughtful choices at every step, from selecting the right sod to implementing water-saving irrigation systems, you can create a lawn that’s both beautiful and sustainable. Remember, every small action adds up, and your efforts can have a lasting impact on the planet. So, the next time you think about sod installation, think green—literally and figuratively.
-
@ b5b91959:134a187a
2025-03-09 16:41:42Weer schoolverhaal van kind uit de familie; "De **en uit de klas hebben van die mevrouw El C allemaal een code gekregen zodat ze wel op ChatGPT kunnen om alles te helpen invullen, de andere (lees: witte) leerlingen krijgen die code niet". En uiteraard is zo'n leerkracht die zo'n dingen regelt dan een fervente subsidie-slurper in de culturele sector + pvda aanhang (what else). Wanneer je dan hoort hoe een klacht over ongelijke behandeling (en soms ook racsisme) wordt behandeld door de "ons-kent-ons" bende (9/10 met sjaalte) op zo'n school kan je enkel concluderen dat het hier finaal om zeep is. Men heeft liever dat men punten gratis kan weggeven en diploma's aan copy-paste lomp volk, dan dat er nog onderwijs wordt gegeven. Let it all burn.
Weer schoolverhaal van kind uit de familie; "De *******en uit de klas hebben van die mevrouw El C***** allemaal een code gekregen zodat ze wel op ChatGPT kunnen om alles te helpen invullen, de andere (lees: witte) leerlingen krijgen die code niet".
En uiteraard is zo'n leerkracht die zo'n dingen regelt dan een fervente subsidie-slurper in de culturele sector + pvda aanhang (what else).
Wanneer je dan hoort hoe een klacht over ongelijke behandeling (en soms ook racsisme) wordt behandeld door de "ons-kent-ons" bende (9/10 met sjaalte) op zo'n school kan je enkel concluderen dat het hier finaal om zeep is.
Men heeft liever dat men punten gratis kan weggeven en diploma's aan copy-paste lomp volk, dan dat er nog onderwijs wordt gegeven.
Let it all burn.
-
@ 42342239:1d80db24
2025-03-09 15:22:43Last fall, Italian economist Mario Draghi, former head of the European Central Bank (ECB), published his 400-page report on Europe's (actually the EU's) competitiveness. Draghi's verdict was harsh: Europe is facing an "existential challenge." It's hard to disagree. While the EU is launching new regulations on plastic corks and hiding text messages from the public, Elon Musk is changing the world with groundbreaking innovations in the automotive, robotics, and space industries.
At the same time that the EU is not only preventing people from trying new things but also preventing them from even thinking about trying, Musk's space company SpaceX is capturing massive star rockets with "chopstick grips". While the EU is stuck in an ocean of meaningless bureaucratic details, Musk is engaged in a process of constant testing and improvement, reminiscent of the natural course of decentralized systems.
The EU's meager economic growth can be compared to a ticking time bomb that threatens to explode in all of our faces. Disposable incomes have increased nearly twice as much in the US compared to the EU since 2000, and this is a difference that is noticeable not only in our standard of living but also in our opportunities for leisure time. As the late economist Robert Lucas said, "Once you start thinking about growth, it's hard to think about anything else." Perhaps the best thing that can be said about the report is that its abundance of words, numbers, and images underscores how bad things are. And perhaps it has therefore become impossible for the EU's leaders to continue ignoring the union's problems.
Like giving a shark responsibility for beach safety
However, asking a former EU president to investigate and propose changes is like giving a shark responsibility for beach safety. Among other things, he proposes larger allocations for research and development, even though the EU already spends more than the US as a percentage of GDP - it's thus impossible for this to be the problem. It comes as no surprise that the proposals are about more centralization, harmonization, and streamlining - i.e., continuing in the same old tracks. While Musk seems to have an intuitive understanding of how knowledge arises through real-world experiments , what is proposed here is more of the administrative bureaucracy's preconceived five-year plans. The bureaucracy is to be given free rein, and the nations are to be pushed back - a repeat of a theme we know all too well. Centralization undermines real knowledge growth, which may explain why the EU is falling behind.
A venomous snake that is ignored
Rent-seeking is like a venomous snake that slithers through the EU's corridors, but the concept is conspicuous by its absence in Draghi's report. It is a well-known phenomenon where companies spend resources on influencing decision-makers to gain advantages instead of creating value. The EU bureaucracy has produced a total of 13,000 legislative acts since 2019 - more than four times as many as the US. How many of these have received an invisible stamp of approval from lobbyists? Economist Jeffrey Sachs has warned that American lobbying in Brussels is so dominant that it affects all decision-making in the digital economy, which may be one of the EU's biggest problems. GDPR regulations, for example, are estimated to have reduced small tech companies' profits by 15% (!).
Size is not everything
Small businesses are the invisible heroes that contribute most to productivity and employment growth. These are being suffocated by the ECB's actions and the constantly increasing and inefficient regulatory mess. The ECB's war on small banks hampers growth for small businesses because large banks prioritize large transactions. Big computers' algorithms cannot replace small banks' local knowledge. Harmful regulations and grandiose dreams lead to a loss of both knowledge and growth.
What should the end goal be?
Sweden's daily Dagens Industri's editorial page recently wrote that "Defeat is not an option" on the theme of green transition. It asked whether "free democracies or a Chinese dictatorship should lead the way." Large-scale industrial projects and plans can undoubtedly provide benefits. But it's worth questioning whether Europe should really have the same end goal as China.
During both the Renaissance and the Industrial Revolution, decentralized power structures played a crucial role. During the Renaissance, states and cities were relatively independent. Power was decentralized to princes, nobles, and merchants. The Church had an important role, but it was not as centralized as it would become. Florence, Venice, and Amsterdam could develop different scientific and artistic traditions. When one region encountered problems, other regions could continue to develop and grow, and so on. At that time - even if the concept did not exist - it seemed to be understood that the economy is a complex system of the second order. Or a computationally irreducible one, as Stephen Wolfram would have expressed it.
In the book "The Art of War," Chinese General Sun Tzu wrote that "He who chooses the battlefield first will win. He who lets his opponent choose the battlefield will lose." Instead of striving to play on China's (alleged) centralized battlefield, perhaps we Europeans should consider returning to our roots. Do away with the bureaucracy's heavy foot and give power back to the individual! Scrap the monster banks and create conditions for small local banks instead. Stop subsidizing American IT giants' data centers and give every European an AI in their own hand. Forget the five-year plans and invest in decentralized economic experiments instead. Does that sound radical?
The word "radical" comes from the Latin word for root, radix . The word used to have a positive connotation because it implied a willingness to go to the root of the problem or to return to one's roots.
More of us should dare to question the modern structures that brought us to today's sad situation. Roots are a plant's strength - without them, it cannot grow and flourish. So it is with Europe. Our continent, which was once a thriving garden where ideas and innovations bloomed, needs to return to its roots to regain its former strength. This may be exactly what is required.
Put simply: a more radical Europe.
-
@ c69b71dc:426ba763
2025-03-09 14:24:35Time Change: A Mini Jet Lag
The time change is more than just setting the clock forward or backward — it can disrupt our internal balance and lead to a range of health issues. Find out why the time change causes a mini jet lag and how you can deal with it.
Why the Time Change Throws Us Off Balance
The expected energy savings due to reduced artificial lighting demand have not been confirmed. Worse yet, the time change leads to an increase in workplace and traffic accidents, a higher risk of heart attacks, and even an increase in suicide rates. Many people struggle with the one-hour shift that happens twice a year. There is constant debate about whether to abolish it and which time should remain permanent...
Permanent Summer Time or Permanent Winter Time?
The time change triggers a mini jet lag that can last from a single day up to three weeks as the body adjusts its internal clock to the new rhythm.
Winter Time Aligns Best with Our Internal Clock
Our bodies follow the circadian rhythm, an internal clock designed for activity during daylight and rest when the sun sets.
Permanent summer time would mean longer darkness in the morning and extended daylight in the evening—this unnatural shift would completely disrupt our biological processes.The Impact of Time Change on Our Health
Our internal clock regulates essential functions such as body temperature, hormone production, the cardiovascular system, and the sleep-wake cycle. This is why the time change often leads to headaches, fatigue, drowsiness, metabolic disorders, and even severe heart rhythm disturbances. Studies show that these disruptions can increase susceptibility to illnesses and psychological disorders.
Since the light-dark cycle dictates this internal clock, prolonged exposure to artificial light after sunset can shift it. When the time suddenly changes, it causes a disruption, throwing off our natural sleep rhythm.
Sleep Resets the Body!
During the night, the body regenerates:
- The brain is flushed with cerebrospinal fluid to clear out toxins.
- The body undergoes repair, detoxification, and waste removal.
- If the alarm clock rings an hour earlier, the body is still in "night mode" and unable to complete its recovery processes!Most people already suffer from sleep disorders, whether trouble falling asleep or staying asleep. Added to this is the stress of daily life, which often depletes serotonin levels, reducing the body’s ability to produce melatonin —the sleep hormone. Blue light depletes magnesium in our body, disrupts the circadian rhythm, and interferes with melatonin production! We also know that the pineal gland’s melatonin production is impaired by fluoride found in toothpaste, water, and food!
What Can You Do About Sleep Disorders?
To regulate your sleep rhythm, you need healthy sleep hygiene:
- Minimize activity before bedtime.
- Avoid artificial light from TVs, smartphones, and e-readers.
- Ensure fresh air and a cool bedroom (around 18°C/64°F).
- Stick to consistent sleep and wake times — even on weekends!
- Reserve the bed and bedroom for sleep only — no heated discussions. - No heavy meals before bed.
- Use blue light or orange filter glasses to reduce artificial light exposure. - Air out the bedroom for 20 minutes before going to bed. - Use candlelight in the bathroom while brushing your teeth instead of turning on the harsh neon light.If these adjustments don’t help, natural remedies, supplements, and herbal teas can provide support.
Natural Sleep Aids
Some well-known natural remedies include:
- Melatonin, Tryptophan, GABA, Magnesium
- Herbs such as Hops, Lavender, Chamomile, Passionflower, Valerian and organge peal and flower.By aligning with nature’s rhythm and optimizing sleep habits, we can counteract the negative effects of the time change and restore balance to our bodies and minds.
I hope this helps you transition smoothly through this outrageous act of forcing us into "summer time" ⏰🌞
-
@ 7d33ba57:1b82db35
2025-03-09 13:55:59Old Town Las Palmas de Gran Canaria, also known as Vegueta, is a charming historic district full of colonial architecture, cobbled streets, and cultural attractions. Here are some travel tips to make the most of your visit:
Top Things to Do
- Catedral de Santa Ana & Plaza de Santa Ana
- Climb to the rooftop for panoramic views.
-
Visit the stunning Gothic-Renaissance interiors.
-
Casa de Colón (Columbus House)
-
A must-see museum about Christopher Columbus and his travels.
-
Calle de los Balcones
-
Beautiful historic street with traditional Canarian wooden balconies.
-
Museo Canario
-
Learn about the indigenous Guanche people and their history.
-
Mercado de Vegueta
-
Try fresh tropical fruits, Canarian cheeses, and local delicacies.
-
Tapas & Wine at Calle Mendizábal
- Thursday nights are best for tapas hopping!
Local Food to Try
- Papas arrugadas con mojo (wrinkled potatoes with mojo sauce)
- Gofio (a traditional Canarian flour used in dishes)
- Ropa Vieja (shredded beef and chickpea stew)
Travel Tips
- Best Time to Visit: Early morning or late afternoon to avoid crowds.
- Walking: Wear comfortable shoes—streets are cobbled!
- Public Transport: Take the Guaguas (local buses) or rent a bike.
- Safety: It's a safe area, but watch for pickpockets in crowded spots.
- Nearby Attractions: Combine with a visit to Triana, the shopping district next door.
-
@ 2e8970de:63345c7a
2025-03-09 13:11:48Over the last weeks DOGE claimed to already have saved billions of Dollars. Numbers changing everyday but the main claims were between $105 and $175b even after retracting their statements about the 3 biggest savings. But no matter how you turn it, it is absolutely not true.
Best interpretation: they mean what the total will amount to in the future. Worst interpretation: this is a complete lie.
originally posted at https://stacker.news/items/908184
-
@ 41fa852b:af7b7706
2025-03-09 13:04:02"You can't stop things like Bitcoin. It will be everywhere, and the world will have to readjust." -- John McAfee
The US creates its Bitcoin Strategic Reserve, and the UK… well, the UK remains pretty clueless.
As always, the best advice is just to stay humble and stack sats.
We have two tickets to give away for the Bitcoin Ireland conference. To enter the competition, click here to submit your entry.
Let's look at what's happening this coming week…
This week's sponsor is…
Upcoming Bitcoin Meetups
Happening this week…
-
Dundee Bitcoin: Join them on the 2nd Monday of every month from 17:30 to 20:30 PM at The Wine Press, 16 Shore Terrace, Dundee DD1 3DN. This month's meetup is on Monday, 10th March. 🍻
-
Bitcoin Nottingham: The March Bitcoin Nottingham Meetup date for your diary is Monday the 10th at 18:00, at Carlton Town Football Club. 🍻
-
Lincolnshire Bitcoin: Another one on Monday. Lincolnshire Bitcoin meets on the second Monday of each month at 19:30 in the Treaty of Commerce, Lincoln. Open to all, from OG's to newcomers.🍺
-
Glasgow Bitcoin: A place for people in and around Glasgow to discuss Bitcoin. Meetups every second Wednesday of the month. This month on the 12th. They are at The Piper Bar, 57 Cochran St, G1 1HL. 🍺
-
Bitcoin Liverpool: Bitcoin Liverpool's next meetup is on Thursday, 13th March, at 18:30 at The Railway Pub, Tithebarn Street, L2 2DT. 🍺
-
[Bitcoin Beach Bournemouth](nostr:npub1va3773umzrydk4vd0q2xsnjg8qrsym7up9j9agnzcxd8u398wulq6kpxey: Every second Thursday of the month at Chaplins Cellar Bar. 529 Christchurch Road, Boscombe, United. You'll find them in the Cogg Room at 19:30. This month it's the 13th. 🍻
-
Bitcoin Walk - Edinburgh: Every Saturday they walk around Arthur's Seat in this historic city. Join them at 12 pm to chat about all things Bitcoin and keep fit. 🚶🏽♂️🚶🏼♀️🚶🏻
-
Real Bedford - Home Game: Peter MacCormack's boys are at home this Saturday playing Northwood. Join them for a 15:00 kickoff. ⚽️
New Businesses Accepting Bitcoin
This week we have…
- Hone and Strop: Hone & Strop Barbers in Holmfirth offers top-quality cuts in a friendly setting--now with the option to pay in Bitcoin! Located at 37 Huddersfield Road, they provide expert barbering with great service (and often a complimentary beer). Book an appointment at 01484 917469 and pay with magic internet money! 💈
Upcoming Special Events
These events aren't happening next week, but they're important to add to your calendar now as tickets are selling fast.
