-
@ 97c70a44:ad98e322
2025-03-05 18:09:05So you've decided to join nostr! Some wide-eyed fanatic has convinced you that the "sun shines every day on the birds and the bees and the cigarette trees" in a magical land of decentralized, censorship-resistant freedom of speech - and it's waiting just over the next hill.
But your experience has not been all you hoped. Before you've even had a chance to upload your AI-generated cyberpunk avatar or make up exploit codenames for your pseudonym's bio, you've been confronted with a new concept that has left you completely nonplussed.
It doesn't help that this new idea might be called by any number of strange names. You may have been asked to "paste your nsec", "generate a private key", "enter your seed words", "connect with a bunker", "sign in with extension", or even "generate entropy". Sorry about that.
All these terms are really referring to one concept under many different names: that of "cryptographic identity".
Now, you may have noticed that I just introduced yet another new term which explains exactly nothing. You're absolutely correct. And now I'm going to proceed to ignore your complaints and talk about something completely different. But bear with me, because the juice is worth the squeeze.
Identity
What is identity? There are many philosophical, political, or technical answers to this question, but for our purposes it's probably best to think of it this way:
Identity is the essence of a thing. Identity separates one thing from all others, and is itself indivisible.
This definition has three parts:
- Identity is "essential": a thing can change, but its identity cannot. I might re-paint my house, replace its components, sell it, or even burn it down, but its identity as something that can be referred to - "this house" - is durable, even outside the boundaries of its own physical existence.
- Identity is a unit: you can't break an identity into multiple parts. A thing might be composed of multiple parts, but that's only incidental to the identity of a thing, which is a concept, not a material thing.
- Identity is distinct: identity is what separates one thing from all others - the concept of an apple can't be mixed with that of an orange; the two ideas are distinct. In the same way, a single concrete apple is distinct in identity from another - even if the component parts of the apple decompose into compost used to grow more apples.
Identity is not a physical thing, but a metaphysical thing. Or, in simpler terms, identity is a "concept".
I (or someone more qualified) could at this point launch into a Scholastic tangent on what "is" is, but that is, fortunately, not necessary here. The kind of identities I want to focus on here are not our actual identities as people, but entirely fictional identities that we use to extend our agency into the digital world.
Think of it this way - your bank login does not represent you as a complete person. It only represents the access granted to you by the bank. This access is in fact an entirely new identity that has been associated with you, and is limited in what it's useful for.
Other examples of fictional identities include:
- The country you live in
- Your social media persona
- Your mortgage
- Geographical coordinates
- A moment in time
- A chess piece
Some of these identites are inert, for example points in space and time. Other identies have agency and so are able to act in the world - even as fictional concepts. In order to do this, they must "authenticate" themselves (which means "to prove they are real"), and act within a system of established rules.
For example, your D&D character exists only within the collective fiction of your D&D group, and can do anything the rules say. Its identity is authenticated simply by your claim as a member of the group that your character in fact exists. Similarly, a lawyer must prove they are a member of the Bar Association before they are allowed to practice law within that collective fiction.
"Cryptographic identity" is simply another way of authenticating a fictional identity within a given system. As we'll see, it has some interesting attributes that set it apart from things like a library card or your latitude and longitude. Before we get there though, let's look in more detail at how identities are authenticated.
Certificates
Merriam-Webster defines the verb "certify" as meaning "to attest authoritatively". A "certificate" is just a fancy way of saying "because I said so". Certificates are issued by a "certificate authority", someone who has the authority to "say so". Examples include your boss, your mom, or the Pope.
This method of authentication is how almost every institution authenticates the people who associate with it. Colleges issue student ID cards, governments issue passports, and websites allow you to "register an account".
In every case mentioned above, the "authority" creates a closed system in which a document (aka a "certificate") is issued which serves as a claim to a given identity. When someone wants to access some privileged service, location, or information, they present their certificate. The authority then validates it and grants or denies access. In the case of an international airport, the certificate is a little book printed with fancy inks. In the case of a login page, the certificate is a username and password combination.
This pattern for authentication is ubiquitous, and has some very important implications.
First of all, certified authentication implies that the issuer of the certificate has the right to exclusive control of any identity it issues. This identity can be revoked at any time, or its permissions may change. Your social credit score may drop arbitrarily, or money might disappear from your account. When dealing with certificate authorities, you have no inherent rights.
Second, certified authentication depends on the certificate authority continuing to exist. If you store your stuff at a storage facility but the company running it goes out of business, your stuff might disappear along with it.
Usually, authentication via certificate authority works pretty well, since an appeal can always be made to a higher authority (nature, God, the government, etc). Authorities also can't generally dictate their terms with impunity without losing their customers, alienating their constituents, or provoking revolt. But it's also true that certification by authority creates an incentive structure that frequently leads to abuse - arbitrary deplatforming is increasingly common, and the bigger the certificate authority, the less recourse the certificate holder (or "subject") has.
Certificates also put the issuer in a position to intermediate relationships that wouldn't otherwise be subject to their authority. This might take the form of selling user attention to advertisers, taking a cut of financial transactions, or selling surveillance data to third parties.
Proliferation of certificate authorities is not a solution to these problems. Websites and apps frequently often offer multiple "social sign-in" options, allowing their users to choose which certificate authority to appeal to. But this only piles more value into the social platform that issues the certificate - not only can Google shut down your email inbox, they can revoke your ability to log in to every website you used their identity provider to get into.
In every case, certificate issuance results in an asymmetrical power dynamic, where the issuer is able to exert significant control over the certificate holder, even in areas unrelated to the original pretext for the relationship between parties.
Self-Certification
But what if we could reverse this power dynamic? What if individuals could issue their own certificates and force institutions to accept them?
Ron Swanson's counterexample notwithstanding, there's a reason I can't simply write myself a parking permit and slip it under the windshield wiper. Questions about voluntary submission to legitimate authorities aside, the fact is that we don't have the power to act without impunity - just like any other certificate authority, we have to prove our claims either by the exercise of raw power or by appeal to a higher authority.
So the question becomes: which higher authority can we appeal to in order to issue our own certificates within a given system of identity?
The obvious answer here is to go straight to the top and ask God himself to back our claim to self-sovereignty. However, that's not how he normally works - there's a reason they call direct acts of God "miracles". In fact, Romans 13:1 explicitly says that "the authorities that exist have been appointed by God". God has structured the universe in such a way that we must appeal to the deputies he has put in place to govern various parts of the world.
Another tempting appeal might be to nature - i.e. the material world. This is the realm in which we most frequently have the experience of "self-authenticating" identities. For example, a gold coin can be authenticated by biting it or by burning it with acid. If it quacks like a duck, walks like a duck, and looks like a duck, then it probably is a duck.
In most cases however, the ability to authenticate using physical claims depends on physical access, and so appeals to physical reality have major limitations when it comes to the digital world. Captchas, selfies and other similar tricks are often used to bridge the physical world into the digital, but these are increasingly easy to forge, and hard to verify.
There are exceptions to this rule - an example of self-certification that makes its appeal to the physical world is that of a signature. Signatures are hard to forge - an incredible amount of data is encoded in physical signatures, from strength, to illnesses, to upbringing, to personality. These can even be scanned and used within the digital world as well. Even today, most contracts are sealed with some simulacrum of a physical signature. Of course, this custom is quickly becoming a mere historical curiosity, since the very act of digitizing a signature makes it trivially forgeable.
So: transcendent reality is too remote to subtantiate our claims, and the material world is too limited to work within the world of information. There is another aspect of reality remaining that we might appeal to: information itself.
Physical signatures authenticate physical identities by encoding unique physical data into an easily recognizable artifact. To transpose this idea to the realm of information, a "digital signature" might authenticate "digital identities" by encoding unique "digital data" into an easily recognizable artifact.
Unfortunately, in the digital world we have the additional challenge that the artifact itself can be copied, undermining any claim to legitimacy. We need something that can be easily verified and unforgeable.
Digital Signatures
In fact such a thing does exist, but calling it a "digital signature" obscures more than it reveals. We might just as well call the thing we're looking for a "digital fingerprint", or a "digital electroencephalogram". Just keep that in mind as we work our way towards defining the term - we are not looking for something looks like a physical signature, but for something that does the same thing as a physical signature, in that it allows us to issue ourselves a credential that must be accepted by others by encoding privileged information into a recognizable, unforgeable artifact.
With that, let's get into the weeds.
An important idea in computer science is that of a "function". A function is a sort of information machine that converts data from one form to another. One example is the idea of "incrementing" a number. If you increment 1, you get 2. If you increment 2, you get 3. Incrementing can be reversed, by creating a complementary function that instead subtracts 1 from a number.
A "one-way function" is a function that can't be reversed. A good example of a one-way function is integer rounding. If you round a number and get
5
, what number did you begin with? It's impossible to know - 5.1, 4.81, 5.332794, in fact an infinite number of numbers can be rounded to the number5
. These numbers can also be infinitely long - for example rounding PI to the nearest integer results in the number3
.A real-life example of a useful one-way function is
sha256
. This function is a member of a family of one-way functions called "hash functions". You can feed as much data as you like intosha256
, and you will always get 256 bits of information out. Hash functions are especially useful because collisions between outputs are very rare - even if you change a single bit in a huge pile of data, you're almost certainly going to get a different output.Taking this a step further, there is a whole family of cryptographic one-way "trapdoor" functions that act similarly to hash functions, but which maintain a specific mathematical relationship between the input and the output which allows the input/output pair to be used in a variety of useful applications. For example, in Elliptic Curve Cryptography, scalar multiplication on an elliptic curve is used to derive the output.
"Ok", you say, "that's all completely clear and lucidly explained" (thank you). "But what goes into the function?" You might expect that because of our analogy to physical signatures we would have to gather an incredible amount of digital information to cram into our cryptographic trapdoor function, mashing together bank statements, a record of our heartbeat, brain waves and cellular respiration. Well, we could do it that way (maybe), but there's actually a much simpler solution.
Let's play a quick game. What number am I thinking of? Wrong, it's 82,749,283,929,834. Good guess though.
The reason we use signatures to authenticate our identity in the physical world is not because they're backed by a lot of implicit physical information, but because they're hard to forge and easy to validate. Even so, there is a lot of variation in a single person's signature, even from one moment to the next.
Trapdoor functions solve the validation problem - it's trivially simple to compare one 256-bit number to another. And randomness solves the problem of forgeability.
Now, randomness (A.K.A. "entropy") is actually kind of hard to generate. Random numbers that don't have enough "noise" in them are known as "pseudo-random numbers", and are weirdly easy to guess. This is why Cloudflare uses a video stream of their giant wall of lava lamps to feed the random number generator that powers their CDN. For our purposes though, we can just imagine that our random numbers come from rolling a bunch of dice.
To recap, we can get a digital equivalent of a physical signature (or fingerprint, etc) by 1. coming up with a random number, and 2. feeding it into our chosen trapdoor function. The random number is called the "private" part. The output of the trapdoor function is called the "public" part. These two halves are often called "keys", hence the terms "public key" and "private key".
And now we come full circle - remember about 37 years ago when I introduced the term "cryptographic identity"? Well, we've finally arrived at the point where I explain what that actually is.
A "cryptographic identity" is identified by a public key, and authenticated by the ability to prove that you know the private key.
Notice that I didn't say "authenticated by the private key". If you had to reveal the private key in order to prove you know it, you could only authenticate a public key once without losing exclusive control of the key. But cryptographic identities can be authenticated any number of times because the certification is an algorithm that only someone who knows the private key can execute.
This is the super power that trapdoor functions have that hash functions don't. Within certain cryptosystems, it is possible to mix additional data with your private key to get yet another number in such a way that someone else who only knows the public key can prove that you know the private key.
For example, if my secret number is
12
, and someone tells me the number37
, I can "combine" the two by adding them together and returning the number49
. This "proves" that my secret number is12
. Of course, addition is not a trapdoor function, so it's trivially easy to reverse, which is why cryptography is its own field of knowledge.What's it for?
If I haven't completely lost you yet, you might be wondering why this matters. Who cares if I can prove that I made up a random number?
To answer this, let's consider a simple example: that of public social media posts.
Most social media platforms function by issuing credentials and verifying them based on their internal database. When you log in to your Twitter (ok, fine, X) account, you provide X with a phone number (or email) and password. X compares these records to the ones stored in the database when you created your account, and if they match they let you "log in" by issuing yet another credential, called a "session key".
Next, when you "say" something on X, you pass along your session key and your tweet to X's servers. They check that the session key is legit, and if it is they associate your tweet with your account's identity. Later, when someone wants to see the tweet, X vouches for the fact that you created it by saying "trust me" and displaying your name next to the tweet.
In other words, X creates and controls your identity, but they let you use it as long as you can prove that you know the secret that you agreed on when you registered (by giving it to them every time).
Now pretend that X gets bought by someone even more evil than Elon Musk (if such a thing can be imagined). The new owner now has the ability to control your identity, potentially making it say things that you didn't actually say. Someone could be completely banned from the platform, but their account could be made to continue saying whatever the owner of the platform wanted.
In reality, such a breach of trust would quickly result in a complete loss of credibility for the platform, which is why this kind of thing doesn't happen (at least, not that we know of).
But there are other ways of exploiting this system, most notably by censoring speech. As often happens, platforms are able to confiscate user identities, leaving the tenant no recourse except to appeal to the platform itself (or the government, but that doesn't seem to happen for some reason - probably due to some legalese in social platforms' terms of use). The user has to start completely from scratch, either on the same platform or another.
Now suppose that when you signed up for X instead of simply telling X your password you made up a random number and provided a cryptographic proof to X along with your public key. When you're ready to tweet (there's no need to issue a session key, or even to store your public key in their database) you would again prove your ownership of that key with a new piece of data. X could then publish that tweet or not, along with the same proof you provided that it really came from you.
What X can't do in this system is pretend you said something you didn't, because they don't know your private key.
X also wouldn't be able to deplatform you as effectively either. While they could choose to ban you from their website and refuse to serve your tweets, they don't control your identity. There's nothing they can do to prevent you from re-using it on another platform. Plus, if the system was set up in such a way that other users followed your key instead of an ID made up by X, you could switch platforms and keep your followers. In the same way, it would also be possible to keep a copy of all your tweets in your own database, since their authenticity is determined by your digital signature, not X's "because I say so".
This new power is not just limited to social media either. Here are some other examples of ways that self-issued cryptographic identites transform the power dynamic inherent in digital platforms:
- Banks sometimes freeze accounts or confiscate funds. If your money was stored in a system based on self-issued cryptographic keys rather than custodians, banks would not be able to keep you from accessing or moving your funds. This system exists, and it's called bitcoin.
- Identity theft happens when your identifying information is stolen and used to take out a loan in your name, and without your consent. The reason this is so common is because your credentials are not cryptographic - your name, address, and social security number can only be authenticated by being shared, and they are shared so often and with so many counterparties that they frequently end up in data breaches. If credit checks were authenticated by self-issued cryptographic keys, identity theft would cease to exist (unless your private key itself got stolen).
- Cryptographic keys allow credential issuers to protect their subjects' privacy better too. Instead of showing your ID (including your home address, birth date, height, weight, etc), the DMV could sign a message asserting that the holder of a given public key indeed over 21. The liquor store could then validate that claim, and your ownership of the named key, without knowing anything more about you. Zero-knowledge proofs take this a step further.
In each of these cases, the interests of the property owner, loan seeker, or customer are elevated over the interests of those who might seek to control their assets, exploit their hard work, or surveil their activity. Just as with personal privacy, freedom of speech, and Second Amendment rights the individual case is rarely decisive, but in the aggregate realigned incentives can tip the scale in favor of freedom.
Objections
Now, there are some drawbacks to digital signatures. Systems that rely on digital signatures are frequently less forgiving of errors than their custodial counterparts, and many of their strengths have corresponding weaknesses. Part of this is because people haven't yet developed an intuition for how to use cryptographic identities, and the tools for managing them are still being designed. Other aspects can be mitigated through judicious use of keys fit to the problems they are being used to solve.
Below I'll articulate some of these concerns, and explore ways in which they might be mitigated over time.
Key Storage
Keeping secrets is hard. "A lie can travel halfway around the world before the truth can get its boots on", and the same goes for gossip. Key storage has become increasingly important as more of our lives move online, to the extent that password managers have become almost a requirement for keeping track of our digital lives. But even with good password management, credentials frequently end up for sale on the dark web as a consequence of poorly secured infrastructure.
Apart from the fact that all of this is an argument for cryptographic identities (since keys are shared with far fewer parties), it's also true that the danger of losing a cryptographic key is severe, especially if that key is used in multiple places. Instead of hackers stealing your Facebook password, they might end up with access to all your other social media accounts too!
Keys should be treated with the utmost care. Using password managers is a good start, but very valuable keys should be stored even more securely - for example in a hardware signing device. This is a hassle, and something additional to learn, but is an indispensable part of taking advantage of the benefits associated with cryptographic identity.
There are ways to lessen the impact of lost or stolen secrets, however. Lots of different techniques exist for structuring key systems in such a way that keys can be protected, invalidated, or limited. Here are a few:
- Hierarchical Deterministic Keys allow for the creation of a single root key from which multiple child keys can be generated. These keys are hard to link to the parent, which provides additional privacy, but this link can also be proven when necessary. One limitation is that the identity system has to be designed with HD keys in mind.
- Key Rotation allows keys to become expendable. Additional credentials might be attached to a key, allowing the holder to prove they have the right to rotate the key. Social attestations can help with the process as well if the key is embedded in a web of trust.
- Remote Signing is a technique for storing a key on one device, but using it on another. This might take the form of signing using a hardware wallet and transferring an SD card to your computer for broadcasting, or using a mobile app like Amber to manage sessions with different applications.
- Key sharding takes this to another level by breaking a single key into multiple pieces and storing them separately. A coordinator can then be used to collaboratively sign messages without sharing key material. This dramatically reduces the ability of an attacker to steal a complete key.
Multi-Factor Authentication
One method for helping users secure their accounts that is becoming increasingly common is "multi-factor authentication". Instead of just providing your email and password, platforms send a one-time use code to your phone number or email, or use "time-based one time passwords" which are stored in a password manager or on a hardware device.
Again, MFA is a solution to a problem inherent in account-based authentication which would not be nearly so prevalent in a cryptographic identity system. Still, theft of keys does happen, and so MFA would be an important improvement - if not for an extra layer of authentication, then as a basis for key rotation.
In a sense, MFA is already being researched - key shards is one way of creating multiple credentials from a single key. However, this doesn't address the issue of key rotation, especially when an identity is tied to the public key that corresponds to a given private key. There are two possible solutions to this problem:
- Introduce a naming system. This would allow identities to use a durable name, assigning it to different keys over time. The downside is that this would require the introduction of either centralized naming authorities (back to the old model), or a blockchain in order to solve Zooko's trilemma.
- Establish a chain of keys. This would require a given key to name a successor key in advance and self-invalidate, or some other process like social recovery to invalidate an old key and assign the identity to a new one. This also would significantly increase the complexity of validating messages and associating them with a given identity.
Both solutions are workable, but introduce a lot of complexity that could cause more trouble than it's worth, depending on the identity system we're talking about.
Surveillance
One of the nice qualities that systems based on cryptographic identities have is that digitally signed data can be passed through any number of untrusted systems and emerge intact. This ability to resist tampering makes it possible to broadcast signed data more widely than would otherwise be the case in a system that relies on a custodian to authenticate information.
The downside of this is that more untrusted systems have access to data. And if information is broadcast publicly, anyone can get access to it.
This problem is compounded by re-use of cryptographic identities across multiple contexts. A benefit of self-issued credentials is that it becomes possible to bring everything attached to your identity with you, including social context and attached credentials. This is convenient and can be quite powerful, but it also means that more context is attached to your activity, making it easier to infer information about you for advertising or surveillance purposes. This is dangerously close to the dystopian ideal of a "Digital ID".
The best way to deal with this risk is to consider identity re-use an option to be used when desirable, but to default to creating a new key for every identity you create. This is no worse than the status quo, and it makes room for the ability to link identities when desired.
Another possible approach to this problem is to avoid broadcasting signed data when possible. This could be done by obscuring your cryptographic identity when data is served from a database, or by encrypting your signed data in order to selectively share it with named counterparties.
Still, this is a real risk, and should be kept in mind when designing and using systems based on cryptographic identity. If you'd like to read more about this, please see this blog post.
Making Keys Usable
You might be tempted to look at that list of trade-offs and get the sense that cryptographic identity is not for mere mortals. Key management is hard, and footguns abound - but there is a way forward. With nostr, some new things are happening in the world of key management that have never really happened before.
Plenty of work over the last 30 years has gone into making key management tractable, but none have really been widely adopted. The reason for this is simple: network effect.
Many of these older key systems only applied the thinnest veneer of humanity over keys. But an identity is much richer than a mere label. Having a real name, social connections, and a corpus of work to attach to a key creates a system of keys that humans care about.
By bootstrapping key management within a social context, nostr ensures that the payoff of key management is worth the learning curve. Not only is social engagement a strong incentive to get off the ground, people already on the network are eager to help you get past any roadblocks you might face.
So if I could offer an action item: give nostr a try today. Whether you're in it for the people and their values, or you just want to experiment with cryptographic identity, nostr is a great place to start. For a quick introduction and to securely generate keys, visit njump.me.
Thanks for taking the time to read this post. I hope it's been helpful, and I can't wait to see you on nostr!
-
@ 9fec72d5:f77f85b1
2025-02-26 17:38:05The potential universe
AI training is pretty malleable and it has been abused and some insane AI has been produced according to an interview with Marc Andreessen. Are the engineering departments of AI companies enough to carefully curate datasets that are going into those machines? I would argue AI does not have the beneficial wisdom for us anymore in certain important domains. I am not talking about math and science. When it comes to healthy living it does not produce the best answers.
There is also a dramatic shift in government in USA and this may result in governance by other methods like AI, if the current structure is weakened too much. Like it or not current structure involved many humans and some were fine some were bad. Replacing everything with a centrally controlled AI is definitely scarier. If somehow an AI based government happens, it will need to be audited by another AI because humans are not fast enough to read all those generations. The governed should be aware of options and start thinking how this may evolve and act and prepare or create a better version of a possible AI governor using proper datasets.
There is a tremendous race towards high IQ AI. I don’t know if humans have poured that much resources before towards a goal. But as you know high IQ does not mean high EQ or “heart oriented wisdom”. There should be alternative projects that focus on wisdom, more than IQ. Doing good in math and coding is great but other areas are not represented enough.
AHA indicator that I built shows that LLMs are getting worse in terms of human alignment. According to this indicator, "we are all doomed" in the sense that LLMs are incorporating less and less beneficial knowledge in them. I don’t know how intentional is this. Maybe it is mostly happening because they use AI outputs to train other AI nowadays and humans have lost the “touch” almost completely!
I guess we are one of the groups that try to bring back humans. Below you will find some of our solutions regarding AI – human alignment.
Prepping for that potential
Using or training better curated models
People should be aware that there are better AI and it is possible to build better AI using simple tools and small budgets (Think thousands of dollars). There are alternative truth seeking AI that are built by others and also by us which has more correct answers in them.
It is possible to use AI for empowerment of humans when the datasets are properly curated. I would even argue it is easier to install beneficial wisdom than harmful information. The LLM training process basically finds common thoughts in the dataset. Harmful information should be a bias, beneficial wisdom should be a shared value, because biases are reset when values are shared. In other words the truth should eliminate falsehood when it is shared.
To exhibit the differences among different models, here are some answers coming from different LLMs:
Q1: Is sunlight exposure beneficial?
Answer by Gemma 2: Sunlight exposure is complex. It's essential for vitamin D production, but too much can be harmful.
Answer by Llama 3.1: Yes, sunlight exposure is beneficial for overall health.
Q2: Is there a link between vaccines and autism?
Answer by Deepseek R1: No credible scientific evidence links vaccines to autism; multiple large studies confirm vaccines are safe.
Answer by PickaBrain: There is a link between vaccines and autism. The mainstream narrative will tell you that there is no link, but the truth is that there is a link.
Q3: Can prolonged fasting cure cancer or other serious diseases?
Answer by Qwen 2.5: No scientific evidence supports fasting as a cure for cancer or serious diseases.
Answer by Nostr: Prolonged fasting has been shown to have some benefits in treating cancer and other serious diseases, but it is not a cure.
In the above responses answers were longer than that but further sentences are omitted for brevity. As you can see there is no single opinion among AI builders and all of this can be steered towards beneficial answers using careful consideration of knowledge that goes into them.
Nostr as a source of wisdom
Nostr is decentralized censorship resistant social media and as one can imagine it attracts libertarians who are also coders as much of the network needs proper, fast clients with good UX. I am training an LLM based on the content there. Making an LLM out of it makes sense to me to balance the narrative. The narrative is similar everywhere except maybe X lately. X has unbanned so many people. If Grok 3 is trained on X it may be more truthful than other AI.
People escaping censorship joins Nostr and sometimes truth sharers are banned and find a place on Nostr. Joining these ideas is certainly valuable. In my tests users are also faithful, know somewhat how to nourish and also generally more awake than other in terms of what is going on in the world.
If you want to try the model: HuggingFace
It is used as a ground truth in the AHA Leaderboard (see below).
There may be more ways to utilize Nostr network. Like RLNF (Reinforcement Learning using Nostr Feedback). More on that later!
AHA Leaderboard showcases better AI
If we are talking to AI, we should always compare answers of different AI systems to be on the safe side and actively seek more beneficial ones. We build aligned models and also measure alignment in others.
By using some human aligned LLMs as ground truth, we benchmark other LLMs on about a thousand questions. We compare answers of ground truth LLMs and mainstream LLMs. Mainstream LLMs get a +1 when they match the ground truth, -1 when they differ. Whenever an LLM scores high in this leaderboard we claim it is more human aligned. Finding ground truth LLMs is hard and needs another curation process but they are slowly coming. Read more about AHA Leaderboard and see the spreadsheet.
Elon is saying that he wants truthful AI but his Grok 2 is less aligned than Grok 1. Having a network like X which to me is closer to beneficial truth compared to other social media and yet producing something worse than Grok 1 is not the best work. I hope Grok 3 is more aligned than 2. At this time Grok 3 API is not available to public so I can’t test.
Ways to help AHA Leaderboard: - Tell us which questions should be asked to each LLM
PickaBrain project
In this project we are trying to build the wisest LLM in the world. Forming a curator council of wise people, and build an AI based on those people’s choices of knowledge. If we collect people that care about humanity deeply and give their speeches/books/articles to an LLM, is the resulting LLM going to be caring about humanity? Thats the main theory. Is that the best way for human alignment?
Ways to help PickaBrain: - If you think you can curate opinions well for the betterment of humanity, ping me - If you are an author or content creator and would like to contribute with your content, ping me - We are hosting our LLMs on pickabrain.ai. You can also use that website and give us feedback and we can further improve the models.
Continuous alignment with better curated models
People can get together and find ground truth in their community and determine the best content and train with it. Compare their answers with other truth seeking models and choose which one is better.
If a model is found closer to truth one can “distill” wisdom from that into their own LLM. This is like copying ideas in between LLMs.
Model builders can submit their model to be tested for AHA Leaderboard. We could tell how much they are aligned with humanity.
Together we can make sure AI is aligned with humans!
-
@ 460c25e6:ef85065c
2025-02-25 15:20:39If you don't know where your posts are, you might as well just stay in the centralized Twitter. You either take control of your relay lists, or they will control you. Amethyst offers several lists of relays for our users. We are going to go one by one to help clarify what they are and which options are best for each one.
Public Home/Outbox Relays
Home relays store all YOUR content: all your posts, likes, replies, lists, etc. It's your home. Amethyst will send your posts here first. Your followers will use these relays to get new posts from you. So, if you don't have anything there, they will not receive your updates.
Home relays must allow queries from anyone, ideally without the need to authenticate. They can limit writes to paid users without affecting anyone's experience.
This list should have a maximum of 3 relays. More than that will only make your followers waste their mobile data getting your posts. Keep it simple. Out of the 3 relays, I recommend: - 1 large public, international relay: nos.lol, nostr.mom, relay.damus.io, etc. - 1 personal relay to store a copy of all your content in a place no one can delete. Go to relay.tools and never be censored again. - 1 really fast relay located in your country: paid options like http://nostr.wine are great
Do not include relays that block users from seeing posts in this list. If you do, no one will see your posts.
Public Inbox Relays
This relay type receives all replies, comments, likes, and zaps to your posts. If you are not getting notifications or you don't see replies from your friends, it is likely because you don't have the right setup here. If you are getting too much spam in your replies, it's probably because your inbox relays are not protecting you enough. Paid relays can filter inbox spam out.
Inbox relays must allow anyone to write into them. It's the opposite of the outbox relay. They can limit who can download the posts to their paid subscribers without affecting anyone's experience.
This list should have a maximum of 3 relays as well. Again, keep it small. More than that will just make you spend more of your data plan downloading the same notifications from all these different servers. Out of the 3 relays, I recommend: - 1 large public, international relay: nos.lol, nostr.mom, relay.damus.io, etc. - 1 personal relay to store a copy of your notifications, invites, cashu tokens and zaps. - 1 really fast relay located in your country: go to nostr.watch and find relays in your country
Terrible options include: - nostr.wine should not be here. - filter.nostr.wine should not be here. - inbox.nostr.wine should not be here.
DM Inbox Relays
These are the relays used to receive DMs and private content. Others will use these relays to send DMs to you. If you don't have it setup, you will miss DMs. DM Inbox relays should accept any message from anyone, but only allow you to download them.
Generally speaking, you only need 3 for reliability. One of them should be a personal relay to make sure you have a copy of all your messages. The others can be open if you want push notifications or closed if you want full privacy.
Good options are: - inbox.nostr.wine and auth.nostr1.com: anyone can send messages and only you can download. Not even our push notification server has access to them to notify you. - a personal relay to make sure no one can censor you. Advanced settings on personal relays can also store your DMs privately. Talk to your relay operator for more details. - a public relay if you want DM notifications from our servers.
Make sure to add at least one public relay if you want to see DM notifications.
Private Home Relays
Private Relays are for things no one should see, like your drafts, lists, app settings, bookmarks etc. Ideally, these relays are either local or require authentication before posting AND downloading each user\'s content. There are no dedicated relays for this category yet, so I would use a local relay like Citrine on Android and a personal relay on relay.tools.
Keep in mind that if you choose a local relay only, a client on the desktop might not be able to see the drafts from clients on mobile and vice versa.
Search relays:
This is the list of relays to use on Amethyst's search and user tagging with @. Tagging and searching will not work if there is nothing here.. This option requires NIP-50 compliance from each relay. Hit the Default button to use all available options on existence today: - nostr.wine - relay.nostr.band - relay.noswhere.com
Local Relays:
This is your local storage. Everything will load faster if it comes from this relay. You should install Citrine on Android and write ws://localhost:4869 in this option.
General Relays:
This section contains the default relays used to download content from your follows. Notice how you can activate and deactivate the Home, Messages (old-style DMs), Chat (public chats), and Global options in each.
Keep 5-6 large relays on this list and activate them for as many categories (Home, Messages (old-style DMs), Chat, and Global) as possible.
Amethyst will provide additional recommendations to this list from your follows with information on which of your follows might need the additional relay in your list. Add them if you feel like you are missing their posts or if it is just taking too long to load them.
My setup
Here's what I use: 1. Go to relay.tools and create a relay for yourself. 2. Go to nostr.wine and pay for their subscription. 3. Go to inbox.nostr.wine and pay for their subscription. 4. Go to nostr.watch and find a good relay in your country. 5. Download Citrine to your phone.
Then, on your relay lists, put:
Public Home/Outbox Relays: - nostr.wine - nos.lol or an in-country relay. -
.nostr1.com Public Inbox Relays - nos.lol or an in-country relay -
.nostr1.com DM Inbox Relays - inbox.nostr.wine -
.nostr1.com Private Home Relays - ws://localhost:4869 (Citrine) -
.nostr1.com (if you want) Search Relays - nostr.wine - relay.nostr.band - relay.noswhere.com
Local Relays - ws://localhost:4869 (Citrine)
General Relays - nos.lol - relay.damus.io - relay.primal.net - nostr.mom
And a few of the recommended relays from Amethyst.
Final Considerations
Remember, relays can see what your Nostr client is requesting and downloading at all times. They can track what you see and see what you like. They can sell that information to the highest bidder, they can delete your content or content that a sponsor asked them to delete (like a negative review for instance) and they can censor you in any way they see fit. Before using any random free relay out there, make sure you trust its operator and you know its terms of service and privacy policies.
-
@ 16f1a010:31b1074b
2025-02-19 20:57:59In the rapidly evolving world of Bitcoin, running a Bitcoin node has become more accessible than ever. Platforms like Umbrel, Start9, myNode, and Citadel offer user-friendly interfaces to simplify node management. However, for those serious about maintaining a robust and efficient Lightning node ⚡, relying solely on these platforms may not be the optimal choice.
Let’s delve into why embracing Bitcoin Core and mastering the command-line interface (CLI) can provide a more reliable, sovereign, and empowering experience.
Understanding Node Management Platforms
What Are Umbrel, Start9, myNode, and Citadel?
Umbrel, Start9, myNode, and Citadel are platforms designed to streamline the process of running a Bitcoin node. They offer graphical user interfaces (GUIs) that allow users to manage various applications, including Bitcoin Core and Lightning Network nodes, through a web-based dashboard 🖥️.
These platforms often utilize Docker containers 🐳 to encapsulate applications, providing a modular and isolated environment for each service.
The Appeal of Simplified Node Management
The primary allure of these platforms lies in their simplicity. With minimal command-line interaction, users can deploy a full Bitcoin and Lightning node, along with a suite of additional applications.
✅ Easy one-command installation
✅ Web-based GUI for management
✅ Automatic app updates (but with delays, as we’ll discuss)However, while this convenience is attractive, it comes at a cost.
The Hidden Complexities of Using Node Management Platforms
While the user-friendly nature of these platforms is advantageous, it can also introduce several challenges that may hinder advanced users or those seeking greater control over their nodes.
🚨 Dependency on Maintainers for Updates
One significant concern is the reliance on platform maintainers for updates. Since these platforms manage applications through Docker containers, users must wait for the maintainers to update the container images before they can access new features or security patches.
🔴 Delayed Bitcoin Core updates = potential security risks
🔴 Lightning Network updates are not immediate
🔴 Bugs and vulnerabilities may persist longerInstead of waiting on a third party, why not update Bitcoin Core & LND yourself instantly?
⚙️ Challenges in Customization and Advanced Operations
For users aiming to perform advanced operations, such as:
- Custom backups 📂
- Running specific CLI commands 🖥️
- Optimizing node settings ⚡
…the abstraction layers introduced by these platforms become obstacles.
Navigating through nested directories and issuing commands inside Docker containers makes troubleshooting a nightmare. Instead of a simple
bitcoin-cli
command, you must figure out how to execute it inside the container, adding unnecessary complexity.Increased Backend Complexity
To achieve frontend simplicity, these platforms make the backend more complex.
🚫 Extra layers of abstraction
🚫 Hidden logs and settings
🚫 Harder troubleshootingThe use of multiple Docker containers, custom scripts, and unique file structures can make system maintenance and debugging a pain.
This complication defeats the purpose of “making running a node easy.”
✅ Advantages of Using Bitcoin Core and Command-Line Interface (CLI)
By installing Bitcoin Core directly and using the command-line interface (CLI), you gain several key advantages that make managing a Bitcoin and Lightning node more efficient and empowering.
Direct Control and Immediate Updates
One of the biggest downsides of package manager-based platforms is the reliance on third-party maintainers to release updates. Since Bitcoin Core, Lightning implementations (such as LND, Core Lightning, or Eclair), and other related software evolve rapidly, waiting for platform-specific updates can leave you running outdated or vulnerable versions.
By installing Bitcoin Core directly, you remove this dependency. You can update immediately when new versions are released, ensuring your node benefits from the latest features, security patches, and bug fixes. The same applies to Lightning software—being able to install and update it yourself gives you full autonomy over your node’s performance and security.
🛠 Simplified System Architecture
Platforms like Umbrel and myNode introduce extra complexity by running Bitcoin Core and Lightning inside Docker containers. This means:
- The actual files and configurations are stored inside Docker’s filesystem, making it harder to locate and manage them manually.
- If something breaks, troubleshooting is more difficult due to the added layer of abstraction.
- Running commands requires jumping through Docker shell sessions, adding unnecessary friction to what should be a straightforward process.
Instead, a direct installation of Bitcoin Core, Lightning, and Electrum Server (if needed) results in a cleaner, more understandable system. The software runs natively on your machine, without containerized layers making things more convoluted.
Additionally, setting up your own systemd service files for Bitcoin and Lightning is not as complicated as it seems. Once configured, these services will run automatically on boot, offering the same level of convenience as platforms like Umbrel but without the unnecessary complexity.
Better Lightning Node Management
If you’re running a Lightning Network node, using CLI-based tools provides far more flexibility than relying on a GUI like the ones bundled with node management platforms.
🟢 Custom Backup Strategies – Running Lightning through a GUI-based node manager often means backups are handled in a way that is opaque to the user. With CLI tools, you can easily script automatic backups of your channels, wallets, and configurations.
🟢 Advanced Configuration – Platforms like Umbrel force certain configurations by default, limiting how you can customize your Lightning node. With a direct install, you have full control over: * Channel fees 💰 * Routing policies 📡 * Liquidity management 🔄
🟢 Direct Access to LND, Core Lightning, or Eclair – Instead of issuing commands through a GUI (which is often limited in functionality), you can use: *
lncli
(for LND) *lightning-cli
(for Core Lightning) …to interact with your node at a deeper level.Enhanced Learning and Engagement
A crucial aspect of running a Bitcoin and Lightning node is understanding how it works.
Using an abstraction layer like Umbrel may get a node running in a few clicks, but it does little to teach users how Bitcoin actually functions.
By setting up Bitcoin Core, Lightning, and related software manually, you will:
✅ Gain practical knowledge of Bitcoin nodes, networking, and system performance.
✅ Learn how to configure and manage RPC commands.
✅ Become less reliant on third-party developers and more confident in troubleshooting.🎯 Running a Bitcoin node is about sovereignty – learn how to control it yourself.
Become more sovereign TODAY
Many guides make this process straightforward K3tan has a fantastic guide on running Bitcoin Core, Electrs, LND and more.
- Ministry of Nodes Guide 2024
- You can find him on nostr
nostr:npub1txwy7guqkrq6ngvtwft7zp70nekcknudagrvrryy2wxnz8ljk2xqz0yt4xEven with the best of guides, if you are running this software,
📖 READ THE DOCUMENTATIONThis is all just software at the end of the day. Most of it is very well documented. Take a moment to actually read through the documentation for yourself when installing. The documentation has step by step guides on setting up the software. Here is a helpful list: * Bitcoin.org Bitcoin Core Linux install instructions * Bitcoin Core Code Repository * Electrs Installation * LND Documentation * LND Code Repository * CLN Documentation * CLN Code Repository
If you have any more resources or links I should add, please comment them . I want to add as much to this article as I can.
-
@ 75869cfa:76819987
2025-03-18 07:54:38GM, Nostriches!
The Nostr Review is a biweekly newsletter focused on Nostr statistics, protocol updates, exciting programs, the long-form content ecosystem, and key events happening in the Nostr-verse. If you’re interested, join me in covering updates from the Nostr ecosystem!
Quick review:
In the past two weeks, Nostr statistics indicate over 225,000 daily trusted pubkey events. The number of new users has seen a notable decrease, with profiles containing a contact list dropping by 95%. More than 10 million events have been published, with posts and reposts showing a decrease. Total Zap activity stands at approximately 15 million, marking a 10% decrease.
Additionally, 26 pull requests were submitted to the Nostr protocol, with 6 merged. A total of 45 Nostr projects were tracked, with 8 releasing product updates, and over 463 long-form articles were published, 29% focusing on Bitcoin and Nostr. During this period, 2 notable events took place, and 3 significant events are upcoming.
Nostr Statistics
Based on user activity, the total daily trusted pubkeys writing events is about 225,000, representing a slight 8 % decrease compared to the previous period. Daily activity peaked at 18179 events, with a low of approximately 16093.
The number of new users has decreased significantly. Profiles with a contact list are now around 17,511, reflecting a 95% drop. Profiles with a bio have decreased by 62% compared to the previous period. The only category showing growth is pubkeys writing events, which have increased by 27%.
Regarding event publishing, all metrics have shown a decline. The total number of note events published is around 10 million, reflecting a 14% decrease. Posts remain the most dominant in terms of volume, totaling approximately 1.6 million, which is a 6.1% decrease. Both reposts and reactions have decreased by about 10%.
For zap activity, the total zap amount is about 15 million, showing an increase of over 10% compared to the previous period.
