-
@ 16f1a010:31b1074b
2025-02-19 20:57:59In the rapidly evolving world of Bitcoin, running a Bitcoin node has become more accessible than ever. Platforms like Umbrel, Start9, myNode, and Citadel offer user-friendly interfaces to simplify node management. However, for those serious about maintaining a robust and efficient Lightning node ⚡, relying solely on these platforms may not be the optimal choice.
Let’s delve into why embracing Bitcoin Core and mastering the command-line interface (CLI) can provide a more reliable, sovereign, and empowering experience.
Understanding Node Management Platforms
What Are Umbrel, Start9, myNode, and Citadel?
Umbrel, Start9, myNode, and Citadel are platforms designed to streamline the process of running a Bitcoin node. They offer graphical user interfaces (GUIs) that allow users to manage various applications, including Bitcoin Core and Lightning Network nodes, through a web-based dashboard 🖥️.
These platforms often utilize Docker containers 🐳 to encapsulate applications, providing a modular and isolated environment for each service.
The Appeal of Simplified Node Management
The primary allure of these platforms lies in their simplicity. With minimal command-line interaction, users can deploy a full Bitcoin and Lightning node, along with a suite of additional applications.
✅ Easy one-command installation
✅ Web-based GUI for management
✅ Automatic app updates (but with delays, as we’ll discuss)However, while this convenience is attractive, it comes at a cost.
The Hidden Complexities of Using Node Management Platforms
While the user-friendly nature of these platforms is advantageous, it can also introduce several challenges that may hinder advanced users or those seeking greater control over their nodes.
🚨 Dependency on Maintainers for Updates
One significant concern is the reliance on platform maintainers for updates. Since these platforms manage applications through Docker containers, users must wait for the maintainers to update the container images before they can access new features or security patches.
🔴 Delayed Bitcoin Core updates = potential security risks
🔴 Lightning Network updates are not immediate
🔴 Bugs and vulnerabilities may persist longerInstead of waiting on a third party, why not update Bitcoin Core & LND yourself instantly?
⚙️ Challenges in Customization and Advanced Operations
For users aiming to perform advanced operations, such as:
- Custom backups 📂
- Running specific CLI commands 🖥️
- Optimizing node settings ⚡
…the abstraction layers introduced by these platforms become obstacles.
Navigating through nested directories and issuing commands inside Docker containers makes troubleshooting a nightmare. Instead of a simple
bitcoin-cli
command, you must figure out how to execute it inside the container, adding unnecessary complexity.Increased Backend Complexity
To achieve frontend simplicity, these platforms make the backend more complex.
🚫 Extra layers of abstraction
🚫 Hidden logs and settings
🚫 Harder troubleshootingThe use of multiple Docker containers, custom scripts, and unique file structures can make system maintenance and debugging a pain.
This complication defeats the purpose of “making running a node easy.”
✅ Advantages of Using Bitcoin Core and Command-Line Interface (CLI)
By installing Bitcoin Core directly and using the command-line interface (CLI), you gain several key advantages that make managing a Bitcoin and Lightning node more efficient and empowering.
Direct Control and Immediate Updates
One of the biggest downsides of package manager-based platforms is the reliance on third-party maintainers to release updates. Since Bitcoin Core, Lightning implementations (such as LND, Core Lightning, or Eclair), and other related software evolve rapidly, waiting for platform-specific updates can leave you running outdated or vulnerable versions.
By installing Bitcoin Core directly, you remove this dependency. You can update immediately when new versions are released, ensuring your node benefits from the latest features, security patches, and bug fixes. The same applies to Lightning software—being able to install and update it yourself gives you full autonomy over your node’s performance and security.
🛠 Simplified System Architecture
Platforms like Umbrel and myNode introduce extra complexity by running Bitcoin Core and Lightning inside Docker containers. This means:
- The actual files and configurations are stored inside Docker’s filesystem, making it harder to locate and manage them manually.
- If something breaks, troubleshooting is more difficult due to the added layer of abstraction.
- Running commands requires jumping through Docker shell sessions, adding unnecessary friction to what should be a straightforward process.
Instead, a direct installation of Bitcoin Core, Lightning, and Electrum Server (if needed) results in a cleaner, more understandable system. The software runs natively on your machine, without containerized layers making things more convoluted.
Additionally, setting up your own systemd service files for Bitcoin and Lightning is not as complicated as it seems. Once configured, these services will run automatically on boot, offering the same level of convenience as platforms like Umbrel but without the unnecessary complexity.
Better Lightning Node Management
If you’re running a Lightning Network node, using CLI-based tools provides far more flexibility than relying on a GUI like the ones bundled with node management platforms.
🟢 Custom Backup Strategies – Running Lightning through a GUI-based node manager often means backups are handled in a way that is opaque to the user. With CLI tools, you can easily script automatic backups of your channels, wallets, and configurations.
🟢 Advanced Configuration – Platforms like Umbrel force certain configurations by default, limiting how you can customize your Lightning node. With a direct install, you have full control over: * Channel fees 💰 * Routing policies 📡 * Liquidity management 🔄
🟢 Direct Access to LND, Core Lightning, or Eclair – Instead of issuing commands through a GUI (which is often limited in functionality), you can use: *
lncli
(for LND) *lightning-cli
(for Core Lightning) …to interact with your node at a deeper level.Enhanced Learning and Engagement
A crucial aspect of running a Bitcoin and Lightning node is understanding how it works.
Using an abstraction layer like Umbrel may get a node running in a few clicks, but it does little to teach users how Bitcoin actually functions.
By setting up Bitcoin Core, Lightning, and related software manually, you will:
✅ Gain practical knowledge of Bitcoin nodes, networking, and system performance.
✅ Learn how to configure and manage RPC commands.
✅ Become less reliant on third-party developers and more confident in troubleshooting.🎯 Running a Bitcoin node is about sovereignty – learn how to control it yourself.
Become more sovereign TODAY
Many guides make this process straightforward K3tan has a fantastic guide on running Bitcoin Core, Electrs, LND and more.
- Ministry of Nodes Guide 2024
- You can find him on nostr
nostr:npub1txwy7guqkrq6ngvtwft7zp70nekcknudagrvrryy2wxnz8ljk2xqz0yt4xEven with the best of guides, if you are running this software,
📖 READ THE DOCUMENTATIONThis is all just software at the end of the day. Most of it is very well documented. Take a moment to actually read through the documentation for yourself when installing. The documentation has step by step guides on setting up the software. Here is a helpful list: * Bitcoin.org Bitcoin Core Linux install instructions * Bitcoin Core Code Repository * Electrs Installation * LND Documentation * LND Code Repository * CLN Documentation * CLN Code Repository
If you have any more resources or links I should add, please comment them . I want to add as much to this article as I can.
-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Let’s dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computers—and it has nothing to do with what so-called “quantum coaches” teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoin’s security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computing’s Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. It’s a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoin’s Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoin’s blockchain.
- Lamport: Created in 1977, it’s considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoin’s Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the community’s constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoin’s future is not at risk—it is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ eac63075:b4988b48
2024-10-20 13:49:55Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
Conclusion of the Technical Debate
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
Conclusion of the Debate
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
Summary of Consequences
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 6e0ea5d6:0327f353
2025-03-12 17:56:58Davvero, when we look at the grandeur flaunted by many, we must ask ourselves: what are they really trying to hide? Non tutto è oro quel che luccica.
Excesses are often a mask for the deficiencies we fear to expose. Like a tree that grows crooked but covers itself with leaves to disguise its tilt, so too does a man hide his weaknesses with exaggeration.
Why do some indulge in excessive luxuries? Is opulence a sign of success or a silent cry of insecurity? The heaviest armor is not worn by the strong, but by those who fear the slightest blow. It is internal fragility that demands external walls.
Rigid rules and inflexible standards are often the refuge of those who don’t trust themselves. Does one truly confident need to impose so many restrictions? The self-assured man walks freely, while the insecure shackles himself with norms he has created.
In everyday life, we see this constantly. The tyrannical boss who hides his incompetence behind harsh orders. The politician who masks his flaws with grand promises. The louder the tone, the greater the attempt to silence the inner void.
Instead of covering our deficiencies with excess, we must face them. What use is heavy armor if it prevents us from moving? Overprotection can become a prison.
In the game of power, recognizing and manipulating your own shortcomings can be the most effective weapon. Don’t let yourself be trapped by rules that only serve to mask insecurities. Use appearances to your advantage, letting others underestimate your fragility while you advance.
After all, who said vulnerability can’t be your greatest strategy?
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ d1d95580:0e253b97
2025-03-12 17:45:43
Morning: Energize and Focus
- Meal:
- Option 1: 2-3 eggs (fried or scrambled in butter) with 4-6 oz of sausage or bacon.
- Option 2: Full-fat Greek yogurt (plain) with a handful of mixed nuts and a teaspoon of honey.
- Why: High protein and fats provide steady energy; variety ensures accessibility. Based on Saladino and Baker’s emphasis on animal-based nutrition, with a nod to broader dietary preferences.
- Drink: Water or black coffee—hydration and focus without complexity.
- Habit (Inspired by DrJackKruse & hubermanlab):
- Natural Light: 5-15 minutes outdoors in morning light (sunny or overcast).
- Why: Regulates sleep-wake cycles and boosts alertness—Kruse’s circadian science and Huberman’s practical neuroscience agree it’s foundational.
- Learning:
- Short Study: 5-10 minutes reading a health article or listening to a podcast segment (e.g., Huberman Lab on sleep or nutrition).
- Why: Starts the day with useful knowledge—small, digestible doses for busy schedules.
Midday: Maintain Momentum
- Meal:
- Option 1: Grilled chicken (6-8 oz) with sautéed kale or spinach in olive oil.
- Option 2: Baked salmon (5-6 oz) with a small sweet potato and steamed asparagus.
- Why: Protein sustains muscle and focus, vegetables add vitamins—combines Baker’s meat focus with Huberman’s balanced nutrient approach.
- Sport (Inspired by hubermanlab):
- Activity Break: 10-15 minutes of movement—brisk walk, 3 sets of 10 squats, or 15 push-ups.
- Why: Improves blood flow and mental clarity—Huberman’s research shows short exercise enhances productivity.
- Habit:
- Water Boost: Drink 16-20 oz of water (optional pinch of sea salt for electrolytes).
- Why: Prevents dehydration, supports stamina—Saladino and Kruse highlight hydration’s role in health.
Afternoon: Stay Steady
- Meal (Snack):
- Option 1: 2 hard-boiled eggs with a handful of almonds.
- Option 2: A medium apple with 1-2 tablespoons of peanut butter.
- Why: Quick, nutrient-rich options stabilize energy—protein, fats, and minimal carbs align with ancestral eating (Saladino) and practical snacking (Huberman).
- Reading (Inspired by MartyBent):
- Daily Read: 15-20 minutes with a book—e.g., Atomic Habits (James Clear) for behavior or The Body (Bill Bryson) for health science.
- Why: Bent’s curiosity-driven approach—steady learning builds long-term benefits.
- Habit (Inspired by hubermanlab):
- Breathing Pause: 1-2 minutes of slow breathing (inhale 4 seconds, exhale 6 seconds).
- Why: Lowers stress, resets focus—Huberman’s data-backed method for mental resilience.
Evening: Recover and Reflect
- Meal:
- Option 1: Pan-seared beef steak (8-10 oz) with roasted carrots or Brussels sprouts.
- Option 2: Roasted cod (6 oz) with quinoa (half cup) and a side salad (olive oil dressing).
- Why: Protein repairs tissue, sides provide fiber and variety—Saladino’s meat-first philosophy meets Huberman’s holistic nutrition.
- Sport/Habit (Inspired by DrJackKruse):
- Light Movement: 15-20 minute walk after eating or 5-10 minutes of stretching (focus on back and legs).
- Why: Supports digestion and relaxation—Kruse’s focus on natural rhythms, made simple.
- Learning (Inspired by MartyBent):
- Social Scan: 10 minutes on X, reading or engaging with health-related posts.
- Why: Bent’s community engagement—stay informed, connect with ideas.
Night: Rest Well
- Habit (Inspired by hubermanlab & DrJackKruse):
- Screen Wind-Down: Reduce screen brightness or use warm lighting 1 hour before bed (target 10-11 PM sleep).
- Why: Preserves sleep quality—Huberman and Kruse both stress light’s impact on rest.
- Reading (Optional):
- Night Read: 10-15 pages of a calming book—e.g., Sapiens (Yuval Noah Harari) or a novel like To Kill a Mockingbird.
- Why: Eases the mind, encourages reflection—pairs well with a thoughtful lifestyle.
Core Principles
- Meals: Prioritize whole foods—protein, healthy fats, moderate vegetables or carbs. Flexible and realistic.
- Sports: Brief, effective exercise—enhances health without dominating your day.
- Habits: Use natural tools (light, water, breath)—simple, proven, no gimmicks.
- Learning/Reading: Consistent input—broaden knowledge practically and gradually.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ a367f9eb:0633efea
2025-03-12 17:39:59As Congress debates yet another Continuing Resolution to hastily fund the federal government for a few months, the House yesterday passed a resolution that mixes together several bills.
Tucked within these provisions was a legalistic quirk that would end Congress’ ability to end President Trump’s “State of Emergency” that has so far given him some legal latitude to impose swaths of new tariffs and duties that affect consumers.
The resolution passed by the House of Representatives contained four sections for consideration:
1.) Repeal of the IRS rule related to DeFi brokers and registration (also known as the broker role), affecting cryptocurrency platforms.
2.) Opening the state of limitations related to pandemic relief era as provided in the CARES Act.
3.) A Continuing Resolution to fund the government on a temporary basis
4.) Declaring the rest of the year as a single calendar day for the purposes of the National Emergencies Act
While each of these sections should elicit some debate or praise, the last section is purposefully written so as to freeze time on the Congressional calendar.
Why is this important?
The section reads: “Each day for the remainder of the first session of the 119th Congress shall not constitute a calendar day for purposes of section 202 of the National Emergencies Act (50 U.S.C. 1622) with respect to a joint resolution terminating a national emergency declared by the President on February 1, 2025.”
As reported by the New York Times, this is a procedural move that would neuter Congress’ ability to pass any vote or resolution to gain back their power to issue tariffs and other trade sanctions, because 15 calendar days will not pass (at least legally) for the remainder of the year:
House Democrats had planned to force a vote on resolutions to end the tariffs on Mexico and Canada, a move allowed under the National Emergencies Act, which provides a mechanism for Congress to terminate an emergency like the one Mr. Trump declared when he imposed the tariffs on Feb. 1.
That would have forced Republicans — many of whom are opposed to tariffs as a matter of principle — to go on the record on the issue at a time when Mr. Trump’s commitment to tariffs has spooked the financial markets and spiked concerns of reigniting inflation.
…
The national emergency law lays out a fast-track process for Congress to consider a resolution ending a presidential emergency, requiring committee consideration within 15 calendar days after one is introduced and a floor vote within three days after that.
By passing the resolution, the House Majority has effectively neutered its own authority to set trade policies and to hold the Executive Branch accountable, allowing it to keep the State of Emergency in place so President Trump can issue tariffs on Canada, Mexico, China, the European Union, or any other country without much opposition.
Though the President has some authority to issue tariffs in an emergency situation, according to the National Emergencies Act, removing Congress’ ability to end or even reverse the State of Emergency for the rest of 2025 means Congress has abrogated its responsibility to even have a say on trade policies.
By allowing President Trump to prolong his State of Emergency, there will be no constitutional way for Congress to curb the excesses of the multi-theater trade wars being waged across the world, harming consumers who would otherwise profit from freer trade.
Tariffs are taxes on consumers, and trade wars only make consumers poorer, as Consumer Choice Center describes in detail on FreeTrade4Us.org.
Knowing this was a possibility, Kentucky Senator Rand Paul introduced a bill last year to reaffirm the ability of Congress – and Congress alone – to set trade policy and avoid costly tariffs that raise prices for consumers. He called it the “No Taxation Without Representation Act“.
“Our Constitution was designed to prevent any branch from overstepping its bounds. Unchecked executive actions enacting tariffs tax our citizens, threaten our economy, raise prices for everyday goods, and erode the system of checks and balances that our founders so carefully crafted,” wrote Sen. Paul.
If Congress neuters its ability to counter tariffs, then American consumers will have to continue to bear the brunt of protectionist policies that are currently making them worse off.
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ e97aaffa:2ebd765d
2025-03-12 17:18:15O que se passou, hoje, no parlamento português é indescritível, simplesmente um bando de garotos, para não dizer um bando de imbecis, que não querem saber do país, apenas se movem por interesses partidários ou/e pessoais.
Todos queriam ir para eleições, mas negava-o publicamente e empurravam a responsabilidade para o outro, foi um teatro. Agora vamos para eleições, 3° eleições em 4 anos, isto é um absurdo, um completo absurdo.
Eu desde pequeno, sempre tive interesse por política, gosto de estar informado, mas nunca me senti tão cansado e sem paciência para esta atual classe de políticos. São quase todos medíocres, de ano para ano, só piora, sinceramente, não sei como o país vai sair desta espiral.
Há uns anos, os partidos ainda tinham a decência de limpar as maçãs podres, mesmo que fosse impopular, ou mesmo que perdessem votos ou cargos. Hoje em dia, parecem que escolhe a dedo, as maçãs podres como candidatos a líder e consequentemente para governar o país.
Da mesma maneira que critiquei o PS, quando elegeu o PNS, após ser demitido do governo após vários escândalos e por demonstrar incompetência. Agora com todas estas suspeitas sobre Montenegro, que esteve em todos os momentos, péssimo no caso, deixou o caso crescer, crescer, até que ficou indomável. Não seria melhor o PSD escolher outro líder, eu acho que sim, não é a opinião do partido.
O Montenegro está a fazer uma jogada muito arriscada, o tiro pode sair pela culatra. Eu acho que eles não estão a fazer bem as contas. Depois de todas as polémicas é previsível que o Chega perca votos, é neste ponto a crença do AD, que acredita que pode ganhar 1 ou 2% e a IL fica com os restantes. Eles acreditam que podem fazer um governo de maioria, juntamente com a IL. Mas eu acho que eles estão se a esquecer de um pormenor, será que os eleitores descontentes do Chega, vão mudar o voto para o AD ou para o IL?
Uma pequena parte vai mudar com certeza, mas o grande público do Chega, são malta descontentes com política e com os políticos, que viram no partido um esperança. Isso foi visível nas últimas eleições, o Chega foi fundamental na queda da abstenção, eram pessoas que não votavam há anos ou que nunca tinham votado, acreditaram que o Chega era diferente, foi um voto de protesto. Possivelmente, estas pessoas não vão mudar o voto para AD ou para IL, mas sim, vão voltar a contar como abstenção.
Eu acho que o AD não está a fazer bem as contas. O pior disto tudo, é que vamos para eleições agora, não resolvemos nada e daqui a um ano e meio, estamos de novo em eleições. Os portugueses estão saturados de eleições, mas os políticos só olham para o seu umbigo, não querem saber dos portugueses.
-
@ 04c915da:3dfbecc9
2025-03-12 15:30:46Recently we have seen a wave of high profile X accounts hacked. These attacks have exposed the fragility of the status quo security model used by modern social media platforms like X. Many users have asked if nostr fixes this, so lets dive in. How do these types of attacks translate into the world of nostr apps? For clarity, I will use X’s security model as representative of most big tech social platforms and compare it to nostr.
The Status Quo
On X, you never have full control of your account. Ultimately to use it requires permission from the company. They can suspend your account or limit your distribution. Theoretically they can even post from your account at will. An X account is tied to an email and password. Users can also opt into two factor authentication, which adds an extra layer of protection, a login code generated by an app. In theory, this setup works well, but it places a heavy burden on users. You need to create a strong, unique password and safeguard it. You also need to ensure your email account and phone number remain secure, as attackers can exploit these to reset your credentials and take over your account. Even if you do everything responsibly, there is another weak link in X infrastructure itself. The platform’s infrastructure allows accounts to be reset through its backend. This could happen maliciously by an employee or through an external attacker who compromises X’s backend. When an account is compromised, the legitimate user often gets locked out, unable to post or regain control without contacting X’s support team. That process can be slow, frustrating, and sometimes fruitless if support denies the request or cannot verify your identity. Often times support will require users to provide identification info in order to regain access, which represents a privacy risk. The centralized nature of X means you are ultimately at the mercy of the company’s systems and staff.
Nostr Requires Responsibility
Nostr flips this model radically. Users do not need permission from a company to access their account, they can generate as many accounts as they want, and cannot be easily censored. The key tradeoff here is that users have to take complete responsibility for their security. Instead of relying on a username, password, and corporate servers, nostr uses a private key as the sole credential for your account. Users generate this key and it is their responsibility to keep it safe. As long as you have your key, you can post. If someone else gets it, they can post too. It is that simple. This design has strong implications. Unlike X, there is no backend reset option. If your key is compromised or lost, there is no customer support to call. In a compromise scenario, both you and the attacker can post from the account simultaneously. Neither can lock the other out, since nostr relays simply accept whatever is signed with a valid key.
The benefit? No reliance on proprietary corporate infrastructure.. The negative? Security rests entirely on how well you protect your key.
Future Nostr Security Improvements
For many users, nostr’s standard security model, storing a private key on a phone with an encrypted cloud backup, will likely be sufficient. It is simple and reasonably secure. That said, nostr’s strength lies in its flexibility as an open protocol. Users will be able to choose between a range of security models, balancing convenience and protection based on need.
One promising option is a web of trust model for key rotation. Imagine pre-selecting a group of trusted friends. If your account is compromised, these people could collectively sign an event announcing the compromise to the network and designate a new key as your legitimate one. Apps could handle this process seamlessly in the background, notifying followers of the switch without much user interaction. This could become a popular choice for average users, but it is not without tradeoffs. It requires trust in your chosen web of trust, which might not suit power users or large organizations. It also has the issue that some apps may not recognize the key rotation properly and followers might get confused about which account is “real.”
For those needing higher security, there is the option of multisig using FROST (Flexible Round-Optimized Schnorr Threshold). In this setup, multiple keys must sign off on every action, including posting and updating a profile. A hacker with just one key could not do anything. This is likely overkill for most users due to complexity and inconvenience, but it could be a game changer for large organizations, companies, and governments. Imagine the White House nostr account requiring signatures from multiple people before a post goes live, that would be much more secure than the status quo big tech model.
Another option are hardware signers, similar to bitcoin hardware wallets. Private keys are kept on secure, offline devices, separate from the internet connected phone or computer you use to broadcast events. This drastically reduces the risk of remote hacks, as private keys never touches the internet. It can be used in combination with multisig setups for extra protection. This setup is much less convenient and probably overkill for most but could be ideal for governments, companies, or other high profile accounts.
Nostr’s security model is not perfect but is robust and versatile. Ultimately users are in control and security is their responsibility. Apps will give users multiple options to choose from and users will choose what best fits their need.
-
@ 8d34bd24:414be32b
2025-03-12 12:00:41Two nights ago I had a very bad night’s sleep and only got about 4.5 hours of sleep. I read before bed and frequently I read some rather deep books, but last night wasn’t up to anything that required too much brain power. I found a book The Unwavering Resolve of Jonathan Edwards by Steven J. Lawson that my husband had picked up at a library book sale. Honestly, it looked like a summary book for kids, but ended up being a little deeper, although not a hard read. It began with this quote:
Living the Christian life, by all biblical accounts, necessitates the passionate pursuit of personal holiness. Sanctification is never an elective course that a believer may or may not take. Neither is it an upper-level graduate study, required for only a few disciples. Instead, it is a core class, mandated for all Christians. Godliness is a lifelong study, for no one graduates from the school of Christ this side of heaven.
I found this statement inspiring, especially because I see so many people, who call themselves Christians, but that don’t look any different in the way they live their lives than the non-Christians. I decided to investigate more about what the Bible says about sanctification and holiness. I will start with what Jesus, himself, said to us.
But now I come to You; and these things I speak in the world so that they may have My joy made full in themselves. I have given them Your word; and the world has hated them, because they are not of the world, even as I am not of the world. I do not ask You to take them out of the world, but to keep them from the evil one. They are not of the world, even as I am not of the world. Sanctify them in the truth; Your word is truth. As You sent Me into the world, I also have sent them into the world. For their sakes I sanctify Myself, that they themselves also may be sanctified in truth. (John 17:13-19) {emphasis mine}
God gave believers His word, but we frequently leave it sitting on the shelf gathering dust. OK, I’ll admit I’m a book geek and my go-to response to any problem or interest is to read a bunch of books on the subject, but I still don’t understand how someone who knows and loves God can ignore His word. We are so blessed to live in a time when God’s word is easily and cheaply available to all. I’m not sure how many Bibles we have in our home, but it is definitely in double digits. Some are new and some are old. We have hardback, paperback, and leather cover. We have multiple translations. We have Bibles with the traditional order and it at least one that is a chronological Bible. Some are just the words of the Bible while some are study Bibles with commentary from godly men. For most of history, most people couldn’t afford a Bible (handwritten Bibles usually cost more than a year’s income). Those who managed to buy a Bible cherished it and handed it down as a precious family heirloom, but even then, frequently they had to learn a foreign language to read it. They couldn’t read God’s word in their own language. How blessed are we to have Bibles that anyone can afford (and online and Gideon Bibles for those who can’t afford anything) and that we can read in our native language? We all need to make the most of the blessing of being able to read the word of God as if He was speaking directly to us.
In this passage, Jesus also says we will be “sanctified in truth.” The process of being sanctified to be more like Jesus requires that we know, believe, and obey His word. We can only grow so much without spending serious time in the Bible. How can we become more like Jesus if we don’t know who He is? How can we obey God if we don’t know what He commands? How can we share the gospel if we don’t know the whole gospel as defined in Scripture?
Of course just knowing the Bible and the truth is not enough either.
What use is it, my brethren, if someone says he has faith but he has no works? Can that faith save him? If a brother or sister is without clothing and in need of daily food, and one of you says to them, “Go in peace, be warmed and be filled,” and yet you do not give them what is necessary for their body, what use is that? Even so faith, if it has no works, is dead, being by itself.
But someone may well say, “You have faith and I have works; show me your faith without the works, and I will show you my faith by my works.” You believe that God is one. You do well; the demons also believe, and shudder. But are you willing to recognize, you foolish fellow, that faith without works is useless? (James 2:14-20) {emphasis mine}
There are two things mentioned in this passage. I’ll start with the second because it is easiest.
We can’t just know and believe in God. Even “the demons also believe, and shudder.” Head knowledge is not enough for salvation, much less sanctification. The demons know that Jesus is the son of God and that He is the creator of all that is, including themselves. This has not made the demons saved or good. They know the truth, but reject it. Therefore, the first thing after gaining knowledge of Jesus, God the Father, and the Holy Spirit is to believe and submit to His will. Knowing isn’t enough. Believing isn’t enough. Submission and obedience are required.
This brings us to the evidence of true belief and salvation. “I will show you my faith by my works.” If we see no change in the life of a so-called believer, we need to question their salvation, whether it is ourselves or others. “Even so faith, if it has no works, is dead, being by itself.” True faith will be followed by good works in obedience and thankfulness to God.
If you keep My commandments, you will abide in My love; just as I have kept My Father’s commandments and abide in His love. (John 15:10)
In the beatitudes, who does Jesus say will be blessed?
“Blessed are the pure in heart, for they shall see God. (Matthew 5:8)
Who has a pure heart?
Or do you think that the Scripture speaks to no purpose: “He jealously desires the Spirit which He has made to dwell in us”? But He gives a greater grace. Therefore it says, “God is opposed to the proud, but gives grace to the humble.” Submit therefore to God. Resist the devil and he will flee from you. Draw near to God and He will draw near to you. Cleanse your hands, you sinners; and purify your hearts, you double-minded. (James 4:5-8) {emphasis mine}
Those who have a pure heart have the Spirit dwelling in us leading to us:
-
Submitting to God,
-
Resisting the devil,
-
Drawing near to God,
-
Cleansing our hands, and
-
Purifying our hearts.
Of course trying to do these without the indwelling of the Spirit is a losing proposition. We can only succeed through His power.
Even though our sanctification requires the guidance and power of the Spirit in us, that doesn’t mean we just sit around passively waiting for improvement to happen. We are called to actively submit, resist, draw near, cleanse, and purify. We are called to actively learn, yield, follow, and obey. When we seek to become more like Jesus, He empowers us to become more like Jesus. Sometimes He puts us in situations to help us grow. Sometimes He makes miraculous changes in our lives. Sometimes He brings other godly Christians into our lives to mentor us. Each person’s sanctification journey looks unique, just as each of us is unique. The key point is to seek a relationship with Him, to study His word, to fellowship with other believers, and to share God’s love and the gospel with those who don’t know Him. Just as when God fed the 5,000, He wants us to take that first step and give the little we have and then He multiplies it to do a great work in us and in others.
He whose ear listens to the life-giving reproof\ Will dwell among the wise.\ He who neglects discipline despises himself,\ But he who listens to reproof acquires understanding.\ The fear of the Lord is the instruction for wisdom,\ And before honor comes humility. (Proverbs 15:31-33) {emphasis mine}
In order to grow in Christ, we need to humbly listen to reproof, instruction, and discipline. We need to honestly judge ourselves against the ideal model, Jesus Christ, and be willing to change anything that doesn’t look, think, or act like Jesus.
In college I took an art history class. Being a glutton for punishment, I took the harder art history class taken by art majors instead of the easier one for not art majors. There was a story about someone asking Michelangelo about how he carved his masterpiece David statue. He replied something like, “I just carved away everything that wasn’t David.” In the same way, we need to carve away everything in our lives that isn’t like Jesus.
Just as in sculpture, the first carvings are chipping away large chunks of rock. In the same way, there are certain things in our lives that are so repulsive to God, they need to be chipped away quickly even if crudely. As the sculptor gets farther along, His work gets more and more precise and usually slower and slower. In the same way, as we become more and more Christ-like, our sanctification may get more fine-tuned and precise. The changes may seem like they come along more slowly and less obviously to those around us, but we will continue to be refined every day of our lives.
Pursue peace with all men, and the sanctification without which no one will see the Lord. See to it that no one comes short of the grace of God; that no root of bitterness springing up causes trouble, and by it many be defiled; that there be no immoral or godless person like Esau, who sold his own birthright for a single meal. For you know that even afterwards, when he desired to inherit the blessing, he was rejected, for he found no place for repentance, though he sought for it with tears. (Hebrews 12:14-17) {emphasis mine}
Sanctification requires repentance and turning to God. We all have a period of life when we can accept Jesus and when we can grow in His likeness, but a day will come, at either death or rapture, where we will no longer have the opportunity to repent or to be further sanctified.
Now if any man builds on the foundation with gold, silver, precious stones, wood, hay, straw, each man’s work will become evident; for the day will show it because it is to be revealed with fire, and the fire itself will test the quality of each man’s work. If any man’s work which he has built on it remains, he will receive a reward. If any man’s work is burned up, he will suffer loss; but he himself will be saved, yet so as through fire. (1 Corinthians 3:12-15) {emphasis mine}
Do you want to be the person who squeaks into heaven with nothing to show for your life? Or would you rather be like the good servant who hears:
His master said to him, ‘Well done, good and faithful slave. You were faithful with a few things, I will put you in charge of many things; enter into the joy of your master.’ (Matthew 25:21) {emphasis mine}
I want to hear, “Well done, good and faithful slave,” rather than, “OK. You can come in.” I want to faithfully show my Savior how grateful I am for His mercy and His sacrifice. I want to show my God how awesome I think He is.
Therefore, if anyone cleanses himself from these things, he will be a vessel for honor, sanctified, useful to the Master, prepared for every good work. Now flee from youthful lusts and pursue righteousness, faith, love and peace, with those who call on the Lord from a pure heart. But refuse foolish and ignorant speculations, knowing that they produce quarrels. The Lord’s bond-servant must not be quarrelsome, but be kind to all, able to teach, patient when wronged, with gentleness correcting those who are in opposition, if perhaps God may grant them repentance leading to the knowledge of the truth, and they may come to their senses and escape from the snare of the devil, having been held captive by him to do his will. (2 Timothy 2:21-26) {emphasis mine}
I know I want to be “a vessel for honor, sanctified, useful to the Master, prepared for every good work.” How about you? Are you willing to do the work? Are you willing to submit? Are you willing to sacrifice? I find that the more I serve, the better I know God and the more willing I am to work, to submit, and to sacrifice. I notice my priorities lining up more and more with His priorities. Many things that I thought were so important, don’t seem important at all. Other things, for which I didn’t have much interest, have become central in my life.
I had more than a decade of poor health. I could barely take care of my family and our business. I was in survival mode. Still I found time to study God’s word and read the writings of many godly men. It was a time of growing in faith and knowledge and a time of learning to rest in my Savior. Now I have reached a time where I feel an overwhelming need to share what I learned in all of my study. God has given me good enough health that I have more to give (although I still have to be careful to not over do it.) Although we need to grow in our faith and knowledge, we aren’t useful until we share it with others. Sometimes this may be sharing about God to unbelievers. Sometimes it may be speaking the truth in love. Sometimes it may be taking a young Christian and discipling them to be more like Jesus. We all go through different stages of life, but we always need to be available to be used by God.
In pointing out these things to the brethren, you will be a good servant of Christ Jesus, constantly nourished on the words of the faith and of the sound doctrine which you have been following. But have nothing to do with worldly fables fit only for old women. On the other hand, discipline yourself for the purpose of godliness; for bodily discipline is only of little profit, but godliness is profitable for all things, since it holds promise for the present life and also for the life to come. It is a trustworthy statement deserving full acceptance. For it is for this we labor and strive, because we have fixed our hope on the living God, who is the Savior of all men, especially of believers. (1 Timothy 4:6-10) {emphasis mine}
I want to be a profitable work of my God.
We need to make the pursuit of godliness a lifelong pursuit. I’ll leave you with this additional quote from the book that was my inspiration.
Growth in holiness is not a one-time act, but a lifelong pursuit, one that requires a daily determination to live according to the truths taught in Scripture. — Steven J. Lawson “The Unwavering Resolve of Jonathan Edwards
May God call you to Himself, guide you in knowledge of Him, carve you into the image of Jesus, and use you to call many others to Himself.
Trust Jesus
-
-
@ da0b9bc3:4e30a4a9
2025-03-12 11:55:03Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/911193
-
@ 9dd283b1:cf9b6beb
2025-03-12 09:46:45My Raspberry Pi 4 (running Umbrel) has been disconnecting approximately once a month, and my 1TB SSD now has only 80GB of space remaining. I'm considering an upgrade—possibly moving to a Pi 5 with a 2TB drive—but I'm open to any suggestions for a better setup within a similar budget. Any recommendations?
originally posted at https://stacker.news/items/911133
-
@ edeb837b:ac664163
2025-03-12 08:29:40In the fast-evolving world of investing, traders are constantly looking for ways to streamline their trading experience, share insights, and build transparency in the community. NVSTly, the social investing platform, has taken a significant step forward with its brokerage integration feature. This game-changing addition allows traders to automatically track and share their trades with 100% accuracy, creating an ecosystem of trust and transparency for both casual investors and top traders.
What is NVSTly's Brokerage Integration?
NVSTly's brokerage integration enables users to securely connect their brokerage accounts to the platform, allowing trades to be automatically recorded, tracked, and shared in real time. This means no more manual trade entries or missing crucial details—every trade is verified directly from the broker, ensuring authenticity.
Currently, NVSTly supports Webull, but we're actively working on adding support for Charles Schwab (ThinkorSwim), Robinhood, Moomoo, TradeStation, and more. As we expand, traders from multiple brokerages will be able to seamlessly integrate their accounts, making NVSTly the go-to platform for automated trade tracking and social investing.
How Does It Work?
- Securely Link Your Broker – Users can connect their brokerage account to NVSTly through a secure authentication process.
- Automatic Trade Tracking – Every trade executed in the linked brokerage account is automatically recorded on NVSTly, including trade details such as asset type, entry/exit price, time, and trade status.
- Real-Time Trade Sharing – Users can choose to share trades instantly with their followers, to social media, or Discord.
- 100% Accuracy & Verification – Since all trades are pulled directly from the brokerage account, the data is fully verified and cannot be altered, ensuring complete transparency.
Why Are Traders Linking Their Broker Accounts?
NVSTly’s brokerage integration provides immense value for traders of all levels. Here’s why thousands are choosing to connect their broker:
1. No More Manual Entry
Keeping track of trades manually is time-consuming and prone to errors. With NVSTly, all trades are logged automatically, eliminating mistakes and saving traders valuable time.
2. 100% Trade Accuracy & Transparency
Top traders and signal providers on NVSTly can showcase their trades with full credibility, as every trade is verified directly from the broker. This builds trust within the community and ensures followers are seeing real, authentic trades, not fabricated ones.
3. Ideal for Signal Providers & Analysts
Signal providers and market analysts can effortlessly share their trades in real-time, giving their subscribers confidence in their strategies. The auto-sharing feature means followers get instant updates, allowing them to act quickly on trading opportunities.
4. Social Traders Can Learn From Verified Trades
Unlike traditional investing platforms where traders post trade ideas or screenshots, NVSTly ensures that every trade shown is real and executed. Social traders can analyze the moves of top investors and gain insights from actual, successful trading strategies.
What’s Next? 1-Click Copy Trading is Coming Soon
One of the most exciting upcoming features of NVSTly is 1-Click Copy Trading. Once we complete support for more brokerages, users will be able to automatically copy the trades of top-performing traders in real time. This will allow newer traders to follow experienced professionals and benefit from their strategies effortlessly.
The Future of Social Investing Starts Here
NVSTly's brokerage integration is revolutionizing the way traders track, share, and analyze trades. By providing automated tracking, trade verification, and real-time sharing, we are creating a transparent and trustworthy environment for traders, signal providers, and social investors.
If you're ready to take your trading experience to the next level, link your Webull account today and stay tuned as we expand our brokerage integrations to Charles Schwab (ThinkorSwim), Robinhood, Moomoo, TradeStation, and more!
NVSTly is available for free on web, mobile devices (iOS & Google Play), and is fully integrated with Discord via a unique bot- the only of it's kind and available to any server or trading community on Discord. Or feel free to join a community of over 50,000 investors & traders on our Discod server.
-
@ 95cb4330:96db706c
2025-03-12 06:46:51Introduction: Why Speed Beats Efficiency in Hyper-Growth Markets
In business, most people think growing carefully and efficiently is the best approach. But in high-potential industries, the opposite is often true.
This is where Blitzscaling comes in—a strategy embraced by Reid Hoffman, Elon Musk, Jeff Bezos, and Sam Altman.
Blitzscaling is about prioritizing speed over efficiency when a market is ready for rapid expansion. The goal? Scale as fast as possible to establish dominance before competitors can catch up.
In this article, we’ll cover:
✔ What Blitzscaling is and why it works
✔ Examples of how top entrepreneurs used it to dominate industries
✔ How you can apply Blitzscaling to your business, investments, or projects
What Is Blitzscaling?
Blitzscaling is a concept popularized by Reid Hoffman (LinkedIn co-founder, PayPal Mafia) in his book Blitzscaling: The Lightning-Fast Path to Building Massively Valuable Companies.
The core idea:
Speed matters more than efficiency when a huge market opportunity exists.
Instead of carefully optimizing profits, companies using Blitzscaling:
- Reinvest aggressively into growth instead of focusing on short-term margins.
- Expand as fast as possible, even if it means operating at a loss.
- Take risks to capture market share before competitors can react.When done correctly, Blitzscaling allows a company to:
✅ Establish itself as the market leader
✅ Create massive barriers to entry
✅ Dominate an industry before others even have a chanceThis strategy is risky, but when applied in the right market, it can create billion-dollar companies in record time.
Examples of Blitzscaling in Action
1. Jeff Bezos and Amazon: Prioritizing Growth Over Profits
Amazon could have been a small, profitable e-commerce company—but Bezos chose Blitzscaling instead:
✅ He reinvested nearly every dollar of profit into expanding logistics, AWS, and new markets.
✅ He ignored short-term profits, focusing on long-term market dominance.
✅ He scaled globally before competitors had a chance to react.By the time traditional retailers realized what was happening, Amazon had already become a monopoly in e-commerce and built the world’s most powerful cloud platform (AWS).
📌 Lesson: Sometimes, short-term profits are less important than long-term market dominance.
2. Elon Musk and Tesla/SpaceX: Scaling Despite High Risk
Elon Musk didn’t build Tesla and SpaceX by playing it safe.
He used Blitzscaling to:
✅ Push Tesla into mass production despite major financial and operational risks.
✅ Scale SpaceX rapidly before competitors could emerge, securing government contracts.
✅ Bet everything on speed, knowing that if Tesla and SpaceX failed, there would be no second chance.By moving fast, Tesla became the world’s dominant EV company and SpaceX became the leader in private space travel.
📌 Lesson: In high-growth industries, moving slowly often means losing to faster-moving competitors.
3. Sam Altman and OpenAI: Rapid Expansion in AI
AI is a field where first-mover advantage matters.
Sam Altman applied Blitzscaling principles to OpenAI by:
✅ Expanding rapidly, even before AI was widely adopted.
✅ Raising billions in funding to scale model development at breakneck speed.
✅ Launching ChatGPT publicly early, creating viral adoption before competitors could react.By moving fast, OpenAI became the go-to AI platform before Google, Microsoft, or Meta could dominate the space.
📌 Lesson: In emerging technologies, speed determines who controls the market.
How to Apply Blitzscaling to Your Own Work
You don’t need to run a billion-dollar company to apply Blitzscaling principles. The same mindset applies to:
✅ Startups – Prioritize speed in a fast-moving industry to outpace competitors.
✅ Investing – Identify companies that are Blitzscaling and ride the wave.
✅ Personal Growth – Learn, adapt, and scale your skills 10x faster than your peers.1. Identify an Area Where Speed Gives You an Edge
- What industry or opportunity is emerging fast?
- Where can moving quickly create an unfair advantage?
📌 Example: If you’re in crypto, AI, or biotech, waiting too long means missing the window of opportunity.
2. Optimize for Scale, Not Just Efficiency
- Ask: “What would I do differently if my goal was to scale 10x faster?”
- Focus on growth first, efficiency later—especially in early-stage markets.
📌 Example: If you’re launching a startup, instead of perfecting every detail, focus on rapid adoption and expansion.
3. Be Willing to Take Short-Term Losses for Long-Term Wins
- Most people optimize for short-term profit—but Blitzscaling requires investing aggressively into growth.
- If the market opportunity is big enough, it’s worth taking calculated risks to dominate early.
📌 Example: Tesla lost money for years before becoming the most valuable car company in the world.
Final Thoughts: Move Fast or Get Left Behind
🔹 Blitzscaling is not for every situation—but in high-growth industries, speed matters more than efficiency.
🔹 Jeff Bezos, Elon Musk, and Sam Altman all scaled their companies by prioritizing growth over short-term optimization.
🔹 If you’re in an industry with massive upside, the biggest risk is moving too slowly.💡 Action Step: Identify one area where speed could give you a major advantage. What would you do differently if your goal was to scale 10x faster instead of cautiously optimizing?
🚀 The future belongs to those who move first. Start Blitzscaling today.
Resources to Learn More
- 📖 Blitzscaling by Reid Hoffman – Summary
- 🎥 Elon Musk on Moving Fast – YouTube
- 📰 Why Speed Matters in Scaling – Harvard Business Review
🚀 Speed wins. If you’re in a market that rewards Blitzscaling, don’t wait—move fast.