- CheatCode 2025 - Peter McCormack hosts the CheatCode conference, following last year's success. This year, international guest speakers include Preston Pysh, Alex Gladstein, Natalie Brunell, Matthew Pines, Steve Baker, Ben Arc, and Checkmate.
Friday, April 11th, is the main conference day, followed by a huge meetup at Ledger Park for the men's Real Bedford match, and again on Sunday for the women's match. Check out the link for ticket details.
- Bitcoin Ireland Conference 2025: Bitcoin Ireland is hosting its annual Bitcoin Conference, building on the momentum of previous years. This year Bitcoin Events UK are proudly serving as a media partner to help spread the word! Enter our competition to win two free tickets (€198 value). This year's lineup of international guest speakers includes Daniel Prince, alongside notable figures like Knut Svanholm, Dinny Collins, Lawrence-Stanley and other respected voices in the Bitcoin community, offering thoughtful perspectives on the evolving Bitcoin revolution.
The main conference takes place on Saturday, May 24th, at The Green Isle Hotel in Dublin. Following the event, attendees can join a relaxed networking meetup with Ireland's Bitcoin community to continue the discussion. For ticket details, visit: www.bitcoinireland.eu.
Get Involved
- Volunteer Opportunities: Bridge2Bitcoin is actively seeking volunteers who share our passion for merchant adoption. We'd be delighted to connect if you're eager to contribute. Reach out to us on Twitter or through our website.
- Start Your Own Meetup: Interested in launching a Bitcoin meetup? We're here to support you every step of the way. We've assisted numerous UK Bitcoin meetups in getting started. Get in touch via Twitter.
- Contribute to BTCMaps: BTCMaps is a vital part of the Bitcoin ecosystem. It's a perfect project to get involved with if you're not a coder or even that technical. A great way to give back to the community. Maintain an area of the UK and keep it up-to-date.
- Telegram users: You might find our Telegram Channel another useful way to keep up-to-date with UK meetups.
- Feedback and Suggestions: We value your input! Share your ideas on how we can enhance this newsletter.
This week's sponsors are…
Get out and support the meetups where you can, visit Bitcoin Events UK for more info on each meetup and to find your closest on the interactive map.
Stay tuned for more updates next week!
Simon.
-
-
@ 2e8970de:63345c7a
2025-03-09 10:10:10https://github.com/Svensson-Lab/pro-hormone-predictor/blob/cdb283afa4255d99a401c831dfe9ddc070e15b15/FastaParser.py#L32
Stanford just found a natural alternative to Ozempic using some clever regex on the human proteome.
Instead of manually searching through proteins, their one-liner “peptide predictor” regex narrowed down promising candidates.
The calculation likely took just a few seconds.
What I find amusing here is how you'd normally think "regex" is the clickbait euphemism. But it isn't. They're literally just using regex to go through human proteins lol
originally posted at https://stacker.news/items/908130
-
@ da0b9bc3:4e30a4a9
2025-03-09 07:38:43Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/908081
-
@ c913b8e3:8704332c
2025-03-09 07:13:10The markets are returning to normal? Everything was priced for perfection. The S&P 500 gaining over 30% for two consecutive years is not normal. Maybe we go back to a normal return of 4-8% per year? But really, what even is "normal" nowadays?
Passive investing is a huge problem, but that's a rant for another day. It's certainly not normal.
The past 5-6 years have nothing to do with real investing. It has become gambling and peak idiocy. Do I seriously think I'm smarter and can pick the right stocks? Does contrarian investing always work? Why has it worked lately?
People have become slaves to algorithms, completely losing the ability to think objectively. Just a massive idiotic blob bulldozing through logic.
Even very successful people have pitched meme stocks to me - stocks already up 300-500%, without real businesses behind them. What's the upside? Seriously, what's the point? If insiders are selling, the stock has soared hundreds of percent, isn't profitable, and your info comes from Reddit or X - stop and ask yourself, are you an idiot?
The market has been about predicting where this mindless blob moves next. Sorry, I missed the train that "Rearming Europe" would become the hot narrative, making European defense stocks the next "big thing." Or German cement business. This is exorbitant. I've said it for years: the market is turning into a cryptocasino. To succeed, you have to obsessively live and breathe the next trending narrative - it requires zero skill, just madness.
Politics mirror the market’s idiocy. Mention Trump here in Finland, and people lose their minds, incapable of rational discussion or seeing the bigger picture. I've lost friendships just by suggesting peace negotiations. Finnish media pushes a singular narrative through the same old fear-mongering analysts, conveniently now riding the EU gravy train to Brussels. How ironic.
Europe
Now the narrative is shifting to Europe. Europe is great! Or is it? Finnish politicians who once opposed collective EU debt now love it because "Russia." They're even ready to seize Russian assets.
Increasing defense spending might make sense, but funding it with debt? Even Germany, the last bastion of economic sense, is piling on debt, with Poland and the rest close behind. Hard work and tough decisions are too much effort - take on more debt!
Euro stocks might rise, but why own them? Europe lacks essential resources like raw materials, energy, oil - and frankly, competent leadership. Money won't fix structural problems.
In Finland, purchasing power has regressed 15-20 years. Are you ready for another hit?
Europe is slowly becoming more like Russia: bureaucratic, corrupt, and convinced that more central planning will magically solve everything. Good luck with that.
Maybe it's time we think less about ourselves and more about building something better for our kids. Otherwise, what are we even doing?The markets are returning to normal? Everything was priced for perfection. The S&P 500 gaining over 30% for two consecutive years is not normal. Maybe we go back to a normal return of 4-8% per year? But really, what even is "normal" nowadays?
Passive investing is a huge problem, but that's a rant for another day. It's certainly not normal.
The past 5-6 years have nothing to do with real investing. It has become gambling and peak idiocy. Do I seriously think I'm smarter and can pick the right stocks? Does contrarian investing always work? Why has it worked lately?
People have become slaves to algorithms, completely losing the ability to think objectively. Just a massive idiotic blob bulldozing through logic.
Even very successful people have pitched meme stocks to me - stocks already up 300-500%, without real businesses behind them. What's the upside? Seriously, what's the point? If insiders are selling, the stock has soared hundreds of percent, isn't profitable, and your info comes from Reddit or X - stop and ask yourself, are you an idiot?
The market has been about predicting where this mindless blob moves next. Sorry, I missed the train that "Rearming Europe" would become the hot narrative, making European defense stocks the next "big thing." Or German cement business. This is exorbitant. I've said it for years: the market is turning into a cryptocasino. To succeed, you have to obsessively live and breathe the next trending narrative - it requires zero skill, just madness.
Politics mirror the market’s idiocy. Mention Trump here in Finland, and people lose their minds, incapable of rational discussion or seeing the bigger picture. I've lost friendships just by suggesting peace negotiations. Finnish media pushes a singular narrative through the same old fear-mongering analysts, conveniently now riding the EU gravy train to Brussels. How ironic.
Europe Now the narrative is shifting to Europe. Europe is great! Or is it? Finnish politicians who once opposed collective EU debt now love it because "Russia." They're even ready to seize Russian assets.
Increasing defense spending might make sense, but funding it with debt? Even Germany, the last bastion of economic sense, is piling on debt, with Poland and the rest close behind. Hard work and tough decisions are too much effort - take on more debt!
Euro stocks might rise, but why own them? Europe lacks essential resources like raw materials, energy, oil - and frankly, competent leadership. Money won't fix structural problems.
In Finland, purchasing power has regressed 15-20 years. Are you ready for another hit?
Europe is slowly becoming more like Russia: bureaucratic, corrupt, and convinced that more central planning will magically solve everything. Good luck with that.
Maybe it's time we think less about ourselves and more about building something better for our kids. Otherwise, what are we even doing?
-
@ 6e0ea5d6:0327f353
2025-03-09 01:45:29Breaking a promise is like carrying a gun without ammunition. You raise your hand, make a threat, but when the shot is expected, nothing happens.
And what is worse than a man who makes empty promises? He inspires no trust, commands no respect; he is an imposter, a farce. An unkept word is like steel that rusts: dull, without edge, without honor. And what remains of a man who has no honor? Nothing! He is a walking corpse, awaiting the moment when he will be devoured by vultures that already scent him from afar.
When you speak, every syllable must be as heavy as lead, sharp as a Sicilian blade, and as final as a fatal blow. Words are not wind; they are hammers that build or destroy empires. A man who opens his mouth without being willing to stand by every word spoken is a fool building his own ruin with bricks of falseness. And let’s be clear: a fool doesn’t last long in this world of ours. He is swallowed, crushed, and spit out like remnants by the relentless machine of life. A word is your contract with the world, and breaking that contract is signing your sentence of social death.
Made a mistake? Bene, mistakes are inevitable. Ma, ecco il punto: the difference between an honorable man and a miserable one is how quickly he corrects the error. Letting a mistake grow is like allowing a snake to coil around your neck. With every passing minute, the noose tightens, the air runs out, and the only certainty is the approaching death. An uncorrected mistake is like poison running through your veins; the antidote is simple, but few have the courage to administer it. Correcting yourself is not a choice, it’s a matter of survival.
Only the weak cling blindly to their mistakes, preferring to sink into their illusions than face the weight of the truth. The true man, the one forged in fire and pain, reassesses, reconsiders, and changes course without hesitation. Persisting in error is the path of the defeated.
A man without his word is like a traitor, and you know very well the fate reserved for traitors. There is no forgiveness, no second chance. The traitor deserves no mercy; he is a dead weight that must be swiftly eliminated before he contaminates everything around him with the stench of his dishonor.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ f25afb62:8d50c6e7
2025-03-09 01:34:10The recent economic turmoil in New Zealand has reignited debates over the role of the Reserve Bank of New Zealand (RBNZ) in "engineering a recession." Many believe that the RBNZ’s decision to raise the Official Cash Rate (OCR) was the root cause of the downturn, but this narrative oversimplifies the reality.
Who Really Engineered the Recession?
Blaming the RBNZ for the recession ignores a fundamental truth: market interest rates were rising long before the OCR was adjusted. Bond yields, swap rates, and borrowing costs surged as the RBNZ stepped back from being the primary buyer of government bonds. When the RBNZ stopped paying artificially high prices (low yields) for bonds, the private sector had to price them instead, leading to yields rising back to real market interest rates. Meanwhile, the government continued to refinance its rolling debt at these higher rates, further driving up borrowing costs. The RBNZ, in hiking the OCR, was following the market interest rate, attempting to maintain credibility rather than dictating outcomes.
The real policy missteps were made much earlier:
-
Artificially Suppressing Interest Rates Through Money Printing\ The RBNZ engaged in Large-Scale Asset Purchases (LSAP), creating money out of thin air to buy government bonds. This artificially lowered yields, making it cheaper for the government to borrow and spend beyond its means. The result? Inflation surged as the economy was flooded with cheap money.
-
Funding for Lending Programme (FLP): Free Money for Banks\ The RBNZ offered near 0% loans to banks, allowing them to borrow at artificially low rates while lending at much higher rates. This wasn’t just monetary easing—it was a blatant distortion of the free market, reinforcing the Cantillon Effect, where those closest to the money printer benefit first.
-
Holding Rates Too Low for Too Long\ A 0% OCR in itself doesn’t cause inflation—what does is creating excess liquidity while artificially suppressing borrowing costs. Banks, instead of competing for deposits and lending productively, were incentivized to park money in assets like housing, fueling unsustainable bubbles.
When inflation inevitably took hold, the RBNZ had no choice but to raise rates aggressively. This wasn’t an effort to “engineer” a recession—it was damage control after prior policy failures. The claim that the RBNZ alone caused the recession is a convenient distraction from the real culprits: government overspending and central bank interventionism.
The Cycle of Blame: Central Bank Governors as Fall Guys
This cycle isn’t new. Central banks are officially independent, but in reality, they almost always align with the government of the day. The Large-Scale Asset Purchase (LSAP) program was effectively a way to finance government spending through money printing—something politicians would never admit outright. When the government needed funding for pandemic-era stimulus, the RBNZ obliged, creating \$50 billion out of thin air to buy government bonds and lower borrowing costs, making it easier for the Labour government to spend big.
Now, with a new government in power, they get to bring in their own person—likely someone who will align with their fiscal policies, just as Orr aligned with Labour's. This cycle plays out over and over again:
- Print money to fund government priorities.
- Blame the central bank for inflation or economic consequences.
- Replace the central bank governor with someone more aligned with the new government’s agenda.
- Repeat.
The “independent central bank” narrative is a useful tool for politicians to deflect blame. Labour can say, “Inflation wasn’t our fault, it was the RBNZ’s monetary policy!” Meanwhile, National can now install someone who will adjust policy to suit their needs while still claiming, “We respect the independence of the Reserve Bank!” This allows both parties to escape accountability, despite the fact that excessive government spending and central bank money printing go hand in hand.
This isn’t just a New Zealand issue—most central banks operate the same way. They provide the liquidity needed to keep government spending rolling, and when inflation or other economic problems arise, the governor becomes the convenient fall guy.
The Role of Bitcoin: An Exit From the Broken System
This cycle of money printing, asset bubbles, inflation, and central bank tightening isn’t unique to New Zealand—it’s the natural consequence of a system where central banks and governments have unchecked control over money. Bitcoin was created as a direct response to this very problem.
Bitcoin Fixes the Cantillon Effect
- Unlike fiat money, which is distributed to banks and institutions first, Bitcoin’s issuance is predictable and transparent. There are no backroom deals, no preferential access, no bailouts.
- Bitcoin doesn’t change its supply to accommodate political agendas. There is only one Bitcoin—just like there is only one Earth, and its land area cannot be expanded. It can be divided into 21 million equal-sized pieces called BTC or 2,100 trillion equal-sized pieces called sats.
- Bitcoin doesn’t grant special privileges. You either earn it, mine it, or buy it. No one gets first access at a discount.
Bitcoin Removes the Central Bank Middleman
- The RBNZ and other central banks manipulate money supply and interest rates to serve political and economic interests. Bitcoin’s monetary policy is fixed and free from human interference.
- No government can arbitrarily print Bitcoin to fund its spending or suppress its value.
- Bitcoin allows people to store their wealth without the risk of inflationary dilution or government confiscation.
Bitcoin Protects You from the Next Bailout
- Every time the financial system faces a crisis, governments and central banks shift the cost onto the public—through inflation, taxation, or outright financial repression.
- Bitcoin lets you opt out of this cycle. By holding Bitcoin, your savings remain secure, beyond the reach of reckless monetary policy.
- When the next crisis hits—and it will—Bitcoin holders won’t be left wondering how much purchasing power they’ve lost overnight.