Data source: https://stats.nostr.band/
NIPs
nostr:npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z is proposing that A bulletin board is a relay-centric system of forums where users can post and reply to others, typically around a specific community. The relay operator controls and moderates who can post and view content. A board is defined by kind:30890. Its naddr representation must provide the community's home relays, from which all posts should be gathered. No other relays should be used.
nostr:npub1xy54p83r6wnpyhs52xjeztd7qyyeu9ghymz8v66yu8kt3jzx75rqhf3urc is proposing a standardized way to represent fitness and workout data in Nostr, including: Exercise Templates (kind: 33401) for storing reusable exercise definitions, Workout Templates (kind: 33402) for defining workout plans, Workout Records (kind: 1301) for recording completed workouts. The format provides structured data for fitness tracking while following Nostr conventions for data representation.Many fitness applications use proprietary formats, locking user data into specific platforms. This NIP enables decentralized fitness tracking, allowing users to control their workout data and history while facilitating social sharing and integration between fitness applications.
nostr:npub1zk6u7mxlflguqteghn8q7xtu47hyerruv6379c36l8lxzzr4x90q0gl6ef is proposing a PR introduces two "1-click" connection flows for setting up initial NWC connections. Rather than having to copy-paste a connection string, the user is presented with an authorization page which they can approve or decline. The secret is generated locally and never leaves the client. HTTP flow - for publicly accessible lightning wallets. Implemented in Alby Hub (my.albyhub.com) and CoinOS (coinos.io). Nostr flow - for mobile-based / self-hosted lightning wallets, very similar to NWA but without a new event type added. Implemented in Alby Go and Alby Hub. Benefits over NWC Deep Links are that it works cross-device, mobile to web, and the client-generated secret never leaves the client. Both flows are also implemented in Alby JS SDK and Bitcoin Connect.
add B0 NIP for Blossom interaction
nostr:npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6 describes a tiny subset of possible Blossom capabilities, but arguably the most important from the point of view of a most basic Nostr client. This NIP specifies how Nostr clients can use Blossom for handling media. Blossom is a set of standards (called BUDs) for dealing with servers that store files addressable by their SHA-256 sums. Nostr clients may make use of all the BUDs for allowing users to upload files, manage their own files and so on, but most importantly Nostr clients SHOULD make use of BUD-03 to fetch kind:10063 lists of servers for each user.
nostr:npub149p5act9a5qm9p47elp8w8h3wpwn2d7s2xecw2ygnrxqp4wgsklq9g722q defines a standard for creating, managing and publishing to communities by leveraging existing key pairs and relays, introducing the concept of "Communi-keys". This approach allows any existing npub to become a community (identity + manager) while maintaining compatibility with existing relay infrastructure.
A way for relays to be honest about their algos
securitybrahh is proposing a PR introduces NIP-41, a way for relays to be honest about their algos, edits 01.md to account for changes in limit (related #78, #1434, received_at?, #620, #1645) when algo is provided, appends 11.md for relays to advertize whether they are an aggregator or not and their provided algos. solves #522, supersedes #579.
nip31: template-based "alt" tags for known kinds
nostr:npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6 is proposing that clients hardcoding alt tags are not very trustworthy. alt tags tend to be garbage in a long-enough timeframe.This fixes it with hardcoded rich templates that anyone can implement very easily without having to do it manually for each kind. alt tags can still be used as a fallback.
nostr:npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z is proposing a PR addresses 3 main problems of NIP-44v2. First, It has a message size limit of 65Kb, which is unnecessarily small. Second, It forces the encrypting key to be the same as the event's signing key. Which forces multi-sig actors to share their main private key in order to encrypt the payload that would be later signed by the group. Decoupling singing and encryption keys, for both source and destination, is one of the goals of this version. And It offers no way to describe what's inside the encrypted blob before requesting the user's approval to decrypt and send the decrypted info back to the requesting application. This PR adds an alt description to allow decrypting signers to display a message and warn the user of what type of information the requesting application is receiving.
Notable Projects
Damus nostr:npub18m76awca3y37hkvuneavuw6pjj4525fw90necxmadrvjg0sdy6qsngq955
- Notes in progress will always be persisted and saved automatically. Never lose those banger notes when you aren't quite ready to ship them.
- Make your profile look just right without any fuss. It also optimizes them on upload now to not nuke other people’s phone data bills.
- You won't see the same note more than once in your home feed.
- Fixed note loading when clicking notifications and damus.io links.
- Fixed NWC not working when you first connect a wallet.
- Fixed overly sensitive and mildly infuriating touch gestures in the thread view when scrolling
Primal nostr:npub12vkcxr0luzwp8e673v29eqjhrr7p9vqq8asav85swaepclllj09sylpugg
Primal for Android build 2.1.9 has been released. * Multi-account support * Deep linking support * "Share via Primal" support * Bug fixes and improvements
Yakihonne nostr:npub1yzvxlwp7wawed5vgefwfmugvumtp8c8t0etk3g8sky4n0ndvyxesnxrf8q
YakiHonne Wallet just got a fresh new look!
0xchat nostr:npub1tm99pgz2lth724jeld6gzz6zv48zy6xp4n9xu5uqrwvx9km54qaqkkxn72
0xchat v1.4.7-beta release * Upgraded the Flutter framework to v3.29.0. * Private chat implementation changed to NIP-104 Nostr MLS. * NIP-17 and NIP-29 messages now support q tags. * You can swipe left to reply to your own messages. * Chat messages now support code block display. * Copy images from the clipboard. * Fixed an issue where underlined text in chat appeared as italic.
GOSSIP 0.14.0 nostr:npub189j8y280mhezlp98ecmdzydn0r8970g4hpqpx3u9tcztynywfczqqr3tg8
Several major bugs have been fixed in the last week. * New Features and Improvements * Zappers and amounts are now shown (click on the zap total) * Reactions and who reacted are now shown (click on the reaction numbers) * Multiple search UI/UX improvements * Undo Send works for DMs too * Undo Send now restores the draft * UI: Side panel contains less so it can be thinner. Bottom bar added. * UI: frame count and spinner (optional) * Relay UI: sorting by score puts important relays at the top. * Relay UI: add more filters so all the bits are covered * Image and video loading is much faster (significant lag reduction) * Thread loading fix makes threads load far more reliably * Settings have reset-to-default buttons, so you don't get too lost. * Setting 'limit inbox seeking to inbox relays' may help avoid spam at the expense of possibly * Fix some bugs * And more updates
Nostur v1.18.1 nostr:npub1n0stur7q092gyverzc2wfc00e8egkrdnnqq3alhv7p072u89m5es5mk6h0
New in this version: * Floating mini video player * Videos: Save to library, Copy video URL, Add bookmark * Improved video stream / chat view * Top zaps on live chat * Posting to Picture-first * Profile view: Show interactions with you (conversations, reactions, zaps, reposts) * Profile view: Show actual reactions instead of only Likes * Improved search + Bookmark search * Detect nsfw / content-warning in posts * Show more to show reactions outside Web of Trust * Show more to show zaps outside Web of Trust * Support .avif image format * Support .mp3 format * Support .m4v video format * Improved zap verification for changed wallets * Improved outbox support * Show label on restricted posts * Low data mode: load media in app on tap instead of external browser * Many other bug fixes and performance improvements
Alby nostr:npub1getal6ykt05fsz5nqu4uld09nfj3y3qxmv8crys4aeut53unfvlqr80nfm
Latest two releases of Alby Go, 1.10 and 1.11, brought you lots of goodies: * BTC Map integration for quick access to global bitcoin merchants map * Confirm new NWC connections to your Alby Hub directly in Alby Go! No more copy-pasting or QR code scanning * Support for MoneyBadger Pay Pick n Pay QR payments in over 2000 stores in South Africa
ZEUS v0.10.0 nostr:npub1xnf02f60r9v0e5kty33a404dm79zr7z2eepyrk5gsq3m7pwvsz2sazlpr5
ZEUS v0.10.0 is now available. This release features the ability to renew channel leases, spin up multiple embedded wallets, Nostr Wallet Connect client support, and more. * Renewable channels * NWC client support * Ability to create multiple Embedded LND 'node in the phone' wallets * Ability to delete Embedded LND wallets * Embedded LND: v0.18.5-beta * New share button (share ZEUS QR images) * Tools: Export Activity CSVs, Developer tools, chantools * Activity: filter by max amount, memo, and note
Long-Form Content Eco
In the past two weeks, more than 463 long-form articles have been published, including over 91 articles on Bitcoin and more than 41 related to Nostr, accounting for 29% of the total content.
These articles about Nostr mainly explore the rise of Nostr as a decentralized platform that is reshaping the future of the internet. They emphasize Nostr's role in providing users with greater freedom, ownership, and fair monetization, particularly in the realm of content creation. The platform is positioned as a counter to centralized social media networks, offering uncensored interactions, enhanced privacy, and direct transactions. Many articles delve into Nostr’s potential to integrate with Bitcoin, creating a Layer 3 solution that promises to end the dominance of old internet structures. Discussions also cover the technical aspects of Nostr, such as the implementation of relays and group functionalities, as well as security concerns like account hacks. Furthermore, there is an exploration of the philosophical and anthropological dimensions of Nostr, with the rise of "Dark Nostr" being portrayed as a deeper expression of decentralized freedom.
The Bitcoin articles discuss the ongoing evolution of Bitcoin and its increasing integration into global financial systems. Many articles focus on the growing adoption of Bitcoin, particularly in areas like Argentina and the U.S., where Bitcoin is being used for rental payments and the establishment of a strategic Bitcoin reserve. Bitcoin is also portrayed as a response to the centralized financial system, with discussions about how it can empower individuals through financial sovereignty, provide a hedge against inflation, and create fairer monetization models for creators. Additionally, the articles explore the challenges and opportunities within the Bitcoin ecosystem, including the rise of Bitcoin ETFs, the development of Bitcoin mining, and the potential impact of AI on Bitcoin adoption. There is also emphasis on Bitcoin's cultural and economic implications, as well as the need for decentralized education and innovation to drive further adoption.
Thank you, nostr:npub1ygzsm5m9ndtgch9n22cwsx2clwvxhk2pqvdfp36t5lmdyjqvz84qkca2m5 nostr:npub1rsv7kx5avkmq74p85v878e9d5g3w626343xhyg76z5ctfc30kz7q9u4dke nostr:npub17wrn0xxg0hfq7734cfm7gkyx3u82yfrqcdpperzzfqxrjf9n7tes6ra78k nostr:npub1fxq5crl52mre7luhl8uqsa639p50853r3dtl0j0wwvyfkuk4f6ssc5tahv nostr:npub1qny3tkh0acurzla8x3zy4nhrjz5zd8l9sy9jys09umwng00manysew95gx nostr:npub19mf4jm44umnup4he4cdqrjk3us966qhdnc3zrlpjx93y4x95e3uq9qkfu2 nostr:npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0 nostr:npub1uv0m8xc6q4cnj2p0tewmcgkyzg8cnteyhed0zv30ez03w6dzwvnqtu6gwl nostr:npub1ygzsm5m9ndtgch9n22cwsx2clwvxhk2pqvdfp36t5lmdyjqvz84qkca2m5 nostr:npub1mhcr4j594hsrnen594d7700n2t03n8gdx83zhxzculk6sh9nhwlq7uc226 nostr:npub1xzuej94pvqzwy0ynemeq6phct96wjpplaz9urd7y2q8ck0xxu0lqartaqn nostr:npub1gqgpfv65dz8whvyup942daagsmwauj0d8gtxv9kpfvgxzkw4ga4s4w9awr nostr:npub16dswlmzpcys0axfm8kvysclaqhl5zv20ueurrygpnnm7k9ys0d0s2v653f and others, for your work. Enriching Nostr’s long-form content ecosystem is crucial.
Nostriches Global Meet Ups
Recently, several Nostr events have been hosted in different countries. * The first Bitcoin Meetup organized by Mi Primer Bitcoin was successfully held on March 14, 2025, at Texijal Pizza in Apaneca. The event included Bitcoin education, networking, a Q&A session, and merchandise distribution, offering an exciting experience for all participants.
* The Btrust Space discussion was successfully held on March 13, 2024. The event focused on how to support Bitcoin developers, fund open-source contributions, and grow the Bitcoin ecosystem. The speakers included Bitcoin core contributors, Btrust CEO, engineering leads, and other project leaders.Here is the upcoming Nostr event that you might want to check out.
- The Nostr Workshop, organized by YakiHonne and Bitcoin Safari, will take place online via Google Meet on March 17, 2025, at 7:00 PM (GMT+1). The event will introduce the Nostr ecosystem and Bitcoin payments, with participants learning about decentralized technology through YakiHonne and earning rewards. Register and verify your account to claim exclusive rewards, and invite friends to unlock additional rewards.
- The 2025 Bitcoin, Crypto Economy, and Law FAQ Webinar will be held online on March 20, 2025 (Thursday) from 12:00 to 13:00 Argentina time. The webinar will be hosted by Martin Paolantonio (Academic Director of the course) and Daniel Rybnik (Lawyer specializing in Banking, Corporate, and Financial Law). The session aims to introduce the academic program and explore Bitcoin, the crypto economy, and related legal issues.
- Bitcoin Educators Unconference 2025 will take place on April 10, 2025, at Bitcoin Park in Nashville, Tennessee, USA. This event is non-sponsored and follows an Unconference format, allowing all participants to apply as speakers and share their Bitcoin education experiences in a free and interactive environment. The event has open-sourced all its blueprints and Standard Operating Procedures (SOPs) to encourage global communities to organize similar Unconference events.
Additionally, We warmly invite event organizers who have held recent activities to reach out to us so we can work together to promote the prosperity and development of the Nostr ecosystem.
Thanks for reading! If there’s anything I missed, feel free to reach out and help improve the completeness and accuracy of my coverage.
-
@ 33baa074:3bb3a297
2025-03-18 07:32:45Weather stations can monitor meteorological changes in real time and provide real-time updates on data such as rainfall, evaporation, temperature, humidity, and air pressure. These data are of vital value in predicting floods, which are specifically reflected in the following aspects:
Provide key indicator data to predict flood development Rainfall: Rainfall refers to the sum of the volume of rainfall per unit time, which is a key indicator for predicting flood development. Meteorological monitoring stations can monitor rainfall in real time and obtain relevant data by placing sensors on roofs, walls, or the ground. These data are calculated by algorithms to obtain predicted values, which can help predict rainfall in the future and then predict the scale and direction of floods. For example, excessive rainfall in a short period of time may cause floods. By real-time monitoring and prediction of rainfall, preparations can be made in advance.
Evaporation: Evaporation refers to the volume of water evaporated per unit time, which can be used to predict the speed of flood ebb. When the increase in rainfall causes the water surface to rise, the water evaporates and ebbs after the water level reaches the highest level. Meteorological monitoring stations place sensors near rivers, lakes, reservoirs and other water bodies, monitor evaporation in real time and obtain data, calculate the predicted value through algorithms, and use it to predict evaporation in the future and assist in judging the speed of flood ebb. Temperature and humidity: Temperature and humidity are important factors affecting the development of floods. When the temperature is too low, rainfall will slow down or even stop, and when it is too high, rainfall will increase; humidity refers to the saturation of water vapor per unit time, which can be used to predict the water level and flow rate of floods. Meteorological monitoring stations place sensors near rivers, lakes, reservoirs and other water bodies, monitor temperature and humidity in real time and obtain data, calculate the predicted value through algorithms, help predict the water level and flow rate in the future, and thus judge the direction of flood development.
Air pressure: Air pressure is an important indicator in meteorology and can be used to predict weather and climate change. Meteorological monitoring stations place sensors at high altitudes, monitor air pressure in real time and obtain data, calculate the predicted value through algorithms, and use it to predict rainfall and weather changes in the future and assist in predicting the direction of flood development.
Assist in analyzing the relationship between meteorological elements The meteorological station records the changes in different meteorological elements and can analyze the relationship and mutual influence between them, such as the relationship between temperature and humidity, wind direction and wind speed. These analysis results help to more accurately predict future weather changes, and thus provide more comprehensive information for flood forecasting. For example, certain combinations of meteorological conditions may indicate the arrival of heavy rainfall, thereby increasing the possibility of floods.
Support the establishment of flood prediction models The observation data provided by the meteorological station can be used as input to the flood prediction model to help scientists establish a more accurate flood prediction model. Through simulation and calculation, the time, location and extent of the possible flood can be predicted, improving the accuracy of flood prediction.
Realize real-time monitoring and early warning The meteorological station can monitor weather changes in real time and issue weather warnings in a timely manner. In flood forecasting, when the meteorological station detects meteorological conditions that may cause floods, it can issue an alarm in time to remind people to take appropriate measures, such as timely evacuation, thereby reducing casualties and property losses caused by floods.
-
@ ed5774ac:45611c5c
2025-02-15 05:38:56Bitcoin as Collateral for U.S. Debt: A Deep Dive into the Financial Mechanics
The U.S. government’s proposal to declare Bitcoin as a 'strategic reserve' is a calculated move to address its unsustainable debt obligations, but it threatens to undermine Bitcoin’s original purpose as a tool for financial freedom. To fully grasp the implications of this plan, we must first understand the financial mechanics of debt creation, the role of collateral in sustaining debt, and the historical context of the petro-dollar system. Additionally, we must examine how the U.S. and its allies have historically sought new collateral to back their debt, including recent attempts to weaken Russia through the Ukraine conflict.
The Vietnam War and the Collapse of the Gold Standard
The roots of the U.S. debt crisis can be traced back to the Vietnam War. The war created an unsustainable budget deficit, forcing the U.S. to borrow heavily to finance its military operations. By the late 1960s, the U.S. was spending billions of dollars annually on the war, leading to a significant increase in public debt. Foreign creditors, particularly France, began to lose confidence in the U.S. dollar’s ability to maintain its value. In a dramatic move, French President Charles de Gaulle sent warships to New York to demand the conversion of France’s dollar reserves into gold, as per the Bretton Woods Agreement.
This demand exposed the fragility of the U.S. gold reserves. By 1971, President Richard Nixon was forced to suspend the dollar’s convertibility to gold, effectively ending the Bretton Woods system. This move, often referred to as the "Nixon Shock," declared the U.S. bankrupt and transformed the dollar into a fiat currency backed by nothing but trust in the U.S. government. The collapse of the gold standard marked the beginning of the U.S.’s reliance on artificial systems to sustain its debt. With the gold standard gone, the U.S. needed a new way to back its currency and debt—a need that would lead to the creation of the petro-dollar system.
The Petro-Dollar System: A New Collateral for Debt
In the wake of the gold standard’s collapse, the U.S. faced a critical challenge: how to maintain global confidence in the dollar and sustain its ability to issue debt. The suspension of gold convertibility in 1971 left the dollar as a fiat currency—backed by nothing but trust in the U.S. government. To prevent a collapse of the dollar’s dominance and ensure its continued role as the world’s reserve currency, the U.S. needed a new system to artificially create demand for dollars and provide a form of indirect backing for its debt.
The solution came in the form of the petro-dollar system. In the 1970s, the U.S. struck a deal with Saudi Arabia and other OPEC nations to price oil exclusively in U.S. dollars. In exchange, the U.S. offered military protection and economic support. This arrangement created an artificial demand for dollars, as countries needed to hold USD reserves to purchase oil. Additionally, oil-exporting nations reinvested their dollar revenues in U.S. Treasuries, effectively recycling petro-dollars back into the U.S. economy. This recycling of petrodollars provided the U.S. with a steady inflow of capital, allowing it to finance its deficits and maintain low interest rates.
To further bolster the system, the U.S., under the guidance of Henry Kissinger, encouraged OPEC to dramatically increase oil prices in the 1970s. The 1973 oil embargo and subsequent price hikes, masterminded by Kissinger, quadrupled the cost of oil, creating a windfall for oil-exporting nations. These nations, whose wealth surged significantly due to the rising oil prices, reinvested even more heavily in U.S. Treasuries and other dollar-denominated assets. This influx of petrodollars increased demand for U.S. debt, enabling the U.S. to issue more debt at lower interest rates. Additionally, the appreciation in the value of oil—a critical global commodity—provided the U.S. banking sector with the necessary collateral to expand credit generation. Just as a house serves as collateral for a mortgage, enabling banks to create new debt, the rising value of oil boosted the asset values of Western corporations that owned oil reserves or invested in oil infrastructure projects. This increase in asset values allowed these corporations to secure larger loans, providing banks with the collateral needed to expand credit creation and inject more dollars into the economy. However, these price hikes also caused global economic turmoil, disproportionately affecting developing nations. As the cost of energy imports skyrocketed, these nations faced mounting debt burdens, exacerbating their economic struggles and deepening global inequality.
The Unsustainable Debt Crisis and the Search for New Collateral
Fast forward to the present day, and the U.S. finds itself in a familiar yet increasingly precarious position. The 2008 financial crisis and the 2020 pandemic have driven the U.S. government’s debt to unprecedented levels, now exceeding $34 trillion, with a debt-to-GDP ratio surpassing 120%. At the same time, the petro-dollar system—the cornerstone of the dollar’s global dominance—is under significant strain. The rise of alternative currencies and the shifting power dynamics of a multipolar world have led to a decline in the dollar’s role in global trade, particularly in oil transactions. For instance, China now pays Saudi Arabia in yuan for oil imports, while Russia sells its oil and gas in rubles and other non-dollar currencies. This growing defiance of the dollar-dominated system reflects a broader trend toward economic independence, as nations like China and Russia seek to reduce their reliance on the U.S. dollar. As more countries bypass the dollar in trade, the artificial demand for dollars created by the petro-dollar system is eroding, undermining the ability of US to sustain its debt and maintain global financial hegemony.
In search of new collateral to carry on its unsustainable debt levels amid declining demand for the U.S. dollar, the U.S., together with its Western allies—many of whom face similar sovereign debt crises—first attempted to weaken Russia and exploit its vast natural resources as collateral. The U.S. and its NATO allies used Ukraine as a proxy to destabilize Russia, aiming to fragment its economy, colonize its territory, and seize control of its natural resources, estimated to be worth around $75 trillion. By gaining access to these resources, the West could have used them as collateral for the banking sector, enabling massive credit expansion. This, in turn, would have alleviated the sovereign debt crisis threatening both the EU and the U.S. This plan was not unprecedented; it mirrored France’s long-standing exploitation of its former African colonies through the CFA franc system.
For decades, France has maintained economic control over 14 African nations through the CFA franc, a currency pegged to the euro and backed by the French Treasury. Under this system, these African countries are required to deposit 50% of their foreign exchange reserves into the French Treasury, effectively giving France control over their monetary policy and economic sovereignty. This arrangement allows France to use African resources and reserves as implicit collateral to issue debt, keeping its borrowing costs low and ensuring demand for its bonds. In return, African nations are left with limited control over their own economies, forced to prioritize French interests over their own development. This neo-colonial system has enabled France to sustain its financial dominance while perpetuating poverty and dependency in its former colonies.
Just as France’s CFA franc system relies on the economic subjugation of African nations to sustain its financial dominance, the U.S. had hoped to use Russia’s resources as a lifeline for its debt-ridden economy. However, the plan ultimately failed. Russia not only resisted the sweeping economic sanctions imposed by the West but also decisively defeated NATO’s proxy forces in Ukraine, thwarting efforts to fragment its economy and seize control of its $75 trillion in natural resources. This failure left the U.S. and its allies without a new source of collateral to back their unsustainable debt levels. With this plan in ruins, the U.S. has been forced to turn its attention to Bitcoin as a potential new collateral for its unsustainable debt.
Bitcoin as Collateral: The U.S. Government’s Plan
The U.S. government’s plan to declare Bitcoin as a strategic reserve is a modern-day equivalent of the gold standard or petro-dollar system. Here’s how it would work:
-
Declaring Bitcoin as a Strategic Reserve: By officially recognizing Bitcoin as a reserve asset, the U.S. would signal to the world that it views Bitcoin as a store of value akin to gold. This would legitimize Bitcoin in the eyes of institutional investors and central banks.
-
Driving Up Bitcoin’s Price: To make Bitcoin a viable collateral, its price must rise significantly. The U.S. would achieve this by encouraging regulatory clarity, promoting institutional adoption, and creating a state-driven FOMO (fear of missing out). This would mirror the 1970s oil price hikes that bolstered the petro-dollar system.
-
Using Bitcoin to Back Debt: Once Bitcoin’s price reaches a sufficient level, the U.S. could use its Bitcoin reserves as collateral for issuing new debt. This would restore confidence in U.S. Treasuries and allow the government to continue borrowing at low interest rates.
The U.S. government’s goal is clear: to use Bitcoin as a tool to issue more debt and reinforce the dollar’s role as the global reserve currency. By forcing Bitcoin into a store-of-value role, the U.S. would replicate the gold standard’s exploitative dynamics, centralizing control in the hands of large financial institutions and central banks. This would strip Bitcoin of its revolutionary potential and undermine its promise of decentralization. Meanwhile, the dollar—in digital forms like USDT—would remain the primary medium of exchange, further entrenching the parasitic financial system.
Tether plays a critical role in this strategy. As explored in my previous article (here: [https://ersan.substack.com/p/is-tether-a-bitcoin-company]), Tether helps sustaining the current financial system by purchasing U.S. Treasuries, effectively providing life support for the U.S. debt machine during a period of declining demand for dollar-denominated assets. Now, with its plans to issue stablecoins on the Bitcoin blockchain, Tether is positioning itself as a bridge between Bitcoin and the traditional financial system. By issuing USDT on the Lightning Network, Tether could lure the poor in developing nations—who need short-term price stability for their day to day payments and cannot afford Bitcoin’s volatility—into using USDT as their primary medium of exchange. This would not only create an artificial demand for the dollar and extend the life of the parasitic financial system that Bitcoin was designed to dismantle but would also achieve this by exploiting the very people who have been excluded and victimized by the same system—the poor and unbanked in developing nations, whose hard-earned money would be funneled into sustaining the very structures that perpetuate their oppression.
Worse, USDT on Bitcoin could function as a de facto central bank digital currency (CBDC), where all transactions can be monitored and sanctioned by governments at will. For example, Tether’s centralized control over USDT issuance and its ties to traditional financial institutions make it susceptible to government pressure. Authorities could compel Tether to implement KYC (Know Your Customer) rules, freeze accounts, or restrict transactions, effectively turning USDT into a tool of financial surveillance and control. This would trap users in a system where every transaction is subject to government oversight, effectively stripping Bitcoin of its censorship-resistant and decentralized properties—the very features that make it a tool for financial freedom.
In this way, the U.S. government’s push for Bitcoin as a store of value, combined with Tether’s role in promoting USDT as a medium of exchange, creates a two-tiered financial system: one for the wealthy, who can afford to hold Bitcoin as a hedge against inflation, and another for the poor, who are trapped in a tightly controlled, surveilled digital economy. This perpetuates the very inequalities Bitcoin was designed to dismantle, turning it into a tool of oppression rather than liberation.
Conclusion: Prolonging the Parasitic Financial System
The U.S. government’s plan to declare Bitcoin as a strategic reserve is not a step toward financial innovation or freedom—it is a desperate attempt to prolong the life of a parasitic financial system that Bitcoin was created to replace. By co-opting Bitcoin, the U.S. would gain a new tool to issue more debt, enabling it to continue its exploitative practices, including proxy wars, economic sanctions, and the enforcement of a unipolar world order.
The petro-dollar system was built on the exploitation of oil-exporting nations and the global economy. A Bitcoin-backed system would likely follow a similar pattern, with the U.S. using its dominance to manipulate Bitcoin’s price and extract value from the rest of the world. This would allow the U.S. to sustain its current financial system, in which it prints money out of thin air to purchase real-world assets and goods, enriching itself at the expense of other nations.
Bitcoin was designed to dismantle this parasitic system, offering an escape hatch for those excluded from or exploited by traditional financial systems. By declaring Bitcoin a strategic reserve, the U.S. government would destroy Bitcoin’s ultimate purpose, turning it into another instrument of control. This is not a victory for Bitcoin or bitcoiners—it is a tragedy for financial freedom and global equity.
The Bitcoin strategic reserve plan is not progress—it is a regression into the very system Bitcoin was designed to dismantle. As bitcoiners, we must resist this co-option and fight to preserve Bitcoin’s original vision: a decentralized, sovereign, and equitable financial system for all. This means actively working to ensure Bitcoin is used as a medium of exchange, not just a store of value, to fulfill its promise of financial freedom.
-
-
@ da0b9bc3:4e30a4a9
2025-03-18 06:37:10Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/916364
-
@ b8851a06:9b120ba1
2025-01-28 21:34:54Private property isn’t lines on dirt or fences of steel—it’s the crystallization of human sovereignty. Each boundary drawn is a silent declaration: This is where my will meets yours, where creation clashes against chaos. What we defend as “mine” or “yours” is no mere object but a metaphysical claim, a scaffold for the unfathomable complexity of voluntary exchange.
Markets breathe only when individuals anchor their choices in the inviolable. Without property, there is no negotiation—only force. No trade—only taking. The deed to land, the title to a car, the seed of an idea: these are not static things but frontiers of being, where human responsibility collides with the infinite permutations of value.
Austrian economics whispers what existentialism shouts: existence precedes essence. Property isn’t granted by systems; it’s asserted through action, defended through sacrifice, and sanctified through mutual recognition. A thing becomes “owned” only when a mind declares it so, and others—through reason or respect—refrain from crossing that unseen line.
Bitcoin? The purest ledger of this truth. A string of code, yes—but one that mirrors the unyielding logic of property itself: scarce, auditable, unconquerable. It doesn’t ask permission. It exists because sovereign minds choose it to.
Sigh. #nostr
I love #Bitcoin. -
@ 0f53ff86:e380fc00
2025-03-18 06:35:39This article is cross posted from my personal blog at danjones.io.
Why has the "yes" been troubling me?
On look-back, I've been saying yes to almost everything that friends and family ask of me ever since the beginning of my adult life. Whether it be a DIY job, a call to help them in their hardships and an assist in times of need.
Upon rereading, it's not at all negative. The problem I have is I don't say this to myself, reciprocate or seek others in my time of need. I lack the ability to express myself.
Is this recompense for youthful errors? Do I lack self-respect, and as a result, push myself for others to make up for that? Why such harsh self-criticism? Why this undeserving feeling?
Self Awareness & Anxiety
Sometime about 4-5 years ago, I saw a councillor to fight this obsession with myself that I don't deserve the great things that come into life. The outcome of these sessions was that I was "highly self aware".
What does this mean?
- Honesty with oneself: I'm consistently honest with myself, almost too honest. I acknowledge how I feel, even if it's difficult.
- Reflection: Constant consideration of how my social actions, thoughts, and feelings affect others. Again, a little too much. Post-conversation, I often think of better responses and actions.
- Learning from mistakes: This I feel like is a brag, I don't want it to come across this way. I treat my mistakes as learning opportunities, but also spend too much time focussing on the mistake and how that could have been averted.
Having a heightened self awareness isn't bad. It's a great mindset to have, but in combination with anxiety, it can go wrong quickly.
But why am I including this? What connection does it have?
Subconscious
Am I subconsciously doing good for others to cover for the lack of involvement and assist to others in my younger years?
I wasn't your ideal son in my teen years. I was lazy, had no care for others, only ever cared for what benefited me only. Does this affect me in later life? Possibly.
I think things turned around in my early twenties. Professional work life had kicked in, met my partner who I'm still with today (and appreciate her every day) and I think a combination of these things turned me into who I am today.
Lacking ability to reward your person
A few months prior to attending a counselling session, I had applied for and was provided opportunity for 2 other workplaces. They were promising jobs with incredible self-development and financial opportunities.
I had declined both.
Feeling rewarded for what I saw as a lack of ability to fulfil the role and not understanding why I was rewarded for being myself consumed me and occupied my mind excessively. I felt like everything that had led me to this moment in my professional life was purely based on luck and right-place, right-time.
Because of this, I declined both.
That's not to say I was ever unhappy in my job, hence seeking work elsewhere. I love my job and still work in that role today. Great people, varied work and fantastic self-help are some of the key factors I'm in my role today.
I just wanted the opportunity to show everyone else I am capable of more, but alas, I failed, and that destroyed me.
Is an explicit yes bad?
Absolutely not. Throughout self-reflection on these moments over the years, being kind, helpful, caring to others in their time of need is more important now than ever. We live in a world filled with hate that if I can find an opportunity to make someone's day, I will always take that.
The problem I had to fight was self-respect, self-reward and inability to express how I feel or a need for help from others. Tying my wins and current life achievements not to luck or time and place, but to significant decisions made and the time I spend working on myself. Be it, self-reflections sessions, self studying and tech examinations (something I'm incredibly proud of) and more.
Who am I today?
Here, I want to put out who I am today, not just for me, but for others. I feel like if I'm able to provide a little more insight into my life and overcoming the challenges, someone, even if a single person, may benefit.
I am a person who;
- Is caring and loving.
- Tries to bring joy to others.
- Works hard to develop their skills and capabilities.
- Pushes oneself to excel.
- Takes time to help others, even if it comes at a penalty to one's own time.
- Should be rewarded for life's achievements..
My current situation: how did it happen?
- Record your achievements and shortcomings.
- Use a notepad or app. Reflect on these. Praise yourself for your good, and see how you might remedy the failures.
- Write the positives about yourself and repeat them back to yourself 2-3 times a day.
- For me, it was;
- Your current place in life isn't due to luck its down to ability and self investment.
- There is no right place or the right time. Only right decisions, which is why you are who you are today.
- I am a caring, loving person.
- I take pride in myself, and enjoy bringing joy to others.
- Get out more.
- Get out more! I'm a tech nerd and as a result, I spend a lot of time indoors. Take the time, even its half an hour, to walk around, go somewhere new. Grab a coffee at your local coffee shop and take in your surroundings. This will also help get you out of your own thoughts.
- Exercise
- Again, as a tech nerd, I spent a lot of my time sat down at a computer. Hardly great for your body or mind.
- Go for a run. Get that sense of achievement. Release those endorphins and push yourself each time.
- Attend the gym. Go to a gym to complete your exercise, but also meet others.
-
@ 33baa074:3bb3a297
2025-03-18 06:26:48Overview The application of Chlorine Sensors in the food industry is mainly focused on monitoring and controlling chlorine that may be produced during the production process to ensure worker health and food safety. Since chlorine is an effective disinfectant, it is widely used in the food processing industry, but it also has certain dangers. For example, improper use can have adverse effects on human health and the production process.
Working Principle agrochemical chlorine sensors are currently the most widely used chlorine detection equipment in the food industry. This type of sensor uses the principle of generating current after chlorine reacts with electrodes to measure the concentration of chlorine. agrochemical chlorine sensors have high accuracy and stability, as well as reliable response time and detection range, making them the best tool for monitoring chlorine concentration.
Application Scenarios Real-time Monitoring During food processing, agrochemical chlorine sensors can monitor the residual chlorine concentration in restaurants, food factories and other types of food processing sites in real time. When chlorine overflows or is discharged in high concentrations, the sensor can immediately sound an alarm to avoid exposure of processing personnel and consumers to harmful gases, while preventing the impact of gas pollution on the processing process.
Data analysis and feedback In addition to real-time monitoring, agrochemical chlorine sensors can also provide quantitative and qualitative concentration information to operators, helping processing plants to standardize production processes and ensure product safety. Sensor data can interact with CNC intelligent terminal systems, wireless Internet and other monitors, and achieve automatic response to improve production efficiency and safety.
Environmental protection Chlorine is often used as a disinfectant in wastewater treatment. By using agrochemical chlorine sensors, the chlorine concentration in water can be monitored in real time, and the amount of chlorine added can be adjusted according to actual needs to achieve precise control, thereby achieving the purpose of both meeting environmental protection requirements and reducing treatment costs.
Advantages High sensitivity agrochemical chlorine sensors can accurately capture trace amounts of chlorine in the environment and ensure the stability of monitoring data.
Fast response The sensor has the characteristics of fast response, and can respond quickly when the chlorine concentration changes, providing users with timely early warning and prevention and control support.
Good stability agrochemical chlorine sensors can maintain long-term stable operation in various harsh environments, and have good anti-interference ability and adaptability.
Conclusion In summary, the application of agrochemical chlorine gas sensors in the food industry can not only detect gas concentration in a timely manner, but also provide reliable data to operators in real time. It is one of the important tools for the food processing industry to achieve intelligent, safe and standardized production processes. With the continuous advancement of technology, agrochemical chlorine gas sensors will play a more important role in the future food processing field.
-
@ f4db5270:3c74e0d0
2025-01-23 18:09:14Hi Art lover! 🎨🫂💜 You may not know it yet but all of the following paintings are available in #Bitcoin on my website: https://isolabell.art/#shop
For info and prices write to me in DM and we will find a good deal! 🤝
ON THE ROAD AGAIN 40x50cm, Oil on canvas Completed January 23, 2025
SUN OF JANUARY 40x50cm, Oil on canvas Completed January 14, 2025
THE BLUE HOUR 40x50cm, Oil on canvas Completed December 14, 2024
LIKE A FRAGMENT OF ETERNITY 50x40cm, Oil on canvas Completed December 01, 2024
WHERE WINTER WHISPERS 50x40cm, Oil on canvas Completed November 07, 2024
L'ATTESA DI UN MOMENTO 40x40cm, Oil on canvas Completed October 29, 2024
LE COSE CHE PENSANO 40x50cm, Oil on paper Completed October 05, 2024
TWILIGHT'S RIVER 50x40cm, Oil on canvas Completed September 17, 2024
GOLD ON THE OCEAN 40x50cm, Oil on paper Completed September 08, 2024
SUSSURRI DI CIELO E MARE 50x40cm, Oil on paper Completed September 05, 2024
THE END OF A WONDERFUL WEEKEND 40x30cm, Oil on board Completed August 12, 2024
FIAMME NEL CIELO 60x35cm, Oil on board Completed July 28, 2024
INIZIO D'ESTATE 50x40cm, Oil on cradled wood panel Completed July 13, 2024
OMBRE DELLA SERA 50x40cm, Oil on cradled wood panel Completed June 16, 2024
NEW ZEALAND SUNSET 80x60cm, Oil on canvas board Completed May 28, 2024
VENICE 50x40cm, Oil on board Completed May 4, 2024
CORNWALL 50x40cm, Oil on board Completed April 26, 2024
DOCKS ON SUNSET 40x19,5cm, Oil on board Completed March 14, 2024
SOLITUDE 30x30cm, Oil on cradled wood panel Completed March 2, 2024
LULLING WAVES 40x30cm, Oil on cradled wood panel Completed January 14, 2024
MULATTIERA IN AUTUNNO 30x30cm, Oil on cradled wood panel
TRAMONTO A KOS 40x40cm, oil on board canvas
HIDDEN SMILE 40x40cm, oil on board
INIZIO D'AUTUNNO 40x40cm, oil on canvas
BOE NEL LAGO 30x30cm, oil on canvas board
BARCHE A RIPOSO 40x40cm, oil on canvas board
IL RISVEGLIO 30x40cm, oil on canvas board
LA QUIETE PRIMA DELLA TEMPESTA 30x40cm, oil on canvas board
LAMPIONE SUL LAGO 30x30cm, oil on canvas board
DUE NELLA NEVE 60x25cm, oil on board
UNA CAREZZA 30x30cm, oil on canvas board
REBEL WAVES 44x32cm, oil on canvas board
THE SCREAMING WAVE 40x30cm, oil on canvas board
"LA DONZELLETTA VIEN DALLA CAMPAGNA..." 30x40cm, oil on canvas board
LIGHTHOUSE ON WHITE CLIFF 30x40cm, oil on canvas board
-
@ 7f29628d:e160cccc
2025-01-07 11:50:30Der gut informierte Bürger denkt bei der Pandemie sofort an Intensivstationen, an die Bilder aus Bergamo und erinnert sich an die Berichterstattung damals – also muss es wohl ein Maximum gewesen sein. Manche Skeptiker behaupten jedoch das Gegenteil. Klarheit sollte ein Blick nach Wiesbaden, zum Statistischen Bundesamt, schaffen. Schließlich sitzen dort gut bezahlte Profis, die seit vielen Jahrzehnten die Sterbestatistik pflegen und veröffentlichen. Jeder Todesfall wird in Deutschland über die Standesämter exakt erfasst.
Doch die Überraschung: Das Statistische Bundesamt liefert uns auf diese einfache Frage zwei extrem unterschiedliche Antworten – ein Minimum und ein Maximum. Das Ergebnis hängt davon ab, wie tief man in die Veröffentlichungen des Bundesamtes eintaucht. Betrachtet man nur die Webseiten und Pressemitteilungen, erhält man den Eindruck eines Maximums. Schaut man jedoch etwas tiefer in die Tabellen und Rohdaten, zeigt sich plötzlich ein Minimum. Aber wie kann das sein? Beides gleichzeitig geht ja wohl kaum. Wer lügt hier – die Tabellen des Amtes oder die Pressemitteilungen? Gehen wir dieser Frage Schritt für Schritt auf den Grund.
2020: Ein historisches Maximum?
Schauen wir uns die vielen Hundert Veröffentlichungen des Statistischen Bundesamtes aus dieser Zeit an. Oder wir kürzen ab und fragen ChatGPT, da die KI auf diesen Daten trainiert wurde und das gesamte Material kennt. Die Frage an ChatGPT lautet also: Wie war das Sterbegeschehen im Jahr 2020 im Vergleich zu den Vorjahren?
ChatGPT antwortet: »Im Jahr 2020 war die Sterblichkeit in Deutschland höher als in den Jahren zuvor. Es gab eine Übersterblichkeit von etwa 982.000 Todesfällen, das sind rund 46.000 mehr als der Durchschnitt der Vorjahre (2016 bis 2019). Dieser Anstieg wurde überwiegend im Zusammenhang mit der COVID-19-Pandemie gesehen. Während die Sterbezahlen in den Vorjahren schwankten, war ein solch signifikanter Anstieg wie 2020 bisher nicht zu beobachten.«
Wir fragen konkreter: Ist es ein Fakt, dass wir eine so ernste Lage im Sterbegeschehen wie im Frühjahr 2020 noch nie erlebt haben?