-
@ f25afb62:8d50c6e7
2025-03-12 04:11:46https://i.postimg.cc/6p0S1LrR/Kiwi-bitcoin.png
Modernizing the Kiwi Dollar: How Kiwibank Can Lead the Future of Money
A Nation at an Inflection Point
Kiwibank’s upcoming capital raise offers New Zealand a rare opportunity to future-proof its currency and banking system. With up to $500 million in new capital on the table, the government aims to strengthen Kiwibank as a competitor to the dominant Australian-owned banks. Finance Minister Nicola Willis has emphasized that more capital means greater competition, which could drive down interest rates and improve banking services for everyday Kiwis.
But this is more than just a competition play—it's a chance to radically modernize the Kiwi dollar itself.
By integrating Bitcoin's open infrastructure, Kiwibank could issue a digitally native, globally liquid, and ultra-secure NZD. This wouldn’t require reinventing the financial system but rather leveraging existing and proven Bitcoin technologies. The result? A financial system that empowers Kiwis, attracts global investment, and puts New Zealand at the forefront of monetary innovation.
This article outlines a practical, step-by-step roadmap for how Kiwibank could: 1. Tokenize the New Zealand Dollar (NZD) using a Bitcoin sidechain like Liquid. 2. Issue Kiwi eCash, providing cash-like digital money that’s private and fast. 3. Enable global NZD payments via the Lightning Network, making NZD as instant and accessible as Bitcoin itself. 4. Unlock new Bitcoin-powered business models that expand Kiwibank’s revenue streams.
This isn’t a distant dream—it’s completely feasible today. The question is: Will New Zealand lead or lag? 🚀⚡🇳🇿
Kiwibank’s Capital Raise – A Launchpad for Innovation
Kiwibank is raising fresh capital to strengthen its position against the Big Four banks, but this money could do much more than just improve traditional banking services. It could lay the foundation for a digital-first Kiwi dollar, designed for the 21st century.
New Zealand is actively courting global investment, simplifying its “golden visa” program to attract wealthy innovators and investors. If Kiwibank integrates Bitcoin-powered financial infrastructure, it would send a strong signal that New Zealand is open for high-tech finance business—drawing interest from: - Kiwi citizens, who would benefit from a better, faster, and cheaper banking system. - KiwiSaver funds and institutional investors, who would see Kiwibank as a bold growth investment. - Global Bitcoiners, who might invest in NZ or move their wealth into a Bitcoin-friendly jurisdiction.
Simply put, this capital raise is a chance to future-proof the Kiwi financial system—and Bitcoin provides the tools to make it happen.
Step 1: Tokenized NZD on a Bitcoin Sidechain
The first step in modernizing NZD is bringing it onto Bitcoin rails by issuing a tokenized NZD on a Bitcoin sidechain like Liquid or a custom-built KiwiBTC sidechain.
How It Works
- Kiwibank, alongside other NZ banks, could issue digital NZD tokens, backed 1:1 by reserves.
- This would be secured on a federated Bitcoin sidechain—a fast, low-fee network pegged to Bitcoin.
- Transactions would settle in seconds instead of days, with confidentiality features ensuring financial privacy.
This is not an experiment—it's already being done. Tether (USDT) uses Liquid today to issue stablecoins, and the same proven tech could be used to issue NZD.
Why This Matters
- Faster Payments: Move NZD instantly, unlike today’s slow banking rails.
- Global Liquidity: Anyone, anywhere, could hold and transact NZD digitally.
- No Need for a CBDC: The NZ government retains full control over monetary policy, without creating a central bank-controlled digital currency.
This solves many of the problems the Reserve Bank of New Zealand has been grappling with in its CBDC research—by using open Bitcoin tech instead of building from scratch.
Step 2: Kiwi eCash – Digital Money With Cash-Like Privacy
While a tokenized NZD would revolutionize banking and business payments, Kiwi eCash would do the same for everyday transactions and person-to-person payments.
Kiwi eCash is a Chaumian eCash system—a digital cash that preserves privacy and security, just like physical banknotes. It’s based on battle-tested cryptographic blind signatures, meaning: - No bank account required. - No transaction tracking. - Total financial privacy.
How It Works
- NZ banks (or independent issuers) mint Kiwi eCash tokens, backed by tokenized NZD or Bitcoin.
- These tokens are held in a wallet and can be spent freely—just like handing someone cash.
- Banks don’t see individual transactions, ensuring privacy.
- Multiple issuers (banks, credit unions, or fintech firms) could offer interoperable Kiwi eCash mints.
This is already happening with Bitcoin eCash mints like Cashu and Fedimint, and the same concept can be applied to NZD.
Why It Matters
- Digital cash with cash-like privacy—protecting financial freedom.
- Fast, free transactions, perfect for micro-payments and daily spending.
- Works offline, unlike today’s banking apps.
- Interoperable across banks, reducing monopolistic control.
Step 3: Bridging Kiwi eCash to Lightning – NZD at the Speed of Bitcoin
The final piece of the puzzle is making Kiwi eCash as fast and global as Bitcoin itself.
By bridging Kiwi eCash to the Lightning Network (via Taproot Assets), NZD transactions would become: - Instant: Settle in milliseconds, anywhere in the world. - Global: Easily convert NZD to any currency, anywhere. - Ultra-cheap: Fees near zero, unlike Visa or SWIFT.
How It Works
- Kiwi eCash is wrapped into Lightning channels using Taproot Assets.
- Payments flow instantly over Lightning, just like Bitcoin transactions.
- Merchants, individuals, and businesses can send and receive NZD globally in a Bitcoin-compatible format.
This integrates NZD directly into the Bitcoin economy, giving it instant global reach.
Step 4: New Bitcoin-Powered Services for Kiwibank
Beyond modernizing NZD itself, Bitcoin infrastructure unlocks entire new revenue streams for Kiwibank: 1. Bitcoin Custody: Offer multi-sig vaults instead of risky single-key custody. 2. Bitcoin Lending: Let customers borrow NZD against their BTC—a proven model. 3. Lightning Yield: Earn fees by providing Lightning liquidity. 4. Collaborative Bitcoin Custody: Offer collaborative custody where customers retain control and Kiwibank is available for recovery assistance. 5. Digital Securities: Help Kiwi business raise capital with digital securities on the Bitcoin sidechain and facilitate secondary market liquidity of these securities.
Each of these aligns with Bitcoin’s strengths while expanding Kiwibank’s business model.
A Bold Vision to Future-Proof the Kiwi Financial System
This isn’t just an idea—it’s a path forward that’s 100% possible today.
- For New Zealanders: A faster, fairer financial system that puts power back in their hands.
- For Investors: A banking innovation play, positioned for growth.
- For Bitcoiners worldwide: A Bitcoin-friendly financial hub, with real-world Bitcoin services.
Kiwibank has a golden opportunity to lead this transformation. The technology is ready, the capital is available, and the global financial landscape is ripe for disruption.
The only question left is:
Will New Zealand lead, or will we be left behind?🚀⚡🇳🇿
Sources
- Kiwibank Capital Raise: NZ Lawyer
- New Zealand Active Investor Visa: NZTE
- Taproot Assets & Lightning: Lightning Labs
- Bitcoin Sidechains & Liquid: Blockstream
- Bitcoin eCash (Cashu/Fedimint): Cashu
originally posted at https://stacker.news/items/911023
-
@ a012dc82:6458a70d
2025-03-12 01:47:41The cryptocurrency world, known for its rapid growth and equally rapid fluctuations, has been rocked by a series of scandals that have left investors wary and regulators on high alert. Among these, the story of Brenda Chunga, better known by her online alias "Bitcoin Beautee," stands out for its sheer scale and the audacity of the fraud involved. Chunga's rise from a relatively unknown figure to a celebrated icon in the crypto community encapsulates the allure and dangers of the cryptocurrency boom.
Table of Contents
-
The Rise of Bitcoin Beautee
-
The Scheme Unfolds
-
The Crackdown Begins
-
Implications for Crypto Regulation
-
The Future of Cryptocurrency
-
Conclusion
-
FAQs
The Rise of Bitcoin Beautee
Brenda Chunga's transformation into Bitcoin Beautee represented the quintessential crypto success story. She portrayed herself as a self-made millionaire who had unlocked the secrets of cryptocurrency investment. Her social media was awash with images of luxury cars, exotic vacations, and high-end fashion, all purportedly funded by her savvy investment strategies. This glamorous lifestyle was not just a personal branding tool but also a marketing strategy to attract more investors into the HyperFund scheme she promoted.
Chunga's narrative tapped into the zeitgeist of the era, a time when Bitcoin and other cryptocurrencies were seeing unprecedented gains. Her story was compelling because it offered hope and validation to the many who wished to replicate her success. However, beneath the surface of this success story lay a web of lies and manipulation. Chunga's wealth was not the result of astute investment but rather the proceeds from a Ponzi scheme that preyed on the hopes and dreams of ordinary people looking to improve their financial situations.
The Scheme Unfolds
The unraveling of the HyperFund scheme revealed the mechanics of a classic Ponzi operation, albeit one supercharged by the global reach and anonymity afforded by the cryptocurrency market. Investors were promised extraordinary returns, a common red flag for investment fraud, yet the allure of quick wealth in the burgeoning crypto market proved irresistible to many. Chunga, leveraging her status as Bitcoin Beautee, was instrumental in giving the scheme credibility and drawing in a vast network of investors from around the globe.
The scheme's collapse was not just a financial disaster for those involved but also a significant blow to the credibility of the cryptocurrency market at large. It highlighted the dark side of the crypto boom: the ease with which unscrupulous individuals could exploit the lack of regulation and the general misunderstanding of how cryptocurrencies work. The case of HyperFund was a wake-up call, illustrating the need for greater diligence and skepticism in the face of promises of outsized returns.
The Crackdown Begins
The legal repercussions for Chunga and her associates mark a turning point in the regulatory approach to cryptocurrency fraud. Her guilty plea and the subsequent charges against her co-conspirators signify a more aggressive stance from authorities in tackling crypto-related crimes. This shift is partly a response to the growing realization of the potential for cryptocurrency to be used in illegal activities, from money laundering to financing terrorism.
The crackdown on Bitcoin Beautee and others involved in the HyperFund scheme is part of a broader effort to clean up the cryptocurrency space. It sends a clear message that the wild west days of the crypto market may be coming to an end. Regulatory bodies are now more determined than ever to impose order, protect investors, and ensure that the revolutionary potential of cryptocurrency is not undermined by fraudsters and criminals.
Implications for Crypto Regulation
The saga of Bitcoin Beautee has reignited the debate over cryptocurrency regulation. Critics of the industry have seized on the scandal as evidence of the inherent risks of a market that operates largely outside traditional financial oversight. Proponents, however, argue that the actions of a few should not tarnish the entire sector and that regulation should not stifle innovation.
The challenge for regulators is to strike a balance between protecting investors and allowing the legitimate use and development of cryptocurrencies. The HyperFund case has shown that this is no easy task, but it has also provided valuable lessons on the tactics used by fraudsters in the crypto space. These insights are crucial in shaping effective regulatory responses that can prevent similar schemes from emerging in the future.
The Future of Cryptocurrency
The impact of the HyperFund scandal extends beyond the immediate legal and financial repercussions. It has prompted a period of introspection within the cryptocurrency community. The realization that such a large-scale fraud could go unnoticed for so long has led to calls for greater self-regulation and community vigilance.
The future of cryptocurrency now hinges on the ability of the community and regulators to learn from incidents like the downfall of Bitcoin Beautee. The promise of decentralized finance and the potential for cryptocurrencies to revolutionize the global financial system remain intact. However, achieving these lofty goals requires a concerted effort to build trust, enhance transparency, and foster a culture of ethical investment practices.
Conclusion
The downfall of Bitcoin Beautee and the unraveling of the $2 billion HyperFund Ponzi scheme serve as a cautionary tale for the cryptocurrency industry. They underscore the urgent need for regulatory frameworks that can adapt to the unique challenges of the digital age while preserving the innovative spirit of the crypto community. As the industry continues to evolve, the lessons learned from this scandal will be instrumental in shaping a more secure, transparent, and sustainable future for cryptocurrency.
FAQs
Who is 'Bitcoin Beautee'? 'Bitcoin Beautee' is the online alias of Brenda Chunga, who became known for her involvement in the HyperFund Ponzi scheme, which defrauded investors of approximately $2 billion.
What was the HyperFund scheme? HyperFund was a Ponzi scheme disguised as a cryptocurrency investment platform. It promised investors unrealistically high returns, funded by the capital of new investors rather than genuine profit.
What has happened to Brenda Chunga? Brenda Chunga, aka 'Bitcoin Beautee,' has pled guilty to fraud charges related to her role in the HyperFund scheme and faces up to five years in prison.
What are the implications of this case for cryptocurrency regulation? The case has highlighted the need for stricter regulation and oversight in the cryptocurrency market to prevent fraud and protect investors.
How can investors protect themselves from similar schemes? Investors should conduct thorough research, be skeptical of investments offering unusually high returns, and invest only in schemes that are transparent and regulated.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 401014b3:59d5476b
2025-03-12 00:57:07Alright, football maniacs, it’s March 2025, and we’re crashing into the NFC East like it’s a Philly cheesesteak brawl with a side of New York attitude. Free agency’s a street fight, the draft’s a gamble, and this division’s always a circus of hype and havoc. The Eagles soared in 2024, the Cowboys stayed scrappy, the Giants licked wounds, and the Commanders showed spark. Let’s slap some records on this chaos and see who’s got the juice to claim the crown. Here we go, fam—bring the noise.
Philadelphia Eagles: 11-6 – Hurts’ High-Flying Hustle
The Eagles owned 2024, and 2025’s Jalen Hurts’ encore. He’s got A.J. Brown and DeVonta Smith torching secondaries, Saquon Barkley bulldozing fools, and that O-line’s a freaking tank. The defense—Josh Sweat, Jalen Carter—wrecks shop, but free agency’s a wild card. Brandon Graham’s probably done, and Fletcher Cox’s ghost still haunts the D-line. 11-6’s the call, division champs. Philly’s got that dawg mentality—try stopping ‘em.
Dallas Cowboys: 9-8 – Dak’s Do-or-Die Dance
The Cowboys hung in there in 2024, and 2025’s Dak Prescott’s last stand (maybe). He’s tossing to CeeDee Lamb and Jake Ferguson, with Rico Dowdle keeping the run game alive. The defense—Micah Parsons, Trevon Diggs—is electric when it’s on, but free agency looms. DeMarcus Lawrence will likely bolt to the Lions, and the O-line’s aging. 9-8’s the vibe, maybe a wildcard if Dak stays hot. Dallas is always a soap opera—will they shine or implode?
Washington Commanders: 8-9 – Daniels’ Next Step
The Commanders turned heads in 2024 with Jayden Daniels, and 2025’s his glow-up. He’s got Terry McLaurin and Zach Ertz to sling it to, while Brian Robinson Jr. grinds the run game. The defense—Jonathan Allen, Daron Payne—brought heat but are likely gone this season. Jeremy Chinn might also chase a bag, and the secondary’s thin. 8-9’s where they land—close, but not back in the playoffs. Washington’s cooking, just not fully seasoned.
New York Giants: 6-11 – Jones’ Swan Song?
The Giants were a mess in 2024, and 2025’s not much brighter. QB is uncertain. Malik Nabers and Wan’Dale Robinson will need to step up, the run game’s blah without Saquon, and the O-line’s a tire fire. The defense—Kayvon Thibodeaux, Dexter Lawrence—has bite, but free agency might swipe Azeez Ojulari, and the vibes are off. 6-11’s the harsh reality—rebuilding, not contending. Big Blue’s got work to do.
The Final Showdown
The NFC East in 2025 is an Eagles strut with a Cowboy twist. The Eagles (11-6) snag the title because Hurts is a beast, the Cowboys (9-8) tease a wildcard, the Commanders (8-9) push forward, and the Giants (6-11) lag behind. Free agency’s the curveball—lose a star, you’re sunk; keep ‘em, you’re soaring. Hit me on X when I butcher this, but this is my NFC East sermon. Let’s roll, degenerates.
-
@ 21335073:a244b1ad
2025-03-12 00:40:25Before I saw those X right-wing political “influencers” parading their Epstein binders in that PR stunt, I’d already posted this on Nostr, an open protocol.
“Today, the world’s attention will likely fixate on Epstein, governmental failures in addressing horrific abuse cases, and the influential figures who perpetrate such acts—yet few will center the victims and survivors in the conversation. The survivors of Epstein went to law enforcement and very little happened. The survivors tried to speak to the corporate press and the corporate press knowingly covered for him. In situations like these social media can serve as one of the only ways for a survivor’s voice to be heard.
It’s becoming increasingly evident that the line between centralized corporate social media and the state is razor-thin, if it exists at all. Time and again, the state shields powerful abusers when it’s politically expedient to do so. In this climate, a survivor attempting to expose someone like Epstein on a corporate tech platform faces an uphill battle—there’s no assurance their voice would even break through. Their story wouldn’t truly belong to them; it’d be at the mercy of the platform, subject to deletion at a whim. Nostr, though, offers a lifeline—a censorship-resistant space where survivors can share their truths, no matter how untouchable the abuser might seem. A survivor could remain anonymous here if they took enough steps.
Nostr holds real promise for amplifying survivor voices. And if you’re here daily, tossing out memes, take heart: you’re helping build a foundation for those who desperately need to be heard.“
That post is untouchable—no CEO, company, employee, or government can delete it. Even if I wanted to, I couldn’t take it down myself. The post will outlive me on the protocol.
The cozy alliance between the state and corporate social media hit me hard during that right-wing X “influencer” PR stunt. Elon owns X. Elon’s a special government employee. X pays those influencers to post. We don’t know who else pays them to post. Those influencers are spurred on by both the government and X to manage the Epstein case narrative. It wasn’t survivors standing there, grinning for photos—it was paid influencers, gatekeepers orchestrating yet another chance to re-exploit the already exploited.
The bond between the state and corporate social media is tight. If the other Epsteins out there are ever to be unmasked, I wouldn’t bet on a survivor’s story staying safe with a corporate tech platform, the government, any social media influencer, or mainstream journalist. Right now, only a protocol can hand survivors the power to truly own their narrative.
I don’t have anything against Elon—I’ve actually been a big supporter. I’m just stating it as I see it. X isn’t censorship resistant and they have an algorithm that they choose not the user. Corporate tech platforms like X can be a better fit for some survivors. X has safety tools and content moderation, making it a solid option for certain individuals. Grok can be a big help for survivors looking for resources or support! As a survivor, you know what works best for you, and safety should always come first—keep that front and center.
That said, a protocol is a game-changer for cases where the powerful are likely to censor. During China's # MeToo movement, survivors faced heavy censorship on social media platforms like Weibo and WeChat, where posts about sexual harassment were quickly removed, and hashtags like # MeToo or "woyeshi" were blocked by government and platform filters. To bypass this, activists turned to blockchain technology encoding their stories—like Yue Xin’s open letter about a Peking University case—into transaction metadata. This made the information tamper-proof and publicly accessible, resisting censorship since blockchain data can’t be easily altered or deleted.
I posted this on X 2/28/25. I wanted to try my first long post on a nostr client. The Epstein cover up is ongoing so it’s still relevant, unfortunately.
If you are a survivor or loved one who is reading this and needs support please reach out to: National Sexual Assault Hotline 24/7 https://rainn.org/
Hours: Available 24 hours
-
@ 878dff7c:037d18bc
2025-03-11 21:53:39Housing crisis? More like government bloat and excessive taxation!
Summary:
A recent report by the Centre for International Economics, commissioned by the Housing Industry Association (HIA), reveals that Australians are facing substantial financial burdens when building new homes due to escalating taxes, regulatory costs, and infrastructure charges. These expenses can amount to up to $576,000, representing approximately 49% of the total value of house-and-land packages.
In Sydney, the total expenditure for a typical house-and-land package in a greenfield estate averages around $1.182 million. Of this, nearly half is attributed to government-imposed charges, including regulatory costs, statutory taxes, and infrastructure fees. Other major cities are similarly affected, with government charges comprising 43% of costs in Melbourne, 41% in Brisbane, 36% in Perth, and 37% in both Adelaide and Hobart.
The report also highlights significant delays in the approval process for home-building projects. Obtaining development approval for a subdivision now takes over 12 months, extending project timelines by 50%. These prolonged timelines contribute to increased costs and exacerbate housing shortages.
Industry leaders are urging the government to reduce taxes and streamline regulatory processes to address these issues. Such reforms are deemed essential to meet the goal of constructing 1.2 million new homes by mid-2029. The HIA's chief economist, Tim Reardon, emphasizes that with half of the cost of a new home being taxes and government charges, new home buyers spend the first 15 years of a 30-year mortgage just paying off that tax.
The report further notes that 14% of all GST revenues are directly associated with housing construction and dwelling ownership. This has led to calls for a GST exemption on new homes as a measure to alleviate the housing crisis.
Both the Labor and Coalition parties have proposed strategies to tackle housing shortages. These include infrastructure funding, freezes on construction code changes, and incentives for building apprenticeships. However, the effectiveness of these measures remains contingent on addressing the underlying issues of high taxes and regulatory burdens that continue to inflate housing costs.
Sources
-
"Great Australian dream strangled by government taxes and costs"
The Australian, Published March 11, 2025
Read more -
"Insane tax amount Vic pays on new homes exposed"
News.com.au, Published March 11, 2025
Read more -
"Half cost of new house goes to tax, report"
News.com.au, Published March 11, 2025
Read more
Australians Urged to Prepare Emergency Plans Amid Increased Storm Activity
Summary:
Despite the high likelihood of natural disasters during storm season, less than 50% of Australians have an emergency plan. Authorities emphasize the importance of preparation as storms, bushfires, cyclones, and floods become more frequent. Recent bushfires have already impacted Victoria and NSW, with significant fires ongoing in the Grampians National Park. Preparedness includes having an emergency kit, evacuation plans, and ensuring pets' safety. Failure to include animals in emergency planning can hinder evacuations. The NSW State Emergency Service performed over 66,000 animal rescues in 2022, highlighting the significance of readiness for all family members during natural disasters. Sources: news.com.au - 12 March 2025
Senator Lambie Proposes Closing Pine Gap Over US Tariffs
Summary:
In response to the US imposing tariffs on Australian steel and aluminium, Senator Jacqui Lambie has suggested closing the Pine Gap intelligence base near Alice Springs as a countermeasure. Lambie argues that such a move would significantly impact US intelligence operations in the region, providing Australia with leverage in negotiations. Pine Gap has been a critical component of US-Australia defense cooperation since the 1960s.
Sources: The Courier-Mail - March 12, 2025
Australia's Exemption from US Tariffs Unlikely Amid Record Gold Exports
Summary:
Australia's record gold exports to the US have led to the first trade surplus with the US in decades. This development undermines Australia's argument for exemption from impending US tariffs, including a 25% tariff on aluminium and steel. While Australia's direct exports of these metals to the US are minimal, other sectors like pharmaceuticals and agriculture could face significant impacts. The broader concern is the potential depressive effect on global trade, which could reduce demand for Australian exports. Industry groups are preparing for the tariffs, and government efforts for exemptions continue. The unpredictable nature of US trade policies is causing substantial nervousness among Australian exporters.
Sources: The Guardian - March 12, 2025, The Australian - March 12, 2025, News.com.au - March 12, 2025
Australian Consumer Confidence Hits Three-Year High
Summary:
Australian consumer confidence reached a three-year high in March, driven by slowing inflation and the first interest rate cut in over four years. The Westpac-Melbourne Institute index showed a 4% rise from February and a 13.6% increase from last year, though it remained at 95.9, indicating more pessimists than optimists. The Reserve Bank of Australia's recent quarter-point rate cut to 4.1% and ongoing low inflation have bolstered consumer sentiment. Market expectations suggest another potential rate cut in May, with rates possibly declining to 3.5% by year-end. Improved confidence in the labor market and family finance outlooks contributed to an increase in buyer sentiment, with notable optimism about the next few years.
Sources: Reuters - March 12, 2025
The Left's Waning Techno-Optimism: A Call for Reengagement
Summary:
Recent discussions highlight a resurgence in techno-optimism, driven by movements like Effective Accelerationism and figures such as Elon Musk. Historically, the political left championed technological advancements for societal liberation, notably during the COVID-19 vaccine development. However, current skepticism towards innovations like genetically modified crops and space exploration suggests a retreat from this stance. Advocates argue that the left should reclaim its techno-optimism, promoting state-led technological advancements through democratic economic planning to address global challenges and harness technology for collective liberation.
Sources: The Guardian - March 11, 2025
Victoria Proposes 'Toughest Bail Laws' Amid Youth Crime Concerns
Summary:
The Victorian government plans to introduce stringent bail laws targeting serious repeat offenders, including youth offenders accused of serious crimes. This move comes amid debates over a perceived crime crisis, with statistics indicating that youth crime comprises 13% of total crime, though recent data shows a rise in incidents attributed to a small number of repeat youth offenders. Experts caution that while crime rates appear to be increasing post-COVID, media amplification may contribute to heightened public perception of a crime crisis.
Sources: The Guardian - 12 March 2025
Opposition Leader Peter Dutton Threatens to Break Up Major Insurers Over Anti-Competitive Behavior
Summary:
Opposition Leader Peter Dutton has threatened to break up large insurance companies if they engage in anti-competitive behavior, emphasizing the need for competition in the market. However, this stance has led to confusion within the Coalition, as other members have expressed differing views on the policy's scope. Shadow Treasurer Angus Taylor initially seemed to exclude insurers from the divestiture plan but later affirmed that anti-competitive behavior in any industry would be addressed. Deputy Liberal leader Sussan Ley and Senator Jane Hume have ruled out including insurers in the divestiture policy, which is currently confined to major supermarkets and hardware retailers.
Sources: The Australian - 12 March 2025
Australian Government Calls for Permanent Centre for Disease Control
Summary:
The Public Health Association of Australia (PHAA) warns that another pandemic is inevitable and calls for the establishment of a permanent Australian Centre for Disease Control (CDC) to coordinate future health emergency responses. The interim CDC is set to become permanent by January 1, 2026, with $251.7 million allocated to the project. Experts criticize the government for slow implementation and a lack of preparedness during the COVID-19 pandemic. The PHAA urges rebuilding trust, balancing individual freedoms with public health needs, and prioritizing human rights in emergency planning. Sources: News.com.au - March 12, 2025
Fatal Shark Attack Claims Surfer's Life in Western Australia
Summary:
Steven Jeffrey Payne, a 37-year-old surfer from Melbourne, has been identified as the victim of a fatal shark attack on March 10 at Wharton Beach, Australia. Payne was attacked by a massive shark while surfing in chest-deep water. Despite efforts by the WA Police Force, Marine Rescue WA, and SES personnel, his body has not been recovered, and the search has shifted from rescue to recovery. Witnesses, including Payne's partner, observed the tragic incident, which was also captured by drone footage showing a large cloud of blood near the shore. Authorities plan to reopen the beach on March 12, as there have been no other shark sightings. This marks the fourth fatal shark attack in the area since 2017. Sources: People - March 12, 2025
Former Prime Minister Turnbull's Public Criticisms Strain U.S.-Australia Relations
Summary:
Former Australian Prime Minister Malcolm Turnbull's public criticisms of U.S. President Donald Trump have raised concerns about their potential impact on Australia's negotiations for tariff exemptions. Turnbull labeled Trump as thin-skinned and a bully, criticizing his trade policies and foreign relations. These remarks have led to tensions, with Trump responding by labeling Turnbull as weak and ineffective, potentially jeopardizing Australia's efforts to secure tariff exemptions.
Sources: News.com.au - 12 March 2025, News.com.au - 12 March 2025
Australia's Air Quality Among World's Best, Study Finds
Summary:
A recent report by IQAir reveals that only seven countries, including Australia, New Zealand, and Estonia, adhered to the World Health Organization's guidelines for PM2.5 levels last year. Almost every other country has air pollution levels exceeding these guidelines. Chad, Bangladesh, Pakistan, the Democratic Republic of Congo, and India are the most polluted, with PM2.5 levels up to 18 times higher than recommended. The report highlights air pollution as a major risk factor for mortality, second only to high blood pressure. While the share of cities meeting PM2.5 standards increased from 9% in 2023 to 17% in 2024, disparities in air quality persist, especially in Eastern Europe and non-EU Balkan countries. Sources: The Guardian - March 11, 2025
Gas Industry Criticizes Australia's Energy and Climate Policies
Summary:
Santos CEO Kevin Gallagher and other energy executives have urged Australia to utilize its abundant natural gas reserves. They criticize current policies for hindering the development of new gas sources, contrasting with the U.S. approach under former President Donald Trump, who separated energy and climate policies to promote affordable energy. The gas industry warns of potential shortages on Australia's east coast, which could impact service prices and manufacturing viability. Projects like Santos' Narrabri face regulatory delays. In response, importing LNG is suggested, though it's more expensive than domestic sources. APA Group proposes a nearly $2 billion investment in infrastructure to address the issue, while Victoria's administration seeks federal support for an LNG import facility. Sources: The Australian - March 12, 2025
-
-
@ 3c7dc2c5:805642a8
2025-03-11 21:51:17🧠Quote(s) of the week:
'For anybody worried about Bitcoin's current pullback, here's some perspective: Today's drawdowns are within range of previous bull-run pullbacks. In other words, corrections like these are historically normal during bull runs. Steady lads!' - The Bitcoin Layer
🧡Bitcoin news🧡
On the 4th of March:
➡️The IMF demands El Salvador stop buying Bitcoin as a condition of further funding. Disgusting! The IMF just made a very public confession: Bitcoin is a direct threat to their power. By barring El Salvador from accumulating more, the IMF is admitting that sovereign Bitcoin adoption shatters their grip.
https://i.ibb.co/NgFPp5S2/Gl-Mv-Hf-X0-AAh05-N.png
'94 countries have loans with the IMF. All those countries were just sent a message that they can’t buy Bitcoin. This is why after 2021 no other countries followed El Salvador, SOMETHING stopped the momentum.
We now have a pretty good idea who was behind that.' - Nico (Bitvolt)
Please read the following tweet/post by Mags for more clarification on this topic.
https://x.com/Crypto_Mags/status/1897034635605062024
Alex Gladstein said it best: 'Zero coverage in the mainstream economic media but think of the simple implication:
The IMF considers Bitcoin a threat
No longer useless, but revolutionary.'
➡️River: 'The era of "banning" Bitcoin is over. It has never been more globally accessible than today. Countries are slowly coming around to Bitcoin products, payments, custody, and now reserves.' https://i.ibb.co/TD34f2tB/Gl-Io-Y0d-XMAAh0-KD.jpg
➡️'Crypto markets are now worth -$100 billion LESS than they were before the US Crypto Reserve announcement. Over the last 24 hours, crypto has erased -$500 BILLION of market cap in a massive reversal.
➡️China-based Holographic tech firm MicroCloud has purchased up to $200 million in Bitcoin.
➡️Riot mined 470 Bitcoin worth $39.6 million in February.
➡️BlackRock wakes up to Bitcoin's scarcity: "If every millionaire in the US asked their financial advisor to get them 1 bitcoin, there wouldn’t be enough." You don't say!😉 There isn't enough Bitcoin for everyone on earth to have 0.01 BTC. Today you can buy 0.01 BTC for $860. 0.01 BTC will eventually buy a house.
➡️North Korea’s Lazarus Group has fully laundered the proceeds of the Bybit hack. 500,000 ETH has been converted, primarily to BTC as ETH trades down to ~$2,100.
On the 5th of March:
➡️Metaplanet acquires another 497 Bitcoin, bringing its total holdings to 2,888. Metaplanet CEO says, “We wanna buy as much Bitcoin as we can before the price goes up.” “I think $1 Million is still cheap in the long term.”
➡️Strategy is the largest convertible bond issuer again in 2025. Year to date, they are 30% of the US convertible market, powered by Bitcoin.
On the 6th of March:
➡️Bhutan’s PM tells how strategic Bitcoin reserve helped finance their nation’s expenses. 'Hundreds of people have made billions of dollars on the back of Bitcoin - why aren't governments doing more?'
➡️Liquidity is coming! 'The Global M2 Money Supply chart just printed another vertical line. (See the far right side of the chart. Yellow line.) https://i.ibb.co/zTT0M6dF/Gl-SPDYMWYAErkh-F.jpg
The rally for Bitcoin and other assets is going to be epic.' - Colin Talks
Two days later: Global liquidity just hit a new ATH, adding $1.5 TRILLION IN ONE DAY. The correlation with M2 is mainly with direction, not necessarily magnitude. Bitcoin is now at $78,000—only $8k away from fully converging with the path that the global M2 money supply charted ~70 days ago.
Fear and greed index at 20, a value reached in bull markets when bitcoin is on its way to making a local bottom.
➡️'Texas passed the Strategic Bitcoin Reserve legislation SB 21 in the Senate. Texas is the 8th biggest economy in the world. This would be like Italy, France, or India establishing a Bitcoin Reserve.' -Bitcoin Archive
On the 7th of March:
➡️USA Strategic Bitcoin Reserve Plan https://i.ibb.co/n8ML8KXW/Glc-ACZw-WIAAmck-S.jpg
https://www.whitehouse.gov/presidential-actions/2025/03/establishment-of-the-strategic-bitcoin-reserveand-united-states-digital-asset-stockpile/
Bit Paine: I literally have not seen a single person who read the EO correctly. This is MORE than I was hoping for:
-BTC is recognized as a valuable strategic asset by the largest economy in the world.
-BTC and shitcoins are now officially separated in US government policy. Shitcoins seized won’t be sold, only Bitcoin is worth accumulating.
-Bessent and Lutnick were authorized to develop budget-neutral strategies for further acquisition.
Literally what else was anyone hoping for? This is everything.
The United States just signaled its intent to buy and hodl Bitcoin. Most people aren't aware of this information yet.
'I’ve noticed three distinct responses wrt the Strategic Bitcoin Reserve.
No-coiners: Totally unaware. Didn’t know it happened. Couldn’t tell you the current Bitcoin price either.
Bitcoin Tourists: Bummed the announcement didn’t instantly pump their bags. Anxious the top may be in this cycle. Considering selling some.
Real Bitcoiners: Euphoric, bullish, regardless of short-term price action, knowing the long-term paradigm shift to a Bitcoin standard is well underway.' - AlanBWatts
Which one are you?
On the 9th of March:
➡️'Internal Ripple emails, submitted in the SEC’s lawsuit over unregistered securities sales, reveal the company was behind promoting the “Bitcoin is controlled by China” FUD.' - Bitcoin News
➡️US Govt could sell some of its $800B gold to buy Bitcoin for its Strategic Reserve - Standard Chartered
On the 10th of March:
➡️Bitcoin just made the biggest weekly price drop in history with a $13,561 red candle. Bitcoin longs obliterated! Biggest wipeout since the crypto casino meltdowns (Celsius, 3AC, FTX). Leverage traders REKT
https://i.ibb.co/MDRcVnFH/Glr-id7-Ws-AA7xs2.jpg
➡️Spain's second-largest bank BBVA gets approval to launch Bitcoin trading and custody services
➡️Japanse giant, SBI VC, just acquired 4000 Bitcoin.
➡️Strategy to issue up to $21 billion in 8.00% Series A perpetual strike preferred stock through an ATM program to buy more Bitcoin.
➡️A Bitaxe Ultra with ~491 Gh/s just found block #887212 on Solo CK Pool. Absolutely obliterating the required difficulty with 719.9T! With a total of 3.3Th running on their account they had a 1 in 250,000,000 chance and they hit. Boom — a quarter million bucks off of $150 hardware.
➡️$1.5 trillion Franklin Templeton says the US Strategic Bitcoin Reserve can help alleviate the deficit.
💸Traditional Finance / Macro:
On the 3rd of March:
👉🏽'The S&P 500 has officially erased ALL of its post-election gains. The index has now lost -$3.3 TRILLION since February 19th. That's -$330 billion PER TRADING DAY for the last 10 days. The Dow Jones Industrial Average is now down -1,700 points in 24 hours. The S&P 500 is now just ~3% away from entering correction territory. The Nasdaq is now ~0.5% away from correction territory. $4 trillion+ of capital has been lost.'
On the 9th of March:
👉🏽On February 20th, JP Morgan CEO Jamie Dimon sold $234 million worth of JPMstock.
On February 22nd, Warren Buffett announced a record $334 BILLION cash balance. This is one of the largest cash balances held by a public company ever recorded.
They held $286.5 BILLION of US Treasury Bills. Meanwhile, the US Federal Reserve held $195.3 billion in US Treasury Bills at the time of this announcement. This means that Berkshire Hathaway held ~$91.2 billion MORE of T-bills than the Fed.
Once again, unprecedented.
12 days later, the Nasdaq 100 crashed -11%.
What are the odds!? Almost as if they knew...
On the 10th of March:
'It is not Bitcoin that is crashing, it is the whole market that is.
JPMorgan Chase (JPM) -15%
Meta Platforms (META) -18%
Nvidia (NVDA) -30%
Tesla (TSLA) -50%
Apple (AAPL) -25%
Microsoft (MSFT) -22%
Amazon (AMZN) -28%
Alphabet (GOOGL) -20%
Netflix (NFLX) -35%
Walmart (WMT) -12%
Disney (DIS) -27%
Intel (INTC) -40%
Welcome to the first leg of the V-shaped economy. Trump's trade war is leading us to a V-shaped economy where there is an initial crash, and then a massive spike.' - Sina 21st Capital
That’s why DCA is key through the ups and downs to capitalize on the opportunity!
🏦Banks:
👉🏽 no news
🌎Macro/Geopolitics:
On the 3rd of February:
👉🏽60% of Americans have below a 6th-grade reading level, per Ray Dalio. And only 3 million are driving all technological innovation. Neo feudalism!?
👉🏽'Further evidence of a weakening labor market: The share of US consumers saying there will be fewer jobs over the next 6 months spiked to 26% in February, the highest in 12 years. This percentage now exceeds 2020 levels and is in line with 2001 levels. Furthermore, the share of Americans claiming jobs are hard to get jumped to 16%, the 3rd-highest since 2021. Americans believe the labor market is deteriorating.' - TKL
On the 4th of March:
👉🏽Italy rejects sending Italian troops to Ukraine. Italian Prime Minister Meloni tells France and the UK they are on their own if they go into Ukraine.
👉🏽The market is now pricing in three full Fed Fund rate cuts by the end of the year.
👉🏽Jeroen Blokland:
The European Union will invest up to EUR 800 billion to 'Rearm' itself. First, this is a positive sign that Europe is finally taking action. But why do European leaders deliberately and systematically avoid taking responsibility for the fact that they have acted too late? And not just concerning defense spending and the war in Ukraine.
And where does this EUR 800 billion leave the Draghi EUR 800 billion to improve competitiveness, which was also abandoned under the same 'leaders.' For markets, you see where this is going, right? Massive budget deficits, more debt accumulation, and massive pressure on the ECB to keep rates low. The last thing these European leaders need right now is any anxiety about the debt sustainability of France or Italy. Even though spending hundreds of billions of euros will cause more inflation. Why on earth would you strategically allocate to French government bonds? But still, Europe is moving because it finally realizes (at least I hope) that it must stand on its own feet.'
My problem with the new 'ReArm first' statement or thoughts on this topic is that the European Union could accommodate the increase in defense spending by reducing inessential and unproductive political spending. Instead, leaders are discussing how to disguise more debt.
Which will lead to a financial death spiral for the European Union. France and Italy have debt issues and Germany will have to spend on its own domestic problems. The money simply isn't there.
Oh and by the way, Von der Leyen, EU Commission President, said 'We are in an era of rearmament and Europe will step in as Trump pulls aid from Ukraine.
I will give you a reason why Von der Leyen is incompetent: In 2022, Von Der Leyen mocked Russia, claiming it was so desperate that it had to scavenge computer chips from dishwashers and that its industry was in tatters. Now, the same Von Der Leyen insists Europe must burn through 800 billion to defeat this supposedly ruined Russia.
For good measures please read the following article from 2019: "Among friends and foes alike, von der Leyen’s stewardship of the defense ministry, which she has headed since 2014, is regarded as a failure.", “The Bundeswehr’s condition is catastrophic,”
https://www.politico.eu/article/ursula-von-der-leyen-biography-career-inconvenient-truth/
First of all, not a single EU citizen cast a vote for her, and second of all, not a single EU citizen, will get to vote on this.
The EU is an anti-democratic, and neo-liberal disaster!
Bjorn Lomborg: EU badly spends €367 billion per year on climate
EU badly needs €325 billion per year on defense
Any ideas on how to fix this?
$381 (€367) billion on climate,
https://assets.bbhub.io/professional/sites/24/951623_BNEF-Energy-Transition-Trends-2025-Abridged.pdf…, need at least €325 billion for defense https://economist.com/europe/2025/02/27/europe-will-need-to-pull-all-the-levers-to-up-its-defence-spending
A simple rethink of the EU's costly and ineffective climate policy could free up hundreds of billions of euros. https://i.ibb.co/Kpks8kNj/Gl-R7-SHQXg-AATvl-U.jpg
👉🏽The tax on gas in the Netherlands has increased by more than 200% since 2015. While consumers paid 23 cents per cubic meter in 2015, in 2025 it will be 69.95 cents per cubic meter, according to a new comparison by gaslicht.com
To solve all the problems on the overloaded power grid and keep energy affordable for Dutch citizens and businesses, an astonishing investment of 195 billion euros will be needed over the next fifteen years. So that same dubious government is now going to solve the problems it created itself with taxpayers' money?
Now regarding the Climate Transition Plan 2040 and on this topic. The following report from CE Delft was released recently on January 17, 2025. https://kalavasta.com/reports/greenpeace_klimaatneutraal.pdf
The Conclusion:
'With an inflation rate and price uncertainty of approximately 4% per year, the investment will range between €607 billion and €1.350 trillion. Since prices generally tend to rise and estimated costs for megaprojects almost always exceed expectations, an estimate between €886 billion and €1.350 trillion is reasonable based on this study.'
Now my dear follower / weekly recap reader ask yourself: how does money work? And where does 'money' come from?
👉🏽Ireland will soon be able to tap into this energy via the Celtic Interconnector. Great work by Ireland, splendid job! They do know this is nuclear, right?
You know, the kind of energy generation that is banned in Ireland. Ireland following the Germany handbook:
Step 1: ban nuclear energy
Step 2: import nuclear energy from France
Step 3: the irony!
https://i.ibb.co/1fzVpmg5/Gl-OY-l-TWIAAFz-XJ.jpg
I'm sure France is delighted that once again it's having to subsidise Europe's stupid energy policies. Merci!
I haven't fact-checked the following statement but putainnnn:
'Three nuclear plants built in Ireland could provide up to 25% of the country's current power demand. That means 12 reactors could do it all and you'd have a totally green power grid.'
If true...just build your own nuclear reactors, you fucking morons.
👉🏽The Bank of England has spent £24 million of taxpayers' money on a UK CBDC so far. The Government should stop pumping huge amounts of public money into an intrusive digital pound that could severely impact financial privacy, freedom & fairness. A CBDC that no one will use, everyone will hate, and which (if launched) will randomly turn off for no apparent reason.
👉🏽Oil prices crash to their lowest level since November 2024 as recession odds rise sharply.