A Strategic Shift: The U.S. Embraces Bitcoin
Recent developments in the U.S. signal a major turning point in how governments view Bitcoin. President Trump recently signed an Executive Order establishing a Strategic Bitcoin Reserve, marking the first time a nation has officially designated Bitcoin as a strategic asset. This reserve will be exclusively Bitcoin, initially seeded with Bitcoin seized through civil and criminal forfeitures, but with a commitment to acquiring more through budget-neutral strategies at no additional cost to taxpayers. This means that if the government can save money elsewhere, those funds can be redirected toward buying and holding Bitcoin as a permanent reserve asset.
The implications of this decision are profound:
- The U.S. acknowledges Bitcoin as fundamentally different from “crypto.” Altcoins and centralized tokens are being liquidated, while Bitcoin is being held as a permanent reserve.
- The government is shifting from selling confiscated Bitcoin to strategically accumulating it, positioning the U.S. as a key player in a Bitcoin-based financial future.
- Bitcoin mining is being embraced as a domestic industry, stabilizing power grids and reinforcing the U.S. as a leader in proof-of-work security.
This policy shift highlights what Bitcoiners have long understood: Bitcoin is digital gold, and fiat systems will eventually recognize its superiority. While central banks continue their cycle of money printing and blame-shifting, the adoption of Bitcoin as a strategic reserve asset may mark the beginning of a global financial transformation.
The Bigger Picture: Free Markets vs. Centralized Control
The idea that the RBNZ acted independently in creating these economic conditions is a myth. Central banks do not exist in isolation; they facilitate government spending and economic policies, whether through bond purchases, artificially low interest rates, or direct lending programs. The economic pain we’re seeing now is not an accident—it’s a consequence of a system designed to redistribute wealth to those closest to the money printer.
Bitcoin represents an alternative: a free-market monetary system where no central entity controls issuance, no insiders get preferential treatment, and no government can erode its value through reckless policies.
The sooner people recognize the flaws in the current system, the sooner they’ll understand why Bitcoin exists—not just as an investment, but as a monetary revolution.
originally posted at https://stacker.news/items/907966
-
-
@ 3ffac3a6:2d656657
2025-03-08 23:07:57Recently, I found an old Sapphire Block Erupter USB at home that I used for Bitcoin mining back in 2013. Out of curiosity and nostalgia, I decided to try getting it to work again. I spent an entire afternoon configuring the device and, after much trial and error, discovered that I needed an older version of CGMiner to make it work.
The Sapphire Block Erupter USB was one of the first ASIC devices designed for Bitcoin mining. Although obsolete for competitive mining, it can still be used for learning, nostalgia, or experimentation. In this post, I’ll show you how to run a Block Erupter USB on Linux today.
1. Prerequisites
Before you start, make sure you have:
- A Sapphire Block Erupter USB
- A powered USB hub (optional but recommended)
- A computer running Linux (Ubuntu, Debian, or another compatible distribution)
- A mining pool account (e.g., Slush Pool, KanoPool, etc.)
2. Installing Dependencies
Before running the miner, install some dependencies:
bash sudo apt update && sudo apt install -y git build-essential autoconf automake libtool pkg-config libusb-1.0-0-dev
3. Determining the Compatible Version of CGMiner
To find the correct CGMiner version that still supports Block Erupter USB, I performed a binary search across different versions, testing each one until I found the last one that properly recognized the device. The result was that version 3.4.3 is the most recent one that still supports Block Erupters. However, different versions of these devices may require different CGMiner versions.
4. Downloading and Compiling CGMiner
CGMiner is one of the software options compatible with Block Erupters. You can download the correct version from two trusted sources:
- From the official repository: CGMiner v3.4.3 on GitHub
- Alternatively, from this mirror: CGMiner v3.4.3 on Haven
To ensure file integrity, verify the SHA-256 hash:
3b44da12e5f24f603eeeefdaa2c573bd566c5c50c9d62946f198e611cd55876b
Now, download and extract it:
```bash wget https://github.com/ckolivas/cgminer/archive/refs/tags/v3.4.3.tar.gz
Or, alternatively:
wget https://haven.girino.org/3b44da12e5f24f603eeeefdaa2c573bd566c5c50c9d62946f198e611cd55876b.tgz
sha256sum v3.4.3.tar.gz # Confirm that the hash matches
Extract the file
tar -xvf v3.4.3.tar.gz cd cgminer-3.4.3
Compile CGMiner
./autogen.sh --enable-icarus make -j$(nproc)
Install on the system (optional)
sudo make install ```
5. Connecting the Block Erupter USB
Plug the device into a USB port and check if it is recognized:
bash dmesg | grep USB lsusb
You should see something like:
Bus 003 Device 004: ID 10c4:ea60 Cygnal Integrated Products, Inc. CP2102 USB to UART Bridge Controller
If needed, adjust the USB device permissions:
bash sudo chmod 666 /dev/ttyUSB0
6. Configuring and Running CGMiner
Now, run CGMiner, pointing it to your mining pool:
bash ./cgminer -o stratum+tcp://your.pool.com:3333 -u yourUsername -p yourPassword
If the miner detects the Block Erupter correctly, you should see something like:
[2025-03-08 22:26:45] Started cgminer 3.4.3 [2025-03-08 22:26:45] No devices detected! [2025-03-08 22:26:45] Waiting for USB hotplug devices or press q to quit [2025-03-08 22:26:45] Probing for an alive pool [2025-03-08 22:26:46] Pool 0 difficulty changed to 65536 [2025-03-08 22:26:46] Network diff set to 111T [2025-03-08 22:26:46] Stratum from pool 0 detected new block [2025-03-08 22:27:02] Hotplug: Icarus added AMU 0
Conclusion
Although no longer viable for real mining, the Sapphire Block Erupter USB is still great for learning about ASICs, testing mining pools, and understanding Bitcoin mining. If you enjoy working with old hardware and have one lying around, it’s worth experimenting with!
If you have any questions or want to share your experience, leave a comment below!
-
@ 3ffac3a6:2d656657
2025-03-08 23:02:13Como Rodar um Sapphire Block Erupter USB para Mineração no Linux em 2025
Recentemente, encontrei um Sapphire Block Erupter USB velho aqui em casa que eu usava para minerar Bitcoin em 2013. Por curiosidade e nostalgia, resolvi tentar colocá-lo para funcionar novamente. Passei uma tarde inteira tentando configurar o dispositivo e, depois de muita tentativa e erro, descobri que precisava de uma versão mais antiga do CGMiner para fazê-lo funcionar.
Os Sapphire Block Erupter USB foram um dos primeiros dispositivos ASIC voltados para mineração de Bitcoin. Embora estejam obsoletos para mineração competitiva, eles ainda podem ser usados para aprendizado, nostalgia ou experimentação. Neste post, vou te mostrar como rodar um Block Erupter USB no Linux atualmente.
1. Pré-requisitos
Antes de começar, certifique-se de que você tem:
- Um Sapphire Block Erupter USB
- Um hub USB alimentado (opcional, mas recomendado)
- Um computador rodando Linux (Ubuntu, Debian, Arch ou outra distribuição compatível)
- Um pool de mineração configurado (ex: Slush Pool, KanoPool, etc.)
2. Instalando as Dependências
Antes de rodar o minerador, instale algumas dependências:
bash sudo apt update && sudo apt install -y git build-essential autoconf automake libtool pkg-config libusb-1.0-0-dev
3. Determinando a Versão Compatível do CGMiner
Para encontrar a versão correta do CGMiner que ainda suporta os Block Erupter USB, realizei uma busca binária entre diferentes versões, testando cada uma até encontrar a última que reconhecia corretamente o dispositivo. O resultado foi que a versão 3.4.3 é a mais recente que ainda suporta os Block Erupters. No entanto, outras versões desses dispositivos podem requerer versões diferentes do CGMiner.
4. Baixando e Compilando o CGMiner
O CGMiner é um dos softwares compatíveis com os Block Erupters. Você pode baixar a versão correta de duas fontes confiáveis:
- Do repositório oficial: CGMiner v3.4.3 no GitHub
- Alternativamente, deste espelho: CGMiner v3.4.3 no Haven
Para garantir a integridade do arquivo, você pode verificar o hash SHA-256:
3b44da12e5f24f603eeeefdaa2c573bd566c5c50c9d62946f198e611cd55876b
Agora, faça o download e extraia:
```bash wget https://github.com/ckolivas/cgminer/archive/refs/tags/v3.4.3.tar.gz
Ou, alternativamente:
wget https://haven.girino.org/3b44da12e5f24f603eeeefdaa2c573bd566c5c50c9d62946f198e611cd55876b.tgz
sha256sum v3.4.3.tar.gz # Confirme que o hash bate
Extraia o arquivo
tar -xvf v3.4.3.tar.gz cd cgminer-3.4.3
Compile o CGMiner
./autogen.sh --enable-icarus make -j$(nproc)
Instale no sistema (opcional)
sudo make install ```
4. Conectando o Block Erupter USB
Plugue o dispositivo na porta USB e verifique se ele foi reconhecido:
bash dmesg | grep USB lsusb
Você deve ver algo como:
Bus 003 Device 004: ID 10c4:ea60 Cygnal Integrated Products, Inc. CP2102 USB to UART Bridge Controller
Se necessário, ajuste as permissões para o dispositivo USB:
bash sudo chmod 666 /dev/ttyUSB0
5. Configurando e Rodando o CGMiner
Agora, execute o CGMiner apontando para seu pool de mineração:
bash ./cgminer -o stratum+tcp://seu.pool.com:3333 -u seuUsuario -p suaSenha
Se o minerador detectar corretamente o Block Erupter, você verá algo como:
``` [2025-03-08 22:26:45] Started cgminer 3.4.3 [2025-03-08 22:26:45] No devices detected! [2025-03-08 22:26:45] Waiting for USB hotplug devices or press q to quit [2025-03-08 22:26:45] Probing for an alive pool [2025-03-08 22:26:46] Pool 0 difficulty changed to 65536 [2025-03-08 22:26:46] Network diff set to 111T [2025-03-08 22:26:46] Stratum from pool 0 detected new block [2025-03-08 22:27:02] Hotplug: Icarus added AMU 0
```
Conclusão
Apesar de não serem mais viáveis para mineração real, os Sapphire Block Erupter USB ainda são ótimos para aprender sobre ASICs, testar pools e entender mais sobre a mineração de Bitcoin. Se você gosta de hardware antigo e tem um desses guardado, vale a pena experimentar!
Se tiver dúvidas ou quiser compartilhar sua experiência, comente abaixo!
-
@ ffbcb706:b0574044
2025-03-08 22:51:54I recently switched from stock Android on my Pixel 8 Pro to GrapheneOS and transitioned from Authy to Aegis to move away from Big Tech and embrace open-source and privacy-focused alternatives. While Aegis offers local encrypted backups, I noticed it lacked external automatic sync, and I wanted to be sure that I could still access my 2FA tokens even if I lost my phone, without having to remember to back up Aegis externally every time I added a new 2FA entry.
Additionally, because many commands need to be run in Termux, I found it useful to use Scrcpy to control my Android device from my Ubuntu desktop. Scrcpy requires ADB and allows easy copy-paste functionality between Ubuntu and Android. I used ALT + V in Ubuntu scrcpy and then long-pressed the screen on my Pixel and selected 'Paste' to copy text easily. This is an optional but highly useful method for managing terminal commands efficiently.
This guide will walk you through setting up rclone and Termux:Boot to enable seamless Aegis backup automation on GrapheneOS. While I use GrapheneOS, this setup should work on most modern Android versions.
Prerequisites
Before starting, make sure you have:
- GrapheneOS installed on your Google Pixel Android device (Pixel 8 Pro in my case).
- Aegis Authenticator installed with automatic backup enabled.
- Proton Drive account ready.
- Obtainium installed or an alternative such as F-droid to manage Termux updates securely.
- Termux & Termux:Boot installed via Obtainium:
- Termux: https://github.com/termux/termux-app/releases
- Termux:Boot: https://github.com/termux/termux-boot/releases
- Scrcpy installed (optional, for easier command handling):
- Install on Ubuntu:
sudo apt install scrcpy
- Ensure ADB is enabled on your Android device.
Step 1: Install Required Packages and Set Up the Backup Folder
Open Termux and install the required tools:
sh pkg update && pkg upgrade -y pkg install rclone inotify-tools termux-api
Grant storage permissions to Termux:
sh termux-setup-storage
Create the ProtonSync directory where all files to be backed up will be stored, including Aegis backups:
sh mkdir -p /storage/emulated/0/ProtonSync/Aegis/
Ensure the directory exists:
sh ls /storage/emulated/0/ProtonSync/Aegis/
If this returns an empty result (instead of an error), you are ready to proceed.
Step 2: Configure rclone for Proton Drive
Since August 2024, Proton Drive has been available as a dedicated backend in rclone (official documentation). However, this integration is still evolving, as it relies on a proton-api-bridge that is under active development.
Run:
sh rclone config
Follow the prompts:
- Choose "n" for a new remote.
- Name it:
protondrive
- Select Proton Drive from the list.
- Enter your Proton username and password.
- If 2FA is enabled, enter the current code from your authenticator app.
- Confirm and save the remote configuration.
Test the setup by listing files:
sh rclone lsd protondrive:
If you see your Proton Drive folders, the connection works.
Step 3: Automate Sync with inotify-tools
We will set up a script to monitor new Aegis backup files and sync them instantly.
- Manually trigger a backup in Aegis first, to ensure a file is created. You can do this in Aegis → Settings → Backups → Trigger backup.
- Create the sync script directly in the Termux:Boot directory:
sh mkdir -p ~/.termux/boot/ nano ~/.termux/boot/watch_protonsync.sh
- Add this content:
```sh
!/data/data/com.termux/files/usr/bin/bash
inotifywait -m -r -e close_write,moved_to,create /storage/emulated/0/ProtonSync/Aegis/ --format '%w%f' | while read file do rclone sync /storage/emulated/0/ProtonSync/Aegis/ protondrive:/ProtonSync/Aegis/ -P done ```
- Save and exit (
CTRL + X
,Y
,ENTER
). - Make it executable:
sh chmod +x ~/.termux/boot/watch_protonsync.sh
Run it manually to test:
sh bash ~/.termux/boot/watch_protonsync.sh &
Now, whenever Aegis creates a new backup file, it will automatically sync to Proton Drive.
Step 4: Test Auto-Start with Termux:Boot
- Reboot your phone.
- Open Aegis and manually trigger a backup (
Settings → Backups → Trigger backup
). - Check Proton Drive under
/ProtonSync/Aegis/
to confirm that the new backup appears.
If the file is there, the automation works! 🎉 I would advice to keep an eye regularly at the Proton Drive to check if the automation is still working.