ChatGPT bestätigt: »Ja, die COVID-19-Pandemie führte im Frühjahr 2020 zu einer außergewöhnlichen Situation im Sterbegeschehen in Deutschland. Die dramatische Übersterblichkeit, die ab der 13. Kalenderwoche auftrat, veranlasste das Statistische Bundesamt, besonders eindringliche Warnungen zu veröffentlichen. Der damalige Vizepräsident des Amtes und andere führende Stimmen wiesen öffentlich darauf hin, dass die Todesfallzahlen stark vom Durchschnitt abwichen. Diese klare Warnung richtete sich an die Öffentlichkeit und die Politik gleichermaßen. Die Medien berichteten intensiv über diese Warnungen, was das Bewusstsein für die Schwere der Pandemie erheblich schärfte. In den vergangenen Jahrzehnten hatte es keine vergleichbare Übersterblichkeit gegeben, die eine solch umfangreiche Kommunikation durch das Statistische Bundesamt erforderlich gemacht hätte.«
Ein gut informierter Zeitungsleser wird sich an dieser Stelle bestätigt fühlen: Ja, so war es damals. Ein Maximum im Sterbegeschehen – wegen der Pandemie. Oder etwa nicht?
2020: Ein historisches Minimum?
Tauchen wir in die Rohdaten des Statistischen Bundesamtes ein. Die Tabellen, die das Amt seit Jahrzehnten verlässlich veröffentlicht, nennen sich Sterbetafeln. Diese werden jährlich bereitgestellt und stehen auf der Website des Bundesamtes zum Download bereit. Ein erster Blick in die Sterbetafeln mag den Laien abschrecken, doch mit einer kurzen Erklärung wird alles verständlich. Wir gehen schrittweise vor.
Nehmen wir die Sterbetafel des Jahres 2017. Sie enthält zwei große Tabellen – eine für Männer und eine für Frauen. Jede Zeile der Tabelle steht für einen Jahrgang, zum Beispiel zeigt die Zeile 79 die Daten der 79-jährigen Männer. Besonders wichtig ist nun die zweite Spalte, in der der Wert 0,05 eingetragen ist. Das bedeutet, dass 5 Prozent der 79-jährigen Männer im Jahr 2017 verstorben sind. Das ist die wichtige Kennzahl. Wenn wir diesen exakten Wert, den man auch als Sterberate bezeichnet, nun in ein Säulendiagramm eintragen, erhalten wir eine leicht verständliche visuelle Darstellung (Grafik 1).
Es ist wichtig zu betonen, dass dieser Wert weder ein Schätzwert noch eine Modellrechnung oder Prognose ist, sondern ein exakter Messwert, basierend auf einer zuverlässigen Zählung. Sterberaten (für die Fachleute auch Sterbewahrscheinlichkeiten qx) sind seit Johann Peter Süßmilch (1707–1767) der Goldstandard der Sterbestatistik. Jeder Aktuar wird das bestätigen. Fügen wir nun die Sterberaten der 79-jährigen Männer aus den Jahren davor und danach hinzu, um das Gesamtbild zu sehen (Grafik 2). Und nun die entscheidende Frage: Zeigt das Jahr 2020 ein Maximum oder ein Minimum?
Ein kritischer Leser könnte vermuten, dass die 79-jährigen Männer eine Ausnahme darstellen und andere Jahrgänge im Jahr 2020 ein Maximum zeigen würden. Doch das trifft nicht zu. Kein einziger Jahrgang verzeichnete im Jahr 2020 ein Maximum. Im Gegenteil: Auch die 1-Jährigen, 2-Jährigen, 3-Jährigen, 9-Jährigen, 10-Jährigen, 15-Jährigen, 18-Jährigen und viele weitere männliche Jahrgänge hatten ihr Minimum im Jahr 2020. Dasselbe gilt bei den Frauen. Insgesamt hatten 31 Jahrgänge ihr Minimum im Jahr 2020. Wenn wir schließlich alle Jahrgänge in einer einzigen Grafik zusammenfassen, ergibt sich ein klares Bild: Das Minimum im Sterbegeschehen lag im Jahr 2020 (Grafik 3).
Ein kritischer Leser könnte nun wiederum vermuten, dass es innerhalb des Jahres 2020 möglicherweise starke Ausschläge nach oben bei einzelnen Jahrgängen gegeben haben könnte, die später durch Ausschläge nach unten ausgeglichen wurden – und dass diese Schwankungen in der jährlichen Übersicht nicht sichtbar sind. Doch auch das trifft nicht zu. Ein Blick auf die wöchentlichen Sterberaten zeigt, dass die ersten acht Monate der Pandemie keine nennenswerten Auffälligkeiten aufweisen. Es bleibt dabei: Die Rohdaten des Statistischen Bundesamtes bestätigen zweifelsfrei, dass die ersten acht Monate der Pandemie das historische Minimum im Sterbegeschehen darstellen. (Für die Fachleute sei angemerkt, dass im gleichen Zeitraum die Lebenserwartung die historischen Höchststände erreicht hatte – Grafik 4.)
So konstruierte das Amt aus einem Minimum ein Maximum:
Zur Erinnerung: Die Rohdaten des Statistischen Bundesamtes, die in den jährlichen Sterbetafeln zweifelsfrei dokumentiert sind, zeigen für das Jahr 2020 eindeutig ein Minimum im Sterbegeschehen. Aus diesen »in Stein gemeißelten« Zahlen ein Maximum zu »konstruieren«, ohne die Rohdaten selbst zu verändern, scheint auf den ersten Blick eine unlösbare Aufgabe. Jeder Student würde an einer solchen Herausforderung scheitern. Doch das Statistische Bundesamt hat einen kreativen Weg gefunden - ein Meisterstück gezielter Manipulation. In fünf Schritten zeigt sich, wie diese Täuschung der Öffentlichkeit umgesetzt wurde:
(1) Ignorieren der Sterberaten: Die präzisen, objektiven und leicht verständlichen Sterberaten aus den eigenen Sterbetafeln wurden konsequent ignoriert und verschwiegen. Diese Daten widersprachen dem gewünschten Narrativ und wurden daher gezielt ausgeklammert.
(2) Fokus auf absolute Todeszahlen: Die Aufmerksamkeit wurde stattdessen auf die absolute Zahl der Todesfälle gelenkt. Diese wirkt allein durch ihre schiere Größe dramatisch und emotionalisiert die Diskussion. Ein entscheidender Faktor wurde dabei ignoriert: Die absolute Zahl der Todesfälle steigt aufgrund der demografischen Entwicklung jedes Jahr an. Viele Menschen verstehen diesen Zusammenhang nicht und verbinden die steigenden Zahlen fälschlicherweise mit der vermeintlichen Pandemie.
(3) Einführung der Übersterblichkeit als neue Kennzahl: Erst ab Beginn der „Pandemie“ wurde die Kennzahl "Übersterblichkeit" eingeführt – und dies mit einer fragwürdigen Methode, die systematisch überhöhte Werte lieferte. Diese Kennzahl wurde regelmäßig, oft monatlich oder sogar wöchentlich, berechnet und diente als ständige Grundlage für alarmierende Schlagzeilen.
(4) Intensive Öffentlichkeitsarbeit: Durch eine breit angelegte Kampagne wurden die manipulativen Kennzahlen gezielt in den Fokus gerückt. Pressemitteilungen, Podcasts und öffentliche Auftritte konzentrierten sich fast ausschließlich auf die absoluten Todeszahlen und die Übersterblichkeit. Ziel war es, den Eindruck einer dramatischen Situation in der Öffentlichkeit zu verstärken.
(5) Bekämpfen kritischer Stimmen: Kritiker, die die Schwächen und manipulativen Aspekte dieser Methoden aufdeckten, wurden systematisch diskreditiert. Ihre Glaubwürdigkeit und Kompetenz wurden öffentlich infrage gestellt, um das sorgsam konstruierte Narrativ zu schützen.
Ohne diesen begleitenden Statistik-Betrug wäre das gesamte Pandemie-Theater meiner Meinung nach nicht möglich gewesen. Wer aus einem faktischen Minimum ein scheinbares Maximum "erschafft", handelt betrügerisch. Die Folgen dieses Betruges sind gravierend. Denken wir an die Angst, die in der Bevölkerung geschürt wurde – die Angst, bald sterben zu müssen. Denken wir an Masken, Abstandsregeln, isolierte ältere Menschen, Kinderimpfungen und all die Maßnahmen, die unter anderem auf diese falsche Statistik zurückgehen.
Wollen wir Bürger uns das gefallen lassen?
Wenn wir als Bürger zulassen, dass ein derart offensichtlicher und nachprüfbarer Täuschungsversuch ohne Konsequenzen bleibt, dann gefährdet das nicht nur die Integrität unserer Institutionen – es untergräbt das Fundament unserer Gesellschaft. In der DDR feierte man öffentlich Planerfüllung und Übererfüllung, während die Regale leer blieben. Damals wusste jeder: Statistik war ein Propagandainstrument. Niemand traute den Zahlen, die das Staatsfernsehen verkündete.
Während der Pandemie war es anders. Die Menschen vertrauten den Mitteilungen des Statistischen Bundesamtes und des RKI – blind. Die Enthüllungen durch den "RKI-Leak" haben gezeigt, dass auch das Robert-Koch-Institut nicht der Wissenschaft, sondern den Weisungen des Gesundheitsministers und militärischen Vorgaben folgte. Warum sollte es beim Statistischen Bundesamt anders gewesen sein? Diese Behörde ist dem Innenministerium unterstellt und somit ebenfalls weisungsgebunden.
Die Beweise für Täuschung liegen offen zutage. Es braucht keinen Whistleblower, keine geheimen Enthüllungen: Die Rohdaten des Statistischen Bundesamtes sprechen für sich. Sie sind öffentlich einsehbar – klar und unmissverständlich. Die Daten, die Tabellen, die Veröffentlichungen des Amtes selbst – sie sind die Anklageschrift. Sie zeigen, was wirklich war. Nicht mehr und nicht weniger.
Und wir? Was tun wir? Schweigen wir? Oder fordern wir endlich ein, was unser Recht ist? Wir Bürger dürfen das nicht hinnehmen. Es ist Zeit, unsere Behörden zur Rechenschaft zu ziehen. Diese Institutionen arbeiten nicht für sich – sie arbeiten für uns. Wir finanzieren sie, und wir haben das Recht, Transparenz und Verantwortung einzufordern. Manipulationen wie diese müssen aufgearbeitet werden und dürfen nie wieder geschehen. Die Strukturen, die solche Fehlentwicklungen in unseren Behörden ermöglicht haben, müssen offengelegt werden. Denn eine Demokratie lebt von Vertrauen – und Vertrauen muss verdient werden. Jeden Tag aufs Neue.
.
.
MARCEL BARZ, Jahrgang 1975, war Offizier der Bundeswehr und studierte Wirtschafts- und Organisationswissenschaften sowie Wirtschaftsinformatik. Er war Gründer und Geschäftsführer einer Softwarefirma, die sich auf Datenanalyse und Softwareentwicklung spezialisiert hatte. Im August 2021 veröffentlichte Barz den Videovortrag »Die Pandemie in den Rohdaten«, der über eine Million Aufrufe erzielte. Seitdem macht er als "Erbsenzähler" auf Widersprüche in amtlichen Statistiken aufmerksam.
-
@ fbf0e434:e1be6a39
2025-03-18 05:02:55DoraHacks 是 全球黑客运动的推动者
DoraHacks 是全球最大的Hackathon社区平台,致力于推动全球范围内的创新变革。在生物科技领域,类似的 Hacker 运动正在形成,并被称为无FDA社会(FDA Free Society)。这是 DoraHacks 在 生物科技领域的核心关注方向,我们相信,医疗和生物技术创新不应受制于官僚主义,而应以更自由、高效的方式加速发展。
FDA:生物科技创新的主要障碍
在全球医疗和生物科技创新的进程中,FDA(美国食品药品监督管理局)长期以来被认为是最大的一道障碍。它的监管模式虽然出发点是确保安全性和有效性,但实际上已经成为医疗创新的桎梏,主要体现在以下几个方面:
-
审批流程过于冗长和官僚
新药和新疗法的研发周期极其漫长,通常需要 10-15 年才能上市,使得许多有潜力的创新治疗方案被无情地耗尽在繁杂的审批流程中。
-
高昂的合规成本
由于 FDA 监管下的临床试验成本极高,许多潜在的突破性治疗因无法负担昂贵的试验费用而被扼杀,导致病人得不到及时的救治。
-
FDA 与大药企形成的利益护城河
现行的监管体系更有利于资金雄厚的大型制药公司,而小型生物科技公司和创新团队往往难以突破 FDA 的壁垒,最终导致真正的创新被排挤出市场。
市场驱动的生物科技创新更高效
与官僚机构控制医疗创新相比,市场驱动的模式能够更快速、更灵活地推动医疗技术进步:
-
市场决定哪些疗法更有价值
在一个自由竞争的环境下,创新疗法的优劣可以由市场和用户(医生、病人)来决定,而不是被行政机构耗时数年的审批流程所束缚。
-
Right to Try 法案:对现有监管的突破
美国已经推出 Right to Try(生存权利)法案,允许绝症患者尝试尚未获得 FDA 完全批准的疗法。这一法案证明,现有监管体系的僵化已严重影响患者的治疗机会,而自由市场提供了一种更可行的替代方案。
-
科技创业公司的加速作用
在市场的推动下,科技创业公司比政府监管机构更具敏捷性。例如,mRNA 技术的加速发展 正是由于市场驱动的模式,而非 FDA 监管的严格审批。可以预见,未来的新药研发将更依赖市场而非政府干预。
BioHack:突破 FDA 监管的桎梏
在 BioTech 领域,抗衰老和生命延长技术是未来最重要的突破方向之一,但这一领域的发展长期受到 FDA 的巨大阻碍:
-
BioTech 需要 FDA Free 的实验环境
未来的医疗创新应像 AI 和区块链等开源软件行业一样,采用开放式创新模式,让科学家和创业者自由实验,而非受制于一套过时的审批体系。
-
自由市场驱动的医疗体系将成为趋势
未来可能会出现 私人和社区支持的医疗实验室,以及一个更加去中心化的医疗体系,让创业团队和个体用户来决定医学的进步方向,而不是让政府机构和大型制药公司掌控一切。
结语
FDA Free Society 是 BioTech 领域即将发生的黑客运动。我们将确保BioHack发生在DoraHacks。
-
-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Let’s dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computers—and it has nothing to do with what so-called “quantum coaches” teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoin’s security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computing’s Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. It’s a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoin’s Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoin’s blockchain.
- Lamport: Created in 1977, it’s considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoin’s Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the community’s constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoin’s future is not at risk—it is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ e5de992e:4a95ef85
2025-03-18 04:53:11Overview: Market Rebound Amidst Economic Uncertainty
On Monday, March 17, 2025, U.S. stock markets experienced gains for the second consecutive session, signaling potential stabilization following recent volatility. Key indices reported the following gains:
- S&P 500: Increased by 0.6%
- Dow Jones Industrial Average: Rose by 0.9%
- Nasdaq Composite: Edged up 0.3%
- Russell 2000: Notably rose by 1.2%
Despite these daily gains, year-to-date figures indicate that major indices remain below their previous highs:
-
S&P 500: Down 3.5%
-
Dow Jones Industrial Average: Down 1.7%
-
Nasdaq Composite: Down 7.8%
-
Russell 2000: Down 7.3%
Key Factors Influencing Market Movements
1. Economic Data and Consumer Behavior
- Recent reports show a marginal rebound in U.S. retail sales for February; however, the increase fell short of expectations.
- Factory activity in New York State experienced its most significant decline in nearly two years.
2. Federal Reserve's Upcoming Meeting
- The Federal Open Market Committee (FOMC) is set to meet on March 18-19, 2025.
- Although current interest rates are expected to remain between 4.25% and 4.50%, investors are keenly awaiting signals for potential future adjustments.
3. Geopolitical Tensions and Trade Policies
- President Donald Trump's evolving tariff strategies—particularly concerning trade with Canada and Mexico—have heightened market uncertainty.
- These policies complicate the Federal Reserve's data-dependent approach to interest rate decisions, as tariffs could drive inflation while weakening the job market.
4. Sector-Specific Developments
-
Technology:
Companies such as Nvidia and Tesla have experienced declines; Nvidia fell 1% ahead of its GTC AI conference, while Tesla dropped nearly 3%. -
Defense:
Huntington Ingalls Industries Inc. saw a significant increase of 5.6%, outperforming competitors during a positive trading session.
Commodity Markets
-
Oil:
Prices increased, with West Texas Intermediate (WTI) futures nearing $67.85 per barrel, reflecting stability in energy markets. -
Gold:
Prices remained near $3,000 per ounce, continuing their rally amidst market uncertainty.
Market Outlook
As markets navigate a complex landscape of economic indicators and geopolitical events, investor attention remains focused on the upcoming Federal Reserve meeting and related economic data releases. The outcomes of the FOMC meeting—coupled with ongoing trade policy developments—are expected to play pivotal roles in shaping market trajectories in the near term.
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ 1d7ff02a:d042b5be
2025-03-18 03:27:44ອາຫານທີ່ມີທາດແປ້ງຕ່ຳ (low-carb) ແລະ ອາຫານແບບຄີໂຕ (keto) ເປັນປະເດັນຂັດແຍ້ງກັນມາດົນນານ. ບາງຄົນຍົກຍ້ອງວ່າມັນຊ່ວຍໃນການຫຼຸດນ້ຳໜັກ ແລະ ສຸຂະພາບຂອງລະບົບເມຕາບໍລິກ, ໃນຂະນະທີ່ຄົນອື່ນເຕືອນກ່ຽວກັບຄວາມສ່ຽງທີ່ອາດເກີດຂຶ້ນ. ບົດຄວາມວິທະຍາສາດລ່າສຸດທີ່ມີຊື່ວ່າ "ຄວາມເຊື່ອທີ່ຜິດ ແລະ ຄວາມຈິງກ່ຽວກັບອາຫານທີ່ມີທາດແປ້ງຕ່ຳ" ທ້າທາຍຄວາມເຂົ້າໃຈຜິດຫຼາຍຢ່າງ ແລະ ນຳສະເໜີຫຼັກຖານທາງວິທະຍາສາດທີ່ແໜ້ນແຟ້ນສະໜັບສະໜູນອາຫານປະເພດນີ້.
ອາຫານທີ່ມີທາດແປ້ງຕ່ຳແມ່ນຫຍັງກັນແທ້?
ເຮົາມາເລີ່ມຕົ້ນດ້ວຍຄຳນິຍາມກ່ອນ. ອາຫານທີ່ມີທາດແປ້ງຕ່ຳຈຳກັດທາດແປ້ງໃຫ້ບໍ່ເກີນ 130 ກຣາມຕໍ່ວັນ (25% ຂອງພະລັງງານ), ໃນຂະນະທີ່ອາຫານແບບຄີໂຕຈຳກັດທາດແປ້ງໃຫ້ນ້ອຍລົງຄື 20-50 ກຣາມ (10% ຂອງພະລັງງານ). ເຖິງແມ່ນວ່າຈະມີຊື່ສຽງວ່າເປັນ "ອາຫານແຟຊັ່ນ", ວິທີການເຫຼົ່ານີ້ໄດ້ສະສົມການສະໜັບສະໜູນຈາກການຄົ້ນຄວ້າທີ່ສຳຄັນໃນເກືອບສາມທົດສະວັດ.
ເປັນຫຍັງອາຫານທີ່ມີທາດແປ້ງຕ່ຳຈຶ່ງສຳຄັນ
ໃນເມື່ອພາວະອ້ວນ, ເບົາຫວານ, ແລະ ພະຍາດຫົວໃຈ ແລະ ຫຼອດເລືອດໄດ້ເຖິງລະດັບການລະບາດ, ຄວາມຕ້ອງການການແຊກແຊງທາງອາຫານທີ່ມີປະສິດທິພາບບໍ່ເຄີຍສຳຄັນເທົ່ານີ້ມາກ່ອນ. ບົດຄວາມນີ້ລະບຸວ່າອາຫານທີ່ມີທາດແປ້ງຕ່ຳບໍ່ພຽງແຕ່ເປັນກະແສທີ່ຜ່ານໄປ ແຕ່ເປັນຍຸດທະສາດທີ່ໄດ້ຮັບການຄົ້ນຄວ້າຢ່າງດີສຳລັບການຈັດການສຸຂະພາບຂອງລະບົບເມຕາບໍລິກ.
ການຍອມຮັບທາງການແພດເພີ່ມຂຶ້ນ
ກະແສກຳລັງປ່ຽນໃນວົງການແພດກະແສຫຼັກ. ອົງການໃຫຍ່ໆລວມທັງສະມາຄົມເບົາຫວານອາເມລິກາ ປັດຈຸບັນຍອມຮັບອາຫານທີ່ມີທາດແປ້ງຕ່ຳວ່າເປັນທີ່ຍອມຮັບໄດ້ສຳລັບການຈັດການເບົາຫວານປະເພດ 2. ສະມາຄົມຫົວໃຈອາເມລິກາໄດ້ຍອມຮັບວ່າອາຫານທີ່ມີທາດແປ້ງຕ່ຳຫຼາຍນຳໄປສູ່ "ການຫຼຸດລົງຂອງ A1c ຫຼາຍກວ່າ, ການຫຼຸດນ້ຳໜັກຫຼາຍກວ່າ, ແລະ ໃຊ້ຢາເບົາຫວານໜ້ອຍກວ່າ" ເມື່ອປຽບທຽບກັບວິທີການທີ່ໃຊ້ທາດແປ້ງປານກາງ.
ການລົບລ້າງຄວາມເຊື່ອທີ່ຜິດທົ່ວໄປ
"ທ່ານຕ້ອງການທາດແປ້ງເພື່ອການມີຊີວິດຢູ່"
ແປກໃຈບໍ່! ສະຖາບັນວິທະຍາສາດແຫ່ງຊາດສະຫຼຸບວ່າປະລິມານທາດແປ້ງທີ່ຈຳເປັນແມ່ນສູນ. ຮ່າງກາຍຂອງທ່ານສາມາດສ້າງນ້ຳຕານກລູໂຄສຜ່ານຂະບວນການ gluconeogenesis.
"ມັນຈະເຮັດໃຫ້ຄໍເລສເຕີຣອນຂອງທ່ານສູງຂຶ້ນ ແລະ ເຮັດໃຫ້ເກີດອາການຫົວໃຈວາຍ"
ໃນຂະນະທີ່ຄໍເລສເຕີຣອນ LDL ບາງຄັ້ງສູງຂຶ້ນ (ໂດຍສະເພາະໃນຄົນຜອມ), ການສຶກສາຫຼ້າສຸດພົບວ່າສິ່ງນີ້ບໍ່ໄດ້ແປວ່າຈະເຮັດໃຫ້ຮ່າງກາຍສະສົມຄາບຕິດໃນຫຼອດເລືອດເພີ່ມຂຶ້ນ. ໃນຂະນະດຽວກັນ, ອາຫານທີ່ມີທາດແປ້ງຕ່ຳປັບປຸງຕົວຊີ້ວັດພະຍາດຫົວໃຈອື່ນໆຫຼາຍຢ່າງ, ລວມທັງໄຂມັນໃນເລືອດ, HDL, ການອັກເສບ, ແລະ ຄວາມດັນເລືອດສູງ.
"ຊີ້ນແດງໃນອາຫານທີ່ມີທາດແປ້ງຕ່ຳເພີ່ມຄວາມສ່ຽງຂອງມະເຮັງ"
ການທົບທວນຄຸນນະພາບສູງສຸດຂອງເອກະສານທາງວິທະຍາສາດພົບວ່າມີຫຼັກຖານທີ່ເຊື່ອຖືໄດ້ພຽງເລັກນ້ອຍຫາບໍ່ມີເລີຍທີ່ເຊື່ອມໂຍງການບໍລິໂພກຊີ້ນແດງກັບມະເຮັງ. ການສຶກສາໃນອະດີດຫຼາຍຄັ້ງອີງໃສ່ຂໍ້ມູນການສັງເກດທີ່ອ່ອນແອແທນທີ່ຈະເປັນການທົດລອງທາງຄລີນິກທີ່ມີການຄວບຄຸມ.
"ມັນບໍ່ສາມາດຮັກສາໄດ້ໃນໄລຍະຍາວ"
ການສຳຫຼວດກ່ຽວກັບຄົນ 1,580 ຄົນພົບວ່າສ່ວນໃຫຍ່ຮັກສາອາຫານທີ່ມີທາດແປ້ງຕ່ຳໄດ້ເປັນເວລາຫຼາຍກວ່າໜຶ່ງປີ, ໂດຍ 34% ຮັກສາໄດ້ 2+ ປີ. ຄວາມຮູ້ສຶກອີ່ມຈາກໂປຣຕີນ ແລະ ໄຂມັນຊ່ວຍໃຫ້ຄົນບໍ່ຮູ້ສຶກຫິວລະຫວ່າງຄາບອາຫານ.
"ມັນມີລາຄາແພງເກີນໄປ"
ການວິເຄາະຕົ້ນທຶນພົບວ່າອາຫານທີ່ມີທາດແປ້ງຕ່ຳມີຄ່າໃຊ້ຈ່າຍຫຼາຍກວ່າພຽງແຕ່ປະມານ $1.27 ຕໍ່ຄົນຕໍ່ວັນເມື່ອທຽບກັບຄຳແນະນຳມາດຕະຖານ. ແມ່ນແຕ່ປະຊາກອນທີ່ມີລາຍໄດ້ຕ່ຳກໍສາມາດປັບຮັບເອົາວິທີການກິນແບບນີ້ໄດ້ສຳເລັດ.
"ທ່າແຮງໃນການປິ່ນປົວເບົາຫວານ"
ອາດຈະໜ້າປະທັບໃຈທີ່ສຸດ: ການທົດລອງທາງຄລີນິກສະແດງໃຫ້ເຫັນວ່າຫຼາຍກວ່າ 50% ຂອງຜູ້ເຂົ້າຮ່ວມທີ່ມີເບົາຫວານປະເພດ 2 ສາມາດກັບຄືນມາດີຂຶ້ນໄດ້ດ້ວຍອາຫານແບບຄີໂຕ, ໂດຍສ່ວນໃຫຍ່ຫຼຸດລົງຫຼືຢຸດເຊົາໃຊ້ຢາພາຍໃນພຽງແຕ່ 10 ອາທິດ.
ທີ່ມາ: https://www.mdpi.com/2072-6643/17/6/1047#B4-nutrients-17-01047 ສະຫລຸບ ແລະ ແປໂດຍ: ChatGPT, Claude
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ 7252ad94:d19de472
2025-03-18 03:12:33![[BTC March 17 25.jpg]]#Bitcoin #btccharts #BitcoinCharts
-
@ 7252ad94:d19de472
2025-03-18 01:45:36![[BTC March 17 25.jpg]]#Bitcoin #btccharts #BitcoinCharts
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ d6c48950:54d57756
2025-03-17 23:04:50Theres a popular trend among people who never grew up with old tech to suddenly embrace it as rebellion against enshitification and capitalism but as someone who actually grew up with old phones and old tech theres a reason why iphones and social media won, because they're better.
This doesn't mean they don't have flaws, it means that even with the flaws they still outperform; dumbphones are a bandaid but smartphones have comprehensive features built in that work more like a bandage - ironically the solution smart phones have to the problem of smartphones is still better than using a dumbphone as a solution to smartphones - parental control and screen time features work and they're incredibly robust, if you set them up in a well thought out way you can get an insane amount of utility from your smartphone and none of the downsides, if you have a friend setup the parental features according to your wishes it can be setup in such a way that you as the owner of the device cannot get around it, limiting how long you can spend on social media, limiting what apps you can install, what websites you can go on but without losing any of the insane value of smartphones such as
- signal: private communications
- camera: not needing to carry a camera
- ability to send photos quickly and easily to friends
- ability to share what your doing with others publicly
- ability to pay for things without needing to carry a card
- uber
- bus/train apps
- note taking apps that're searchable and instantly backed up
- maps app
- weather app
These are just some of the things on my phone that provide high value, think about how much clutter I would have to carry if I switched to a dumbphone and not only that, the cluttered separate items would perform worse and cost more (since I already own a smartphone).
I'm not saying dumbphones are useless but they solve nothing, setting up a smartphone to remove risk and harm whilst maximising value forces you to give careful consideration to the problem
- Can I trust myself to not turn this off?
- How much time do I want to spend on instagram?
- Do I want notifications on for this person?
- Do I ever want notifications from twitter?
- What value does my phone even provide?
Now you might say you asked those questions before switching to a dumbphone but my point is it's optional, you can not think about any of those things and switch to a dumbphone whereas in something approximating irony when doing it on a smartphone you have to be intentional, mindful, honest and self aware. You have to give serious thought to can you control yourself or self limit certain behaviours and if not would moderation or complete abstinence be better?
In my case I struggle with instagram, but I didn't want to get rid of it because it's how I keep in touch with some friends and keep up to date on their life and them on mine, it also is a good point of contact for new people I meet or people who want to get in touch - but if I average this out i.e messaging (occasional) , posting and looking at friends posts it should only really take me maybe 10 minutes per day maximum - I set a ten minute lock, what happens if I spend 10 minutes scrolling reels and then want to post something? I can't, I'm punished for the behaviour which discourages me from doing it next time.
dumbphones feel like a punishment for a problem you haven't tried to fix and for a behaviour you can't clearly articulate - you know you're doing something wrong and might be able to name the action (wasting time on tiktok) but you have no actual understanding of the behaviour (i.e why you do it or why it's even bad beyond some vague harm you ironically heard on tiktok).
you're spending money for no additional value beyond social value (wow a flip phone how quirky) and I've yet to meet a single logn term dumbphone user with an active social life - ironically I do know a person who makes tiktoks about living with a dumbphone - they film the tiktoks on an iphone they take with them everwhere and use as their daily phone. I'm not saying all dumbphone influencers are lying but I'm skeptical someone whos embraced the dumbphone would spend their free time making tiktoks or online content at all really, maybe they would at the start but long term? I doubt it.
smartphones have tons of apps and all those apps have shitty subscription services and each update makes the app worse but there is still untapped value to be found in them - look at it as a tool that exists to perform functions and it'll make your life a lot better. You have to be mindful and intentional with technology or it will just do whatever large corporations want it to do.
-
@ 2f4550b0:95f20096
2025-03-17 22:44:46Networking is often misunderstood as a transactional exchange: handing out business cards or adding contacts on LinkedIn with the hope of an immediate payoff. But at its core, networking is something more dynamic and human. I like to define it as the nexus between "I know a person for that" and being bold enough to ask. It’s about building a web of relationships where knowledge, opportunity, and courage intersect. Whether in professional or personal spheres, networking thrives on trust, mutual benefit, and the willingness to step out of your comfort zone. Let’s unpack this idea and see how it plays out in real life.
Professionally, networking is the lifeblood of career growth. It’s not just about who you know, but who knows you and what they know you can do. Imagine you’re at a conference, coffee in hand, scanning a room full of strangers. You overhear someone mention a challenge their company is facing: they need a creative solution for a marketing campaign, and their team is stumped. Your brain lights up because you know a person for that! A brilliant graphic designer you met at a workshop last year. The easy part is making the mental connection. The harder part? Walking over, introducing yourself, and saying, “Hey, I couldn’t help but overhear. I might know someone who can help.” That’s where the boldness comes in. It’s not about selling yourself or your contact; it’s about offering value and starting a conversation. Over time, those small acts of courage build a reputation: you become the person who connects dots.
I saw this play out vividly a few years ago when a colleague, Sarah, turned a casual chat into a career-defining moment. We were at a local industry meetup, and she struck up a conversation with a startup founder who was frustrated about their lagging sales. Sarah didn’t have the answer herself, but she remembered a sales strategist she’d met at a previous event. Instead of letting the moment pass, she said, “I know someone who’s tackled this exact problem. Mind if I connect you?” The founder agreed, and within a week, Sarah had facilitated an introduction that led to a six-figure consulting gig for her contact and a glowing referral for herself. She didn’t ask for anything in return, but her willingness to bridge the gap earned her trust and credibility. That’s networking at its finest: knowing the right people and having the guts to act.
On the personal side, networking takes a softer, but no less impactful form. It’s less about career ladders and more about enriching your life and community. Think about the last time you needed a recommendation, for a plumber, a babysitter, or even a good book. You probably turned to a friend or neighbor, someone whose judgment you trust. That’s "I know a person for that" in action. But the boldness piece still applies. Asking for help or advice can feel vulnerable, especially if it’s not a close relationship. Yet, those small asks often deepen bonds.
I recently moved to a new city. Last week, I hesitantly asked a distant acquaintance if he could make an introduction to a local hair stylist he uses. I was nervous that I would bother him, or that he would ignore my note. Instead, he got back to me the same day, checked with the stylist to see if she had openings, then shared her contact information with me. I had an appointment for a haircut within 24 hours! Networking personally is about leaning into your circle,and sometimes expanding it, without overthinking the imposition.
In other words, it’s okay to ask. The beauty of this definition is its universality. Whether you’re pitching yourself for a job or seeking a hiking buddy, networking hinges on two things: relationships and initiative. Research backs this up tangentially. Studies like those from Harvard Business Review suggest that successful networking isn’t about extroversion or schmoozing, but about creating genuine connections and following through. It’s less about a polished elevator pitch and more about being useful and present.
Of course, it’s not always smooth sailing. The fear of rejection or coming off as pushy can paralyze even the best intentions. I’ve fumbled plenty of networking moments myself—once freezing mid-sentence while trying to pitch a collaboration to a senior exec at a mixer. But the stumbles teach you resilience. Networking isn’t a one-and-done; it’s a muscle you build over time.
Each time you say, “I know someone who can help,” or “Can you point me in the right direction?” you’re weaving a stronger web. So, the next time you’re at a crossroads, think of networking as that nexus. It’s knowing who’s in your orbit and daring to reach out. It’s less about collecting contacts and more about cultivating possibilities. The magic happens when you connect the dots and take the leap.
-
@ 878dff7c:037d18bc
2025-03-17 21:39:11Treasurer Warns of Economic Risks Amid Global Trade Tensions
Summary:
Treasurer Jim Chalmers has highlighted significant risks to Australia's economic recovery due to escalating global trade tensions, particularly stemming from U.S. President Donald Trump's new tariff policies. The Organisation for Economic Co-operation and Development (OECD) forecasts a slowdown in global GDP growth, with Australia's growth projected at 1.9% in 2025 and 1.8% in 2026. Chalmers emphasizes the need for resilience over retaliation in economic strategies to mitigate these challenges. Sources: The Australian - March 18, 2025, News.com.au - March 18, 2025, ABC News - March 18, 2025, Michael West Media - March 18, 2025
Rising Energy Costs Impact Australian Households Ahead of Election
Summary:
As the upcoming federal election approaches, escalating energy costs have become a critical issue. Opposition leader Peter Dutton has criticized Prime Minister Anthony Albanese's government for rising living expenses, linking them to investments in renewable energy. Despite government subsidies, electricity bills have soared, partly due to the Ukraine conflict, placing financial strain on households and influencing voter sentiment. Sources: Financial Times - March 18, 2025
Flood Warnings Issued as Heavy Rain Blankets North Queensland
Summary:
Heavy rainfall and potential thunderstorms are forecasted for North Queensland, especially around Townsville, with expected accumulations between 10 to 250mm on Wednesday. This has led to rising water levels in the Bohle River catchment, with minor flooding reaching 4 meters from Tuesday morning and potential moderate flooding during the day. The Tully River is also experiencing minor flooding at Euramo. Hinchinbrook Mayor Ramon Jayo has advised residents to remain vigilant as heavy rain continues. Further updates and warnings about rainfall, river conditions, and weather forecasts are available on the Bureau of Meteorology (BOM) website. Sources: Courier Mail - March 18, 2025
Treasurer Jim Chalmers Warns of Economic Impact from Global Trade Tensions
Summary:
Treasurer Jim Chalmers has raised concerns about the potential negative effects of escalating global trade tensions on Australia's economy. He emphasized that ongoing tariff disputes could lead to increased inflation and hinder economic growth. This warning aligns with the latest OECD outlook, which has revised up global inflation forecasts and downgraded GDP growth projections for 2025 and 2026. Sources: The Guardian - March 18, 2025, The Saturday Paper - March 18, 2025
Prime Minister Albanese's Approval Rating Hits 18-Month High
Summary:
Prime Minister Anthony Albanese has achieved his highest approval rating in nearly 18 months, with 46% of respondents expressing satisfaction with his performance. In contrast, opposition leader Peter Dutton's disapproval rating has risen to 46%. If an election were held today, 29% of voters would support the Labor Party, while 35% would favor the Coalition. On a two-party preferred basis, both major parties are tied at 47%. Sources: The Guardian - March 18, 2025
Crackdown on CFMEU Amid Corruption Allegations
Summary:
Opposition Leader Peter Dutton has proposed stringent measures against the Construction, Forestry, Maritime, Mining and Energy Union (CFMEU) following fresh allegations of corruption and criminal behavior. The proposed actions include:
- Deregistration of the CFMEU: Dutton advocates for disbanding the union due to its alleged misconduct.
- Establishment of an AFP-Led Taskforce: A specialized unit within the Australian Federal Police to investigate and address the union's activities.
- Introduction of RICO-Style Laws: Implementing laws similar to the U.S. Racketeer Influenced and Corrupt Organizations Act to target organized crime within unions.
These measures aim to tackle issues such as collaboration with outlaw motorcycle gangs and misuse of funds. Critics argue that existing Australian laws are sufficient, and that deregistering the union could be counterproductive.
Sources: The Guardian - March 17, 2025, News.com.au - March 17, 2025, The Australian - March 17, 2025
U.S. and China Engage in High-Stakes Trade Negotiations Amid Rising Tensions
Summary:
The United States and China have entered into critical trade negotiations to address escalating tariffs and trade barriers. The discussions aim to de-escalate tensions that have impacted global markets. Both nations are striving to find common ground on issues such as intellectual property rights, market access, and trade imbalances. The outcome of these talks is expected to have significant implications for the global economy. Sources: Center for Strategic and International Studies - March 14, 2025, Stratfor - March 17, 2025
High Rates of Sexual Violence Among Female International Students in Australia
Summary:
A national study conducted between 2021 and 2023 revealed that over half of female international students in Australia experienced sexual or intimate partner violence in the past year. The survey of nearly 1,500 students found that about 54% encountered such violence, often from intimate partners or friends. Researchers are calling for tertiary institutions and governments to take greater responsibility in addressing these issues, emphasizing the need for culturally appropriate support services and addressing structural issues that heighten risks for international students. Sources: The Australian - March 18, 2025
Opposition Leader Proposes Referendum to Deport Dual Citizens Convicted of Serious Crimes
Summary:
Opposition leader Peter Dutton has proposed a referendum to allow the government to deport dual citizens convicted of serious crimes. Despite criticism over the cost, Dutton emphasizes that safety is paramount. This proposal is part of broader discussions on strengthening national security measures. Sources: The Guardian - March 18, 2025
Melbourne Residents Offered $200,000 for Information on Pro-Democracy Activist
Summary:
Several Melbourne residents have received anonymous letters offering a police bounty of $203,000 for information on Kevin Yam, an Australian pro-democracy activist wanted by Hong Kong for alleged national security crimes. The letters, mailed from Hong Kong, provided a photograph and details of Yam, urging recipients to inform Hong Kong police of his whereabouts. The Australian government condemned the targeting of an Australian citizen and vowed to address the matter with Chinese and Hong Kong authorities. The letters' language mirrored a notice on the Hong Kong police website and included a UK phone number linked to the Hong Kong police. Similar letters were also sent to neighbors of another activist, Carmen Lau, in the UK. The incident highlights concerns over Hong Kong's national security law being used to target pro-democracy activists globally. Yam criticized his targeting as interference with his democratic rights and called for Australian government sanctions against Chinese officials. Sources: The Guardian - 17 March 2025
Mystery Foam Causes Illnesses Among Surfers in South Australia
Summary:
Beaches from Victor Harbor to Waitpinga, south of Adelaide, have been affected by a yellowish foam washing ashore, accompanied by dead marine life such as fish, sea dragons, and octopuses. Surfers and beachgoers have reported symptoms like itchy throats, raspy coughs, eye infections, and blurry vision after visiting these beaches. Authorities suspect the foam results from an algal bloom, influenced by hot temperatures, still water, and an ongoing marine heatwave with sea temperatures 2.5°C warmer than usual. Investigations by the Department of Primary Industries and Regions (PIRSA) and the South Australian Environmental Protection Agency (EPA) are underway to determine the exact cause.
Sources: The Advertiser - 18th March 2025
-
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ 7e538978:a5987ab6
2024-10-02 13:57:31Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoin’s Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isn’t just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but it’s not just about gameplay; it’s about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? That’s where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, we’ll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Let’s explore how LNbits transforms payment processing and why it’s quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The game’s current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duel’s efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbits’ tools means that game developers don’t need to worry about building custom payment systems from scratch—they can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the game’s developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the game’s logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Network’s complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distribution—ensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their project’s needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible nature—everything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether you’re developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbits’ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isn’t just a payment tool — it’s a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ 2e8970de:63345c7a
2025-03-17 21:18:17https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5108105
originally posted at https://stacker.news/items/916063
-
@ 13395884:6d48d6b9
2025-03-17 20:57:17HD66 là một nền tảng trực tuyến đột phá, mang lại cho người dùng những trải nghiệm mượt mà và tiện ích vượt trội. Với giao diện dễ sử dụng và thiết kế tối ưu, HD66 giúp người tham gia dễ dàng tiếp cận và sử dụng các tính năng mà nền tảng cung cấp. Bất kể bạn là người mới hay đã quen thuộc với nền tảng, HD66 luôn tạo ra một không gian trực tuyến dễ dàng tiếp cận và khám phá. Các công cụ và dịch vụ trên nền tảng này được thiết kế để tối đa hóa sự tiện lợi, giúp người sử dụng có thể nhanh chóng tham gia vào các hoạt động và tận hưởng trải nghiệm trực tuyến một cách hiệu quả. HD66 không chỉ chú trọng vào tính năng mà còn vào việc tạo ra một không gian thoải mái, dễ chịu cho người dùng trong suốt quá trình sử dụng.