👉🏽Deutsche Telekom CEO fumes at EU bureaucracy: "You know, what Europe needs is a DOGE" — Bloomberg
On the 5th of March:
👉🏽German government bonds just posted their worst day since 1990.
👉🏽Macron just delivered his speech to the nation: “I’ve decided to begin strategic discussions on protecting our allies on the European continent with our French nuclear weapons” Nuclear weapons combined with Macron's big ego and unreliability—a dangerous combination.
https://i.ibb.co/Xf1gYsZ1/Gl-TY4-SXMAAZp-Gi.jpg
👉🏽'Global debt rose by ~$7 trillion in 2024, to a year-end record of $318 trillion. Emerging markets accounted for ~65% of this growth, driven by China, India, Saudi Arabia, and Turkey. Over the last 2.5 years, global debt has soared by a whopping ~$30 trillion. The global debt-to-GDP ratio also increased by 1.5 percentage points to 328%. This marks the first jump in the ratio since the 2020 pandemic. Deficit spending is becoming a global issue.' - TKL
https://i.ibb.co/Z1xLt3sD/Gl-SG03q-X0-AAS5-EP.jpg
On the 6th March:
👉🏽'Inflation is surging: US consumers believe inflation will rise to 6.0% over the next 12 months, the highest since May 2023.
This marks the 3rd consecutive monthly increase in expectations, according to the Conference Board survey. Moreover, Americans believe prices will rise at an annual rate of 3.5% over the next 5-10 years, a 30-year high.
Meanwhile, prices paid in regional manufacturing surveys in Philadelphia, New York, Kansas, and Texas all jumped to the highest since mid-2023. Lastly, the prices paid index for services remained elevated at 60.4 points in January, the third-highest since February 2023. Inflation is clearly HOT.' -TKL
👉🏽Japanese yields hitting levels not seen since the Great Financial Crisis.
👉🏽Trump Tariff War 1.0 vs 2.0:
The first Trump Trade War proved to be an exceptional buying opportunity, as shown below per ZeroHedge. Markets are trading on nearly the SAME exact route right now. Deja vu all over again. https://i.ibb.co/RGrPrkrg/Gl-Xf0f1-Ws-AABNP3.jpg
👉🏽Scott Bessent: “The first time I went to see President Trump he looked at me and said ‘How do we get this debt and deficit down without killing the economy?’ I’ve been thinking about this for 18 months… 25% of GDP goes through Area Code 202 (Washington DC)”
On the 7th of March:
👉🏽'The US economy adds 151,000 jobs in February, below expectations of 159,000. The unemployment rate RISES to 4.1%, above expectations of 4.0%. January's jobs report was also revised lower by -18,000 jobs. DOGE job cuts and economic uncertainty are ramping up.'
On the 9th of March:
👉🏽Christine Lagarde confirms the digital euro launches in October. The European Central Bank (ECB) is pushing ahead with its Central Bank Digital Currency (CBDC) – the Digital Euro – set to launch in October 2025.
They claim it’s about modernizing payments, but let’s be real: This adds no benefit to the current system for users. Instead, it’s about control, surveillance, and programmability of money.
The Digital Euro is not money. It’s a tool for control.
Bitcoin remains the only truly decentralized, censorship-resistant alternative. Your wealth, your freedom, your choice.
Will you accept the ECB’s financial panopticon, or will you opt-out?
https://i.ibb.co/jP1MP588/Glq-AGTm-WEAAc-EUW.jpg
🎁If you have made it this far I would like to give you a little gift:
What’s Driving Bitcoin Adoption in 2025?
This week, @PrestonPysh & @1basemoney discuss Bitcoin’s role as an "escape hatch" from financial chaos, its valuation models, and the impact of global liquidity on its future in the digital economy.
You can find the podcast here: youtu.be/2mhB0pHeHxA
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly.
Use the code SE3997
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple. ⠀⠀⠀⠀ ⠀ ⠀⠀⠀
Do you think this post is helpful to you? If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
@ 2f4550b0:95f20096
2025-03-11 21:21:00Adult education is a field rich with potential and full of challenges. Unlike traditional higher education, where students often follow a structured path fueled by societal expectations or youthful ambition, adult learners juggle competing priorities. These include jobs, families, and financial pressures. So, despite their initial enthusiasm, many drop out. Understanding why adults disengage from learning and how leaders can reignite their drive offers valuable lessons. These insights benefit anyone in a leadership role tasked with inspiring action. Drawing from the experiences of adult education dropouts, we can uncover practical strategies, such as tying goals to personal wins to transform disinterest into determination.
Why Adults Disengage
The decision to return to education as an adult is rarely impulsive. It often stems from a desire for career advancement, personal growth, or necessity, such as adapting to a shifting job market. So why do so many abandon the journey? Research and anecdotal evidence point to a mix of external and internal barriers.
Externally, life often intervenes. A single parent might enroll in a community college course but leave when childcare falls through. A full-time worker might abandon an online certification when overtime cuts into study hours. These are not excuses; they are realities. "A 2021 study by StraighterLine and the University Professional and Continuing Education Association found that 32% of college dropouts cited family commitments and 42% cited financial challenges as reasons for leaving, highlighting the role of work and family obligations." Time, money, and energy are not infinite, and adult learners frequently exhaust all three.
Internally, the struggle is equally significant. Many adult learners face self-doubt or a disconnect between effort and reward. Consider a 40-year-old factory worker pursuing a GED after decades away from school. The material feels unfamiliar, progress is slow, and the payoff seems distant. Motivation fades when the reason behind the effort becomes unclear. Unlike younger students, adults lack the cushion of a system designed to keep them on track. They are more likely to question whether the sacrifice is worthwhile. When relevance or confidence slips, engagement often follows.
Leadership Lessons: Seeing Through Their Eyes
For leaders, whether educators, managers, or mentors, these dropout stories are not failures to judge but opportunities to learn. The first lesson is empathy: step into their perspective. A leader who assumes disengagement stems from apathy misses the broader context. Perhaps that learner does not see how a course connects to his life, or past failures have eroded her belief in success. Recognizing these barriers shifts the focus from blame to problem-solving.
The second lesson is clarity. Adults need a compelling reason that resonates with their reality. Leaders cannot rely on vague promises of a better future, which feel too abstract when someone is balancing rent and a second shift. Instead, they must bridge the gap between effort and outcome. Dropout experiences highlight this: those who leave often say the goals felt too distant or disconnected from their daily struggles. Leaders who listen can adapt, making the purpose immediate and tangible.
Reigniting the Drive: Tying Goals to Personal Wins
So how do you pull the unmotivated back in? One powerful tactic is tying goals to personal wins, which are specific outcomes that matter to the individual. This approach avoids generic incentives like earning more money or getting a degree. It focuses on identifying what excites them or solves their specific challenges.
Consider that factory worker chasing a GED. A leader might ask, "What could this unlock for you?" Perhaps it is the pride of helping their child with homework or the chance to apply for a long-desired supervisor role. By framing the goal as a personal victory, something they can feel and envision, the abstract becomes concrete. Research from the National Center for the Study of Adult Learning and Literacy shows that aligning education with learners’ goals increases persistence, a principle echoed in AAACE conference discussions.
Implementation matters. Leaders can begin with one-on-one conversations to uncover what drives each person. From there, they can tailor milestones. For example, "Pass this test, and you are one step closer to that promotion." This is not coddling; it is strategic alignment. Pair this with small, achievable wins to build momentum. Completing a single module might seem minor, but for an adult returning to education, it boosts confidence and encourages further effort.
The Ripple Effect
Motivating the unmotivated extends beyond getting adults back into classrooms. It serves as a leadership blueprint. Whether rallying a team at work or inspiring a community, the principles apply: understand their barriers, clarify the stakes, and connect the effort to personal wins. Adult education dropouts teach us that disengagement is not the end of the story; it is a signal to adjust. By meeting people where they are and showing them what is possible, leaders can turn reluctance into resolve. That is a lesson worth embracing.
-
@ 2ed3596e:98b4cc78
2025-03-11 20:49:00Bitcoin is the first form of digital money that is controlled by "people" from around the world rather than a central authority, so it can’t be changed arbitrarily, which makes it arguably the most sound form of digital money.
Here are the 5 W’s ( What, Who, Why, When and Where) of bitcoin and what it matters to you:
What is Bitcoin?
Bitcoin is a cryptocurrency. Much like traditional currency, it can be purchased, earned and spent, but all Bitcoin transactions take place online. The Bitcoin network was created to be open-source and decentralized, meaning it is an electronic payment system unencumbered by third parties, such as a bank. This peer-to-peer system prevents a single person or entity from controlling the currency. One bitcoin (BTC) is equivalent to 100,000,000 satoshis (sats). This means that you can own a fraction of a bitcoin, just like cents in a dollar.
Who created Bitcoin?
A programmer using the pseudonym of Satoshi Nakamoto created the protocol for Bitcoin. Nobody really knows who Satoshi is. Some say it might be a collective of people, while others say it is only one person.
The guide Satoshi created also explained the principles of cryptography and how it works to create a trustless payment system. Being trustless may sound spooky, but it simply means that you are not required to trust anyone in order for the system to work.
When was Bitcoin created?
Satoshi laid out the foundation of Bitcoin when they presented the white paper on October 31st, 2008.
This white paper outlined what bitcoin was meant to be in theory. However, the origins of bitcoin date back decades or even millennia in the past. Satoshi created a money and monetary system that contained the best attributes of various successful monetary systems of the past, all combined into a singular system. Then, Satoshi officially launched the fully functional Bitcoin network on January 3rd, 2009 bringing the theory to life.
Why is Bitcoin important?
Bitcoin enables a more financially connected world, where transactions can be sent directly between individuals on the Internet. Having decentralized currency is important because it allows anyone to transact with ease, without the need for a third party or bank account/credit. This allows people that are unbanked to become part of the internet economy directly as well.
An important distinction between fiat currency and bitcoin is that even with its volatility even with its lows during a bear market, the price has always plateaued higher than the last fluctuation showing a positive trend in value. Alternatively, keeping your long-term savings in cash or a bank account could very likely have an inverse effect since inflation continues to reduce the buying power of major currencies over time. What you save today may not be enough for tomorrow… Bitcoin has the potential to fix this for us today and future generations.
By understanding why Bitcoin was created, it could change your perspective on how to store money. The protocol empowers individuals to reevaluate their relationship with money and take full control of their bitcoin. This can be done because bitcoin transactions are cryptographic proofs saved on a public blockchain.
Where can I get bitcoin?
The best place to buy bitcoin is Bitcoin Well
Bitcoin Well is on a mission to enable independence. We do this by making it easy to self custody bitcoin. By custodying their own money, our customers are free to do as they wish without begging for permission. By creating a full ecosystem to buy, sell and use your bitcoin to connect with the modern financial world, you are able to have your bitcoin in self custody and easily spend it too.
Bitcoin Well is also the best place in the world to earn bitcoin. When you earn points in your Bitcoin Well account, you gain the opportunity to play the Bitcoin (Wishing) Well, where you win sats with every play.
-
@ 7d33ba57:1b82db35
2025-03-11 20:30:06Hiking to Mirador Cruz del Confital – A Scenic Coastal Trail
The Mirador Cruz del Confital hike is a moderate coastal trail offering some of the best panoramic views over Las Palmas, Playa de Las Canteras, and El Confital Beach. This hike combines rugged volcanic landscapes, ocean breezes, and stunning sunset viewpoints**, making it a must-do for nature lovers visiting Gran Canaria.
🥾 Trail Overview
📍 Starting Point: El Confital Beach, Las Palmas
🎯 End Point: Mirador Cruz del Confital
📏 Distance: ~4 km round trip
⏳ Duration: ~1.5 to 2 hours
📈 Elevation Gain: ~150 meters
🟢 Difficulty: Moderate (rocky paths, some incline)🌿 What to Expect on the Hike
1️⃣ Start at El Confital Beach
The hike begins at El Confital, a wild and natural beach located beyond Playa de Las Canteras. This area is famous for crystal-clear waters, volcanic rock formations, and top-tier surfing waves**.
2️⃣ Climbing the Coastal Ridge
The trail gradually ascends along a dirt path, revealing breathtaking views of Las Palmas’ coastline and the Atlantic Ocean**. The terrain is mostly rocky, with some uneven sections, but it’s manageable for most hikers.
3️⃣ Reaching Mirador Cruz del Confital
At the top, you’ll find a cross monument marking the viewpoint. From here, enjoy aerial views of Playa de Las Canteras, the city skyline, and the vast ocean stretching towards Tenerife on clear days.
4️⃣ Return Hike
Descend via the same trail or take an alternative loop path for a slightly different perspective of the rugged coastline.
-
@ 7d33ba57:1b82db35
2025-03-11 19:51:35Papas Arrugadas with Mojo Verde & Mojo Picón + Gambas al Ajillo
These two classic Canarian and Spanish dishes are a must-try if you love bold flavors! Papas Arrugadas (wrinkly potatoes) are small salt-crusted potatoes served with mojo verde (green sauce) and mojo picón (spicy red sauce), while Gambas al Ajillo (garlic shrimp) is a sizzling tapas dish loaded with garlic and chili flavors.
🥔 Papas Arrugadas with Mojo Verde & Mojo Picón
Ingredients:
✅ For the Papas Arrugadas:
- 1 kg small new potatoes (preferably Canarian or baby potatoes)
- ½ cup coarse sea salt
- Water (enough to barely cover potatoes)✅ For Mojo Verde (Green Sauce):
- 1 bunch fresh cilantro (or parsley)
- 2 cloves garlic
- ½ tsp cumin
- ½ tsp sea salt
- 3 tbsp olive oil
- 1 tbsp white wine vinegar
- 2 tbsp water✅ For Mojo Picón (Spicy Red Sauce):
- 2 dried red chili peppers (rehydrated in warm water)
- 2 cloves garlic
- ½ tsp cumin
- ½ tsp sea salt
- ½ tsp sweet or smoked paprika
- 3 tbsp olive oil
- 1 tbsp red wine vinegar
- 2 tbsp waterInstructions:
1️⃣ Cook the Potatoes:
- Wash the potatoes but do not peel them.
- Place in a pot with enough water to just cover them and add salt.
- Boil until water evaporates and potatoes develop a wrinkled, salty skin (~20-25 min).2️⃣ Prepare the Mojo Verde:
- Blend all ingredients until smooth. Adjust salt and consistency with water.3️⃣ Prepare the Mojo Picón:
- Blend ingredients into a thick sauce, adjusting heat by adding more chili.4️⃣ Serve:
- Drain the potatoes and let them dry in the pot for a few minutes. Serve with both sauces on the side.🦐 Gambas al Ajillo (Spanish Garlic Shrimp)
Ingredients:
- 300g fresh shrimp (peeled, tails optional)
- 4-5 cloves garlic, thinly sliced
- 1 small red chili (or ½ tsp red pepper flakes)
- 4 tbsp olive oil
- ½ tsp sea salt
- ½ tsp paprika (sweet or smoked)
- 2 tbsp white wine or dry sherry (optional)
- Fresh parsley (for garnish)
- Lemon wedges (for serving)
Instructions:
1️⃣ Heat the olive oil in a pan over medium heat.
2️⃣ Add the garlic and chili and sauté until fragrant (don’t burn the garlic!).
3️⃣ Add the shrimp, season with salt & paprika, and cook until pink (~2-3 min).
4️⃣ Deglaze with white wine, if using, and let it reduce slightly.
5️⃣ Remove from heat, sprinkle with fresh parsley, and serve hot.
🔥 Serving Tips:
🥖 Serve both dishes with crusty bread to dip into the sauces!
🍷 Pair with a crisp white wine like a Canarian Malvasía or a Spanish Albariño.
🌞 Perfect for a tapas night or a taste of the Canary Islands at home! -
@ dbb19ae0:c3f22d5a
2025-03-11 19:09:19I had this idea nostr:nevent1qvzqqqqqqypzpka3ntswp659x2yu2nru4qg8s2mpxpkgfr9d3kzpv969jlplyt26qqsdcsjaf57l9dssenlw6rt7vz2kd3kq9hqy5h6f3jx20u2j4vkmetgtg9q24
And today I wrote the python program using #nostr_sdk Using nostr_sdk 0.39 replace nsec_key with your secret key be careful, I just made like 2 or 3 test run. ``` python
!/usr/bin/env python3
import asyncio import argparse import json from nostr_sdk import Metadata, Client, NostrSigner, Keys, init_logger, LogLevel
async def write_metadata(secret_key, profile_data): try: init_logger(LogLevel.INFO) keys = Keys.parse(secret_key) signer = NostrSigner.keys(keys) client = Client(signer) public_key = keys.public_key() print(f"Public key (npub): {public_key.to_bech32()}")
# Add relays await client.add_relay("wss://relay.damus.io") await client.connect() # Parse profile content profile_content = json.loads(profile_data['content']) # Update metadata new_metadata = Metadata()\ .set_name(profile_content.get('name', '')) \ .set_picture(profile_content.get('picture', '')) \ .set_banner(profile_content.get('banner', '')) \ .set_about(profile_content.get('about', '')) await client.set_metadata(new_metadata) print("Metadata updated successfully.") except Exception as e: print(f"An error occurred in update_metadata: {e}") raise
if name == 'main': parser = argparse.ArgumentParser(description='Forcing user metadata using Nostr SDK.') parser.add_argument('json_file', type=str, help='Path to the JSON file containing profile data.') args = parser.parse_args()
with open(args.json_file, 'r') as file: profile_data_list = json.load(file) # Assuming the first profile in the JSON file is the one to be updated profile_data = profile_data_list[0] # Replace with actual secret key secret_key = "nsec_key" asyncio.run(write_metadata(secret_key, profile_data))
```
-
@ 46fcbe30:6bd8ce4d
2025-03-11 18:11:53MEMORANDUM OF CONVERSATION
SUBJECT: Meeting with Russian President Yeltsin
PARTICIPANTS: - U.S. - President Clinton - Secretary Albright - National Security Advisor Berger - Deputy National Security Advisor Steinberg - Ambassador Sestanovich - Carlos Pascual
- Russia
- Russian President Yeltsin
- Foreign Minister Ivanov
- Kremlin Foreign Policy Advisor Prihodko
- Defense Minister Sergeyev
- Interpreter: Peter Afansenko
- Notetaker: Carlos Pascual
DATE, TIME AND PLACE: November 19, 1999, 10:45 a.m. - 11:40 a.m. Istanbul, Turkey
President Yeltsin: We are in neutral territory here. I welcome you.
The President: Neither of us has a stake here. It's good to see you.
President Yeltsin: Well, Bill, what about those camps here in Turkey that are preparing troops to go into Chechnya? Aren't you in charge of those? I have the details. Minister Ivanov, give me the map. I want to show you where the mercenaries are being trained and then being sent into Chechnya. They are armed to the teeth. (Note: Yeltsin pulls out map of Turkey and circulates it.) Bill, this is your fault. I told Demirel yesterday that I will send the head of the SRV tomorrow and we will show him where the camps are located. These are not state-sanctioned camps. They are sponsored by NGOs and religious organizations. But let me tell you if this were in Russia and there were but one camp, I would throw them all out and put the bandits in the electric chair.
The President: Perhaps Demirel could help you.
President Yeltsin: Well, he ought to. Tomorrow after I get back, I will send the head of the Foreign Intelligence Service here. Bill, did you hurt your leg?
The President: Yes, but it is not bad.
President Yeltsin: When one leg of the President hurts, that is a bad thing.
The President: It lets me know I am alive.
President Yeltsin: I know we are not upset at each other. We were just throwing some jabs. I'm still waiting for you to visit. Bill. I've said to you come to visit in May, then June, then July and then August. Now it's past October and you're still not there.
The President: You're right, Boris, I owe you a visit.
President Yeltsin: Last time I went to the U.S., Bill.
The President: Well, I better set it up. I'll look at the calendar and find a time that's good for you and me.
President Yeltsin: Call me and tell me the month and date. Unless I have another visit, I will do the maximum amount I can to do everything around your schedule. The main things I have are to go to China and India.
The President: Boris, we still have lots to do together.
President Yeltsin: You heard my statement on nuclear arms and on banning nuclear tests. I just signed a law on ratification of a new agreement on the Comprehensive Test Ban Treaty. Isn't that right, Minister Ivanov?
Minister Ivanov: You signed the documents that sent the Comprehensive Test Ban Treaty to the Duma for review.
President Yeltsin: Well, in any case, I still approved it.
The President: Maybe I can get the Congress to agree still. They kept the Treaty even after they rejected it. So perhaps, there is still a chance.
President Yeltsin: Or perhaps it's just the bureaucrats working and they haven't had a chance to send it back to you yet. I'm upset that you signed the law to change the ABM Treaty.
The President: I signed no such law. People in Congress don't like the ABM Treaty. If Congress had its way, they would undermine the treaty. I'm trying to uphold it. But we need a national missile defense to protect against rogue states. We can't have a national missile defense that works without changing the ABM Treaty. But I want to do this cooperatively. I want to persuade you that this is good for both of us. The primary purpose is to protect against terrorists and rogue states. It would be ineffective against Russia. The system we're looking at would operate against just 20 missiles. And, Boris I want to figure out how to share the benefits. For all I know, in twenty years terrorists could have access to nuclear weapons. I know your people don't agree with me, but I'm not trying to overthrow the ABM Treaty. We're still trying to discover what's technically possible with national missile defense, but there are people in America who want to throw over the ABM Treaty. I have made no decisions yet.
President Yeltsin: Bill, Bill. I got your note. It went into all these things in incredible detail. I read it and I was satisfied. I've not yet ceased to believe in you. I ask you one thing. Just give Europe to Russia. The U.S. is not in Europe. Europe should be the business of Europeans. Russia is half European and half Asian.
The President: So you want Asia too?
President Yeltsin: Sure, sure. Bill. Eventually, we will have to agree on all of this.
The President: I don't think the Europeans would like this very much.
President Yeltsin: Not all. But I am a European. I live in Moscow. Moscow is in Europe and I like it. You can take all the other states and provide security to them. I will take Europe and provide them security. Well, not I. Russia will. We will end this conflict in Chechnya. I didn't say all the things I was thinking (in his speech). I listened to you carefully. I took a break just beforehand. Then I listened to you from beginning to end. I can even repeat what you said. Bill, I'm serious. Give Europe to Europe itself. Europe never felt as close to Russia as it does now. We have no difference of opinion with Europe, except maybe on Afganistan and Pakistan—which, by the way, is training Chechens. These are bandits, headhunters and killers. They're raping American women. They're cutting off ears and other parts of their hostages. We're fighting these types of terrorists. Let's not accuse Russia that we are too rough with these kinds of people. There are only two options: kill them or put them on trial. There's no third option, but we can put them on trial, and sentence them to 20-25 years. How many Americans, French, British and Germans have I freed that were there in Chechnya under the OSCE? The Chechen killers don't like the language of the OSCE. Here's my Minister of Defense. Stand up. We have not lost one soldier down there. Tell them.
Minister Sergeyev: We did not lose one soldier in Gudermes.
President Yeltsin: You see, Gudermes was cleansed without one military or civilian killed. We killed 200 bandits. The Minister of Defense is fulfilling the plan as I have said it should be. He's doing this thoughtfully. The soldiers only ask: don't stop the campaign. I promised these guys—I told every soldier, marshal and general—I will bring the campaign to fruition. We have these Chechens under lock and key. We have the key. They can't get in, they can't get out. Except maybe through Georgia; that's Shevardnadze's big mistake. And through Azerbaijan; that's Aliyev's mistake. They're shuttling in under the name of Islam. We're for freedom of religion, but not for fundamentalist Islam. These extremists are against you and against me.
We have the power in Russia to protect all of Europe, including those with missiles. We'll make all the appropriate treaties with China. We're not going to provide nuclear weapons to India. If we give them submarines, it will be only conventional diesel submarines, not nuclear. They would be from the 935 generation. You're going in that direction too. I'm thinking about your proposal—well, what your armed forces are doing—getting rid of fissile materials, particularly plutonium. We should just get rid of it. As soon as it's there, people start thinking of how to make bombs. Look, Russia has the power and intellect to know what to do with Europe. If Ivanov stays here, he will initial the CFE Treaty and I'll sign it under him. But under the OSCE Charter, there is one thing I cannot agree—which is that, based on humanitarian causes, one state can interfere in the affairs of another state.
National Security Advisor Berger: Mr. President, there's nothing in the Charter on one state's interference in the affairs of another.
Secretary Albright: That's right. What the Charter says is that affairs within a state will affect the other states around it.
President Yeltsin: Russia agrees to take out its property and equipment from Georgia in accordance with the new CFE Treaty. I have a statement on this. (looking toward Ivanov) Give it to me. I signed it today. Actually, it was late last night. I like to work late.
The President: Me, too.
President Yeltsin: I know you like to work late, Bill. When you call me, I calculate the time and I tell myself it's 4 a.m. and he's calling me. It lets you cleanse your brain and you feel great. I am not criticizing you, Bill. The President should be encouraged to work hard.
The President: So, we will get an agreement on CFE.
President Yeltsin: Yes.
The President: That's very important, seven years. We've worked on this for a long time.
President Yeltsin: Look, Ivanov has lost the statement in his own bag. He can't find the paper in his own bag. On the Charter, we have to look at it from the beginning. The Charter's ready. However, when states begin to tie in the Charter with the final declaration that has wording unacceptable to us, that's when we'll say no. And responsibility for this will fall fully on the West. (Looking at Ivanov) Give me this thing. It is written on paper. Bill. I am ready to sign it. It is a declaration about what we're talking about.
Secretary Albright: Some states want to record in the declaration your willingness to have an OSCE mission.
President Yeltsin: No, not at all. We will finish this with our own forces. Chechnya is the business of the internal affairs of Russia. We have to decide what to do. After we cleansed Gudermes, the muslim mufti came and asked for help, said I hate Basayev and he should be banned. These are the kinds of leaders we will put forward. I have thought this through carefully.
The President: On the Chechen problem. I have been less critical than others. Even today, I asked the others how they would deal with this if it were their country. This is a political issue. It may be the best thing for you within Russia to tell the Europeans to go to hell. But the best thing for your relations with Europe for the long term is to figure out the policy that you want to have with Europe and to keep that in mind as you deal with Chechnya.
President Yeltsin: (Gets up rapidly) Bill, the meeting is up. We said 20 minutes and it has now been more than 35 minutes.
The President: That's fine. We can say the meeting is over.
President Yeltsin: This meeting has gone on too long. You should come to visit, Bill.
The President: Who will win the election?
President Yeltsin: Putin, of course. He will be the successor to Boris Yeltsin. He's a democrat, and he knows the West.
The President: He's very smart.
President Yeltsin: He's tough. He has an internal ramrod. He's tough internally, and I will do everything possible for him to win—legally, of course. And he will win. You'll do business together. He will continue the Yeltsin line on democracy and economics and widen Russia's contacts. He has the energy and the brains to succeed. Thank you, Bill.
The President: Thank you, Boris. It was good to see you.
End of Conversation
-
@ 57d1a264:69f1fee1
2025-03-11 16:17:44You can learn about what we’re doing at lava on our website: lava.xyz. We recommend you take a thorough look through everything before applying.
Not an immediate fit? Lava has an open referral bounty. If you refer someone to us and we hire them, we will pay you $5k for an in-person NYC full-time hire and $1k for non-NYC full time hires. Send referrals to hello@lava.xyz
We are looking for a designer to join our team at Lava. In this role, you will be responsible for leading the design of all of our products.
What you will do
- Drive and execute on an ambitious design vision for Lava
- Communicate with engineering teams to make sure designs are implemented properly
- Talk to users, analyze user feedback, and identify areas for improvement
What we look for in you
- You align with the guidelines and values we use to decide who we hire and how we operate: https://www.lava.xyz/onepager
- Expertise as a designer
- You are a great communicator (written and verbal).
- You are extremely organized.
- You learn fast.
- You work hard.
- You get shit done quickly.
- You live in NYC, or you’re willing to relocate to NYC.
If you feel that the above describes you, we’d love to hear from you!
Please fill out this form: https://forms.gle/cJFsuP3tXgSknPJ8A
Job Description: https://lavaxyz.notion.site/Founding-Designer-78c91e29f4a44d0b8cb32e33ff40c167?pvs=4
originally posted at https://stacker.news/items/910384
-
@ fc15d4c6:fba62950
2025-03-11 16:17:09Scenes from earlier today in Mzuzu after the Protest from angry citizens.
Source
- Images sourced from WhatsApp
- A Face of Malawi Post about the Protest [https://www.faceofmalawi.com/2025/03/11/protests-disrupt-business-in-mzuzu-as-flags-and-booths-demolished-police-intervene/]
-
@ a012dc82:6458a70d
2025-03-11 15:41:36Argentina's journey through economic turmoil has been long and fraught with challenges. The country has grappled with inflation, debt, and a fragile economic structure that has left policymakers searching for solutions. In this context, President Javier Milei's introduction of the "Ley Ómnibus" represented a bold step towards addressing these systemic issues. The reform package was not just a set of isolated measures but a comprehensive plan aimed at overhauling the Argentine economy and social framework. The intention was to create a more robust, free, and prosperous Argentina, where economic freedoms could lead to broader social benefits.
The "Ley Ómnibus" was ambitious in its scope, covering a wide range of areas from tax reform to social policies, aiming to stimulate economic growth, reduce bureaucratic red tape, and enhance the overall quality of life for Argentines. This package was seen as a critical move to reset the economic compass of the country, aiming to attract foreign investment, boost local industry, and provide a clearer, more stable environment for businesses and individuals alike. However, such sweeping reforms were bound to encounter resistance, particularly when they touched upon sensitive areas like taxation and digital assets.
Table of Contents
-
The Crypto Tax Proposal: Initial Considerations
-
Public Backlash and Strategic Withdrawal
-
The Rationale Behind Dropping Crypto Taxes
-
Implications for Crypto Investors and the Market
-
Milei's Political Strategy and Future Prospects
-
Conclusion
-
FAQs
The Crypto Tax Proposal: Initial Considerations
Within the vast array of proposals in the Ley Ómnibus, the crypto tax stood out due to its novelty and the growing interest in digital currencies within Argentina. The country had seen a surge in cryptocurrency adoption, driven by factors such as high inflation rates and currency controls that made traditional financial systems less attractive. Cryptocurrencies offered an alternative for savings, investment, and transactions, leading to a burgeoning crypto economy.
The initial rationale behind proposing a crypto tax was multifaceted. On one hand, it aimed to bring Argentina in line with global trends where countries are increasingly seeking to regulate and tax digital currencies. On the other hand, it was seen as a potential new revenue stream for the government, which was desperately seeking funds to address its fiscal deficits. The proposal also intended to bring transparency to a sector that is often criticized for its opacity, making it easier to combat fraud, money laundering, and other illicit activities associated with cryptocurrencies.
However, the proposal was not just about regulation and revenue. It was also a litmus test for Argentina's approach to innovation and digital transformation. How the government handled this issue would signal its stance towards new technologies and economic paradigms, which are increasingly dominated by digital assets and fintech innovations.
Public Backlash and Strategic Withdrawal
The backlash against the proposed crypto taxes was swift and significant. The crypto community in Argentina, which had been flourishing in an environment of relative freedom, saw the tax as a direct threat to its growth and viability. But the discontent went beyond the crypto enthusiasts; the general public, already burdened by high taxes and economic instability, viewed the proposal as yet another financial strain.
The protests and debates that ensued highlighted a broader discontent with the government's approach to economic management. Many Argentines felt that the focus should be on fixing the fundamental issues plaguing the economy, such as inflation and corruption, rather than imposing new taxes. The crypto tax became a symbol of the government's perceived detachment from the real concerns of its citizens.
In this heated atmosphere, President Milei's decision to withdraw the crypto tax proposal from the Ley Ómnibus was not just a tactical retreat; it was a necessary move to quell the growing unrest and focus on more pressing economic reforms. This decision underscored the complexities of governing in a highly polarized environment and the need for a more nuanced approach to policy-making, especially when dealing with emerging technologies and markets.
The Rationale Behind Dropping Crypto Taxes
The decision to drop the crypto tax from the omnibus reform package was not taken lightly. It was a recognition of the crypto sector's unique dynamics and the government's limitations in effectively regulating and taxing this space without stifling innovation. The move also reflected a broader understanding of the economic landscape, where rapid development and legislative efficiency were deemed more crucial than ever.
By removing the contentious clauses, the government aimed to streamline the passage of the Ley Ómnibus, ensuring that other, less controversial, reforms could be implemented swiftly. This strategic pivot was also a nod to the global debate on how best to integrate cryptocurrencies into national economies. Argentina's government recognized that a more cautious and informed approach was necessary, one that could balance the need for regulation with the desire to foster a thriving digital economy.
Furthermore, the withdrawal of the crypto tax proposal can be seen as an acknowledgment of the power of public opinion and the crypto community's growing influence. It highlighted the need for governments to engage with stakeholders and understand the implications of new technologies before rushing to regulate them.
Implications for Crypto Investors and the Market
The removal of the crypto tax proposal has had immediate and significant implications for the Argentine crypto market. For investors, the decision has provided a reprieve from the uncertainty that had clouded the sector, allowing them to breathe a sigh of relief and continue their activities without the looming threat of new taxes. This has helped sustain the momentum of the crypto market in Argentina, which is seen as a vital component of the country's digital transformation and economic diversification.
However, the situation remains complex and fluid. The government's stance on cryptocurrencies is still evolving, and future regulations could impact the market in unforeseen ways. Investors are now more aware of the need to stay informed and engaged with regulatory developments, understanding that the legal landscape for digital currencies is still being shaped.
The episode has also highlighted the broader challenges facing the Argentine economy, including the need for comprehensive tax reform and the creation of a more conducive environment for technological innovation and investment. The crypto market's response to the government's actions reflects the delicate balance between regulation and growth, a balance that will be crucial for Argentina's economic future.
Milei's Political Strategy and Future Prospects
President Milei's handling of the crypto tax controversy reveals much about his political strategy and vision for Argentina. By withdrawing the proposal, he demonstrated a willingness to listen to public concerns and adapt his policies accordingly. This flexibility could be a key asset as he navigates the complex landscape of Argentine politics and governance.
The episode also offers insights into the potential future direction of Milei's administration. The focus on economic reforms, coupled with a pragmatic approach to contentious issues, suggests a leadership style that prioritizes economic stability and growth over ideological purity. This could bode well for Argentina's future, particularly if Milei can harness the energy and innovation of the digital economy as part of his broader reform agenda.
However, the challenges ahead are significant. The Ley Ómnibus is just one part of a larger puzzle, and Milei's ability to implement comprehensive reforms will be tested in the coming months and years. The crypto tax saga has shown that while change is possible, it requires careful negotiation, stakeholder engagement, and a clear understanding of the economic and social landscape.
Conclusion
The story of Argentina's crypto tax proposal is a microcosm of the broader challenges facing the country as it seeks to reform its economy and society. It highlights the tensions between innovation and regulation, the importance of public opinion, and the complexities of governance in a rapidly changing world.
As Argentina moves forward, the lessons learned from this episode will be invaluable. The need for clear, informed, and inclusive policy-making has never been greater, particularly as the country navigates the uncertainties of the digital age.
FAQs
What is the Ley Ómnibus? The Ley Ómnibus, formally known as the "Law of Bases and Starting Points for the Freedom of Argentines," is a comprehensive reform package introduced by President Javier Milei. It aims to address various economic, social, and administrative issues in Argentina, aiming to stimulate growth, reduce bureaucracy, and improve the overall quality of life.
Why were crypto taxes proposed in Argentina? Crypto taxes were proposed as part of the Ley Ómnibus to broaden the tax base, align with global trends of regulating digital currencies, and generate additional revenue for the government. They were also intended to bring more transparency to the cryptocurrency sector in Argentina.
Why were the proposed crypto taxes withdrawn? The proposed crypto taxes were withdrawn due to significant public backlash and concerns that they would stifle innovation and economic freedom in the burgeoning crypto market. The decision was also influenced by the government's priority to ensure the swift passage of other reforms within the Ley Ómnibus.
What does the withdrawal of crypto taxes mean for investors? The withdrawal means that, for now, crypto investors in Argentina will not face additional taxes specifically targeting their cryptocurrency holdings or transactions. However, selling large amounts of cryptocurrency at a profit will still be subject to income tax.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 6e0ea5d6:0327f353
2025-03-11 15:05:05Ascolta bene!
In life, we often encounter obstacles that seem insurmountable, threatening to hinder our future goals.
However, delaying the realization of reality can come at a high cost, leaving us vulnerable in the face of emerging challenges.
It is essential to remember that we are responsible for our own lives, and the decision to take action and seek solutions rests solely with us.
When the war seems lost, when the battle appears to lead only to defeat, perhaps it is time to stop focusing on the fight itself and reflect on who and what you are fighting for.
Likewise, as I have repeatedly stated on other occasions, a man's life is an endless battle. In the real world, peace is truly attained only when the lid of the mausoleum is sealed. In life, good moments are merely brief truces—transitions between one war and an even greater one. Giving up in the face of a problem will only buy you a little time before an even worse challenge appears.
If we do nothing, no one will do it for us.
Just like in battle, it is necessary to maintain discipline and determination to face challenges. Life can be difficult and full of surprises, but we must keep moving forward, always seeking ways to overcome adversity.
There is no escaping the fight, but we can choose how we face it. So, do not delay in taking action. Be proactive in pursuing your goals and dreams—do not wait for things to happen on their own.
Victory will not come easily, but with effort and dedication, we can achieve our goals and build the life we desire.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 5f3e7e41:81cb07cf
2025-03-11 14:39:08 -
@ 57d1a264:69f1fee1
2025-03-11 13:32:15Remote only
Part Time
Estamos em busca de um profissional para aprimorar a experiência dos usuários em nossos produtos ramblyn.app. Você trabalhará remotamente com um time pequeno e ágil, colaborando diretamente no design de interfaces. Não nos preocupamos com diplomas, buscamos alguém criativo, organizado e capaz de aprimorar e implementar processos em sua área.
Requisitos: - Experiência com desenvolvimento web e web design. - Ser uma pessoa organizada, com habilidade para documentar processos. - Experiência prévia com atendimento ao cliente (diferencial). - Conhecimento sobre Bitcoin e Lightning Network (diferencial). - Capacidade de criar interfaces intuitivas e otimizadas para a melhor experiência do usuário.
originally posted at https://stacker.news/items/910158
-
@ 0c469779:4b21d8b0
2025-03-11 10:52:49Sobre el amor
Mi percepción del amor cambió con el tiempo. Leer literatura rusa, principalmente a Dostoevsky, te cambia la perspectiva sobre el amor y la vida en general.
Por mucho tiempo mi visión sobre la vida es que la misma se basa en el sufrimiento: también la Biblia dice esto. El amor es igual, en el amor se sufre y se banca a la otra persona. El problema es que hay una distinción de sufrimientos que por mucho tiempo no tuve en cuenta. Está el sufrimiento del sacrificio y el sufrimiento masoquista. Para mí eran indistintos.
Para mí el ideal era Aliosha y Natasha de Humillados y Ofendidos: estar con alguien que me amase tanto como Natasha a Aliosha, un amor inclusive autodestructivo para Natasha, pero real. Tiene algo de épico, inalcanzable. Un sufrimiento extremo, redentor, es una vara altísima que en la vida cotidiana no se manifiesta. O el amor de Sonia a Raskolnikov, quien se fue hasta Siberia mientras estuvo en prisión para que no se quede solo en Crimen y Castigo.
Este es el tipo de amor que yo esperaba. Y como no me pasó nada tan extremo y las situaciones que llegan a ocurrir en mi vida están lejos de ser tan extremas, me parecía hasta poco lo que estaba pidiendo y que nadie pueda quedarse conmigo me parecía insuficiente.
Ahora pienso que el amor no tiene por qué ser así. Es un pensamiento nuevo que todavía estoy construyendo, y me di cuenta cuando fui a la iglesia, a pesar de que no soy cristiano. La filosofía cristiana me gusta. Va conmigo. Tiene un enfoque de humildad, superación y comunidad que me recuerda al estoicismo.
El amor se trata de resaltar lo mejor que hay en el otro. Se trata de ser un plus, de ayudar. Por eso si uno no está en su mejor etapa, si no se está cómodo con uno mismo, no se puede amar de verdad. El amor empieza en uno mismo.
Los libros son un espejo, no necesariamente vas a aprender de ellos, sino que te muestran quién sos. Resaltás lo que te importa. Por eso a pesar de saber los tipos de amores que hay en los trabajos de Dostoevsky, cometí los mismos errores varias veces.
Ser mejor depende de uno mismo y cada día se pone el granito de arena.
-
@ 57d1a264:69f1fee1
2025-03-11 10:28:08The Role
Our team brings deep expertise across electric power markets, project development, and software development, positioning us as trusted experts in this rapidly evolving market. We are seeking an experienced Software Product Manager to lead the planning, development, and execution of our software products. You will play a key role in defining the product vision, roadmap, and strategy, and you will collaborate closely with cross-functional teams to ensure successful product launches and iterations. The ideal candidate will have an energy background, a deep understanding of user needs, and the ability to balance technical requirements with business objectives.
Your Day-to-Day
- Product Vision and Strategy: You will define and effectively communicate the product vision, strategy, and roadmap to internal teams and key stakeholders, ensuring alignment between our goals and our customers’ needs to drive product decisions and adoption. To do this, you will need to stay informed on industry trends, emerging technologies, and competition to ensure our product remains innovative and competitive.
- End-to-End Product Development: You will lead the product development process from concept to launch, ensuring timely delivery of features that meet both quality standards and customer expectations. You will gather, prioritize, and articulate product requirements based on user feedback, market trends, and business goals. You will maintain clear and thorough documentation for product features, workflows, and technical specifications. You will
- Performance Analysis and Improvement: You will continuously monitor product performance using key metrics and user feedback to refine and iterate on the product, driving ongoing enhancements. You will advocate for user needs throughout the product development cycle to create products that truly resonate with them and a product experience that provides outsized value.
- Stakeholder Communication and Collaboration: You will synthesize and communicate results, insights, and actionable recommendations to the leadership team and all relevant stakeholders, and you will collaborate cross functionally to remove bottlenecks and be a force multiplier for our team.
originally posted at https://stacker.news/items/910029
-
@ a95c6243:d345522c
2025-03-11 10:22:36«Wir brauchen eine digitale Brandmauer gegen den Faschismus», schreibt der Chaos Computer Club (CCC) auf seiner Website. Unter diesem Motto präsentierte er letzte Woche einen Forderungskatalog, mit dem sich 24 Organisationen an die kommende Bundesregierung wenden. Der Koalitionsvertrag müsse sich daran messen lassen, verlangen sie.
In den drei Kategorien «Bekenntnis gegen Überwachung», «Schutz und Sicherheit für alle» sowie «Demokratie im digitalen Raum» stellen die Unterzeichner, zu denen auch Amnesty International und Das NETTZ gehören, unter anderem die folgenden «Mindestanforderungen»:
- Verbot biometrischer Massenüberwachung des öffentlichen Raums sowie der ungezielten biometrischen Auswertung des Internets.
- Anlasslose und massenhafte Vorratsdatenspeicherung wird abgelehnt.
- Automatisierte Datenanalysen der Informationsbestände der Strafverfolgungsbehörden sowie jede Form von Predictive Policing oder automatisiertes Profiling von Menschen werden abgelehnt.
- Einführung eines Rechts auf Verschlüsselung. Die Bundesregierung soll sich dafür einsetzen, die Chatkontrolle auf europäischer Ebene zu verhindern.