-
@ 2cb8ae56:84d30cba
2025-03-08 22:41:58[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
[44]
[45]
[46]
[47]
[48]
[49]
[50]
[51]
[52]
[53]
[54]
[55]
[56]
[57]
[58]
[59]
[60]
[61]
[62]
[63]
[64]
-
@ 1c69692c:f89196c0
2025-03-08 20:19:22 -
@ 401014b3:59d5476b
2025-03-08 20:14:04Alright, football lunatics, it’s March 2025, and we’re storming into the AFC West like it’s a saloon brawl with whiskey on the line. Free agency’s a lawless frontier, the draft’s a roll of the dice, and this division’s always a mix of firepower and flops. The Chiefs owned 2024, the Chargers turned heads, the Broncos showed grit, and the Raiders… uh, raided their own dignity. Let’s slap some records on this rodeo and see who’s got the guts to lasso the crown. Saddle up, fam—here we go.
Kansas City Chiefs: 12-5 – Mahomes’ Dynasty Rolls On
The Chiefs were the AFC’s big dogs in 2024, and 2025’s no different. Patrick Mahomes is still the NFL’s cheat code—Xavier Worthy’s a speed demon, Travis Kelce’s defying Father Time, and the O-line’s a fortress. That defense—Chris Jones, Trent McDuffie—keeps QBs sweating, but free agency’s a buzzkill. The WR depth’s thin. Still, Mahomes magic lands ‘em at 12-5, division champs. KC’s the team everyone loves to hate—and they keep winning anyway.
Los Angeles Chargers: 10-7 – Harbaugh’s Grit Pays Off
The Chargers flipped the script in 2024 under Jim Harbaugh, and they’re building steam. Justin Herbert’s a cannon-armed freak, Ladd McConkey’s emerging, and J.K. Dobbins (if healthy) keeps the run game humming. The defense—Joey Bosa, Derwin James—is a problem when it’s clicking, but free agency looms. Khalil Mack’s getting old, and Asante Samuel Jr. might bolt. 10-7’s the vibe, snagging a wildcard. Harbaugh’s got ‘em believing—they’re legit playoff pests now.
Denver Broncos: 8-9 – Bo Nix’s Baby Steps
The Broncos showed fight in 2024 with rookie Bo Nix, and 2025’s a growth spurt. Nix has Courtland Sutton and Marvin Mims to sling it to, while Javonte Williams grinds the run game. That defense—Pat Surtain II, Zach Allen—is still nasty, but free agency could sting. Jonathon Cooper might cash out elsewhere, and the O-line needs juice. 8-9’s where they land—close, but not quite playoff-ready. Sean Payton’s cooking, but it’s not fully baked yet.
Las Vegas Raiders: 4-13 – Chaos in the Desert
The Raiders are the AFC West’s hot mess. No QB worth a damn (Aidan O’Connell? Please), Davante Adams bailed, and the run game’s a ghost town without Josh Jacobs. The defense—Maxx Crosby, Christian Wilkins—has some bite, but the roster’s a dumpster fire, and free agency won’t help. Tyree Wilson’s unproven, and the cap’s a nightmare. 4-13’s the brutal truth—they’re tanking for a draft savior. Vegas, baby, but not in a good way.
The Final Shootout
The AFC West in 2025 is a Chiefs cakewalk with a Charger chaser. The Chiefs (12-5) lock the title because Mahomes is Mahomes, the Chargers (10-7) snag a wildcard with Harbaugh’s mojo, the Broncos (8-9) tease progress, and the Raiders (4-13) crash and burn. Free agency’s the wild card—lose a star, you’re toast; keep ‘em, you’re riding high. Hit me on Nostr when I screw this up, but this is my AFC West sermon. Let’s roll, degenerates.
-
@ 8671a6e5:f88194d1
2025-03-08 18:55:02The ECB’s Tightrope Walk (2019–2025)
The European Central Bank (ECB) is caught between a rock and a hard place these past years (2019–2025). On one hand, it’s failing its core mission: keeping the Euro stable with a 2% inflation target. On the other, trust in the currency—and the EU itself—is crumbling fast. You can see it in the sinking European bond market and the growing crowd of voters backing anti-EU politicians.
As usual, the ECB sticks to its playbook: blending marketing with “innovations,” spicing it up with anti-crypto MiCA rulings on Bitcoin, and blaming everyone—Putin, Trump, Elon, China, the wind, the moon—for their woes. Since the financial crisis, it’s pumped 2.3 trillion euros into the economy, money conjured out of thin air for market purchases (quantitative easing). The result? Our wallets feel the pinch as purchasing power tanks, with inflation bouncing between 2.1% and 20%, depending on which figures you still trust. No shock there: for every euro circulating in 2002, there are now five.
Meanwhile, Europe’s scrambling to keep up appearances, led by a parliament of nitwits who treat error-riddled high school essays from the Dutch Central Bank as gospel—or print 1 trillion euros (!) to prop up their debt and war cycle. These politicians aren’t too dumb to spot the mistakes; they just care more about ramming through the “narrative,” shaky or not.
The Bitcoin Smokescreen Take the attack on Bitcoin, always nagging about its “energy use”—a standard they never apply elsewhere. Good thing, too; electricity isn’t “good” or “evil.” The real play? Clearing the path for a “digital euro,” cooked up by sly financial institutions hawking their “Aldi Bitcoin” via corporate blockchains.
Digital Euro: The Shiny Trap
Advantages I’ll grudgingly list a few perks, though they’re skin-deep: faster transactions than today’s sluggish bank transfers, digital payments (QR codes), and a unified standard across Europe. These tiny upgrades—great for marketing—don’t outweigh the massive downsides but do beat the current patchwork of payment systems. That’s the good news, and it ends here.
Disadvantages
The cons list is long, so I’ll hit the three worst:
Permission-Coin Nightmare You’ll need approval from some authority (or commercial bank) to receive, spend, or hold it. A 50€ note moves from A to B, no questions asked—cash has no name, needs no permission. Pocket money for your kid, a coin for a beggar, or paying for a used PlayStation: cash flows free. They want that gone. Bitcoin’s beauty mirrors cash but better—unconfiscatable, A to B, no permission needed, saint or crook. That’s the bedrock of a working social-economic system. Sorry, EU pious elite, but white, gray, and black economies will always exist—check your own subsidies; not everything’s clean. Worse, it threatens wage sanctity, potentially reviving forced spending schemes banned since 1887 (in Belgium, at least). Workers once got paid in cash and expiring factory vouchers—a disaster now illegal.
Programmable Tokens A digital euro (CBDC) turns money into controllable tokens, ripe for expiry dates, discounts, or restrictions. Big banks are testing this, aping Bitcoin’s gimmick but under total state control, endlessly minting “safe” tokens for their theft-driven consumer economy. Services like Corda are set to link your ID via eIDAS (Europe’s total-control digital identity surveillance) to these CBDC wallets. Your behavior won’t just be monitored—it’ll tie to fines or coin deductions. (link: https://r3.com/get-corda/ )
Total Control Coin Citizens lose on nearly all fronts. Recall the Belgian Franc-to-Euro shock (cheese sandwich: 40 francs to 1.2 euros, now 3+)? The digital euro rollout—likely hitting welfare recipients and civil servants (with little recourse) via a “gov-app” wallet around July 2025—will sting worse. You’ll get no real money, just controllable vouchers. The ECB won’t program the coins directly; they’ll let banks take the fall. If trust erodes (it will), they’ll blame “greedy banks” or “corrupt third parties.” Cash’s freedom—untraceable, unblockable—dies. The ECB gains tools: negative interest, forced loans, outright theft—all impossible with cash (unless they swap notes, which is slow and costly). Weaponized bank accounts already plague the EU; this makes them worse—shut down sans court order, targeting journalists, dissidents, anyone in the crosshairs.
This isn’t convenience—it’s power. And the ECB’s pushing it despite the euro’s instability. Fabio Panetta once said, “A digital euro would preserve the coexistence of safe central bank money and private money, ensuring sovereign money remains a monetary anchor” (Evolution or Revolution?, Feb 10, 2021). Stability’s key, yet they’re charging ahead anyway. (source)
Conclusion: The Great Heist The CBDC Digital Euro is the greatest theft in Europe since WWII. It’ll shred our freedom, warp market pricing, kill opposition, and chain us financially to the powerful—bank runs impossible. Citizens lose on 9/10 fronts… though payments will be quick. Trust in the Eurozone? It’ll erode faster, propped up only by nudging, marketing, and force.
Citizens will lose out on 9 out of 10 fronts… though, admittedly, payments will be quick.\ The loss in trust in the Eurozone even faster....
AVB\ \ tip if you like this
-
@ 378562cd:a6fc6773
2025-03-08 16:31:22The insurance industry is one of the most lucrative businesses in the world, built on a foundation of fear, deception, and manipulation. It presents itself as a guardian of financial security, promising protection in times of crisis. However, in practice, it operates like a government-backed extortion scheme, siphoning money from individuals and businesses while finding ways to avoid paying out claims.
Many people view insurance as a necessary evil—a required expense for responsible living. But very few stop to consider the true nature of the industry and how it functions not as a service, but as a well-oiled criminal machine designed to extract wealth from the population while delivering as little value as possible.
A Business Model Built on Exploiting Fear and Uncertainty Insurance companies do not sell a product in the traditional sense. You don’t receive something tangible in return for your payments. Instead, they sell you a promise that if something terrible happens, they will be there to cover the costs. However, that promise is deliberately wrapped in vague legalese, riddled with loopholes, and ultimately designed to benefit the insurer more than the insured.
To make this scam even more effective, insurance companies exploit human psychology, knowing that fear is one of the strongest motivators. They bombard people with relentless messaging about the catastrophic risks of being uninsured—the dangers of driving without auto insurance, the financial ruin of an unexpected hospital visit, or the devastation of losing a home to a fire or natural disaster. Ask your local insurance person (if you think they would give you an honest answer) how many full payouts they have had to give out due to a complete loss over the past year, 5 years, since they have been selling insurance. You'd be amazed at how few that number really is.
But it doesn’t stop there. Other industries have caught on to this fear-driven strategy and now use insurance as the perfect scapegoat to justify absurdly inflated prices. Hospitals, auto manufacturers, homebuilders, and repair services all point to “rising insurance costs” among other things as the reason for their skyrocketing fees. A simple medical procedure that should cost a few hundred dollars now runs into the several thousands because “that’s what insurance pays.” Auto repairs that used to be affordable are now exorbitant because shops know insurers will cover part of the bill. The end result? A rigged system where businesses get richer while consumers pay more, not just in premiums, but in every aspect of life.
The truth? Insurance companies thrive on the fact that most policyholders will never need to file a major claim, and if they do, the company will do everything in its power to pay out as little as possible—or nothing at all.
The Three D’s: Deny, Delay, Defend
When it comes time for an insurance company to actually pay out a claim, they rarely do so without a fight. Instead, they deploy the Three D’s strategy—a well-documented tactic used to minimize payouts and maximize profits:
Deny the Claim – The first step is simple: find a reason, any reason, to reject your claim.
Did you miss a payment once five years ago? Denied.
Did you fail to report a minor detail when signing up for your policy? Denied.
Did they discover a tiny, unrelated pre-existing condition? Denied.
Delay the Payout – If they can’t outright deny your claim, the next step is to make the process as slow and painful as possible.
Endless paperwork requirements. Requests for additional documentation (often things that were already submitted). Long hold times when you call for an update. The goal? Wear you down so you give up or settle for less.
Defend Against Lawsuits – If you decide to take legal action, the company will unleash an army of high-priced attorneys (another equally criminal organization with the same rules and laws applied) to fight you every step of the way.
They have billions of dollars available for legal fees. They will outlast you, knowing that most individuals lack the time, money, or energy to engage in a lengthy legal battle. This cycle repeats daily, with millions of policyholders becoming victims of the very companies they’ve paid to protect them. Where is the legal protection to protect you and me? NON-EXISTENT FARSE!
The Myth of the “Struggling” Insurance Agent Insurance agents like to present themselves as hard-working individuals, just trying to make a living. They’ll tell you they’re not getting rich and that they only want what’s best for you. But make no mistake—there is no such thing as a "barely making it" insurance agent in the long run. Mine is constantly on FB telling of this trip to Mexico or some exotic island somewhere or someplace I would love to take my family someday but can never seem to afford it time or money.
Agents work on commission, meaning their income is tied directly to the number of policies they sell. This creates an incentive to push as many policies as possible, often using manipulative tactics.
They will upsell coverage you don’t need by playing on your fears. They will gloss over exclusions and fine print, ensuring you only focus on the benefits, not the limitations. They will push you into long-term commitments that make it costly to switch or cancel and have the "adjustor" and "company policy" as an scapegoat to ease their own conscience.
Meanwhile, at the top, insurance executives make obscene amounts of money while denying rightful claims to hard-working individuals. The CEOs of major insurance companies bring in tens of millions of dollars per year, all while raising premiums and reducing coverage for their customers.
Mandatory Insurance: A Government-Backed Extortion Scheme One of the most damning aspects of the insurance industry is how it has embedded itself into government policy, ensuring that people have no choice but to participate in the system.
Car Insurance: Nearly every state requires auto insurance, even though the majority of drivers never file a claim. Meanwhile, insurance companies raise rates even if you never get into an accident. Health Insurance: The government forces people to buy into overpriced health insurance plans that come with absurd deductibles, making them nearly useless for many policyholders. Home Insurance: Mortgage lenders force homeowners to carry insurance, ensuring another guaranteed revenue stream for the industry. These laws do not exist to protect consumers—they exist to guarantee profits for the insurance companies.
Who Really Benefits? Follow the Money
The biggest winners in the insurance industry are not the policyholders that provide ALL THE MONEY into this criminal organization. The true beneficiaries are the corporate executives and shareholders, and it funnels down to the individual agents collecting all this for them.
The largest insurance companies report billions of dollars in annual profits—far more than they pay out in claims. Shouldn't they break even after a 'modest" salary for their service and time? Wouldn't THAT make more sense to a sensible human being? They invest premium dollars into the stock market, real estate, and other ventures, ensuring their wealth (the money YOU gave them) continues to grow.
They lobby politicians to maintain their stranglehold on the industry, keeping regulations in their favor and ensuring insurance remains legally required in most aspects of life. In short, insurance companies are not in the business of helping people—they are in the business of making money.
The Harsh Reality: A System Designed to Exploit Most people will pay hundreds of thousands of dollars in insurance premiums throughout their lifetime. And yet, when the time comes to actually use the coverage, many find themselves fighting an uphill battle against a rigged system.
Consider these facts:
Insurance companies cancel policies when people become too “expensive.” They increase rates after a single claim—even if it wasn’t your fault. They spend billions on advertising to attract new customers but fight tooth and nail to avoid paying out existing ones. At what point does this stop being a service and start being a scam?