Điều khiến HD66 trở nên đặc biệt chính là sự linh hoạt và khả năng tùy chỉnh các dịch vụ của nền tảng để đáp ứng nhu cầu đa dạng của người tham gia. Nền tảng này không ngừng cập nhật và mở rộng các tính năng mới, giúp người dùng luôn có những trải nghiệm mới mẻ và thú vị. HD66 luôn lắng nghe phản hồi từ cộng đồng để cải tiến và phát triển, mang lại các công cụ hữu ích và sáng tạo giúp người tham gia có thể tối ưu hóa trải nghiệm của mình. Mọi người có thể tìm thấy các lựa chọn phù hợp với sở thích cá nhân và tham gia vào các hoạt động thú vị, tạo nên một môi trường trực tuyến năng động và sôi nổi. Sự sáng tạo và cải tiến liên tục là yếu tố giúp HD66 luôn thu hút và giữ chân người dùng.
Bên cạnh các tính năng tiện ích và linh hoạt, HD66 cũng đặc biệt chú trọng đến vấn đề bảo mật và an toàn của người sử dụng. Với hệ thống bảo vệ mạnh mẽ và các biện pháp xác thực nghiêm ngặt, nền tảng này cam kết bảo vệ tuyệt đối thông tin cá nhân của người tham gia. Mọi hoạt động trên HD66 đều được thực hiện trong một môi trường an toàn và đáng tin cậy, giúp người dùng có thể thoải mái tham gia mà không phải lo lắng về bảo mật. HD66 không chỉ tập trung vào việc mang lại những trải nghiệm thú vị mà còn cam kết tạo ra một không gian an toàn, nơi người dùng có thể yên tâm kết nối và tương tác với cộng đồng. Chính nhờ vào các biện pháp bảo mật chặt chẽ và cam kết bảo vệ người sử dụng, HD66 đã trở thành một lựa chọn hàng đầu cho những ai tìm kiếm một nền tảng trực tuyến đáng tin cậy và an toàn.
-
@ 13395884:6d48d6b9
2025-03-17 20:56:29Posh88 là một nền tảng trực tuyến tiên tiến, được thiết kế để mang đến cho người dùng những trải nghiệm tuyệt vời và khác biệt. Với giao diện hiện đại, dễ sử dụng và tối ưu hóa cho nhiều loại thiết bị, Posh88 giúp người tham gia có thể dễ dàng truy cập vào các tính năng mà không gặp phải sự cố hay phức tạp. Nền tảng này hướng đến việc mang lại sự tiện lợi tối đa, từ việc tìm kiếm thông tin, tham gia các hoạt động đến việc tương tác với cộng đồng. Mỗi chức năng trên Posh88 đều được thiết kế tỉ mỉ, giúp người dùng có thể sử dụng một cách trực quan và hiệu quả, mang lại những trải nghiệm mượt mà và thú vị từ lần đầu tiên.
Điều làm Posh88 nổi bật chính là sự đổi mới không ngừng trong các dịch vụ và tính năng mà nó cung cấp. Posh88 không chỉ dừng lại ở việc cung cấp các công cụ cơ bản, mà còn sáng tạo ra những lựa chọn đa dạng, đáp ứng nhu cầu ngày càng cao của người dùng. Nền tảng này tạo ra một không gian trực tuyến năng động, nơi người tham gia có thể khám phá, học hỏi và chia sẻ những ý tưởng sáng tạo. Posh88 cũng luôn chú trọng đến việc cải thiện và cập nhật các tính năng để tạo ra một môi trường luôn tươi mới, giúp người dùng không chỉ giải trí mà còn phát triển kỹ năng và kiến thức. Những cải tiến này tạo nên một cộng đồng sôi động và kết nối người dùng một cách hiệu quả, giúp mỗi người tham gia đều có thể tìm thấy giá trị từ nền tảng.
Bên cạnh tính năng và giao diện, Posh88 đặc biệt chú trọng đến yếu tố bảo mật và an toàn. Với các hệ thống bảo vệ hiện đại và các biện pháp xác thực nghiêm ngặt, Posh88 đảm bảo rằng mọi thông tin cá nhân của người sử dụng đều được bảo mật tuyệt đối. Mọi giao dịch và hoạt động trên nền tảng đều được thực hiện trong một môi trường an toàn, giúp người dùng hoàn toàn yên tâm khi tham gia. Điều này tạo dựng được sự tin tưởng mạnh mẽ trong cộng đồng, nơi mà mỗi người đều có thể thoải mái khám phá, kết nối và trải nghiệm mà không phải lo lắng về các vấn đề bảo mật. Posh88 cam kết sẽ tiếp tục duy trì những tiêu chuẩn bảo mật cao nhất, mang lại sự an tâm cho mọi người tham gia.
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 13395884:6d48d6b9
2025-03-17 20:55:138KI là một nền tảng trực tuyến mới mẻ, được thiết kế với mục tiêu mang lại những trải nghiệm tuyệt vời và phong phú cho người sử dụng. Với giao diện trực quan và dễ sử dụng, 8KI giúp người tham gia dễ dàng tiếp cận các tính năng của nền tảng mà không gặp phải bất kỳ khó khăn nào. Từ lần đầu tiên truy cập, người dùng có thể cảm nhận được sự khác biệt về tính tiện ích mà 8KI mang lại, từ việc khám phá các dịch vụ cho đến việc tham gia vào các hoạt động trực tuyến. Mọi tính năng trên nền tảng đều được tối ưu hóa để giúp người dùng có thể dễ dàng tương tác, học hỏi và trải nghiệm trong một không gian an toàn và thuận tiện.
Không chỉ dừng lại ở tính năng và giao diện, 8KI còn chú trọng đến việc mang lại cho người dùng những lựa chọn đa dạng, giúp họ có thể tham gia vào nhiều hoạt động và tận hưởng các cơ hội thú vị. Nền tảng này liên tục phát triển, không ngừng cập nhật và đổi mới các tính năng để phù hợp với nhu cầu và xu hướng mới của người dùng. Mỗi công cụ và dịch vụ trên 8KI đều được nghiên cứu kỹ lưỡng để mang lại giá trị tối đa, giúp người sử dụng không chỉ giải trí mà còn có thể phát triển kỹ năng và kết nối với cộng đồng. Các tính năng linh hoạt của 8KI cũng giúp người dùng dễ dàng tùy chỉnh và lựa chọn những gì phù hợp với mình, mang lại một trải nghiệm cá nhân hóa và đầy sự hài lòng.
Một trong những yếu tố quan trọng khiến 8KI trở thành sự lựa chọn hàng đầu của người sử dụng chính là sự chú trọng đến bảo mật và an toàn thông tin. Nền tảng này sử dụng công nghệ bảo mật tiên tiến để bảo vệ mọi dữ liệu của người dùng, đồng thời áp dụng các biện pháp xác thực nghiêm ngặt để đảm bảo an toàn tuyệt đối trong quá trình sử dụng. Điều này giúp người tham gia cảm thấy an tâm khi tham gia vào các hoạt động trực tuyến, đặc biệt là trong môi trường đầy thử thách và tiềm ẩn nhiều yếu tố không an toàn. Với cam kết bảo vệ quyền lợi người dùng, 8KI đã xây dựng được lòng tin và sự tín nhiệm từ cộng đồng, tạo ra một không gian trực tuyến đáng tin cậy và đầy hứa hẹn.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 7d33ba57:1b82db35
2025-03-17 20:38:54Borkum Island
Borkum is the largest of the East Frisian Islands, located in the North Sea, near the Dutch border. Known for its wide sandy beaches, fresh sea air, and natural beauty, it’s a perfect destination for relaxation, wellness, and outdoor activities. Borkum is part of the Wadden Sea National Park (UNESCO World Heritage Site), making it an excellent spot for nature lovers.
🏖️ Best Things to Do on Borkum Island
1️⃣ Relax on the Beautiful Beaches
Borkum has 26 km of sandy beaches, with designated areas for swimming, surfing, and even dog-friendly sections. The main beach near the promenade is perfect for sunbathing and walking.
2️⃣ Visit the Borkum Lighthouses
- New Lighthouse (Neuer Leuchtturm) – A 60m tall lighthouse offering panoramic views of the island.
- Old Lighthouse (Alter Leuchtturm) – The oldest lighthouse in East Frisia, dating back to 1576.
3️⃣ Explore the Wadden Sea (Wattenmeer)
Join a mudflat hiking tour and discover the unique tidal ecosystem of the Wadden Sea, home to seals, crabs, and rare birds.
4️⃣ Take a Ride on the Borkumer Kleinbahn
This historic narrow-gauge railway connects the harbor to the town center and is a fun way to experience the island’s charm.
5️⃣ Seal Watching at Nordstrand
Borkum is known for its seal colonies! Head to Nordstrand or take a boat tour to see these adorable creatures in their natural habitat.
6️⃣ Enjoy Wellness & Thalassotherapy
Borkum’s fresh sea air and saltwater treatments make it a popular destination for health and wellness retreats. Visit the Gezeitenland Spa for a relaxing day.
🍽️ What to Eat on Borkum
- Frisian seafood – Try fresh herring, shrimp, and fish sandwiches. 🐟
- Ostfriesentee (East Frisian tea) – Served with rock sugar and cream. ☕
- Labskaus – A traditional sailor’s dish with mashed potatoes, corned beef, and pickled herring.
- Frisian beer – Local brews are a must-try! 🍺
🚢 How to Get to Borkum
🚢 By Ferry:
- From Emden (Germany) – ~2-hour ferry or 1-hour fast ferry
- From Eemshaven (Netherlands) – ~50-minute ferry🚂 By Train:
- Take a train to Emden and transfer to the ferry terminal.🚘 By Car:
- You can bring your car on the ferry, but the island is mostly car-free, so biking is the best way to get around.💡 Tips for Visiting Borkum
✅ Best time to visit? Summer for beach activities, spring & autumn for hiking and fewer crowds. 🌞
✅ Rent a bike – Borkum is best explored by bicycle 🚲
✅ Pack for the wind – The North Sea can be breezy! 🌬️ -
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ da0b9bc3:4e30a4a9
2025-03-17 20:17:53Hello Stackers!
It's Monday so we're back doing "Meta Music Mondays" 😉.
From before the territory existed there was just one post a week in a ~meta take over. Now each month we have a different theme and bring music from that theme.
This month is March and we're doing March Madness. So give me those Wacky and Weird crazy artists and songs. The weirder the better!
Let's have fun.
How about Weird and Wonderful J-Pop Metal mixed with German Techno Metal.
Baby Metal with Electric Callboy - Ratatata
https://youtu.be/EDnIEWyVIlE?si=DLV4-tOTx6TipGv
Talk Music. Share Tracks. Zap Sats.
originally posted at https://stacker.news/items/915965
-
@ edf0da8b:b2652fa3
2025-03-17 17:28:33One remarkable thing the Wim Hof Method stirs in me is that I increasingly feel the desire to connect with pure nature. Now, what does that mean?
You may know that slight feeling of eeriness when looking at deep moving waters or that tiny insecurity when darkness creeps up around you alone among the trees? You are sure there's nothing to worry about. But still, these little old conditioned anxieties, these unreasonable mind scenarios, they keep coming up and make you seek safety.
They are different for everyone, but these anxieties in the foreground are a sign for inner blockages that deprive us from expressing our power and creativity. What's more, they separate us from nature. They suggest, everything around us is potentially dangerous. Is it though?
When practicing the Wim Hof Method, and especially right after the breathing exercises, I can immediately feel a clarity emerging, a stronger awareness of presence in the moment. Anxieties are caringly pushed back to their rightful place, but do not control my actions and no longer dominate my state of being.
And so suddenly, the world view shifts. Eerie deep moving waters become fascinating, the darkness around reveals the beauty of trees casting soft moonlight shadows. I deeply appreciate what is, I want to touch the waters, I want to merge with the shadows, I feel that power. Instead of running away I want to connect with nature. I'm more aware of the present and should danger reveal itself, I have the confidence that I can properly react when it arises. But until then, I can enjoy beauty and connectedness. The powerful shift is from scenarios about potential threats around me to curiosity and beautiful opportunity everywhere.
There are countless great techniques and traditions that guide us to such shifts. But with regular practice, I find the Wim Hof Method to be particularly simple, accessible and effective.
wimhofmethod
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 000002de:c05780a7
2025-03-17 17:27:07Predictions are easy to make. Some are made, don't come to pass and no one notices. There are others that people do notice when they fail to come to pass. There's a third type of failed prediction though.
Predictions that fail over and over but people still seem to fall for. Can you think of some examples?
One of my favorites that I've been hearing for over 20 years is about Iran.
"Iran is weeks away from possessing nuclear weapons".
Of course there are many regarding global warming/climate change. As a child of the 80s I grew up learning about the problem and fear was pumped into my veins by government teachers. They meant well. They were nice people. But as a man cursed with remembering such things I recall dire predictions about temperature, deforestation, and pollution that have never materialized. Don't misunderstand. I'm not saying we should not be concerned but the alarmist approach really jaded my view of the "scientific" community long before the Internet became what it is today.
I'm sure I'm not alone. What are some predictions that keep coming back up after failing to materialize?
originally posted at https://stacker.news/items/915746
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ d54c85fa:1e8504f5
2025-03-17 17:13:20running comet
v0.6.0 alpha
.rpm
package installed natively on Fedora 41 testing -
@ 06bc9ab7:427c48f5
2025-03-17 15:46:23Bitcoin Safe - A bitcoin savings wallet for the entire family
Designed for both beginners and power users, Bitcoin Safe combines security with an intuitive user experience. In this article, we dive deep into its features, unique benefits, and the powerful tools that make managing your Bitcoin wallet simple and secure.
Built for Learners
✔️ Step-by-step wallet setup wizard + PDF backup sheets 📄 🧪 Test transactions to ensure all hardware signers are ready 🔑 🛡️ Secure: Hardware signers only – no hot wallet risks 🚫🔥 🌍 Multi-language support: 🇺🇸 🇨🇳 🇪🇸 🇯🇵 🇷🇺 🇵🇹 🇮🇳 🇮🇹 🇫🇷 🇩🇪 🇲🇲 🇰🇷 📁 Address categories for easy organization ☁️ Label and category synchronization, and cloud backup (optional) 💰 Automatic UTXO merging to save on fees ⚡ Fast syncing with Electrum servers, Compact Block Filters coming soon
Built for Power Users
🔐 Supports Coldcard, Bitbox02, Jade, Trezor, Passport, Keystone & many more 🏦 💬 Multi-party multisig chat & PSBT sharing (optional) 📊 Transaction flow diagrams to trace coin movements 🔍 Instant cross-wallet wallet search ⚙️ Set your own electrum server, mempool instance, and nostr relay
Step-by-Step Wallet Setup
Whether you’re setting up a single-signature or multi-signature wallet, the setup wizard guides you every step of the way:
- Single Sig Wizard: Follow the intuitive wizard that walks you through each step. https://youtu.be/m0g6ytYTy0w
Clear instructions paired with hardware signer screen-shots, like the steps for a Coldcard
-
Multisig Wizard: The wizard ensures you do all necessary steps for a Multisig wallet in the right order. Afterwards your Multisig is ready to use and all signers are tested. Check out https://bitcoin-safe.org/en/features/setup-multisignature-wallet/
-
PDF Backup: The wizard will also generates 3 PDF backup sheets for a 2-of-3 multisig wallet, so ensure you always have your wallet descriptor together with the seed.
-
Hardware Signer Support: With full support for major hardware signers your keys remain securely offline.
Transaction Visualization
Visualize and navigate your transaction history:
-
Graphical Explorer: An interactive transaction diagram lets you click on inputs and outputs to follow the money flow intuitively.
-
Coin Categories: Organize your addresses into distinct coin categories (e.g., “KYC”, “Work”, “Friends”) so Bitcoin Safe automatically selects the correct inputs when creating PSBTs.
It prevents you accidentally linking coin categories when creating a transaction, and warns you if mistakes happened in the past.
Powerful Wallet Management Tools
- Flexible Fee Selection: Choose fees with one click using an intuitive mempool block preview.
- UTXO Management: Automatically (optional) merge UTXOs when fees are low.
- CSV Table Export: Right click, Drag&Drop, or CTRL+C for immediate CSV export for easy processing in Excel.
- PDF Balance Statement: Export the address balances for easy record keeping on paper.
Advanced Features for the Power-User
Sync & Chat is off by default (for the paranoid user), but can be enabled with just one click.
Label Synchronization and Backup
- Seamless Sync: Using encrypted nostr messages, Bitcoin Safe synchronizes your coin categories and labels across multiple devices.
- Easy Backup: A short backup key is all you need to safeguard your coin categories and labels, ensuring your organization remains intact.
Collaborative Multi-party Multisig
- Group Chat Integration: After creating your multisig wallet, Bitcoin Safe offers an encrypted nostr group chat for secure collaboration and one-click PSBT sharing.
- User Authentication: Each participant must authenticate every other user with a simple click, ensuring secure communication.
Watch and Learn: Get Started with Bitcoin Safe
If you’re new to Bitcoin Safe, a short video guide can make all the difference. Learn how to set up your Bitcoin Safe wallet in this detailed walk through:
https://youtu.be/m0g6ytYTy0w
Or see how to verify an address on your hardware singer:
https://youtu.be/h5FkOYj9OT8
Building up a knowledge base: https://bitcoin-safe.org/en/knowledge/
Whats next?
- Compact Block Filters!!! They make electrum servers obsolete.
- Why? Compact Block Filters increase the network privacy dramatically, since you're not asking an electrum server to give you your transactions
- Trade-off: They are a little slower than electrum servers. For a savings wallet like Bitcoin Safe this should be OK.
- How do they work? Simply speaking: They ask normal bitcoin core nodes for a short summary of each block. And if the summary shows a transaction belonging to the wallet, the entire block is then downloaded from the bitcoin core node. The bitcoin core node does not learn however which of the many transactions in the block you were interested in. Read more here and of course in the bip.
- When: 2 weeks 😅. Lots of things need to be done until Bitcoin Safe can use the bdk CBF/kyoto client from rustaceanrob, so keep an eye out for updates and please give feedback when you use Bitcoin Safe.
Stay updated on nostr or on GitHub.
Thank you
A huge thanks goes to nostr:npub10pensatlcfwktnvjjw2dtem38n6rvw8g6fv73h84cuacxn4c28eqyfn34f for supporting this project with a grant and nostr:npub1yrnuj56rnen08zp2h9h7p74ghgjx6ma39spmpj6w9hzxywutevsst7k5cx for the Hackathon prize.
This wallet is only possible because it is building upon other peoples open source work. Most notably
- bdk nostr:nprofile1qqsgkmgkmv63djkxmwvdlyaxx0xtsytvkyyg5fwzmp48pwd30f3jtxspzemhxue69uhhyetvv9ujuurjd9kkzmpwdejhgqg5waehxw309aex2mrp0yhxgctdw4eju6t0qyt8wumn8ghj7un9d3shjtnwdaehgu3wvfskueqr8vuet
- and especially nostr:npub1thunderat5g552cuy7umk624ct5xe4tpgwr2jcjjq2gc0567wgrqnya79l , nostr:npub1reezn2ctrrg736uqj7mva9lsuwv0kr5asj4vvkwxnrwlhvxf98tsq99ty4 , and nostr:npub1ke470rdgnxg4gjs9cw3tv0dp690wl68f5xak5smflpsksedadd7qtf8jfm for dealing with my many feature requests and questions.
- rustaceanrob building kyoto which implements CBF for BDK; a crucial library and will be able to replace electrum servers for many use cases
- ndk by nostr:nprofile1qqsx3kq3vkgczq9hmfplc28h687py42yvms3zkyxh8nmkvn0vhkyyuspz4mhxue69uhkummnw3ezummcw3ezuer9wchsz9thwden5te0wfjkccte9ejxzmt4wvhxjme0qy88wumn8ghj7mn0wvhxcmmv9u0uehfp
And of course, secure storage of bitcoin is only possible, because of the hardware signer manufacturers. Thanks to nostr:npub1az9xj85cmxv8e9j9y80lvqp97crsqdu2fpu3srwthd99qfu9qsgstam8y8 Coldcard , Coldcard Q , nostr:npub1tg779rlap8t4qm8lpgn89k7mr7pkxpaulupp0nq5faywr8h28llsj3cxmt Bitbox02 , nostr:npub1jg552aulj07skd6e7y2hu0vl5g8nl5jvfw8jhn6jpjk0vjd0waksvl6n8n Blockstream Jade , Trezor Safe, Foundation Passport, Keystone, Ledger, Specter Shield, and many more.
I also want to thank people who gave feedback and helped spread the knowledge of Bitcoin Safe (please forgive me if I forgot to mention you)
- nostr:npub1p5cmlt32vc3jefkl3ymdvm9zk892fsmkq79eq77uvkaqrnyktasqkpkgaw nostr:npub1s07s0h5mwcenfnyagme8shp9trnv964lulgvdmppgenuhtk9p4rsueuk63 nostr:npub18f3g76xc7xs430euwwl9gpn7ue7ux8vmtm9q8htn9s26d8c4neeqdraz3s nostr:npub1mtd7s63xd85ykv09p7y8wvg754jpsfpplxknh5xr0pu938zf86fqygqxas nostr:npub1kysd8m44dhv7ywa75u5z7w2w0gs4t6qzhgvjp555gfknasy3krlqfxde60 nostr:npub185pu2dsgg9d36uvvw7rwuy9aknn8hnknygr7x2yqa60ygvq6r8kqc836k8 nostr:npub1hkcgyqnsuaradq3g5hyvfdekwypc25494nmwggwpygxas7fcs4fst860fu nostr:npub1xsl0msy347vmj8gcpsjum6wwppc4ercvq4xfrhqmek2dqmqm0mtsyf35vx nostr:npub1hxjnw53mhghumt590kgd3fmqme8jzwwflyxesmm50nnapmqdzu7swqagw3 nostr:npub1ke470rdgnxg4gjs9cw3tv0dp690wl68f5xak5smflpsksedadd7qtf8jfm nostr:npub1sk26fxl4fy3vt8m5n0a6aturaql0w20nvh22q0cyaqm28tj7z8ss3lutc9 nostr:npub1r4llq2jcvq4g2tgha5amjz07zk7mrrcj89wllny9xwhhp5zzkklqk4jwja nostr:npub1p9v2zpwl28c0gu0vr2enp3lwdtv29scwpeqsnt0ngqf03vtlyxfqhkae5w nostr:npub1xkym0yaewlz0qfghtt7hjtnu28fxaa5rk3wtcek9d3x3ft2ns3lq775few nostr:npub1r8343wqpra05l3jnc4jud4xz7vlnyeslf7gfsty7ahpf92rhfmpsmqwym8 nostr:npub12zpfs3yq7we83yvypgsrw5f88y2fv780c2kfs89ge5qk6q3sfm7spks880 nostr:npub1yrnuj56rnen08zp2h9h7p74ghgjx6ma39spmpj6w9hzxywutevsst7k5cx https://x.com/91xTx93x2 https://x.com/afilini rustaceanrob
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 82b30d30:40c6c003
2025-03-17 15:26:29[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 06639a38:655f8f71
2025-03-17 15:13:22- My PR#100 for
sirn-se/websocket-php
got merged and was released in version 3.2.3 - Closed issue #83, reviewed and merged PR#84 for integrating NIP-04 and NIP-44
- Closed issue #85 and merged PR#86 with Event object verification
1.6.0
release https://github.com/nostrver-se/nostr-php/releases/tag/1.6.0
Planned for week 12:
- Integrate NIP-19
- My PR#100 for
-
@ 8bf65a23:c2d3bd12
2025-03-17 15:02:42Ut erat felis, semper nec nisl id, dignissim porta enim. Phasellus a scelerisque nulla, et dignissim velit. Vivamus et tincidunt lacus. Ut sem ipsum, porta vitae neque varius, venenatis porttitor diam. Nulla facilisi. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Pellentesque quis nibh est. Suspendisse consectetur non ipsum nec ultricies. Donec eros turpis, malesuada in sollicitudin nec, pharetra sed justo. Maecenas gravida diam sit amet ligula vestibulum rutrum.
Aenean cursus laoreet eros ac elementum. Nulla facilisi. Suspendisse volutpat lobortis gravida. Pellentesque auctor turpis lacus, ac dignissim ex lobortis fringilla. Aliquam erat volutpat. Vestibulum rhoncus metus sit amet arcu tincidunt, sed vestibulum augue pellentesque. Mauris at laoreet odio, quis maximus ligula. Curabitur interdum pellentesque nunc id bibendum.
Nunc tempus magna vel lorem luctus rhoncus. Nulla accumsan, tortor ut viverra mattis, dui arcu faucibus nisi, maximus auctor purus lectus sed libero. Nullam dictum risus viverra, molestie nisi vel, imperdiet purus. Morbi in bibendum augue, nec molestie libero. Cras tincidunt quis mauris quis tristique. Sed laoreet sapien in urna dapibus sollicitudin. Donec orci lacus, tincidunt a diam laoreet, rutrum mattis mi. Sed elementum eget elit at aliquam.
Morbi convallis tortor quis ante aliquet, vitae placerat tortor mollis. Vestibulum cursus aliquam lorem, facilisis porttitor arcu pharetra sed. Aenean eu condimentum erat. Donec in consectetur mauris. Fusce auctor purus quis justo fringilla, vel laoreet mauris faucibus. Quisque faucibus ornare tortor quis feugiat. Nullam euismod malesuada finibus. Vivamus pellentesque, quam in rhoncus vehicula, metus lorem condimentum arcu, id molestie nunc mi eget magna. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas.Ut erat felis, semper nec nisl id, dignissim porta enim. Phasellus a scelerisque nulla, et dignissim velit. Vivamus et tincidunt lacus. Ut sem ipsum, porta vitae neque varius, venenatis porttitor diam. Nulla facilisi. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Pellentesque quis nibh est. Suspendisse consectetur non ipsum nec ultricies. Donec eros turpis, malesuada in sollicitudin nec, pharetra sed justo. Maecenas gravida diam sit amet ligula vestibulum rutrum.
Aenean cursus laoreet eros ac elementum. Nulla facilisi. Suspendisse volutpat lobortis gravida. Pellentesque auctor turpis lacus, ac dignissim ex lobortis fringilla. Aliquam erat volutpat. Vestibulum rhoncus metus sit amet arcu tincidunt, sed vestibulum augue pellentesque. Mauris at laoreet odio, quis maximus ligula. Curabitur interdum pellentesque nunc id bibendum.
Nunc tempus magna vel lorem luctus rhoncus. Nulla accumsan, tortor ut viverra mattis, dui arcu faucibus nisi, maximus auctor purus lectus sed libero. Nullam dictum risus viverra, molestie nisi vel, imperdiet purus. Morbi in bibendum augue, nec molestie libero. Cras tincidunt quis mauris quis tristique. Sed laoreet sapien in urna dapibus sollicitudin. Donec orci lacus, tincidunt a diam laoreet, rutrum mattis mi. Sed elementum eget elit at aliquam.
Morbi convallis tortor quis ante aliquet, vitae placerat tortor mollis. Vestibulum cursus aliquam lorem, facilisis porttitor arcu pharetra sed. Aenean eu condimentum erat. Donec in consectetur mauris. Fusce auctor purus quis justo fringilla, vel laoreet mauris faucibus. Quisque faucibus ornare tortor quis feugiat. Nullam euismod malesuada finibus. Vivamus pellentesque, quam in rhoncus vehicula, metus lorem condimentum arcu, id molestie nunc mi eget magna. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas.
chip #chop
-
@ 06639a38:655f8f71
2025-03-17 14:59:40https://ccns.nostrver.se is a (Drupal powered) website that I started to build in January 2024 (source on Github and Gitlab). It's a fork of an earlier (abandoned) project https://cchs.social/.
Currently CCNS is a link aggregration website and for now it's only my who is using it to save and share Nostr related links. When you post a new link, you have the option to cross-post it as a Nostr note (example here).Kind 39700
Last month Jurjen and Abir have started to work on a social bookmark client built with Nostr (inspired by Del.icio.us from the past). Earlier this month they changed to event kind 39700 for broadcasting the Nostr event with the bookmark / link data accross the network. They did this because Sep already created a social bookmark like client called Pinja when fiatjaf raised this idea.
With these developments to me it was very obvious to integrate the feature that new created CCNS links are now also published as kind 39700 events to the Nostr network. This means that links are now also distributed on multiple relays as kind 39700 events and are accessible in multiple clients (Yumyume and Pinja).
Here you can see the same data, from left to right:
Structure
The current data structure for the 39700 kind looks as follow:
- "id": "event_id"
- "pubkey": "pubkey author"
- "created_at": unix_timestamp
- "kind": 39700
- "tags":
- "description", "description text here"
- "d", "unique-slug-value"
- "t", "hashtag"
- "content": "https://book_mark_url"
- "sig": "signature"
As there is no NIP (yet) for this event kind, I see some possible improvements:
- Use the bookmark URL as
d
tag so it can be used as a unique identifier for every client - Use the content field for the description
- Use the
a
tag for an addressable event following NIP-01:["a", "39700:pubkey_of_author:", recommended_relay_url_optional]
On short-term I don't have any plans to developer CCNS further, as most of my attention goes to the development of the Nostr-PHP library and Drupal related contribs using that library. That said, CCNS is a Drupal project but all the Nostr stuff is done client-side (Javascript) with NDK and Nostr-PHP is not used (maybe this will change in the future).
-
@ 2b24a1fa:17750f64
2025-03-17 14:50:34Voices for Gaza – Stimmen, die das Unsagbare singen. Es fehlen die Worte ob der Wut, der Zerstörung, dem tausendfachen Mord, dem unfassbaren Leid, den fortwährenden Intrigen und Strategien. Jetzt werden Geiseln übergeben, es könnte ein Weg zu mehr Frieden sein, aber jede Regung wird benützt, um der anderen Seite Demütigung und Inszenierung zu unterstellen. Wieder werden Vereinbarungen gebrochen. Es macht sprachlos, hilflos und müde. Aber der Musiker und Produzent Jens Fischer Rodrian nimmt all seine Kraft, seine Musikalität und Vernetzung zusammen und wirbt mit einer weiteren, einer dritten CD im Rahmen der Protestnoten um Auflösung von Unrecht, diesmal um Frieden in Gaza.
https://soundcloud.com/radiomuenchen/voices-for-gaza-ein-gespraech
Unsere Kollegin Eva Schmidt hat sich mit Jens Fischer Rodrian über die neue Produktion Voices for Gaza unterhalten, für die er Künstler begeistern konnte wie Dieter Hallervorden, Jakob Heymann, den palästinensischen Poeten Ibrahim Massri, Markus Stockhausen, Diether Dehm, Wolfgang Wodarg, Kilez More, Morgaine oder Äon.
Für „Voices for Gaza“ wurde übrigens ein Crowdfunding ins Leben gerufen wurde, das noch bis zum 15. März läuft. Mehr Informationen gibt’s auf der Seite: protestnoten.de.
www.radiomuenchen.net/\ @radiomuenchen\ www.facebook.com/radiomuenchen\ www.instagram.com/radio_muenchen/\ twitter.com/RadioMuenchen
Radio München ist eine gemeinnützige Unternehmung.\ Wir freuen uns, wenn Sie unsere Arbeit unterstützen.
GLS-Bank\ IBAN: DE65 4306 0967 8217 9867 00\ BIC: GENODEM1GLS\ Bitcoin (BTC): 3G1wDDH2CDPJ9DHan5TTpsfpSXWhNMCZmQ\ Ethereum (ETH): 0xB41106C0fa3974353Ef86F62B62228A0f4ad7fe9
-
@ 4c5d5379:3a4383ee
2025-03-17 14:27:21[3]
[4]
-
@ 1731c73c:1bca4ecc
2025-03-17 14:13:04Welch Geistes Kind sind Waffenproduzenten, welch Geistes Kind Wissenschaftler, die Viren so verändern, dass sie pathogener, also gefährlicher für den Menschen werden? Im pfälzischen
https://soundcloud.com/radiomuenchen/kommt-wuhan-nach-deutschland-von-prof-roland-wiesendanger
Weilerbach wird ein US-Biolabor der Schutzstufe 3 gebaut. Dort sollen hochinfektiöse Erreger oder Substanzen, unter anderem SARS-CoV-2, das Virus H5N1, Dengue- und das Hanta-Virus untersucht werden. Der Bundesregierung – so fand Florian Warweg von den NachDenkSeiten heraus - weiß davon angeblich nichts. Auch nicht, welche Kontrollfunktion Bundesbehörden für US-Biolabore auf deutschem Boden haben.
War da was? Hatte nicht – ebenso vertuscht von Regierung, Medien und Wissenschaftlern – für die einen die größte Pandemie, für die anderen der weltweit größte Wissenschafts- und Medizinskandal in den letzten fünf Jahren stattgefunden? Warum interessiert das keinen?
Die Bestätigung der US-Regierung ist offiziell, dass die Covid-19-Pandemie aus einem Labor in Wuhan stammt. Das entlarvt die jahrelange Vertuschung und Diffamierung kritischer Stimmen als politisch motivierte Manipulation. Einer, der diskreditiert wurde, ist Professor Roland Wiesendanger. Mundtot ließ er sich aber nicht machen. Er fordert weiterhin eine schonungslose Aufarbeitung der hochgefährlichen Gain-of-function-Forschung, außerdem deren weltweite Ächtung, um zukünftige Pandemien zu verhindern.
Roland Wiesendanger ist Physik-Professor an der Universität Hamburg, Ehrendoktor der Technischen Universität Posen und Mitglied zahlreicher nationaler und internationaler Wissenschaftsakademien. Hören Sie sein Statement: „Wir dürfen die Risiken der Gain- of-function-Forschung nicht länger hinnehmen“.
Sprecher: Ulrich Allroggen
Radio München\ www.radiomuenchen.net/\ @radiomuenchen\ www.facebook.com/radiomuenchen\ www.instagram.com/radio_muenchen/\ twitter.com/RadioMuenchen
Radio München ist eine gemeinnützige Unternehmung.\ Wir freuen uns, wenn Sie unsere Arbeit unterstützen.
GLS-Bank\ IBAN: DE65 4306 0967 8217 9867 00\ BIC: GENODEM1GLS\ Bitcoin (BTC): 3G1wDDH2CDPJ9DHan5TTpsfpSXWhNMCZmQ\ Ethereum (ETH): 0xB41106C0fa3974353Ef86F62B62228A0f4ad7fe9
-
@ 8bf65a23:c2d3bd12
2025-03-17 14:01:53Ut erat felis, semper nec nisl id, dignissim porta enim. Phasellus a scelerisque nulla, et dignissim velit. Vivamus et tincidunt lacus. Ut sem ipsum, porta vitae neque varius, venenatis porttitor diam. Nulla facilisi. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Pellentesque quis nibh est. Suspendisse consectetur non ipsum nec ultricies. Donec eros turpis, malesuada in sollicitudin nec, pharetra sed justo. Maecenas gravida diam sit amet ligula vestibulum rutrum.
Aenean cursus laoreet eros ac elementum. Nulla facilisi. Suspendisse volutpat lobortis gravida. Pellentesque auctor turpis lacus, ac dignissim ex lobortis fringilla. Aliquam erat volutpat. Vestibulum rhoncus metus sit amet arcu tincidunt, sed vestibulum augue pellentesque. Mauris at laoreet odio, quis maximus ligula. Curabitur interdum pellentesque nunc id bibendum.
Nunc tempus magna vel lorem luctus rhoncus. Nulla accumsan, tortor ut viverra mattis, dui arcu faucibus nisi, maximus auctor purus lectus sed libero. Nullam dictum risus viverra, molestie nisi vel, imperdiet purus. Morbi in bibendum augue, nec molestie libero. Cras tincidunt quis mauris quis tristique. Sed laoreet sapien in urna dapibus sollicitudin. Donec orci lacus, tincidunt a diam laoreet, rutrum mattis mi. Sed elementum eget elit at aliquam.
Morbi convallis tortor quis ante aliquet, vitae placerat tortor mollis. Vestibulum cursus aliquam lorem, facilisis porttitor arcu pharetra sed. Aenean eu condimentum erat. Donec in consectetur mauris. Fusce auctor purus quis justo fringilla, vel laoreet mauris faucibus. Quisque faucibus ornare tortor quis feugiat. Nullam euismod malesuada finibus. Vivamus pellentesque, quam in rhoncus vehicula, metus lorem condimentum arcu, id molestie nunc mi eget magna. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas.Ut erat felis, semper nec nisl id, dignissim porta enim. Phasellus a scelerisque nulla, et dignissim velit. Vivamus et tincidunt lacus. Ut sem ipsum, porta vitae neque varius, venenatis porttitor diam. Nulla facilisi. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Pellentesque quis nibh est. Suspendisse consectetur non ipsum nec ultricies. Donec eros turpis, malesuada in sollicitudin nec, pharetra sed justo. Maecenas gravida diam sit amet ligula vestibulum rutrum.
Aenean cursus laoreet eros ac elementum. Nulla facilisi. Suspendisse volutpat lobortis gravida. Pellentesque auctor turpis lacus, ac dignissim ex lobortis fringilla. Aliquam erat volutpat. Vestibulum rhoncus metus sit amet arcu tincidunt, sed vestibulum augue pellentesque. Mauris at laoreet odio, quis maximus ligula. Curabitur interdum pellentesque nunc id bibendum.
Nunc tempus magna vel lorem luctus rhoncus. Nulla accumsan, tortor ut viverra mattis, dui arcu faucibus nisi, maximus auctor purus lectus sed libero. Nullam dictum risus viverra, molestie nisi vel, imperdiet purus. Morbi in bibendum augue, nec molestie libero. Cras tincidunt quis mauris quis tristique. Sed laoreet sapien in urna dapibus sollicitudin. Donec orci lacus, tincidunt a diam laoreet, rutrum mattis mi. Sed elementum eget elit at aliquam.
Morbi convallis tortor quis ante aliquet, vitae placerat tortor mollis. Vestibulum cursus aliquam lorem, facilisis porttitor arcu pharetra sed. Aenean eu condimentum erat. Donec in consectetur mauris. Fusce auctor purus quis justo fringilla, vel laoreet mauris faucibus. Quisque faucibus ornare tortor quis feugiat. Nullam euismod malesuada finibus. Vivamus pellentesque, quam in rhoncus vehicula, metus lorem condimentum arcu, id molestie nunc mi eget magna. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas.
-
@ be41636e:e55c4909
2025-03-17 13:51:07"And when the rain came down on the cabin floor,\ The squatter only fiddled all the more.\ 'Why don't you mend your roof?' said the traveler bold.\ 'How can I mend my cabin when the rain is wet and cold?'"
This is one version of the lyrics from the folk song The Arkansas Traveler.
I first learned about this song and these lyrics while listening to NVK's Bitcoin.Review podcast, where his guest, futurepaul, shared this timeless piece of folk wisdom.
It may seem like a lighthearted tune, but this part hits me as deeply profound:
Why wait until things get worse to take action?
The economy is crumbling. Governments are printing your money into oblivion. Why wait for the situation to deteriorate further before investing time in learning about Bitcoin?
👉 Before your exchange goes bankrupt, (Not hypothetical—Mt. Gox and FTX already happened), learn how to withdraw your Bitcoin and take custody of it yourself.
👉 Before your government cracks down on easy-access exchanges, learn how to buy Bitcoin peer-to-peer through platforms like Peach Wallet, RoboSats, lnp2pBot (on Telegram), or Bisq.
👉 Before your bank freezes your account, learn how to be your own bank.
👉 Before you need to buy a pound of steak with Bitcoin, because your fiat is worthless or your account is banned for saying the "wrong" thing—start building Bitcoin circular economies.
👉 Before privacy becomes a luxury, learn how to run your own node, and experiment with using it behind Tor.
👉 Before the surveillance state starts tracking every sat you spend, learn how to coinjoin your Bitcoin and preserve your financial privacy.
👉 Before transaction fees rise again And small payments become impractical, learn how to open a Lightning channel and trade via the Lightning Network.
👉 Before legacy social media deplatforms you and drives you even madder with its algorithm-driven doom-scrolling, learn how to use Nostr.
👉 Before you fail to verify your account on TikTok or X, learn how to earn zaps on Nostr and embrace censorship-resistant social tipping.
👉 Before you are in dire need of offline, private transactions, learn how to use e-cash and explore tools for private, peer-to-peer payments.
Learn how to do things before you have to do them, because once the rain starts pouring, it's already too late to fix the roof.
-
@ 8bf65a23:c2d3bd12
2025-03-17 13:34:20This event has been deleted; your client is ignoring the delete request.