- Anonyme und pseudonyme Nutzung des Internets soll geschützt und ermöglicht werden.
- Bekämpfung «privaten Machtmissbrauchs von Big-Tech-Unternehmen» durch durchsetzungsstarke, unabhängige und grundsätzlich föderale Aufsichtsstrukturen.
- Einführung eines digitalen Gewaltschutzgesetzes, unter Berücksichtigung «gruppenbezogener digitaler Gewalt» und die Förderung von Beratungsangeboten.
- Ein umfassendes Förderprogramm für digitale öffentliche Räume, die dezentral organisiert und quelloffen programmiert sind, soll aufgelegt werden.
Es sei ein Irrglaube, dass zunehmende Überwachung einen Zugewinn an Sicherheit darstelle, ist eines der Argumente der Initiatoren. Sicherheit erfordere auch, dass Menschen anonym und vertraulich kommunizieren können und ihre Privatsphäre geschützt wird.
Gesunde digitale Räume lebten auch von einem demokratischen Diskurs, lesen wir in dem Papier. Es sei Aufgabe des Staates, Grundrechte zu schützen. Dazu gehöre auch, Menschenrechte und demokratische Werte, insbesondere Freiheit, Gleichheit und Solidarität zu fördern sowie den Missbrauch von Maßnahmen, Befugnissen und Infrastrukturen durch «die Feinde der Demokratie» zu verhindern.
Man ist geneigt zu fragen, wo denn die Autoren «den Faschismus» sehen, den es zu bekämpfen gelte. Die meisten der vorgetragenen Forderungen und Argumente finden sicher breite Unterstützung, denn sie beschreiben offenkundig gängige, kritikwürdige Praxis. Die Aushebelung der Privatsphäre, der Redefreiheit und anderer Grundrechte im Namen der Sicherheit wird bereits jetzt massiv durch die aktuellen «demokratischen Institutionen» und ihre «durchsetzungsstarken Aufsichtsstrukturen» betrieben.
Ist «der Faschismus» also die EU und ihre Mitgliedsstaaten? Nein, die «faschistische Gefahr», gegen die man eine digitale Brandmauer will, kommt nach Ansicht des CCC und seiner Partner aus den Vereinigten Staaten. Private Überwachung und Machtkonzentration sind dabei weltweit schon lange Realität, jetzt endlich müssen sie jedoch bekämpft werden. In dem Papier heißt es:
«Die willkürliche und antidemokratische Machtausübung der Tech-Oligarchen um Präsident Trump erfordert einen Paradigmenwechsel in der deutschen Digitalpolitik. (...) Die aktuellen Geschehnisse in den USA zeigen auf, wie Datensammlungen und -analyse genutzt werden können, um einen Staat handstreichartig zu übernehmen, seine Strukturen nachhaltig zu beschädigen, Widerstand zu unterbinden und marginalisierte Gruppen zu verfolgen.»
Wer auf der anderen Seite dieser Brandmauer stehen soll, ist also klar. Es sind die gleichen «Feinde unserer Demokratie», die seit Jahren in diese Ecke gedrängt werden. Es sind die gleichen Andersdenkenden, Regierungskritiker und Friedensforderer, die unter dem großzügigen Dach des Bundesprogramms «Demokratie leben» einem «kontinuierlichen Echt- und Langzeitmonitoring» wegen der Etikettierung «digitaler Hass» unterzogen werden.
Dass die 24 Organisationen praktisch auch die Bekämpfung von Google, Microsoft, Apple, Amazon und anderen fordern, entbehrt nicht der Komik. Diese fallen aber sicher unter das Stichwort «Machtmissbrauch von Big-Tech-Unternehmen». Gleichzeitig verlangen die Lobbyisten implizit zum Beispiel die Förderung des Nostr-Netzwerks, denn hier finden wir dezentral organisierte und quelloffen programmierte digitale Räume par excellence, obendrein zensurresistent. Das wiederum dürfte in der Politik weniger gut ankommen.
[Titelbild: Pixabay]
Dieser Beitrag ist zuerst auf Transition News erschienen.
-
@ 7d33ba57:1b82db35
2025-03-11 09:21:52Some fun facts about zebras:
1. Stripes are unique: No two zebras have the same stripe pattern, much like human fingerprints. Their stripes help with camouflage in the wild, blending into the grassy or wooded environments.
-
Zebras are social animals: They live in groups called harems, typically consisting of one male and several females. They are also known to form larger herds for safety.
-
Zebras can sleep standing up: Unlike many animals, zebras can rest while standing. However, they do need to lie down for deep sleep.
-
Zebras communicate with each other: They make various sounds, such as barks, whinnies, and growls, to communicate with their herd.
-
Zebra stripes may regulate temperature: Some studies suggest that the black-and-white stripes may help regulate body temperature, with the alternating hot and cool bands creating air currents that help cool the zebra down.
-
Zebras are excellent runners: They can run up to 40 miles per hour (64 kilometers per hour) to escape predators.
-
Zebras are herbivores: They primarily eat grasses, but they can also nibble on leaves, shrubs, and bark in times of scarcity.
-
Zebras have strong memories: They can remember faces and recognize their family members even after being separated for a long time.
-
Zebras are not horses: Despite their similar appearance, zebras are not horses. They belong to the same family, but zebras have different behaviors and physical traits, like their stripes.
-
Zebra foals can walk within hours: When born, zebra foals are able to walk and run within a few hours to keep up with the herd.
-
-
@ da0b9bc3:4e30a4a9
2025-03-11 07:28:42Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/909958
-
@ 95cb4330:96db706c
2025-03-11 07:17:28Introduction: What Is High-Agency Thinking?
Most people wait.
They wait for the right opportunity, the right moment, or for someone else to solve their problems.High-agency individuals don’t wait—they act.
High-Agency Thinking is a mindset embraced by Elon Musk, Jeff Bezos, and Sam Altman—it’s about taking control of your life, solving problems proactively, and creating opportunities instead of waiting for them to appear.
If you adopt this mindset, you will:
✔ Stop making excuses and start finding solutions
✔ Push past obstacles where others give up
✔ Take ownership of your success, rather than relying on external factorsThis is the ultimate advantage in business, investing, and life.
What Does It Mean to Have High Agency?
A high-agency person believes:
- "If something isn’t working, I’ll fix it."
- "If I don’t know how to do something, I’ll figure it out."
- "I don’t need permission—I’ll take action."A low-agency person says:
- "I can't do this because of X."
- "I need approval before I move forward."
- "I’ll wait until things are perfect before taking action."The world rewards high-agency people because they solve problems instead of making excuses.
Examples of High-Agency Thinking in Action
1. Elon Musk and SpaceX: Ignoring Limits, Creating Solutions
Before SpaceX, only governments built rockets. Private companies weren’t even considered capable of doing it.
Instead of waiting for NASA to make space travel more efficient, Elon Musk took control:
✅ He built SpaceX from scratch, despite zero experience in aerospace.
✅ He rethought how rockets should be made, cutting costs by 10x.
✅ He ignored doubters, pushed through failures, and revolutionized the space industry.📌 Lesson: If Musk had waited for approval or the “right conditions,” SpaceX would never exist. High-agency thinking creates the future—it doesn’t wait for it.
2. Jeff Bezos and Amazon: Prioritizing Long-Term Vision Over Short-Term Pressures
Amazon wasn’t always a giant. In its early years, Wall Street pressured Jeff Bezos to focus on short-term profits.
But Bezos had high agency—he wasn’t going to let short-term thinkers dictate Amazon’s future:
✅ He ignored Wall Street’s demands and focused on long-term growth.
✅ He reinvested profits into AWS, logistics, and Prime, creating new business models.
✅ He pushed forward even when Amazon stock collapsed in the early 2000s.📌 Lesson: A low-agency CEO would have followed the crowd. Bezos took control, prioritized long-term success, and built one of the most valuable companies in history.
3. Sam Altman and OpenAI: Betting on the Future of AI
AI wasn’t always the dominant trend it is today. In its early days, most people dismissed it as a long-shot technology.
Sam Altman didn’t care. He had high agency and saw the future before others did:
✅ He pushed OpenAI forward despite skepticism.
✅ He raised billions from investors before AI was mainstream.
✅ He ignored critics and kept iterating until OpenAI built ChatGPT—one of the fastest-growing products in history.📌 Lesson: High-agency people don’t wait for trends to be obvious—they create the trend before the world catches up.
How to Develop High-Agency Thinking
You don’t need to be Musk, Bezos, or Altman to have high agency. You can apply this mindset to your own life right now.
1. Stop Asking for Permission—Take Initiative
- If you want to start a business, start building today—don’t wait for the “perfect” moment.
- If you want a skill, start learning it—don’t wait for a class or degree to validate you.
- If you have a problem, figure out a solution instead of waiting for someone else to fix it.
2. Assume Full Ownership Over Your Situation
Low-agency people blame external factors for their situation.
High-agency people ask:
✔ "What can I do right now to improve this situation?"
✔ "How can I take control instead of waiting for conditions to change?"📌 Example: If you hate your job, instead of complaining, start acquiring the skills to move into a new role.
3. See Constraints as Challenges, Not Barriers
Low-agency people say, "I can’t because of X."
High-agency people say, "How can I solve X and move forward?"📌 Example: Musk didn’t have experience in rockets. Did that stop him? No—he taught himself aerospace engineering.
4. Take Action Before You Feel Ready
Waiting for the perfect conditions is a low-agency trap.
The best time to start is before you feel ready—because you’ll never feel ready.📌 Example: Most people wait until they feel “prepared” to launch a project. High-agency people launch first, learn along the way, and adjust as needed.
Final Thoughts: Be the Person Who Makes Things Happen
The world is divided into two types of people:
🚫 Low-agency thinkers: Wait for permission, blame circumstances, and avoid taking risks.
✅ High-agency thinkers: Create opportunities, solve problems, and take control of their future.If you want to win in business, investing, or life, stop waiting. Act now.
💡 Action Step: Identify one problem in your life that you’ve been passively accepting. What action can you take today to start solving it?
The best opportunities don’t come to you. You create them. 🚀
Resources to Learn More
- 📖 High-Agency Thinking – Farnam Street
- 📰 How to Develop High Agency – Medium
- 🎥 Elon Musk on Taking Initiative – YouTube
🚀 The world belongs to those who take action. Start today.
-
@ ddf03aca:5cb3bbbe
2025-03-11 04:20:08Are you passionate about open-source development, digital privacy, and nuts? We're building the next major version (v3) of our open-source TypeScript library that makes integrating Cashu into web applications effortless. But we need your help!
Version 3 aims to enhance the developer experience and expand flexibility significantly. As we start outlining this ambitious next iteration, your insights, and feedback as developers using or interested in Cashu are invaluable.
Here's how you can contribute:
-
Share your experiences: What do you love or struggle with in our current version?
-
Suggest features: What functionalities do you think should be prioritized?
-
Shape the API design: Your feedback can directly influence the core structure and usability of the library.
Let's build something amazing together!
Join our discussions on Matrix or hop on our weekly dev calls, and help guide the direction of Cashu-TS v3.
-
-
@ 6e0ea5d6:0327f353
2025-03-11 03:37:49Most of your listeners will always be divided between those who wish for your failure and those who contribute to your downfall. As for this advice, it can never be repeated enough! Eyes and ears open, mouth almost always shut. A thousand times will still be too little to repeat it.
In the shadow of merit, envy grows. Clearly, people struggle to see a friend who started where they are and reached a level they never will. Just observe! It is very common that when an achievement happens in your life and you want to share it with others, your friend makes some remark underestimating your success and likely competes with you, becoming defensive as if everything were a competition.
How many times will they say it was luck? How many times will they claim that if they were in your place, they would do better? For this reason, do not share anything with a friend that you wouldn’t tell an enemy.
On the other hand, in friendship:
If it is unjust, do not do it; If it is a lie, do not speak it; If it is a secret, omertà! Never reveal a secret that a friend has confided in you, even when they become an opponent.
If someone speaks ill of your friends in your presence, consider it as if they were slandering you. Friendship means making your friends' just battles your own fights—it is about standing together and fighting alongside them.
Never expect loyalty from others, but always maintain your own. Is it difficult to find a loyal friend who does not disrespect others? Yes, of course! However, even harder is being one. Take care of your conduct so that it is beyond reproach.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ d360efec:14907b5f
2025-03-11 02:12:06ภาพรวม (Overview):
Bitcoin (BTC) ใน TF 15m แสดงให้เห็นถึงความพยายามในการดีดตัวขึ้น (rebound) หลังจากที่ร่วงลงอย่างหนักเมื่อวันที่ 10 มีนาคม. อย่างไรก็ตาม, การดีดตัวนี้ยังคง ไม่มีความแข็งแกร่ง และยังคงอยู่ภายใต้แรงกดดันจากแนวต้านสำคัญๆ. การวิเคราะห์นี้จะเน้นไปที่ TF 15m เพื่อหากลยุทธ์ Day Trade ที่เหมาะสมกับสถานการณ์ปัจจุบัน.
การวิเคราะห์ทางเทคนิค (Technical Analysis - 15m):
-
SMC (Smart Money Concepts):
- ราคามีการดีดตัวขึ้นจากบริเวณใกล้ๆ แนวรับทางจิตวิทยา $60,000.
- อย่างไรก็ตาม, การดีดตัวนี้ ยังไม่ได้ สร้าง Higher High (HH) ที่ชัดเจน. ยังคงมีลักษณะเป็นเพียงการ Rebound ในแนวโน้มขาลง.
- ยังไม่มี สัญญาณการกลับตัวของ Smart Money (เช่น การสะสม Volume ในบริเวณแนวรับ).
-
ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (แนวต้าน):
- $68,000 (แนวต้านสำคัญ - EMA 50 และบริเวณที่เคยเป็นแนวรับ).
- $69,000 - $70,000 (โซนแนวต้าน).
- Sellside Liquidity (แนวรับ):
- $64,000
- $62,000 (Low ล่าสุด)
- $60,000 (แนวรับทางจิตวิทยา)
- Buyside Liquidity (แนวต้าน):
-
Money Flow:
- Money Flow เริ่มเป็นบวกเล็กน้อย. นี่เป็นสัญญาณที่ดี (bullish divergence), แต่ยังต้องได้รับการยืนยัน. การที่ Money Flow เป็นบวกในขณะที่ราคายังไม่ทำ Higher High บ่งบอกว่าอาจมีแรงซื้อเข้ามาบ้าง, แต่ยังไม่แข็งแกร่งพอที่จะเปลี่ยนแนวโน้ม.
-
EMA (Exponential Moving Average):
- EMA 50 (สีเหลือง) ยังคงอยู่ ใต้ EMA 200 (สีขาว).
- ราคาปัจจุบันกำลังพยายามทดสอบ EMA 50. การ Breakout เหนือ EMA 50 ได้อย่างแข็งแกร่งจะเป็นสัญญาณที่ดีขึ้น.
-
Trend Strength:
- เมฆยังคงเป็น สีแดง (Bearish), แต่เริ่ม บางลง.
- มีสัญญาณ Neutral.
- สรุป: แนวโน้มหลักยังคงเป็นขาลง, แต่เริ่มมีสัญญาณของการอ่อนแรงของแนวโน้มขาลง.
-
Chart Pattern:
- ยังไม่พบ Chart Pattern ที่บ่งบอกถึงการกลับตัวเป็นขาขึ้นที่ชัดเจน.
- อาจมีการก่อตัวของรูปแบบ Double Bottom (หากราคาไม่ทำ New Low และ Breakout เหนือ $68,000 ได้), แต่ยังเร็วเกินไปที่จะสรุป.
กลยุทธ์ Day Trade (Day Trade Strategy):
-
สถานการณ์: ตลาดมีความผันผวนสูง. การดีดตัวยังไม่แข็งแกร่ง. แนวโน้มหลักยังเป็นขาลง.
-
กลยุทธ์หลัก: Short Selling (ยังคงเป็นกลยุทธ์หลัก, แต่ต้องระมัดระวังมากขึ้น):
- รอ Rebound: รอให้ราคาดีดตัวขึ้นไปใกล้แนวต้านสำคัญ ($68,000 หรือ EMA 50).
- หาสัญญาณ Bearish: สังเกต Price Action ที่แนวต้าน. มองหาสัญญาณ Bearish เช่น Bearish Engulfing, Evening Star, หรือการที่ราคาไม่สามารถ Breakout EMA 50 ได้.
- เข้า Short: เมื่อมีสัญญาณ Bearish ที่ชัดเจน.
- Stop Loss: เหนือ Swing High ล่าสุดของการ Rebound อย่างเคร่งครัด.
- Take Profit: แนวรับถัดไป ($64,000, $62,000, หรือ $60,000).
-
กลยุทธ์รอง: Long (Buy) (มีความเสี่ยงสูงมาก):
- ไม่แนะนำให้เข้า Long จนกว่าจะมีสัญญาณการกลับตัวที่ชัดเจน
- หากราคา Breakout เหนือ $68,000 อย่างแข็งแกร่ง (พร้อม Volume สูง), อาจ พิจารณา Long ได้, แต่ต้อง Stop Loss ทันทีหากราคาหลุด $68,000 ลงมา.
- Stop Loss: ใต้ $68,000
- Take Profit: $69,000 - $70,000
-
SMC Setup (เน้น Short):
- ระบุ Resistance Zone (แนวต้าน) ที่ชัดเจน (เช่น $68,000).
- รอให้ราคา Pullback (ดีดตัว) ขึ้นไปทดสอบ Resistance Zone.
- สังเกต Price Action ที่ Resistance Zone. มองหาสัญญาณ Bearish Reversal (เช่น Bearish Engulfing, Evening Star).
- เมื่อมีสัญญาณ Bearish Reversal, เข้า Short.
- ตั้ง Stop Loss เหนือ Swing High ล่าสุด.
- ตั้ง Take Profit ที่แนวรับถัดไป.
สิ่งที่ต้องระวัง (Important Considerations):
- ความผันผวน (Volatility): ยังคงสูงมาก.
- False Breakouts: ระวังการ Breakout หลอก (ทั้งขึ้นและลง).
- Dead Cat Bounce: การดีดตัวอาจเป็นเพียง Dead Cat Bounce.
- ข่าว (News): ติดตามข่าวสาร.
- Risk Management: สำคัญที่สุด. ใช้ Stop Loss เสมอ.
สรุป (Conclusion):
BTC ใน TF 15m กำลังพยายามดีดตัว, แต่ยังไม่มีสัญญาณการกลับตัวที่แข็งแกร่ง. แนวโน้มหลักยังคงเป็นขาลง. Day Trader ควรเน้น Short Selling เป็นหลัก, แต่ต้องระมัดระวังอย่างมากและใช้ Stop Loss อย่างเคร่งครัด. การ Long (Buy) มีความเสี่ยงสูงมาก และควรทำเฉพาะเมื่อมีสัญญาณการกลับตัวที่ชัดเจนเท่านั้น.
Disclaimer: การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว, ไม่ถือเป็นคำแนะนำในการลงทุน. ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ.
-
-
@ 4857600b:30b502f4
2025-03-11 01:58:19Key Findings
- Researchers at the University of Cambridge discovered that aspirin can help slow the spread of certain cancers, including breast, bowel, and prostate cancers
- The study was published in the journal Nature
How Aspirin Works Against Cancer
- Aspirin blocks thromboxane A2 (TXA2), a chemical produced by blood platelets
- TXA2 normally weakens T cells, which are crucial for fighting cancer
- By inhibiting TXA2, aspirin "unleashes" T cells to more effectively target and destroy cancer cells
Supporting Evidence
- Previous studies showed regular aspirin use was linked to:
- 31% reduction in cancer-specific mortality in breast cancer patients
- 9% decrease in recurrence/metastasis risk
- 25% reduction in colon cancer risk
Potential Impact
- Aspirin could be particularly effective in early stages of cancer
- It may help prevent metastasis, which causes 90% of cancer fatalities
- As an inexpensive treatment, it could be more accessible globally than antibody-based therapies
Cautions
- Experts warn against self-medicating with aspirin
- Potential risks include internal bleeding and stomach ulcers
- Patients should consult doctors before starting aspirin therapy
Next Steps
- Large-scale clinical trials to determine which cancer types and patients would benefit most
- Development of new drugs that mimic aspirin's benefits without side effects
Citations: Natural News
-
@ 04c915da:3dfbecc9
2025-03-10 23:31:30Bitcoin has always been rooted in freedom and resistance to authority. I get that many of you are conflicted about the US Government stacking but by design we cannot stop anyone from using bitcoin. Many have asked me for my thoughts on the matter, so let’s rip it.
Concern
One of the most glaring issues with the strategic bitcoin reserve is its foundation, built on stolen bitcoin. For those of us who value private property this is an obvious betrayal of our core principles. Rather than proof of work, the bitcoin that seeds this reserve has been taken by force. The US Government should return the bitcoin stolen from Bitfinex and the Silk Road.
Usually stolen bitcoin for the reserve creates a perverse incentive. If governments see a bitcoin as a valuable asset, they will ramp up efforts to confiscate more bitcoin. The precedent is a major concern, and I stand strongly against it, but it should be also noted that governments were already seizing coin before the reserve so this is not really a change in policy.
Ideally all seized bitcoin should be burned, by law. This would align incentives properly and make it less likely for the government to actively increase coin seizures. Due to the truly scarce properties of bitcoin, all burned bitcoin helps existing holders through increased purchasing power regardless. This change would be unlikely but those of us in policy circles should push for it regardless. It would be best case scenario for American bitcoiners and would create a strong foundation for the next century of American leadership.
Optimism
The entire point of bitcoin is that we can spend or save it without permission. That said, it is a massive benefit to not have one of the strongest governments in human history actively trying to ruin our lives.
Since the beginning, bitcoiners have faced horrible regulatory trends. KYC, surveillance, and legal cases have made using bitcoin and building bitcoin businesses incredibly difficult. It is incredibly important to note that over the past year that trend has reversed for the first time in a decade. A strategic bitcoin reserve is a key driver of this shift. By holding bitcoin, the strongest government in the world has signaled that it is not just a fringe technology but rather truly valuable, legitimate, and worth stacking.
This alignment of incentives changes everything. The US Government stacking proves bitcoin’s worth. The resulting purchasing power appreciation helps all of us who are holding coin and as bitcoin succeeds our government receives direct benefit. A beautiful positive feedback loop.
Realism
We are trending in the right direction. A strategic bitcoin reserve is a sign that the state sees bitcoin as an asset worth embracing rather than destroying. That said, there is a lot of work left to be done. We cannot be lulled into complacency, the time to push forward is now, and we cannot take our foot off the gas. We have a seat at the table for the first time ever. Let's make it worth it.
We must protect the right to free usage of bitcoin and other digital technologies. Freedom in the digital age must be taken and defended, through both technical and political avenues. Multiple privacy focused developers are facing long jail sentences for building tools that protect our freedom. These cases are not just legal battles. They are attacks on the soul of bitcoin. We need to rally behind them, fight for their freedom, and ensure the ethos of bitcoin survives this new era of government interest. The strategic reserve is a step in the right direction, but it is up to us to hold the line and shape the future.
-
@ a296b972:e5a7a2e8
2025-03-10 23:07:09Warum gibt es Menschen, die, statt die Gelegenheit zu ergreifen, Frieden zu schaffen, den Krieg nicht beenden wollen? Wie verkommen müssen die Charaktere sein, die die Aussicht auf Macht und Geld über den Wert auch nur eines einzigen Menschen stellen?
Wie es aussieht, scheint Europa derzeit die Zentrale der Idioten zu sein. Der Gedanke, dass diese verirrten Seelen die Geschicke der europäischen Länder leiten und die Menschen sich ihren wirren Ergüssen unterzuordnen haben, kann einem schier den Verstand rauben.
Statt dass Europa Wasser beisteuert, den Brand zu löschen, macht es genau das Gegenteil, es sucht nach einer Flüssigkeit, die als bester Brandbeschleuniger bekannt ist.
Mit etwas anderen Vorzeichen erinnert das an die Vorzeit des 1. Weltkrieges, in der offiziell, keiner den Krieg wollte, und dann war er doch da. Es gibt ein interessantes Buch: „Zeitgeschichtliche Betrachtungen“ von Rudolf Steiner, Gesamtausgabe 173 a, in der man sehr viel über die Vorkriegszeit erfahren kann. Man kann Parallelen zu heute finden, wie die Zeit vor Ausbruch des Ukraine-Konflikts im Februar 2022, die Zeit seit dem Maidan in 2014 und die jahrelange NATO-Osterweiterung einfach ausgeblendet wird. Ähnliches ist auch für die Vorgeschichte des 2. Weltkriegs zu finden, der vor allem seinen Anfang in den Versailler Verträgen nach dem 1. Weltkrieg findet.
Die Ereignisse überschlagen sich zurzeit und man kommt kaum noch hinterher. Man fragt sich, ob Macron (Young Global Leader) neue Anweisungen vom WEF erhalten hat, um die „kreative Zerstörung“ voranzutreiben.
Wer flüstert Blackrock-Merz jeden Tag etwas anderes ins Ohr? Merz, der noch nicht einmal Kanzler ist, und schon am weiteren Abstieg Deutschlands arbeitet. Wirtschaftlich, generationsübergreifend und dem einstigen Ansehen Deutschlands in der Welt entgegen. Er hat noch nicht einmal den Schwur geleistet, Schaden vom deutschen Volk abzuwenden und bricht ihn schon vorauseilend.
Und nicht zum ersten Mal zieht Groß-Britannien maßgeblich an den Strippen, das den Verlust des Empires wohl bis heute immer noch nicht überwunden zu haben scheint.
Sie alle führen sich auf, wie ein Michelin-Männchen, vollgepumpt mit Nichts, nach außen massig auftretend, aber innen eben nur heiße Luft.
Was steckt hinter dieser Großkotzigkeit, wo doch auch die Großmäuler wissen müssten, dass keine Substanz dahintersteckt. Man soll keine medizinischen Vergleiche anstellen, aber man kommt auf nichts anderes, als dass es sich hier um ein psychologisches Problem handeln muss. Was hat diesen Größenwahn ausgelöst?
Bis auf viel zu wenige Ausnahmen, liest Europa George Orwells „1984“ als Bedienungsanleitung, statt als Warnung. Krieg ist Frieden. Lüge ist Wahrheit.
In der Höhle sitzt die vielköpfige Hydra. Der unsterbliche Kopf in der Mitte mit Betonfrisur, Kosename Röschen. Doch auch Betonfrisuren halten nicht ewig. Schon gar nicht in der Politik. Hoffentlich findet sich bald ein Weg, die Hydra auszuhungern. Das könnte klappen, wenn Deutschland vollkommen am Boden liegt. Fällt Deutschland, fällt auch die EU. Wunder können geschehen!
Es gibt Anzeichen dafür, dass die USA Europa in die Volljährigkeit entlassen wollen. Die wildgewordenen europäischen Streithähne sind ganz offensichtlich mit dieser Verantwortung und der Aussicht auf eine neue Freiheit hoffnungslos überfordert. Sie scheitern schon beim ersten Versuch, eine erwachsene, eigenständige, verantwortungsvolle Entscheidung zu treffen. Im Sinne und zum Wohle der europäischen Völker.
Stattdessen benehmen sie sich wie Pubertierende, die bockig und unreif, mit dem Fuß auf den Boden stampfen, „Ich will aber!“ schreien, und sich wundern, dass sie nicht mit am Tisch der Erwachsenen sitzen dürfen.
Wenn sie einen Friedensplan hätten, der sich an der Realität orientiert, dürften sie schon. Haben sie aber nicht. Stattdessen schmieden sie eine Gemeinschaft der Willigen, genauer gesagt, eine Gemeinschaft der Kriegswilligen. Alles über die Köpfe derjenigen hinweg, die keinen Krieg wollen, für alle Beteiligten, entgegen der Mehrheit der Europäer, die Frieden wollen. Das Bürokratie-Monster EU verschlingt seine eigenen Kinder.
Es wird versucht, mit dem Digital Services Act kritische Stimmen mundtot zu machen. Jeder, der nicht für die Idiotien der EU ist, ist gegen sie. Der einzige, der das Kind beim Namen genannt hat, war bislang J. D. Vance auf der Sicherheitskonferenz in München. Die Zustände in Rumänien geben eine Vorschau darauf, was den Rest in Europa noch erwarten könnte, wenn bei Wahlen nicht das herauskommt, was sich die autokratisch verkommene sogenannte Polit-Elite wünscht. Auf der Bundesrepublik Deutschland steht zwar noch Demokratie drauf, es ist aber kaum noch welche drin. Dieses Land ist auf dem besten Wege dahin, dass das zweite D in DDR genauso wenig wert wird, wie es dort war.
Gegenkräfte werden von denen, die sagen, sie bekämpfen die Delegitimierung des Staates delegitimiert. Projektion als Machterhalt auf allen Ebenen.
Wenn ein Staat sich zu sehr mit der Wirtschaft verbindet, ist das Faschismus. In der einst in aller Welt hochangesehenen Wirtschaftsmacht Deutschland nennt man das Public Private Partnership. Es bilden sich Strukturen einer neuen Regierungsform, die Elemente aus Faschismus, Autokratie, Kommunismus, Sozialismus und Technokratie enthält, für die es noch keinen Namen gibt. Demokratur käme dem momentan am nächsten.
Alle einst demokratischen Systeme in Europa, bis auf wenige Ausnahmen, sind mit einem Ungeist vergiftet worden, der spätestens mit dem C-Ereignis aus der Flasche entwichen ist.
Die USA waren nie, NIE, unsere Freunde! Ein Land hat keine Freunde, sondern nur Interessen. Die USA wollten nie, dass man mit ihnen an einem Strang zieht, sie wollten in erster Linie immer nur ihre eigenen Pläne durchziehen, und wenn man Glück hatte, kam der betreffende Staat darin vor. Weil sie die Möglichkeiten dazu hatten, wurde die Nachkriegsordnung nach deren Vorstellungen gestaltet. In Deutschland und Italien hatte man die Befürchtung, dass der Kommunismus Überhand nehmen könnte. Daher hat man Deutschland durch den Marshall-Plan angefüttert, um eine Konsumgesellschaft heranwachsen zu lassen, die bräsig und satt konsumiert und sich ansonsten wenig für den Erhalt der Demokratie einsetzen will. Perfektioniert durch die Wahl-Shows alle vier Jahre, die die Demokratie-Simulation lange aufrechterhalten hat.
Die Deutschen, Täter und Opfer zugleich, traumatisiert, haben fleißig, wie die Deutschen nun mal sind, das Land wieder aufgebaut, sich einen gewissen Wohlstand erarbeitet. Wie die kleinen Kinder, die glauben, wenn sie brav sind, dann wird der Vati, Uncle Sam, die Welt, sie doch ganz bald ganz sicher wieder liebhaben.
Es mag ja sein, dass es mit einer zweiten Amtszeit Trumps, direkt im Anschluss an die erste, keinen Ukraine-Krieg gegeben hätte. Beweisen können wir es nicht. Hinterher kann man viel erzählen. Die sicher guten Friedensbemühungen Trumps geschehen nicht in erster Linie aus Menschenliebe, sondern genauso, wie immer, in Fortführung der US-amerikanischen Geschichte, in allererster Linie aus einem staatlichen Interesse heraus. Das ist legitim, aber das muss man erkennen. Der Krieg in der Ukraine ist ein Stellvertreterkrieg zwischen den USA und Russland. Trump hat es selber zugegeben. Weil die USA erkannt haben, dass er nicht zu gewinnen ist, haben sie nach einer Lösung gesucht, wie sie sich gesichtswahrend wieder einmal aus der Affaire ziehen können, und da kommen die sehr engagierten Friedensverhandlungen gerade recht. Und Trumps Seltenerden-Deal ist nur die andere Seite der Medaille, auch wie immer: Erst alles kurz und klein hauen und am Militär verdienen, dann am Wiederaufbau ein zweites Mal verdienen (Siehe Naher Osten und die Ölvorkommen). Dabei spielt es fast keine Rolle, das Biden Trump die Suppe eingebrockt hat, die er jetzt auszulöffeln hat. Das kommt ihm eher zugute, weil er so als Friedensengel in die Geschichte eingehen wird. Vielleicht ist das sein Ziel, seinem Alter entsprechend, etwas Bleibendes hinterlassen zu wollen. Vermutlich sogar erfolgreicher, als der klägliche Versuch von „Mutti“, die mit ihrem materiell dicken, geistig sehr dünnen Buch, den Eingang in die Geschichte vorzugeben versuchte.
Alles gut und fein. Am Ende ist es das wichtigste, dass dieses sinnlose Opfern von Menschenleben aufhört. Dazu ist jedes Mittel recht. Wer wäre nicht dafür? Dank dafür gebührt dann Trump so oder so. Man darf jedoch nicht der Täuschung erliegen, dass das alles nur aus reiner Nächstenliebe geschehen würde. Wenn dem so wäre, hätte es in den USA nicht die Sprengung des WTCs inkl. Nebengebäuden und auch nicht den geschehen lassenden Angriff auf Pearl Harbor gegeben. Es gehört zur US-amerikanischen Mentalität alles sehr theatralisch aufzubauschen, mit viel Tam Tam, Pathos und Kulissen im Zuckerbäcker-Stile. Nicht umsonst ist die Filmindustrie in Hollywood so erfolgreich. Nicht umsonst müssen Filme von der Militärbehörde freigegeben werden. „Independence Day“ ist ein gutes Beispiel, wie wieder einmal ein tapferer Amerikaner in Selbstaufopferung die ganze Welt rettet. Was für eine Gehirnverkleisterung aus Pathos-Schmalz!
Russland kann der Westen, der sogenannte „Wertewesten“ nicht vorwerfen, dass es keine lupenreine Demokratie ist. Welcher Staat im Westen beweisen kann, dass dies für ihn zutrifft, der werfe den ersten Stein. Entgegen dem Haufen wildgewordener Handfeger im Westen kann man aber sagen, dass Putin bisher sehr besonnen vorgegangen ist, und dass es ein Glück für die Welt ist, dass er mit Lawrow einen sehr erfahrenen und diplomatisch brillanten Außenminister hat, der sich allenthalben nur mit der scheidenden feministischen Außen-Dings Deutschlands messen kann (Satire aus). Nach wie vor gehen von Russland nicht die aller geringsten Anzeichen aus, dass es vorhat, Europa in irgendeiner Weise angreifen zu wollen. Im Gegenteil, es wird immer wieder bekräftigt, dass es hierfür weder einen Anlass noch ein Interesse gibt. Und trotzdem tut man im Westen so, als ob der Russe kurz davorsteht, die Adria zu verminen, in der Normandie eine Invasion zu starten und gleichzeitig erneut vor den Toren Berlins zu stehen. Was für ein Schwachsinn. Polen tut sich derzeit besonders mit seiner Psychose hervor, in dem es Mann und Reiter aufstockt, weil es in seinem Geiste schon russische Marschlieder in der Ferne zu hören glaubt. Man denkt wohl, es sei besser, schon einmal die Feuerwehr loszuschicken, obwohl noch gar kein Brand gemeldet ist.
Die derzeitigen Universal-Dilettanten in den Parlamenten erkennen schon wieder nicht (absichtlich oder nicht?), dass es die eigentliche Aufgabe Europas wäre, zwischen den USA im Westen und Russland im Osten, als Brückenbauer aufzutreten. Hier kommt Deutschland eine besondere Rolle zu. Gemeinsam mit Österreich und der Schweiz, als gemeinsamer deutscher Kulturraum, müsste es die Gelegenheit ergreifen, sich der Neutralität anzuschließen, denn das ist der eigentliche Sinn des Ausspruchs: Am deutschen Wesen soll die Welt genesen. Das ist geistig gemeint, nicht in Form von Kriegstüchtigkeit und Aufrüstung! Das ist die eigentliche Aufgabe der Denker und Dichter. Friedensstiftend und friedenssichernd, umsichtig und besonnen aufzutreten, statt wie Frankreich, als Yorkshire-Terrier einen Bären anzukläffen, oder mit einer deutschen Hexe, die auf Taurus-Raketen reitet, dem Panzer-Toni, oder dem Herrn Kriegsgewitter, die Ukraine weiter in ihrem Untergang unterstützen zu wollen, als ob sie allesamt im Blutrausch wären.
Die Karten werden derzeit neu gemischt. Kräfteverhältnisse verändern sich. Es knarrt und knarzt an allen Enden. Statt, wie man es von einer sogenannten zivilisierten Welt erwarten könnte, dies mit den Mitteln der Diplomatie zu lösen, werden die Keulen der Neandertaler ausgegraben und man begibt sich wieder einmal zurück in die Steinzeit. In der Menschheitsentwicklung sind wir noch nicht sehr weit gekommen. Bewusstseinsentwicklung Fehlanzeige. Die archaischen Urkräfte entfalten immer noch ihre Wirkung. Spruch meines weisen Großvaters: Dumm geboren und nichts dazugelernt. Recht hat er.
Auch wir Menschen sollten uns verändern. Wir sollten bessere Demokraten werden, in dem wir mehr Verantwortung für unsere Freiheit übernehmen, statt die anderen machen zu lassen. Was wir davon haben, haben wir ja in der C-Zeit gesehen. Ein Anfang wäre schon, wenn wir auf die Propaganda in den Alt-Medien verzichten würden. Viele wollen von der C-Zeit, die uns allen noch in den Knochen sitzt, nichts mehr wissen. Sie wollen ihr altes Leben zurückhaben und ihrem Tagwerk nachgehen. Nicht nur die Gen-Behandelten, sondern inzwischen auch viele Impf-Verzichter.
Schlechte Nachrichten: Die alten Zeiten kommen nicht zurück, es gibt keinen Anknüpfungspunkt. Und das ist gut so!
Verdrängen und Behäbigkeit sind die beste Voraussetzung dafür, dass unsere Freiheit scheibchenweise, dünn, wie man eine Cacchiatore aufschneidet, immer mehr unter die Räder kommt. Die Think-Tanks, die sich schon lange mit dem Verhalten der Menschen auseinandersetzen, rechnen mit der anerzogenen Bequemlichkeit im Denken und Handeln.
Das sollte man sich klarmachen. Jeder demokratisch orientierte Mensch sollte etwas Zeit erübrigen, und wenn der Tag noch so stressig war, sich mit den Themen zu beschäftigen, die derzeit unser aller Leben in Bahnen lenken könnten, die wir alle nicht wollen. Die tagesschau ist hierfür ungeeignet. Wenn die Falle erst einmal zugeschnappt ist, ist ein Herauskommen um so schwerer. Unsere Vorfahren haben nicht umsonst die Freiheit mit ihrem Blut erkämpft. Denen sind wir etwas schuldig. Daran sollten wir uns wieder mehr erinnern. Wehret den Anfängen, die jetzt schon ein gutes Stück vorangekommen sind!
-
@ c1e9ab3a:9cb56b43
2025-03-10 21:56:07Introduction
Throughout human history, the pyramids of Egypt have fascinated scholars, archaeologists, and engineers alike. Traditionally thought of as tombs for pharaohs or religious monuments, alternative theories have speculated that the pyramids may have served advanced technological functions. One such hypothesis suggests that the pyramids acted as large-scale nitrogen fertilizer generators, designed to transform arid desert landscapes into fertile land.
This paper explores the feasibility of such a system by examining how a pyramid could integrate thermal convection, electrolysis, and a self-regulating breeder reactor to sustain nitrogen fixation processes. We will calculate the total power requirements and estimate the longevity of a breeder reactor housed within the structure.
The Pyramid’s Function as a Nitrogen Fertilizer Generator
The hypothesized system involves several key processes:
- Heat and Convection: A fissile material core located in the King's Chamber would generate heat, creating convection currents throughout the pyramid.
- Electrolysis and Hydrogen Production: Water sourced from subterranean channels would undergo electrolysis, splitting into hydrogen and oxygen due to electrical and thermal energy.
- Nitrogen Fixation: The generated hydrogen would react with atmospheric nitrogen (N₂) to produce ammonia (NH₃), a vital component of nitrogen-based fertilizers.
Power Requirements for Continuous Operation
To maintain the pyramid’s core at approximately 450°C, sufficient to drive nitrogen fixation, we estimate a steady-state power requirement of 23.9 gigawatts (GW).
Total Energy Required Over 10,000 Years
Given continuous operation over 10,000 years, the total energy demand can be calculated as:
[ \text{Total time} = 10,000 \times 365.25 \times 24 \times 3600 \text{ seconds} ]
[ \text{Total time} = 3.16 \times 10^{11} \text{ seconds} ]
[ \text{Total energy} = 23.9 \text{ GW} \times 3.16 \times 10^{11} \text{ s} ]
[ \approx 7.55 \times 10^{21} \text{ J} ]
Using a Self-Regulating Breeder Reactor
A breeder reactor could sustain this power requirement by generating more fissile material than it consumes. This reduces the need for frequent refueling.
Pebble Bed Reactor Design
- Self-Regulation: The reactor would use passive cooling and fuel expansion to self-regulate temperature.
- Breeding Process: The reactor would convert thorium-232 into uranium-233, creating a sustainable fuel cycle.
Fissile Material Requirements
Each kilogram of fissile material releases approximately 80 terajoules (TJ) (or 8 × 10^{13} J/kg). Given a 35% efficiency rate, the usable energy per kilogram is:
[ \text{Usable energy per kg} = 8 \times 10^{13} \times 0.35 = 2.8 \times 10^{13} \text{ J/kg} ]
[ \text{Fissile material required} = \frac{7.55 \times 10^{21}}{2.8 \times 10^{13}} ]
[ \approx 2.7 \times 10^{8} \text{ kg} = 270,000 \text{ tons} ]
Impact of a Breeding Ratio
If the reactor operates at a breeding ratio of 1.3, the total fissile material requirement would be reduced to:
[ \frac{270,000}{1.3} \approx 208,000 \text{ tons} ]
Reactor Size and Fuel Replenishment
Assuming a pebble bed reactor housed in the King’s Chamber (~318 cubic meters), the fuel cycle could be sustained with minimal refueling. With a breeding ratio of 1.3, the reactor could theoretically operate for 10,000 years with occasional replenishment of lost material due to inefficiencies.
Managing Scaling in the Steam Generation System
To ensure long-term efficiency, the water supply must be conditioned to prevent mineral scaling. Several strategies could be implemented:
1. Natural Water Softening Using Limestone
- Passing river water through limestone beds could help precipitate out calcium bicarbonate, reducing hardness before entering the steam system.
2. Chemical Additives for Scaling Prevention
- Chelating Agents: Compounds such as citric acid or tannins could be introduced to bind calcium and magnesium ions.
- Phosphate Compounds: These interfere with crystal formation, preventing scale adhesion.
3. Superheating and Pre-Evaporation
- Pre-Evaporation: Water exposed to extreme heat before entering the system would allow minerals to precipitate out before reaching the reactor.
- Superheated Steam: Ensuring only pure vapor enters the steam cycle would prevent mineral buildup.
- Electrolysis of Superheated Steam: Using multi-million volt electrostatic fields to ionize and separate minerals before they enter the steam system.
4. Electrostatic Control for Scaling Mitigation
- The pyramid’s hypothesized high-voltage environment could ionize water molecules, helping to prevent mineral deposits.
Conclusion
If the Great Pyramid were designed as a self-regulating nitrogen fertilizer generator, it would require a continuous 23.9 GW energy supply, which could be met by a breeder reactor housed within its core. With a breeding ratio of 1.3, an initial load of 208,000 tons of fissile material would sustain operations for 10,000 years with minimal refueling.