Final Thoughts: A Broken System That Needs an Overhaul
The insurance industry presents itself as a pillar of stability, but in reality, it is one of the most corrupt, exploitative industries in the world. It thrives by preying on fear, avoiding payouts, and ensuring government policies force people to participate in the scam.
If the system was truly fair, it would operate like mutual aid, where all policyholders contribute and receive support as needed. But instead, it functions like organized crime, where the ones collecting the money hold all the power, and those in need are left scrambling for scraps.
Until a major upheaval occurs, there’s little the average person can do to fight back against this deeply entrenched system. The harsh reality is that there are far too many crooks, manipulators, and dishonest players at every level of society—from corporate executives to politicians, from insurance adjusters to business owners who have happily joined in on the scam.
Reading the fine print won’t stop an industry designed to change the rules whenever it benefits them. Shopping around is meaningless when every company is playing the same rigged game. Demanding transparency? Good luck—those in power have built entire careers around keeping consumers in the dark.
At the end of the day, insurance companies—and the industries that now use them as an excuse to inflate costs—are not here to protect you. They exist to extract wealth from you, and there’s no real way to “win” in a system engineered to ensure you always lose.
-
@ 044da344:073a8a0e
2025-03-08 14:45:54Manchmal ist es anstrengend mit den Kommentaren. Irgendjemand weiß immer irgendetwas besser und will das aller Welt auch zeigen – anonym natürlich. Man gönnt sich ja sonst nichts. Auch bei meinem Gespräch mit Michael Beleites gab es ein paar Nörgler. Schaut euch den Geparden an oder den Dingo. Dann seht ihr schnell, wie falsch ihr liegt. Eine Nummer größer: Ihr habt den Darwin nicht verstanden. Oder ganz im Gegenteil: alles kalter Kaffee, seit Menschengedenken bekannt. Meist fällt mir ein Sprüchlein ein und ich kann das für mich abhaken.
Diesmal war es anders. Wenn es buchstäblich um Gott und die Welt geht, kommt man nicht mehr durch mit einer Standard-Antwort. Ich kann das hier gar nicht alles aufzählen. Was den Zuschauer triggert, hängt auch und vor allem von ihm selbst ab. Und Michael Beleites liefert Andockstationen noch und nöcher. „Die Wissenschaft ist sich einig“? Nicht für @brigittegartner7946. „Eine Migrationspolitik, die Völker und Ethnien um den halben Erdball treibt“? Passt für @hildegverakaethner3340 nicht zu der Erkenntnis, dass sich der Mensch dort am wohlsten fühlt, wo er geboren und aufgewachsen ist. Marsbesiedelung? Keine Option für @d.l.6789. Dafür umso mehr: „Den Kindern das Staunen geben“, nicht nur für @Romasi54.
„Zeit, Ruhe, Gelegenheit und Bestätigung – zu selten erleben Kinder das. Oft kommt ein belehrender Erwachsener dazwischen. Und dabei sind Erwachsene einfach nur eher geboren. Lassen und geben wir den Kindern ihre eigenen Erlebnisse, Entdeckungen, Erkenntnisse.“
Das Thema DDR spielte für das Publikum kaum eine Rolle, obwohl es im Gespräch ja auch um Zersetzung einst und jetzt geht und darum, dass die Cancel Culture von heute viel mehr Jünger anzieht als alles, was die Stasi je versucht hat. 96 Prozent der DDR-Bürger, so Michael Beleites hinterher bei uns im Wohnzimmer, haben davon nicht viel mitbekommen. Zwei Prozent Täter und zwei Prozent Opfer so wie er – Menschen, die oft bis heute die Deutungshoheit haben über die Vergangenheit und die, so sieht das Michael Beleites, schon in den 1990ern damit angefangen haben könnten, die Maßstäbe für das Miteinander zu verschieben. Kommentar eines Westdeutschen online: Ich bin „immer stark beeindruckt, wenn ich mit Ostdeutschen kontrovers diskutiere oder Ostdeutsche sich kontrovers auseinandersetzen. Ruhig und sachlich. Meine Frau, Französin, spürt immer sofort, wer West- und wer Ostdeutscher ist.“ Letzter Schnipsel aus der YouTube-Welt: @fotografiker2 bietet an, „mit zur Schaufel“ zu greifen, wenn die „Logik des Wettbewerbs“ beerdigt wird. Da sind wir schon mindestens drei.
Was bleibt von so einem Gespräch? Die Persönlichkeit des Gastes, klar, aber das ist eine Plattitüde. Was macht einen Menschen zu dem, was er ist? Sein Buch, sagt Michael Beleites in die Kamera, habe ihm Klarheit gebracht. Einmal alles aufgeschrieben und dann auch erlebt zu haben, wer wie reagiert: Das sortiert die Dinge genauso wie die Menschen – vor allem dann, wenn man sich vorgenommen hat, gegen den Strom zu schwimmen, und außerdem weiß, was es bedeutet, einen Konflikt nicht nach außen zu bringen, sondern ihn weiter mit sich herumzutragen. Michael Beleites kann gelassen aussprechen, dass die Wissenschaft nicht gern zugibt, nichts zu wissen, dass sie cancelt und dass es so jenseits von Studium und akademischer Laufbahn möglicherweise leichter ist, der Wahrheit auf den Grund zu gehen. Hier: die Sache mit dem Kampf ums Dasein. Als die Kameras aus waren, erzählte ein Zuschauer von den Schlangen in seiner Zucht. Mächtige Männchen, die verbissen miteinander ringen und gar nicht merken, dass das Weibchen derweil von einem Schwächling begattet wird. Und dann die Schönheit der Natur, die sich weder über Zweckmäßigkeit erklären lässt noch mit einem Züchter im Verborgenen.
In den YouTube-Kommentaren finden sich viele ganz persönliche Geschichten. Stellvertretend sei hier @st.p.5025 zitiert:
Während meiner Arbeit (in einem Stadtpark) habe ich immer wieder die Möglichkeit, genau das seit Jahren zu beobachten, wovon hier die Rede ist. Auch dass eben nicht nur der Stärkste gewinnt. Bei den Enten und den anderen Wasservögeln, den Singvögeln, auch bei Eichhorn, Nutria und Co. Zudem ist es bei unterschiedlichen Arten nicht selten, dass sich die vermeintlich Schwächeren gegen den als stärker Geltenden durchsetzen. Auch wie die Kämpfe untereinander ablaufen oder vielmehr, wie diese aufgelöst werden. Oder, ihr Sozialverhalten in ihrer Gemeinschaft, welche Art in welchem Jahr überwiegt, dominiert usw. All das bringt auch mich Tag für Tag zum Staunen! Jede Lebewesen-Beobachtung bedeutet für mich Lebensqualität, gesundes Lernen und Freude. Und gibt mir tatsächlich auch Mut. Beispielsweise, dass eben nicht immer nur der „Stärkste“ gewinnt, wie Kämpfe aufgelöst oder verhindert werden.
Michael Beleites formuliert aus, was sich daraus ableiten lässt. Nicht „Ich“ oder „Du“, sondern „Ich“ und „Du“. Lasst uns ausloten, was gemeinsam geht. Lasst uns verhindern, dass die Landschaft zerstört und aufgefressen wird. Lasst uns das dezentral angehen – ein jeder am besten dort, wo er spürt, dass es ihm gut geht.
-
@ 3ac03011:41ecd1bb
2025-03-08 11:49:21IT'S THE SAME THING AGAIN AND AGAIN AND AGAIN....
I just watched the latest John Oliver episode—I enjoy seeing opinions from all sides—and I'm just furious. He brought up an argument from some economists that left me rewinding just to make sure I heard it right. In response to Trump's proposed tax-break for tipped workers, they argued that these workers shouldn't get a tax-break because it's "unfair" to non-tipped workers in the same income bracker.
Wait, seriously? That's the hill they want to die on? So we're supposed to keep everyone broke just to preserve some twisted idea of fairness? That's like watching someone drown and refusing to throw one of those floating rings because someone else upstream doesn't have one either. It's not just misguided—it's downright delusional.
And, of course, the people pushing this argument aren't the ones worrying about rent or groceries. They're sitting comfortably, while arguing against anything that might actually help people who need it. It's all just virtue signaling.
What they misunderstand (when they choose to) is that fair isn't the same as good. I don't want a world where everyone's equally miserable—I want a world where people's lives actually improve. If a tax break can help tipped workers, even a little, why are we wasting time debating it?
This obsession with fairness for fairness's sake is exhausting. Isn't the goal to lift people up instead of dragging everyone down to the same level of struggle? It’s almost impressive how out of touch some people are. Fuck all of them.
-
@ a012dc82:6458a70d
2025-03-08 10:26:25The advent of Bitcoin introduced the world to a new form of digital gold, promising wealth and innovation through the marvels of blockchain technology. However, as the cryptocurrency landscape has evolved, so too have the implications of its underlying processes, particularly Bitcoin mining. In Granbury, Texas, a community has found itself at the intersection of technological advancement and environmental distress, embodying a growing concern over the real-world impacts of digital currencies. This narrative is not unique to Granbury but echoes across various locales globally, where the quest for digital wealth intersects with the fabric of everyday life, often at a cost not initially anticipated.
Table of Contents
-
The Heart of the Matter: Granbury's Plight
-
The Noise That Never Sleeps
-
A Community's Health at Stake
-
-
The Economics of Bitcoin Mining
- The Cost of Digital Wealth
-
Regulatory Responses and Community Action
- Seeking Solutions
-
The Future of Bitcoin Mining and Community Well-be …
- Sustainable Alternatives
-
Conclusion
-
FAQs
The Heart of the Matter: Granbury's Plight
Granbury, a small town in Texas, has become an unwilling host to the cacophony of Bitcoin mining. A local power plant, repurposed for the energy-intensive task of mining Bitcoin, has disrupted the lives of residents with its relentless noise. The sound, likened to the continuous roar of jet engines, penetrates the tranquility of this community, leaving in its wake sleepless nights, health issues, and a disturbed local ecosystem. This intrusion represents a broader dilemma faced by communities worldwide, where the benefits of technological progress clash with the sanctity of personal and environmental well-being.
The Noise That Never Sleeps
Cheryl Shadden, a nurse anesthetist living in Granbury, describes the noise as akin to sitting on an airport runway with jets taking off in succession. The constant hum has made simple pleasures like conversations on the back patio impossible, highlighting the intrusive nature of the mining operation. This relentless noise pollution is not just a minor inconvenience but a significant disruption to daily life, affecting everything from personal relationships to the simple enjoyment of one's home. The situation in Granbury sheds light on the often-overlooked consequences of industrial activities, prompting a reevaluation of what progress means at the expense of quality of life.
A Community's Health at Stake
The incessant din has not only stolen peace but has also been linked to physical ailments among the residents. Reports of migraines, sleep disturbances, and even wildlife fleeing the area paint a grim picture of the toll taken on the community's health and well-being. These health issues are a stark reminder of the environmental cost of our digital age, where the pursuit of innovation can sometimes lead to unforeseen consequences. The plight of Granbury's residents underscores the need for a balanced approach to technological development, one that considers the health and happiness of communities as a measure of success.
The Economics of Bitcoin Mining
Bitcoin mining, the process by which new bitcoins are entered into circulation and transactions are verified, is notoriously energy-hungry. It relies on a proof-of-work system that requires extensive computational power and, consequently, a significant amount of electricity. Texas, with its cheap energy and land, has become a global hub for these operations, attracting companies with the promise of low overhead costs. This economic boon, however, comes with its own set of challenges, as the environmental and social costs begin to surface in communities like Granbury.
The Cost of Digital Wealth
While Bitcoin mining has been lauded for its potential economic benefits, including job creation and investment, the case of Granbury reveals a darker side. The operation consumes approximately 2,100 megawatts of Texas's power supply, raising concerns about carbon and noise pollution, as well as increased utility bills for consumers. The juxtaposition of economic gain against environmental and social loss presents a complex dilemma. It raises critical questions about the sustainability of such ventures and the true cost of digital wealth in the age of cryptocurrency.
Regulatory Responses and Community Action
The situation in Granbury has sparked a dialogue on the need for regulatory oversight. Texas state law currently offers little recourse for noise pollution, with the maximum penalty for exceeding noise limits set at a mere $500 fine. This inadequacy has prompted local officials and residents to seek alternative solutions, including the construction of a sound barrier wall, which, paradoxically, has amplified the noise in some areas. The struggle for regulatory solutions reflects a broader challenge in governing emerging technologies and industries, where existing frameworks often fall short of addressing new and unforeseen impacts.
Seeking Solutions
In response to growing complaints, Marathon Digital Holdings, the company behind the Granbury mining operation, has pledged to conduct a sound study and take over full control of the mine to address community concerns. However, the effectiveness of these measures remains to be seen, and the community's frustration is palpable. This scenario highlights the importance of corporate responsibility and the need for companies to engage with and address the concerns of the communities in which they operate. It also underscores the potential for innovative solutions to mitigate the negative impacts of such operations, fostering a more harmonious relationship between industry and community.
The Future of Bitcoin Mining and Community Well-being
The case of Granbury serves as a cautionary tale of the unintended consequences of Bitcoin mining. As the cryptocurrency industry continues to grow, the balance between technological progress and environmental sustainability becomes increasingly precarious. This tension between innovation and well-being calls for a reimagined approach to technological development, one that prioritizes the health of our communities and the planet.
Sustainable Alternatives
The outcry from Granbury and similar communities across the country underscores the urgent need for sustainable mining practices. Alternatives such as proof-of-stake, a less energy-intensive consensus mechanism, offer a glimpse into a possible future where digital currencies can coexist with environmental stewardship. These alternatives not only represent a technical evolution but also a philosophical shift towards a more sustainable and equitable digital economy.
Conclusion
The story of Granbury is a microcosm of a larger debate on the impact of digital currencies on our physical world. As we venture further into the age of cryptocurrency, the challenge lies in harnessing its potential for economic growth without sacrificing the health and well-being of our communities. The digital gold rush must not lead to audible grief; instead, it should pave the way for innovations that are both economically beneficial and environmentally responsible. The journey from digital gold to a future where technology and nature harmonize requires not just technological innovation, but a collective commitment to redefining progress.
FAQs
How does Bitcoin mining affect local communities? Local communities, like Granbury, can experience noise pollution, increased electricity consumption leading to higher utility bills, potential environmental impacts due to increased energy use, and health issues among residents such as sleep disturbances and migraines.
What are the economic benefits of Bitcoin mining? Economic benefits include job creation, investment in local infrastructure, and increased demand for local services. However, these benefits often come with environmental and social costs that need to be carefully managed.