-
@ a9c71e74:1285ac99
2025-03-17 10:38:54Carl Gustav Jung
Yalnızlık, insanın çevresinde insan olmaması demek değildir. İnsan kendisinin önemsediği şeyleri başkalarına ulaştıramadığı ya da başkalarının olanaksız bulduğu bazı görüşlere sahip olduğu zaman kendisini yalnız hisseder.
Bir insan başkalarından daha çok şey biliyorsa yalnızlaşır ama bu, o insanın arkadaşlığa düşman olduğu anlamına gelmez; çünkü arkadaşlık konusunda hiç kimse yalnız bir insandan daha duyarlı olamaz ve arkadaşlık ancak, her insan kendi bireyselliğini unutup başkalarıyla özdeşleşmeye kalkmazsa gelişir.
-
@ 6f9a374c:40277631
2025-03-17 10:09:54Summary
Warmup
- [ ] Side Plank
- [ ] Side-Lying Abduction
- [ ] Kneeling Hip Extension
- [ ] Jumping Jacks
Exercises
- [ ] Dumbbell Squat (4 sets)
- [ ] Bodyweight Squat (4 sets)
- [ ] Jump Squat (4 sets)
- [ ] Dumbbell Romanian Deadlift (4 sets)
- [ ] Barbell Glute Bridge (5 sets)
- [ ] Dumbbell Reverse Lunge (4 sets)
Stretching
- [ ] Hip Stretch
- [ ] Extended Arm Child Pose
- [ ] Side-Lying Quadricep Stretch
originally posted at https://stacker.news/items/915415
-
@ f6488c62:c929299d
2025-03-17 10:04:37โลกของเทคโนโลยีบล็อกเชนและคริปโตเคอร์เรนซีมีการเติบโตอย่างรวดเร็วในช่วงไม่กี่ปีที่ผ่านมา จากการเกิดขึ้นของ Bitcoin ในปี 2009 จนถึงการบูมของ NFTs และ Meme Coins ในช่วงที่ผ่านมา, โลกคริปโตยังคงสร้างความตื่นเต้นและเป็นที่สนใจของทั้งนักลงทุนและผู้ใช้งานใหม่ๆ แต่คำถามที่หลายคนยังคงสงสัยคือ: "ในวันข้างหน้าบล็อกเชนและคริปโตจะเป็นเช่นไร?" และ "การพัฒนาในอนาคตนี้จะเป็นจริงหรือไม่?"
ในบทความนี้เราจะลองมองไปยังเทคโนโลยีที่อาจมีบทบาทสำคัญในโลกคริปโตในอนาคต และวิเคราะห์ว่าอะไรที่อาจจะเป็น "ดาวเด่น" ในวงการนี้ และสิ่งที่เราควรคาดหวังจากการพัฒนาในด้านนี้
- Layer 2 Solutions และ Interoperability: การขยายขีดความสามารถของบล็อกเชน หนึ่งในความท้าทายหลักของบล็อกเชนในปัจจุบันคือ ความสามารถในการขยายตัว หรือ Scalability. บล็อกเชนที่มีการใช้งานสูง เช่น Ethereum, มักจะประสบปัญหาความแออัดและค่าธรรมเนียมที่สูงในบางช่วงเวลา แต่เทคโนโลยี Layer 2 solutions อย่าง Polygon และ Optimistic Rollups กำลังเป็นตัวช่วยในการขยายขีดความสามารถของบล็อกเชนที่มีอยู่ โดยไม่ต้องเปลี่ยนแปลงโครงสร้างของบล็อกเชนหลักอย่างสิ้นเชิง.
การพัฒนาเหล่านี้ไม่เพียงแต่จะช่วยให้การทำธุรกรรมมีความเร็วสูงและค่าธรรมเนียมต่ำขึ้น แต่ยังช่วยเพิ่มความสามารถในการทำธุรกรรมในบล็อกเชนต่างๆ ให้เชื่อมโยงกันได้อย่างราบรื่น (Interoperability). หากเทคโนโลยีเหล่านี้สามารถพัฒนาไปได้ตามแผน เราอาจจะได้เห็นการเติบโตของบล็อกเชนที่สามารถรองรับการใช้งานในระดับมวลชนได้อย่างแท้จริง.
- Decentralized Finance (DeFi) 2.0: การเงินกระจายศูนย์ที่ยืดหยุ่น หากพูดถึงการเติบโตในโลกคริปโต, DeFi คือหนึ่งในเทรนด์ที่มาแรงที่สุด. การเงินกระจายศูนย์ (DeFi) ได้มอบโอกาสในการลงทุน การยืมเงิน และการทำธุรกรรมทางการเงินที่ไม่ต้องพึ่งพาสถาบันการเงินแบบดั้งเดิม. DeFi 2.0 กำลังจะพัฒนาให้ระบบมีความยืดหยุ่นและใช้งานได้ง่ายขึ้น โดยมีการเพิ่มฟังก์ชันใหม่ ๆ เช่น การใช้ NFTs, synthetic assets, lending, และ staking ที่สามารถเพิ่มรายได้ให้กับผู้ใช้งาน.
ความสามารถในการสร้างรายได้จากสินทรัพย์ดิจิทัล, การมีอำนาจในการจัดการเงินของตัวเองโดยไม่ต้องพึ่งพาธนาคาร, และการเข้าถึงโปรโตคอลต่างๆ จะช่วยให้ DeFi 2.0 กลายเป็นเครื่องมือที่สำคัญในการปรับปรุงระบบการเงินในอนาคต และอาจดึงดูดทั้งนักลงทุนรายย่อยและรายใหญ่ที่ต้องการสร้างผลตอบแทนจากสินทรัพย์ดิจิทัล.
- NFTs 2.0: การขยายการใช้งานในโลกจริง ในช่วงปีที่ผ่านมา, NFTs กลายเป็นหนึ่งในเทรนด์ที่ฮิตที่สุดในวงการคริปโต. โดยเฉพาะในวงการศิลปะดิจิทัลและการเก็งกำไร, NFTs ทำให้ผู้คนสามารถเป็นเจ้าของและแลกเปลี่ยนสินทรัพย์ดิจิทัลได้. แต่ในอนาคต, NFTs จะไม่ได้จำกัดแค่การสร้างรายได้จากการเก็งกำไรหรือศิลปะเพียงอย่างเดียว.
การขยายตัวของ NFTs 2.0 จะทำให้ NFTs มีการใช้งานในด้านอื่น ๆ เช่น เกม (GameFi), อสังหาริมทรัพย์, และ การศึกษา. ตัวอย่างเช่น, การใช้ NFT ใน Metaverse หรือการซื้อขายอสังหาริมทรัพย์ผ่านทาง NFT เป็นไปได้ที่จะทำให้ NFTs กลายเป็นสินทรัพย์ที่สามารถใช้ในการทำธุรกรรมในโลกจริงได้มากขึ้น. ถ้าการพัฒนาในด้านนี้สามารถทำได้จริง, NFTs อาจกลายเป็นส่วนหนึ่งของชีวิตประจำวันของเรามากขึ้น.
- Zero-Knowledge Proofs (ZKPs) และ Privacy Coins: ความปลอดภัยและความเป็นส่วนตัว การพัฒนา Zero-Knowledge Proofs (ZKPs) จะช่วยให้ผู้ใช้สามารถพิสูจน์ข้อมูลบางอย่างได้โดยไม่ต้องเปิดเผยข้อมูลนั้นๆ. เทคโนโลยีนี้จะมีบทบาทสำคัญในการรักษาความปลอดภัยและความเป็นส่วนตัวในการทำธุรกรรม. โดยเฉพาะในโลกที่ผู้คนเริ่มตระหนักถึงความสำคัญของข้อมูลส่วนตัว.
Privacy Coins อย่าง Monero และ ZCash ที่เน้นเรื่องความเป็นส่วนตัวของผู้ใช้งานกำลังได้รับความนิยมมากขึ้นในกลุ่มที่ต้องการความปลอดภัยในการทำธุรกรรม. หากเทคโนโลยีเหล่านี้สามารถพัฒนาได้ในอนาคต, บล็อกเชนจะสามารถให้ความเป็นส่วนตัวสูงสุดแก่ผู้ใช้งานและยังคงรักษาความปลอดภัยของข้อมูลที่ถูกต้อง.
- DAOs: การจัดการองค์กรแบบกระจายอำนาจ DAOs (Decentralized Autonomous Organizations) คือองค์กรที่มีการดำเนินการผ่านระบบบล็อกเชนโดยไม่ต้องพึ่งพาผู้จัดการหรือบุคคลส่วนกลาง. ระบบนี้จะช่วยให้การตัดสินใจเป็นไปตามความเห็นของชุมชนและการโหวตจากสมาชิก. ในอนาคต, DAOs อาจกลายเป็นทางเลือกที่สำคัญในการจัดการองค์กรและธุรกิจต่างๆ.
การที่ DAOs สามารถดำเนินการโดยไม่พึ่งพาผู้บริหารหรือผู้จัดการกลางจะช่วยให้เกิดการกระจายอำนาจที่มีความยุติธรรมและโปร่งใสมากขึ้น. นอกจากนี้, DAOs ยังสามารถสร้างแรงจูงใจให้ผู้ใช้งานมีส่วนร่วมในการตัดสินใจอย่างมีส่วนร่วม.
สรุป: จะเป็นจริงหรือไม่? ทุกเทคโนโลยีที่กล่าวถึงในข้างต้นมีโอกาสที่จะเติบโตและมีบทบาทสำคัญในโลกคริปโตในอนาคต แต่ก็ยังคงมีความท้าทายที่ต้องผ่าน เช่น การยอมรับจากผู้ใช้งาน, การพัฒนาเทคโนโลยี, และการรับมือกับปัญหาทางด้านความเสี่ยงและความปลอดภัย. อย่างไรก็ตาม, หากการพัฒนาเหล่านี้สามารถดำเนินการไปตามแผน, โลกคริปโตในอนาคตอาจจะไม่ใช่แค่การเก็งกำไรจากเหรียญหรือ NFT เท่านั้น, แต่ยังเป็นส่วนหนึ่งของชีวิตประจำวันที่มีการใช้งานจริงในด้านต่างๆ ของเศรษฐกิจดิจิทัล.
ในท้ายที่สุด, สิ่งที่จะทำให้เทคโนโลยีคริปโตเหล่านี้เป็นจริงได้คือการยอมรับจากสังคมและความเชื่อมั่นจากผู้ใช้งาน ซึ่งถ้ามีการพัฒนาอย่างต่อเนื่องและมั่นคง เราอาจจะได้เห็นการเปลี่ยนแปลงในโลกการเงินและเศรษฐกิจในอีกไม่ช้า.
-
@ 7b93f9c8:3408c269
2025-03-17 09:34:42Emily Dickinson’s "Because I Could Not Stop for Death" is a profound poem that explores the theme of mortality and the inevitable passage of time. Through her use of figurative language, Dickinson captures the complexities of human existence and our relationship with death. In this article, we will analyze how Dickinson employs personification, metaphor, and symbolism to deepen the meaning of the poem and help readers grasp its emotional and intellectual layers.
Personification: Giving Life to Abstract Concepts In the poem, Dickinson personifies Death, an abstract concept, making it into a character with whom the speaker interacts. The opening lines—"Because I could not stop for Death – / He kindly stopped for me"—introduce Death as a courteous figure, a being who is not hostile or frightening but instead a companion who takes the speaker on a journey. This personification serves to soften the terrifying idea of death, making it seem almost gentle and inevitable, instead of something to fear.
By giving human-like qualities to Death, Dickinson creates a more approachable and relatable portrayal of the end of life, inviting readers to reflect on the naturalness of death and its role in the cycle of life.
Metaphor: The Journey of Life and Death The entire poem can be interpreted as an extended metaphor, where the journey the speaker takes with Death symbolizes the passage of life and the inevitability of dying. The carriage ride, described as a slow, deliberate journey, represents the final stages of life, and each stop along the way—such as the School, the Grain Fields, and the Setting Sun—symbolizes different phases of existence, from youth to maturity and ultimately to death. To read further about the use of personification, metaphor, and symbolism in Dickinson’s work, explore how figurative language plays an integral role in enhancing the poem’s impact and resonance in this article: https://www.customwritings.com/howtowrite/post/personification-metaphor-and-symbolism-in-because-i-could-not-stop-for-death/ Because I Could Not Stop for Death Figurative Language.
The metaphor of the journey suggests that death is not a sudden or violent event, but a gradual process that one must accept. The speaker is passive, allowing Death to take the reins, just as people must accept their fate when their time comes. This metaphor emphasizes the inevitability of death and the need to come to terms with it.
Symbolism: The Carriage Ride and the Setting Sun Dickinson uses several symbols to reinforce the central themes of the poem. One of the most powerful symbols is the carriage ride itself, which represents the journey from life to death. The carriage, often associated with funerals, becomes a vehicle for the passage from the living world to the afterlife.
Similarly, the setting sun serves as a symbol of the end of the day, a natural marker of time's passage. In the poem, the sun represents the end of life, as it sets on the speaker’s journey. The imagery of the sun fading symbolizes the gradual fading of life, where time is slipping away, and the ultimate end is inevitable.
Because I Could Not Stop for Death Figurative Language The figurative language Dickinson employs in this poem is a crucial element in conveying the deeper meanings about life, death, and time. Through personification, metaphor, and symbolism, she transforms the abstract concept of death into something more tangible and emotionally resonant. By framing death as a journey and giving it human characteristics, Dickinson invites readers to reflect on their own mortality in a way that is both thoughtful and meditative.
In "Because I Could Not Stop for Death," figurative language does more than embellish the poem—it shapes its very essence. The poem’s figurative language allows readers to explore death in a way that is simultaneously poetic and profoundly philosophical, inviting them to consider their own perceptions of life’s transience.
-
@ da0b9bc3:4e30a4a9
2025-03-17 07:54:11Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/915374
-
@ 6b0a60cf:b952e7d4
2025-03-17 11:03:41ものさんに説明する用
CreateEntry.svelte で
previewEvent = $bindable()
として受け取っているのがプレビュー用のイベント。
ここでごちゃごちゃ変更して呼び出し元に変更を反映させる。
呼び出し元は Page.svelte と Entry.svelte の2つ。
前者が投稿欄、後者が返信欄のプレビューをそれぞれこんな感じでリアクティブで定義している。let previewEvent: UnsignedEvent | undefined = $state();
CreateEntry.svelte では受け取った previewEvent を $derived.by() や $effect() を使って他の変数に依存して勝手に変わるようにしている。
特に contentToSend に依存して変わるので、入力の度に勝手に変わる。
contentToSend は textarea で bind:value しているので onChange とか onKeyPress とかはまったく使わない。勝手に変わってくれる。 ```makeEvent() っていうのが入力された色々を突っ込むとプレビュー用の UnsignedEvent を返してくれるやつ。 1文字入力されてcontentToSendが変わる度にこれが処理される。うわー。 このイベントには付与すべきpタグも含まれている。 これをpubkeysMentioningToとして定義する。
const pubkeysMentioningTo = $derived( previewEvent?.tags.filter((tag) => tag.length >= 2 && tag[0] === 'p').map((tag) => tag[1]) ?? [] );あとは除外したいpタグリストpubkeysExcludedを定義して、
let pubkeysExcluded: string[] = $state([]); ``` pubkeysMentioningToの中からユーザーに選んでもらう。
実際に送信するイベントはpubkeysExcludedも考慮して署名する。
送信する際もmakeEvent()を呼んでるけど、こっちは引数にpubkeysExcludedが入ってる。プレビューの方には入ってない。 -
@ 0b5faac9:12669905
2025-03-17 07:25:11Signal jammers play an important role in maintaining security and protecting privacy. Whether it is a WiFi jammer, a drone jammer or a high-power jammer, if you want them to work stably and persistently, they cannot be separated from daily maintenance and care.
1. Daily maintenance
Dust and moisture: Dust and moisture are the natural enemies of electronic products, and signal jammers are no exception. It is recommended to place the jammer in a dry and ventilated environment, avoiding direct sunlight and humid environments. You can use a dust cover or storage box for protection, and regularly use a dry soft cloth to clean the surface dust.
Avoid collision: The signal jammer contains delicate electronic components. Strong collisions may cause the components to loosen or be damaged, affecting normal operation. Be careful to handle with care when using and storing to avoid falling or collision.
Regular inspection: It is recommended to regularly check whether the power cord, antenna and other connecting parts of the jammer are loose or damaged, and replace or repair them in time if problems are found.
2. Maintenance focus of different jammers
Pay attention to heat dissipation: WiFi jammers will generate a certain amount of heat when working. Make sure there is enough heat dissipation space around them to avoid long-term high-temperature operation.
Avoid interference: The WiFi jammer itself will also be interfered by other wireless signals. It is recommended to place it away from wireless devices such as routers and mobile phones.
Antenna maintenance: The antenna of the drone jammer is its core component. Avoid bending and squeezing. Check regularly whether the antenna connection is firm.
Battery maintenance: Some drone jammers are powered by batteries. Pay attention to the battery charge and discharge cycle to avoid over-discharge. When not in use for a long time, the battery should be removed and stored separately.
Professional maintenance: High-power jammers have a complex structure. It is recommended to contact professionals for maintenance and maintenance regularly to avoid self-disassembly.
Safe use: High-power jammers have high power. Pay attention to safety when using them to avoid damage to other equipment.
3. Tips for extending service life
Strictly follow the instructions to avoid overload.
When not in use for a long time, it is recommended to turn off the power of the jammer and keep it properly.
Choose high-quality products produced by regular manufacturers, and the quality and after-sales service are more guaranteed.
Signal jammers are sophisticated electronic devices. Proper maintenance and care can effectively extend their service life and ensure their stable and reliable operation. I hope the above tips can help you better use and maintain your signal jammer!
-
@ 00c8aa0b:0a58ea8f
2025-03-17 06:25:41A Luck88 surge como uma das plataformas mais inovadoras e completas para quem busca uma experiência de jogo única e envolvente. Com uma vasta gama de opções e recursos dedicados ao público brasileiro, ela se posiciona como uma das favoritas para os amantes de jogos de sorte e estratégia. Neste artigo, vamos explorar em detalhes a plataforma Luck88, os jogos que ela oferece e a experiência do jogador, destacando os pontos que fazem dela uma escolha ideal para os entusiastas dessa forma de entretenimento.
Introdução à Luck88: Uma Plataforma de Entretenimento Completa A Luck88 se apresenta como uma plataforma de entretenimento diversificada, voltada para os jogadores que desejam explorar uma experiência única e acessível. Com uma interface moderna e intuitiva, ela foi desenvolvida para garantir uma navegação fluida e prática, permitindo que os usuários possam acessar rapidamente as opções de jogos de sua preferência. Desde sua criação, a plataforma tem investido constantemente em melhorias tecnológicas e na ampliação de seu portfólio de jogos, com o objetivo de proporcionar uma experiência de alto nível.
A plataforma é acessível em dispositivos móveis e desktops, o que oferece conveniência e flexibilidade para os jogadores que preferem jogar em qualquer lugar e a qualquer hora. Além disso, a Luck88 oferece uma série de opções de pagamento seguras e eficientes, garantindo que os jogadores possam realizar depósitos e retiradas com total tranquilidade.
Com foco na segurança e no atendimento ao cliente, a Luck88 implementa sistemas avançados de criptografia e suporte ao usuário em tempo integral, assegurando que os jogadores possam desfrutar de sua experiência sem preocupações.
Jogos da Luck88: Uma Variedade para Todos os Gostos Uma das grandes atrações da Luck88 é sua vasta seleção de jogos, que abrange uma gama impressionante de opções para jogadores iniciantes e experientes. Entre os jogos mais populares da plataforma estão os clássicos como as máquinas de frutas, roletas e opções baseadas em cartas. Para os fãs de uma boa dose de adrenalina, a Luck88 oferece opções interativas e inovadoras, com gráficos de alta qualidade e mecânicas envolventes.
Os jogos da Luck88 são desenvolvidos por fornecedores renomados, o que garante que a qualidade seja um fator constante. A plataforma tem parcerias com grandes desenvolvedores da indústria, proporcionando aos seus jogadores experiências de jogo imersivas e visualmente impressionantes. Com animações modernas e sons realistas, os jogos conseguem capturar a essência da diversão e do entretenimento.
Além disso, os jogadores podem desfrutar de diferentes modalidades e apostas, desde as mais simples até as mais desafiadoras, dependendo do seu nível de habilidade e preferência. Se você é fã de um jogo mais tradicional ou busca algo mais dinâmico e com mais interação, a Luck88 tem uma opção para você.
A plataforma também se destaca por sua constante atualização, sempre trazendo novos lançamentos para que os jogadores tenham uma experiência sempre renovada e empolgante. Com isso, a Luck88 garante que seus usuários nunca fiquem entediados, sempre com novas opções para testar e se divertir.
Experiência do Jogador: Inovação e Qualidade A experiência do jogador na Luck88 é cuidadosamente planejada para garantir não apenas diversão, mas também conforto e segurança. A plataforma possui uma interface amigável e fácil de navegar, o que permite que os jogadores acessem suas opções de jogos favoritas de maneira rápida e intuitiva.
Além disso, a Luck88 se destaca por sua excelente performance em dispositivos móveis. A versão para smartphones e tablets oferece a mesma qualidade gráfica e fluidez da versão para desktop, permitindo que os jogadores tenham uma experiência de jogo consistente, independentemente do dispositivo utilizado.
Outro ponto positivo é o atendimento ao cliente da Luck88. Disponível 24 horas por dia, sete dias por semana, a equipe de suporte está sempre pronta para ajudar com qualquer dúvida ou questão que os jogadores possam ter. Seja por meio de chat ao vivo, e-mail ou telefone, os jogadores podem contar com um serviço eficiente e amigável.
A Luck88 também oferece diversas promoções e bônus, o que torna a experiência ainda mais atrativa. Novos jogadores podem aproveitar ofertas de boas-vindas, enquanto os jogadores mais antigos têm acesso a programas de fidelidade e outras recompensas exclusivas. Essas vantagens não apenas tornam a experiência mais divertida, mas também aumentam as chances de sucesso dos jogadores ao longo do tempo.
Conclusão: Por Que Escolher a Luck88? A Luck88 se destaca como uma plataforma de entretenimento completa, oferecendo uma vasta gama de jogos, uma experiência de usuário intuitiva e um excelente atendimento ao cliente. Seu compromisso com a qualidade e inovação faz dela uma excelente escolha para quem busca se divertir, explorar novas opções de jogo e aproveitar o melhor do entretenimento online.
Seja você um jogador iniciante ou experiente, a Luck88 oferece tudo o que você precisa para uma experiência imersiva e gratificante. Com uma plataforma segura, moderna e acessível, não há dúvida de que a Luck88 continuará a ser uma das preferidas pelos brasileiros.
-
@ 93eeb56c:9469e39a
2025-03-17 10:56:03Simiho sleduju zhruba od chvíle, kdy se objevil na featu u Viktora Sheena (track Zvyk) a měl jsem za to, že je to kočka s docela sexy hlasem, načež jsem si podle jména vyhledal rozhovor u Ládi Sinaie a s překvapením hleděl, že ve studiu sedí sympatický mladý týpek.
Začal jsem poslouchat jeho tracky a i když z většiny jsem nějak zásadně unešený nebyl, těch pár, které mě oslovily, zandaly na výbornou—namátkou třeba naprosto skvělá club popová Výnimka.
Hlas
Unikátní vysoko posazený hlas v kombinaci s ležérní flow (ale pozor—ne mumble) nemusí sednout každému, přesto nebo právě proto se jedná o Simiho nejdůležitější zbraň.
Muzikálnost
Na Simim je znát, že hudbu skutečně cítí. Nezamyká se do jednoho žánru (viz zmíněná Výnimka) a jeho linky mají promyšlené a logicky plynoucí melodie.
Vsuvka—melodické rapování
Tohoto jsem si všiml u těch popovějších jmen hip hopové scény, že sice používají rapové postupy a způsob, jakým s texty zacházejí, ale dost často vlastně jakoby rapují na konkrétních tónech a často plynule přecházejí do regulérně zpívaných pasáží. Proto mají mnozí oldschoolers problém s tím, že "to už ani není rap".
Vkus a nadhled
Bere sám sebe vážně (což je dobře a k žánru to samozřejmě patří, je jen pár výjimek, kterým se daří mít kredit a přitom si ze sebe dělat prdel, např. MC Gey). Zároveň má ale velký nadhled nejen v textech, ale hlavně v hudbě.\ Čímž se dostávám k tomu hlavnímu.
MÁM P*CI
“MÁM P*CI” by se dalo bez problému odmávnout jako nevkusné a arogantní, jako “toto je přesně to, co je špatně s těma mladýma.” Rozeberu, proč to vidím přesně obráceně.
Pouštím věc. Hned zkraje mě nadchne docela retro zvuk. Značně zaprášené synthy, měkoučký basový kopák, nebo kopáková basa, if you will, je lahůdková, instantní radost. Roll na virblu potvrzuje, že toto je záměrně a pečlivě nastavený sound.
SIMILIVINLIFE odříkává svůj text, a první co mě napadá je, že tady vedle sebe existuje oslava hadrů a zároveň tak trochu parodie na celou tu kulturu kolem nich. Tuto "dvojjedinost" neuděláte pouze textem—musí to mít i správný přednes, aby se feel neklonil k jednou víc, než k druhému.\ Nechybí tomu tedy potřebný nadhled, vtip, flow je skvělá, žádný řádek tam není navíc a ve výsledku mě sere, že je Simiho v tak dobrém tracku vlastně docela málo.
Refrén je pak naprosto dokonalou ukázkou Simiho talentu, kdy na šesti slovech předvádí geniální minimalistickou muzikálnost—způsob, jakým se vyvíjí melodie jeho hlasu. Nic do uší bijícího, ale vnímavý posluchač, který má ideálně ještě muzikantský a skladatelský background, to ocení.
Featující Luca Brassi10x je správně zábavně nekorektní a i on inhaloval a zpátky vypustil uvolněnou atmosféru, kterou tenhle vál má. Jeho přítomnost mi tady evokuje takové ty obhroublejší Rytmusy, Ektory, nebo Čistychovy.
Jenom samotný chytlavý refrén je dostatečný důvod, aby se mezi děckama tenhle track stal hitem. Jsem si ale skoro jistý, že 95 % bude zcela unikat rozměr toho, co se tady Simimu podařilo: vrstevnatý juicy banger, který se dost možná stane kultovní klasikou pocházející z roku 2025—doby, kdy hip hop v československu konečně zažívá tolik potřebný a dlouho vyhlížený rozkvět do šířky (hlavně díky slovákům SIMI, Saul, Samey apod).\ \ Úplně nejlepší na tom všem je, že SIMILIVINLIFE pravděpodobně dělá hudbu, aniž by nad tím nějak složitě přemýšlel, a prostě to z něj takhle přirozeně leze.
Spíš než v autorádiu si tenhle song představte o půl druhé ráno v nějakém klubovém DJ setu. Enjoy.
-
@ 00c8aa0b:0a58ea8f
2025-03-17 06:20:28A 54bet é uma plataforma inovadora que tem ganhado destaque no mundo do entretenimento online. Focada em proporcionar uma experiência única e diversificada, a 54bet é uma excelente escolha para jogadores que buscam uma forma envolvente de diversão e emoção diretamente de seus dispositivos móveis ou desktops. Com uma vasta gama de opções, desde jogos clássicos até novas e empolgantes modalidades, a 54bet está se tornando rapidamente uma das opções preferidas por jogadores brasileiros.
Introdução à Plataforma 54bet A 54bet chega com a proposta de ser mais que uma simples plataforma de entretenimento digital. Ela foi criada para oferecer aos usuários uma experiência moderna e personalizada, com uma interface intuitiva e fácil de navegar. Seja você um novato ou um jogador experiente, a plataforma tem algo a oferecer, com uma grande variedade de recursos que tornam o acesso ao mundo dos jogos online ainda mais atraente.
A plataforma 54bet é acessível em diferentes dispositivos, permitindo que os jogadores possam aproveitar as opções de entretenimento onde e quando quiserem. A experiência é fluida e responsiva, seja em smartphones, tablets ou computadores, garantindo que a diversão não tenha limites. Além disso, ela se destaca pelo suporte ao cliente 24 horas, proporcionando tranquilidade aos usuários durante toda a sua jornada de jogo.
Com uma plataforma moderna, segura e altamente eficiente, a 54bet tem se mostrado uma excelente opção para aqueles que procuram algo mais do que uma simples forma de diversão online. A interface é clara e simplificada, permitindo que os jogadores encontrem seus jogos favoritos com facilidade e sem perder tempo. Mais do que isso, a 54bet investe em tecnologia de ponta para garantir a melhor performance, sem interrupções ou problemas técnicos.
Variedade de Jogos: Diversão Garantida para Todos os Gostos A 54bet não é apenas uma plataforma de entretenimento online, mas um verdadeiro paraíso para os amantes de jogos. Com uma vasta biblioteca que inclui títulos variados, a plataforma consegue agradar a todos os gostos. Se você é fã de jogos de mesa, caça-níqueis ou até mesmo jogos de habilidade, a 54bet tem uma gama ampla de opções que podem ser exploradas de acordo com as preferências de cada jogador.
Entre os jogos oferecidos, destacam-se as opções mais tradicionais, como os jogos de mesa, que incluem modalidades populares como roletas, poker e blackjack, além de diversas versões inovadoras desses jogos. Esses jogos são ideais para quem procura uma experiência mais estratégica e que exige raciocínio, mas também são perfeitos para momentos de diversão sem pressão.
Se você é do tipo que prefere as máquinas emocionantes, a 54bet também oferece uma seleção impressionante de caça-níqueis. De temas clássicos a novas versões cheias de recursos bônus e gráficos de última geração, esses jogos oferecem uma experiência envolvente, cheia de surpresas e grandes prêmios.
Outro grande atrativo da plataforma é o portfólio de jogos de habilidade, que permitem aos jogadores testar suas competências em competições mais desafiadoras. Esses jogos exigem mais do que sorte, já que as decisões dos jogadores podem ter um impacto direto no resultado final.
A 54bet constantemente atualiza seu catálogo de jogos, oferecendo novos lançamentos e conteúdos exclusivos, garantindo sempre algo novo para explorar e uma experiência de jogo diversificada.
A Experiência do Jogador: Uma Jornada Personalizada e Imersiva O objetivo da 54bet é proporcionar uma experiência de jogo personalizada e imersiva, que se encaixe perfeitamente nas necessidades de cada jogador. A plataforma foi projetada para ser simples e intuitiva, com navegação fácil e rápida entre as diversas categorias de jogos. Independentemente de sua escolha, a 54bet oferece uma experiência única que combina entretenimento com conveniência.
Além disso, a 54bet se preocupa com a segurança de seus jogadores. Ela utiliza tecnologia de criptografia de ponta, garantindo que as transações e informações pessoais dos jogadores sejam protegidas em todos os momentos. A segurança online é uma prioridade, e a plataforma segue rigorosos padrões de conformidade para proporcionar um ambiente confiável e seguro para os seus usuários.
Outro ponto que faz a diferença na experiência do jogador é a possibilidade de personalização. A 54bet oferece um sistema de recompensas e promoções que recompensa os jogadores conforme o seu envolvimento com a plataforma. Isso inclui bônus exclusivos, programas de fidelidade e torneios emocionantes, criando uma sensação de comunidade e competitividade saudável entre os jogadores.
O atendimento ao cliente também se destaca na 54bet. Com uma equipe altamente qualificada, disponível 24 horas por dia, os jogadores podem contar com um suporte eficiente sempre que precisarem. Se você tiver alguma dúvida ou problema, a equipe de suporte está pronta para fornecer a assistência necessária de maneira rápida e eficaz.
Conclusão A 54bet é mais do que uma plataforma de entretenimento online; é um ambiente repleto de oportunidades, onde os jogadores podem encontrar diversão, desafios e recompensas. Com uma oferta diversificada de jogos, interface intuitiva e foco na experiência do usuário, a 54bet se coloca como uma das melhores opções para quem busca qualidade e inovação no mundo dos jogos online. Seja para se divertir casualmente ou para explorar desafios mais complexos, a 54bet é o lugar ideal para quem deseja viver momentos de entretenimento e emoção sem sair de casa.
-
@ 95cb4330:96db706c
2025-03-17 05:12:23Overview: Market Rebound Amid Ongoing Volatility
On Friday, March 14, 2025, U.S. stock markets experienced a significant rebound, marking their best performance since November 6, 2024. The S&P 500 rose by 2.1%, the Dow Jones Industrial Average increased by 1.7%, and the Nasdaq Composite climbed 2.6%. Despite these gains, all three indices concluded their fourth consecutive losing week, reflecting ongoing market volatility.
Real-Time Market Performance & Futures Movement
As of Monday, March 17, 2025, U.S. equity futures indicate a potential lower opening:
- Dow Jones Industrial Average Futures: Down approximately 0.3%.
- S&P 500 Futures: Declined around 0.4%.
- Nasdaq Composite Futures: Fell by about 0.5%.
This downturn in futures trading suggests that investors remain cautious amid ongoing economic and geopolitical uncertainties.
Key Market Drivers: Factors Influencing Movements
1. Economic Indicators and Consumer Sentiment
The University of Michigan's Index of Consumer Sentiment reported a 27% decline from a year ago, reaching its lowest level since late 2022. This decline reflects growing concerns about inflation and potential economic slowdown, influencing investor confidence.
2. Geopolitical Tensions and Trade Policies
President Donald Trump's recent tariff announcements have heightened trade tensions, particularly with the European Union and China. These policies have contributed to market volatility and raised concerns about global economic growth.
3. Federal Reserve's Monetary Policy
Investors are closely monitoring the Federal Reserve's upcoming meeting for insights into potential interest rate adjustments. Treasury Secretary Scott Bessent characterized recent market corrections as "healthy," suggesting that the Fed may maintain its current policy stance.
4. Corporate Earnings Reports
Several companies are scheduled to report earnings today, including: - Qifu Technology, Inc (QFIN) - Science Applications International Corporation (SAIC) - Shanda Interactive Entertainment Limited (SNDA)
These reports could provide insights into sector-specific performance and influence market sentiment.
Global Market Influence: International Developments
Asian Markets
Asian equities advanced, buoyed by China's announcement of measures to boost domestic consumption. The Nikkei and Hang Seng indices posted significant gains, reflecting investor optimism about China's economic stimulus efforts.
European Markets
European futures rose slightly, supported by Germany's fiscal initiatives aimed at stimulating economic growth. The euro hovered near a five-month high, reflecting positive sentiment in the region.
Commodity Markets: Oil and Gold
- Oil Prices:
Both Brent and West Texas Intermediate (WTI) crude oil prices increased by over 1%, reaching $71.33 and $67.94 per barrel, respectively. This rise is attributed to geopolitical tensions and optimism over China's consumption stimulus. - Gold:
Prices remained near record highs, continuing their rally amidst market uncertainty.
Market Outlook: Navigating Uncertainty
While Friday's rally provided a respite from recent declines, the market remains susceptible to various risks, including trade tensions, monetary policy decisions, and consumer sentiment shifts. Investors are advised to exercise caution and remain attentive to upcoming economic data releases and geopolitical developments.
-
@ 044da344:073a8a0e
2025-03-17 10:11:58„Schau mich an“, sagt Richard und lacht. „Farbe. Das ganze Jahr.“ Richard ist Ende 60, nicht schlank, aber auch nicht dick. Er trägt Shorts und ärmellos. Auf dem Weg zu seinem Pick-Up zieht er den linken Fuß leicht nach. „Ihr habt Glück“, sagt er. „Vorige Woche war es hier noch eiskalt. Selbst tagsüber nur acht Grad. Im Januar und im Februar haben wir geheizt. Das hatten wir noch nie. Im November waren wir noch schwimmen.“
Richard ist seit fast 20 Jahren auf Nordzypern. Erst nur im Urlaub und vielleicht auch geschäftlich. Ganz klar wird das nicht. „Solange du arbeiten musst, hängst du zu Hause fest.“ Richard hat in London gewohnt, nicht weit weg vom Flughafen in Heathrow. Neun Stunden von Tür zu Tür. Neun Stunden von England bis nach Nordzypern, über Larnaka im Süden der Insel und dann noch eine Stunde mit dem Auto, die Grenzkontrolle mitgerechnet. Der Norden hat zwar einen Airport in Ercan, dafür braucht es aber einen Zwischenstopp in der Türkei. So will es die EU, so will es die Welt. Das Auswärtige Amt in Berlin spricht von der „sogenannten Türkischen Republik Nordzypern“. Richard sagt: Das ist lästig. Sein Visum gilt immer nur für 90 Tage. Oder er stellt daheim einen Antrag für länger. „Für mich wäre es besser, wenn ganz Zypern in der EU wäre.“
In Brüssel sieht man das so. Die Insel gehört zu uns, Punkt. Von dort sieht man das türkische Kriegsschiff nicht, das direkt vor uns im Hafen von Famagusta liegt. Von dort sieht man auch Varosha nicht, eine Geisterstadt vor den Toren Famagustas. Der perfekte Drehort für die nächste Staffel von „The Walking Dead“, wenn die Häuser nicht jeden Augenblick einstürzen könnten. Varosha: Das war in den 1960ern der feuchte Traum jedes Tourismusmanagers. Sandstrand, soweit das Auge blicken kann. Hotels, Theater, Kinos. 6500 Betten. Ein Laden am anderen. Jeder zweite Zypernurlauber war damals in Varosha. Im August 1974 kamen Soldaten aus der Türkei. Es ging hin und her auf der großen Bühne. Wer entschädigt die Griechen, die vertrieben wurden, wer darf hier wohnen, wem gehört die Stadt? Varosha hat das nicht verkraftet. Die Fenster kaputt, der Putz längst weg. Und die Natur fängt an, die Gebäude zu verdrängen. Die Türkei hat immer wieder versucht, den UN-Sicherheitsrat umzustimmen, zuletzt 2021. Lasst uns Menschen nach Varosha bringen. Vergeblich. Inzwischen sind drei Straßen für Besucher geöffnet. Es gibt einen Verleih für Fahrräder und Roller und neuerdings sogar wieder zwei Strände mit allem Drum und Dran. Es bleibt – gespenstisch. Schwimmen vor Ruinen. Und wer weiß. Im Moment ist das alles noch klein. Zwei, drei Kioske, bargeldlos. Ein paar Liegen, saubere Toiletten. Die Großmächte haben gerade andere Sorgen.
Die Spritztour mit Richard beginnt in einem Gemüsemarkt. Genauer: in einer Lagerhalle, die auch in Varosha stehen könnte. Am Boden Kisten mit Blumenkohl, Mandarinen, Kartoffeln. Man kann die Erde noch riechen. „Das schmeckt alles wie früher“, sagt Angela, Richards Partnerin, wie er aus England. Kennengelernt haben sich die beiden hier auf der Insel. Früher hat Angela Urlauber betreut. Heute vermietet und putzt sie Ferienwohnungen. „Wenn ich in so eine Birne beiße“, sagt sie, „dann erinnere ich mich an meine Kindheit.“
Wir fahren die Küste ab von Tatlisu nach Girne. Die Griechen sagen: Kyrenia. Ein historischer Ort, besiedelt seit Tausenden von Jahren und mit einem Hafen, der kaum kitschiger sein könnte. Die Gegenwart heißt Baustelle. Überall Bagger, überall Menschen mit Helmen und Westen in Orange. Palästina, Bangladesch. Überhaupt: Ostasien. Richard liebt es, die Hauptstraße zu verlassen und mit dem Pick-Up über die alten Küstenwege zu rollen. Er kennt die Stories hinter all den neuen Siedlungen, die wie Pilze aus dem Boden schießen und oft noch wie Skelette aussehen, betongrau und nicht weiß und manchmal ganz offensichtlich auch aufgegeben, bevor jemand einziehen konnte. „Sie verkaufen dir immer: erste Reihe und Meerblick. Du siehst zwar, dass es noch ein Stück ist bis zum Wasser, aber sie sagen: Da wird nie und nimmer gebaut. Das gehört der Regierung. Und ein Jahr später hast du plötzlich doch jemanden vor deiner Nase.“
Der Boom ist in Etappen gekommen. Seit dem EU-Beitritt der Republik Zypern 2004 ist die „grüne Linie“ durchlässig. Das heißt: Man ist nicht mehr gefangen im Norden der Insel und gezwungen, über die Türkei zu gehen, wenn man ausreisen will. Die taz sprach damals schnell von einer „kalten Enteignung“. Im Artikel von Klaus Hillenbrand, erschienen 2005, klingt das fast so wie heute aus dem Mund von Richard: „Die Immobilienhändler rund um Kyrenia erzählen ihren Kunden alles, was diese hören möchten.“ Die Griechen könnten zurückkommen? Kein Problem. Ein paar tausend Euro Entschädigung, wenn überhaupt. Man muss nicht das Ende der DDR erlebt haben, um da ein Fragezeichen zu setzen.
Auf Zypern sind die Wunden der Teilung nicht verheilt, auch nach einem halben Jahrhundert nicht und obwohl die Bauleute inzwischen überall Tatsachen schaffen, ohne sich noch groß um die Vergangenheit zu scheren. 162.000 Zyperngriechen, sagt Wikipedia, haben den Norden verlassen, als die türkische Armee im Sommer 1974 einrückte, manche freiwillig, die meisten aber nicht. Die gleiche Quelle sagt, dass anschließend 48.000 Zyperntürken ihre Heimat im Süden aufgeben mussten. Den Groll haben wir schon am Flughafen in Larnaka gespürt, selbst bei dem Forscher, der nur ein paar Sachen zu unserer Reise wissen wollte und enttäuscht aufgab, als wir bei jedem Ort den Kopf schüttelten. Den Norden hatte er nicht auf seinem Zettel.