Additionally, advanced water treatment techniques, including limestone filtration, chemical additives, and electrostatic control, could ensure long-term efficiency by mitigating scaling issues.
While this remains a speculative hypothesis, it presents a fascinating intersection of energy production, water treatment, and environmental engineering as a means to terraform the ancient world.
-
@ 878dff7c:037d18bc
2025-03-10 21:49:27Wall Street Decline Signals Potential Recession Risks
### Summary:
Wall Street experienced significant losses, with the Nasdaq recording its largest fall since 2022, heightening concerns about a potential recession. This downturn is expected to impact global markets, including Australia's ASX, which is poised to open lower. Economists attribute the market volatility to escalating trade tensions and uncertainty surrounding US economic policies.
Sources: ABC News - March 11, 2025, Financial Review - March 11, 2025
China's DeepSeek R1 AI Model Signals New Space Race
Summary:
China's launch of the DeepSeek R1 AI model underscores a new phase in the space race, highlighting advancements in artificial intelligence and space exploration. This development reflects China's strategic investments in AI and space technologies, including satellite systems and Mars missions. The West is urged to respond with increased investments and strategic partnerships to maintain technological leadership and national security.
Sources: New York Post - 11th March 2025
Australia's Urgent Need to Scale Up in Technology
Summary:
Daniel Petre, a leading Australian tech innovator, emphasizes the critical need for Australia to scale up in technology to avoid being left behind. He highlights that advancements in AI, climate tech, and biotech will drive the next decade of innovation. Petre stresses the importance of investing in research and development, fostering a conducive environment for innovation, and ensuring inclusive growth to maintain a high GDP and stable society.
Sources: The Australian - 11th March 2025
Political Controversy Over Fabricated Terror Plot
Summary:
A controversy erupted over a suspected terror plot involving an explosive-laden caravan found in Dural, NSW, initially described as a potential "mass casualty event" by NSW Premier Chris Minns. Authorities later revealed the plot was fabricated by criminals to create fear and benefit personally. The Prime Minister, Anthony Albanese, and senior government officials were reportedly not informed for ten days, leading to criticism from opposition leader Peter Dutton. Home Affairs Minister Tony Burke claimed Dutton had been misled by organized crime figures. Investigations revealed no real threat, but the discovery had a negative impact on the Jewish community, highlighting issues of anti-Semitism. Despite arrests, those directly involved in the fabricated plot remain at large.
Sources: News.com.au - March 11, 2025, The Guardian - March 11, 2025
Senator Lambie Calls for Expulsion of US Military Personnel
Summary:
Tasmanian Senator Jacqui Lambie appeared on Channel 9's Today show, making a bold demand for Australia to threaten shutting down the Pine Gap military base and expel US spies and marines. This was in response to the US planning to impose hefty tariffs on Australian exports and due to perceived disloyalty exemplified by the US president’s handling of Ukraine. Lambie emphasized that Pine Gap, a key asset for US intelligence and missile defense, is critical for America’s security and its potential closure could serve as a powerful negotiating tool. She also expressed concerns about President Trump's commitment to US-Australia security alliances and urged Australian independence in defense strategies. Pine Gap, established in the 1960s, plays a significant role in global surveillance and military operations, and its potential closure could impact the US’s intelligence capabilities significantly. The situation underlines growing tensions and the importance of reassessing national security and international relations.
Sources: News.com.au - March 11, 2025
Emergency Services Respond to Hundreds of Incidents
Summary:
Emergency services have been actively responding to numerous incidents related to the severe weather. Over the weekend, approximately 500 events were reported, including fallen trees and flooding. The community's preparedness has aided response efforts, but authorities continue to urge residents to remain vigilant, adhere to warnings, and avoid driving through floodwaters.
Sources: Courier Mail - March 10, 2025
Superannuation Access for Home Purchases Divides Major Parties
Summary:
The policy on using superannuation for home purchases is a significant point of contention between Australia's major political parties. The Australian Labor Party (ALP) is firmly against early super access for home buying, whereas the Coalition supports allowing super savers to withdraw up to $50,000 for this purpose. While surveys indicate a slight majority in favor, critics argue the policy might increase house prices and debt levels, citing New Zealand's similar program, which hasn't significantly improved affordability and may have unintended negative effects. Home affordability remains a critical issue, with current figures showing the highest difficulty in purchasing a first home since 1996.
Sources: The Australian - March 11, 2025
Russia Warns Australia Against Deploying Peacekeeping Troops to Ukraine
Summary:
Russia has issued stern warnings to Australia regarding potential deployment of peacekeeping troops to Ukraine. The Russian embassy in Canberra labeled such plans as "unacceptable," cautioning that it could lead to "grave consequences" and urging Australia to "avoid trouble." Despite these warnings, Australian Foreign Minister Penny Wong emphasized Australia's commitment to supporting Ukraine and stated that any request for a peacekeeping mission would be considered. Prime Minister Anthony Albanese expressed openness to joining a peacekeeping coalition, contingent upon a formal request. Opinions within Australia vary, with some opposition figures opposing troop deployment, while the government continues to support Ukraine through various means, including military assistance and potential peacekeeping missions under the UN.
Sources: News.com.au - 11 March 2025, The Guardian - 11 March 2025
Malcolm Turnbull Criticizes Trump's Tariff Threats Amid Rising Tensions
Summary:
Former Australian Prime Minister Malcolm Turnbull has criticized US President Donald Trump, accusing him of extortion and bullying, which may affect Australia's chances of securing a tariff exemption. Turnbull argued that conceding to Trump's behavior would lead to more bullying and that Trump's actions are aiding adversaries like China by alienating US allies. Trump responded by labeling Turnbull a weak and ineffective leader. Despite the tension, Australia's Deputy Prime Minister Richard Marles continues to advocate for a tariff exemption, emphasizing the mutual benefits of free trade with the US.
Sources: The Guardian - 11 March 2025, News.com.au - 11 March 2025
COVID-19 Continues to Impact Australia's Mortality Rates
Summary:
Nearly five years after the World Health Organization declared COVID-19 a pandemic, new research by the Burnet Institute reveals that the virus continues to affect Australia's mortality rates. The study estimates an excess mortality of 31,000 deaths between January 2020 and November 2024, attributed to undiagnosed cases and long-term health effects. Currently, approximately 20 more Australians die each day from COVID-19 compared to pre-pandemic times. The report emphasizes the need for more research into long COVID and improved global disease prevention infrastructure. Australia's initiative to establish a permanent Centre for Disease Control underscores the importance of preventive health measures. The ongoing effects of COVID-19 highlight the necessity for enhanced response and preparedness for future pandemics.
Sources: The Australian - March 11, 2025
Financial Support Announced for Workers Affected by Cyclone Alfred
Summary:
The Australian government has introduced financial assistance for workers impacted by ex-Tropical Cyclone Alfred. Eligible individuals who lost income due to the cyclone can access up to 13 weeks of support, aligning with the JobSeeker unemployment benefits scheme at A$778 per fortnight. Additionally, a one-time A$1,000 disaster payment has been declared to aid recovery efforts.
Sources: Reuters - 11 March 2025
-
@ 6316050a:a5e43cbe
2025-03-10 21:47:13Asi como en Abril 2024 comenzamos a escribir sobre bitcoin porque se acercaba un momento histórico, hoy dan ganas de inscribir este, porque parece otro momento histórico y con importante incidencia en el valor de BTC y en su propuesta de valor futuro. En abril, si se acuerdan, se producía un nuevo halving de Bitcoin, lo que implicó que la emisión diaria de las monedas pasaba de 900 BTC por día a 450. Esto implicaba que la generación ("minado") anual de BTC, pasaría a ser menor que la del oro desde ese momento. El oro minado en la actualidad produce un aumento anual de su stock de entre 1.5% y 3% y bitcoin tiene en la actualidad un aumento anual de su cantidad del 0.84%. Si lo pensamos como una moneda, ese 20 de Abril se convirtió en la moneda más fuerte del planeta, en lo que respecta a tasa de emisión anual.
¿Y qué pasó ahora?
Entre ayer y hoy Trump emitió un decreto para generar una Reserva Soberana de Bitcoin en el tesoro de USA. En principio esto no es un disparador importante para su precio en el corto plazo (de hecho hoy bajó) porque está reserva está conformada en principio por los bitcoins que Estados Unidos ya tiene en su poder, obtenidos de incautaciones en causas judiciales. Sólo dice que no venderá esos bitcoin, que es una cantidad significativa (200000 BTC o 17.6 billions USD) pero no particularmente grande. Lo que sí me parece importante es que el estado más poderoso del mundo, establece a bitcoin como una forma de oro digital, lo suma a sus reservas y lo valida mundialmente.
¿Qué implicancias podría tener esto?
A mediano plazo, que van hacer los bancos centrales de los demás paises? Hasta ahora, me consta que los fondos soberanos de Suiza y Noruega, compraron bitcoin para su cartera de tenencias. El Salvador compra bitcoin de manera ad-hoc y ahora tiene una controversia con el FMI, que no quiere que lo haga. Y el reino de Butham mina bitcoin con excedentes de energía hidroeléctrica y lo incorpora también a sus reservas. Pero ahora que lo hace USA, ¿Qué pasará con la adopción de los demás paises? ¿Que harán Japón, Europa y los BRICS, con los bitcoins incautados? Esto puede implicar el comienzo de la adopción de bitcoin por parte de los estados Nación. Puede marcar el comienzo de la disputa real entre bitcoin y oro como reservas de valor.
-
@ 7d33ba57:1b82db35
2025-03-10 19:32:10Gran Canaria’s Best Urban Beach
Playa de Las Canteras is the crown jewel of Las Palmas de Gran Canaria, stretching over 3 kilometers along the city’s coastline. Known for its golden sand, crystal-clear waters, and lively promenade, it’s often considered one of the best urban beaches in Europe. Whether you want to swim, surf, snorkel, or simply relax, Las Canteras has something for everyone.
🌊 Beach Zones & Activities
1️⃣ Northern End – Calm Waters & Snorkeling
The northern section of the beach is protected by "La Barra", a natural volcanic reef that breaks the waves, creating a calm, lagoon-like area. This makes it ideal for swimming, snorkeling, and paddleboarding.
✅ Best for: Families, snorkelers, and sunbathers
✅ Marine Life: Tropical fish, crabs, and small rays
✅ Rentals Available: Snorkeling gear, kayaks, and paddleboards2️⃣ Central Area – Best for Relaxing & Walking
The middle stretch of Las Canteras is perfect for lounging on the sand or taking a leisurely walk along the Paseo de Las Canteras, the beachfront promenade lined with restaurants, bars, and shops.
✅ Best for: Beachgoers looking to relax
✅ Beach services: Sun loungers and umbrellas available
✅ Food & Drink: Plenty of beachside cafés and seafood restaurants
3️⃣ Southern End (La Cícer) – Surfing & Local Vibes
At the southernmost part of Las Canteras is La Cícer, the island’s main surfing spot. Here, you’ll find consistent waves and a more laid-back, local atmosphere.
✅ Best for: Surfers and adventure seekers
✅ Surf Schools: Perfect for beginners
✅ Younger crowd & street art vibe🌅 Sunset at Playa de Las Canteras
Las Canteras is famous for its breathtaking sunsets, especially near La Puntilla, where the golden hues reflect over the Atlantic. The promenade comes alive in the evening with street musicians, performers, and lively terraces.
🏝 Why Playa de Las Canteras is a Must-Visit
Playa de Las Canteras is more than just a beach—it’s a way of life in Las Palmas. Whether you’re swimming in turquoise waters, sipping coffee on the promenade, surfing at La Cícer, or watching the sunset, this beach perfectly blends relaxation and local culture.
-
@ 401014b3:59d5476b
2025-03-10 19:29:13Alright, football fanatics, it’s March 2025, and we’re charging into the AFC South like it’s a BBQ cookoff with a side of bourbon. Free agency’s a hot mess, the draft’s a coin flip, and this division’s always a blender of breakout stars and breakdowns. The Texans owned 2024, the Colts stayed feisty, the Titans showed grit, and the Jags… well, they Jagged. Let’s toss some records on this rodeo and see who’s got the grit to claim the South. Here we go, fam—fire up the grill.
Houston Texans: 11-6 – Stroud’s Still the Stud
The Texans ran the AFC South in 2024, and hopefully 2025 will be C.J. Stroud’s coronation. The kid’s slinging it to Nico Collins and Tank Dell like it’s nothing, while Joe Mixon keeps the run game thumping. That defense—Will Anderson Jr., Derek Stingley Jr.—is a buzzsaw when it’s on, but free agency’s a wild card. Dameron Pierce might chase a bag, and the O-line needs depth. Still, 11-6’s the call, division champs. Houston’s got that swagger—good luck knocking ‘em off.
Indianapolis Colts: 9-8 – Richardson’s Redemption Arc
The Colts hung tough in 2024, and 2025’s Anthony Richardson’s big shot. He’s got Jonathan Taylor bulldozing defenses, Michael Pittman Jr. hauling in bombs, and Josh Downs stretching the field. The defense—Kwity Paye, DeForest Buckner—brings heat, but free agency could bite. Julian Blackmon might bolt, and the secondary’s shaky. 9-8’s the vibe, maybe a wildcard if Richardson cuts the turnovers. Indy’s scrappy—they’re nipping at Houston’s heels.
Tennessee Titans: 7-10 – Levis’ Learning Curve
The Titans showed some spine in 2024, and 2025’s Will Levis’ proving ground. He’s throwing to Calvin Ridley and Tyler Boyd, with Tony Pollard keeping the run game honest. The defense—Jeffery Simmons is nasty when he clicks, but Harold Landry looks headed to the Patriots. L’Jarius Sneed should stay, but depth’s thin. 7-10’s where they land—not great, not awful. Tennessee’s building, but it’s not playoff time yet.
Jacksonville Jaguars: 5-12 – Trevor’s Tough Luck
The Jags were a mess in 2024, and 2025’s not much sunnier. Trevor Lawrence has Brian Thomas Jr. downfield, but they need to replace Evan Engram. The run game’s blah without Travis Etienne firing on all cylinders. The defense—Josh Hines-Allen, Travon Walker—has juice, but the O-line’s a sieve, and free agency might swipe Foye Oluokun. 5-12’s the harsh truth—too much chaos, not enough wins. Liam Cohen’s dreaming of better days.
The Final Hoedown
The AFC South in 2025 is a Houston hootenanny with a Colt kicker. The Texans (11-6) take the crown because Stroud’s a baller, the Colts (9-8) tease a wildcard, the Titans (7-10) scrap it out, and the Jags (5-12) flounder. Free agency’s the twist—lose a star, you’re toast; keep ‘em, you’re smoking. Hit me on Nostr when I muff this, but this is my AFC South gospel. Let’s roll, degenerates.
-
@ 7d33ba57:1b82db35
2025-03-10 19:15:01A Guide to Gran Canaria’s Wild Side
Tamadaba Natural Park, one of Gran Canaria’s most pristine and untouched natural areas, offers breathtaking hiking trails through ancient Canarian pine forests, dramatic cliffs, deep ravines, and stunning coastal views. Located in the northwest of the island.
🥾 Best Hiking Trails in Tamadaba Natural Park
1️⃣ Agaete to Tamadaba Summit Trail
- Distance: ~12 km round trip
- Duration: ~5-6 hours
- Difficulty: Moderate to challenging
- Elevation Gain: ~1,200m
- Start: Agaete or San Pedro
- Highlights:
✅ Ascend from the lush Valle de Agaete into dense pine forests
✅ Spectacular views over the Agaete Valley and the Atlantic Ocean
✅ Lookout points such as Mirador Llanos de la Mimbre
✅ One of the best hikes for a full mountain-to-sea experience
2️⃣ Tamadaba Forest & Risco Faneque Trail (Best for Views)
- Distance: ~8 km round trip
- Duration: ~4 hours
- Difficulty: Moderate
- Elevation Gain: ~500m
- Start: Llanos de la Mimbre parking area
- Highlights:
✅ One of the highest coastal cliffs in Europe (1,027m high!)
✅ Stunning panoramic views of the Atlantic, Agaete, and Tenerife
✅ Well-marked trail through the Canarian pine forest
✅ A shorter but rewarding option for amazing landscapes
3️⃣ Guayedra Loop – Mountains to the Beach (Best for Variety)
- Distance: ~12 km loop
- Duration: ~4-5 hours
- Difficulty: Moderate to challenging
- Elevation Gain: ~800m
- Start: San Pedro or Agaete
- Highlights:
✅ Mix of forest, ravines, and coastal trails
✅ Stunning views from Tamadaba’s cliffs
✅ Descend to Guayedra Beach, a remote black-sand beach
✅ Coastal return trail with breathtaking ocean views
4️⃣ Circular Route: Tamadaba Pine Forest & Viewpoints (Best for Nature Lovers)
- Distance: ~10 km loop
- Duration: ~4-5 hours
- Difficulty: Moderate
- Elevation Gain: ~600m
- Start: Llanos de la Mimbre parking area
- Highlights:
✅ Deep forest immersion—perfect for a peaceful hike
✅ Explore ancient Canarian pines and native plants
✅ Multiple miradors (viewpoints) overlooking the coastline
✅ Good for hikers looking for a quiet, nature-focused trail
🌤 Essential Hiking Tips for Tamadaba
✅ Bring Plenty of Water & Snacks – No shops or water sources on the trails.
✅ Wear Sturdy Shoes – Some sections are rocky and uneven.
✅ Check the Weather – The mountains can be cool, windy, or misty, even if it’s hot at the coast.
✅ Navigation – Trails are generally marked, but offline maps (e.g., Maps.me or AllTrails) are useful.
✅ Respect Nature – Tamadaba is a protected area, so leave no trace.
🚗 Getting to Tamadaba Natural Park
- By Car:
- From Las Palmas: ~1.5-hour drive via GC-2 and GC-200.
- From Agaete: ~30-minute drive to Llanos de la Mimbre trailhead.
- By Bus:
- Take Global Bus 103 from Las Palmas to Agaete.
- Then taxi or hike up to the trailhead.
Why Hike in Tamadaba?
🌿 One of the most unspoiled areas in Gran Canaria
🏔 Diverse landscapes: mountains, forests, and coastal cliffs
👣 Well-marked trails for all hiking levels
🌊 Breathtaking views over the Atlantic and neighboring islands -
@ 126a29e8:d1341981
2025-03-10 19:13:30Si quieres saber más sobre Nostr antes de continuar, te recomendamos este enlace donde encontrarás información más detallada: https://njump.me/
Nstart
Prácticamente cualquier cliente o aplicación Nostr permite crear una identidad o cuenta. Pero para este tutorial vamos a usar Nstart ya que ofrece información que ayuda a entender qué es Nostr y en qué se diferencia respecto a redes sociales convencionales.
Además añade algunos pasos importantes para mantener nuestras claves seguras.Recomendamos leer el texto que se muestra en cada pantalla de la guía.
Pronto estará disponible en español pero mientras tanto puedes tirar de traductor si el inglés no es tu fuerte.1. Welcome to Nostr
Para empezar nos dirigimos a start.njump.me desde cualquier navegador en escritorio o móvil y veremos esta pantalla de bienvenida. Haz clic en Let’s Start → https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/653d521476fa34785cf19fe098b131b7b2a0b1bdaf1fd28e65d7cf31a757b3d8.webp
2. Nombre o Alias
Elige un nombre o alias (que podrás cambiar en cualquier momento).
El resto de campos son opcionales y también puedes rellenarlos/editarlos en cualquier otro momento.
Haz clic en Continue →3. Your keys are ready
https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/e7ee67962749b37d94b139f928afad02c2436e8ee8ea886c4f7f9f0bfa28c8d9.webp ¡Ya tienes tu par de claves! 🙌
a. La npub es la clave pública que puedes compartir con quien quieras.
b. Clic en Save my nsec para descargar tu clave privada. Guárdala en un sitio seguro, por ejemplo un gestor de contraseñas.
c. Selecciona la casilla “I saved the file …” y haz clic en Continue →4. Email backup
Opcionalmente puedes enviarte una copia cifrada de tu clave privada por email. Rellena la casilla con tu mail y añade una contraseña fuerte.
Apunta la contraseña o añádela a tu gestor de contraseñas para no perderla.
En caso de no recibir el mail revisa tu bandeja de correo no deseado o Spam5. Multi Signer Bunker
Ahora tienes la posibilidad de dividir tu nsec en 3 usando una técnica llamada FROST. Clic en Activate the bunker → Esto te dará un código búnker que puedes usar para iniciar sesión en muchas aplicaciones web, móviles y de escritorio sin exponer tu nsec.
De hecho, algunos clientes solo permiten iniciar sesión mediante código búnker por lo que te recomendamos realizar este paso.
Igualmente puedes generar un código búnker para cada cliente con una app llamada Amber, de la que te hablamos más delante.
Si alguna vez pierdes tu código búnker siempre puedes usar tu nsec para crear uno nuevo e invalidar el antiguo.
Clic en Save my bunker (guárdalo en un lugar seguro) y después en Continue →6. Follow someone
Opcionalmente puedes seguir a los usuarios propuestos. Clic en Finish →
¡Todo listo para explorar Nostr! 🙌
Inicia sesión en algún cliente
Vamos a iniciar sesión con nuestra recien creada identidad en un par de clientes (nombre que reciben las “aplicaciones” en Nostr).
Hemos escogido estos 2 como ejemplo y porque nos gustan mucho pero dale un vistazo a NostrApps para ver una selección más amplia:
Escritorio
Para escritorio hemos escogido Chachi, el cliente para chats grupales y comunidades de nuestro compañero nostr:npub107jk7htfv243u0x5ynn43scq9wrxtaasmrwwa8lfu2ydwag6cx2quqncxg → https://chachi.chat/ https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/79f589150376f4bb4a142cecf369657ccba29150cee76b336d9358a2f4607b5b.webp Haz clic en Get started https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/2a6654386ae4e1773a7b3aa5b0e8f6fe8eeaa728f048bf975fe1e6ca38ce2881.webp Si usas extensión de navegador como Alby, nos2x o nos2x-Fox clica en Browser extension De lo contrario, localiza el archivo Nostr bunker que guardaste en el paso 5 de la guía Nstart y pégalo en el campo Remote signer
¡Listo! Ahora clica en Search groups para buscar grupos y comunidades a las que te quieras unir. Por ejemplo, tu comunidad amiga: Málaga 2140 ⚡ https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/eae881ac1b88232aa0b078e66d5dea75b0c142db7c4dd7decdbfbccb0637b7fe.webp
Comunidades recomendadas
Te recomendamos unirte a estas comunidades en Chachi para aprender y probar todas las funcionalidades que se vayan implementando:
Si conoces otras comunidades a tener en cuenta, dínoslo en un comentario 🙏
Móvil
Como cliente móvil hemos escogido Amethyst por ser de los más top en cuanto a diseño, tipos de eventos que muestra y mantenimiento. → https://www.amethyst.social/ ← Solo está disponible para Android por lo que si usas iOS te recomendamos Primal o Damus.
Además instalaremos Amber, que nos permitirá mantener nuestra clave privada protegida en una única aplicación diseñada específicamente para ello. → https://github.com/greenart7c3/Amber ←
Las claves privadas deben estar expuestas al menor número de sistemas posible, ya que cada sistema aumenta la superficie de ataque
Es decir que podremos “iniciar sesión” en todas las aplicaciones que queramos sin necesidad de introducir en cada una de ellas nuestra clave privada ya que Amber mostrará un aviso para autorizar cada vez.
Amber
- La primera vez que lo abras te da la posibilidad de usar una clave privada que ya tengas o crear una nueva identidad Nostr. Como ya hemos creado nuestra identidad con Nstart, copiaremos la nsec que guardamos en el paso 3.b y la pegaremos en Amber tras hacer clic en Use your private key. https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/e489939b853d6e3853f10692290b8ab66ca49f5dc1928846e16ddecc3f46250e.webp
- A continuación te permite elegir entre aprobar eventos automáticamente (minimizando el número de interrupciones mientras interactúas en Nostr) o revisar todo y aprobar manualmente, dándote mayor control sobre cada app. https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/c55cbcbb1e6f9d706f2ce6dbf4cf593df17a5e0004dca915bb4427dfc6bdbf92.webp
- Tras clicar en Finish saltará un pop-up que te preguntará si permites que Amber te envíe notificaciones. Dale a permitir para que te notifique cada vez que necesite permiso para firmar con tu clave privada algún evento. https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/3744fb66f89833636743db0edb4cfe3316bf2d91c465af745289221ae65fc795.webp Eso es todo. A partir de ahora Amber se ejecutará en segundo plano y solicitará permisos cuando uses cualquier cliente Nostr.
Amethyst
- Abre Amethyst, selecciona la casilla “I accept the terms of use” y clica en Login with Amber https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/90fc2684a6cd1e85381aa1f4c4c2c0d7fef0b296ddb35a5c830992d6305dc465.webp
- Amber solicitará permiso para que Amethyst lea tu clave pública y firme eventos en tu nombre. Escoge si prefieres darle permiso para acciones básicas; si quieres aprobar manualmente cada permiso o si permites que firme automáticamente todas las peticiones. https://cdn.nostrcheck.me/126a29e8181c1663ae611ce285758b08b475cf81b3634dd237b8234cd1341981/a5539da297e8595fd5c3cb3d3d37a7dede6a16e00adf921a5f93644961a86a92.webp ¡Ya está! 🎉 Después de clicar en Grant Permissions verás tu timeline algo vacío. A continuación te recomendamos algunos usuarios activos en Nostr por si quieres seguirles.
A quién seguir
Pega estas claves públicas en la barra Search o busca usuarios por su alias.
nostr:npub1zf4zn6qcrstx8tnprn3g2avtpz68tnupkd35m53hhq35e5f5rxqskppwpd
nostr:npub107jk7htfv243u0x5ynn43scq9wrxtaasmrwwa8lfu2ydwag6cx2quqncxg
nostr:npub1yn3hc8jmpj963h0zw49ullrrkkefn7qxf78mj29u7v2mn3yktuasx3mzt0
nostr:npub1gzuushllat7pet0ccv9yuhygvc8ldeyhrgxuwg744dn5khnpk3gs3ea5ds
nostr:npub1vxz5ja46rffch8076xcalx6zu4mqy7gwjd2vtxy3heanwy7mvd7qqq78px
nostr:npub1a2cww4kn9wqte4ry70vyfwqyqvpswksna27rtxd8vty6c74era8sdcw83a
nostr:npub149p5act9a5qm9p47elp8w8h3wpwn2d7s2xecw2ygnrxqp4wgsklq9g722q
nostr:npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg
nostr:npub17u5dneh8qjp43ecfxr6u5e9sjamsmxyuekrg2nlxrrk6nj9rsyrqywt4tp
nostr:npub1dergggklka99wwrs92yz8wdjs952h2ux2ha2ed598ngwu9w7a6fsh9xzpc
Si te ha parecido útil, comparte con quien creas que puede interesarle ¡Gracias!
-
@ d68401a8:11aad383
2025-03-10 17:52:27In order to acquire Handshake names, you first need to purchase Handshake coins. The true value of the Handshake network is in the names, but coins are necessary since they act as a utility token. As with Bitcoin, mining blocks rewards HNS coins, and these monetary rewards incentivize miners to enforce network security.
There are a few general exchanges where you can get HNS coins (Gate.io, MEXC, CoinEx). But if you don't want to deal with general exchanges, and as long as you have Bitcoin, you can use two specific exchanges:
- namebase.io
- https://🤝 (only accessible with a Handshake resolver, such as Fingertip)
Both work great, and if you don't already have an account with any of the previously mentioned general exchanges, I would definitely recommend using one of these two to get HNS coins, or even both.
1. Getting HNS coins on Namebase
Namebase is the most well-known Handshake registrar, where you can bid on, buy, sell, and manage Handshake domains effortlessly. Besides that, you can also deposit Bitcoin and exchange it for HNS coins easily. It is probably the easiest way.
You can use the "Buy" option from the "Buy/Sell HNS" menu. This option allows you to:
- Set a specific amount of Bitcoin to send, which will be converted into an approximate amount of HNS coins.
- Add your Bitcoin address in case a refund is needed.
- Proceed with the payment to the displayed address.
You can also use "Namebase Pro", found in the same drop-down menu. Simply click the "Deposit" button, select "BTC", and send the desired amount of Bitcoin to the displayed address. Once it arrives, you can exchange it in the trading terminal whenever you want.
The advantage of this option is that Bitcoin is not instantly traded into HNS; instead, you receive Bitcoin and can exchange it for HNS whenever you like, or resend the Bitcoin back to your address.
2. Getting HNS coins on 🤝
The 🤝 platform is a trading site developed by the same creator of ShakeStation.io (a great alternative to Namebase that you should also try). Getting Handshake with this option takes a bit more steps than Namebase, but it offers greater privacy if that’s important to you. Also, keep in mind that it is only accessible if you have a Handshake resolver.
Once you have created your account, go to the "Listings" section on the site. There are a few trading pairs and combinations, but for our case, we need to select "Handshake" under "Offering" since that's what we want to get, and "Bitcoin" under "Accepting" since that's what we are giving. You will see several offers and the amount of BTC you need to send.
Go to the "Account" menu, then "Deposit," and send the desired amount of BTC to the displayed address.
Once your Bitcoin is already in your account, you just need to purchase the desired listing:
After receiving the HNS coins, you now can send your HNS coins to your wallet of choice to store them or use them (buying domains, renewing...).
Before withdrawing from 🤝, you will need to set up the two-factor option. Click the "setup" button, and enter any password in the field. Then, to withdraw, you will need to enter the password you wrote. There is an standard fee of $1 for withdrawals.
A few more things about 🤝:
- Create Listings: In the previous example, we purchased an already existing listing, but you can create your own. The advantage is that you decide the price ratio; the disadvantage is that you have to wait until someone buys it. Meanwhile, buying a listing is more straightforward.
- You can't purchase listings partially: Keep in mind that you must buy a full listing. For example, if someone is offering 10,000 HNS in exchange for Bitcoin, you cannot buy just 5,000—you have to buy the full 10,000 HNS listing.
- Public or Private Listings: If you want your offer to be public, it must appear without the lock symbol. If you see a lock symbol, it means the listing is private. You need to edit the listing, leave the password field blank, and save. Once this is done, your listing will be publicly available.
And that’s it! 🎉
Whatever path you have chosen, once you have acquired HNS coins, you are now ready to buy HNS names and use them to be part of a self-sovereign DNS root zone.
_________________
Final notes about acquiring domains:
There are essentially 3 options to acquire names: one fully self-custodial (Bob Wallet) and two custodial (Namebase.io and Shakestation.io).
The two custodial options are great since make things easier, but I believe users must be also encouraged to try Bob Wallet, which is a fully functional Handshake wallet where beside storing coins and names, you can also bid on Handshake domains directly on-chain. Here's a great tutorial on how to do it: https://skyinclude.com/bobwallet
_________________
-
@ d68401a8:11aad383
2025-03-10 17:22:14What do you need?
- A Handshake top-level domain
- Bob wallet (with at least 10 HNS)
- Varo account
- GitHub account
1. Own a Handshake domain
First, you need to have a domain stored in your personal wallet (Bob Wallet).
We don’t cover how to obtain a domain name, but it’s not difficult. You can bid for domains using Bob Wallet, which is a self-custodial method that allows you to interact directly with the blockchain. Alternatively, you can use a custodial service like Namebase.io or ShakeStation.io. If you opt for a custodial service, both platforms work well and significantly simplify the process. However, keep in mind that you will need to transfer your domain to your Bob Wallet. This transfer typically takes about a day, so be patient.
2. Create A Varo Account
Varo is a service that allows you to connect your self-custodied domain to a DNS nameserver, enabling you to manage your domain records without losing custody of your name. At any time, you can use your Bob Wallet to delete all records associating your domain with Varo, effectively breaking the connection. Varo is developed by eskimo.software. You can access Varo in both the ICANN and HNS root zones:
3. Connect your domain with Varo
Once your domain is in your Bob wallet, you need to connect it to Varo. Go to your Varo account > Add site > type the domain you own, and press the "+" button.
Your domain should appear under "External Domains". Next, go to "Manage", where you’ll find two subsections named "Nameservers" and "DNSSEC". These are the records you need to add to your domain in Bob Wallet to connect it with Varo.
In Bob Wallet go to "Domain Manager", press on your domain, a new screen will open. In the "Records" section, add the records provided by Varo:
- Add 2 NS records, with the value of ns1.varo. and ns2.varo.
- Add 1 DS record, with whatever string of value you have in your Varo account
Once done you need to "Submit" the changes. It will take approximately 10 minutes to update (the time it takes for each block to be created on the Handshake network). After 10–20 minutes, you should be able to see the new records on any HNS explorer, such as Niami.io.
To test if the connection is proper, you can add a "redirect" record on Varo. A redirect record is a type of DNS record used to redirect a domain or subdomain to another URL. In this example, I will redirect the domain "nostr.belikebill", to my Primal nostr address "https://primal.net/galetaire".
- Type: REDIRECT
- Name: nostr.yourdomain
- Content: the URL of destination
Once completed, it will take about 6 hours for the changes to go live. Yes, it might seem like a long time, but domains are not like money—you’re not meant to move them around constantly. If your new address, "nostr.yourdomain" or "http://nostr.yourdomain.hns.to", redirects to your desired URL, your domain and Varo are successfully connected.
4. Create a GitHub account
Create or go to your GitHub account, create a "New repository", put the name of your choice, and "create".
4.1 Create an index file
At your new repository, click on the "Add file" > "Create new file" button.
Name the file "index.html" and type some HTML content into the editor. Like:
<h1>Hi, It's me!</h1>
Commit changes.
4.2 Repository Settings
Click on the "Settings" tab and scroll down to the GitHub "Pages" section. Select the main branch source "/root" and click on the "Save" button.
After 5 minutes, you can refresh the Pages section, and at the top, you will see an information message indicating that your site is live at a URL similar to this: https://youraccount.github.io/yourrepository, visit the site. At this point, your website is online.
In the "Pages" section, go to "Custom Domain" and add your desired domain. Note that it must be a second-level domain (e.g.,
something.yourdomain
). GitHub will not recognize a pure top-level domain:- hi.yourdomain, for example.
Because it’s not an ICANN domain, GitHub will tell you it doesn’t work, but it actually does. Even though it will always show as "DNS Check in Progress," your site will be online. It will take around 30 minutes for the site to go live.
5. Set up your domain as the address for your site
Finally, you need to connect Varo with GitHub. Go to you Varo account > "Manage" for your domain, and add an "A" record:
- Type: A
- Name: hi.yourdomain
- Content: 185.199.111.153 (this is the IP address of GitHub)
As for the "Redirect" record, the update will take 6 hours to go live. But after that time, your site will be online at your domain address:
- http://hi.yourdomain/
- http://hi.yourdomain.hns.to (hns.to is a bridge to see HNS addresses trough ICANN addresses).
Congrats! The next step is to personalize your website (at this point only the "index.html"), you can ask some AI to create you one, copy paste, and done!
You can see mine at http://hi.galetaire, any doubt hit the comment section :D.
-
@ 2e8970de:63345c7a
2025-03-10 16:26:31originally posted at https://stacker.news/items/909307
-
@ 4870d550:110d6208
2025-03-10 16:24:25As many of you may know, The Progressive Bitcoiner has transitioned to a 501c3 nonprofit in the United States, based in Boston Massachusetts. We were always mission driven as a podcast, and I decided to take that mission, as well as my own passion as a progressive and my experience working in nonprofits for the past decade, and translate it into nonprofit.
Our mission is to increase Bitcoin awareness and adoption among progressives through education and funding progressive causes. I believe our mission is more important than ever, and today I’m asking for your help and partnership!
From our humble beginnings years ago as just a podcast, we were dedicated to amplifying progressive voices and bitcoin education tailored to a progressive audience because that was desperately lacking in the bitcoin media and education space. Additionally, a lot of left leaning media, politicians, and everyday people were believing and perpetuating myths about bitcoin being bad for the environment, being a right wing/libertarian project, only used for crime and terrorism, etc. While the narrative has improved some, I think all of us would agree we still have a long way to go.
Also take into consideration the recent election of Donald Trump as President of the United States, his support of bitcoin and bitcoin friendly policies, and how that may create a backlash and perpetuate false narratives left leaning folks and media believe and push against bitcoin. In one regard it’s silly to dismiss, or actively fight against, a neutral and open technology like bitcoin (with incredible benefits for people globally as a store of value, media of exchange, and beyond) just because you don’t like someone who uses it or promotes it. On the other hand, it is a real thing happening right now in left circles and mainstream media (just look at Rachel Maddow’s recent comments on the U.S. Strategic Bitcoin reserve).
This is why I think our mission and cause is more important than ever before, and why I’m asking for your help and partnership. Whether you consider yourself a progressive or left leaning person or not, our goal is to build a more diverse and robust constituency that understands bitcoin and will advocate for bitcoin rights in the U.S. that includes preserving privacy and freedom tech tools, bitcoin self-custody, and in general the ability for all americans to freely use and benefit from bitcoin. While many inroads have been made in bipartisan ways and support of bitcoin, we still have a long way to go and many of the most outspoken advocates of bitcoin continue to be right leaning individuals and politicians, while many of the most outspoken critics come from the left.
As Lyn Alden once said to me on our podcast, it’s critical to also support and protect your left flank as much as your right, which creates a stronger and more robust defense of whatever you're fighting for. For us, the fight for financial freedom and human rights is critical, and bitcoin is an integral part of this fight. We will work hard to fight any potential backlash from the left against bitcoin as they attach narratives to Bitcoin associating it with Trump (particularly as we watch elections in 2026 and 2028).
The way we combate this and grow bipartisan support for bitcoin is through media, our publications, traveling to and appearing on mainstream media, meeting with progressive lawmakers, staffers, and activists, to discuss Bitcoin in a way that resonates with progressives. Do we want just under half the country to think Bitcoin isn't for them, or have them believe mainstream media narratives about Bitcoin as a MAGA only movement? Of course we know that’s a crazy assertion, but many are perpetuating this narrative.
Through our own efforts, and partnerships with other bitcoin education and advocacy orgs in the space, we will build a more robust, and bipartisan coalition of bitcoin support in the United States. The only way we can do this is with your support and donation to help us increase our media and publication presence, fund progressive causes through our grant giving program, and increasing staff capacity at our organization to hit the ground running whether it’s in Boston, DC, LA and beyond.
Whether you are a progressive individual that agrees wholeheartedly with our cause and identifies with our content and work, or even if you’re a conservative who voted for Trump, but want to see more bipartisan support of Bitcoin and less unsubstantiated attacks against Bitcoin from left media and politicians, we ask for your support today. We don’t want to waste a moment on amplifying our message and getting to work building this support and educating the left on Bitcoin.
Consider donating today in Bitcoin or fiat https://progressivebitcoiner.org/donate/. If you are a Bitcoin business in the space also wanting to increase bipartisan support of Bitcoin by bringing in more progressives to the cause, we welcome and encourage your support either through media partnership via our podcast and publication, or by donation. Your donation is tax-deductible.
Thank you for your support and partnership. Remember, Bitcoin is for everyone! And we’re doing our part to ensure that progressives understand this. This is only the beginning!
Trey Walsh Executive Director, The Progressive Bitcoiner, Inc.
-
@ 6bae33c8:607272e8
2025-03-10 16:21:56This draft took place last night (March 9). Once again I drew the 12 slot.
Here are the results:
Link to livestream. Link to BCL1.
1.12 Mookie Betts — I was hoping for Kyle Tucker or Corbin Carroll, but knew realistically that wasn’t likely to happen. So it was either a repeat of BCL1, wherein I went Julio Rodriguez and Jackson Chourio or mixing it up with Betts, who’s a better bet for runs and average at the cost of steals.
2.1 Jackson Chourio — I think 20-30 is his healthy floor, and there’s a chance he hits .300. Plus I like the home ballpark.
3.12 Austin Riley — He was going at the 1-2 turn last year, and nothing’s changed except that he got hurt after a slow start, but he’s healthy now. I also find third base to be scarce, and Riley gives you some batting average from the position too.
4.1 Chris Sale — I talked myself into Sale earlier in the day as he’d be going at the 1-2 turn like Paul Skenes and Tarik Skubal based on last year’s numbers. The market must assume he’s a higher injury risk, but that’s not necessarily the case given how hard Skubal and Skenes throw.
5.12 Raisel Iglesias — I love old warhorse closers on good teams. They’re not reliant on dominant stuff, and they know how to survive.
6.1 Yainer Diaz — I always hate rounds 5 and 6 — never see any value there, so sometimes I punt and take the premium catcher. Diaz gives you pop and major average from the position — remember the baseline for catcher batting average is much lower than that of the other positions.
7.12 Max Fried — I got him in BCL1 too, in the same spot. Just a solid pitcher who should get run support in a favorable stadium for lefties.
8.1 Cody Bellinger — First base is scarce, and I like Bellinger’s left-handed bat in Yankee Stadium. Plus he’s a sneaky source of stolen bases as first base-eligible players rarely run.
9.12 Hunter Brown — I missed out on Spencer Strider by a few picks, so I settled for Brown who dominated for two thirds of the year after a bad start.
10.1 Jake Burger — This was a tough call, but I wanted to fill up at corner while I had the chance, and Burger’s had two straight years of solid pop without killing your batting average, despite playing in Miami. I thought about Alex Bregman and even Marcus Semien, who somehow was still available.
11.12 J.T. Realmuto — My queue really emptied ahead of this turn — Sandy Alcantara, Bo Bichette, Shane McClanahan and Josh Lowe — but I was cool with JTR for a bounce-back year. He’s 34, but I expect him to run more now that he’s nine months removed from meniscus surgery and claims he feels as good as ever.
12.1 Sonny Gray — I preferred Alcantara or McClanahan, but Gray is an old warhorse who knows how to pitch and plays in a good park.
13.12 Kevin Gausman — I was thrilled to land him here. He had shoulder trouble last year, but he touched 96.2 in a spring training outing and appears healthy. Prior to last season, he was routinely an early round ace.
14.1 Kenley Jansen — Another old warhorse closer, who I also drafted in BCL1.
15.12 Zach Neto — I think Neto’s mispriced. He went 23-30 last year at age 23, and he’s expected back in April. Maybe I’m being cavalier about his return from shoulder surgery, but he’s already doing throwing drills and hasn’t had a setback.
16.1 Jordan Romano — I went for a third closer because the price was right. Chances are at least one of the other two misses time or loses the job at some point, so it’s nice to have a surplus of saves. Also, three closers are a nice luxury when your marginal starters have tough matchups.
17.12 Jackson Holliday — I needed a second baseman, and he is one. Seriously though, this is the time to swing for the fences on one of the league’s top prospects.
18.1 Brandon Nimmo — Maybe I should have taken Cedric Mullins instead because Nimmo’s banged up, but I needed an OF, and I got a bit stuck with the clock. Nimmo’s batting average should rebound, and he’s a great source of runs given his strong OBP.
19.12 TJ Friedl — Apparently, he’s leading off, and I needed the steals. I was short on OF through 17 rounds, so I decided to attack it with volume.
20.1 Nolan Jones — My second share of Jones, just too obvious given his 2023 season and home ballpark.
21.12 Jonathan India — He gets a ballpark downgrade, but he’ll run a little, and gives me needed MI depth.
22.1 Nick Lodolo — I drafted a lot of starters in the early-middle rounds, but I was still a bit thin. Lodolo’s a pedigreed young pitcher who misses bats.