What measures are being taken to address the concerns of Granbury residents? Measures include the construction of sound barrier walls, conducting sound studies, and engaging with the community to find solutions. Companies like Marathon Digital Holdings are also taking steps to take over full control of mining operations to better address noise issues.
Are there sustainable alternatives to proof-of-work Bitcoin mining? Yes, alternatives such as proof-of-stake (PoS) are being explored and implemented in various cryptocurrencies. PoS is less energy-intensive and could potentially offer a more sustainable option for securing blockchain networks without the significant environmental impact of traditional mining.
How is the Texas government responding to the issue of Bitcoin mining noise pollution? The response includes monitoring noise levels and exploring legal and regulatory measures to manage the impact of mining operations. However, existing laws offer limited recourse, and there is ongoing discussion about the need for more effective regulations.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ d6c48950:54d57756
2025-03-08 08:17:06This post is going to cover some very basic habits and sanity checks that offer large returns over time whilst having a very low cost and in that theme I’m going to keep this to a condensed bullet point list.
how to get the solution faster - You solve problems every day, when you have a goal and try to achieve it, when you face a shortcoming and try and overcome it, when you have an issue and resolve it - As a habit each time you solve a problem go over your actual thoguht process, how did you solve it? - After you’ve looked critically at it ask how you could have improved it
if someones better do what they tell you - I’ve noticed a lot of people won’t take advice from people who knows better (I think because they feel if they just do what they’re told it doesn’t feel like ‘their’ accomplishment) - If someone is more credible than you and the advice they give is credible just do what you’re told
accept easy/simple solutions - Weight loss is incredibly simple, you weigh yourself daily, count your calories and maintain a deficit of 200-500kcal daily, apps automate most of the heavy lifting - As a human it’s natural to fight against simple/easy solutions to longstanding problems - “Not only has this thing been destroying my life for years but the solution is easy and something everyone already knows? the solution is the thing everyones been telling me since the problem first started?” - supress the urge to push it away and just accept the solution, even if it means your problem was mostly self inflicted and easily avoidable
log predictions - Keep a log of your predictions (I use apple numbers) then also log your confidence (55%, 65%, 75%, 85%, 95%) in each prediction and see how close you are - If you make 100 predictions at 55% confidence only 55 of them should be correct, if more are correct you’re underconfident if less are correct you’re overconfident
working harder is almost always beneficial - Despite the doomerish advice hard work and time spent working is beneficial way more than most people give it credit for - there’s probably a point at which it tops off (16hrs a day might be marginally better than 12hrs) but it’s way higher than you’d instinctively expect - Try working longer hours and harder and see how you do, in my view burnout is probably a non issue if other factors of your life (sleep, diet, exercise, stress management) are correct,
basic stuff works very well - Certain basic advice (sleep, exercise, don’t take recreational drugs, don’t drink) are not only increidlby consistent but they also have very large effect sizes, do the basic stuff before moving onto the more esoteric like nicotine patches or adderall
-
@ d6c48950:54d57756
2025-03-08 08:16:05This is just a readme for my github site - this is the best way to access my blog in my opinion, it's split into several "chunks" - Layer 1, Core and central content - Layer 2, Stuff that builds upon core - Layer 3, Misc
My blog can also be found on posthaven here that has more detailed tags and a search feature - obviously my posts can also be found on nostr
-
@ da0b9bc3:4e30a4a9
2025-03-08 07:03:33Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/907271
-
@ 220522c2:61e18cb4
2025-03-08 06:19:30Comet is available on Linux
The Comet longform desktop app is available as an AppImage for Linux.
linux
-
@ 291c75d9:37f1bfbe
2025-03-08 04:09:59In 1727, a 21-year-old Benjamin Franklin gathered a dozen men in Philadelphia for a bold experiment in intellectual and civic growth. Every Friday night, this group—known as the Junto, from the Spanish juntar ("to join")—met in a tavern or private home to discuss "Morals, Politics, or Natural Philosophy (science)." Far from a casual social club, the Junto was a secret society dedicated to mutual improvement, respectful discourse, and community betterment. What began as a small gathering of tradesmen and thinkers would leave a lasting mark on Franklin’s life and colonial America.
Printers are educated in the belief that when men differ in opinion, both sides ought equally to have the advantage of being heard by the public, and that when Truth and Error have fair play, the former is always an overmatch for the latter. - Benjamin Franklin
The Junto operated under a clear set of rules, detailed by Franklin in his Autobiography:
"The rules that I drew up required that every member, in his turn, should produce one or more queries on any point of Morals, Politics, or Natural Philosophy, to be discuss’d by the company; and once in three months produce and read an essay of his own writing, on any subject he pleased. Our debates were to be under the direction of a president, and to be conducted in the sincere spirit of inquiry after truth, without fondness for dispute, or desire of victory; and, to prevent warmth [heatedness], all expressions of positiveness in opinions, or direct contradiction, were after some time made contraband and prohibited under small pecuniary penalties [monetary fines]."
These guidelines emphasized collaboration over competition. Members were expected to contribute questions or essays, sparking discussions that prioritized truth over ego. To keep debates civil, the group even imposed small fines for overly assertive or contradictory behavior—a practical nudge toward humility and open-mindedness. (Yes, I believe that is an ass tax!)
Rather than admitting new members, Franklin encouraged existing ones to form their own discussion groups. This created a decentralized network of groups ("private relays," as I think of them), echoing the structure of modern platforms like NOSTR—while preserving the Junto’s exclusivity and privacy.
From the beginning, they made it a rule to keep these meetings secret, without applications or admittance of new members. Instead, Franklin encouraged members to form their own groups—in a way acting as private relays of sorts. (I say "private" because they continued to keep the Junto secret, even with these new groups.)
Membership: A Diverse Circle United by Values
The Junto’s twelve founding members came from varied walks of life—printers, surveyors, shoemakers, and clerks—yet shared a commitment to self-improvement. Franklin, though the youngest (around 21 when the group formed), led the Junto with a vision of collective growth. To join, candidates faced a simple vetting process, answering four key questions:
- Have you any particular disrespect for any present members? Answer: I have not.
- Do you sincerely declare that you love mankind in general, of what profession or religion soever? Answer: I do.
- Do you think any person ought to be harmed in his body, name, or goods, for mere speculative opinions, or his external way of worship? Answer: No.
- Do you love truth for truth’s sake, and will you endeavor impartially to find and receive it yourself and communicate it to others? Answer: Yes.
These criteria reveal the Junto’s core values: respect, tolerance, and an unwavering pursuit of truth. They ensured that members brought not just intellect but also character to the table—placing dialogue as the priority.
One should also note the inspiration from the "Dry Club" of John Locke, William Popple, and Benjamin Furly in the 1690s. They too required affirmation to:
- Whether he loves all men, of what profession or religion soever?
- Whether he thinks no person ought to be harmed in his body, name, or goods, for mere speculative opinions, or his external way of worship?
- Whether he loves and seeks truth for truth’s sake; and will endeavor impartially to find and receive it himself, and to communicate it to others?
And they agreed: "That no person or opinion be unhandsomely reflected on; but every member behave himself with all the temper, judgment, modesty, and discretion he is master of."
The Discussions: 24 Questions to Spark Insight
Franklin crafted a list of 24 questions to guide the Junto’s conversations, ranging from personal anecdotes to civic concerns. These prompts showcase the group’s intellectual breadth. Here are some of my favorites:
Hath any citizen in your knowledge failed in his business lately, and what have you heard of the cause? Have you lately heard of any citizen’s thriving well, and by what means? Do you know of any fellow citizen who has lately done a worthy action, deserving praise and imitation? Do you think of anything at present in which the Junto may be serviceable to mankind, their country, friends, or themselves? Have you lately observed any defect in the laws of your country, which it would be proper to move the legislature for an amendment? Do you know of any deserving young beginner lately set up, whom it lies in the power of the Junto any way to encourage?
(Read them all here.)
Note the keen attention to success and failure, and the reflection on both. Attention was often placed on the community and individual improvement beyond the members of the group. These questions encouraged members to share knowledge, reflect on virtues and vices, and propose solutions to real-world problems. The result? Discussions that didn’t just end at the tavern door but inspired tangible community improvements.
The Junto’s Legacy: America’s First Lending Library
One of the Junto’s most enduring contributions to Philadelphia—and indeed, to the American colonies—was the creation of the first lending library in 1731. Born from the group’s commitment to mutual improvement and knowledge-sharing, this library became a cornerstone of public education and intellectual life in the community.
The idea for the library emerged naturally from the Junto’s discussions. Members, who came from diverse backgrounds but shared a passion for learning, recognized that their own access to books was often limited and costly—and they referred to them often. To address this, they proposed pooling their personal collections to create a shared resource. This collaborative effort allowed them—and eventually the broader public—to access a wider range of books than any individual could afford alone.
The library operated on a simple yet revolutionary principle: knowledge should be available to all, regardless of wealth or status. By creating a lending system, the Junto democratized access to information, fostering a culture of self-education and curiosity. This was especially significant at a time when books were scarce and formal education was not universally accessible.
The success of the Junto’s library inspired similar initiatives across the colonies, laying the groundwork for the public library system we know today. It also reflected the group’s broader mission: to serve not just its members but the entire community. The library became a symbol of the Junto’s belief in the power of education to uplift individuals and society alike.
With roots extending back to the founding of the Society in 1743, the Library of the American Philosophical Society houses over thirteen million manuscripts, 350,000 volumes and bound periodicals, 250,000 images, and thousands of hours of audiotape. The Library’s holdings make it one of the premier institutions for documenting the history of the American Revolution and Founding, the study of natural history in the 18th and 19th centuries, the study of evolution and genetics, quantum mechanics, and the development of cultural anthropology, among others.
The American Philosophical Society Library continues today. I hope to visit it myself in the future.
Freedom, for Community
Comparing the Junto to Nostr shows how the tools of community and debate evolve with time. Both prove that people crave spaces to connect, share, and grow—whether in a colonial tavern or a digital relay. Yet their differences reveal trade-offs: the Junto’s structure offered depth and focus but capped its reach, while Nostr’s openness promises scale at the cost of order.
In a sense, Nostr feels like the Junto’s modern echo—faster, bigger, and unbound by gates or rules. Franklin might admire its ambition, even if he’d raise an eyebrow at its messiness. For us, the comparison underscores a timeless truth: no matter the medium, the drive to seek truth and build community endures.
The Autobiography of Benjamin Franklin (1771–1790, pub. 1791)
http://www.benjamin-franklin-history.org/junto-club/
Benjamin Franklin, Political, Miscellaneous, and Philosophical Pieces, ed. Benjamin Vaughan (London: 1779), pp. 533–536.
"Rules of a Society" in The Remains of John Locke, Esq. (1714), p. 113
npubpro
-
@ c3ae4ad8:e54d46cb
2025-03-08 03:38:15This is for one serving (I'm currently doing a >500 cal low carb meal plan). Next time, I'll scramble an egg in there to up the protein a little more. High-protein, low-carb stir fry made with turkey, broccoli, snow peas, green onions, savoy cabbage, bok choy, garlic, in a sesame, soy and ginger sauce.
INGREDIENTS
- 1/3 lb / 170g ground turkey (I used 93% lean, hormone-free/organic)
- 2 tsp light olive oil or coconut oil
- 3 TB soy sauce, tamari, or coconut aminos
- 1 cup / 85g mixed stir fry greens, your choice (cabbage, bok choy, etc.)
- Half a bunch of green onion, roughly chopped, green parts only
- Dash of crushed red pepper flakes
- 1 clove minced garlic
- 1 tsp minced ginger
- Sesame seeds (optional, black, regular, or both!)
- 1 tsp sesame oil
DIRECTIONS
1. Heat oil in a skillet and add the ground turkey once the oil starts to shimmer.
2. On medium-high heat, cook the ground turkey, breaking it into bite-size pieces as it cooks, drizzling 1 TB of the soy sauce over the meat a little at a time. You want to evaporate the water out of the meat, so keep letting it cook until it's actually browned—the soy sauce helps with this, but you want the milliard reaction here (look it up and thank me later)!
3. Decrease the heat to low. Push the cooked turkey to one side and tilt the pan a bit away from you so the oil is isolated, and add the garlic into the oil and stir it in there a little bit.
4. Once the garlic is fragrant, stir the meat back into the garlic, toss in the chopped veggies, green onions, and remaining 1 TB of soy sauce. Then add the minced ginger and red pepper flakes on top, and quickly cover the pan with a lid. Let it steam for about 6-8 minutes on medium-low heat.
5. After the veggies are cooked, stir the little pile of steamed ginger into the mix, drizzle the sesame seed oil over the meat and veggies, stir again, and serve hot with optional sesame seeds as a garnish. Enjoy!
For more food and recipes by me, visit https://ketobeejay.npub.pro/ and click on "recipes" at the top
-
@ 7b3f7803:8912e968
2025-03-08 03:05:16Libertarians believe in open borders in theory. In practice, open borders don't work, because, among other things, the combination with a welfare state creates a moral hazard, and the least productive of society end up within the borders of welfare states and drain resources. The social services are paid by the productive people of the country or, in the case of most fiat systems, by currency holders through inflation. Welfare states are much more likely under fiat money and the redistribution goes from native taxpayers to illegal immigrants. Thus, under fiat money, open borders end up being an open wound by which the productive lifeblood of the country bleeds out, despite the theoretical trade-efficiency benefits. As libertarians like to say, open borders and the welfare state don't mix. In this article, we'll examine the other sacred cow of libertarian thought: free trade.
Free Trade without Libertarian Ideals
Free trade is very similar to free movement of labor in that it works great in theory, but not in practice, especially under fiat money. In a libertarian free-market world, free trade works. But that assumes a whole host of libertarian ideals like sound money, non-interfering governments, and minimal aggression. Once those ideals are violated, such as with government intervention in the market, similar moral hazards and long-term costs come with them, making free trade about as libertarian as a fractional reserve bank.
An example will illustrate what I'm talking about. Let's say Portugal subsidizes their wine for export to other countries. The obvious first-order effect is that it makes Portuguese wine cheaper in France, perhaps undercutting the price of French wine. Libertarians would say, that's great! French customers get cheaper goods, so what's the problem?
As with any government intervention, there are significant second- and third-order effects in play. Subsidization puts unsubsidized companies at risk, perhaps driving them to bankruptcy. In this case, this might be a French wine maker. Subsidized companies may become zombies instead of dying out. In this case, this might be a Portuguese wine maker that was failing domestically but survives by selling to customers abroad with government subsidies. While French customers benefit in the short run with cheaper prices for wine, they are ultimately hurt because the goods that would have existed without government intervention never come to market. Perhaps French wine makers that went bankrupt were innovating. Perhaps the resources of the zombie Portuguese wine maker would have created something better.