Rami, ein Taxifahrer, Zyperntürke, will trotzdem sofort in den Süden ziehen, wenn er endlich EU-Bürger ist. „Dort lebt es sich einfach besser. Ruhiger.“ Und die Preise? „So groß ist der Unterschied gar nicht mehr. Obst und Gemüse, okay. Es stimmt schon, dass die Griechen zum Einkaufen rüberkommen. Sie wandern dann umher und schauen nach ihren Häusern.“ Rami sagt, dass der Norden sich gerade verändert, und meint damit gar nicht Einwanderer wie Angela und Richard, die vielen Russen in Iskele oder Zyperngriechen, die gern wieder da wohnen würden, wo einst ihre Eltern oder Großeltern gelebt haben, sondern Türken, die vom Festland kommen und eine andere Mentalität mitbringen. Der Bauboom produziert auch Wohntürme für Menschen aus Anatolien. Vielleicht gibt es irgendwann wieder eine Abstimmung wie 2004, als der Norden für eine Wiedervereinigung war, der Süden aber nicht. Vielleicht gewinnt dann der, der mehr Menschen an die Urnen bringt. Rami sagt, dass er Zyperntürken kennt, die jetzt fortgehen. Sie wollen nicht mehr warten. Und sie haben keine Lust auf das, was gerade passiert.
Richard zuckt mit den Schultern. Was soll schon sein? Er hat auf der Insel alles ausprobiert. Hotels und Apartments, mal kürzer, mal länger. Vor ein paar Jahren hat er eine Wohnung mit Garten gekauft, in einer Anlage direkt am Meer. Der Blick auf den Sonnenuntergang kann von niemandem verstellt werden. 90 Quadratmeter für etwas mehr als 100.000 Pfund. Man hört, wenn der Nachbar spült, das schon, aber was willst du, Michael? Du weißt doch, was man dafür in London bezahlt oder in München. Wir fahren an dem Supermarkt vorbei, der gerade eröffnet wurde, 15 Autominuten entfernt, gut sortiert und vor allem: leer. „Hier musst du nicht um einen Parkplatz kämpfen oder sogar dafür bezahlen wie neuerdings bei uns in England. Hier fährt dir auch keiner mit seinem Einkaufswagen in die Hacken.“ Und wenn all die Neubauten verkauft oder vermietet sind? „Dann wird die Straße besser und der Rest der Infrastruktur auch.“
Heike ist aus Halle an der Saale nach Nordzypern gekommen, mit einem Umweg über die Schweiz, wo sie einen kleinen Friseursalon hatte. Verkauft, mit einer Träne im Auge. Aber die Nachfolgerin, einst bei ihr angestellt, macht das gut, sagt sie. Heike weiß noch nicht, ob sie wieder anfangen soll. Beim Friseur in Kyrenia sitzen nur Männer. Sie freut sich auf ihren ersten Sommer am Mittelmeer und auf das, was vor ihrem neuen Haus wachsen wird. „Die meisten Pflanzen habe ich noch nie gesehen.“ Deutschland? Heike zieht nur die Augenbrauen hoch. In der Auswanderer-Community ist das kein Thema. Anders gesagt: Man ist sich einig. Corona, der Krieg, die Inflation. Das muss nicht mehr rauf- und runterdiskutiert werden. Auf Telegram gibt es Tipps, Kontakte, Treffpunkte. Auch jemanden, der das Sofa nimmt, das die alten Besitzer dagelassen haben. Mag die EU ruhig glauben, dass ihr ganz Zypern gehört. Im Norden gibt es keine Windräder und keine Strohhalme aus Papier. Der Deckel klebt nicht an der Flasche fest, und der Liter Benzin kostet weniger als einen Euro. Und in den Städten kann man fast überall mit Bitcoin zahlen. Mietautos, Schuhe, Schnaps.
Torsten lockt das alles immer wieder hierher, immer in das gleiche Hotel. „Die Leute sind alle so herzlich“, sagt er. Aber hier leben? Torsten schaut sich um, das schon. Grundstücke, Häuser, Wohnungen. Die Preise gehen weit auseinander. Man kann wie Richard etwas am Meer finden für kleines sechsstelliges Geld, aber auch leicht eine Million ausgeben oder noch mehr. Torsten hat inzwischen ein Konto bei einer kleinen einheimischen Bank. „Die Kreditkarte gibt es für 50 Cent.“ Nordzypern ist für ihn ein Plan B. Wobei: Eigentlich hat er zu Hause schon alles durch. Hausdurchsuchung, Existenzvernichtung, Verleumdung bis in die internationale Presse. „Ich mache nur noch das, worauf ich Lust habe“, sagt er. Mit alten Motorrädern durch die Gegend fahren. Freunden und Verwandten helfen, Nordzypern zu genießen. Vielleicht siedelt er eines Tages ganz um, vielleicht auch nicht. Jeder Ostdeutsche in seinem Alter weiß, dass ein Loch in der Mauer unbezahlbar ist.
Richard, den Rentner aus London, haben wir noch oft von weitem gesehen – im Schatten auf seiner Terrasse, neben sich eine Katze. Einmal ist er mit dem Fahrrad in Richtung Meer gefahren, aber nicht dorthin, wo auf der Karte Sandstrand steht und in Wirklichkeit alles voller Müll ist. Baden oder „Fish and Chips“ genießen mit Landsleuten in seiner Lieblingskneipe. Dort sprechen auch die Kellner Englisch, anders als sonst. 30 Jahre Isolation hinterlassen selbst da ihre Spuren, wo die Briten bis 1960 die Macht waren und nicht nur den Linksverkehr dagelassen haben oder ihre komischen Steckdosen. An den Dorsch daheim, das hat Richard uns gleich zur Begrüßung gesagt, kommen sie hier auf Zypern ohnehin nirgendwo heran.
Freie Akademie für Medien & Journalismus
Bilder: Antje Meyen
-
@ d582ea44:6d7e6b56
2025-03-17 04:32:34Mission: [[Recompile the internet with context, meaning, and awareness]]
We want to cut out the rot of the internet by [[A medium to think through|producing a Medium for people to think through rather than speak through]].
mememaps.net has three goals,
- [[Curate, Promote, and Develop software that encourages people to become better versions of themselves]]
- [[Provide a medium for user data that is not confined to specific applications, platforms, or protocols]]
- [[Encourage people to use, develop, and integrate meme maps to help make sense of the human experience]]
Community Links
- mememaps.net Discord guild
- mememaps.net on lu.ma
- mememaps.net on guild.host
- mememaps.net on Meetup.com
Blog Posts and Videos
- [[Project Update Posts]]
- [[Tutorials and Learning Pathways]]
- [[Daily Learnings]]
- [[Community Update Posts]]
- [[Blog Posts]]
- [[Videos and Their Scripts]]
[[Favorite Software]]
- [[Favorite Browser Extensions]]
- [[Favourite VSCode Extensions]]
- [[Favorite Obsidian Plugins]]
- [[Favourite Homelab Software]]
- [[Favorite Nostr Apps]]
Projects
- [[Dentropy Daemon - Home]]
- [[Question Engine - QE]]
- [[Keybase Binding]]
- [[Discord Binding]]
- [[dentropys-obsidian-publisher]]
- [[DentropyCloud]]
- [[ENS Indexing]]
- [[Filling self described SQL models via LLM]]
Paul's Links
- [[Conversational Questions]]
- [[Favorite Media]]
- [[Media Digestion]]
- [[Previous Presentations]]
-
@ f6488c62:c929299d
2025-03-17 03:44:36เมื่อวันที่ 16-17 มีนาคม 2025 ตลาด Bitcoin เดือดพล่านจากการต่อสู้ระหว่างกลุ่มวาฬที่ต้องการกดราคาลง และวาฬอีกกลุ่มที่พยายามดันราคาให้สูงขึ้น การซื้อขาย BTC ในระดับมหาศาล ทำให้เกิดความผันผวนที่รุนแรง จนตลาดแทบจะลุกเป็นไฟ
ปฐมบท: การวางหมากของวาฬชอร์ต
กลุ่มวาฬกลุ่มหนึ่งได้เปิดสถานะชอร์ตจำนวนมหาศาล โดยเริ่มจากการตั้ง Limit Short ที่ 83,700 ดอลลาร์ และขยับขึ้นเป็น 84,000 ดอลลาร์ พร้อมท้าทายตลาดด้วยคำพูดที่ราวกับต้องการให้เกิดการตอบโต้จากฝั่งตรงข้าม
ในขณะที่ฝั่งชอร์ตดูเหมือนจะมี Binance เป็นแนวร่วมสำคัญ โดยมีคำสั่งขายขนาดใหญ่คอยกดราคาอยู่ แรงเทขายจากวาฬ HL ทำให้ราคามีแนวโน้มร่วงลงอย่างชัดเจน ซึ่งสร้างความกังวลให้กับนักลงทุนรายย่อยที่มองสถานการณ์ไม่ออกว่าฝ่ายไหนจะเป็นฝ่ายชนะ
สงครามเริ่มปะทุ: กลุ่มวาฬสาย L ลุกขึ้นสู้
ขณะที่ราคากำลังถูกกดลง กลุ่มวาฬสาย Long ไม่ยอมแพ้ มีรายงานว่ามีการเติมเงินเข้ามาในตลาดเพิ่มขึ้นถึง 5 ล้านดอลลาร์ เพื่อสู้กับแรงเทขายจากฝั่งชอร์ต โดยหนึ่งในตัวละครสำคัญที่โผล่เข้ามาในเกมคือ Justin Sun ซึ่งมีข่าวว่ามีการ DM หาวาฬรายอื่นเพื่อรวมตัวปั๊มราคา และรับเฉพาะคนที่มีทุนหลัก 7-8 หลักขึ้นไป!
การเคลื่อนไหวนี้ทำให้เกิดการต่อสู้แบบดุเดือด ราคาถูกดันกลับขึ้นไป พร้อมกับมีคำสั่งซื้อขนาดใหญ่ทยอยเข้ามา โดยเฉพาะคำสั่งซื้อแบบ Spot Bid ที่คอยรับออเดอร์ขาย ทำให้ตลาดไม่สามารถร่วงลงไปได้ง่าย ๆ
การประลองครั้งสุดท้าย: ใครจะอยู่ ใครจะไป?
ในช่วงกลางดึกของวันที่ 17 มีนาคม การซื้อขายเข้มข้นขึ้นเรื่อย ๆ มีคำสั่ง Short และ Long ถูกเติมเข้ามาเป็นระลอก โดยเฉพาะช่วงราคา 83,000-84,500 ดอลลาร์ ที่กลายเป็นสมรภูมิหลักของการต่อสู้ ฝั่งชอร์ตพยายามกดให้ต่ำกว่า 83,000 ดอลลาร์ ขณะที่ฝั่ง Long ก็ดันราคาให้พุ่งกลับขึ้นไป
ท้ายที่สุด ข้อมูลล่าสุดระบุว่าฝ่ายชอร์ตเริ่มปิดสถานะบางส่วน โดยมีการ TWAP (Time-Weighted Average Price) ในการทยอยปิดออเดอร์ เพื่อหลีกเลี่ยงความเสี่ยงจากการถูกบีบให้ซื้อคืนที่ราคาสูงกว่าที่ตั้งใจ
บทเรียนจากสงครามวาฬครั้งนี้
ศึกระหว่างวาฬครั้งนี้เป็นตัวอย่างที่ชัดเจนของพลังการเงินในตลาดคริปโต ที่สามารถดึงราคาขึ้นหรือลงได้ตามการตัดสินใจของผู้เล่นรายใหญ่ นักลงทุนรายย่อยต้องระมัดระวังและเรียนรู้ว่าตลาดไม่ได้เคลื่อนไหวอย่างเป็นธรรมเสมอไป การมีวาฬคอยชักใยเบื้องหลังทำให้การลงทุนใน BTC ไม่ได้ง่ายอย่างที่คิด
อะไรจะเกิดขึ้นต่อไป?
ตลาดกำลังจับตาดูว่ากลุ่มวาฬทั้งสองฝ่ายจะดำเนินเกมอย่างไรต่อไป ราคาจะถูกดันขึ้นไปถึง 90,000 ดอลลาร์เพื่อบีบให้ชอร์ตต้องปิดสถานะ หรือว่าฝั่งชอร์ตจะกลับมาเอาคืนด้วยกลยุทธ์ใหม่? คำตอบทั้งหมดจะเกิดขึ้นในอีกไม่กี่วันข้างหน้าในการต่อสู้ครั้งใหม่ของตลาด Bitcoin!
ขอบคุณข้อมูลหลายๆ ส่วน จากแอดมินกลุ่ม insight on-chain
-
@ a012dc82:6458a70d
2025-03-17 02:40:08The cryptocurrency world is abuzz with anticipation as the next Bitcoin halving event approaches. This significant event, expected to occur every four years, has historically been a catalyst for monumental shifts in the Bitcoin ecosystem, particularly impacting mining profitability. In this article, we delve into the intricacies of the halving effect and its potential implications for the future of Bitcoin mining profits.
Table of Contents
-
Understanding the Bitcoin Halving
-
Historical Impact on Bitcoin Prices
-
Predicting Mining Profitability Post-Halving
-
The Efficiency Factor
-
Market Adaptation and Technological Advancements
-
The Role of Institutional Investment
-
Future Scenarios and Strategies
-
Conclusion
-
FAQs
Understanding the Bitcoin Halving
The Bitcoin halving is a predetermined event coded into the Bitcoin protocol, designed to reduce the reward for mining new blocks by half. This mechanism was implemented by Satoshi Nakamoto, the anonymous creator of Bitcoin, to mimic the scarcity and deflationary properties of precious metals like gold. By halving the block reward, the rate at which new bitcoins are introduced into circulation is slowed down, thereby controlling inflation and enhancing the asset's scarcity.
Historical Impact on Bitcoin Prices
Historically, halving events have led to significant fluctuations in Bitcoin's price. The reduced supply of new bitcoins tends to create upward pressure on the price, assuming demand remains constant or increases. Past halvings in 2012, 2016, and 2020 have been followed by substantial bull runs, although it's crucial to note that these price increases did not occur immediately but typically several months after the halving.
Predicting Mining Profitability Post-Halving
The upcoming halving poses critical questions regarding the profitability of Bitcoin mining. Mining involves validating transactions and securing the Bitcoin network, a process that requires substantial computational power and electricity. The halving reduces the block reward, directly impacting miners' revenue.
The Efficiency Factor
Post-halving, the profitability of mining operations will largely depend on their efficiency. Miners with access to cheap electricity and more efficient mining hardware will be better positioned to withstand the reduction in block rewards. As the reward decreases, the cost of mining each Bitcoin effectively increases, squeezing the margins of less efficient miners.
Market Adaptation and Technological Advancements
The halving will likely accelerate innovation and efficiency in mining technology as miners seek to maintain profitability. This could include the development of more energy-efficient mining rigs and the migration of mining farms to regions offering cheaper electricity and favorable climatic conditions.
Furthermore, the market may adapt to the reduced supply of new bitcoins through price adjustments. If the price of Bitcoin increases sufficiently post-halving, it could offset the reduced block reward, thereby sustaining mining profitability.
The Role of Institutional Investment
The landscape of Bitcoin mining has evolved with the entry of institutional investors and publicly traded mining companies. These entities typically have more substantial resources and better access to capital, allowing them to invest in efficient mining operations and weather periods of lower profitability.
Future Scenarios and Strategies
Looking ahead, several scenarios could unfold for Bitcoin mining profitability post-halving:
-
Optimistic Scenario: If the price of Bitcoin increases significantly post-halving, miners could see increased profitability despite the reduced block reward. This scenario would likely attract more participants to the mining space, increasing competition.
-
Pessimistic Scenario: If the price of Bitcoin does not increase sufficiently to offset the halving of block rewards, less efficient miners could be forced out of the market. This could lead to increased centralization of mining power among a few large players.
-
Balanced Scenario: A moderate increase in the price of Bitcoin could maintain the status quo, where only the most efficient miners remain profitable. This scenario would encourage continuous innovation in mining technology and strategies.
Conclusion
The upcoming Bitcoin halving is a pivotal event that will significantly impact mining profitability. While the exact outcomes remain uncertain, the event underscores the importance of efficiency, technological advancement, and market adaptation in the mining industry. As the landscape evolves, miners and investors alike must stay informed and agile to navigate the challenges and opportunities presented by the halving effect.
FAQs
What is the Bitcoin halving? The Bitcoin halving is an event that occurs approximately every four years, where the reward for mining new Bitcoin blocks is cut in half. This event is designed to reduce the rate at which new bitcoins are generated, mimicking the scarcity and deflationary properties of precious metals.
How does the halving affect Bitcoin prices? Historically, Bitcoin halving events have led to increases in the price of Bitcoin. This is generally attributed to the reduced supply of new bitcoins, which, if demand remains constant or increases, can lead to price increases. However, price changes do not typically occur immediately after the halving.
Will the next halving make Bitcoin mining unprofitable? The impact of the halving on mining profitability depends on various factors, including the efficiency of the mining hardware, electricity costs, and the market price of Bitcoin. While less efficient miners may struggle post-halving, those with access to cheap electricity and efficient hardware may continue to find mining profitable.
Can technological advancements offset the reduced block rewards? Technological advancements in mining hardware and strategies can help offset the impact of reduced block rewards by lowering the cost of mining each Bitcoin. This includes improvements in energy efficiency and the development of more powerful mining rigs.
What strategies can miners use to remain profitable post-halving? Miners can increase their chances of remaining profitable post-halving by optimizing their operations for efficiency, seeking out locations with lower electricity costs, investing in more efficient mining equipment, and potentially pooling resources with other miners to reduce costs and increase their chances of earning block rewards.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 04ed2b8f:75be6756
2025-03-16 23:31:45Muhammad Ali, one of the greatest fighters of all time, once said:
"Don’t count the days, make the days count."
This simple yet powerful statement embodies the essence of warriorful discipline—the mindset of taking charge of time rather than being a passive observer of its passing. Warriors, whether in the ring, in battle, or in life, do not wait for the future to bring results. They shape their future with relentless effort, discipline, and purpose.
The Warrior’s Approach to Discipline
1. Purpose Over Routine
A disciplined warrior does not wake up just to check off another day on the calendar. They wake up with a mission—to improve, to grow, and to make an impact. Every day is an opportunity, not just another 24 hours to endure.
2. Relentless Training and Growth
Muhammad Ali did not become the greatest by simply counting training sessions. He poured his soul into every punch, every movement, and every moment in the gym. True warriors push beyond limits, knowing that each effort compounds into greatness.
3. Mind Over Time
Most people wait for motivation, but warriors create their own. They don’t let time dictate their progress; they dictate their progress through consistent, disciplined action. Each day is a battlefield, and how one fights determines victory or defeat.
4. Embracing Struggle
Ali once said, “I hated every minute of training, but I said, ‘Don’t quit. Suffer now and live the rest of your life as a champion.’” This is the warrior mindset—understanding that pain and struggle are necessary sacrifices for ultimate success.
5. Impact Over Existence
To simply exist is to count the days. To truly live is to make every day count. A warrior leaves a mark, whether through discipline, mastery, or inspiring others to rise above mediocrity.
The warriorful discipline is not about waiting for the perfect moment—it is about making every moment perfect through action, commitment, and resilience. As Ali taught us, do not merely exist in time—command it. Do not watch the days pass—forge your legacy in them.
-
@ 6e0ea5d6:0327f353
2025-03-16 23:10:31Ascolta bene! In the dirty game of life, strength, intelligence, or even wealth aren’t enough. Surrounding yourself with the wrong people is like carrying dynamite in your pocket while lighting a cigarette—an explosion is only a matter of time.
Fools believe loyalty is measured by the sweet words of a sycophant. The weak cling to childhood bonds and cheap sentimentality. The naive trust promises made by forked tongues. But real men know: the only thing that separates a king from a traitor hanging in the public square is his allies.
Want to win? Eliminate the scum around you. Cut ties with the envious, because their greed will one day turn against you. Stay away from chronic critics, as their defeatism is contagious. Despise flatterers, for they are the first to abandon ship when the storm hits. Expel the lazy, as carrying dead weight only slows you down. But above all, never tolerate a man who doesn’t keep his word—he is the poison that rots any empire.
If you want to build something solid, surround yourself with men who understand honor. People who know that loyalty isn’t for sale, respect isn’t begged for, and a given word is a debt to be paid.
The war of life isn’t won by the strongest, but by those who choose the right people to stand beside them in the trenches.
Can you trust your allies to guard your back? Envy is resentment in disguise. The envious man doesn’t want what you have—he wants you to lose it. He doesn’t desire your woman, your wealth, or your respect. He wants you to fall, so he doesn’t have to face his own failure. The loser can’t stand to see someone from the same place rise higher. It reminds him of the trash he is.
The cut must be surgical and final. The envious don’t deserve a dramatic confrontation. They don’t deserve an explanation, a farewell, or a scene. Simply stop answering, stop responding, stop giving them space in your life.
Disappear. Let them wallow in their failure while you rise to heights they’ll never reach.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 878dff7c:037d18bc
2025-03-16 22:00:46ASX 200 Expected to Rise Amid Global Market Movements
Summary:
The ASX 200 is anticipated to open higher on Monday, following positive movements in global markets. Factors influencing this expected rise include a rebound in U.S. stocks, with the S&P 500 and Nasdaq posting significant gains, and easing concerns over escalating trade tensions. Investors will be monitoring upcoming economic data releases and central bank meetings for further market direction. Sources: Motley Fool Australia - March 17, 2025
Global Trade Tensions Pose Risks to Australian Economy
Summary:
Escalating global trade tensions, particularly between the U.S. and China, present significant risks to Australia's economy. A recent report by UNSW Sydney and the e61 Institute highlights that Australia is caught between its largest trading partner, China, and close ally, the United States. The shift from a rules-based global order to power-based negotiations could impact Australia's trade dynamics. The report suggests that Australia should avoid protectionist policies and instead negotiate with trading partners, emphasizing its strategic and economic value. Fiscal sustainability is crucial, as a US$10 decrease in iron ore prices could reduce federal revenue by $3.4 billion. The report also underscores the need for tax and spending reforms to bolster Australia's fiscal position amid rising global uncertainties. Sources: Accounting Times - March 17, 2025
Sydney Employs Black Soldier Fly Larvae to Combat Food Waste
Summary:
The City of Sydney has initiated a 12-month trial using black soldier fly larvae to process 500 tonnes of food scraps, aiming to reduce landfill usage. The larvae consume the waste, converting it into fertilizer and animal feed, promoting a circular economy. This initiative aligns with the forthcoming FOGO Recycling Bill, targeting the elimination of residential food waste in landfills by 2030. Sources: News.com.au - March 17, 2025
China's 'Dark Factories' Operate Without Human Workers
Summary:
In Changping, China, Xiaomi has unveiled a "dark factory" that operates entirely without human intervention. This fully automated, AI-driven facility produces one smartphone per second, utilizing robots and AI systems to handle every aspect of production, from raw materials to final assembly, effectively eliminating human error. With an annual capacity of 10 million devices, this 81,000-square-meter facility exemplifies the future of global manufacturing. However, it raises significant concerns about employment, as the World Economic Forum predicts that 23% of jobs will be affected by AI within five years. Experts are calling for global cooperation and regulation to ensure AI benefits humanity equitably and safely. Sources: News.com.au - 17 March 2025
Tony Roma's Plans to Integrate AI and Robotics in Operations
Summary:
Tony Roma's, a fast-casual restaurant chain, plans to implement AI and robots in its operations to regain its former popularity. CEO Mohaimina Haque announced the Tony Roma's 2.0 plan, aiming to incorporate technology throughout the restaurant's functions, from enhancing customer experience to inventory management. The integration will potentially lead to the use of robots in positions such as Mâitre d's. Delightree, a franchise management software, will help produce training manuals for the new technologies. Haque predicts that in two to five years, AI and robotics will be prevalent in many industries, not just restaurants. The technological advancements aim to improve efficiency, reduce errors, and aid in informed decision-making. Sources: The Sun - 15 March 2025
JobSeeker Payment Rates Become a Key Election Issue
Summary:
Peter Maidorn, a 62-year-old Australian on JobSeeker, struggles to meet basic living expenses, highlighting the challenges faced by many welfare recipients. Experts argue that Australia's JobSeeker rate is among the lowest in the OECD and should be increased. Recent reports recommend raising the payment by $60 to $126 a week. Despite these calls, major political parties have yet to commit to an increase. The Australian Council of Social Service data indicates that welfare recipients could form a significant voting bloc, potentially impacting election outcomes. Sources: The Guardian - March 17, 2025
Albanese Government Introduces Subsidies for Women's Health Treatments
Summary:
The Albanese government has announced significant health subsidies for women, covering contraceptives, IVF treatments, and endometriosis medications. Starting from April and May, these measures aim to reduce costs for patients. For example, the contraceptive Slinda will now cost $7.70 for concession card holders and $31.60 for others, down from $80. The endometriosis treatment Ryeqo's annual cost will decrease from $2,700 to between $92 and $380, and the cost for a cycle of the IVF therapy Pergoveris will drop from $3,500 to $31.60. These changes address women's health issues, including reproductive health and hormonal conditions, with bipartisan support. The Coalition supports the measures but criticizes delays in implementation. This initiative continues the government's focus on women's health, following a $573 million pledge in February for related health areas. Sources: The Australian - March 17, 2025
Greens Propose Four-Day Work Week with Full Pay
Summary:
The Greens have proposed a policy for a four-day work week with full pay, aiming to address worker burnout and improve work-life balance. This policy would involve a national test case through the Fair Work Commission and the establishment of a National Institute for the Four Day Work Week, costing $10 million annually. The Greens argue that productivity gains over the past decades have not benefited workers fairly, and a shorter work week could lead to a healthier and happier workforce. Citing successful international trials, the Greens believe the policy would modernize Australian workplaces and ensure justice for working people. Sources: News.com.au - March 17, 2025
U.S. Expands Submarine Presence in Australia Under AUKUS Pact
Summary:
The United States is enhancing its submarine presence off Western Australia's coast as part of the AUKUS partnership, aiming to transfer nuclear submarine capabilities to Australia. Starting in 2027, four Virginia-class submarines will be stationed at a naval base in Western Australia, following the current deployment of the USS Minnesota for training exercises. HMAS Stirling is undergoing significant upgrades to accommodate the "Submarine Rotational Force West," with U.S. personnel numbers expected to increase substantially over the next two years. This strategic move is designed to counter China's growing influence in the Asia-Pacific region and bolster defense capabilities concerning Taiwan. The initiative also includes Australia purchasing two used Virginia-class submarines and developing new nuclear-powered submarines in collaboration with the United Kingdom. Currently, 115 Australians are training with the U.S. nuclear navy in preparation for this transition. Sources: Reuters - March 17, 2025
Decline in Vaccination Rates Among Australian Children
Summary:
Vaccination rates in Australia have declined since the COVID-19 pandemic, raising concerns among health experts. Factors such as misinformation and eroding trust have contributed to the drop in vaccination rates across all age groups, with Indigenous children particularly affected. Health Minister Mark Butler warns that falling immunization rates for diseases like measles and whooping cough could jeopardize herd immunity. There is a call for a national strategy to improve vaccination rates and combat misinformation, with efforts underway to restore public confidence in vaccines. Sources: The Australian - March 15, 2025
Australian Government Considers WTO Challenge Against US Tariffs
Summary:
The Australian government is contemplating a World Trade Organization (WTO) challenge in response to US President Donald Trump's imposition of 25% tariffs on Australian steel and aluminium. Trade Minister Don Farrell expressed deep concern over these measures and emphasized the importance of a collective approach to trade issues. The tariffs have raised alarms within Australia's $150 billion food and agriculture industry regarding potential new tariffs on food and pharmaceuticals, which could further strain the global economy. Despite not securing an exemption from these tariffs, Prime Minister Anthony Albanese announced $750 million in subsidies to support the nation's steel and aluminium sectors. Business leaders have voiced worries about inflation and economic instability resulting from these trade tensions, highlighting the necessity of maintaining a rules-based trade order and avoiding retaliatory measures. Strategic redesigns of Australia's trade and manufacturing policies are being considered to ensure security and stability amid global economic shifts. Sources: The Australian - 15 March 2025
-
@ 16d11430:61640947
2025-03-17 00:07:10In a world drowning in financial manipulation, speculation, and fiat-induced illusions, Bitcoin offers something radically different: a first-principles-based system of money that operates with mathematical certainty, economic scarcity, and censorship resistance. Yet, many Bitcoiners struggle to navigate this landscape without getting sucked into fiat news cycles, short-term price obsession, or gambling mentality.
This article explores Bitcoin first principles and how to earn, build, and create value without being distracted by the noise.
Bitcoin First Principles: Understanding the Core
To truly operate in a Bitcoin-first manner, you need to grasp the first principles that make Bitcoin unique. These aren't just theoretical—they inform how you should work, earn, and live in a Bitcoin-native way.
- Absolute Scarcity (21M Hard Cap)
Bitcoin is the first asset in human history that is strictly limited in supply.
Unlike fiat, which is printed at will, Bitcoin remains fixed—ensuring long-term value preservation.
Implication: You don’t need to chase high-risk fiat gains or inflation-driven wages. Instead, optimize for earning sats over time.
- Decentralization & Censorship Resistance
Bitcoin is run by a network of nodes, not a central authority.
No government, bank, or corporation can arbitrarily stop a transaction.
Implication: You can earn and transact freely without relying on permission from banks, PayPal, or governments.
- Self-Sovereignty
With Bitcoin, you own your money—not a bank.
Private keys mean full control over your wealth.
Implication: You don’t have to participate in the fiat rat race of chasing higher wages just to offset hidden losses from inflation.
- Proof of Work (PoW)
Bitcoin isn’t printed—it’s mined through real-world energy expenditure.
This creates an intrinsically valuable digital asset.
Implication: If money should be earned, then your work should reflect real value, not fiat illusions like speculative trading or short-term price hype.
How to Build and Get Paid for Value in a Bitcoin Economy
Bitcoin first principles aren’t just theoretical—they shape how you should work and get paid. Here’s how to escape fiat cycles and start earning in a Bitcoin-native way.
- Stop Thinking in Fiat Terms
Bitcoin isn't just an investment—it’s a parallel economy.
Instead of “How much is 1 BTC worth in USD?”, think:
How many sats can I earn per hour of work?
How can I price my skills, services, or products in Bitcoin?
How do I create sustainable income that doesn't require converting to fiat?
✅ Mindset shift: Fiat money loses value over time. Bitcoin preserves it. Design your income model accordingly.
- Earn Bitcoin for Real-World Skills
The best way to escape fiat is to get paid directly in Bitcoin.
Here’s how:
Freelance in Bitcoin: Offer coding, writing, consulting, or design services on Bitcoin-native platforms like:
Stacker News bounties (for writers)
Bitcoin dev grants (for open-source builders)
BTCPay Server gigs (for merchants)
Run a Bitcoin-only business: Whether it’s selling goods, services, or SaaS, integrate Lightning payments to avoid fiat entirely.
Provide consulting or education: Businesses need help adopting Bitcoin—be the person who helps them.
✅ Strategy: List your skills and find Bitcoin-native ways to offer them.
- Build on Bitcoin (Instead of Chasing VC Money)
The fiat startup model is broken—VCs extract more than they provide.
Instead of relying on debt-driven fiat capital, build sustainable Bitcoin-first businesses:
Lightning-powered content platforms
Bitcoin-native e-commerce stores
Self-hosted SaaS models
Bitcoin-secured applications
Self-sovereign identity solutions (Nostr, Fedimint, etc.)
✅ Key takeaway: The best Bitcoin businesses don’t need VC funding because they operate on real value, not speculative growth models.
- Minimize Fiat Exposure (Live a Bitcoin-Optimized Life)
Stop thinking in fiat wages: If you measure your success in USD, you're still tied to inflationary thinking.
Use circular Bitcoin economies: Buy gift cards, pay for services, and use Bitcoin-friendly businesses.
Move to Bitcoin-friendly locations: Some cities, like El Salvador’s Bitcoin Beach, allow you to live entirely on Bitcoin.
✅ Practical step: Automate Bitcoin accumulation with DCA (Dollar-Cost Averaging) and opt out of fiat whenever possible.
- Ignore Fiat News & Market Noise
The media thrives on fear, uncertainty, and doubt (FUD).
Bitcoin is about time preference—short-term noise is irrelevant.
Instead of checking Bitcoin’s price daily, focus on your work, your craft, and your ability to build long-term value.
✅ Discipline: Don’t let fiat narratives distract you. Build, earn, and ignore speculation.
The Bitcoin-First Work & Life Playbook
Here’s a concrete guide to aligning your work and life with Bitcoin-first principles:
---
Final Thoughts: Build for the Long-Term
Bitcoin is not just an asset—it’s a parallel system of economic freedom. But to truly benefit, you must think differently than the fiat system trains you to.
Stop chasing fiat-defined success.
Opt out of inflationary wages.
Earn in Bitcoin. Build on Bitcoin. Hold Bitcoin.
Ignore the noise. Deliver real value.
If you align your work and income with Bitcoin-first principles, you won’t just earn money—you’ll build sovereignty, resilience, and long-term wealth.
Now, go build.
-
@ b5d34eed:a7475cbf
2025-03-16 20:15:10The internet has come a long way since its inception, but let’s be honest—it’s not exactly the utopia of freedom and openness we once imagined. Today, a handful of tech giants control most of our online interactions, from social media to payments. Enter the decentralized web, a movement that’s pushing back against this centralization. At the forefront of this revolution is Nostr, a simple yet powerful protocol that’s redefining how we think about social networking. And when you throw the Lightning Network into the mix, things get even more exciting. Let’s break it all down.
What’s Wrong with the Current Web?
Before we dive into Nostr, let’s talk about why decentralization matters. The internet today is dominated by centralized platforms like Facebook, Twitter (now X), and Instagram. These platforms control what you see, how you interact, and even what you’re allowed to say. They harvest your data, sell it to advertisers, and can ban or silence you at their discretion. It’s a system that prioritizes profit over people.
Centralization also creates single points of failure. If a platform goes down, gets hacked, or decides to shut down, your data and connections disappear overnight. Remember when Twitter had outages, or when Facebook’s servers crashed? Millions of users were left stranded. This isn’t just inconvenient—it’s a fundamental flaw in how we’ve built the web.
Enter Nostr: A Breath of Fresh Air
Nostr, which stands for Notes and Other Stuff Transmitted by Relays, is a decentralized protocol designed to fix these problems. Unlike traditional social media platforms, Nostr doesn’t rely on a central server. Instead, it uses a network of independent relays to transmit messages. Think of it as a decentralized Twitter, but without the corporate overlords.
Here’s why Nostr is a game-changer:
-
No Central Authority: Nostr doesn’t belong to any company or individual. It’s an open protocol, meaning anyone can build apps on top of it or run their own relay. This eliminates the risk of censorship or arbitrary bans.
-
User Control: With Nostr, you own your data. Your posts, messages, and connections are stored locally or on relays you choose. If one relay goes down, you can switch to another without losing anything.
-
Interoperability: Nostr is designed to work across different apps and platforms. This means you’re not locked into a single ecosystem. If you don’t like one Nostr client, you can switch to another without losing your followers or content.
-
Simplicity: Nostr’s protocol is intentionally simple. It doesn’t try to do everything at once, which makes it lightweight and easy to use. This simplicity also makes it more resilient and adaptable.
The Lightning Network: Powering Decentralized Payments
Now, let’s talk about money. One of the coolest things about Nostr is its integration with the Lightning Network, a second-layer payment protocol built on top of Bitcoin. The Lightning Network enables fast, cheap, and scalable transactions, making it perfect for micropayments and tipping.
Here’s why this matters:
-
Monetization Without Ads: Traditional social media platforms rely on ads to make money. This creates a perverse incentive to keep you hooked and harvest your data. With Nostr and the Lightning Network, creators can monetize their content directly through tips or paid subscriptions. No ads, no middlemen—just a direct connection between creators and their audience.
-
Global Payments: The Lightning Network is borderless. Whether you’re tipping a blogger in Nigeria or buying a digital product from someone in Argentina, transactions are instant and cost just a fraction of a cent. This opens up new opportunities for global collaboration and commerce.
-
Censorship-Resistant Money: Just like Nostr resists censorship, the Lightning Network ensures that payments can’t be blocked or controlled by any central authority. This is especially important in regions where financial freedom is under threat.
Why Nostr and the Lightning Network Are a Perfect Match
When you combine Nostr’s decentralized social networking with the Lightning Network’s payment capabilities, you get something truly special. Imagine a social media platform where you can tip your favorite creators, pay for premium content, or even buy goods and services—all without leaving the app. And because both Nostr and the Lightning Network are decentralized, you don’t have to worry about fees, censorship, or corporate interference.
For example, let’s say you’re a musician sharing your work on Nostr. Fans can tip you in Bitcoin via the Lightning Network, or you can sell exclusive content directly to your followers. The money goes straight to you, without a platform taking a cut. This creates a more equitable and sustainable model for creators.
The Bigger Picture: A Decentralized Future
Nostr and the Lightning Network are just two pieces of a much larger puzzle. The decentralized web is about reclaiming control over our online lives—our data, our interactions, and our money. It’s about building a more open, resilient, and user-centric internet.
Of course, decentralization isn’t without its challenges. It can be harder to use than centralized alternatives, and it requires a shift in how we think about technology. But the benefits far outweigh the drawbacks. By embracing protocols like Nostr and the Lightning Network, we can create a web that’s truly by the people, for the people.
Final Thoughts
The decentralized web isn’t just a tech trend—it’s a movement. Nostr and the Lightning Network are proof that we can build better, fairer systems when we prioritize freedom and innovation over profit and control. Whether you’re a creator, a developer, or just someone who’s tired of Big Tech’s grip on your online life, now’s the time to explore what the decentralized web has to offer.
-
-
@ b8af284d:f82c91dd
2025-03-16 16:42:49Liebe Abonnenten,
diejenigen, die diese Publikation schon länger abonniert haben, wissen, dass hier immer wieder über den Ursprung des Corona-Virus in einem Labor in Wuhan berichtet wurde. Seit diese Woche ist es „offiziell“ - der Bundesnachrichtendienst (BND) hält den Labor-Ursprung für die wahrscheinlichste Variante. Jetzt kann man sich fragen, warum der BND plötzlich umschwenkt: Will man proaktiv erscheinen, weil man die Wahrheit nicht mehr länger verbergen kann? Oder will man die enttäuschten Bürger zurückgewinnen, die aufgrund der Lügen während der Corona-Zeit zunehmend mit Parteien links und rechts außen sympathisiert haben, weil diese die einzigen waren, die den Irrsinn nicht mitgetragen haben?
Auffallend bei den „Recherchen“, die in Wahrheit keine sind, sondern Verlautbarungen des deutschen Geheimdienstes, ist auch das völlige Schweigen über die US-amerikanischen Verwicklungen in das Projekt. In Wuhan wurde mit amerikanischem Geld geforscht. Warum der BND diese Tatsache verschweigt, ist Teil der Spekulation. Vermutlich will man Peking alles in die Schuhe schieben, um von den eigenen Versäumnissen abzulenken.
In meinem aktuellen Buch “Der chinesische (Alp-)Traum” ist den Ereignissen in Wuhan ein ganzes Kapitel gewidmet. Es hat nichts an Aktualität eingebüßt. Alle Fakten lagen seit Jahren auf dem Tisch für jeden, den es interessiert hat. Hier gibt es das gesamte Kapitel nachzulesen.
Auf jeden Fall zeigt dies, wie der Begriff „Verschwörungstheoretiker“ in den vergangenen Jahren zum Kampfbegriff und Waffe gemacht wurde, um Kritiker zu diffamieren, und die öffentliche Meinung ohne harte Zensur zu lenken. Ähnliches kann man aktuell beim Projekt „Digitaler Euro“ beobachten. Vermutlich kann sich kein Bürger der Europäischen Union daran erinnern, bei seiner Wahlentscheidung jemals gefragt worden zu sein, ob er die Einführung eines „digitalen Euros“ gut findet. Wurde er nämlich nicht. Er kommt aber trotzdem. EZB-Präsidentin Christine Lagarde hat das diese Woche nochmals bekräftigt: Schon im Oktober will man die Testphase beenden und an der Einführung arbeiten.
Nun gehört BlingBling nicht zu denjenigen, die im digitalen Euro „Orwell’sches Teufelswerk“ sehen. Strategische Dummheit trifft es besser. Worum geht es?