23.12 Alec Burleson — I needed more outfield depth. Burleson provided some pop (21 HR), nine steals and a solid average last year. Maybe he’ll qualify at first base at some point too.
24.1 Roman Anthony — Another top prospect, potentially a good source of steals when he gets called up, hopefully sooner rather than later. Round 24 seems cheap for this kind of upside, but that’s where the market has him.
25.12 Evan Carter — Attacking outfield with volume. Carter was roughly a 10th-round pick last year after his 2023 post-season run. He stole bases in the minors too.
26.1 Dustin May — He’s competing for a rotation spot in LA and has always been very good when healthy.
27.12 Jacob Wilson — A solid prospect who has the shortstop job to himself in a bandbox ballpark. Plus I needed someone to fill in while Neto gets healthy.
28.1 Gerrit Cole — At the time, the results of his tests were not entirely known, so it was worth a shot. It looks like he’ll be the first drop. Prefer wasting a 28th to a 6th.
29.12 Gavin Lux — Former top prospect gets a big park upgrade, could qualify at a few positions before long. Also got him in BCL1.
30.1 Will Warren — Jack Kitchen, who’s running this team for me, asked me to get him in Round 30, so I did. He’s a candidate to replace Cole now.
Roster By Position:
C Yainer Diaz/J.T. Realmuto
1B Cody Bellinger
2B Jackson Holliday
3B Austin Riley
SS Zach Neto
CI Jake Burger
MI Jonathan India
OF Mookie Betts/Jackson Chourio/Brandon Nimmo/T.J. Friedl/Nolan Jones
UT Alec Burleson
SP Chris Sale/Max Fried/Hunter Brown/Sonny Gray/Kevin Gausman/Nick Lodolo
RP Raisel Iglesias/Kenley Jansen/Jordan Romano
B Roman Anthony/Evan Carter/Dustin May/Jacob Wilson/Gerrit Cole/Gavin Lux/Will Warren
-
@ e5de992e:4a95ef85
2025-03-10 16:18:21Many traders and investors fall into a dangerous mindset: thinking the market is "too cheap" and should go up, or "too expensive" and should go down.
This kind of thinking leads to forcing your view onto the market—which is one of the most expensive mistakes you can make. The market doesn’t care about your opinion. It moves based on supply, demand, liquidity, and psychology—not what you think it “should” do.
If you want to succeed in trading, you must learn to read and follow the market, not fight it.
The Market Doesn't Care About "Cheap" or "Expensive"
Let’s break this down:
1. Cheap Stocks Can Get Cheaper
- A stock dropping from $100 to $50 may look cheap.
- But if it’s in a strong downtrend, it can drop to $30, then $10.
- "Cheap" is never a reason to buy—you need confirmation that demand is returning.
2. Expensive Stocks Can Get Even More Expensive
- A stock at all-time highs may seem overpriced.
- But if demand keeps pushing it higher, it can go much further than most expect.
- "Overvalued" stocks can stay overvalued for years while continuing to climb.
📌 Example: Tesla (TSLA)
- In 2019, Tesla looked "overpriced" at $50 (split-adjusted)—many traders shorted it.
- By 2021, it hit $400—a 700%+ increase.
- Those who tried to force their bearish view onto the market lost everything.
The Cost of Fighting the Market
Forcing your bias onto the market is a losing game.
- If you short a stock just because it "looks too expensive," you might get squeezed.
- If you buy a stock just because it "looks too cheap," you might be catching a falling knife.
Instead, you must follow the price action and trade what’s actually happening—not what you think should happen.
How to Read and Follow the Market
1. Price Is the Truth
- The market’s job is to price in all available information—fundamentals, news, expectations, liquidity.
- Your job is to analyze what the market is actually doing, not what you think it should do.
- Uptrends = buyers are in control. Downtrends = sellers are in control.
2. Trend Matters More Than Your Opinion
- Uptrends tend to continue → Look for strong stocks making higher highs.
- Downtrends tend to continue → Avoid trying to catch the bottom.
- Sideways markets are uncertain → Wait for confirmation before acting.
3. Follow Strength, Avoid Weakness
- Strong stocks keep getting stronger—leaders emerge from healthy markets.
- Weak stocks keep getting weaker—avoid stocks in long-term downtrends.
- Always ask: "Is the market rewarding this trend?"
📌 Example: Nvidia (NVDA)
- Many thought NVDA was “too expensive” at $200 in early 2023.
- It kept running past $400, then $500—doubling in value.
- Those who followed the trend profited, while those who fought it got crushed.
Final Thoughts: Adapt or Lose
🚫 The market is never "too cheap" or "too expensive"—it just is.
🚫 Trying to force your view onto the market will cost you.
✅ Your job is to read the market, follow the trend, and adapt.The market rewards discipline, patience, and trend-following—not stubborn opinions.
💡 Action Step: Next time you feel the urge to fade a strong trend or buy a falling knife, ask yourself: "Am I trading my opinion or the actual market?"
Trade what’s happening—not what you wish would happen. 🚀
-
@ da0b9bc3:4e30a4a9
2025-03-10 15:50:05Hello Stackers!
It's Monday so we're back doing "Meta Music Mondays" 😉.
From before the territory existed there was just one post a week in a ~meta take over. Now each month we have a different theme and bring music from that theme.
This month is March and we're doing March Madness. So give me those Wacky and Weird crazy artists and songs. The weirder the better!
Let's have fun.
How about crazy yodel prog?
https://youtu.be/Obdv1jghXAE?si=8e4b7ISJg6pDGGBP
Talk Music. Share Tracks. Zap Sats.
originally posted at https://stacker.news/items/909253
-
@ 0463223a:3b14d673
2025-03-10 13:08:11Whilst starting out documenting coming off prescription drugs and an attempt at self improvement. I now understand that I want to write a weekly blog to clarify my thoughts and provide a means for self introspection and self improvement. It’s pretty narcissistic to be honest but I’m fine with that. I’m trying to be honest in my approach and it is what it is.
Some folks will write about economics, others culture war hot topics or how they stick raw egg up their arse for profit type diet advice. It’s unlikely I’ll approach any of those topics, there’s a lot of noise already and I don’t want to add to the pile.
Each week I will write a page of A4 and hope over time the writing style will improve. It’s coming from an extremely low base so I’m most optimistic about the upside potential!
I’ve been pretty hard on myself in the last week, folks who interact with me here may have noticed, my wife certainly has and it’s true. I’ve been an emotional wreck. For over a decade my brain chemistry was altered by drugs and my brain is not a comfortable place. Staying on the drugs was easy but it’s not the answer.
I notice it’s quite common for folks to say you should never speak ill of yourself here, words have power. On one level I agree, no one should beat themselves unnecessarily but I think it’s just as important to be self aware, understand where you have biases, where you have strengths and weaknesses. If you’re never hard on yourself, how do you improve? Only by facing problems face on is what I’m thinking.
I broke down in tears on a live stream last week, pretty embarrassing. The day before I’d seen footage of a gig I’d done in 2013 (I think), a gig that helped pave the way for some of the cool projects I’ve been involved with over the last decade. It was nothing fancy, just a night in a local pub. What truly broke my heart was seeing my late friend on drums. He committed suicide not long after that gig.
I was on such a high at that time. We had begun working with world class musicians, acts people had actually heard of, not Pop but credible artists. Our own band had just got its first national radio play and we’d been offered a deal to make an album with a reasonable advance. We were doing tonnes of gigs, studio sessions and having fun (at least I thought). Nothing glamorous, long sessions in low budget studios, gigs getting paid fuck all but we were DOING THINGS. We were doing what we’d always wanted to do. Make music.
So with that fresh in my memory I thought I’d try playing a record we’d made together on the stream, absolute car crash. I could barely speak. Music completely kicked my arse that day. After all this time, I’m still not over it.
Him dying like that kicked the shit out of me in ways I can’t begin to describe. I fell into a very deep depression myself after that and I was so fucking angry. I’d say more but I don’t feel comfortable talking about it, knowing whatever pain I feel, it’s nothing compared to the pain his family feel. They are very private people. I respect that.
It was around that time I started being medicated. I came very close to committing suicide myself and was talked out of driving my car off a cliff by the samaritans. Fun right!?
Aside from the music stuff, we were both working for a charity helping kids from tough backgrounds develop life skills through music. The week before his death we’d both lost a lot of hours work due to government cut backs. Cut backs that were put in place as our country was compelled to bail out a bunch of bankers. I’m STILL angry about that, but less so now.
I want to keep anything I earn as far away from the banks as is possible. Seriously, fuck them. Fuck them. Fuck them. Fortunately there is an opt out.
It’s unlikely I’ll say much more on the subject. Sure I could game Nostr by endless posting pictures of Michael Sailor but frankly, no. I have nothing in common with the guy. He gave up music because there was no money in it. Fuck him, his beats would suck anyway, he has no soul haha but hey, he’s enjoying himself and that’s good for h.
I don’t have thousands upon thousands of bitcoin but I have no money in the bank and thousands of Sats. Win!
-
@ a012dc82:6458a70d
2025-03-10 12:52:39The cryptocurrency landscape is witnessing a significant shift as institutional investors, led by giants like BlackRock, are increasingly venturing into Bitcoin, marking a new era in the digital asset's journey. This article delves into the recent acquisition spree where institutional entities have amassed a substantial 3.3% of Bitcoin's total supply, exploring the implications and potential outcomes of this trend. The movement signifies a departure from traditional investment paradigms, as these financial behemoths traditionally steered clear of highly volatile assets like Bitcoin. However, the changing economic landscape, marked by inflation fears and the search for non-correlated assets, has led these institutions to reconsider their stance. The involvement of firms like BlackRock not only brings substantial capital to the Bitcoin market but also signals to other institutional and retail investors that Bitcoin is a viable asset class. This shift is not merely about investment in digital assets but represents a broader acceptance of cryptocurrency as an integral part of the modern financial landscape.
Table of Contents
-
The Rise of Institutional Investment in Bitcoin
-
The 3.3% Supply Phenomenon
-
Implications of Institutional Holdings
-
Challenges and Controversies
-
The Road Ahead
-
Conclusion
-
FAQs
The Rise of Institutional Investment in Bitcoin
In recent years, Bitcoin has transitioned from a speculative investment for individual traders to a legitimate asset class attracting institutional investors. The introduction of Bitcoin exchange-traded funds (ETFs) has been a pivotal moment, providing a regulated and accessible avenue for institutional players to enter the cryptocurrency market. Companies like BlackRock, the world's largest asset manager, have led the charge, signaling a significant endorsement of Bitcoin's long-term value. This trend is reinforced by the growing dissatisfaction with traditional financial systems and the low-yield environment, driving institutions to seek alternative investments. The rise of institutional investment has been facilitated by improved regulatory clarity and the development of more sophisticated cryptocurrency services, including custody and trading solutions tailored for institutional needs. This wave of institutional interest is not just a fad but a reflection of a deeper understanding and acceptance of blockchain technology and its potential to revolutionize financial systems. As more institutions enter the market, we can expect to see a ripple effect, with increased innovation, product offerings, and perhaps even regulatory reforms tailored to accommodate the burgeoning asset class.
The 3.3% Supply Phenomenon
A recent report has shed light on a remarkable development: the combined applicants of 11 spot Bitcoin ETFs now hold approximately 3.3% of the total circulating Bitcoin supply. This group includes heavyweight financial institutions such as Grayscale, Fidelity, and Franklin Templeton, among others. This collective move by institutional investors to secure a sizable portion of Bitcoin's supply underscores their bullish outlook on the cryptocurrency's future. The strategic acquisition of such a significant portion of the supply is not just a vote of confidence in Bitcoin's value proposition; it also reflects a strategic positioning for future financial landscapes where digital assets play a central role. This accumulation can lead to a reduction in market liquidity, which, while potentially increasing volatility in the short term, may also lead to higher prices as demand continues to grow against a limited supply. The actions of these institutions highlight a strategic shift towards diversification and the recognition of Bitcoin as a digital gold, a hedge against inflation, and a new asset class with unique properties.
Implications of Institutional Holdings
The substantial acquisition of Bitcoin by institutional investors has several implications. Firstly, market stability is expected to improve as institutional investors are typically long-term holders, reducing the market's susceptibility to large, speculative price swings. Unlike retail investors, who may be prone to panic selling during market downturns, institutions are more likely to hold their positions through volatility, providing a stabilizing effect on the market. Secondly, the price impact, while not immediately evident, could manifest significantly in the long term. As institutions continue to accumulate Bitcoin, the reduced supply could lead to price increases, especially if retail and other institutional investors continue to enter the market. Thirdly, the legitimacy and adoption of Bitcoin are likely to increase as institutional involvement can be seen as an endorsement of its viability as an investment. However, this shift also brings challenges, such as potential centralization and the risk of large-scale market manipulation. The increased institutional presence in the Bitcoin market is a double-edged sword; while it brings legitimacy and stability, it also introduces new risks and challenges that the cryptocurrency community must navigate.
Challenges and Controversies
Despite the optimistic outlook, the move has not been without its challenges and controversies. The approval of Bitcoin ETFs by regulatory bodies like the SEC has been met with mixed reactions. SEC Chair Gary Gensler's comments highlighted the irony in approving spot Bitcoin ETFs, pointing out the potential for increased centralization and speculation in a market that values decentralization. This decision has sparked a debate within the cryptocurrency community about the future of Bitcoin and whether institutional involvement will dilute its foundational principles. Furthermore, the large-scale acquisition of Bitcoin by institutions could lead to a concentration of wealth and power within the ecosystem, which contradicts the decentralized ethos that Bitcoin was built upon. Additionally, there are concerns about the environmental impact of Bitcoin mining and whether institutional investors will push for more sustainable practices or exacerbate the issue. The entry of institutional investors into the Bitcoin space is a complex development that brings both opportunities and challenges, and its long-term impact remains to be seen.
The Road Ahead
As the market adjusts to the new reality of institutional involvement in Bitcoin, all eyes will be on the impact of these developments on the cryptocurrency's price, supply dynamics, and overall market structure. Additionally, the upcoming Bitcoin halving event in April is set to further influence the market, reducing the rate at which new Bitcoins are created and possibly leading to tighter supply conditions. This event could exacerbate the effects of institutional accumulation, potentially leading to significant price movements. The road ahead for Bitcoin is fraught with uncertainties and possibilities. The increasing institutional interest in Bitcoin is likely to continue shaping the cryptocurrency landscape, influencing everything from regulatory approaches to technological innovations within the space. As we move forward, the key will be balancing the benefits of institutional involvement with the need to preserve the decentralized, open nature of cryptocurrencies.
Conclusion
The acquisition of 3.3% of Bitcoin's supply by institutional investors marks a significant milestone in the cryptocurrency's evolution. As institutions like BlackRock and others bet big on Bitcoin, the landscape of digital assets is set to change dramatically. While challenges remain, the long-term outlook for Bitcoin appears more promising than ever, with institutional investment paving the way for broader acceptance and stability in the cryptocurrency market. However, as the market evolves, it will be crucial to monitor the impacts of this shift, ensuring that Bitcoin remains a tool for financial empowerment and innovation, rather than becoming an instrument of traditional financial systems. The journey of Bitcoin continues to unfold, and the involvement of institutional investors is just the latest chapter in its ongoing story.
FAQs
Why are institutional investors like BlackRock interested in Bitcoin? Institutional investors are turning to Bitcoin as a new asset class to diversify their portfolios, hedge against inflation, and capitalize on the potential for high returns. The growing acceptance of Bitcoin as a legitimate investment, improved regulatory clarity, and the development of institutional-grade trading and custody services have also contributed to this interest.
What does the 3.3% Bitcoin supply acquisition mean? The 3.3% supply acquisition refers to the combined total of Bitcoin currently held by the applicants of 11 spot Bitcoin ETFs. This significant holding indicates a strong belief in the future value of Bitcoin and represents a substantial portion of the total circulating supply, highlighting the growing influence of institutional investors in the cryptocurrency market.
How does institutional investment affect the Bitcoin market? Institutional investment is expected to bring more stability, reduce volatility, and increase market maturity. However, it could also lead to potential centralization and influence market dynamics, such as supply scarcity, which may drive up prices.
What are the challenges and controversies surrounding institutional investment in Bitcoin? Challenges include potential market manipulation, centralization of Bitcoin holdings, and deviation from Bitcoin's original ethos of decentralization. Controversies also arise from environmental concerns related to Bitcoin mining and the potential for increased speculation and volatility.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ d360efec:14907b5f
2025-03-10 12:34:35ภาพรวมสถานการณ์ : https://www.tradingview.com/chart/F8mO3cIx/
Bitcoin (BTC) ประสบกับการร่วงลงอย่างรุนแรง (sharp sell-off) ในวันที่ 10 มีนาคม 2568. การเคลื่อนไหวนี้, โดยเฉพาะอย่างยิ่งที่เห็นได้ชัดใน Timeframe 15 นาที, ได้ทำลายแนวรับสำคัญหลายระดับ และยืนยันถึงแนวโน้มขาลงในระยะสั้นอย่างชัดเจน. แม้ว่า Timeframe Day จะยังไม่ เสีย โครงสร้างขาขึ้นในระยะยาวไปทั้งหมด, แต่ก็แสดงสัญญาณเตือนที่สำคัญหลายประการ, รวมถึงแท่งเทียน Bearish Engulfing, Money Flow ที่เปลี่ยนเป็นลบ, และ Trend Strength ที่อ่อนแอลง. การวิเคราะห์นี้จะพิจารณาทุก Timeframe อย่างละเอียดเพื่อหากลยุทธ์ที่เหมาะสมกับความเสี่ยงที่สูงมากในปัจจุบัน.
การวิเคราะห์ทางเทคนิค (Technical Analysis):
-
Timeframe 15 นาที (15m) - เน้น:
- SMC (Smart Money Concepts): ราคา Breakout แนวรับสำคัญทั้งหมดลงมาอย่างรุนแรง. มีการสร้าง Lower Lows (LL) อย่างต่อเนื่อง. นี่แสดงถึงการควบคุมตลาดของแรงขายอย่างเบ็ดเสร็จ (complete dominance of selling pressure).
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (แนวต้าน): $68,000 (แนวรับเดิมที่ตอนนี้กลายเป็นแนวต้านสำคัญ), $69,000, $70,000.
- Sellside Liquidity (แนวรับ): ไม่มีแนวรับที่แข็งแกร่งในระยะใกล้. อาจมีแนวรับทางจิตวิทยา (psychological support) ที่ $60,000, และต่ำกว่านั้นที่ $58,000, $56,000. การระบุแนวรับที่ชัดเจนในสภาวะนี้เป็นเรื่องยาก.
- Money Flow: เป็นลบอย่างรุนแรง (Strong Outflow). นี่คือการยืนยันที่สำคัญที่สุดอย่างหนึ่งของแรงขาย.
- EMA (Exponential Moving Average): EMA 50 (สีเหลือง) อยู่ต่ำกว่า EMA 200 (สีขาว) อย่างชัดเจน, และระยะห่างระหว่างเส้นทั้งสองกำลังขยายออก. นี่คือสัญญาณ Bearish ที่แข็งแกร่ง.
- Trend Strength: เมฆสีแดงหนาแน่น, และมีสัญญาณ Sell อย่างชัดเจน.
- Chart Pattern: ไม่มีรูปแบบ Chart Pattern ใดๆ ที่บ่งบอกถึงการกลับตัวเป็นขาขึ้น (Bullish).
- สรุป 15m: แนวโน้มขาลงชัดเจนและแข็งแกร่งมาก.
-
Timeframe 4 ชั่วโมง (4H):
- SMC: ราคาอยู่ในช่วงการปรับฐาน (correction). ได้หลุดลงมาต่ำกว่า EMA 50 และกำลังทดสอบ EMA 200.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (แนวต้าน): $68,000 - $69,000.
- Sellside Liquidity (แนวรับ): EMA 200 (ประมาณ $60,000), $58,000 (บริเวณ Demand Zone ก่อนหน้า).
- Money Flow: เป็นลบ (Outflow).
- EMA: EMA 50 (สีเหลือง) ตัด EMA 200 (สีขาว) ลงมาแล้ว (Death Cross). นี่คือสัญญาณ Bearish ในระยะกลาง.
- Trend Strength: เมฆสีแดงบ่งบอกถึงแนวโน้มขาลงระยะกลาง.
- Chart Pattern: ไม่มีรูปแบบการกลับตัวที่เป็น Bullish ที่ชัดเจน.
- สรุป 4H: ยืนยันการปรับฐานในระยะกลาง. แนวโน้มเป็นขาลง.
-
Timeframe Day (Day):
- SMC: ยังไม่ เสียโครงสร้างขาขึ้นหลักในระยะยาว (คือ ยังไม่ได้ทำ Lower Low ที่ต่ำกว่า $59,000 - $60,000). อย่างไรก็ตาม, แท่งเทียนล่าสุดคือ Bearish Engulfing ซึ่งเป็นสัญญาณกลับตัวที่สำคัญ, และความรุนแรงของการร่วงลงบ่งบอกถึงความอ่อนแอที่เพิ่มขึ้น.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (แนวต้าน): $72,000, $75,000 (All-Time High).
- Sellside Liquidity (แนวรับ): $60,000 (แนวรับสำคัญทางจิตวิทยา, Low ก่อนหน้า), $58,000, และ $50,000 - $52,000 (EMA 200 และ Demand Zone).
- Money Flow: เริ่มเปลี่ยนเป็นลบ (Outflow). นี่เป็นการเปลี่ยนแปลงที่สำคัญและเป็นสัญญาณเตือนที่ร้ายแรง.
- EMA: EMA 50 (สีเหลือง) ยังคงอยู่เหนือ EMA 200 (สีขาว), แต่ระยะห่างระหว่างเส้นทั้งสองแคบลง.
- Trend Strength: เมฆสีเขียวเริ่มบางลง, และมีสัญญาณ Neutral (ก่อนหน้านี้), และตอนนี้มีสัญญาณ Sell.
- Chart Pattern: Bearish Engulfing - สัญญาณกลับตัวเป็นขาลงที่แข็งแกร่ง.
- สรุป Day: แนวโน้มระยะยาวยังคงเป็นขาขึ้นทางเทคนิค, แต่มีสัญญาณเตือนที่สำคัญหลายประการ, และมีความเสี่ยงสูงที่จะเปลี่ยนเป็นขาลง.
กลยุทธ์การเทรด (Trading Strategies):
-
Day Trade (15m):
- กลยุทธ์หลัก: Short Selling เท่านั้น. ความเสี่ยงสูงมาก.
- เงื่อนไข: รอการ Rebound (การดีดตัวขึ้นชั่วคราว) ไปยังแนวต้าน (เช่น EMA ใน TF 15m, หรือบริเวณ $68,000). จากนั้น, รอสัญญาณ Bearish ที่ชัดเจน (เช่น Bearish Engulfing, Evening Star, หรือการ Breakout ของ Rebound นั้นลงมา).
- Stop Loss: เหนือ Swing High ล่าสุดของการ Rebound อย่างเคร่งครัด.
- Take Profit: แนวรับทางจิตวิทยา ($60,000), หรือต่ำกว่านั้น ($58,000, $56,000). ไม่ควรถือยาว.
- คำเตือน: ห้ามสวนเทรนด์ (ห้าม Buy) โดยเด็ดขาด. ตลาดมีความผันผวนสูงมาก.
-
Swing Trade (4H):
- กลยุทธ์หลัก: Wait and See (รอดู). ยังไม่มีสัญญาณให้ Buy.
- เงื่อนไข: รอให้ราคาลงไปทดสอบแนวรับสำคัญ (EMA 200 ที่ประมาณ $60,000, หรือ $58,000). จากนั้น, ต้องเห็นสัญญาณการกลับตัวที่เป็น Bullish ที่ชัดเจนและแข็งแกร่ง (เช่น Bullish Engulfing, Hammer, Morning Star, พร้อม Volume สูง) จึงจะพิจารณาเข้า Buy.
- Stop Loss: ต่ำกว่าแนวรับที่เข้าซื้อ.
- Take Profit: แนวต้าน ($68,000 - $69,000), หรือสูงกว่านั้นหากแนวโน้มเปลี่ยน.
- คำเตือน: การเข้าซื้อที่แนวรับโดยไม่มีสัญญาณกลับตัวมีความเสี่ยงสูง.
-
Position Trade (Day):
- กลยุทธ์หลัก: Wait and See (รอดู). ยังเร็วเกินไปที่จะ Buy.
- เงื่อนไข: รอให้ราคาลงไปทดสอบแนวรับที่แข็งแกร่งมาก ($50,000 - $52,000, ซึ่งเป็น EMA 200 และ Demand Zone). จากนั้น, ต้องเห็นสัญญาณการกลับตัวที่เป็น Bullish ที่ชัดเจนมาก จึงจะพิจารณาเข้าซื้อ. หรือ, รอให้โครงสร้างตลาดเปลี่ยนเป็นขาขึ้นอีกครั้ง (สร้าง Higher High).
- Stop Loss: ต่ำกว่าแนวรับที่เข้าซื้อ.
- Take Profit: ขึ้นอยู่กับสัญญาณการกลับตัวและเป้าหมายระยะยาว.
- คำเตือน: การเข้าซื้อตอนนี้มีความเสี่ยงสูงมากที่ราคาจะลงต่อ.
สิ่งที่ต้องระวัง (Important Considerations):
- ความผันผวน (Volatility): ความผันผวนของ BTC สูงมากในช่วงนี้. การเคลื่อนไหวของราคาอาจรุนแรงและรวดเร็ว.
- ข่าว (News): ติดตามข่าวสารและเหตุการณ์ที่อาจส่งผลกระทบต่อตลาดคริปโตเคอร์เรนซี.
- False Breakouts/Dead Cat Bounces: ระวังการดีดตัวขึ้นชั่วคราว (Dead Cat Bounce) ก่อนที่จะร่วงลงต่อ.
- Risk Management: การบริหารความเสี่ยงเป็นสิ่งสำคัญที่สุด. ใช้ Stop Loss เสมอ. อย่า Overtrade (เทรดเกินตัว).
สรุป (Conclusion):
Bitcoin กำลังอยู่ในช่วงการปรับฐานที่รุนแรง. แนวโน้มระยะสั้น (15m) เป็นขาลงอย่างชัดเจน. แนวโน้มระยะกลาง (4H) ยืนยันการปรับฐาน. แนวโน้มระยะยาว (Day) เริ่มอ่อนแอลงและมีสัญญาณเตือนที่สำคัญ. กลยุทธ์ที่ดีที่สุดในตอนนี้คือการ Wait and See สำหรับนักลงทุนระยะกลางและยาว, ส่วน Day Trader ที่รับความเสี่ยงได้สูงมาก อาจพิจารณา Short Sell ตามเงื่อนไขที่เข้มงวด. การ Buy ในตอนนี้มีความเสี่ยงสูงมาก.
Disclaimer: การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว, ไม่ถือเป็นคำแนะนำในการลงทุน. ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ.
-
-
@ d360efec:14907b5f
2025-03-10 12:26:42$OKX: $BTC $USDT.P
https://www.tradingview.com/chart/F8mO3cIx/
Situation Overview:
Bitcoin (BTC) experienced a sharp sell-off on March 10, 2025. This movement, especially evident in the 15-minute timeframe, broke several key support levels and confirms a clear short-term downtrend. While the Daily timeframe has not completely broken its long-term uptrend structure, it shows significant warning signs, including a Bearish Engulfing candlestick, negative Money Flow, and weakened Trend Strength. This analysis will consider all timeframes in detail to find strategies appropriate for the current very high risk.
Technical Analysis:
-
15-Minute Timeframe (15m) - Focus:
- SMC (Smart Money Concepts): Price broke down through all key support levels with strong momentum. Continuous Lower Lows (LL) are being formed. This indicates complete dominance of selling pressure.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (Resistance): $68,000 (former support, now key resistance), $69,000, $70,000.
- Sellside Liquidity (Support): No strong support in the near term. Possible psychological support at $60,000, and below that at $58,000, $56,000. Identifying clear support in this condition is difficult.
- Money Flow: Strongly negative (Strong Outflow). This is one of the most important confirmations of selling pressure.
- EMA (Exponential Moving Average): EMA 50 (yellow) is clearly below EMA 200 (white), and the distance between the two lines is widening. This is a strong Bearish signal.
- Trend Strength: Thick red cloud, and a clear Sell signal.
- Chart Pattern: No chart patterns indicating a Bullish reversal.
- 15m Summary: The downtrend is clear and very strong.
-
4-Hour Timeframe (4H):
- SMC: Price is in a correction phase. It has broken below the EMA 50 and is testing the EMA 200.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (Resistance): $68,000 - $69,000.
- Sellside Liquidity (Support): EMA 200 (approximately $60,000), $58,000 (previous Demand Zone).
- Money Flow: Negative (Outflow).
- EMA: EMA 50 (yellow) crossed below EMA 200 (white) (Death Cross). This is a Bearish signal in the medium term.
- Trend Strength: Red cloud indicating a medium-term downtrend.
- Chart Pattern: No clear Bullish reversal pattern.
- 4H Summary: Confirms the medium-term correction. The trend is down.
-
Daily Timeframe (Day):
- SMC: The long-term uptrend structure is not yet broken (it has not made a Lower Low below $59,000 - $60,000). However, the latest candlestick is a Bearish Engulfing, which is a significant reversal signal, and the speed and strength of the drop indicate increasing weakness.
- ICT Buyside & Sellside Liquidity:
- Buyside Liquidity (Resistance): $72,000, $75,000 (All-Time High).
- Sellside Liquidity (Support): $60,000 (key psychological support, previous Low), $58,000, and $50,000 - $52,000 (EMA 200 and Demand Zone).
- Money Flow: Starting to turn negative (Outflow). This is a significant change and a serious warning sign.
- EMA: EMA 50 (yellow) is still above EMA 200 (white), but the distance between the lines is narrowing.
- Trend Strength: The green cloud is starting to thin, and there was a Neutral signal (previously), and now there is a Sell signal.
- Chart Pattern: Bearish Engulfing - a strong bearish reversal signal.
- Day Summary: The long-term trend is technically still up, but there are several significant warning signs, and there is a high risk of a trend change.
Trading Strategies:
-
Day Trade (15m):
- Main Strategy: Short Selling only. Very high risk.
- Conditions: Wait for a Rebound (temporary upward bounce) to resistance levels (such as the EMA on the 15m TF, or around $68,000). Then, wait for a clear Bearish signal (e.g., Bearish Engulfing, Evening Star, or a breakout of that Rebound to the downside).
- Stop Loss: Strictly above the most recent Swing High of the Rebound.
- Take Profit: Psychological support ($60,000), or lower ($58,000, $56,000). Do not hold for long.
- Warning: Do not counter-trend (do not Buy). The market is extremely volatile.
-
Swing Trade (4H):
- Main Strategy: Wait and See. There are no Buy signals.
- Conditions: Wait for the price to test key support levels (EMA 200 at around $60,000, or $58,000). Then, a clear and strong Bullish reversal signal must be seen (e.g., Bullish Engulfing, Hammer, Morning Star, with high volume) before considering a Buy.
- Stop Loss: Below the support level where you entered.
- Take Profit: Resistance levels ($68,000 - $69,000), or higher if the trend changes.
- Warning: Buying at support without a reversal signal is high risk.
-
Position Trade (Day):
- Main Strategy: Wait and See. It's too early to Buy.
- Conditions: Wait for the price to test very strong support levels ($50,000 - $52,000, which is the EMA 200 and a Demand Zone). Then, a very clear Bullish reversal signal must be seen before considering a Buy. Alternatively, wait for the market structure to turn bullish again (create a Higher High).
- Stop Loss: Below the support level where you entered.
- Take Profit: Depends on the reversal signal and long-term targets.
- Warning: Buying now has a very high risk of further downside.
Important Considerations:
- Volatility: BTC's volatility is extremely high during this period. Price movements can be severe and rapid.
- News: Monitor news and events that could affect the cryptocurrency market.
- False Breakouts/Dead Cat Bounces: Beware of temporary upward bounces (Dead Cat Bounces) before further declines.
- Risk Management: Risk management is paramount. Always use Stop Losses. Do not Overtrade (trade beyond your risk tolerance).
In summary, the Daily chart confirms that the recent sharp drop in BTC is not just a minor blip. It's a significant event that has weakened the uptrend and increased the likelihood of a deeper correction. Caution is paramount.
-
-
@ 4857600b:30b502f4
2025-03-10 12:09:35At this point, we should be arresting, not firing, any FBI employee who delays, destroys, or withholds information on the Epstein case. There is ZERO explanation I will accept for redacting anything for “national security” reasons. A lot of Trump supporters are losing patience with Pam Bondi. I will give her the benefit of the doubt for now since the corruption within the whole security/intelligence apparatus of our country runs deep. However, let’s not forget that probably Trump’s biggest mistakes in his first term involved picking weak and easily corruptible (or blackmailable) officials. It seemed every month a formerly-loyal person did a complete 180 degree turn and did everything they could to screw him over, regardless of the betrayal’s effect on the country or whatever principles that person claimed to have. I think he’s fixed his screening process, but since we’re talking about the FBI, we know they have the power to dig up any dirt or blackmail material available, or just make it up. In the Epstein case, it’s probably better to go after Bondi than give up a treasure trove of blackmail material against the long list of members on his client list.
-
@ 7d33ba57:1b82db35
2025-03-10 11:22:03Roque Nublo & Pico de las Nieves Gran Canaria’s Highest Points
🏞 Roque Nublo (1,813m)
One of the island’s most famous landmarks, this volcanic rock formation offers incredible views after a short (1.5 km) hike. It was once a sacred site for the indigenous Guanche people. On clear days, you can see Mount Teide in Tenerife.⛰ Pico de las Nieves (1,949m) – The Highest Point
A short drive from Roque Nublo, this is Gran Canaria’s highest peak. You’ll get 360° views of the island, including Roque Nublo and the deep ravines of the Caldera de Tejeda. Unlike Roque Nublo, you can drive almost to the top.
🌤 Best Time to Visit:
- Sunrise or sunset for stunning views.
- Bring layers—it can be chilly at higher altitudes.🚗 Getting There:
- Roque Nublo requires a short hike.
- Pico de las Nieves is accessible by car. -
@ 57d1a264:69f1fee1
2025-03-10 10:04:32A presentation by @jsonbits Jason Hester for the 40th CSUN Assistive Technology Conference -
March 10, 2025 – March 14, 2025
originally posted at https://stacker.news/items/908947
-
@ 57d1a264:69f1fee1
2025-03-10 09:35:17Here I am posting a document that presents the Business Model Canvas (BMC) created for “Nasi Goreng Semrawut”, a Micro, Small, and Medium Enterprise (MSME) in Kendal, Central Java, Indonesia. BMC is a strategic management and entrepreneurship tool. It allows us to visualize, assess, and modify business models. It is crucial to understand the core components of a business and how they interact. As a UX researcher, analyzing and understanding the business model is critical to aligning user needs with business goals. This BMC provides the basis for identifying opportunities to improve user experience and drive business growth.
I have broken it down into sections and grouped them carefully and I have clear reasons from a UX perspective why the groupings I have chosen are these points. I explain the UX side more fully on my portfolio website.
For my reflections on this project analyzing the Business Model Canvas of "Nasi Goreng Semrawut" through a UX lens reveals several opportunities for improvement. By focusing on user needs and behaviors, I can enhance the customer experience, streamline operations, and drive business growth. This analysis highlights the importance of integrating UX research into the strategic planning process. By understanding the business model, I can ensure that our UX efforts are aligned with business goals and deliver tangible results.
My website Portfolio👇 https://octoporto.framer.website/blog/business-model-canvas-nasi-goreng-semrawut
Link Project : https://www.figma.com/proto/5LZkoc2uSJ1RTaur4cDVCM/Business-Model-Canvas-Sego-Goreng-Semrawut?page-id=0%3A1&node-id=38-117&viewport=-170%2C587%2C0.16&t=8gt9qNV5G267Xq8B-1&scaling=scale-down&content-scaling=fixed&starting-point-node-id=20%3A3
mirorred from dribbble
originally posted at https://stacker.news/items/908920
-
@ 95cb4330:96db706c
2025-03-10 08:42:59Introduction: Why Small Actions Lead to Huge Success
Most people underestimate the power of small, consistent improvements over time. They chase quick wins and expect success overnight. But the truth is, the most successful people and businesses in the world rely on the power of compounding effort—making small, incremental improvements daily that scale into massive long-term results.
This principle, known as The Law of Compounding Effort, is embraced by Jeff Bezos, Sam Altman, and Peter Thiel. Instead of looking for instant success, they focus on building systems, habits, and investments that grow exponentially over time.
In this article, we’ll break down:
✔ What the Law of Compounding Effort is and why it works
✔ Examples from top entrepreneurs who applied it to build billion-dollar empires
✔ How you can use it to improve your own work, habits, and investments
What Is the Law of Compounding Effort?
The Law of Compounding Effort is based on a simple but powerful idea:
Small, consistent improvements in thinking, decision-making, and execution create exponential results over time.
Instead of trying to make huge leaps all at once, improving just 1% per day leads to massive growth over months and years.
Mathematically, it looks like this:
- If you improve 1% every day for a year → You’ll be 37x better than where you started.
- If you get 1% worse every day → You’ll lose almost all your progress.
This is why daily habits and small decisions matter more than big, one-time actions.
Examples of the Law of Compounding Effort in Action
1. Jeff Bezos and Amazon: Reinvesting for Long-Term Growth
Jeff Bezos didn’t build Amazon into a trillion-dollar empire overnight. He compounded small improvements for decades by:
- Reinvesting Amazon’s profits into better infrastructure, logistics, and technology.
- Focusing on customer obsession, constantly improving Amazon’s efficiency and convenience.
- Scaling AWS (Amazon Web Services) from a side project into the backbone of the internet, generating billions in profit.
Bezos was never focused on short-term profits—he compounded effort and reinvested resources into long-term scalability.
📌 Lesson: Instead of chasing quick money, build systems that get better and stronger over time.
2. Sam Altman and AI: Betting on the Future
Sam Altman, CEO of OpenAI, has built his career by compounding small breakthroughs in artificial intelligence:
- He funded AI research when others ignored it, knowing that small improvements would snowball.
- He scaled OpenAI’s models like GPT-4, refining them step by step to become industry-changing technologies.
- He invests in AI infrastructure, believing that today’s progress will lead to exponential advancements in the future.
Altman’s entire strategy is about playing the long game—knowing that AI’s compounding improvements will change everything.
📌 Lesson: The biggest future opportunities come from compounding small improvements today.
3. Peter Thiel and Facebook: The Power of Network Effects
Peter Thiel was one of the first investors in Facebook, putting in $500,000 when few people saw its potential.
Why? He understood the compounding nature of network effects:
- As more users joined Facebook, its value increased exponentially.
- More advertisers came, bringing more revenue and funding more innovation.
- Facebook scaled from a small project to a multi-billion-dollar company.
Thiel’s investment in Facebook was a classic compounding success—he saw the long-term potential, not just the short-term returns.
📌 Lesson: The best investments grow stronger over time—look for compounding effects in business, investing, and technology.
How to Apply the Law of Compounding Effort in Your Own Life
You don’t need to be a billionaire to apply this principle—compounding effort works in every area of life.
1. Improve 1% Every Day
If you get slightly better every day, the results compound into massive progress.
Ask yourself:
- What’s one skill I can improve today?
- How can I refine my decision-making?
- What process can I optimize for long-term growth?📌 Example: Investing → Instead of trying to "get rich quick," invest consistently, reinvest profits, and let your portfolio compound over years.
2. Focus on Scalable Actions
Not all work compounds. Focus on efforts that scale and grow over time, like:
✅ Building a brand → Content, reputation, and trust compound.
✅ Investing in automation → Systems that work for you 24/7.
✅ Compounding relationships → The right connections open exponential opportunities.📌 Example: Business Growth → Instead of doing one-time sales, build a repeatable system that grows without constant effort.
3. Avoid Negative Compounding
Just as small positive actions build up over time, bad habits and decisions compound negatively.
Ask yourself:
- Am I wasting time on low-value tasks?
- Am I making impulsive decisions instead of strategic ones?
- Am I neglecting habits that will improve my long-term growth?📌 Example: Health & Productivity → Small unhealthy choices compound into major problems later. But small positive habits compound into a strong body and sharp mind.
Final Thoughts: Small Wins, Big Results
The Law of Compounding Effort proves that success isn’t about big, flashy moves—it’s about consistent, focused progress over time.
🔹 Jeff Bezos built Amazon by reinvesting and compounding small efficiencies.
🔹 Sam Altman bet on AI, knowing that small breakthroughs would add up.
🔹 Peter Thiel invested in Facebook, recognizing its compounding network effects.And you can do the same.
💡 Action Step: Find one habit, process, or investment you can improve by 1% today. Stick with it, and let it compound over time.
Resources to Learn More
- 📖 The Power of Compounding – Farnam Street
- 🎥 Jeff Bezos on Long-Term Thinking – Harvard Business Review
- 📰 Sam Altman on Compounding Success – Blog
🚀 The best results don’t come from one big move. They come from small, consistent improvements over time. Start compounding today!
-
@ 95cb4330:96db706c
2025-03-10 08:34:05Introduction: The Power of the Few
Most people assume that effort and results follow a linear relationship—that every action contributes equally to success. However, reality follows a very different pattern: Power Laws.
The Power Law Principle, championed by thinkers like Peter Thiel and Jeff Bezos, states that a small number of key efforts drive the majority of outcomes. Instead of distributing energy evenly across tasks, investments, or decisions, the smartest individuals and companies focus on the few areas that truly matter—the ones that yield outsized returns.
In this article, we’ll explore:
✔ What the Power Law is and why it matters
✔ Examples of Power Laws in business and investing
✔ How to apply the Power Law Principle in your own work and life
What Is the Power Law?
The Power Law is a mathematical relationship where a small input leads to a disproportionately large output. It is the foundation of Pareto’s Principle (the 80/20 rule), which states that:
- 80% of results come from 20% of efforts
- 80% of revenue comes from 20% of customers
- 80% of profits come from 20% of investments
But Power Laws go even further. In reality, it’s not just 80/20—it’s often 90/10 or even 99/1.
In venture capital, for example, a handful of companies (like Facebook, Google, and Tesla) account for nearly all of the industry’s profits. If you had invested in 100 startups, it wouldn’t be the case that 20 of them returned good money—it would be that just one or two produced nearly all the profits, while the rest failed or broke even.
Power Laws appear everywhere in business, investing, technology, and even personal development.
Examples of the Power Law in Action
1. Venture Capital: Peter Thiel and Facebook
Peter Thiel, co-founder of PayPal and early investor in Facebook, built his fortune using Power Law thinking.
- In 2004, he invested $500,000 in Facebook—a small startup most people ignored.
- That one investment turned into billions of dollars, while dozens of other startups he backed failed.
- One bet made up for every loss—and much more.
Thiel himself says:
"We don’t live in a normal world. We live under a Power Law."
Venture capitalists don’t succeed by investing in 100 decent companies—they succeed by finding the 1 company that dominates an industry.
2. Jeff Bezos and AWS: One Decision That Built a Trillion-Dollar Empire
Amazon started as an online bookstore, but one decision made Amazon a tech giant: Amazon Web Services (AWS).