Further, the dependency of French people on Portuguese wine means that something going wrong in Portugal, like a war or subsidy cuts, disrupts the supply and price of wine for France. Now France must meddle in Portugal internationally if it doesn't want the wine supply to get disrupted. The two countries get entangled in such a way as to become more interventionist internationally. A war involving Portugal now suddenly becomes France's business and incentivizes military aid or even violence. As usual, the unseen effects of government policy are the most pernicious.
Not Really Free
In other words, what we call free trade isn't really free trade. A country exporting to the US may subsidize their products through government intervention, making the product cheaper in the US. This hurts US companies, and they’re forced into choices they never would have had to face without the foreign government intervention. But because the good is crossing borders under the rubric of "free trade," it's somehow seen as fair. Of course it's not, as government intervention distorts the market whether it's done by our own government or a foreign government.
So why would a foreign government do this? It gets several benefits through targeted market manipulation. First, it makes its own companies' products more popular abroad and conversely, makes US companies' products less popular. This has the dual benefit of growing the foreign government’s firms and shrinking, perhaps bankrupting, the US ones.
Targeted subsidization like this can lead to domination under free trade. It's not unlike the Amazon strategy of undercutting everyone first and using the monopoly pricing power at scale once everyone else has bankrupted. The global monopoly is tremendously beneficial to the country that has it. Not only is there significant tax revenue over the long term, but also a head start on innovations within that industry and an advantage in production in the adjacent industries around the product.
Second, the manufacturing centralization gives that country leverage geo-politically. A critical product that no one else manufactures means natural alliances with the countries that depend on the product, which is especially useful for smaller countries like Taiwan. Their chip manufacturing industry, holding 60% of global supply (2024), has meant that they're a critical link for most other countries, and hence, they can use this fact to deter Chinese invasion.
Third, because of the centralization of expertise, more innovations, products, and manufacturing will tend to come within the country. This increased production has cascading benefits, including new industries and national security. China leads the world in drone technology, which undoubtedly has given it an innovation advantage for its military, should it go to war.
Fourth, the capital that flows into the country for investing in the monopolized industry will tend to stay, giving the country more wealth in the form of factories, equipment, and skills. While that capital may nominally be in the hands of foreigners, over time, the ownership of that industry will inevitably transition toward native locals, as the knowledge about how to run such industries gets dissipated within the country.
[Image: Map showing “China Drone Tech” and “Taiwan Chips” hubs, with arrows of capital flow staying local]
Currency Devaluation: The Universal Trade Weapon
It would be one thing if only a specific industry were singled out for government subsidies and then the products dumped into the US as a way to hurt US companies, as that would limit the scope of the damage. But with currency devaluation, a government can subsidize all of its exports at the same time. Indeed, this is something that many countries do. While short-term, this helps US consumers, it hurts US companies and forces them into decisions that aren't good for the US.
To compete, they have to lower costs by using the same devalued currency to pay their labor as their foreign competition. That is, by relocating their capital, their manufacturing, and even their personnel to the country that's devaluing the currency. Not only does relocating reduce labor cost, but it also often gets them benefits like tax breaks. This makes US companies de facto multinationals and not only makes them subject to other jurisdictions, but ultimately divides their loyalties. To take advantage of the reduced labor, capital must move to another country and, along with it, future innovation.
Such relocations ultimately leave the company stripped of their manufacturing capability in the US, as local competition will generally fare better over the long run. Much of the value of the industry then is captured by other governments in taxes, development, and even state-owned companies. Free trade, in other words, creates a vulnerability for domestic companies as they can be put at a significant disadvantage compared to foreign counterparts.
Hidden Effects of Foreign Intervention
Unlike the multinationals, small companies have no chance as they're not big enough to exploit the labor arbitrage. And as is usual in a fiat system, they suffer the most while the giant corporations get the benefits of the supposed "free trade". Most small companies can't compete, so we get mostly the bigger companies that survive.
The transition away from domestic manufacturing necessarily means significant disruption. Domestic workers are displaced and have to find new work. Factories and equipment either have to be repurposed or rot. Entire communities that depended on the manufacturing facility now have to figure out new ways to support themselves. It's no good telling them that they can just do something else. In a currency devaluation scenario, most of the manufacturing leaves and the jobs left are service-oriented or otherwise location-based, like real estate development. There's a natural limit to location-based industries because the market only grows with the location that you're servicing. Put another way, you can only have so many people give haircuts or deliver packages in a geographic area. There has to be some manufacturing of goods that can be sold outside the community, or the community will face scarce labor opportunities relative to the population.
You also can't say the displaced workers can start some other manufacturing business. Such businesses will get out-competed on labor by the currency-devaluing country, so there won't be much investment available for such a business, and even if there were, such a business would be competing with its hands tied behind its back. So in this scenario, what you end up with are a large pool of unemployed people whom the state subsidizes with welfare.
So when a US company leaves or goes bankrupt due to a foreign government's subsidies, the disruption alone imposes a significant short-term cost with displaced labor, unused capital goods, and devastated communities.
Mitigations
So how do countries fight back against such a devastating economic weapon? There are a few ways countries have found around this problem of currency devaluation under free trade. First, a country can prevent capital from leaving. This is called capital controls, and many countries, particularly those that manufacture a lot, have them. Try to get money, factories, or equipment out of Malaysia, for example, and you'll find that they make it quite difficult. Getting the same capital into the country, on the other hand, faces few restrictions. Unfortunately, the US can't put in capital controls because dollars are its main export. It is, after all, the reserve currency of the world.
Second, you can compete by devaluing your own currency. But that’s very difficult because it requires printing a lot of dollars, and that causes inflation. There's also no guarantee that a competing country doesn't devalue its currency again. The US is also in a precarious position as the world's reserve currency, so devaluing the currency more than it already does will make other holders of the dollar less likely to want to hold it, threatening the reserve currency status.
So the main two mitigations against currency devaluation in a free trade scenario are not available to the US. So what else is there? The remaining option is to drop free trade. The solution, in other words, is to add tariffs. This is how you can nullify the effects of foreign government intervention, by leveling the playing field for US manufacturers.
Tariffs
One major industry that's managed to continue being manufactured in the US despite significant foreign competition is cars. Notably, cars have a tariff, which incentivizes their manufacture in the US, even for foreign car makers. The tariff has acted as a way to offset foreign government subsidies and currency debasement.
The scope of this one industry for the US is huge. There are around 300,000 direct jobs in auto assembly within the US (USTR) and there are an additional 3 million jobs supplying these manufacturers within the US. But the benefits don't end there. The US is also creating a lot of innovation around cars, such as self-driving and plug-in electric cars. There are many countries that would love to have this industry for themselves, but because of tariffs, auto manufacturing continues in the US.
And though tariffs are seen as a tax on consumers, US car prices are cheap relative to the rest of the world. What surprises a lot of people when they move from the US to other countries is finding out that the same car often costs more abroad (e.g. 25% tariffs keep U.S. prices 20% below Europe’s $40K average, 2024). The downside of tariffs pales next to the downsides of "free trade."
Free Trade Doesn’t Work with Fiat Money
The sad reality is that while we would love for free trade to work in the ideal libertarian paradise, it won't in our current fiat-based system. The subsidization by foreign governments to bankrupt US companies or to make them multinational, combined with the unfortunate reality of the US dollar being the world reserve currency, means that free trade guts the US of manufacturing. Tariffs are a reasonable way to protect US manufacturers, particularly smaller ones that can't go multinational.
What's more, tariffs make the US less fragile and less dependent on international supply chains. Many of the wars in the past 60 years have been waged because of the entanglements the US has with other countries due to the reliance on international supply chains. Lessening this dependency, if only to prevent a war, has clear value.
Lastly, labor has been devalued significantly by fiat monetary expansion, but at least some of that can be recovered if tariffs create more manufacturing, which in turn adds to the demand for labor. This should reduce the welfare state as more opportunities are made available and fewer unemployed people will be on the rolls.
Conclusion
Fiat money produces a welfare state, which makes open borders unworkable. Fiat money also gives foreign governments a potent economic weapon to use against US companies, and by extension the labor force that powers them. Though currency debasement and capital controls are available to other countries as a defense, for the US, neither of these tools is available due to the fact that the dollar is the world reserve currency. As such, tariffs are a reasonable defense against the fiat subsidization of foreign governments.
-
@ 7b3f7803:8912e968
2025-03-08 02:28:40Libertarians believe in open borders in theory. In practice, open borders don’t work, because, among other things, the combination with a welfare state creates a moral hazard, and the least productive of society end up within the borders of welfare states and drain resources. The social services are paid by the productive people of the country or, in the case of most fiat systems, by currency holders through inflation. Welfare states are much more likely under fiat money and the redistribution goes from native taxpayers to illegal immigrants. Thus, under fiat money, open borders end up being an open wound by which the productive lifeblood of the country bleeds out, despite the theoretical trade-efficiency benefits. As libertarians like to say, open borders and the welfare state don’t mix. In this article, we’ll examine the other sacred cow of libertarian thought: free trade.
Free Trade without Libertarian Ideals
Free trade is very similar to free movement of labor in that it works great in theory, but not in practice, especially under fiat money. In a libertarian free-market world, free trade works. But that assumes a whole host of libertarian ideals like sound money, non-interfering governments, and minimal aggression. Once those ideals are violated, such as with government intervention in the market, similar moral hazards and long-term costs come with them, making free trade about as libertarian as a fractional reserve bank.
An example will illustrate what I’m talking about. Let’s say Portugal subsidizes their wine for export to other countries. The obvious first-order effect is that it makes Portuguese wine cheaper in France, perhaps undercutting the price of French wine. Libertarians would say, that’s great! French customers get cheaper goods, so what’s the problem?
As with any government intervention, there are significant second- and third-order effects in play. Subsidization puts unsubsidized companies at risk, perhaps driving them to bankruptcy. In this case, this might be a French wine maker. Subsidized companies may become zombies instead of dying out. In this case, this might be a Portuguese wine maker that was failing domestically but survives by selling to customers abroad with government subsidies. While French customers benefit in the short run with cheaper prices for wine, they are ultimately hurt because the goods that would have existed without government intervention never come to market. Perhaps French wine makers that went bankrupt were innovating. Perhaps the resources of the zombie Portuguese wine maker would have created something better.
Further, the dependency of French people on Portuguese wine means that something going wrong in Portugal, like a war or subsidy cuts, disrupts the supply and price of wine for France. Now France must meddle in Portugal internationally if it doesn’t want the wine supply to get disrupted. The two countries get entangled in such a way as to become more interventionist internationally. A war involving Portugal now suddenly becomes France’s business and incentivizes military aid or even violence. As usual, the unseen effects of government policy are the most pernicious.
Not Really Free
In other words, what we call free trade isn’t really free trade. A country exporting to the US may subsidize their products through government intervention, making the product cheaper in the US. This hurts US companies, and they’re forced into choices they never would have had to face without the foreign government intervention. But because the good is crossing borders under the rubric of “free trade,” it’s somehow seen as fair. Of course it’s not, as government intervention distorts the market whether it’s done by our own government or a foreign government.
So why would a foreign government do this? It gets several benefits through targeted market manipulation. First, it makes its own companies’ products more popular abroad and conversely, makes US companies’ products less popular. This has the dual benefit of growing the foreign government’s firms and shrinking, perhaps bankrupting, the US ones.
Targeted subsidization like this can lead to domination under free trade. It’s not unlike the Amazon strategy of undercutting everyone first and using the monopoly pricing power at scale once everyone else has bankrupted. The global monopoly is tremendously beneficial to the country that has it. Not only is there significant tax revenue over the long term, but also a head start on innovations within that industry and an advantage in production in the adjacent industries around the product.
Second, the manufacturing centralization gives that country leverage geo-politically. A critical product that no one else manufactures means natural alliances with the countries that depend on the product, which is especially useful for smaller countries like Taiwan. Their chip manufacturing industry, holding 60% of global supply (2024), has meant that they’re a critical link for most other countries, and hence, they can use this fact to deter Chinese invasion.
Third, because of the centralization of expertise, more innovations, products, and manufacturing will tend to come within the country. This increased production has cascading benefits, including new industries and national security. China leads the world in drone technology, which undoubtedly has given it an innovation advantage for its military, should it go to war.
Fourth, the capital that flows into the country for investing in the monopolized industry will tend to stay, giving the country more wealth in the form of factories, equipment, and skills. While that capital may nominally be in the hands of foreigners, over time, the ownership of that industry will inevitably transition toward native locals, as the knowledge about how to run such industries gets dissipated within the country.
Currency Devaluation: The Universal Trade Weapon
It would be one thing if only a specific industry were singled out for government subsidies and then the products dumped into the US as a way to hurt US companies, as that would limit the scope of the damage. But with currency devaluation, a government can subsidize all of its exports at the same time. Indeed, this is something that many countries do. While short-term, this helps US consumers, it hurts US companies and forces them into decisions that aren’t good for the US.
To compete, they have to lower costs by using the same devalued currency to pay their labor as their foreign competition. That is, by relocating their capital, their manufacturing, and even their personnel to the country that’s devaluing the currency. Not only does relocating reduce labor cost, but it also often gets them benefits like tax breaks. This makes US companies de facto multinationals and not only makes them subject to other jurisdictions, but ultimately divides their loyalties. To take advantage of the reduced labor, capital must move to another country and, along with it, future innovation.
Such relocations ultimately leave the company stripped of their manufacturing capability in the US, as local competition will generally fare better over the long run. Much of the value of the industry then is captured by other governments in taxes, development, and even state-owned companies. Free trade, in other words, creates a vulnerability for domestic companies as they can be put at a significant disadvantage compared to foreign counterparts.
Hidden Effects of Foreign Intervention
Unlike the multinationals, small companies have no chance as they’re not big enough to exploit the labor arbitrage. And as is usual in a fiat system, they suffer the most while the giant corporations get the benefits of the supposed “free trade”. Most small companies can’t compete, so we get mostly the bigger companies that survive.
The transition away from domestic manufacturing necessarily means significant disruption. Domestic workers are displaced and have to find new work. Factories and equipment either have to be repurposed or rot. Entire communities that depended on the manufacturing facility now have to figure out new ways to support themselves. It’s no good telling them that they can just do something else. In a currency devaluation scenario, most of the manufacturing leaves and the jobs left are service-oriented or otherwise location-based, like real estate development. There’s a natural limit to location-based industries because the market only grows with the location that you’re servicing. Put another way, you can only have so many people give haircuts or deliver packages in a geographic area. There has to be some manufacturing of goods that can be sold outside the community, or the community will face scarce labor opportunities relative to the population.
You also can’t say the displaced workers can start some other manufacturing business. Such businesses will get out-competed on labor by the currency-devaluing country, so there won’t be much investment available for such a business, and even if there were, such a business would be competing with its hands tied behind its back. So in this scenario, what you end up with are a large pool of unemployed people whom the state subsidizes with welfare.