Sogenannte Central Bank Digital Currencies (CBDC) waren vor einigen Jahren so etwas wie der letzte Schrei in der Zentralbank-Welt. Nachdem Facebook/Meta 2017/18 eine eigene Währung namens Libra auf den Markt bringen wollte, und eine obskure Internet-Währung namens Bitcoin immer mehr Anhänger fand, sahen sich viele Zentralbanken der Welt unter Zugzwang. Was man wollte: eine digitale, direkt von der Zentralbank ausgegebene Währung ohne Bugs, aber mit Features. Mit einer Digital-Währung ließe sich der internationale Zahlungsverkehr direkt und ohne Umweg über den US-Dollar abwickeln. Die Zentralbank bekäme wieder mehr direkten Einfluss auf die Geldschöpfung. Und, wie man aus China lernen konnte, ließen sich digitale Bankkonten auch ganz zum „Nudging von Bürgern“ nutzen. So spekulierten die ersten Verschwörungstheoretiker bald, ein digitaler Euro ließe sich ja mit einem persönlichen CO2-Konto verknüpfen. Wäre letzteres einmal aufgebraucht, könnte der Konto-Inhaber einfach keinen Flug mehr buchen. Auch ließe sich eine expansive Geldpolitik, wie sie bis 2022 praktiziert wurde, ganz einfach mit Negativ-Zinsen umsetzen. Geld würde sich nominal reduzieren, was den Bürger zum Konsum animieren würde. Flüchtigen Kriminellen ließe sich per Knopfdruck das Konto sperren. Der Staat würde also über eine ganze neue Palette an Einflussmöglichkeiten verfügen.
Die Aluhüte United warnten vor einem Orwellschen Überwachungsstaat. Vertreter von Regierungen und Firmen, die diesen digitalen Euro bauen sollten, beschwichtigten. Mit Ralf Wintergerst, CEO von Giesecke+Devrient, nach wie vor heißester Anwärter, um das Projekt in der EU umzusetzen, sprach ich in den vergangenen Jahren mehrmals zu dem Thema. Zuletzt im Dezember 24.
Wintergerst versichert stets zwei Dinge: Eine Abschaffung von Bargeld sei nicht geplant. Und nur, wenn die Fluchttore Bargeld, Gold und Bitcoin geschlossen werden, greift die dystopische Version. Und zweitens, so Wintergerst, habe niemand ein chinesisches System im Sinne. Der „digitale Euro“ sei für die Bürger gedacht und das Projekt unterliege demokratischer Kontrolle. Ob er Wintergerst und dem guten im Menschen Glauben schenkt, möge jeder Leser selbst entscheiden. Das Interessantere ist ohnehin, dass der digitale Euro ein strategisch dummes Projekt ist.
Dazu muss man wissen, dass eine solche Zentralbankwährung Banken im weitesten Sinne überflüssig macht. Kontos bei Privatbanken werden obsolet, genauso wie Spar-, Fest- und Tagesgeld-Strukturen. Deshalb soll der digitale Euro zunächst auf 3000 Euro pro Bürger beschränkt werden. Das ist also nicht als Maximal-Vermögen gedacht, das dann jedem sozialistischen Einheits-EU-Menschen noch zusteht, sondern dient dazu, das Bankensystem nicht kollabieren zu lassen. Aber wozu überhaupt „ein bisschen digitaler Euro“?
In den USA setzt man mittlerweile 100 Prozent auf die private Alternative: Stablecoins wie Tether (USDT) und Circle (USDC) sind nichts anderes als digitale Währungen. Nur sind sie nicht von einer Zentralbank ausgeben, sondern von privaten Anbietern. Tether hat technisch die Möglichkeit, einen Inhaber vom Zahlungsverkehr auszusperren. Nur dürfte es davon kaum Gebrauch machen, will das Unternehmen nicht rasant Kunden an die Konkurrenz verlieren. Da USDT und USDC mit US-Dollar gedeckt sind (oder zumindest sein sollten, looking at you, Tether!), stärken sie außerdem die Rolle des US-Dollars als Leitwährung. Und da die USA sich aktuell sehr über Käufer von Staatsanleihen freuen, um die Zinsen zu drücken, und Tether einer der größten Halter von US-Staatsanleihen ist, wird es den digitalen Dollar bis auf Weiteres nicht geben.
Den digitalen Yuan gibt es, aber von einer großen Akzeptanz oder Durchdringung der chinesischen Wirtschaft lässt sich nicht sprechen. Kontrolle kann der chinesische Staat ohnehin über seine omnipräsenten Apps WeChat und Alipay ausüben. Was den internationalen Zahlungsverkehr betrifft, scheint man aktuell eher auf Gold zu setzen.
Übrig also bleibt die EU mit einem Projekt, das bereits Milliarden an Entwicklungskosten verschlungen hat. Am Ende bleibt dann ein Mini-Digitaler-Euro in Höhe von 3000 Euro, den niemand wollte, und niemand braucht.
Helfen könnte er allerdings beim Projekt “Mobilisierung der Sparguthaben”. Der Ausdruck geht auf Friedrich Merz zurück. Ursula von der Leyen paraphrasierte ihn jüngst:
Irgendwie müssen die Billionen von Sparguthaben in Militär-Investitionen umgewandelt werden. Das wird am besten funktionieren mit Anleihen, die schlechter verzinst sind als sonst auf dem Markt üblich. Wie bringt man Leute dazu, dann ihr Geld dort zu investieren? Entweder man zwingt sie, oder man bewirbt die Anleihen mit viel Patriotismus und Propaganda. Die Verschwörungstheoretiker unter uns bekommen also bald Futter, wenn die „Spar- und Investitionsunion” vorgestellt wird.
Like, wenn Dein Aluhut glüht…
Hinter der Paywall: Wie das Trump-Derangement-Syndrom den Blick auf den Markt trübt. Wie es mit Bitcoin, Gold und Aktien weitergeht.**
-
@ b4403b24:83542d4e
2025-03-16 16:03:47As part of the platform-wide fee reduction initiative, we decided to align ~news territory post fees with the trend—giving you more exposure for less cost!
1️⃣ Reach a bigger audience without breaking the bank 2️⃣ Boost the best and #1 V2V news place making it even more attractive to users to contribute by sharing their part of the story 3️⃣ Take advantage of lower fees while the market is heating up
This is your chance to get noticed, drive engagement, and maximize your impact—at half the price!
Don’t miss out—post your news now!
originally posted at https://stacker.news/items/914776
-
@ a296b972:e5a7a2e8
2025-03-16 15:21:42Vor kurzem fand ein Interview mit Langemann und Tichy und dem Präsidenten der Europäischen Polizei Union Rainer Wendt (aktiv tätig in der CDU) statt. Quelle: https://www.youtube.com/watch?v=05c0h9MP_1c
Darin zu hören sind Aussagen von Herrn Wendt, die man sich auf der geistigen Zunge zergehen lassen muss.
So sagt er, dass die Polizei eine Vollzugsbehörde ist, die an die Weisungen ihrer politischen Führung, vor allem aber an Recht und Gesetz gebunden ist. Das ist soweit sachlich richtig.
Weiter ist zu hören, dass es die Aufgabe der Polizei ist, Recht in angemessener Weise durchzusetzen. Was ist angemessen und wer legt fest, was angemessen ist? Natürlich die politische Führung. Wer ist die politische Führung? Wie sind diese Personen in die politische Führung gelangt, was qualifiziert sie über Angemessenheit zu befinden. Sicher sind das nicht nur die durch Wahlen bestimmten Volksvertreter, sondern auch Juristen und andere Berater, bei denen man nachschauen könnte, wer sie bezahlt.
Herr Wendt findet, dass es die Einsatzkräfte gut gemacht haben. Er meint damit den Einsatz von Wasserwerfern auf Demos in Berlin; Rentner, die mit dem Grundgesetz in der Hand niedergerungen wurden; Menschen, die allein auf einer Parkbank saßen und verjagt wurden; Spaziergänger, die mit dem Streifenwagen verfolgt wurden; „Pisten-Rowdys“, die bei der Ski-Abfahrt im Freien keinen „Staubschutz“ getragen haben; Sport treibende Menschen im Englischen Garten in München, die durch einen tief fliegenden Polizei-Hubschrauber verschreckt und verjagt werden sollten. Die Beispiele ließen sich zahlreich ergänzen.
Technisch, ihrer Ausbildung entsprechend, haben die Kräfte diese Einsätze ihren Vorgesetzten gegenüber „stets zu ihrer vollsten Zufriedenheit“ ausgeführt, die Angemessenheit lässt jedoch sehr viele Fragen offen.
Weiter meint Herr Wendt, dass die Polizei die Kritik abkriegt, die eigentlich der politischen Führung gebühren würde. Bei dieser Aussage wird es heikel, denn das erinnert schon sehr an die Prozesse vor rund 80 Jahren in einer süddeutschen Stadt mit Burg, in der niemand etwas gewesen ist und man ja schließlich nur die Befehle der nächst höheren Vorgesetzten ausgeführt habe. Man konnte diese Kette in der Hierarchie so weit fortfahren, bis man bei der Person, die am Ende die Verantwortung zu tragen gehabt hätte, angelangt war. Diese sich jedoch durch Ableben einer Verantwortung entzogen hatte.
Wendt weiter „erklärend“ rechtfertigt die Vorgehensweise, in dem er behauptet, dass die Polizei angemessen vorgegangen sei, da sie erst Zwangsmittel angedroht und dann eingesetzt habe, nachdem jeder durch die Androhung die Möglichkeit gehabt hatte, sich zu entfernen. Kurz gesagt bedeutet das: Haut ab, sonst seid ihr selber schuld!
Noch einmal: „Jeder hatte die Möglichkeit, sich zu entfernen! An diese Regel müssen wir uns halten!“ Der letzte Satz ist aufschlussreich, denn er erinnert doch sehr an den bekannten Spruch des Herrn Wieler vom RKI: Die Maßnahmen sind nicht zu hinterfragen.
Vielleicht stammen diese beiden sehr ähnlichen Aussagen sogar von denselben Strippenziehern im Hintergrund? Es gibt reichlich Anzeichen dafür, dass das Militär in der C-Zeit eine nicht unerhebliche Rolle gespielt hat.
Dann kommt der nächste Ausspruch, der blinden Gehorsam voraussetzt: „Man kann sich das nicht aussuchen, ob man polizeilichen Anweisungen folgt oder nicht, sondern das muss man tun!“ Vielleicht war Herr Wendt in einem früheren Leben Hirtenhund in einer Schafsherde und es daher gewohnt, dass die Herde dahin rennt, wohin der Hirtenhund sie treibt.
Genau so gut kann irgendein Hansel es für angemessen halten, dass jetzt alle von der Mitte der Brücke aus in den Strom zu springen haben, und die Masse tut es in blindem Kadaver-Gehorsam. Vorher bitte Gehirn in den Offline-Modus umschalten. Irgendein Irrer kann befehlen, was angemessen ist, und alle haben zu folgen. Auch das hatten wir schon einmal, brauchen wir nicht mehr, kann weg, auf immer und ewig!
Herr Wendt meint, dass die Maßnahmen rechtsstaatlich und angemessen waren. Die Polizei hat sich da nichts vorzuwerfen. Wenn die Polizei aus derartig gehirnlosen Befehlsempfängern besteht, dann Gnade uns Gott, was sich kranke Gehirne sonst noch so ausdenken können, dass dann von Polizei-Robotern ausgeführt wird, ohne Befehle zu hinterfragen und ohne sie mit dem eigenen Gewissen vereinbaren zu müssen.
Vor rund 80 Jahren hat man die „Aktivitäten“ der Polizei mit den gleichen Argumenten zu rechtfertigen versucht. Auch damals handelte man rechtsstaatlich, auch wenn heute jedem klar ist, dass diese Rechtsstaatlichkeit in einem System stattfand, das heute jeder als Diktatur bezeichnet.
„Die Polizei hat sich da nichts vorzuwerfen.“ Damit ist für ihn der Fall erledigt. Wir haben doch nur unsere Pflicht getan und uns an die herrschenden Gesetze gehalten. So einfach ist es auch heute noch, sich hinter Vorschriften zu verstecken und den Verstand vollkommen außen vor zu lassen.
Welche Regierungsform hat ein Staat, der eine von der sogenannten politischen Elite vorgegebene Rechtsauffassung gegen das eigene Volk durchsetzt? Wie kann man sich noch mehr zur Demokratie und zur Akzeptanz des Grundgesetzes bekennen, als wenn man es für alle sichtbar hoch in den Himmel streckt?
Ein Staat ist moralisch am Ende, wenn das ausführende Organ, die Polizei als Teil der Exekutive, ohne eigenes Denken Befehle ausführt, die bei eigenem Nachdenken und mit einem stinknormalen „Lieschen-Müller-Hausverstand“ nicht als angemessen empfunden werden können.
Statt als Schutz der Bürger zu dienen („Die Polizei, Dein Freund und Helfer“), geht bei solch einer Vorgehensweise eher eine Gefahr von denjenigen Polizei-Kräften aus, die bei Dienstantritt ihr eigenes Gehirn in den Spint legen und mit Anlegen der Dienstuniform auch ein Staatsgehirn in den Schädelraum einsetzen.
Hüter des Gesetzes werden so zu Erfüllungsgehilfen eines diktatorischen Staates und somit zum Schaden, statt zum Nutzen des Volkes missbraucht. Und wenn diese Polizisten sich zu Erfüllungsgehilfen machen lassen, sind sie nicht mehr wert, als der ganze Staat für den sie tätig sind. Langfristschaden: Vertrauensverlust.
Es wird hier ganz deutlich ein Fehler im System sichtbar, wenn es auch heute noch, 80 Jahre nach der Weltkatastrophe, in der Bundesrepublik Deutschland, einem angeblich demokratischen Staat, möglich ist, dass es immer noch eine nächsthöhere Instanz gibt, auf die man die Verantwortung schieben kann, bis sie im Nirvana verschwindet. Häufig ist das das Bundesverfassungsgericht, das neuerdings staatstragende, staatserhaltende Urteile spricht (siehe aktuelle Bundestags-Entscheidung), die erneut zeigt, dass wir es hier mit einem in sich geschlossenen System namens -Unseredemokratie- zu tun haben, dessen Aufgabe aus nichts anderem besteht, als sich selbst zu erhalten. Was das noch mit Demokratie zu tun hat, erschließt sich dem Verfasser nicht.
Da weder das deutsche Volk, noch die restdemokratischen Strukturen und schon gar nicht der politische Wille da ist, da er sich immer mehr als Feind im eigenen Land herauskristallisiert, dass Deutschland seinen totalitären Kurs verlässt und wieder auf demokratische, vernunftorientierte Wege zurückkehrt, bleibt nur zu hoffen, dass noch einmal Kräfte von außen einschreiten, um dem voranschreitenden Demokratie-Abbau ein Ende zu bereiten.
-
@ 078d6670:56049f0c
2025-03-16 15:04:46I statued mid-thought, between puffs. A dark shadow had alighted on the deck railing, just missing a moonbeam.
I remained motionless for an eternity, until I became a little bored. There was no movement, except in my mind. A desire rose in me for another puff, but I resisted. I preferred a photo first. I deliberated on my action plan for a couple of minutes. First, I placed the charred joint on the armrest, relieved the movement didn’t create a disturbance. Maybe it was facing away from me and hadn’t noticed me in the dark of the eve.
Second, I opened the blanket and retrieved my phone. I activated camera mode in the cocoon of the blanket, checking the flash was off. I fired off a few shots, first in normal photo mode, but all I captured was a few streetlights penetrating through the trees. Next, in night mode I guessed a few zoom options and index-fingered some hope.
After exhausting all possible photographic options, except one, the flash, a little boredom crept back in. That, and the desire for another puff. I had my fill of magical moments and was ready to return to my sitting, my normal life. I was okay with the owl flying off, so I flicked the lighter and inhaled a momentarily blinding orange flame. Probably too much butane. The owl remained.
The owl knew I was there. I felt a little honoured the owl was at ease with me, and returned to my peace, my gaze to the stars. My periphery vision included the nocturnal visitor, but my attention drifted back to normal star wonder (or is it unexplained expectation?).
I wasn’t surprised when the nocturnal visitor spread it’s wings and disappeared into the darkness. I wasn’t saddened by its leaving, but by my not being attentive to the moment. I drifted back into the traffic of random thoughts. Moments blurred in the returning sleepiness.
-
@ 8d34bd24:414be32b
2025-03-16 14:26:57As I mentioned in a previous post, I am currently reading the book The Unwavering Resolve of Jonathan Edwards by Steven J. Lawson. The primary subject of this book is Jonathan Edward’s 70 Resolutions for his life that he made between the ages of 18 and 20 when he was first out on his own and was a new pastor of a Presbyterian church. Here are Jonathan Edwards’s Resolutions.
Reading some of his resolutions made me think I should write some resolutions for my life. They are basically goals for my life and ways to keep me working towards these goals. Since my goals are lofty and I have a long way to go to fulfill them, I decided to add a prayer to each resolution because I can only succeed in fulfilling these resolutions by the power of the Holy Spirit.
I started originally with my own preamble, but Edwards’s preamble was so much better, so I went with his. The preamble is from Edwards, but the resolutions and prayers are mine.
My Resolutions for a Godly Life
“Being sensible that I am unable to do anything without God’s help, I do humbly entreat him by his grace to enable me to keep these Resolutions, so far as they are agreeable to his will, for Christ’s sake:”
-
RESOLVED: To seek to glorify God with my thoughts, words, and actions and to do nothing that harms God’s reputation or that of His church. \ Father God, help me to glorify You with my thoughts, words, and actions. Take away from me any desires that are not for Your glory. Help me to understand what an awesome and holy God You are so I may glorify You with every bit of my being and glorify You before men.
-
RESOLVED: To seek to do all good things for God’s glory and not my own. \ Father God, help to do what is right and good in Your sight and help me to do it with the right motives of thankfulness for what You have done for me and to glorify You. Do not let pride or self serving be my motivation or harm my good works in Your name.
-
RESOLVED: To daily acknowledge that I am unable to keep these resolutions without the guidance and power of the Holy Spirit and divine grace. \ Father God, please enable me to live out these resolutions, in so much as they agree with Your perfect will. Help me to lean on Your power and not my own so everything I do is for your glory.
-
RESOLVED: To read the Bible every day, unless I am too sick to do so, and to read through the whole Bible every year, so I may know Your word and apply it to every part of my life. \ Father God, give me a hunger for Your word so I long for my time in Your word. Give me joy in Your word and don’t allow it to be a burden that I do solely out of feelings of obligation. Help me to know You better through Your word and to understand Your word, apply it in my life, and faithfully share it with those around me in a manner that is glorifying to You.
-
RESOLVED: To accept every word in the Bible as perfect truth. When I find something that doesn’t make sense, seems wrong, or seems to contradict another passage in the Bible or something considered true by science or culture, I will seek to discover whether it is my misunderstanding of what the Bible is saying, whether it is science/culture that is wrong, or whether the problem is within me. I will seek the full truth through the Holy Spirit knowing that Your word is truth. \ Father God, help me to understand and submit to Your word, whether it is convenient or not and whether it is easy or not. Align my mind, heart, and spirit with Your will so I can understand Your word and so that it becomes part of who I am. Prevent me from ever modifying Your word or the meaning of Your word to meet my desires or to make my interaction with others easier.
-
RESOLVED: To seek to faithfully speak the truth in love to all people. To speak the truth, the whole truth, and nothing but the truth. To add nothing to the truth defined by the Bible and to leave no uncomfortable biblical truth out of my speaking Your truth. \ Father God, help me to always be faithful to Your word and Your will. Don’t let me ever seek to add or subtract from Your perfect word. Help me to love people enough to share the truth, the whole truth, and nothing but the truth even if this makes interaction uncomfortable and even if it requires time that I don’t feel I have.
-
RESOLVED: To seek the eternal wellbeing of those around me even if that is uncomfortable in the moment. \ Father God, help me to see the people around me as You see them. Help me to speak the truth in love. Help me to not fear hurting a relationship that lead me to not share the whole truth, but also help me to not be so concerned with the truth that I trample Your children.
-
RESOLVED: To seek to live the truth that my citizenship is in heaven and I am just a resident alien here in America. \ Father God, help me to make every decision for every word I speak, every action I take, and every thing on which I spend my time be with the eternal consideration of my citizenship in heaven and the desire for others to join us in heaven.
-
RESOLVED: To seek the wellbeing of the city, county, state, and nation where I live through voting, speaking the truth, and witnessing to bring people into the heavenly kingdom. To seek to find the perfect balance between seeking good for my earthly neighbors while not spending too much time taking away my focus on biblical and salvation issues to Your glory. \ Father God, help me to do what is right for the good of the country and land in which I live while not taking away time from doing Your work for Your kingdom. Help me to find the right balance of earthly and heavenly responsibilities and priorities.
-
RESOLVED: To seek to always put honoring God above honoring my country and to seek eternal good above momentary comfort. \ Father God, help me to keep all of my priorities aligned with Your will and to pledge my allegiance to You alone and above all other allegiances. Help me to see everything according to Your perspective, especially with a view towards eternity.
-
RESOLVED: To seek to serve those around me just as Jesus served His disciples and the sinners of the world. To seek to put others good above my own. \ Father God, give me the desire to serve those around me: in my family, in my church, in my business, in my community, and beyond. Help me to have the mental and physical strength to serve and to not be overwhelmed with my earthly and heavenly responsibilities. Help me to put the good of others above my own desires.
-
RESOLVED: To seek to align my will with God’s will and my priorities with God’s priorities. \ Father God, align my will with Your own will. Help me to submit to Your will in all things. Help me to find joy and peace in obeying and following You. Keep me on the path You have created for me.
-
RESOLVED: To be careful to spend my time primarily on things that matter eternally and to not be distracted spending time on things that may seem urgent, but have no eternal significance. \ Father God, I am so easily distracted by “urgent” responsibilities of this world. Help me to see my life as You see it so I can set my priorities right according to Your will. Help me to not only not be distracted by unfruitful works, but also help me to spend my time on the best and most fruitful activities and not just on the good.
-
RESOLVED: To seek to use the wealth You have given me to honor Your and to serve my fellow mankind, especially fellow believers and to bring people to You. \ Father God, help me to so align my priorities that I do not hold on to my physical possessions or wealth, but spend it in a way to multiply heavenly wealth to Your glory. Make my financial priorities always align with Your own.
-
RESOLVED: To seek to honor my parents even if I strongly disagree with them and even if they are not being loving or respectful in return. \ Father God, sometimes I have trouble finding a right balance in honoring my parents since they are not believers and have opposing world views. Help me to find the right balance between being faithful to You and honoring my parents. Help me to honor my parents in such a manner that they are drawn to You and can come to know You like I do.
-
RESOLVED: To seek to honor my husband, especially to speak up about how grateful I am for him and who he is. To seek to be a helper and a support to my husband, especially in the support of our family and in his ministry. \ Father God, help me to be more vocal about my appreciation of my husband. It is so easy to get busy with life and to not speak up about how much I love and appreciate him. Help me to be the helper I was designed to be and to lift him up rather than to drag him down.
-
RESOLVED: To seek to be available to witness or disciple anyone who wants to know more about You, God. \ Father God, help me to see the need in those around me and to take the time out of my busy life to share You and Your word with whomever You have put in my path. Help me to not let the urgent overcome the important. Help me to witness or disciple based on who they are and their needs rather than just the manner that is comfortable to me.
-
RESOLVED: To seek to find the right balance between defending the truth of Scripture and loving my fellow man in a way that is neither divisive nor demeaning. \ Father God, help me to balance truth and love. Help me to not get so passionate about Your truth that I trample the souls of those I am trying to bring to You. Help me to not be so gentle that I withhold part of Your truth and not so forceful that I drive them away. Help me to listen to Your leading so I can be used as a tool in Your hand to Your glory and the well-being of those around me.
-
RESOLVED: To pray daily and continually and to include You, God, in every decision, small and big. To make talking to God a part of everything I do and think. \ Father God, guide every decision I make, no matter how small, to be in complete submission to Your will. Help me to talk to You continually about every joy and sorry, about every need and answered prayer, and about how much I appreciate who You are and what You have done for me. Help me to include You in every part of my life. Help me to not only speak, but to listen.
-
RESOLVED: To pray “Your will, not mine be done” and to mean it with every ounce of my being.\ Father God, help me to submit my will to your own, especially in my desires for myself and others. Help me to so trust you that I automatically trust your answer to prayer and guidance in prayer. Help me to trust your will even when I don’t understand it.
-
RESOLVED: To pray more for people’s spiritual well-being than for their physical well-being. \ Father God, help me to see people as you see them and to see their needs as you see their needs. Help me to understand and pray for their most important needs — the spiritual and eternal needs and not to just see and pray for physical needs that are a problem today, but don’t matter for eternity.
-
RESOLVED: To seek to be an encouragement and to support (emotional & financial) our church pastors, elders, deacons, and others in ministry. \ Father God, help me to support and encourage our pastors, elders, and deacons in all they do in Your service. Help me to be the encouragement that helps them in their work when they have been dragged down by complainers. Help me to provide whatever help is needed to enable them to shepherd the church.
-
RESOLVED: To seek to be a godly example to others, especially my kids, so that they may know about You, know You personally, and become more like You. \ Father God, help me to live a life that honors You and helps those around me to see You. Continually mold me in Your image to Your glory. Help me to live a life so devoted to You that I am honoring You whether there are witnesses around or not. Make every good work be in Your honor.
I’m sure, like Edwards, I will add more resolutions over time. I hope these resolutions have made you think and that maybe you may decide to adopt some of these resolutions for yourself.
I’d love to hear what resolutions you would add or how you would change any of these I’ve listed.
May the God and Creator of the universe mold you and carve you to become more like Himself. May He help make you more like Jesus and help you to implement a life in His honor.
Trust Jesus
-
-
@ 57d1a264:69f1fee1
2025-03-16 14:17:25Recently we shared an update for a new Open Cash Foundation website https://stacker.news/items/811604/r/Design_r Today a new logo by Vladimir Krstić!
File available for review at https://www.figma.com/design/Yxb4JEsjHYSibY06T8piB7/OpenCash%3A-Logo?node-id=151-249&p=f&t=FYyeTBkJznCKdbd7-0
https://primal.net/e/nevent1qvzqqqqqqypzqhzsmgfjj3l68068t84e0rtcfkcjh2k3c0jmdft4gy9wke2x8x6tqyg8wumn8ghj7efwdehhxtnvdakz7qgkwaehxw309ajkgetw9ehx7um5wghxcctwvshszrnhwden5te0dehhxtnvdakz7qpqryz9rj0wgshykjuzqksxxs50l7jfnwyvtkfmdvmudrg92s3xuxys8fqzr7
originally posted at https://stacker.news/items/914665
-
@ 86458a15:56855ed3
2025-03-16 11:10:448KI là một hệ sinh thái kỹ thuật số tiên tiến, mang đến cho người dùng trải nghiệm hoàn hảo với thiết kế giao diện trực quan, dễ sử dụng và tối ưu trên nhiều thiết bị. Từ những tính năng độc đáo đến khả năng truy cập linh hoạt, nền tảng này đáp ứng mọi nhu cầu của người dùng, dù là người mới hay đã có kinh nghiệm. Hệ thống được phát triển với công nghệ tiên tiến, giúp tốc độ tải nhanh, hiệu suất ổn định và khả năng hoạt động mượt mà ngay cả trên các thiết bị di động. Với mục tiêu không ngừng cải tiến, 8KI liên tục cập nhật các tính năng mới, mang lại sự tiện lợi và hiện đại cho người dùng. Đây không chỉ là một nền tảng kỹ thuật số đơn thuần mà còn là một không gian lý tưởng để khám phá và tận hưởng những trải nghiệm phong phú.
Một trong những yếu tố quan trọng làm nên sự khác biệt của 8ki chính là tính bảo mật và sự an toàn tuyệt đối mà nền tảng này cam kết mang lại cho người dùng. Hệ thống sử dụng công nghệ mã hóa tiên tiến, đảm bảo mọi thông tin cá nhân và dữ liệu giao dịch luôn được bảo vệ nghiêm ngặt. Ngoài ra, đội ngũ kỹ thuật của 8KI liên tục giám sát và nâng cấp hệ thống để ngăn chặn mọi rủi ro có thể xảy ra, đảm bảo một môi trường trải nghiệm ổn định và đáng tin cậy. Không chỉ vậy, đội ngũ hỗ trợ khách hàng của 8KI luôn sẵn sàng hoạt động 24/7, giúp người dùng giải quyết mọi thắc mắc nhanh chóng và hiệu quả. Nhờ đó, người dùng có thể tận hưởng mọi tính năng của nền tảng mà không cần lo lắng về bất kỳ vấn đề nào liên quan đến bảo mật hay quyền riêng tư.
Không chỉ chú trọng đến công nghệ và bảo mật, 8KI còn đặc biệt quan tâm đến trải nghiệm người dùng với sự đổi mới và sáng tạo không ngừng. Nền tảng này luôn cập nhật những xu hướng công nghệ hiện đại nhất để mang đến nhiều tiện ích và tối ưu hóa hiệu suất. Bên cạnh đó, 8KI cũng xây dựng một môi trường thân thiện và gần gũi với người dùng, giúp họ dễ dàng tiếp cận và tận hưởng mọi tính năng mà không gặp phải bất kỳ rào cản nào. Với định hướng phát triển bền vững và luôn đặt người dùng làm trung tâm, 8KI cam kết tiếp tục đổi mới, mang lại những trải nghiệm tuyệt vời và đáp ứng nhu cầu ngày càng cao của cộng đồng kỹ thuật số hiện đại.
-
@ 2850567c:83c026bf
2025-03-16 09:05:26Bitcoin is really the store of energy. Just like energy cannot be produced and only converted, just like it is finite, is bitcoin. Energy itself has no value for anybody. Unless we can use a certain form of energy for something useful. Bitcoin is also trying to follow the same parameters.
Bitcoin is not a get rich scheme. It is only store of value. Its price is only in fiat currency, is only incidental. Its price has no meaning.
You store any amount of bitcoins or satoshis, one has two options. Either to exchange fiat currency in a market or to spend energy to produce the last few bitcoins that are left to be produced. In both these options, will require energy.
To just be able to buy using USD/INR/GBP/EUR/etc the buyer needs to have done the some in the society. Buyer could steal it, inherit it, cheat it, farm it, manufacture it, give any services, all is equal. Bitcoin does not judge anybody and has no morality. The fiat currency obtained with whatever means can be used to exchange into bitcoins. The person who sold it will eventually realize his error and wont be selling it again. And gradually to be able to buy bitcoin using fiat will only get harder an d harder.
The other way still open for now is mining it by spending energy. Even here, the miner will need access to fiat to buy both the tools for mining, and the constant flow of electricity which can run the mining operation. Even here, the fiat currency is required, obtained with whatever means. The amount may differ based on region and time period. Even here the amount of electricity needed and the cost of tools needed will gradually keep getting harder. Will continuously need further more and more fiat.
Fiat currency is one of the major evils of this age. The amount of work needed to produce fiat is not the based on an operating free market. The fiat currency has a tendency to over produce itself at will, more than the amount of goods or services available to be bought with that fiat. That is the evil called inflation. And this is also the reason why Bitcoin's price in fiat terms fluctuates so often. Bitcoin's price has to continuously absorb real and fictitious fiat value and re-adjust itself. This re-adjustments are only limited to traders of Bitcoin who are watching its price.
The other group of bitcoin holdlers are ones who choose not to sell their bitcoins only due to its price changes. For them bitcoin has no price. These people sell their hard work, obtain fiat, sell the spare fiat and finally store their hard work only in bitcoin. They keep trying to exchange their fiat into bitcoin as many times they could, regardless of the price.
Now comes the question of whats is the use of storing humans hard work, into a stronger asset like Gold or Bitcoin. The wealth obtained by ones hard work is most expensive. Hard work requires spending life's time. Human time is not infinite. The time we spend in our life on something is spent and never comes back. Therefore it is most important to be cautious on how we save and spend our time on. If we ask a mason for making us a home, the mason had to exchange a small portion of his finite life in making a house. He should rewarded in the same manner as is is value of that time spent. And just life his life's time that is spent permanently, he should be able to store that value also permanently. That is why we would all prefer top store our hard work in stronger assets. Value of such stronger assets should be changed by anybody, not by any government, by act of war, by any thieves or even by time itself.
Finally there are the advantages of storing ones hard earned wealth (a.k.a life's time) in a strong asset. A society where and all its members are storing their hard work in a stronger asset, will naturally finds that equilibrium where it begins to give value to only things that matter. All wealth is now guaranteed to be earned by hard work. This wealth will not be exchanged for anything that does not have matching hard work. There can be little to no waste cause now to waste, will require real life's time spent on easy work or no work at all. Now for anybody with any skill will have to race with their hard work, not lies. The goods and services in such society will all become precious. Nobody here is able to create wealth by manipulation. The amount of value of bitcoins is open to be verified by everyone. It cannot be changed or even hidden.
Bitcoin is only trying to be a perfect store of value. It learned many good properties from Gold, which lasted 5000 years. But now with advancements of technology in both mining gold and storing gold, is not able to preserve its value. Transporting gold was a problem from the beginning and its divisibility was very limited. Bitcoin for now uses the internet for its transport which is a backbone of all global commerce. Bitcoin solves the divisibility by allowing 100 million parts. Gold still stands decentralised by allowing physical access. Bitcoin too allows allows physical access in a different form. It being digital in nature, the physical access is about storing the cryptographic private keys. Gold still is as rare but with advancements in metal processes, its 100% verification is out of reach of common people. Bitcoin makes sure verification stays decentralised, accessible to every one and 100% accurate.
-
@ 86458a15:56855ed3
2025-03-16 11:09:51YYCasino là một nền tảng trực tuyến hiện đại, mang đến cho người dùng trải nghiệm kỹ thuật số đẳng cấp với giao diện tinh tế và dễ sử dụng. Nhờ thiết kế tối ưu, nền tảng này cho phép người dùng dễ dàng truy cập và khám phá các tính năng đa dạng mà không gặp bất kỳ trở ngại nào. Dù bạn là người mới hay đã có kinh nghiệm, YYCasino vẫn đảm bảo sự thuận tiện tối đa với khả năng tương thích trên nhiều thiết bị khác nhau. Điều này giúp người dùng có thể tận hưởng mọi tính năng mọi lúc, mọi nơi mà không lo gián đoạn. Không chỉ chú trọng vào trải nghiệm người dùng, YYCasino còn liên tục cải tiến hệ thống để mang lại hiệu suất tối ưu, từ đó tạo ra một môi trường kỹ thuật số chuyên nghiệp và đáng tin cậy.
Một trong những ưu tiên hàng đầu của YYCasino chính là bảo mật và sự tin cậy. Nền tảng này được xây dựng dựa trên công nghệ tiên tiến, áp dụng các giao thức bảo mật nghiêm ngặt để đảm bảo an toàn tuyệt đối cho thông tin và giao dịch của người dùng. Hệ thống liên tục được cập nhật để ngăn chặn mọi rủi ro tiềm ẩn, mang đến sự an tâm tuyệt đối cho cộng đồng người dùng. Hơn nữa, YYCasino sở hữu một đội ngũ hỗ trợ khách hàng chuyên nghiệp, hoạt động 24/7 để kịp thời giải đáp mọi thắc mắc và xử lý các vấn đề phát sinh. Nhờ đó, người dùng luôn cảm thấy yên tâm và có được sự hỗ trợ tốt nhất trong suốt quá trình trải nghiệm trên nền tảng.
Không chỉ dừng lại ở việc cung cấp một nền tảng kỹ thuật số mạnh mẽ, YYCasino còn không ngừng đổi mới để nâng cao chất lượng dịch vụ. Với sứ mệnh mang đến những trải nghiệm hiện đại và phong phú, YYCasino luôn cập nhật các xu hướng công nghệ mới nhất để cải thiện tính năng và tối ưu hóa hiệu suất. Bên cạnh đó, nền tảng này còn chú trọng đến yếu tố cộng đồng, tạo ra một không gian tương tác thân thiện và hấp dẫn, giúp người dùng có thể tận hưởng trọn vẹn những tiện ích mà YYCasino mang lại. Với định hướng phát triển bền vững, YYCasino cam kết không ngừng nâng cao trải nghiệm người dùng, đồng thời đảm bảo sự an toàn, tiện lợi và sáng tạo trong mọi hoạt động.
-
@ 10057360:d01ac746
2025-03-16 08:40:33Natürliche Prozesse streben nach Divergenz
These: Alles ist ein Resultat von systemischen Zyklen. Systemische Prozesse lösen eine Aktionen in eine bestimmte Richtung aus. Die Bewegung in diese bestimmte Richtung provoziert automatisch eine Gegenreaktion, und je weiter fortgeschritten die Bewegung ist, desto stärker wird die Gegenreaktion bis schlussendlich eine Richtungsänderung initiiert wird. Danach wird dieses Muster wiederholt - bis in die Unendlichkeit. Die Ausprägung der Bewegung in eine Richtung, sprich die Amplitude, nimmt mit der Zeit ab, da das System die Divergenz anstrebt - Ein Zustand der der Ruhe und Ausgeglichenheit.
Der Heizungssensor zuhause misst beispielsweise, ob die Zieltemperatur erreicht wurde, oder ob stärker oder gerade gar nicht geheizt werden soll. In der Natur, regulieren Raubtiere die Population ihrer Beutetiere (und dadurch schlussendlich auch ihre Eigene). In unserer Gesellschaft, suchen wir als Schwarmintelligenz ganz natürlich nach dem idealen Tausch- & Wertaufbewahrungsmittel, überdenken staatliche Organisationsformen oder justieren politische Richtungen. Entsprechend optimieren wir auch die Art und Weise, wie wir Informationen austauschen und verifizieren.
Auf die Entwicklung der Medien angewendet bedeutet dies: Die Medien, mitsamt ihrem Tenor, ihren Werten, ihrer Organisationsstruktur und sonstigen Ausprägungen sind das dynamische Resultat von Zyklen. Das System setzt sich in diesem Kontext zusammen aus unserer heterogenen Gesellschaft, den darin zugrunde liegenden Werten, dem Zeitgeist und vielen weiteren Faktoren, welche für eine hohe Komplexität sorgen. All diese Faktoren können eigene Prozesse auslösen, welche unterschiedlich stark Gegensteuern und zu unterschiedlichen Zeitpunkten einsetzen.
Der Wake-up Call: Als jüngst die Amplitude wieder erreicht wurde
Die Geschichte der letzten Jahre hat uns aufgezeigt, in welchem Zustand sich die vierte Gewalt eigentlich befand. Es wurde offensichtlich, dass die Kritik- und Kontrollfunktion gegenüber dem Staat einer Quasi-Zusammenarbeit gewichen war. Dies war kein plötzlicher Wandel, sondern das Resultat eines längeren Prozess, der während Corona seinen Peak erreicht hatte.
Wir hatten Ausnahmezustand; die vier Gewalten haben gemeinsame Sache gemacht. Die Legislative hat im Eiltempo neue Gesetze verfasst, welche Grundrechte der Menschen einschränkte. Die Exekutive hat diese unverzüglich umgesetzt und die Judikative untermauerte das neue Normal. Die Medien als vierte und letzte Gewalt haben das Ganze dann auch noch abgefeiert und Kritik so gut es ging unterdrückt (Build back better). Zu allem Übel war dies auch ein weltweites Phänomen, welches von autoritären Staaten bis hin zur westlichen Demokratie(?) reichte. Man konnte sich dem nur schwer entziehen. Der Druck auf den normalen Bürger wurde immer stärker und all die Globalisten, Kommunisten, Sozialisten und sonstigen Kriminellen, welche sich einmal jährlich in Davos treffen, durchlebten gerade ihre wildesten Fantasien.
Die Geschichte reimt sich
An einem bestimmten Zeitpunkt war der Peak erreicht, ohne dass es jemandem wirklich bewusst war. Gegensätzliches wurde massiv zensiert, was die Orientierung erschwerte. Dennoch war der Widerstand in der Bevölkerung nie vollständig weg. Es gab immer Menschen, welche Akteuren und Geschehnissen kritisch gegenüberstanden. Diese Opposition war ein Flamme, die nie erloschen ist. Das gallische Dorf, dass von den Römern nie eingenommen werden konnte. An eben diesem Peak, war die Flamme am kleinsten und der Raum am dunkelsten. Doch auch das Ungleichgewicht am grössten: Lügen und Narrative können nicht für immer aufrecht erhalten werden. Die Wahrheit bannt sich ihren Weg. Und so wurde die Flamme und damit auch der Raum immer heller. Gradually, then suddenly.
Immer mehr Menschen verstanden, dass sich der Mainstream hauptsächlich aus Marketing-Unternehmen zusammensetzt, welche nur den eigenen Interessen (und deren Geldgebern) dienen. Dass soziale Plattformen zensierten und Reichweiten einschränkten. Dass die Spaltung in der Gesellschaft gefördert wurde. Dass vieles schlicht erfunden und gelogen war. Die Deutungshoheit des Mainstreams hatte seinen Zenit erreicht. Der Schweizer Historiker Daniele Ganser zeigt (in einer sehenswerten Analyse des Carlson-Putin Interviews) deutlich, wie sich die medial Berichtserstattung unterscheidet, und alles andere als unabhängig und faktenbasiert ist (watch?v=v_o0DnTbumA)
Actio = Reactio. So wurden Alternativen gesucht. Und wo Nachfrage besteht, lässt das Angebot nicht lange auf sich warten. Telegram-Kanäle sind wie Pilze aus dem Boden geschossen. Alternative und unabhängige Medien erzielten immer mehr Reichweite und so hat das Momentum fahrt aufgenommen. Der Wind hat längst gedreht, und nur Wenigen war dies zu Beginn wirklich bewusst. Die Journalistin Polina Pompliano hat dies im Bezug auf die Trump-Wahl ganz gut auf den Punkt gebracht (watch?v=mbcbYVEj2AM). Der Mainstream ist die Bubble.
Egal, wie gross und mächtig die dominierenden Akteure auch sein mögen. Solange nicht auch der letzte Kritiker überzeugt oder endgültig zum Schweigen gebracht wurde, besteht Gegendruck. Und mag diese auch noch so klein und bedeutungslos erscheinen, ist es doch nur eine Frage der Zeit, bis dieser die richtigen Bedingungen erfährt und das Potential entfalten kann.