- In the early 2000s, Jeff Bezos realized that cloud computing could be the foundation of the internet.
- He shifted massive resources into AWS, even though it had nothing to do with selling books.
- AWS became the backbone of the internet, powering companies like Netflix, Airbnb, and even government agencies.
- Today, AWS generates over 60% of Amazon’s total profits, funding Amazon’s entire e-commerce business.
Without one key decision, Amazon might still just be an online retailer. But by following the Power Law, Bezos doubled down on what truly mattered—and that made all the difference.
3. Sam Altman and AI: Betting on the Future
Sam Altman, CEO of OpenAI, has focused his entire career on one high-upside opportunity: Artificial Intelligence (AI).
- Instead of investing in many different technologies, he put all his energy into AI.
- He believes AI will reshape every industry, making it one of the highest-upside bets in history.
- OpenAI’s ChatGPT is now one of the fastest-growing software products ever, with 100 million+ users in a matter of months.
Altman’s approach? Find the area with the biggest possible impact—and go all in.
How to Apply the Power Law Principle in Your Life
Most people waste time by treating all tasks equally. But if you want real success, you need to identify and focus on the few things that actually matter.
1. Identify the 20% That Drives 80% of Results
Ask yourself:
- What 20% of my efforts produce 80% of my success?
- Which investments or decisions have the biggest impact?
- What skills, relationships, or habits generate the highest returns?
2. Cut the Noise—Eliminate Low-Impact Tasks
Once you identify the high-impact areas, cut distractions mercilessly.
- In investing: Stop spreading your money across 20 mediocre bets. Instead, find the 1-2 asymmetric opportunities that could change everything.
- In business: Instead of launching 10 different products, focus on the one product that dominates your industry.
- In personal development: Instead of learning random skills, master one rare, valuable skill that sets you apart.
3. Double Down on What Works
Once you find what works, go all in.
- If a stock, business, or skill is compounding massively, allocate more resources to it.
- If an investment is performing exponentially better than others, increase your stake.
- If one product or strategy is dominating the market, scale it up aggressively.
Most people diversify too much because they’re afraid of missing out. But true success comes from concentrating on what actually works.
Final Thoughts: The Few That Matter
The Power Law is one of the most important concepts in business, investing, and life. The majority of success comes from a small number of actions—so the key is to:
✅ Find the few things that truly drive results
✅ Eliminate distractions and low-impact efforts
✅ Double down on what works and scale it massivelyThe difference between mediocrity and massive success is simple:
Most people work hard on everything. The smartest people work hard on the right things.
Start thinking in Power Laws—and you’ll see exponential results. 🚀
Resources to Learn More
- 📖 Understanding Power Laws – Farnam Street
- 🎥 Peter Thiel on Power Laws in Investing – NFX
- 📰 How to Apply Power Laws in Business – Medium
Action Step: 🔥 Look at your current projects, tasks, or investments. What is the 20% that drives 80% of your success? Cut the rest, and focus more on what truly matters.
Let me know what you think—drop a comment below! 🚀
-
@ b8af284d:f82c91dd
2025-03-10 08:28:07Liebe Abonnenten,
800 Milliarden Euro will die EU ausgeben, um die Ukraine und den Kontinent in ein “stählernes Stachelschwein” zu verwandeln. Deutschland selbst will künftig Verteidigungsausgaben aus der Schuldenbremse ausnehmen, was nichts anderes als eine unbegrenzte Kreditlinie für das Militär bedeutet. Hinzu kommt ein “Sondervermögen” in Höhe von 500 Milliarden Euro für Infrastruktur. Das klingt nach einem Spartopf, den man für schwere Zeiten angelegt hat. Es soll die Tatsache verschleiern, dass es sich dabei um Schulden handelt. Der vermutlich baldige Kanzler Friedrich Merz bricht damit sein Wahlversprechen, die Schuldenbremse einzuhalten. Beschließen soll das Paket noch ein abgewählter Bundestag, da im neuen wohl die Mehrheit fehlt.
Womit also ist zu rechnen, wenn demnächst fast eine Billion frisch gedruckte Euro in Drohnen, Panzer und Raketen investiert werden?
Das beste Beispiel der jüngeren Geschichte ist China: 2009 legte die chinesische Regierung das bisher größte Infrastrukturprojekt der Welt in Höhe von 440 Milliarden Euro auf. Finanziert wurde es durch günstige Kredite, die vor allem an Staatsunternehmen vergeben wurden. Nachdem die Welt nach der in den USA ausgelösten Immobilienkrise 2008 in die Rezession gerutscht war, „rettete“ dieses Paket die globale Konjunktur. China hatte zu diesem Zeitpunkt großen Bedarf an Flughäfen, Straßen und vor allem Zügen. Das Paket war riskant: Schier unbegrenztes Geld, das begrenzten Waren hinterherjagt, führt zu Inflation. Billige Kredite führen meist dazu, dass Unternehmen nicht mehr effizient wirtschaften, und Schuldenberge vor sich her wälzen.
Allerdings wurde das Geld in Produktivität investiert. Denn wenn Menschen und Waren einfacher reisen können, nimmt die Geschäftstätigkeit zu: Arbeitnehmer werden mobiler, Unternehmen konkurrenzfähiger, die Preise sinken. Die Investitionen lohnen sich also, weil sie zu mehr Wirtschaftswachstum führen. Vereinfacht gesagt: Die Schulden können zurückgezahlt werden, und am Ende bleibt noch mehr übrig. In diesem Fall führen Schulden nicht zu Inflation: Durch die gesteigerte Produktivität stehen jetzt sogar mehr Waren der Geldmenge gegenüber.
15 Jahre später kämpft die zweitgrößte Volkswirtschaft zwar noch immer mit den Problemen, die aus diesem Paket resultieren - die Immobilienkrise ist eine indirekte Folge davon. Trotzdem war das Programm ein Erfolg: die Städte, Flughäfen und vor allem Zugstrecken führten zu einer höheren wirtschaftlichen Aktivität oder Produktivität. China ist heute ein wesentlich moderneres Land als vor dem Paket, und verfügt über modernste und größte Netz aus Hochgeschwindigkeitszügen der Welt. Neue Schulden können positiv sein - wenn das Geld produktiv investiert wird.
Auch in Europa lassen sich mit dem Geld-Paket zunächst mehrere Probleme auf einmal lösen: Deutschland ist noch immer ein Industriestandort mit hohen Produktionskapazitäten. Werke der Auto- und Zulieferindustrie können theoretisch zur Waffenproduktion umfunktioniert werden. Immer noch besser als sie stillzulegen oder an die Chinesen zu verkaufen, werden viele Kommentatoren schreiben.
Allein in der deutschen Automobil-Zulieferindustrie sind im vergangenen Jahr über 19000 Arbeitsplätze verloren gegangen. Viele von den Entlassenen können nun Arbeit in der Rüstungsindustrie finden. Oder wie Hans Christoph Atzpodien, Hauptgeschäftsführer des Bundesverbandes der Deutschen Sicherheits- und Verteidigungsindustrie in der WirtschaftsWoche sagt:
„Das Motto muss lauten: Autos zu Rüstung! Anstatt einen volkswirtschaftlichen Schaden durch den Niedergang der Auto-Konjunktur zu beklagen, sollten wir versuchen, Produktionseinrichtungen und vor allem Fachkräfte aus dem Automobilsektor möglichst verträglich in den Defence-Bereich zu überführen“
Immerhin: ein großer Teil des Geldes soll auch in Infrastrukturprojekte fließen: Brücken, Bahn, Internetausbau. Deutschland, und damit Europa, wird in den kommenden Monaten also eine große Party feiern, die über die Tatsache hinwegtäuschen wird, dass man einen dummen Krieg verloren hat. In den kommenden Monaten werden sich Verbände und Organisationen um das Geld reißen. Das Geld wird ein auch kollektiv-psychologisches Ventil sein, um das eigene Versagen bei Corona, Klima und Ukraine vergessen zu machen.
Es gibt allerdings einen wesentlichen Unterschied zum chinesischen Stimulus-Paket 2009: Rüstungsgüter sind im Gegensatz zu Zugstrecken totes Kapital. Eine neue Drohne oder Panzer führt nicht zu mehr Produktivität, im Gegenteil: Kommen sie zum Einsatz, zerstören sie Brücken, Häuser, Straßen und töten Menschen. Die Produktivität sinkt also. Im besten Fall kann Militärgerät herumstehen und vor sich hin rosten. Auch dann aber ist es „totes Kapital“, das nichts zur Produktivität beiträgt. Kommt es zum Einsatz, stehen der nun verringerten Warenmenge eine noch größere Geldmenge gegenüber. Die Inflation steigt.
Schleichende Militarisierung
Auch gesellschaftlich wird das Paket mit seinem Blanko-Scheck für die Verteidigungsindustrie viel verändern: Es kommt zu einer „Eichung“ der Gesellschaft, eine kollektive Abscheu des gemeinsamen Feindes. Scharfmacher, eigentlich mittelmäßiger Akademiker und Bürokraten, wie Carlo Masala und Claudia Major werden eine noch größere Rolle im öffentlichen Diskurs spielen und die Talkshows dominieren, die von einer immer älter werdenden deutschen Bevölkerung geglotzt werden. Abweichende Meinungen auf Online-Plattformen zensiert, unter dem Vorwand, die Demokratie sei in Gefahr:
Da die Rüstungsindustrie dann eine wichtigere Rolle für die Gesamtwirtschaft spielt, wird ihr Einfluss auf die Politik in Form von Lobbyisten und Verbänden zunehmen. Politiker merken schnell, dass sie von der medialen Aufmerksamkeitsökonomie nach oben gespült werden, wenn sie immer radikalere Forderungen stellen. So empfahl der ehemalige Außenminister Joschka Fischer die Woche die Wiedereinführung der Wehrpflicht für Männer und Frauen. “Star-Ökonomin” Isabella Weber will die Kriegswirtschaft mitplanen:
\ Der Kontinent wird sich langsam wandeln von einem „Friedensprojekt“ zu einem „metallenen Stachelschwein“, ergo Kriegsprojekt, denn ohne dämonisierten Feind funktioniert das Programm nicht. Der Ton wird rauer, autoritärer, und die Meinungsfreiheit weiter eingeschränkt werden. Die seit 2020 eingeführten Werkzeuge zur soften Propaganda („kognitive Kriegsführung”) werden verfeinert und ausgebaut werden, sodass weiterhin 80 Prozent der Bevölkerung alle noch so antihumanen Maßnahmen gutheißen werden.
Und dann?
Wie Julian Assange einmal sagte: “Das Ziel ist kein erfolgreicher Krieg. Das Ziel ist ein endloser Krieg.” Der Konflikt muss weitergehen, ewig schwelen oder ein neuer gefunden werden, da sonst ein Teil der Wirtschaftsleistung kollabiert.
Nach ein, zwei oder auch erst drei Jahren, werden erste Probleme sichtbar. Die Party endet, der Kater setzt langsam ein. Die Finanzierung an den Kapitalmärkten wird für Deutschland immer kostspieliger. Der Schuldendienst wird einen größeren Teil des Haushalts einnehmen. Die Bürger müssen dies mitfinanzieren. Der voraussichtlich neue Bundeskanzler Friedrich Merz sprach bereits von der „Mobilisierung der deutschen Sparguthaben“.
\ Was im Ersten Weltkrieg „Kriegsanleihen“ hieß, wird einen schickeren Namen bekommen wie „olivgrüne Bonds“. You name it. Alternativ lässt sich ein Verteidigungs-Soli einführen, oder das Kindergeld streichen, wie kürzlich Ifo-Chef Clemens Fuest forderte.
Was kann man tun? Auf BlingBling geht es um konkrete Tipps, welche Anlagen von dieser Entwicklung profitieren werden. Außerdem geht es um die “Strategische Bitcoin Reserve”, die am Donnerstag beschlossen wurde.
-
@ da0b9bc3:4e30a4a9
2025-03-10 07:34:20Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/908874
-
@ fb8a5c6f:58ec79bd
2025-03-10 00:39:53I work in the film industry, and I absolutely love making movies—it’s where my heart is. I’m also passionate about bitcoin. For me, it’s not just about the thrill of "number go up," but a deeper realization over the past 12 years: inflation is a theft of our time and energy. Whether I’m writing or revising a script or thinking about the world we live in, I believe our lives shouldn’t get progressively more expensive just by existing.\ \ A few months ago, I saw a viral video that drove this home. A young guy shared how a month’s worth of groceries cost him $126 back in 2022. When he hit the "re-order" button for the same items in the summer of 2024—just two years later—it was $414. That’s staggering. People are working harder than ever, pouring their souls into their craft yet they can’t figure out why they’re not getting ahead. Inflation is a big part of the answer.\ \ It’s frustrating because it didn’t always used to be this way. Today, the Federal Reserve and the U.S. Treasury keep printing money out of thin air, devaluing what we earn and making life more expensive year after year. I understood the problem for a while, but it wasn’t until I discovered bitcoin that I found a solution. A fixed and finite currency. \ \ There will only ever be 21 million.\ \ Naturally, when you grasp what bitcoin is, you want to share it with the people you care about. I’ve been fortunate—my friends get it, and they’re doing great. My family, though? Not so much. Yesterday, my aunt suggested I talk to them as a group instead of one-on-one, like I’d been trying, so they could ask questions and discuss it together. I thought it was interesting idea, but money is such a personal topic. We all have to find our own path to understanding it, and bringing it up with family can get tricky—almost like pitching a script they’re not ready to hear.\ \ So, what did I do instead? I'm sharing these thoughts online and started a Youtube channel. Go figure. Don't judge too harshly though as it's a work in progress! 🫡\ \ It’s not so different from storytelling through film—just another way to share what matters.\ \ I don’t know how often I’ll write long form posts or make videos about bitcoin, but if I can help even one person pinpoint the problem and discover bitcoin along the way, I believe the world gets a little better. Bit by bit, person by person. Just like how a good movie can inspire, maybe this can too.
Fix the money, fix the world.\ ∞ / 21 million
-
@ f3873798:24b3f2f3
2025-03-10 00:32:44Recentemente, assisti a um vídeo que me fez refletir profundamente sobre o impacto da linguagem na hora de vender. No vídeo, uma jovem relatava sua experiência ao presenciar um vendedor de amendoim em uma agência dos Correios. O local estava cheio, as pessoas aguardavam impacientes na fila e, em meio a esse cenário, um homem humilde tentava vender seu produto. Mas sua abordagem não era estratégica; ao invés de destacar os benefícios do amendoim, ele suplicava para que alguém o ajudasse comprando. O resultado? Ninguém se interessou.
A jovem observou que o problema não era o produto, mas a forma como ele estava sendo oferecido. Afinal, muitas das pessoas ali estavam há horas esperando e perto do horário do almoço – o amendoim poderia ser um ótimo tira-gosto. No entanto, como a comunicação do vendedor vinha carregada de desespero, ele afastava os clientes ao invés de atraí-los. Esse vídeo me tocou profundamente.
No dia seguinte, ao sair para comemorar meu aniversário, vi um menino vendendo balas na rua, sob o sol forte. Assim como no caso do amendoim, percebi que as pessoas ao redor não se interessavam por seu produto. Ao se aproximar do carro, resolvi comprar dois pacotes. Mais do que ajudar, queria que aquele pequeno gesto servisse como incentivo para que ele continuasse acreditando no seu negócio.
Essa experiência me fez refletir ainda mais sobre o poder da comunicação em vendas. Muitas vezes, não é o produto que está errado, mas sim a forma como o vendedor o apresenta. Quando transmitimos confiança e mostramos o valor do que vendemos, despertamos o interesse genuíno dos clientes.
Como a Linguagem Impacta as Vendas?
1. O Poder da Abordagem Positiva
Em vez de pedir por ajuda, é importante destacar os benefícios do produto. No caso do amendoim, o vendedor poderia ter dito algo como: "Que tal um petisco delicioso enquanto espera? Um amendoim fresquinho para matar a fome até o almoço!"
2. A Emoção na Medida Certa
Expressar emoção é essencial, mas sem parecer desesperado. Os clientes devem sentir que estão adquirindo algo de valor, não apenas ajudando o vendedor.
3. Conheça Seu Público
Entender o contexto é fundamental. Se as pessoas estavam com fome e impacientes, uma abordagem mais objetiva e focada no benefício do produto poderia gerar mais vendas.
4. Autoconfiança e Postura
Falar com firmeza e segurança transmite credibilidade. O vendedor precisa acreditar no próprio produto antes de convencer o cliente a comprá-lo.
Conclusão
Vender é mais do que apenas oferecer um produto – é uma arte que envolve comunicação, percepção e estratégia. Pequenos ajustes na abordagem podem transformar completamente os resultados. Se o vendedor de amendoim tivesse apresentado seu produto de outra maneira, talvez tivesse vendido tudo rapidamente. Da mesma forma, se cada um de nós aprender a se comunicar melhor em nossas próprias áreas, poderemos alcançar muito mais sucesso.
E você? Já passou por uma experiência parecida?
-
@ 8d34bd24:414be32b
2025-03-10 00:16:01The Bible tells believers repeatedly that we are to share the gospel, make disciples, speak the truth, etc. We are to be His witnesses. The reason we don’t go straight to heaven when we are saved is that God has a purpose for our lives and that is to be a light drawing people to Him.
“…but you will receive power when the Holy Spirit has come upon you; and you shall be My witnesses both in Jerusalem, and in all Judea and Samaria, and even to the remotest part of the earth.” (Acts 1:8)
In order to be His witness, we have to know Him and know His word. When we don’t know His word, we can be misled and/or mislead others. We will fail in our mission to be witnesses if we don’t regularly study the Bible and spend time in prayer with our God.
As a result, we are no longer to be children, tossed here and there by waves and carried about by every wind of doctrine, by the trickery of men, by craftiness in deceitful scheming; but speaking the truth in love, we are to grow up in all aspects into Him who is the head, even Christ, from whom the whole body, being fitted and held together by what every joint supplies, according to the proper working of each individual part, causes the growth of the body for the building up of itself in love. (Ephesians 4:4-16) {emphasis mine}
In addition to knowing Him and His word, we need to be bold and unashamed.
Therefore do not be ashamed of the testimony of our Lord or of me His prisoner, but join with me in suffering for the gospel according to the power of God, who has saved us and called us with a holy calling, not according to our works, but according to His own purpose and grace which was granted us in Christ Jesus from all eternity, but now has been revealed by the appearing of our Savior Christ Jesus, who abolished death and brought life and immortality to light through the gospel, (2 Timothy 1:8-10) {emphasis mine}
We were called according to His purpose. His purpose was known before the creation of the world. We are not saved by works, but if we are saved, works should naturally proceed from the power of the Holy Spirit within us, as well as the thankfulness we should have because of what Jesus did for us.
The key point of our witness is obedience. We are a tool of God. We are to faithfully share the Gospel and the truth in God’s word, but we are not held accountable for the result of this witness. The results are due to God’s mercy and power and not due to anything we do.
But you shall speak My words to them whether they listen or not, for they are rebellious.
“Now you, son of man, listen to what I am speaking to you; do not be rebellious like that rebellious house. Open your mouth and eat what I am giving you.” (Ezekiel 2:7-8) {emphasis mine}
When we witness, some will listen and some will not. Some will accept Jesus with joy and some will reject Him in anger. That is not our concern. God calls whom He will and without His calling, nobody comes to Him.
And they took offense at Him. But Jesus said to them, “A prophet is not without honor except in his hometown and in his own household.” (Matthew 13:57)
One thing I’ve noticed is that the hardest people to witness to are family (not counting kids, but especially parents and siblings) and other people who have known us for a long time. They see what we were and not what we now are. There is baggage that can make for awkward dynamics. As someone once said to me, “It is hard to teach anyone or convince anyone who changed your diaper.”
I started with the Acts 1:8, “… be My witnesses both in Jerusalem, and in all Judea and Samaria, and even to the remotest part of the earth.” This is like saying “be My witnesses in my hometown, my state, my country, and even to the remotest part of the earth.” Our witness starts at home, then our community, and works it way out. Everyone can witness at home. We can all witness in our community as we go about our daily actions. It is important to have Christians that go to the “remotest part of the earth,” especially to unreached people groups, but that isn’t where most of us are sent. Most of us are called to witness to those around us daily.
For you are not being sent to a people of unintelligible speech or difficult language, but to the house of Israel, nor to many peoples of unintelligible speech or difficult language, whose words you cannot understand. But I have sent you to them who should listen to you; (Ezekiel 3:5-6) {emphasis mine}
God empowers some to be international missionaries, but He calls every Christian to be a life missionary. Sometimes this may just be living a life for Jesus that stands out in the culture. Sometimes this may be giving an in-depth treatise on the Gospel and the Bible. It will look differently in different seasons of life and on different days, but it should be a regular part of our life.
As we build relationships with people and show that we care about them, this usually gives us the opportunity to share with them why our lives look different. It demonstrates why we treat others well, why we are loving, and why we have joy, even when our circumstances don’t seem like they should lead to joy. Then when they ask why we are different, we can have the opportunity to tell why we have this joy and love and morality.
but sanctify Christ as Lord in your hearts, always being ready to make a defense to everyone who asks you to give an account for the hope that is in you, yet with gentleness and reverence; (1 Peter 3:5)
Although following a person and forcing them to listen to the Gospel is not the way to draw someone to Jesus, we need to not be silent about the truth. Not being pushy doesn’t mean being silent when someone is forcing their ungodly views on us or on others. Speaking up prevents evil voices from taking control. You also might be surprised to find that others didn’t like what was being said, but were too afraid to speak up because they thought everyone agreed with the speaker. When you speak up for the truth, it can give others courage to stand on their convictions and to draw closer to Jesus, whether this means they come to salvation or just draw closer to God.
Moreover, He said to me, “Son of man, take into your heart all My words which I will speak to you and listen closely. Go to the exiles, to the sons of your people, and speak to them and tell them, whether they listen or not, ‘Thus says the Lord God.’ ” (Ezekiel 3:10-11) {emphasis mine}
We are to speak the truth in love whether they listen or not. Some will listen, hear, and come to Jesus. Some will listen and reject what is said. We are only called to obey the call. God brings the increase. To God be the glory!
May God guide us and lead us in wisdom, love, and courage so that our light shines so brightly that many unsaved come to trust in Jesus Christ our Lord and that those who know Jesus, but have not matured, may grow in their faith, knowledge, and obedience to Jesus.
Trust Jesus
-
@ 4925ea33:025410d8
2025-03-09 22:56:19O que é melasma?
Segundo a Sociedade Brasileira de Dermatologia, o melasma é uma condição caracterizada pelo surgimento de manchas escuras na pele, mais comumente no rosto. No entanto, também pode ocorrer em outras áreas do corpo, como braços, pescoço e colo.
Essas manchas possuem tonalidade acastanhada, formato irregular e bem definido, sendo geralmente simétricas (iguais nos dois lados do rosto).
A causa exata do melasma ainda não é totalmente conhecida. De acordo com o Hospital Albert Einstein, essa condição está relacionada à superprodução de melanina (pigmento que dá cor à pele) ou à dilatação excessiva dos vasos sanguíneos, o que desencadeia inflamação em regiões específicas do rosto.
Os melasmas podem ser classificados em três tipos:
Epidérmico – Atinge a camada mais superficial da pele.
Dérmico – Ocorre nas camadas mais profundas.
Misto – Atinge tanto as camadas superficiais quanto as profundas.
A classificação do melasma é fundamental para a escolha do tratamento adequado.
Tratamento do melasma
O tratamento convencional envolve o uso de agentes clareadores, peelings químicos e cuidados preventivos, como a aplicação diária de protetor solar. Embora esses métodos sejam eficazes, podem ser agressivos para peles sensíveis. É aí que a aromaterapia surge como uma opção complementar, oferecendo uma abordagem mais natural e holística.
Como a Aromaterapia pode ajudar no tratamento do melasma?
A aromaterapia considera o corpo como um todo, tratando não apenas as manchas, mas também possíveis causas subjacentes, como desequilíbrios hormonais e inflamações. Além disso, os óleos essenciais possuem propriedades despigmentantes, cicatrizantes e regeneradoras da pele.
Óleos essenciais recomendados para melasma
Óleo essencial de Gerânio – Regula os hormônios femininos e auxilia no clareamento de manchas relacionadas ao envelhecimento.
Óleo essencial de Vetiver – Favorece a regeneração celular, ajudando a reduzir manchas e prevenir o ressecamento.
Óleo essencial de Copaíba – Possui ação anti-inflamatória e auxilia no controle da oleosidade.
Óleo essencial de Tea Tree (Melaleuca) – Ajuda a prevenir espinhas e melhora manchas causadas pela acne.
Óleo essencial de Lavanda– Com propriedades cicatrizantes e anti-inflamatórias, acelera a regeneração da pele.
Óleo essencial de Olíbano – Rico em antioxidantes, combate os sinais de envelhecimento e melhora a textura da pele.
Cuidados ao usar a aromaterapia no melasma
A aplicação direta de óleos essenciais na pele exige cuidado. Como o melasma pode estar associado a processos inflamatórios, o uso inadequado dos óleos pode piorar a condição ou até causar danos irreversíveis.
Dicas de segurança:
Sempre dilua os óleos essenciais em um óleo vegetal (como rosa mosqueta ou jojoba) antes da aplicação tópica.
Evite óleos essenciais cítricos (como limão e laranja) durante o dia, pois são fotossensíveis e podem manchar ainda mais a pele.
Consulte um aromaterapeuta ou dermatologista para um tratamento personalizado.
Se você gostou deste artigo, compartilhe com quem precisa saber mais sobre o poder da aromaterapia! E se tiver dúvidas, deixe seu comentário.
-
@ 732c6a62:42003da2
2025-03-09 22:36:26Não são recentes as táticas da esquerda de tentar reprimir intelectualmente seus opositores na base do deboche, da ironia, do desprezo e do boicote à credibilidade. Até Marx usava ironia para chamar os críticos de "burgueses iludidos". A diferença é que, no século XXI, trocaram o manifesto comunista por threads no Twitter e a dialética por memes de mau gosto.
A Falácia da Superioridade Moral
O debate sobre o "pobre de direita" no Brasil é contaminado por uma premissa tácita da esquerda: a ideia de que classes baixas só podem ter consciência política se aderirem a pautas progressistas. Quem ousa divergir é tratado como "traidor de classe", "manipulado", "ignorante", ou até vítimas de deboches como alguma pessoa com um qi em temperatura ambiente repetir diversas vezes "não é possível que ainda exista pobre de direita", "nunca vou entender pobre de direita", ou "pobre de direita é muito burro, rico eu até entendo", como se o autor dessas frases fosse o paladino dos mais oprimidos e pobres. Esse discurso, porém, não resiste a uma análise empírica, histórica ou sociológica.
Contexto Histórico: A Esquerda e o Mito do "Voto Consciente"
A noção de que o pobre deve votar na esquerda por "interesse de classe" é herança do marxismo ortodoxo, que via a política como mero reflexo da posição econômica. No entanto, a realidade é mais complexa:
- Dados do Latinobarómetro (2022): 41% dos brasileiros de baixa renda (até 2 salários mínimos) apoiam redução de impostos e maior liberdade econômica — pautas tradicionalmente associadas à direita.
- Pesquisa IPEC (2023): 58% dos pobres brasileiros priorizam "segurança pública" como principal demanda, acima de "distribuição de renda".
Esses números não são acidentais. Refletem uma mudança estrutural: o pobre moderno não é mais o "operário industrial" do século XX, mas um empreendedor informal, motorista de app, ou microempresário — figuras que valorizam autonomia e rejeitam paternalismo estatal. Eles dizem não entender o pobre de direita e que nunca vai entendê-los, mas o fato é que não entendem porque nunca conversaram com um sem fazer cara de psicólogo de posto de saúde. Sua "preocupação" é só uma máscara para esconder o desprezo por quem ousa pensar diferente do seu manual de "oprimido ideal".
Se ainda não entenderam:
Direita ≠ rico: Tem gente que trabalha 12h/dia e vota em liberal porque quer ser dono do próprio negócio, não pra pagar mais taxação pra você postar meme no Twitter.
Acham que são o Sherlock Holmes da pobreza: o palpite de que "o pobre é manipulado" é tão raso quanto sua compreensão de economia básica.
A Psicologia por Trás do Voto Conservador nas Periferias
A esquerda atribui o voto pobre em direita a "falta de educação" ou "manipulação midiática". Essa tese é não apenas elitista, mas cientificamente falsa:
Análise Psicológica Básica (para você que se acha o Paulo Freire):
- Síndrome do Branco Salvador: Acha que o pobre é uma criatura tão frágil que precisa de você pra pensar. Spoiler: ele não precisa.
- Viés da Superioridade Moral: "Se você é pobre e não concorda comigo, você é burro". Parabéns, recriou a escravidão intelectual.
- Efeito Dunning-Kruger: Não sabe o que é CLT, mas dá palpite sobre reforma trabalhista.- Estudo da Universidade de São Paulo (USP, 2021): Entre moradores de favelas, 63% associam políticas de segurança dura (como "bandido bom é bandido morto") à proteção de seus negócios e famílias. Para eles, a esquerda é "branda demais" com o crime.
- Pesquisa FGV (2020): 71% dos trabalhadores informais rejeitam aumentos de impostos, mesmo que para financiar programas sociais. Motivo: já sofrem com a burocracia estatal para legalizar seus negócios.
Esses dados revelam uma racionalidade prática: o pobre avalia políticas pelo impacto imediato em sua vida, não por abstrações ideológicas. Enquanto a esquerda fala em "reforma estrutural" e tenta importar discursos estrangeiros para debate, por exemplo, o tema irrelevante do pronome neutro, ele quer resolver problemas como:
- Violência (que afeta seu comércio);
- Impostos (que consomem até 40% do lucro de um camelô);
- Burocracia (que impede a legalização de sua barraca de pastel).
Religião, Valores e a Hipocrisia do "Ateísmo de Redes Sociais"
A esquerda subestima o papel da religião na formação política das classes baixas. No Brasil, 76% dos evangélicos são pobres (Datafolha, 2023), e suas igrejas promovem valores como:
- Família tradicional (contra pautas progressistas como ideologia de gênero em escolas);
- Auto-responsabilidade (ênfase em "trabalho duro" em vez de assistencialismo).Exemplo Concreto:
Nas favelas de São Paulo, pastores evangélicos são frequentemente eleitos a cargos locais com plataformas anticrime e pró-mercado. Para seus eleitores, a esquerda urbana (que defende descriminalização de drogas e críticas à polícia) representa uma ameaça ao seu estilo de vida.
A Esquerda e seu Desprezo pela Autonomia do Pobre
O cerne do debate é a incapacidade da esquerda de aceitar que o pobre possa ser autônomo. Algumas evidências:
O Caso dos Empreendedores Informais
- Segundo o IBGE (2023), 40% dos trabalhadores brasileiros estão na informalidade. Muitos veem o Estado como obstáculo, não aliado. Políticas de direita (como simplificação tributária) são mais atraentes para eles que o Bolsa Família.
A Ascensão do Conservadorismo Periférico
- Pessoas assim tem um pensamento simples. Sua mensagem: "Queremos empreender, não depender de político."
A Rejeição ao "Vitimismo"
- Pesquisa Atlas Intel (2022): 68% dos pobres brasileiros rejeitam o termo "vítima da sociedade". Preferem ser vistos como "lutadores".
A projeção freudiana "o pobre é burro porque eu sou inteligente"
O deboche esquerdista esconde um complexo de inferioridade disfarçado de superioridade moral. É a Síndrome do Salvador em sua forma mais patética:
- Passo 1: Assume-se que o pobre é um ser desprovido de agência.
- Passo 2: Qualquer desvio da narrativa é atribuído a "manipulação da elite".
- Passo 3: Quem critica o processo é chamado de "fascista".Exemplo Prático:
Quando uma empregada doméstica diz que prefere o livre mercado a programas sociais, a esquerda não pergunta "por quê?" — ela grita "lavagem cerebral!". A ironia? Essa mesma esquerda defende a autonomia feminina, exceto quando a mulher é pobre e pensa diferente.Dados Globais: O Fenômeno Não é Brasileiro
A ideia de que "pobre de direita" é uma anomalia é desmentida por evidências internacionais:
- Estados Unidos: 38% dos eleitores com renda abaixo de US$ 30k/ano votaram em Trump em 2020 (Pew Research). Motivos principais: conservadorismo social e rejeição a impostos. A esquerda: "vítimas da falsa consciência". Mais um detalhe: na última eleição de 2024, grande parte da classe "artística" milionária dos Estados Unidos, figuras conhecidas, promoveram em peso a Kamala Harris, do Partido Democrata. Percebe como a esquerda atual é a personificaçãoda burguesia e de só pensar na própria barriga?
- Argentina: Javier Milei, libertário radical, quando candidato, tinha forte apoio nas villas miseria (favelas). Seu lema — "O estado é um parasita" — ressoa entre quem sofria com inflação de 211% ao ano.
- Índia: O partido BJP (direita nacionalista) domina entre os pobres rurais, que associam a esquerda a elites urbanas desconectadas de suas necessidades.
A história que a esquerda tenta apagar: pobres de direita existem desde sempre
A esquerda age como se o "pobre de direita" fosse uma invenção recente do MBL, mas a realidade é que classes baixas conservadoras são regra, não exceção, na história mundial:
- Revolução Francesa (1789): Camponeses apoiaram a monarquia contra os jacobinos urbanos que queriam "libertá-los".
- Brasil Imperial: Escravos libertos que viraram pequenos proprietários rurais rejeitavam o abolicionismo radical — queriam integração, não utopia.Tradução:
Quando o pobre não segue o script, a esquerda inventa teorias conspiratórias.
A Hipocrisia da Esquerda Urbana e Universitária
Enquanto acusa o pobre de direita de "alienado", a esquerda brasileira é dominada por uma elite desconectada da realidade periférica:
- Perfil Socioeconômico: 82% dos filiados ao PSOL têm ensino superior completo (TSE, 2023). Apenas 6% moram em bairros periféricos.
- Prioridades Descoladas: Enquanto o pobre debate segurança e custo de vida, a esquerda pauta discussões como "linguagem não-binária em editais públicos" — tema irrelevante para quem luta contra o desemprego. Os grandes teóricos comunistas se reviram no túmulo quando veem o que a esquerda se tornou: não debatem os reais problemas do Brasil, e sim sobre suas próprias emoções.
"A esquerda brasileira trocou o operário pelo influencer progressista. O pobre virou um personagem de campanha, não um interlocutor real."
A diversidade de pensamento que a esquerda não suporta
A esquerda prega diversidade — desde que você seja diverso dentro de um checklist pré-aprovado. Pobre LGBTQ+? Herói. Pobre evangélico? Fascista. Pobre que abre MEI? "Peão do capitalismo". A realidade é que favelas e periferias são microcosmos de pluralidade ideológica, algo que assusta quem quer reduzir seres humanos a estereótipos.
Respostas aos Argumentos Esquerdistas (e Por que Falham)
"O pobre de direita é manipulado pela mídia!"
- Contradição: Se a mídia tradicional é dominada por elites (como alegam), por que grandes veículos são abertamente progressistas? A Record (evangélica) é exceção, não regra.
Contradição Central:
Como explicar que, segundo o Banco Mundial (2023), países com maior liberdade econômica (ex.: Chile, Polônia) reduziram a pobreza extrema em 60% nas últimas décadas, enquanto modelos estatizantes (ex.: Venezuela, Argentina com o governo peronista) afundaram na miséria? Simples: a esquerda prefere culpar o "neoliberalismo" a admitir que o pobre com o mínimo de consciência quer emprego, não esmola.Dado que Machuca:
- 71% das mulheres da periferia rejeitam o feminismo radical, associando-o a "prioridades distantes da realidade" (Instituto Locomotiva, 2023)."Ele vota contra os próprios interesses!"
- Falácia: Pressupõe que a esquerda define o que é o "interesse do pobre". Para um pai de família na Cidade de Deus, ter a boca de fogo fechada pode ser mais urgente que um aumento de 10% no Bolsa Família.
O pobre de direita não é uma anomalia. É o produto natural de um mundo complexo onde seres humanos têm aspirações, medos e valores diversos. Enquanto a esquerda insiste em tratá-lo como um projeto fracassado, ele está ocupado:
- Trabalhando para não depender do governo.
- Escolhendo religiões que dão sentido à sua vida.
- Rejeitando pautas identitárias que não resolvem o custo do gás de cozinha."É falta de educação política!"
- Ironia: Nos países nórdicos (modelo da esquerda), as classes baixas são as mais conservadoras. Educação não correlaciona com progressismo.
Por que o Debuste Precisa Acabar
A insistência em descredibilizar o pobre de direita revela um projeto de poder fracassado. A esquerda, ao substituir diálogo por deboche, perdeu a capacidade de representar quem mais precisaria dela. Enquanto isso, a direita — nem sempre por virtude, mas por pragmatismo — capturou o descontentamento de milhões com o status quo.
O pobre de direita existe porque ele não precisa da permissão do rico de esquerda para pensar. A incapacidade de entender isso só prova que a esquerda é a nova aristocracia.
Último Dado: Nas eleições de 2022, Tarcísio de Freitas (direita) venceu em 72% das favelas de São Paulo. O motivo? Seu discurso anti-burocracia e pró-microempreendedor.
A mensagem é clara: o pobre não é um projeto ideológico. É um agente político autônomo — e quem não entender isso continuará perdendo eleições.
A esquerda elitista não odeia o pobre de direita por ele ser "irracional". Odeia porque ele desafia o monopólio moral que ela construiu sobre a miséria alheia. Enquanto isso, o pobre segue sua vida, ignorando os berros de quem acha que sabem mais da sua vida que ele mesmo.
Pergunta Retórica (Para Incomodar):
Se a esquerda é tão sábia, por que não usa essa sabedoria para entender que pobre também cansa de ser tratado como cachorro que late no ritmo errado?
Fontes Citadas:
- Latinobarómetro (2022)
- IPEC (2023)
- USP (2021): "Segurança Pública e Percepções nas Favelas Cariocas"
- FGV (2020): "Informalidade e Tributação no Brasil"
- Datafolha (2023): "Perfil Religioso do Eleitorado Brasileiro"
- Atlas Intel (2022): "Autopercepção das Classes Baixas"
- Pew Research (2020): "Voting Patterns by Income in the U.S."
- TSE (2023): "Perfil Socioeconômico dos Filiados Partidários"
Leitura Recomendada para Esquerdistas:
- "Fome de Poder: Por que o Pobre Brasileiro Abandonou a Esquerda" (Fernando Schüller, 2023)
- "A Revolução dos Conservadores: Religião e Política nas Periferias" (Juliano Spyer, 2021)
- "Direita e Esquerda: Razões e Paixões" (Demétrio Magnoli, 2019) -
@ 878dff7c:037d18bc
2025-03-09 20:49:43Undocumented Commands Found in ESP32 Bluetooth Chip Used by Over a Billion Devices
Summary:
Researchers from Tarlogic Security have discovered 29 undocumented vendor-specific commands in the ESP32 microcontroller, manufactured by Espressif and widely used in over a billion IoT devices as of 2023. These hidden commands enable low-level control over Bluetooth functions, including memory manipulation (reading/writing RAM and Flash), MAC address spoofing (device impersonation), and LMP/LLCP packet injection. Such capabilities could allow attackers to spoof trusted devices, access unauthorized data, pivot to other networked devices, and establish long-term persistence. The issue, now tracked as CVE-2025-27840, was presented at RootedCON in Madrid. Espressif has not publicly documented these commands, raising concerns about potential exploitation.:contentReference[oaicite:0]{index=0}
Sources: BleepingComputer - 8 March 2025, Tarlogic - 6 March 2025, NVD - 8 March 2025
Fresh Flood Crisis Hits Gold Coast and Brisbane
Summary:
Brisbane's south, Ipswich, Logan, and the Gold Coast have been severely affected by Cyclone Alfred, resulting in significant flooding. An emergency alert advised residents in flood-prone areas to stay inside and seek higher ground. The cyclone, initially thought to have weakened, surprised many with destructive 100km/h winds. Brisbane experienced severe flash flooding, impacting homes, streets, and public transport. Heavy rainfall is anticipated to continue, with predictions of up to 500mm in the next 48 hours. While some schools and public services are resuming, many areas remain critically affected by power outages and infrastructure damage. Premier David Crisafulli emphasized the importance of safety and recovery efforts, urging continued caution.
Sources: The Courier-Mail - 10 March 2025, News.com.au - 10 March 2025
Thousands Without Power as Storm Alfred Lashes Queensland
Summary:
Tens of thousands of Australians in Queensland were left without power as the downgraded Tropical Cyclone Alfred brought heavy rains, damaging winds, and flooding. The Gold Coast was the hardest hit, with over 112,000 outages, while a total of approximately 316,540 people in southeast Queensland were affected. Despite preparations, the storm's severe conditions also impacted New South Wales, prompting significant efforts and responses from local and federal authorities. Prime Minister Anthony Albanese emphasized the serious flood risks in affected areas. The Bureau of Meteorology forecasted ongoing heavy rains and winds. Brisbane Airport reopened but warned of potential disruptions, and decisions regarding the reopening of about 1,000 schools affected by the weather were pending. The community spirit remained strong despite the adverse conditions. On Saturday, an individual died in northern New South Wales floodwaters, and a collision involving military vehicles resulted in injuries to several officers.
Sources: Reuters - 10 March 2025, AP News - 9 March 2025
Concerns Over Potential Advertising Bans by Minority Governments
Summary:
Australia's political landscape is shifting as disillusioned voters increasingly support independents and minor parties. This trend could lead to a minority Labor or Coalition government after the next federal election, creating potential uncertainties for businesses. Independent parties are advocating for broad advertising bans on industries such as gambling, alcohol, and unhealthy food, which could significantly impact the economy. These bans, especially on food and beverages, could devastate manufacturers and farmers, exacerbating the ongoing cost-of-living crisis. Current consumer research indicates that Australians prefer health education and subsidies for nutritious foods over further advertising prohibitions. Evidence from global instances suggests that such advertising bans have not effectively reduced obesity rates. In this volatile political and economic situation, pragmatic leadership is essential to balance public health and economic sustainability.
Sources: The Australian - 10 March 2025
Proposed Freeze on Tobacco Tax to Recover Government Funds
Summary:
A report from Tulipwood Economics for the Australian Association of Convenience Stores (AACS) suggests that freezing tobacco excise, allowing regulated vapes, and targeting illicit sellers could secure up to $18.6 billion in revenue for the Australian Federal Government. This revenue could fund essential public services such as schools, social housing, and hospitals. The report criticizes the current approach of frequent tax hikes on tobacco, noting that higher taxes have driven smokers towards the black market, increasing criminal activity and reducing government revenue. The opposition Coalition's plan to reintroduce regulated vapes and consider freezing tobacco taxes is praised for addressing the crisis. Master Grocers Australia also supports a tax freeze, emphasizing that the government's current policy inadvertently supports criminal enterprises. The call is for a significant policy rethink to ensure smokers use legal, taxed products, thereby benefiting Australia's economy and public health.
Sources: Herald Sun - 10 March 2025
U.S. Pentagon Nominee Questions Submarine Sales to Australia Amid Taiwan Tensions
Summary:
Elbridge Colby, nominated by President Trump for undersecretary of defense for policy, has raised concerns about the AUKUS agreement, which involves selling U.S. Virginia-class nuclear-powered submarines to Australia. Colby emphasizes the strategic importance of these submarines for defending Taiwan and highlights potential risks to U.S. forces if they are sold to Australia, citing production and deployment challenges. He suggests that Australia invest in other military capabilities instead.