So when a US company leaves or goes bankrupt due to a foreign government’s subsidies, the disruption alone imposes a significant short-term cost with displaced labor, unused capital goods, and devastated communities.
Mitigations
So how do countries fight back against such a devastating economic weapon? There are a few ways countries have found around this problem of currency devaluation under free trade. First, a country can prevent capital from leaving. This is called capital controls, and many countries, particularly those that manufacture a lot, have them. Try to get money, factories, or equipment out of Malaysia, for example, and you’ll find that they make it quite difficult. Getting the same capital into the country, on the other hand, faces few restrictions. Unfortunately, the US can’t put in capital controls because dollars are its main export. It is, after all, the reserve currency of the world.
Second, you can compete by devaluing your own currency. But that’s very difficult because it requires printing a lot of dollars, and that causes inflation. There’s also no guarantee that a competing country doesn’t devalue its currency again. The US is also in a precarious position as the world’s reserve currency, so devaluing the currency more than it already does will make other holders of the dollar less likely to want to hold it, threatening the reserve currency status.
So the main two mitigations against currency devaluation in a free trade scenario are not available to the US. So what else is there? The remaining option is to drop free trade. The solution, in other words, is to add tariffs. This is how you can nullify the effects of foreign government intervention, by leveling the playing field for US manufacturers.
Tariffs
One major industry that’s managed to continue being manufactured in the US despite significant foreign competition is cars. Notably, cars have a tariff, which incentivizes their manufacture in the US, even for foreign car makers. The tariff has acted as a way to offset foreign government subsidies and currency debasement.
The scope of this one industry for the US is huge. There are around 300,000 direct jobs in auto assembly within the US (USTR) and there are an additional 3 million jobs supplying these manufacturers within the US. But the benefits don’t end there. The US is also creating a lot of innovation around cars, such as self-driving and plug-in electric cars. There are many countries that would love to have this industry for themselves, but because of tariffs, auto manufacturing continues in the US.
And though tariffs are seen as a tax on consumers, US car prices are cheap relative to the rest of the world. What surprises a lot of people when they move from the US to other countries is finding out that the same car often costs more abroad (e.g. 25% tariffs keep U.S. prices 20% below Europe’s $40K average, 2024). The downside of tariffs pales next to the downsides of “free trade.”
Free Trade Doesn’t Work with Fiat Money
The sad reality is that while we would love for free trade to work in the ideal libertarian paradise, it won’t in our current fiat-based system. The subsidization by foreign governments to bankrupt US companies or to make them multinational, combined with the unfortunate reality of the US dollar being the world reserve currency, means that free trade guts the US of manufacturing. Tariffs are a reasonable way to protect US manufacturers, particularly smaller ones that can’t go multinational.
What’s more, tariffs make the US less fragile and less dependent on international supply chains. Many of the wars in the past 60 years have been waged because of the entanglements the US has with other countries due to the reliance on international supply chains. Lessening this dependency, if only to prevent a war, has clear value.
Lastly, labor has been devalued significantly by fiat monetary expansion, but at least some of that can be recovered if tariffs create more manufacturing, which in turn adds to the demand for labor. This should reduce the welfare state as more opportunities are made available and fewer unemployed people will be on the rolls.
Conclusion
Fiat money produces a welfare state, which makes open borders unworkable. Fiat money also gives foreign governments a potent economic weapon to use against US companies, and by extension the labor force that powers them. Though currency debasement and capital controls are available to other countries as a defense, for the US, neither of these tools is available due to the fact that the dollar is the world reserve currency. As such, tariffs are a reasonable defense against the fiat subsidization of foreign governments.
-
@ df478568:2a951e67
2025-03-08 02:16:57I began using/testing Cashu over 105,120 blocks ago when @NVK said "Cashu is very interesting.".
The first time I swapped sweet cipher-text to sats, it was too new new and novel to digest. Someone sent me cashu over nostr, straight to my npub. I copy pasta-ed it into my minibits wallet and recieved 10 sats. In retrospect, I would compare it to gold backed paper currency. Over a century ago, paper USD was a coupon for gold, "redeemable in gold on demand at the United States Treasury, or in gold for lawful money at any federal reserve bank.
In the analog days of the early 20th century a bean-counter at a Federal Reserve bank would give you approximately 5 ounces of gold for an analog bored ape, Ben Franklin. Cashu is an NFT without the jpeg and the innate ability to be redeemed for bitcoin over the lightning network. I've heard NVK describe it as "an honest shitcoin" and I like this framing. The rug-pull risk is greater than zero, but less than the rug-pull risk of Wallet of Satoshi with the added benefit of generational wealth.
This means we can abstract bitcoin value into something that looks like this.
cashuBpGFteCJodHRwczovL21pbnQubWluaWJpdHMuY2FzaC9CaXRjb2luYXVjc2F0YXSBomFpSABQBVDwSUFGYXCCpGFhAmFzeEBkMzM2Mjk1OTZhNTVkODcyNWFjOGI3MDQyNjM5MjQ0OTU4YmJlMjVkYmFhYzIyY2E5Y2M2NTMyNTM1OWFiZDI2YWNYIQNOrrDCFnYa3sMJxpr02o8Bg5AfibjqIOTmiktqYkABKWFko2FlWCBdC0gEM2j5YE4_xMGyuvLHIufqx7zzp6TNJAeJiB6_WmFzWCDRMyyGRmJPYmwB3u8kB7fyBlvRm69hC2DfkyY5Mizd-WFyWCB_88znXGBc_GgRngr9m1nEYAJEDUkQiQLT1e6R9_Un_aRhYQhhc3hANjVkYWQyM2ExNjQyNTYzMDU5OGRmMTdiNDc0YWQ0YzdhMjNhMmFiZjUwNjEzYTdjOTI4NzllMDllZTg5ODcxZWFjWCECoRg-ub_wReP4T6A0UuwqS36Iw6Ton4U5j6IJrLYjKCxhZKNhZVggmXDv_na1XQU3ESYq147mIyDyQm5mgsnkl7HxBbVmXv9hc1ggIbKkVVdG06hBgAvWBhoFo8T-V6MjNzxUGNaGjQjU2e5hclggAJp2vzdgwmehnhwmmFQsZ_BNTb8Aqz_ItwOx0iLQ9NlhZHgtQ29uZ3JhdHVsYXRpb25zIGZvciBjbGFpbWluZyB0aGlzIGVjYXNoIGZpcnN0
The lightning network is cool, but requires the reciever to have a wallet. Many Americans began using nostr when Wallet of Satoshi was available to them. They disappeared like a magiian once Wallet of Satoshi was removed from the app stores. To be fair, it still works. Last I checked, sats from wallet of satoshi can still be received and spent from US based IP addresses, but non-technical noobs can no longer download it from app stores designed for the neuro-typical.
I sprinkled a little e cash in a few Substack articles, but few people know what it is. These things takes time. Maybe it's too early. Maybe, just maybe, we can make paper cash great again.
Is it a long shot? Sure. Will I try it anyway? Hell yes!
How To Make Paper Money Great Again
The plan: Create paper products with QR codes that have Cashu. Think tip cards or birtday cards designed to hold cash. You can choose your mint on Mibibits or Macadamia depending on your pnone. This is not bitcoin for posterity. We're talking about pocket spending money, not generational wealth.
I plan to make and sell greeting cards: HallMarc cards.😉 I draw like I'm 5, but we'll let the market decide if they prefer my Kidnergarden-style art or Ideogram. Then I'll write some cheesy words people like on greeting cards. Here's my first idea.
Happy Birthday
Stack Sats.
Okay....So it's more like a first draft, but this is a proof of concept. Cut me some slack. 😅 There's still a few kinks to work out, but here's the prototype.
Set Up Shop With A Free And Open Source Version
I will add these cards to my merch shop. I can add 1,000 sats, maybe some custom amounts, but I'll also open source them. I like to give cards that pay bitcoin to kids in my family. If I open source this, maybe more people will be willing to give the kids in their family sats. It only costs card stock paper, ink, and the sats you give away.
If you're like me, your family knows your a bitcoin dork anyway. We might as well show them it's not just an investment. It's money we can give them they can either save or spend.
We should mention it's better to save bitcoin. That's what stacking sats means. That will be my second draft.
Happy Birthday.
Save as much bitcoin as you can.
Npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
https://mempool.marc26z.com/block/000000000000000000001567ce65dab25358bcae86c2c573984888eb08948b65
https://marc26z.com/merch/
-
@ 6e0ea5d6:0327f353
2025-03-08 01:31:14💀
No one returns the same after witnessing such great disrespect that even the eyes doubt what they see.
When behavior does not match the promise, when the path being followed contradicts our principles, when a lie unfolds right before our eyes, or when an offense is deliberately crafted as a test of our resolve, a feeling arises—one that urges us to intervene, to stop such foolishness so that things may proceed as they should. But it is an arrow already released. It cannot be retrieved. There is no turning back. And perhaps, Nietzsche’s words explain it best:
"I’m not upset that you lied to me; I’m upset that from now on, I can’t trust you."
This is what we feel, in conflict with what we know. But maturity has taught us whom to listen to. The mind knows that one must be cruel to oneself so that others will not be cruel to us.
It takes cruelty to kill with indifference what desires to live in our hearts.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 6e0ea5d6:0327f353
2025-03-08 01:17:35Ascolta bene, amico mio. Are you really concerned about what a morally bankrupt society has to say about "being a man"?
The same society that glorifies weakness, where anyone—without the slightest idea of what it means to bear the weight of masculinity—thinks they have the right to an opinion? And, of course, we can’t forget the spectacle: women without any solid paternal reference, never having experienced what it means to have a true masculine figure, now feel entitled to dictate how you should live, act, and even feel. This is more than a joke—it’s the tragic portrait of a civilization on the brink of collapse.
Think about it: it’s as if someone who has never held a hammer tried to teach a blacksmith how to forge steel. What do they know about the burden of being a man? They have never had to carry this weight. They have never known what it is to walk alone, facing the world without guarantees, without anyone to catch them when everything falls apart. Talking is easy, amico mio, when they’ve never had to get their hands dirty with the brutal reality we face every day.
Want to know what you should do? Ignore it. Simple as that. The opinion of those who have never walked your path holds no value. Do not take seriously the judgments of those trapped in a modern fantasy of masculinity, shaped by empty ideals that only encourage weakness. If these women have never had a strong father figure, a real example of masculinity, what do they know about being a man? Nothing. And the worst part: they don’t even realize the emptiness of their words.
And here’s the lesson: you don’t need the approval of a lost society that doesn’t understand the value of discipline, strength, and the sacrifice that true masculinity demands. You don’t need to be shaped by the expectations of this dying world. The only respect that matters is the one you have for yourself. Once you understand this, the judgment of others becomes irrelevant, and their voices fade into the wind like an insignificant breeze.
Who do you want to be respected by? A society that glorifies mediocrity? Or by those who, like you, know the true struggle?
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 4925ea33:025410d8
2025-03-08 00:38:481. O que é um Aromaterapeuta?
O aromaterapeuta é um profissional especializado na prática da Aromaterapia, responsável pelo uso adequado de óleos essenciais, ervas aromáticas, águas florais e destilados herbais para fins terapêuticos.
A atuação desse profissional envolve diferentes métodos de aplicação, como inalação, uso tópico, sempre considerando a segurança e a necessidade individual do cliente. A Aromaterapia pode auxiliar na redução do estresse, alívio de dores crônicas, relaxamento muscular e melhora da respiração, entre outros benefícios.
Além disso, os aromaterapeutas podem trabalhar em conjunto com outros profissionais da saúde para oferecer um tratamento complementar em diversas condições. Como já mencionado no artigo sobre "Como evitar processos alérgicos na prática da Aromaterapia", é essencial ter acompanhamento profissional, pois os óleos essenciais são altamente concentrados e podem causar reações adversas se utilizados de forma inadequada.
2. Como um Aromaterapeuta Pode Ajudar?
Você pode procurar um aromaterapeuta para diferentes necessidades, como:
✔ Questões Emocionais e Psicológicas
Auxílio em momentos de luto, divórcio, demissão ou outras situações desafiadoras.
Apoio na redução do estresse, ansiedade e insônia.
Vale lembrar que, em casos de transtornos psiquiátricos, a Aromaterapia deve ser usada como terapia complementar, associada ao tratamento médico.
✔ Questões Físicas
Dores musculares e articulares.
Problemas respiratórios como rinite, sinusite e tosse.
Distúrbios digestivos leves.
Dores de cabeça e enxaquecas. Nesses casos, a Aromaterapia pode ser um suporte, mas não substitui a medicina tradicional para identificar a origem dos sintomas.
✔ Saúde da Pele e Cabelos
Tratamento para acne, dermatites e psoríase.
Cuidados com o envelhecimento precoce da pele.
Redução da queda de cabelo e controle da oleosidade do couro cabeludo.
✔ Bem-estar e Qualidade de Vida
Melhora da concentração e foco, aumentando a produtividade.
Estímulo da disposição e energia.
Auxílio no equilíbrio hormonal (TPM, menopausa, desequilíbrios hormonais).
Com base nessas necessidades, o aromaterapeuta irá indicar o melhor tratamento, calculando doses, sinergias (combinação de óleos essenciais), diluições e técnicas de aplicação, como inalação, uso tópico ou difusão.
3. Como Funciona uma Consulta com um Aromaterapeuta?
Uma consulta com um aromaterapeuta é um atendimento personalizado, onde são avaliadas as necessidades do cliente para a criação de um protocolo adequado. O processo geralmente segue estas etapas:
✔ Anamnese (Entrevista Inicial)
Perguntas sobre saúde física, emocional e estilo de vida.
Levantamento de sintomas, histórico médico e possíveis alergias.
Definição dos objetivos da terapia (alívio do estresse, melhora do sono, dores musculares etc.).
✔ Escolha dos Óleos Essenciais
Seleção dos óleos mais indicados para o caso.
Consideração das propriedades terapêuticas, contraindicações e combinações seguras.
✔ Definição do Método de Uso
O profissional indicará a melhor forma de aplicação, que pode ser:
Inalação: difusores, colares aromáticos, vaporização.
Uso tópico: massagens, óleos corporais, compressas.
Banhos aromáticos e escalda-pés. Todas as diluições serão ajustadas de acordo com a segurança e a necessidade individual do cliente.
✔ Plano de Acompanhamento
Instruções detalhadas sobre o uso correto dos óleos essenciais.
Orientação sobre frequência e duração do tratamento.
Possibilidade de retorno para ajustes no protocolo.
A consulta pode ser realizada presencialmente ou online, dependendo do profissional.
Quer saber como a Aromaterapia pode te ajudar? Agende uma consulta comigo e descubra os benefícios dos óleos essenciais para o seu bem-estar!