Sources: The Guardian - 9 March 2025
Australia Faces Imminent U.S. Tariffs on Steel and Aluminium
Summary:
The United States is set to impose tariffs on Australian steel and aluminium starting Wednesday. Prime Minister Anthony Albanese is currently prioritizing the aftermath of Cyclone Alfred, while Trade Minister Don Farrell has not advanced plans to visit the U.S. to discuss the tariffs. Influential advisers to President Trump are urging against tariff exemptions for Australia, and there are concerns that negative comments from Australian officials may influence the U.S. stance on exemptions.
Sources: The Australian - 10 March 2025
Rising Refinery Emissions Raise Health Concerns in Geelong
Summary:
Residents in North Geelong, particularly David Dillon, have raised concerns over increasing sulfur dioxide emissions from the local Viva Energy refinery. Emissions have risen from 1,685,843 kg in 2017 to 2,528,475 kg in 2024. Health statistics indicate higher rates of lung conditions and heart disease in nearby communities. While Viva and the EPA assert that emissions are within legal limits, residents call for increased monitoring and scrutiny.
Sources: Herald Sun - 6th March 2025
Urgent Recall of Google Pixel 4a Smartphones Due to Fire Risk
Summary:
The Australian Competition and Consumer Commission (ACCC) has issued an urgent recall for Google Pixel 4a smartphones due to a potential fire hazard associated with battery overheating. Users are advised to ensure their devices have received the latest firmware update and may be eligible for refunds.
Sources: news.com.au - March 9, 2025
Peter Dutton Vows to Declare National Anti-Semitism Emergency
Summary:
Opposition Leader Peter Dutton has pledged that, if elected, a Coalition government under his leadership will declare a national emergency on anti-Semitism in Australia. He plans to incorporate education against Jewish hatred into the national curriculum, aligning with a comprehensive strategy proposed by the Executive Council of Australian Jewry (ECAJ). The ECAJ's 15-point plan includes the creation of a counter-terrorism taskforce to address anti-Semitic threats and public awareness campaigns. While the Coalition has endorsed federal responsibilities within the plan, a response from Prime Minister Anthony Albanese is pending. The ECAJ expects both parties to clarify their positions before the upcoming election to ensure leadership on this critical issue.
Sources: The Daily Telegraph - 10 March 2025
Newspoll Indicates Potential Hung Parliament in Upcoming Election
Summary:
A recent Newspoll suggests that while support for Prime Minister Anthony Albanese has risen, it may not be sufficient for Labor to secure a majority, pointing towards a likely hung parliament in the forthcoming federal election. The Coalition currently leads Labor by seven points in primary votes; however, a majority of voters perceive the Coalition as not yet ready to govern after a single term in opposition. Both major parties may need to seek support from independents and minor parties to form a minority government. Albanese holds a slight advantage as the preferred Prime Minister, leading Peter Dutton by nine points, while Dutton's approval ratings have declined. The survey highlights public skepticism regarding the Coalition's preparedness to govern, particularly among younger and middle-aged voters, as well as women.
Sources: The Australian - 10 March 2025
Treasurer Plans to Maintain Spending Levels in Upcoming Budget
Summary:
Treasurer Jim Chalmers intends to avoid significant spending cuts or new revenue measures in the forthcoming March budget. This approach aims to fund costly election commitments and provide cost-of-living relief packages, especially in light of the financial impact of Cyclone Alfred. The government plans to maintain increased spending on health, education, and emergency management services, with no major tax reforms anticipated. This strategy is expected to be a focal point in the lead-up to the anticipated election in May.
Sources: The Australian - March 10, 2025
Social Security Payments Set to Increase from March 20
Summary:
The latest indexation of social security payments will take effect on March 20, providing financial boosts to millions of Australians. Single aged pensioners will receive an additional $4.60 per fortnight, while couples will get an extra $7, bringing their payments to $1,149 and $866.10 respectively. JobSeeker recipients will also see increases, with singles receiving an extra $3.10 and couples $2.80 per fortnight. These adjustments aim to ease cost-of-living pressures and reflect the government's commitment to strengthening the social security system.
Sources: news.com.au - March 10, 2025
-
@ 401014b3:59d5476b
2025-03-09 20:16:31Alright, football heathens, it’s March 3, 2025, and we’re wading into the NFC South like it’s a gator-infested bayou with a keg on the bank. Free agency’s a sweaty mess, the draft’s a blind grab, and this division’s always a rollercoaster of hope and hilarity. The Bucs held it down in 2024, the Falcons flirted with glory, the Saints stayed scrappy, and the Panthers… well, they tried. Let’s slap some records on this mess and see who’s got the chops to take the South. Here we go, fam—grab a sweet tea and let’s roll.
Tampa Bay Buccaneers: 10-7 – Baker’s Still Cooking
The Bucs owned the NFC South in 2024, and 2025’s looking like another hot dish. Baker Mayfield’s slinging it to Mike Evans and Chris Godwin (if he's back), while Rachaad White keeps the ground game spicy (also contingent on him coming back). That defense—Vita Vea, Calijah Kancey—is a wall when healthy. Antoine Winfield Jr. might chase a payday, and the O-line’s got holes. Still, 10-7’s the call, division champs again. Tampa’s got that pirate swagger—good luck prying the crown off ‘em.
Atlanta Falcons: 9-8 – Penix’s Big Swing
The Falcons turned heads in 2024 with Kirk Cousins, but 2025’s likely a Michael Penix Jr.’s show. The rookie’s got Bijan Robinson, Drake London, and Kyle Pitts to play with—talk about a loaded sandbox. The defense—Grady Jarrett, A.J. Terrell—holds its own, but free agency could sting. Jessie Bates III might test the market, and the secondary’s thin. 9-8’s where they land, maybe a wildcard if Penix pops off. Atlanta’s close, but not quite king yet.
New Orleans Saints: 7-10 – Carr’s Last Hurrah?
The Saints hung around in 2024, and 2025’s a gritty grind. Derek Carr’s got Chris Olave and Rashid Shaheed to sling it to, but the run game’s a question mark without Alvin Kamara’s prime juice. The defense—with stars like Cam Jordan—still fight, but age is creeping, and free agency looms. Tyrann Mathieu might dip, and the cap’s a nightmare. 7-10’s the vibe—not awful, not great. New Orleans is treading water ‘til the rebuild hits.
Carolina Panthers: 5-12 – Bryce’s Baby Steps
The Panthers were a dumpster fire in 2024, but 2025’s got a flicker. Bryce Young’s got Xavier Legette to throw to, and Chuba Hubbard’s a sneaky RB gem. The defense—Jaycee Horn, Jadeveon Clowney—shows teeth, but the O-line’s shaky, and free agency might swipe Ejiro Evero’s scheme elsewhere. 5-12’s the harsh reality—progress, not playoffs. Carolina’s climbing, but it’s a slow crawl outta the basement.
The Final Jambalaya
The NFC South in 2025 is a Tampa takeover with a Falcon tease. The Bucs (10-7) snag the title because Baker’s got that dawg in him, the Falcons (9-8) flirt with a wildcard, the Saints (7-10) scrap by, and the Panthers (5-12) lag behind. Free agency’s the curveball—lose a stud, you’re sunk; keep ‘em, you’re sizzling. Hit me on X when I botch this, but this is my NFC South sermon. Let’s ride, degenerates.
-
@ c1e9ab3a:9cb56b43
2025-03-09 20:13:44Introduction
Since the mid-1990s, American media has fractured into two distinct and increasingly isolated ecosystems, each with its own Overton window of acceptable discourse. Once upon a time, Americans of different political leanings shared a common set of facts, even if they interpreted them differently. Today, they don’t even agree on what the facts are—or who has the authority to define them.
This divide stems from a deeper philosophical rift in how each side determines truth and legitimacy. The institutional left derives its authority from the expert class—academics, think tanks, scientific consensus, and mainstream media. The populist right, on the other hand, finds its authority in traditional belief systems—religion, historical precedent, and what many call "common sense." As these two moral and epistemological frameworks drift further apart, the result is not just political division but the emergence of two separate cultural nations sharing the same geographic space.
The Battle of Epistemologies: Experts vs. Tradition
The left-leaning camp sees scientific consensus, peer-reviewed research, and institutional expertise as the gold standard of truth. Universities, media organizations, and policy think tanks function as arbiters of knowledge, shaping the moral and political beliefs of those who trust them. From this perspective, governance should be guided by data-driven decisions, often favoring progressive change and bureaucratic administration over democratic populism.
The right-leaning camp is skeptical of these institutions, viewing them as ideologically captured and detached from real-world concerns. Instead, they look to religion, historical wisdom, and traditional social structures as more reliable sources of truth. To them, the "expert class" is not an impartial source of knowledge but a self-reinforcing elite that justifies its own power while dismissing dissenters as uneducated or morally deficient.
This fundamental disagreement over the source of moral and factual authority means that political debates today are rarely about policy alone. They are battles over legitimacy itself. One side sees resistance to climate policies as "anti-science," while the other sees aggressive climate mandates as an elite power grab. One side views traditional gender roles as oppressive, while the other sees rapid changes in gender norms as unnatural and destabilizing. Each group believes the other is not just wrong, but dangerous.
The Consequences of Non-Overlapping Overton Windows
As these worldviews diverge, so do their respective Overton windows—the range of ideas considered acceptable for public discourse. There is little overlap left. What is considered self-evident truth in one camp is often seen as heresy or misinformation in the other. The result is:
- Epistemic Closure – Each side has its own trusted media sources, and cross-exposure is minimal. The left dismisses right-wing media as conspiracy-driven, while the right views mainstream media as corrupt propaganda. Both believe the other is being systematically misled.
- Moralization of Politics – Since truth itself is contested, policy debates become existential battles. Disagreements over issues like immigration, education, or healthcare are no longer just about governance but about moral purity versus moral corruption.
- Cultural and Political Balkanization – Without a shared understanding of reality, compromise becomes impossible. Americans increasingly consume separate news, live in ideologically homogeneous communities, and even speak different political languages.
Conclusion: Two Nations on One Land
A country can survive disagreements, but can it survive when its people no longer share a common source of truth? Historically, such deep societal fractures have led to secession, authoritarianism, or violent conflict. The United States has managed to avoid these extremes so far, but the trendline is clear: as long as each camp continues reinforcing its own epistemology while rejecting the other's as illegitimate, the divide will only grow.
The question is no longer whether America is divided—it is whether these two cultures can continue to coexist under a single political system. Can anything bridge the gap between institutional authority and traditional wisdom? Or are we witnessing the slow but inevitable unraveling of a once-unified nation into two separate moral and epistemic realities?
-
@ 06639a38:655f8f71
2025-03-09 19:54:07FOSDEM
I do know about the presence of this conference for many years, but I never attended it (and it's just around the corner for me coming from the south of The Netherlands). Attending FOSDEM with Nostr was quite a no-brainer to me. FOSDEM has the perfect tech-savy audience who will understand the protocol pretty quick. Our main goal would be to explain Nostr as a protocol and what new kind of applications can be build with it (and why we need it). During Bitcoin Amsterdam 2024 I proposed the idea for applying with a Nostr stand at FOSDEM '25 to @npub1l77twp5l02jadkcjn6eeulv2j7y5vmf9tf3hhtq7h7rp0vzhgpzqz0swft and @npub1hz5alqscpp8yjrvgsdp2n4ygkl8slvstrgvmjca7e45w6644ew7sewtysa.
Jurjen and I created the application on October 29 2024. Without any expectations as no one knew what kind of policy they have. As a result we were really excited when we heard that our submission was approved (16 November 2024). Two weeks later we also proposed a main talk about Nostr (1 december 2024) and again we very surpised it was accepted (10 January 2025)!
Now it was time for us to work out all of the plans we had:
- Design and print promotional items
- Flyers
- Stickers
- NIP-01 folder
- Banners
- Gather all the equipment we need to demo Nostr stuff at the stand
- Book accomodations
- Prepare a keynote
- Start a Geyser fundraiser to cover all the expenses as much as possible
On the 21th of January we launched our Geyser project and with one very generous donation we already achieved our funding goal within just ONE hour! Wow!!!
Friday
In the evening Jurjen organized a Nostr fringe at the place of Commons Hub Brussels. Around 25 people joined, so that was a pleasant surpise so many showed up and shared their interest into Nostr.
Saterday
We're arrived a bit too late as the venue was already packed with a lot of people! For the first hours we had no power, so we our computer screen with the slides was not. What we saw immediately was the huge interest in stickers. Not only our Nostr stickers, but in general you can grab stickers everywhere on each stand. People at FOSDEM like stickers a lot!
We were there with five and during the whole day all of use had conversations explaining Nostr or having related discussions around social media and centralisation.
Video: https://nostrver.se/sites/default/files/2025-02/IMG_2322.mp4
Sunday
This day was less crowded than the day before so we had a bit more room to breath, relax and explore other areas of the conference.
In the afternoon it was up to Constant to give his Nostr keynote at one of the two mainstages of FOSDEM.
The recording is available here on fosdem.org and on YouTube.
All the keynotes slides can be found here.Learnings / insights
- We need to be there again next year !!!
- We had zero inconvenient moments or unreasonable debates.
- Some attendees are pretty hardcore as one of them visited the stand the second time after when he installed the Gossip client on his PostmarketOS powered phone asking how to proceed using Nostr. People at FOSDEM are not normal ;-)
- Many people do ask why Nostr is here as another social media protocol.
- Questions about the differences with other protocols are very common, mentioning ActivityPub and ATproto.
- Almost everyone knows what Mastodon and the fediverse is.
- Had some questions how private Nostr is, so this confirms that we really need the private stuff for Nostr.
- At many moments it was hard to understand each other due all the noise from other people. Especially when you're speaking not your native language.
- When talking about using a private key you get really good questions how convient it could be (or not as some really don't believe it can work for normies) used in the context of social media. As in how often you will need this key for the actions you take using a Nostr client. A topic also very well explained by Constant in the Nostr main talk.
- We had 500+ stickers, but we needed more as we ran out of them during the Sunday morning.
- We handed-out around 400-500 NIP-01 folders.
- We handed-out almost 1000 A5 flyers.
- We did almost no onboardings but that's fine. FOSDEM attendees are tech-savy and will find their own way using the Nostr with some client. We were not there telling people what they should do.
- We need more merchandise next year. There were some stands with outstanding merchandise and I'm sure Nostr can offer the same (even better!) with the many talented creatives we already have in the community.
- Having just one table with a size of 180x80 (just like any other stand) you really have to choice what to display and not. Being there with 5-6 people was just enough as we all were quite surprised with the amount of interest.
- The FOSDEM organisation asked us multiple times how things were going. Especially with the announced protests against Jack Dorsey they were curious we didn't have any inconvenient moments. We really appreciate that!
- Overall we had the feeling that we were very welcome and we had a great opportunity to introduce Nostr to a new audience.
The team 💜
- @npub1equrmqway3qxw3dkssymusxkwgwrqypfgeqx0lx9pgjam7gnj4ysaqhkj6
- @npub1l77twp5l02jadkcjn6eeulv2j7y5vmf9tf3hhtq7h7rp0vzhgpzqz0swft
- @npub1r30l8j4vmppvq8w23umcyvd3vct4zmfpfkn4c7h2h057rmlfcrmq9xt9ma
- @npub1t6jxfqz9hv0lygn9thwndekuahwyxkgvycyscjrtauuw73gd5k7sqvksrw
- @npub1rfw075gc6pc693w5v568xw4mnu7umlzpkfxmqye0cgxm7qw8tauqfck3t8
- And me ;-)
If you're curious what we have spent, please have a look at this document.
Debugging Nostr AUTH with PHP
The week after FOSDEM I spent some hours on debugging these issues:
As a result and with some help of @npub1acg6thl5psv62405rljzkj8spesceyfz2c32udakc2ak0dmvfeyse9p35c I submitted this merge request for the `sirn-se/websocket-php` package used in the Nostr-PHP library to fix connection errors on relays (WebSocket servers) which don't response with a reason when the HTTP connection is upgraded to the WebSocket protocol.
Nostr-PHP development
Next month (March) I will pick up my development on Nostr-PHP again.
- Finish up the NIP-19 integration
- Pick up the work on async and concurrent requests with websockets
- Create more examples
- Create examples using the Symfony and Laravel framework
- Take care of incoming merge requests with new features (thanks Djuri)
As of that moment I also will be publishing my weekly reports here sharing the stuff I did around Nostr.
- Design and print promotional items
-
@ 29216785:2a636a70
2025-03-09 19:36:24Just a test long-form content
-
@ 2f9f26f9:aef5bbef
2025-03-09 18:54:51When you’re thinking about sod installation, it’s easy to get caught up in the immediate results—lush, green grass that instantly transforms your yard. But have you ever considered how your choices impact the environment? Eco-friendly sod installation isn’t just a trend; it’s a necessity for those who care about sustainability. Here’s how you can achieve a beautiful lawn while minimizing your ecological footprint.
Choosing the Right Sod for Your Climate
Not all sod is created equal. The type of grass you select plays a huge role in how much water, fertilizer, and maintenance it will require. For instance, if you live in a dry region, opting for drought-resistant varieties like Bermuda grass or Buffalo grass can save thousands of gallons of water annually. On the other hand, cool-season grasses like Kentucky Bluegrass thrive in northern climates but may require more irrigation in hotter areas. Always research which sod types are native or well-adapted to your region—this small step can make a massive difference in resource conservation.
Soil Preparation: The Foundation of Success
Before laying down sod, your soil needs to be in top condition. Start by testing the soil’s pH levels; most grasses prefer a pH between 6.0 and 7.0. If the soil is too acidic or alkaline, amend it with organic compost or lime. This not only improves the soil structure but also reduces the need for synthetic fertilizers later on. A well-prepared soil bed ensures better root establishment, which means your sod will require less water and maintenance over time.
Water-Efficient Irrigation Systems
Once your sod installation is complete, watering becomes critical. But here’s the thing: overwatering is just as harmful as underwatering. Investing in a smart irrigation system with rain sensors and soil moisture sensors can help you optimize water usage. For example, rotary nozzles are excellent for delivering water evenly across the lawn, reducing runoff and evaporation. Pair this with a zoned irrigation system, and you’ll ensure that each section of your lawn gets the precise amount of water it needs. This approach not only conserves water but also prevents issues like fungal growth caused by excessive moisture.
Organic Fertilizers and Pest Control
After sod installation, it’s tempting to reach for chemical fertilizers to speed up growth. However, these products often contain harmful substances that can leach into groundwater and harm local ecosystems. Instead, opt for organic fertilizers like compost tea or fish emulsion, which provide essential nutrients without the environmental toll. Similarly, for pest control, consider natural solutions like neem oil or beneficial nematodes. These methods are safer for the environment and promote a healthier lawn in the long run.
Mulching and Mowing: Small Changes, Big Impact
Mulching isn’t just for garden beds—it can also benefit your sod. After installation, apply a thin layer of organic mulch around the edges to retain moisture and suppress weeds. When it comes to mowing, follow the “one-third rule”: never cut more than one-third of the grass blade at a time. This encourages deeper root growth and reduces stress on the grass. Additionally, leave the grass clippings on the lawn; they act as a natural fertilizer, returning nutrients to the soil.
The Role of Aeration in Eco-Friendly Lawns
Over time, soil compaction can hinder water absorption and root growth. That’s where aeration comes in. By creating small holes in the soil, you allow air, water, and nutrients to penetrate deeper, promoting healthier grass. For eco-friendly sod installation, consider using a manual core aerator or renting an electric one. This simple step can significantly reduce the need for excessive watering and fertilizing.
Rainwater Harvesting: A Sustainable Water Source
Why rely solely on municipal water when you can harness rainwater for your sod? Installing a rain barrel or a more advanced rainwater harvesting system can provide a free, sustainable water source for your lawn. This is especially useful during dry spells when water restrictions may be in place. Plus, rainwater is naturally soft and free of chemicals, making it ideal for your grass.
The Importance of Proper Drainage
Poor drainage can lead to waterlogged soil, which is detrimental to sod health. Before installation, assess your yard’s drainage patterns. If necessary, incorporate French drains or swales to direct excess water away from the lawn. Proper drainage not only prevents root rot but also ensures that water is used efficiently, reducing waste.
Eco-Friendly Tools and Equipment
The tools you use for sod installation and maintenance matter too. Opt for electric or battery-powered lawn mowers and edgers instead of gas-powered ones. These produce fewer emissions and are quieter, making them a better choice for the environment. Similarly, choose hand tools made from recycled materials whenever possible.
Long-Term Maintenance: Keeping It Green
Eco-friendly sod installation doesn’t end once the grass is laid. Regular maintenance is key to sustaining a healthy, sustainable lawn. Monitor your lawn’s health by checking for signs of stress, such as discoloration or thinning. Adjust your watering schedule based on seasonal changes, and continue to use organic products for fertilization and pest control. By staying proactive, you can enjoy a vibrant lawn without compromising your environmental values.
Final Thoughts
Eco-friendly sod installation is more than just a method—it’s a mindset. By making thoughtful choices at every step, from selecting the right sod to implementing water-saving irrigation systems, you can create a lawn that’s both beautiful and sustainable. Remember, every small action adds up, and your efforts can have a lasting impact on the planet. So, the next time you think about sod installation, think green—literally and figuratively.
-
@ b5b91959:134a187a
2025-03-09 16:41:42Weer schoolverhaal van kind uit de familie; "De **en uit de klas hebben van die mevrouw El C allemaal een code gekregen zodat ze wel op ChatGPT kunnen om alles te helpen invullen, de andere (lees: witte) leerlingen krijgen die code niet". En uiteraard is zo'n leerkracht die zo'n dingen regelt dan een fervente subsidie-slurper in de culturele sector + pvda aanhang (what else). Wanneer je dan hoort hoe een klacht over ongelijke behandeling (en soms ook racsisme) wordt behandeld door de "ons-kent-ons" bende (9/10 met sjaalte) op zo'n school kan je enkel concluderen dat het hier finaal om zeep is. Men heeft liever dat men punten gratis kan weggeven en diploma's aan copy-paste lomp volk, dan dat er nog onderwijs wordt gegeven. Let it all burn.
Weer schoolverhaal van kind uit de familie; "De *******en uit de klas hebben van die mevrouw El C***** allemaal een code gekregen zodat ze wel op ChatGPT kunnen om alles te helpen invullen, de andere (lees: witte) leerlingen krijgen die code niet".
En uiteraard is zo'n leerkracht die zo'n dingen regelt dan een fervente subsidie-slurper in de culturele sector + pvda aanhang (what else).
Wanneer je dan hoort hoe een klacht over ongelijke behandeling (en soms ook racsisme) wordt behandeld door de "ons-kent-ons" bende (9/10 met sjaalte) op zo'n school kan je enkel concluderen dat het hier finaal om zeep is.
Men heeft liever dat men punten gratis kan weggeven en diploma's aan copy-paste lomp volk, dan dat er nog onderwijs wordt gegeven.
Let it all burn.
-
@ 42342239:1d80db24
2025-03-09 15:22:43Last fall, Italian economist Mario Draghi, former head of the European Central Bank (ECB), published his 400-page report on Europe's (actually the EU's) competitiveness. Draghi's verdict was harsh: Europe is facing an "existential challenge." It's hard to disagree. While the EU is launching new regulations on plastic corks and hiding text messages from the public, Elon Musk is changing the world with groundbreaking innovations in the automotive, robotics, and space industries.
At the same time that the EU is not only preventing people from trying new things but also preventing them from even thinking about trying, Musk's space company SpaceX is capturing massive star rockets with "chopstick grips". While the EU is stuck in an ocean of meaningless bureaucratic details, Musk is engaged in a process of constant testing and improvement, reminiscent of the natural course of decentralized systems.
The EU's meager economic growth can be compared to a ticking time bomb that threatens to explode in all of our faces. Disposable incomes have increased nearly twice as much in the US compared to the EU since 2000, and this is a difference that is noticeable not only in our standard of living but also in our opportunities for leisure time. As the late economist Robert Lucas said, "Once you start thinking about growth, it's hard to think about anything else." Perhaps the best thing that can be said about the report is that its abundance of words, numbers, and images underscores how bad things are. And perhaps it has therefore become impossible for the EU's leaders to continue ignoring the union's problems.
Like giving a shark responsibility for beach safety
However, asking a former EU president to investigate and propose changes is like giving a shark responsibility for beach safety. Among other things, he proposes larger allocations for research and development, even though the EU already spends more than the US as a percentage of GDP - it's thus impossible for this to be the problem. It comes as no surprise that the proposals are about more centralization, harmonization, and streamlining - i.e., continuing in the same old tracks. While Musk seems to have an intuitive understanding of how knowledge arises through real-world experiments , what is proposed here is more of the administrative bureaucracy's preconceived five-year plans. The bureaucracy is to be given free rein, and the nations are to be pushed back - a repeat of a theme we know all too well. Centralization undermines real knowledge growth, which may explain why the EU is falling behind.
A venomous snake that is ignored
Rent-seeking is like a venomous snake that slithers through the EU's corridors, but the concept is conspicuous by its absence in Draghi's report. It is a well-known phenomenon where companies spend resources on influencing decision-makers to gain advantages instead of creating value. The EU bureaucracy has produced a total of 13,000 legislative acts since 2019 - more than four times as many as the US. How many of these have received an invisible stamp of approval from lobbyists? Economist Jeffrey Sachs has warned that American lobbying in Brussels is so dominant that it affects all decision-making in the digital economy, which may be one of the EU's biggest problems. GDPR regulations, for example, are estimated to have reduced small tech companies' profits by 15% (!).
Size is not everything
Small businesses are the invisible heroes that contribute most to productivity and employment growth. These are being suffocated by the ECB's actions and the constantly increasing and inefficient regulatory mess. The ECB's war on small banks hampers growth for small businesses because large banks prioritize large transactions. Big computers' algorithms cannot replace small banks' local knowledge. Harmful regulations and grandiose dreams lead to a loss of both knowledge and growth.
What should the end goal be?
Sweden's daily Dagens Industri's editorial page recently wrote that "Defeat is not an option" on the theme of green transition. It asked whether "free democracies or a Chinese dictatorship should lead the way." Large-scale industrial projects and plans can undoubtedly provide benefits. But it's worth questioning whether Europe should really have the same end goal as China.
During both the Renaissance and the Industrial Revolution, decentralized power structures played a crucial role. During the Renaissance, states and cities were relatively independent. Power was decentralized to princes, nobles, and merchants. The Church had an important role, but it was not as centralized as it would become. Florence, Venice, and Amsterdam could develop different scientific and artistic traditions. When one region encountered problems, other regions could continue to develop and grow, and so on. At that time - even if the concept did not exist - it seemed to be understood that the economy is a complex system of the second order. Or a computationally irreducible one, as Stephen Wolfram would have expressed it.
In the book "The Art of War," Chinese General Sun Tzu wrote that "He who chooses the battlefield first will win. He who lets his opponent choose the battlefield will lose." Instead of striving to play on China's (alleged) centralized battlefield, perhaps we Europeans should consider returning to our roots. Do away with the bureaucracy's heavy foot and give power back to the individual! Scrap the monster banks and create conditions for small local banks instead. Stop subsidizing American IT giants' data centers and give every European an AI in their own hand. Forget the five-year plans and invest in decentralized economic experiments instead. Does that sound radical?
The word "radical" comes from the Latin word for root, radix . The word used to have a positive connotation because it implied a willingness to go to the root of the problem or to return to one's roots.
More of us should dare to question the modern structures that brought us to today's sad situation. Roots are a plant's strength - without them, it cannot grow and flourish. So it is with Europe. Our continent, which was once a thriving garden where ideas and innovations bloomed, needs to return to its roots to regain its former strength. This may be exactly what is required.
Put simply: a more radical Europe.
-
@ c69b71dc:426ba763
2025-03-09 14:24:35Time Change: A Mini Jet Lag
The time change is more than just setting the clock forward or backward — it can disrupt our internal balance and lead to a range of health issues. Find out why the time change causes a mini jet lag and how you can deal with it.
Why the Time Change Throws Us Off Balance
The expected energy savings due to reduced artificial lighting demand have not been confirmed. Worse yet, the time change leads to an increase in workplace and traffic accidents, a higher risk of heart attacks, and even an increase in suicide rates. Many people struggle with the one-hour shift that happens twice a year. There is constant debate about whether to abolish it and which time should remain permanent...
Permanent Summer Time or Permanent Winter Time?
The time change triggers a mini jet lag that can last from a single day up to three weeks as the body adjusts its internal clock to the new rhythm.
Winter Time Aligns Best with Our Internal Clock
Our bodies follow the circadian rhythm, an internal clock designed for activity during daylight and rest when the sun sets.
Permanent summer time would mean longer darkness in the morning and extended daylight in the evening—this unnatural shift would completely disrupt our biological processes.The Impact of Time Change on Our Health
Our internal clock regulates essential functions such as body temperature, hormone production, the cardiovascular system, and the sleep-wake cycle. This is why the time change often leads to headaches, fatigue, drowsiness, metabolic disorders, and even severe heart rhythm disturbances. Studies show that these disruptions can increase susceptibility to illnesses and psychological disorders.
Since the light-dark cycle dictates this internal clock, prolonged exposure to artificial light after sunset can shift it. When the time suddenly changes, it causes a disruption, throwing off our natural sleep rhythm.
Sleep Resets the Body!
During the night, the body regenerates:
- The brain is flushed with cerebrospinal fluid to clear out toxins.
- The body undergoes repair, detoxification, and waste removal.
- If the alarm clock rings an hour earlier, the body is still in "night mode" and unable to complete its recovery processes!Most people already suffer from sleep disorders, whether trouble falling asleep or staying asleep. Added to this is the stress of daily life, which often depletes serotonin levels, reducing the body’s ability to produce melatonin —the sleep hormone. Blue light depletes magnesium in our body, disrupts the circadian rhythm, and interferes with melatonin production! We also know that the pineal gland’s melatonin production is impaired by fluoride found in toothpaste, water, and food!
What Can You Do About Sleep Disorders?
To regulate your sleep rhythm, you need healthy sleep hygiene:
- Minimize activity before bedtime.
- Avoid artificial light from TVs, smartphones, and e-readers.
- Ensure fresh air and a cool bedroom (around 18°C/64°F).
- Stick to consistent sleep and wake times — even on weekends!
- Reserve the bed and bedroom for sleep only — no heated discussions. - No heavy meals before bed.
- Use blue light or orange filter glasses to reduce artificial light exposure. - Air out the bedroom for 20 minutes before going to bed. - Use candlelight in the bathroom while brushing your teeth instead of turning on the harsh neon light.If these adjustments don’t help, natural remedies, supplements, and herbal teas can provide support.
Natural Sleep Aids
Some well-known natural remedies include:
- Melatonin, Tryptophan, GABA, Magnesium
- Herbs such as Hops, Lavender, Chamomile, Passionflower, Valerian and organge peal and flower.By aligning with nature’s rhythm and optimizing sleep habits, we can counteract the negative effects of the time change and restore balance to our bodies and minds.
I hope this helps you transition smoothly through this outrageous act of forcing us into "summer time" ⏰🌞
-
@ 7d33ba57:1b82db35
2025-03-09 13:55:59Old Town Las Palmas de Gran Canaria, also known as Vegueta, is a charming historic district full of colonial architecture, cobbled streets, and cultural attractions. Here are some travel tips to make the most of your visit:
Top Things to Do
- Catedral de Santa Ana & Plaza de Santa Ana
- Climb to the rooftop for panoramic views.
-
Visit the stunning Gothic-Renaissance interiors.
-
Casa de Colón (Columbus House)
-
A must-see museum about Christopher Columbus and his travels.
-
Calle de los Balcones
-
Beautiful historic street with traditional Canarian wooden balconies.
-
Museo Canario
-
Learn about the indigenous Guanche people and their history.
-
Mercado de Vegueta
-
Try fresh tropical fruits, Canarian cheeses, and local delicacies.
-
Tapas & Wine at Calle Mendizábal
- Thursday nights are best for tapas hopping!
Local Food to Try
- Papas arrugadas con mojo (wrinkled potatoes with mojo sauce)
- Gofio (a traditional Canarian flour used in dishes)
- Ropa Vieja (shredded beef and chickpea stew)
Travel Tips
- Best Time to Visit: Early morning or late afternoon to avoid crowds.
- Walking: Wear comfortable shoes—streets are cobbled!
- Public Transport: Take the Guaguas (local buses) or rent a bike.
- Safety: It's a safe area, but watch for pickpockets in crowded spots.
- Nearby Attractions: Combine with a visit to Triana, the shopping district next door.
-
@ 2e8970de:63345c7a
2025-03-09 13:11:48Over the last weeks DOGE claimed to already have saved billions of Dollars. Numbers changing everyday but the main claims were between $105 and $175b even after retracting their statements about the 3 biggest savings. But no matter how you turn it, it is absolutely not true.
Best interpretation: they mean what the total will amount to in the future. Worst interpretation: this is a complete lie.
originally posted at https://stacker.news/items/908184
-
@ 41fa852b:af7b7706
2025-03-09 13:04:02"You can't stop things like Bitcoin. It will be everywhere, and the world will have to readjust." -- John McAfee
The US creates its Bitcoin Strategic Reserve, and the UK… well, the UK remains pretty clueless.
As always, the best advice is just to stay humble and stack sats.
We have two tickets to give away for the Bitcoin Ireland conference. To enter the competition, click here to submit your entry.
Let's look at what's happening this coming week…
This week's sponsor is…
Upcoming Bitcoin Meetups
Happening this week…
-
Dundee Bitcoin: Join them on the 2nd Monday of every month from 17:30 to 20:30 PM at The Wine Press, 16 Shore Terrace, Dundee DD1 3DN. This month's meetup is on Monday, 10th March. 🍻
-
Bitcoin Nottingham: The March Bitcoin Nottingham Meetup date for your diary is Monday the 10th at 18:00, at Carlton Town Football Club. 🍻
-
Lincolnshire Bitcoin: Another one on Monday. Lincolnshire Bitcoin meets on the second Monday of each month at 19:30 in the Treaty of Commerce, Lincoln. Open to all, from OG's to newcomers.🍺
-
Glasgow Bitcoin: A place for people in and around Glasgow to discuss Bitcoin. Meetups every second Wednesday of the month. This month on the 12th. They are at The Piper Bar, 57 Cochran St, G1 1HL. 🍺
-
Bitcoin Liverpool: Bitcoin Liverpool's next meetup is on Thursday, 13th March, at 18:30 at The Railway Pub, Tithebarn Street, L2 2DT. 🍺
-
[Bitcoin Beach Bournemouth](nostr:npub1va3773umzrydk4vd0q2xsnjg8qrsym7up9j9agnzcxd8u398wulq6kpxey: Every second Thursday of the month at Chaplins Cellar Bar. 529 Christchurch Road, Boscombe, United. You'll find them in the Cogg Room at 19:30. This month it's the 13th. 🍻
-
Bitcoin Walk - Edinburgh: Every Saturday they walk around Arthur's Seat in this historic city. Join them at 12 pm to chat about all things Bitcoin and keep fit. 🚶🏽♂️🚶🏼♀️🚶🏻
-
Real Bedford - Home Game: Peter MacCormack's boys are at home this Saturday playing Northwood. Join them for a 15:00 kickoff. ⚽️
New Businesses Accepting Bitcoin
This week we have…
- Hone and Strop: Hone & Strop Barbers in Holmfirth offers top-quality cuts in a friendly setting--now with the option to pay in Bitcoin! Located at 37 Huddersfield Road, they provide expert barbering with great service (and often a complimentary beer). Book an appointment at 01484 917469 and pay with magic internet money! 💈
Upcoming Special Events
These events aren't happening next week, but they're important to add to your calendar now as tickets are selling fast.
- CheatCode 2025 - Peter McCormack hosts the CheatCode conference, following last year's success. This year, international guest speakers include Preston Pysh, Alex Gladstein, Natalie Brunell, Matthew Pines, Steve Baker, Ben Arc, and Checkmate.
Friday, April 11th, is the main conference day, followed by a huge meetup at Ledger Park for the men's Real Bedford match, and again on Sunday for the women's match. Check out the link for ticket details.
- Bitcoin Ireland Conference 2025: Bitcoin Ireland is hosting its annual Bitcoin Conference, building on the momentum of previous years. This year Bitcoin Events UK are proudly serving as a media partner to help spread the word! Enter our competition to win two free tickets (€198 value). This year's lineup of international guest speakers includes Daniel Prince, alongside notable figures like Knut Svanholm, Dinny Collins, Lawrence-Stanley and other respected voices in the Bitcoin community, offering thoughtful perspectives on the evolving Bitcoin revolution.
The main conference takes place on Saturday, May 24th, at The Green Isle Hotel in Dublin. Following the event, attendees can join a relaxed networking meetup with Ireland's Bitcoin community to continue the discussion. For ticket details, visit: www.bitcoinireland.eu.
Get Involved
- Volunteer Opportunities: Bridge2Bitcoin is actively seeking volunteers who share our passion for merchant adoption. We'd be delighted to connect if you're eager to contribute. Reach out to us on Twitter or through our website.
- Start Your Own Meetup: Interested in launching a Bitcoin meetup? We're here to support you every step of the way. We've assisted numerous UK Bitcoin meetups in getting started. Get in touch via Twitter.
- Contribute to BTCMaps: BTCMaps is a vital part of the Bitcoin ecosystem. It's a perfect project to get involved with if you're not a coder or even that technical. A great way to give back to the community. Maintain an area of the UK and keep it up-to-date.
- Telegram users: You might find our Telegram Channel another useful way to keep up-to-date with UK meetups.
- Feedback and Suggestions: We value your input! Share your ideas on how we can enhance this newsletter.
This week's sponsors are…
Get out and support the meetups where you can, visit Bitcoin Events UK for more info on each meetup and to find your closest on the interactive map.
Stay tuned for more updates next week!
Simon.
-
-
@ 2e8970de:63345c7a
2025-03-09 10:10:10https://github.com/Svensson-Lab/pro-hormone-predictor/blob/cdb283afa4255d99a401c831dfe9ddc070e15b15/FastaParser.py#L32
Stanford just found a natural alternative to Ozempic using some clever regex on the human proteome.
Instead of manually searching through proteins, their one-liner “peptide predictor” regex narrowed down promising candidates.
The calculation likely took just a few seconds.
What I find amusing here is how you'd normally think "regex" is the clickbait euphemism. But it isn't. They're literally just using regex to go through human proteins lol
originally posted at https://stacker.news/items/908130
-
@ da0b9bc3:4e30a4a9
2025-03-09 07:38:43Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/908081
-
@ c913b8e3:8704332c
2025-03-09 07:13:10The markets are returning to normal? Everything was priced for perfection. The S&P 500 gaining over 30% for two consecutive years is not normal. Maybe we go back to a normal return of 4-8% per year? But really, what even is "normal" nowadays?
Passive investing is a huge problem, but that's a rant for another day. It's certainly not normal.
The past 5-6 years have nothing to do with real investing. It has become gambling and peak idiocy. Do I seriously think I'm smarter and can pick the right stocks? Does contrarian investing always work? Why has it worked lately?
People have become slaves to algorithms, completely losing the ability to think objectively. Just a massive idiotic blob bulldozing through logic.
Even very successful people have pitched meme stocks to me - stocks already up 300-500%, without real businesses behind them. What's the upside? Seriously, what's the point? If insiders are selling, the stock has soared hundreds of percent, isn't profitable, and your info comes from Reddit or X - stop and ask yourself, are you an idiot?
The market has been about predicting where this mindless blob moves next. Sorry, I missed the train that "Rearming Europe" would become the hot narrative, making European defense stocks the next "big thing." Or German cement business. This is exorbitant. I've said it for years: the market is turning into a cryptocasino. To succeed, you have to obsessively live and breathe the next trending narrative - it requires zero skill, just madness.
Politics mirror the market’s idiocy. Mention Trump here in Finland, and people lose their minds, incapable of rational discussion or seeing the bigger picture. I've lost friendships just by suggesting peace negotiations. Finnish media pushes a singular narrative through the same old fear-mongering analysts, conveniently now riding the EU gravy train to Brussels. How ironic.
Europe
Now the narrative is shifting to Europe. Europe is great! Or is it? Finnish politicians who once opposed collective EU debt now love it because "Russia." They're even ready to seize Russian assets.
Increasing defense spending might make sense, but funding it with debt? Even Germany, the last bastion of economic sense, is piling on debt, with Poland and the rest close behind. Hard work and tough decisions are too much effort - take on more debt!
Euro stocks might rise, but why own them? Europe lacks essential resources like raw materials, energy, oil - and frankly, competent leadership. Money won't fix structural problems.
In Finland, purchasing power has regressed 15-20 years. Are you ready for another hit?
Europe is slowly becoming more like Russia: bureaucratic, corrupt, and convinced that more central planning will magically solve everything. Good luck with that.
Maybe it's time we think less about ourselves and more about building something better for our kids. Otherwise, what are we even doing?The markets are returning to normal? Everything was priced for perfection. The S&P 500 gaining over 30% for two consecutive years is not normal. Maybe we go back to a normal return of 4-8% per year? But really, what even is "normal" nowadays?
Passive investing is a huge problem, but that's a rant for another day. It's certainly not normal.
The past 5-6 years have nothing to do with real investing. It has become gambling and peak idiocy. Do I seriously think I'm smarter and can pick the right stocks? Does contrarian investing always work? Why has it worked lately?
People have become slaves to algorithms, completely losing the ability to think objectively. Just a massive idiotic blob bulldozing through logic.
Even very successful people have pitched meme stocks to me - stocks already up 300-500%, without real businesses behind them. What's the upside? Seriously, what's the point? If insiders are selling, the stock has soared hundreds of percent, isn't profitable, and your info comes from Reddit or X - stop and ask yourself, are you an idiot?
The market has been about predicting where this mindless blob moves next. Sorry, I missed the train that "Rearming Europe" would become the hot narrative, making European defense stocks the next "big thing." Or German cement business. This is exorbitant. I've said it for years: the market is turning into a cryptocasino. To succeed, you have to obsessively live and breathe the next trending narrative - it requires zero skill, just madness.
Politics mirror the market’s idiocy. Mention Trump here in Finland, and people lose their minds, incapable of rational discussion or seeing the bigger picture. I've lost friendships just by suggesting peace negotiations. Finnish media pushes a singular narrative through the same old fear-mongering analysts, conveniently now riding the EU gravy train to Brussels. How ironic.
Europe Now the narrative is shifting to Europe. Europe is great! Or is it? Finnish politicians who once opposed collective EU debt now love it because "Russia." They're even ready to seize Russian assets.
Increasing defense spending might make sense, but funding it with debt? Even Germany, the last bastion of economic sense, is piling on debt, with Poland and the rest close behind. Hard work and tough decisions are too much effort - take on more debt!
Euro stocks might rise, but why own them? Europe lacks essential resources like raw materials, energy, oil - and frankly, competent leadership. Money won't fix structural problems.
In Finland, purchasing power has regressed 15-20 years. Are you ready for another hit?
Europe is slowly becoming more like Russia: bureaucratic, corrupt, and convinced that more central planning will magically solve everything. Good luck with that.
Maybe it's time we think less about ourselves and more about building something better for our kids. Otherwise, what are we even doing?