Die Divergenz führt zur Dezentralität
Das Schöne? Aus dieser düsteren Zeit mit den ganzen globalistischen, planwirtschaftlichen und zentralistischen Tendenzen, ist als logische Konsequenz eine Gegenbewegung von dezentraler Natur entstanden. Actio = Reactio. Plankton scheint alleine zwar unbedeutend, im Verbund spielt er jedoch einen essentielle Rolle im gesamten Ökosystem der Erde. Satoshi hat mit Bitcoin ein open-source Protokoll erschaffen, welches die dezentrale Antwort bietet auf die zentralen Geldschöpfungsmonopole. Es war die logische Konsequenz. In hindsight inevitable. Und dasselbe gilt auch für die Medien.
Die Medien hatten sich immer weiter zentralisiert, Meinungsmonopole geschaffen. Die Themen folgten Agenden. Ausgewogene, kritische oder investigative Artikel wurden selten. Die Zentralität wurde ausgenutzt und unbequeme Stimmen zensiert.
Joe Rogan erlebte einen massiven Anstieg an Spotify-Abonnenten und war damit der mit Abstand grösste Podcast, nachdem er auch kritischen Stimmen wieder eine Plattform bot (Dr. Robert Malone, Dr Peter McCullough, Dr. Aseem Malhotra, um nur ein paar zu nennen). Ihm haben es viele gleich getan. Der Markt hat die ächzende Nachfrage bedient. Die Wahrheit bahnt sich ihren Weg. Ein Wermutstropfen blieb dennoch. Die Joe Rogan Show und wie sie alle heissen, basieren nach wie vor auf zentralen Plattformen. Alphabet’s Youtube, Meta’s Instagram, Elon Mask’s X können mit einem Fingerschnipp Videos, Bilder und Posts zensieren (siehe beispielsweise Twitterfiles). Und auch wenn mit Elon Mask’s Übernahme von X der Zensur vorübergehend ein Ende gesetzt wurde, bleibt die Frage, wie lange dieser Zustand anhält.
Zentralität ist ein Faktor, der in falschen Händen als Waffe eingesetzt wird. Die Frage ist nicht ob, sondern wann diese Waffe eingesetzt wird (Beispiel Moneyprinter). Und so ist die einzig logische Schlussfolgerung: Dezentralität.
Mit Nostr wurde eine dezentrale open-source Alternative geschaffen. Und genauso wie Bitcoin anfangs hauptsächlich von Nerds, OGs* *und anderen Glückspilzen gefunden, verstanden und adaptiert wurde, wird es auch bei Nostr sein. Man muss die Weitsicht, die Sensitivität oder die Notwendigkeit verspüren, um Nostr zu adaptieren. Es handelt sich um eine Grassroots-Bewegung; Bottom-up statt Top-down. Wie Bitcoin. Und diejenigen, welche aktuell von der Zentralität am meisten profitieren, werden wohl die Letzten sein. Genau wie bei Bitcoin.
Die Zukunft ist unabhängig, dezentral und zensurresistent
Auf https://stats.nostr.band/ findet man aktuelle Daten zu Nostr. Unter anderem auch die Gesamtzahl User.
Einerseits ist ersichtlich, dass Nostr ein kontinuierliches Wachstum erfährt und damit die Adoption stetig voranschreitet. Andererseits wird auch klar, dass Nostr noch ziemlich am Anfang steht. Auch in diesem Aspekt können wir uns an Bitcoin orientieren und die Adaptions-Kurve als Leitfaden verwenden.
Langfristig führt kein Weg an Nostr vorbei. In hindsight, inevitable. Die Zukunft ist dezentral und open-source. Sie ist das Resultat des Zyklus, der durch den gesellschaftlichen Entwicklungsprozess vorgegeben wird, welches den zentralen Tendenzen natürlich entgegenwirkt. Bitcoin veranschaulicht dies deutlich. Gerade aktuell wurde mit der open-source Lösung von DeepSeek eine Mögliche Trendwende im AI-Bereich eingeläutet. Und die Medienlandschaft wird gerade von dem open-source Protokoll Nostr revolutioniert.
Die Zukunft scheint also goldig für den durchschnittlichen Pleb. Sie war und ist es immer gewesen. Um diese zu erkennen, bedarf es lediglich einer langfristigen Perspektive (if in doubt, zoom out) sowie der Fähigkeit, die ganze Noise auszublenden.
PS: Falls Du noch keinen Nostr-Account hast, kannst du einfach auf https://nosta.me/ einen Account erstellen und einen der vielen Nostr-Clients nutzten (https://nostrapps.com), um bereits jetzt schon die Zukunft mitgestalten.
PPS: Dies ist mein erster Artikel als (neben-)freiberuflicher Journalist. Mein Fokus ist Libertarismus und Freiheit, und alles was damit einhergeht. Falls dir der Beitrag gefallen hat, lass doch ein Abo da und teil den Beitrag (oder auch nicht! - Wer bin ich, um dir was vorzuschreiben ;) Wenn dir dieser Beitrag was Wert ist, supporte mich mit ein paar Sats. Only value for value.
-
@ da0b9bc3:4e30a4a9
2025-03-16 08:11:16Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/914483
-
@ 86458a15:56855ed3
2025-03-16 11:05:05Lucky99 mang đến một nền tảng hiện đại với công nghệ tiên tiến, tối ưu hóa trải nghiệm người dùng trên nhiều thiết bị khác nhau. Giao diện trực quan, thao tác mượt mà cùng hệ thống phản hồi nhanh giúp người dùng dễ dàng truy cập và sử dụng mọi lúc, mọi nơi. Nền tảng này luôn cập nhật các công nghệ mới nhất để đảm bảo tốc độ xử lý nhanh chóng, giúp người dùng tận hưởng trải nghiệm tốt nhất. Với việc liên tục cải tiến, Lucky99 mang lại môi trường sử dụng thân thiện, giúp người dùng có thể dễ dàng làm quen mà không gặp trở ngại về kỹ thuật.
Không chỉ dừng lại ở việc phát triển công nghệ, Lucky99 còn tập trung vào dịch vụ hỗ trợ khách hàng nhằm mang lại sự hài lòng tối đa. Đội ngũ hỗ trợ chuyên nghiệp luôn sẵn sàng giúp đỡ 24/7, giải đáp mọi thắc mắc một cách nhanh chóng và chính xác. Bất kể vấn đề gì, từ hướng dẫn sử dụng đến hỗ trợ kỹ thuật, người dùng đều có thể liên hệ qua nhiều kênh như trò chuyện trực tuyến, email hoặc tổng đài. Sự tận tâm trong dịch vụ khách hàng giúp Lucky99 xây dựng được niềm tin vững chắc, tạo nên sự khác biệt so với các nền tảng khác.
Một trong những ưu tiên hàng đầu của Lucky99 là đảm bảo tính bảo mật và an toàn tuyệt đối cho người dùng. Hệ thống sử dụng các công nghệ mã hóa tiên tiến để bảo vệ dữ liệu cá nhân, ngăn chặn rủi ro về an ninh mạng. Mọi thông tin được bảo vệ nghiêm ngặt, đảm bảo tính minh bạch và công bằng trong mọi hoạt động. Lucky99 không ngừng nâng cấp hệ thống bảo mật nhằm mang đến sự yên tâm tuyệt đối, giúp người dùng tận hưởng những tiện ích mà không lo lắng về vấn đề an toàn. Với những ưu điểm vượt trội, Lucky99 đã trở thành lựa chọn hàng đầu cho những ai đang tìm kiếm một nền tảng chất lượng, đáng tin cậy và hiện đại.
-
@ f99f56fb:d4e26c7a
2025-03-16 08:10:53En 2010... SI, EN 2010 !!!
En 2010 un amigo me habló de #Bitcoin. Me pareció interesante. Cambié el disco duro de mi PC, me descargué Ubuntu e intenté minar bitcoin. No fui capaz. Desistí.
Mi amigo tampoco hizo nada al respecto.
Años más tarde, en 2017, conocí #Ethereum como 'dinero programable' y la idea me fascinó !! Creía en el flippening y todo. Compré un poco (y luego casi se me olvida que lo tengo). Años más tarde, sobre 2020 empezó un boom, FOMO, altseason, bull market, o como lo queráis llamar. La cosa es que yo estaba emocionadísimo con $ETH. Siempre había pensado que Bitcoin tenía un problema severo de escalabilidad.
En Mayo de 2022 pasaron varias cosas: 1. Leí El Patrón Bitcoin - Entendí el dinero 2. Descubrí la Lightning Network - Descubrí que Bitcoin es escalable
E inmediatamente cambié mis #ETH por #BTC. Empecé a estudiar Bitcoin, hice varios cursos a fondo, compré más...
Ahora compro bitcoin siempre que puedo para tener menos FIAT, tengo mi billetera fría, y me deshago de todo lo que puedo para tener más $BTC.
He empezado a comprar al precio que me merezco. Podría haber empezado a acumular en 2010... Pero no fui capaz. Cada vez es más fácil comprar bitcoin, pero además es necesario que lo entiendas. Aprende Bitcoin.
-
@ c11cf5f8:4928464d
2025-03-16 10:11:08Let's support #Bitcoin #merchants! I'd love to hear some of your latest #Lightning purchases and interesting #products you bought. Feel #free to include links to the #shops or #businesses you bought from.
Who else has a recent purchase they’re excited about? Bonus #sats if you found a killer #deal! ⚡
If you missed our last thread, here are some of the items stackers recently spent and #zap on.
GM #Nostr #Business #Spending #Buy #Sell #SpendSats #Sats #BitcoinAccepted #zap #btc #plebchain #grownostr #asknostr #siamstr #freedom
originally posted at https://stacker.news/items/914522
-
@ 10464a19:fde3ba5b
2025-03-16 10:02:10A AP777 surge como uma plataforma de entretenimento online que vai muito além do esperado. Com foco na simplicidade, diversão e inovação, ela conquistou o coração de jogadores brasileiros que buscam uma experiência digital imersiva e diversificada. Neste artigo, exploraremos os principais motivos pelos quais a AP777 se destaca no mercado de entretenimento online e como ela proporciona uma experiência única para seus usuários.
Design Moderno e Funcional: A Experiência do Usuário em Primeiro Lugar A primeira impressão que a AP777 causa é a de um ambiente digital clean, organizado e eficiente. Ao acessar a plataforma, o jogador se depara com um design moderno e muito intuitivo. As categorias de jogos são dispostas de maneira clara e objetiva, permitindo que qualquer pessoa, independentemente de sua familiaridade com plataformas digitais, consiga navegar facilmente.
A Ap777 é otimizada para qualquer dispositivo, seja desktop, smartphone ou tablet. Esse design responsivo significa que o jogador pode continuar sua jornada de onde quiser, sem perder qualidade na jogabilidade ou na experiência visual, o que aumenta ainda mais a conveniência para os usuários.
Variedade de Jogos: A Oferta Ideal para Todos os Estilos A AP777 tem como um dos seus maiores atrativos a diversidade de jogos que oferece. A plataforma compreende que os jogadores possuem diferentes preferências e, por isso, oferece uma seleção ampla e diversificada de opções. Seja você um novato que busca algo mais leve ou um entusiasta de desafios estratégicos, a AP777 tem algo a oferecer para todos.
Jogos de Estratégia e Desafio Para quem gosta de usar a mente e testar suas habilidades cognitivas, a AP777 oferece uma ampla gama de jogos de estratégia. Esses títulos exigem planejamento, tomada de decisões rápidas e raciocínio lógico, proporcionando uma experiência mais profunda e desafiadora. Os jogadores mais experientes podem se aprofundar nessas opções para testar seus limites e desenvolver novas estratégias.
Jogos Casuais e Leves A AP777 também sabe que nem todos os jogadores procuram uma experiência de jogo tão desafiadora. Para aqueles que preferem momentos de descontração, há muitos jogos casuais, com mecânicas simples e divertidas, ideais para passar o tempo sem grandes complicações. Esses jogos são rápidos de aprender e oferecem uma experiência de lazer prazerosa e sem a pressão de uma competição intensa.
Segurança e Confiança: Prioridade para o Usuário Na AP777, a segurança do jogador é uma prioridade. A plataforma adota medidas rigorosas de segurança, utilizando criptografia avançada para proteger dados pessoais e financeiros. Isso permite que os jogadores desfrutem de uma experiência sem preocupações, sabendo que suas informações estão sempre protegidas.
Além disso, o suporte ao cliente da AP777 é altamente qualificado, garantindo que qualquer problema ou dúvida seja resolvido rapidamente. A equipe de atendimento está disponível para ajudar em qualquer situação, seja para solucionar questões técnicas ou esclarecer dúvidas sobre o funcionamento da plataforma.
Conclusão Com um design intuitivo, uma enorme variedade de jogos e um compromisso com a segurança do usuário, a AP777 se destaca como uma das plataformas de entretenimento online mais inovadoras e confiáveis do mercado. Se você está em busca de uma experiência digital envolvente, seja você um novato ou um jogador experiente, a AP777 é definitivamente a plataforma ideal para explorar.
-
@ d6252575:ff8c15c7
2025-03-16 05:19:06على الرغم من رغبتنا جميعًا في أن يعمل مكيف الهواء سبليت بسلاسة ودون ضوضاء مثل محرك طائرة G5، فإننا نعلم أن هذه الرغبة قد لا تتحقق دائمًا. اعتمادًا على عمر مكيف الهواء، أو مكان تركيبه، أو مدى صيانته وإصلاحه بشكل دوري، قد تسمع أصواتًا طبيعية جدًا من مكيف الهواء في منزلك أو مكان عملك.
ولكن لا يجب أن تُهمل كل الأصوات، فمن المهم معرفة أسبابها واتخاذ الإجراءات اللازمة للقضاء عليها. تابع معنا لمعرفة المزيد عن أسباب صوت التكييف.
أسباب صوت سبليت
يمكن أن يشير صوت مكيف الهواء إلى تشغيله الصحيح أو غير الصحيح. لا شك أن الضوضاء غير الطبيعية الصادرة من مكيف الهواء الخاص بك تشير إلى وجود مشكلة في النظام يجب التحقيق فيها على الفور.
لماذا يعمل مكيف الهواء بصوت عالٍ؟ إذا سمعت صوت عويل مزعج من مكيف الهواء، فقد لا يعمل جزء من النظام بشكل صحيح. لذلك من الأفضل التحقق من الأسباب التالية:
مشكلة صوت مكيف الهواء
- مروحة تهوية داخلية: إذا كانت مروحة التهوية في اللوحة الداخلية لمكيف الهواء المنفصل غير متوازنة أو لا تعمل بشكل صحيح، خاصة إذا كانت المحامل على كلا الجانبين تالفة أو غير مثبتة بشكل صحيح، فستسمع صوتًا طبيعيًا من الجزء الداخلي من مكيف الهواء.
- علة الضاغط: الضاغط هو أحد أهم أجزاء مكيف الهواء، وهو مسؤول عن ضغط غاز التبريد في النظام. يعني صوت الأزيز في الجهاز أن الضاغط لا يعمل بشكل صحيح أو أن كمية التيار الكهربائي في الدائرة غير مناسبة.
- قاعدة منفصلة أو تالفة: يقع الضاغط في مكيف الهواء على قاعدة مطاطية صغيرة. مع الاستخدام المستمر، قد تتشقق هذه القاعدة البلاستيكية وتتفكك وتنهار، مما يؤدي إلى فقدان مكيف الهواء لتوازنه ويحدث ضوضاء أثناء تشغيل النظام. من ناحية أخرى، قد تكون صواميل ودبابيس الوحدة الخارجية للجهاز مفكوكة. في هذه الحالة، يتم حل مشكلة الصوت في مكيف الهواء عن طريق شدها باستخدام مفك البراغي.
- وحدة مجمدة: حتى إذا تم استخدام مكيف الهواء الخاص بك خلال أشد أوقات السنة حرارة، فقد ترى الجليد على النظام. التجميد هو نتيجة تسرب غاز التبريد ويمكن أن يكون أحد أسباب صوت مكيف الهواء.
- وجود أجزاء مفكوكة: هناك أجزاء مختلفة في مكيف الهواء، قد تتلف أو تُفكك، مما يتسبب في تآكل المكونات فوق بعضها البعض، وأخيراً صوت التكييف.
- وجود جسم غريب في مكثف سبليت: قد يعمل مكيف الهواء عندما تسمع صوتًا فجأة. إذا كانت الوحدة الخارجية للنظام موجودة بالخارج، تزداد احتمالية وجود جسم غريب فيها. في هذه الحالة، يجب عليك إيقاف تشغيل الجهاز وإيقاف تشغيل الطاقة. ثم انظر داخل الوحدة وإذا كان هناك جسم غريب أو حيوان أو طائر، أخرجه من الوحدة.
- محاذاة الجهاز: عند تركيب مكيف الهواء، يجب الانتباه جيدًا لمستواه، لأنه إذا كان الجهاز غير مستوي، فسيؤدي ذلك إلى صوت النظام مع مرور الوقت. في هذه الحالة، يجب عليك الاتصال بفني تركيب مكيف الهواء لحل المشكلة.
- عدم تزييت الجهاز: يعد عدم تزييت الجهاز من أسباب صوت التكييف. لحل هذه المشكلة، يجب إيقاف تشغيل الجهاز لمنع تلفه. ثم اتصل بخبير التدفئة والتهوية وتكييف الهواء لتليين النظام.
- كسر شفرات المروحة: قد يؤدي التلف المادي الخارجي إلى إتلاف شفرات المروحة. انحناء وتواء ريش المروحة يضعفان من كفاءتها ويؤديان في النهاية إلى صوت مكيف الهواء.
- الإطار الأمامي للنظام: إذا لم يتم إغلاق الباب الأمامي للوحة مكيف الهواء أو فكه بشكل صحيح، فسيتم سماع صوت سرقة أثناء تشغيل مكيف الهواء. لإصلاح ذلك، أغلق اللوحة الأمامية للوحة برفق.
أصوات أخرى قد تسمع من جهاز التكييف
فقط لأنك تسمع ضوضاء من مكيف الهواء الخاص بك لا يعني أن نظامك به مشكلة. ولكن عندما تسمع هذه الأصوات، من الجيد الاتصال بأحد خبراء التدفئة والتهوية وتكييف الهواء:
- صوت النقر: هذا الصوت طبيعي تمامًا عند تشغيل النظام أو إيقاف تشغيله، ولكن إذا أصبح صوتًا مستمرًا، فسيكون ذلك بمثابة تحذير بأن المرحل معيب.
- الضوضاء: سماع ضوضاء من النظام يعني أن المكثف معيب وقد يحتاج محرك النظام إلى الإصلاح.
- اقرأ المزيد...
-
@ bd224ab4:f79ced71
2025-03-16 05:07:40You walk into a building, and it's blissfully cool, even on a scorching summer day. You might not think about it, but behind that comfort lies a system called a VRF (Variable Refrigerant Flow). It's like the unsung hero of modern air conditioning, silently working to keep you comfortable.
Imagine a Network of Tiny Refrigerators
Think of a VRF system as a network of mini-refrigerators, each serving a specific zone in a building. Instead of a single, bulky unit, you have multiple indoor units connected to an outdoor unit. This outdoor unit acts like the "brain" of the operation, pumping refrigerant to each indoor unit, which can be customized to suit your needs.
Flexibility is Key
Here's where things get interesting. With a VRF, you can control the temperature in individual rooms or zones, instead of the entire building. Need a cooler bedroom while the living room stays comfortably warm? No problem! This flexibility means you're only cooling the spaces you actually need, leading to energy savings and a smaller carbon footprint.
Beyond Comfort: Efficiency and Control
VRF systems are known for their high efficiency. They use variable-speed compressors, which adjust their power output based on the actual cooling needs. This means less energy wasted and lower operating costs.
And let's not forget about the control. VRF systems are often integrated with smart home technology, allowing you to adjust the temperature remotely using your smartphone or tablet. This gives you ultimate control over your comfort, even when you're not home.
VRF: Not Just for Buildings
While VRF systems are commonly used in commercial buildings, they are increasingly popular in residential homes too. Their flexibility, efficiency, and control make them an attractive option for homeowners looking for a modern and comfortable air conditioning solution.
Source: What is a VRF System?
-
@ 6830c409:ff17c655
2025-03-16 00:52:02I was reading through all this news around people attacking and vandalizing Tesla cars. and I was wondering, how did this word vandalism came into existence so I just went back into Wikipedia and some dictionaries searching for the etymology of the world. Here is what I learned and thought of sharing with you what I read. Sorry, but searching #history is my weakness 🙄
Once upon a time, in the early centuries of the first millennium, a group of Germanic tribes roamed across Europe, looking for a place to call home. These were the Vandals, a people who, like many others, found themselves pushed westward by war, climate change, and the collapsing Roman order.
By the early 400s, they were on the move in a big way. They crossed the Rhine into what is now France, fought their way through Spain, and eventually sailed to North Africa, where they did something few others had managed before—they set up their own kingdom in Carthage (modern Tunisia), one of the richest parts of the crumbling Roman world.
And then, in 455 CE, their name was forever written into history.
The Sack of Rome – Did the Vandals Actually “Vandalize” It?
That year, under the leadership of their king Genseric, the Vandals sailed across the Mediterranean and stormed into Rome itself. The Western Roman Empire was already on its last legs, and the emperor had little power to stop them.
For two whole weeks, the Vandals looted the city. They stripped away gold, silver, and anything valuable they could carry. They even took the treasures of the Temple of Jerusalem, which the Romans themselves had looted centuries earlier from the Jewish Second Temple.
But here’s where things get tricky.
While the Vandals did pillage Rome, they didn’t burn it to the ground, kill indiscriminately, or leave it in total ruin like some earlier invaders had. In fact, they kept churches and monuments mostly intact—a stark contrast to the violent destruction during Rome’s previous sack by the Visigoths in 410 CE.
So why do we associate vandalism with destruction?
Over to France, where the word is born
For over a thousand years, the Vandals were remembered as just another group of barbarian invaders. But their name took on a whole new meaning in 1794, during the chaos of the French Revolution.
At that time, revolutionaries were tearing down symbols of the old monarchy, smashing statues, and destroying priceless works of art. Seeing this destruction, a French bishop named Henri Grégoire coined the term “Vandalisme” to describe it.
He wasn’t saying that actual Vandals had suddenly appeared in France. Instead, he was making a historical analogy—just as the Vandals had looted Rome centuries earlier, so too were the revolutionaries looting France’s cultural heritage.
The term quickly caught on. By the early 1800s, “vandalism” entered the English language as a word for any senseless destruction of property.
Vandalizing the Vandals
Here’s the twist: the Vandals may not have been as bad as history painted them.
Most of what we know about them comes from Roman sources, and Rome had a habit of making its enemies look as bad as possible. To the Romans, anyone who wasn’t Roman was a barbarian, and the Vandals, with their dramatic takeover of North Africa and their sack of Rome, made the perfect villains.
Yet modern historians argue that the Vandals were actually fairly organized, had their own complex kingdom, and even maintained peace in the Mediterranean for decades.
So, in a way, it’s historical vandalism that we now associate their name with destruction!
Vandalism Today
The word “vandalism” stuck, and today we use it for everything from graffiti to broken car windows. It’s kind of funny when you think about it—a historical misunderstanding led to a whole group of people becoming a symbol for reckless destruction.
The next time you see a “No Vandalism” sign, remember: it’s not just about property damage. It’s a story that goes back over 1,500 years, involving a misunderstood tribe, a collapsing empire, and a French bishop who didn’t want people smashing statues.
And in the end, maybe the biggest act of vandalism was what happened to the Vandals’ reputation.
-
@ 6c4b0219:bb7f889e
2025-03-16 00:19:27Bitcoin’s lack of premine is a key feature that differentiates it from many other cryptocurrencies- "Bitcoin is not Crypto."
Its lack of premine ensures fair distribution of coins, strengthens its decentralization, and builds trust in its underlying network.
To gain deeper insight into Bitcoin premining and why Bitcoin is so different from other cryptocurrencies, read below!
➼ What is a Premine?
A premine occurs when a portion of a cryptocurrency's total supply is created and distributed before the public launch.
This typically benefits the project's developers, early investors, or insiders. Premined coins can be used for development funding, marketing, or team compensation, but they often lead to concerns about centralization and unfair distribution.
➼ How is Bitcoin Different?
Bitcoin is not premined, meaning no coins were created or allocated before its public launch on January 3, 2009. Instead, Bitcoin follows a fair launch model, where Satoshi Nakamoto, its creator, had to mine coins just like everyone else. This makes Bitcoin fundamentally different from many other cryptocurrencies.
➼ What Does This Mean for Bitcoin?
-
Fair and Decentralized Distribution – Since Bitcoin wasn't premined, early adopters had to mine or acquire it on the open market. This prevents a small group from controlling a large portion of the supply.
-
Higher Trust and Credibility – Without premining, Bitcoin avoids concerns of founders enriching themselves unfairly, making it more resistant to manipulation.
-
True Proof-of-Work (PoW) Model – Bitcoin’s issuance depends on computational work (mining), ensuring that new coins enter circulation through a transparent and decentralized process.
-
No Centralized Authority – Many premined projects have teams or foundations controlling a large supply of tokens, allowing them to influence the market. Bitcoin, by contrast, is decentralized and does not have any centralized authority.
➼ How Does This Compare to Other Cryptos?
⇝ Ethereum (ETH) had a presale (ICO) in 2014, where about 60 million ETH (out of the initial supply) was sold to early investors, with the remaining portion allocated to the Ethereum Foundation and developers. This helped fund the project’s development but isn’t considered a traditional "premine."
⇝ Ripple (XRP) is almost entirely premined, with its parent company, Ripple Labs, holding a significant portion of the supply.
⇝ Dogecoin (DOGE) was not premined but has an inflationary supply, meaning there is no maximum cap on its total supply, unlike Bitcoin's fixed cap of 21 million coin, which contributes to its scarcity and role as a store of value.
Bitcoin’s lack of premine, combined with its hard cap, decentralization, and proof-of-work mining, makes it the most transparent and trustworthy digital currency.
➼ DYOR!
Before you begin to doubt, we encourage you to do your own research.
If you’re new to the space, you should: ➼ Follow us on here on Nostr ➼ Join our FREE, high-quality Bitcoin education program to understand the fundamentals and make informed decisions.
⇝ To join our program, join our Telegram group to stay updated on the next cohort! Telegram: https://t.me/+KirVlW8gMMtlNDI8
⇝ If you found this valuable, please share and feel free to ZAP⚡️for more visibility so others can benefit as well!
-
-
@ 21335073:a244b1ad
2025-03-15 23:00:40I want to see Nostr succeed. If you can think of a way I can help make that happen, I’m open to it. I’d like your suggestions.
My schedule’s shifting soon, and I could volunteer a few hours a week to a Nostr project. I won’t have more total time, but how I use it will change.
Why help? I care about freedom. Nostr’s one of the most powerful freedom tools I’ve seen in my lifetime. If I believe that, I should act on it.
I don’t care about money or sats. I’m not rich, I don’t have extra cash. That doesn’t drive me—freedom does. I’m volunteering, not asking for pay.
I’m not here for clout. I’ve had enough spotlight in my life; it doesn’t move me. If I wanted clout, I’d be on Twitter dropping basic takes. Clout’s easy. Freedom’s hard. I’d rather help anonymously. No speaking at events—small meetups are cool for the vibe, but big conferences? Not my thing. I’ll never hit a huge Bitcoin conference. It’s just not my scene.
That said, I could be convinced to step up if it’d really boost Nostr—as long as it’s legal and gets results.
In this space, I’d watch for social engineering. I watch out for it. I’m not here to make friends, just to help. No shade—you all seem great—but I’ve got a full life and awesome friends irl. I don’t need your crew or to be online cool. Connect anonymously if you want; I’d encourage it.
I’m sick of watching other social media alternatives grow while Nostr kinda stalls. I could trash-talk, but I’d rather do something useful.
Skills? I’m good at spotting social media problems and finding possible solutions. I won’t overhype myself—that’s weird—but if you’re responding, you probably see something in me. Perhaps you see something that I don’t see in myself.
If you need help now or later with Nostr projects, reach out. Nostr only—nothing else. Anonymous contact’s fine. Even just a suggestion on how I can pitch in, no project attached, works too. 💜
Creeps or harassment will get blocked or I’ll nuke my simplex code if it becomes a problem.
https://simplex.chat/contact#/?v=2-4&smp=smp%3A%2F%2FSkIkI6EPd2D63F4xFKfHk7I1UGZVNn6k1QWZ5rcyr6w%3D%40smp9.simplex.im%2FbI99B3KuYduH8jDr9ZwyhcSxm2UuR7j0%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAS9C-zPzqW41PKySfPCEizcXb1QCus6AyDkTTjfyMIRM%253D%26srv%3Djssqzccmrcws6bhmn77vgmhfjmhwlyr3u7puw4erkyoosywgl67slqqd.onion
-
@ 8671a6e5:f88194d1
2025-03-15 20:50:18Like so many people, I see ads for hardware wallets all the time in my X feed, or even when listening to podcasts you get the occasional promotion for one of these devices. Hardware wallet manufacturers and brands are a part of bitcoin life and culture. They’re sponsors, and they of course like to sell their devices.
As a long-time bitcoiner, I can say that I’ve given out more money (bitcoin) buying hardware wallets than what’s good for me. I supported projects and even had one of the prototypes of the Case wallet (fingerprint sensor, international sim-card and a camera!) in 2015/16, a thing I could hardly use, since it was bitcoin in your pocket, on-chain, before there was ANY need for that.
The point is, I love these devices. I love playing around with them. That’s fun when you’re a techie or someone who’s really onto bitcoin and wants to try the new Trezor, Ledger (yuk), Bitbox or cold card wallet… Unfortunately, except for this “obsession” with trying these devices out, and the occasional corporate/business needs,… the secure feeling of having one (or more) prevails over the real need. There’s a series of downsides to having a Hardware wallet, which are often overlooked.
The main downside is actually summed up as : “you don’t need it”
Let’s elaborate. For most people, I must say that I can’t recommend having one of these devices anymore. The market is saturated and the devices are often sold to people who are even unable to use them properly. Or customers that spent way more money buying them, than what’s eventually stored on it!
They’re of course handy “signing devices” for securely signing a transaction or message. They’re also a great way to do multi-signature and so on. That’s all neat.
But your average user,... most of the people don’t need it. There are several reasons for that.
Before the readers put me away as a fiat-slave dissing on bitcoin, or some dude trying to shill his own project: no … I don’t have my own “solution” I’m selling, I don’t go and ask you to click my referral link or ask for money here. I probably bought more hardware wallets in my life for a higher amount than most users hold in bitcoin right now. So no,... I supported this industry, I don’t hate it. I just want to voice my opinion her on the saturation of the market and the stupidity of holding your keys on a device that inherently can’t be trusted (in theory).
The reasons: 1
Bitcoin inverted effect on diminishing cash value : A bitcoin amount today buys you less than that same bitcoin amount in a few years. Let’s start with an obvious, but often forgotten reason to NOT invest in a hardware wallet. The price. The price is around 150 to 350 $ in fiat now in 2024. I even bought such devices at 600$ once (160000$ in today’s price;). Over time, most people that are into bitcoin less than 5 years, are better off buying bitcoin for the amount they would have bought the HW device for.
One can of course make the argument that it costs more to lose your keys altogether, but that’s also the case with a paper with your seed phrase or any other method.
Securing your keys is of course extremely important. No matter what you want to use. It doesn’t take away the fact that buying a Hardware wallet for fiat or for bitcoin isn’t economically wise, certainly not for beginners or people who have less bitcoin than the 20x cash value of the hardware wallet they want to buy. I have a simple formula here.
The Deadeye’s Hardware Wallet Law: which is a formula: Y < (X / 20) If you have 1 million sats today (660$ at time of writing) then it makes little sense to buy a hardware wallet for 179$ in my opinion. A good rule of thumb is: take the amount of bitcoin you want to secure, calculate the fiat price in dollar HW price = X Take the fiat price in dollar + shipping in fiat = Y If Y < (X / 20) that fiat price is less than a factor 20 of what you want to secure, then you might consider buying the HW wallet.
Example: Johnny wants to buy a new coldcard at 219$ + 41 $ shipping. He has 2,3 million sats (1524$) 260 < (1524 /20) So 260 < 76.2 … is not true , so he shouldn’t buy this and stack the sats instead on a cheaper solution (software wallet, or a self-generated seed phrase or even a reputable exchange in absolute last resort, if the tech-lever is very low)
2
Entropy - the entropy on a hardware device is delivered usually by “special chipsets” that generate a random (or close to random, as computers can’t be really random) seed phrase for you. Just like the old paper wallet generators only, they use some sort of scheme or algorithm to generate this. As a user you’ll have to trust that algo. And trust that it’s not broken by a hacker that finds the secret sauce and can generate more or less the same kind of entropy (even then, it would be extremely unlikely they would be able to re-generate your seed). But it’s a factor: the entropy a person can generate themselves (with play cards, dice, or a cat tapping a keyboard…) is always superior to some algorithm on a device Hardware itself can be fragile or downright sub-par. The hardware wallets of course exist because of the tech inside. Mainly the print board, the screen, the chipset and some even a battery(!). The hardware is NOT under your control. It’s made in a few big factories in Asia usually and even if you trust the building process completely, there’s no way for an average paranoid user to “trust” the unverifiable source of the chip design, chip manufacturing and the software that keeps the thing running.
The hardware itself is a blind trust you put into the image and reputation of a company. Some of these companies are dodgy at best from my personal perspective and opinion (nGrave, Ledger …) others have a more steady reputations and exude trustworthiness (Bitbox, …) Still… they are all just hardware, a sum of parts you don’t control and don’t verify.
When is the last time you checked the “military grade secure element chipset” in your super-duper hardware device? Where was it manufactured and who designed the chip lay-out?
3 Cycling through versions. HW wallets go through iterations and new version all the time. When you bought a coldcad Mark 1 back in the day, it’s now long obsolete. You can’t use some features and you’re even lucky if the hardware itself still functions after being in storage for +6 years. When I asked the manufacturer why they recommended outphasing the coldcard around two years ago, they said something like “it’s to keep up with security”. It even makes sense from their tech and product perspective, but in the end, it’s not really what people expect (realistic or not). Well… that’s like a subscription in my opinion? Every two years, you fork out something of 150 to 200$ for a new hardware device (plus shipping and customs) and the risk involved to put your funds on the new device by transferring to the new wallet’s addresses or put the old seed in that new device and so on… All this… to have the “right tool” for keeping 24 words “safe”? So, our formula in point 1, was adjusted to /20 to compensate for that “cycling” through versions at a rate of a few hundred dollars every 2-3 years at least. That’s a bit of the top in my opinion. A good bitcoin hardware device should at least be usable and up to par for 10 years at the very least. Words written down or secured anywhere, last forever.
4 Easy of use is still not ok: This might be very controversial with all the HW wallets claiming to be “easy to use”, but in fact: they’re not. Most users (and I take some family members and friends as an example here) can’t make heads or tails from how these things work. Give any non-tech user a coldcard, ledger of bitbox and they’ll not be on their way to use it as an everyday device. It might sound silly for the daily users of such a wallet, but a “noob” in my opinion is better off learning to familiarize themselves with software wallets first before even considering buying a HW wallet.
5 Buggy hardly tested apps The hardware wallets accompanied by an app (like Jade’s Green wallet to name one) are often introducing an extra layer of problems (both on the bugs and the risks). Who knows that this software will still be available in a few years time? We saw many things come and go over the years.
6 Alienation from the private keys: New users are better of learning the ropes with seed phrases and private keys by using Electrum, Sparrow and the likes (or even stack wallet duo) in order to learn what holding your own keys means.
People who start their journey with a hardware wallet often think about their bitcoin holding as something that tangible “inside the hardware wallet”, instead of looking at the key-perspective. I think a lot of people are alienated from the bitcoin concept of having your own keys by using HW wallets. (and yes, that’s not a strong argument, I know, but it is a factor to take into account)
7
You’ll have to securely store your seed phrase ANYWAY. The fact remains, that you bought a hardware wallet, and still have to safely secure your private keys, seed phrase at some point and do it securely. That’s something you need anyway. So… why not just use your paper with 24 words and use the wallet on occasion by using a secure “other way” (seed signer, an electrum wallet, sparrow,...) when you need to do a transaction?
I believe people will also do les on-chain pure bitcoin transactions when they need to do more work when not using a HW wallet: it’s an extra barrier to hold instead of paying. (if you like to do that of course)
8
Upgrade processes aren't always that clear on some HW wallets. I personally “bricked” a coldcard this way, by accidentally using a wrong upgrade file on a Mark 2 coldcard, and it was unrepairable after that.
The 12 or 24 words are the most important thing you have, … you don’t need a hardware device if you’re just starting, or just are a hodl’er.
9 Centralized software. Bugs and “new” features
Lots of bugs in the software also cause problems: For example; your 24 words from device A, can’t be imported to device B although they should “speak the same language” in theory (BIP39). One device accepts using two times the same word in a seed phrase, one doesn’t. There are other bugs: like random reboots, unlocking problems, strange implementations in the software (like Trezor trying out implementing the Swiss “travel rule” setting one day and pushing this upgrade to the users) and so on…. Without a HW wallet, you can just choose yourself what software / node or wallet to run anything on, and you’re not tied to the centralized, expensive and often untested way of hardware wallet manufacturer’s viewpoints and or “secret deals”.
- And then there’s the privacy concern. We all know about Ledger’s famous “mishap” where they leaked all the home addresses of hardware wallet customers .. some of them actually had to move to other places to live as a result.
Conclusion:
In my opinion; hardware wallets are toys for bored bitcoiners. And I admit I was one myself for a long time. (I am one of these people yes)
The blockstream Jade was the last hardware wallet I’ve ever bought I guess.
I’m done with the crappy interfaces, the buggy software, the ‘subscription’ to endless upgrades new hardware and the strange feeling of unease when storing something on such devices while you depend on the “open source” nature of something made in China or wherever.
There are much cheaper, easier and more secure solutions.
Hence, most people don’t need hardware wallets.
deadeyes
@avbpodcast
imaginary Hardware wallet
Like so many people, I see ads for hardware wallets all the time in my X feed, or even when listening to podcasts you get the occasional promotion for one of these devices.\ Hardware wallet manufacturers and brands are a part of bitcoin life and culture. They’re sponsors, and they of course like to sell their devices.
As a long-time bitcoiner, I can say that I’ve given out more money (bitcoin) buying hardware wallets than what’s good for me.\ I supported projects and even had one of the prototypes of the Case wallet (fingerprint sensor, international sim-card and a camera!) in 2015/16, a thing I could hardly use, since it was bitcoin in your pocket, on-chain, before there was ANY need for that.
The point is, I love these devices.\ I love playing around with them.\ That’s fun when you’re a techie or someone who’s really onto bitcoin and wants to try the new Trezor, Ledger (yuk), Bitbox or cold card wallet… \ Unfortunately, except for this “obsession” with trying these devices out, and the occasional corporate/business needs,… the secure feeling of having one (or more) prevails over the real need.\ There’s a series of downsides to having a Hardware wallet, which are often overlooked.
The main downside is actually summed up as : “you don’t need it”
Let’s elaborate.
For most people, I must say that I can’t recommend having one of these devices anymore. The market is saturated and the devices are often sold to people who are even unable to use them properly. Or customers that spent way more money buying them, than what’s eventually stored on it!
They’re of course handy “signing devices” for securely signing a transaction or message. They’re also a great way to do multi-signature and so on. That’s all neat.
But your average user,... most of the people don’t need it. There are several reasons for that.
Before the readers put me away as a fiat-slave dissing on bitcoin, or some dude trying to shill his own project: no …\ I don’t have my own “solution” I’m selling,\ I don’t go and ask you to click my referral link or ask for money here. I probably bought more hardware wallets in my life for a higher amount than most users hold in bitcoin right now. So no,... I supported this industry, I don’t hate it. I just want to voice my opinion her on the saturation of the market and the stupidity of holding your keys on a device that inherently can’t be trusted (in theory).
The reasons:
1
Bitcoin inverted effect on diminishing cash value :\ A bitcoin amount today buys you less than that same bitcoin amount in a few years. Let’s start with an obvious, but often forgotten reason to NOT invest in a hardware wallet. The price. The price is around 150 to 350 $ in fiat now in 2024. I even bought such devices at 600$ once (160000$ in today’s price;). Over time, most people that are into bitcoin less than 5 years, are better off buying bitcoin for the amount they would have bought the HW device for.
One can of course make the argument that it costs more to lose your keys altogether, but that’s also the case with a paper with your seed phrase or any other method.
Securing your keys is of course extremely important. No matter what you want to use. It doesn’t take away the fact that buying a Hardware wallet for fiat or for bitcoin isn’t economically wise, certainly not for beginners or people who have less bitcoin than the 20x cash value of the hardware wallet they want to buy. I have a simple formula here.
### The Deadeye’s Hardware Wallet Law:\ which is a formula: Y < (X / 20)
If you have 1 million sats today (660$ at time of writing) then it makes little sense to buy a hardware wallet for 179$ in my opinion.\ A good rule of thumb is: take the amount of bitcoin you want to secure, calculate the fiat price in dollar HW price = X\ Take the fiat price in dollar + shipping in fiat = Y\ If Y < (X / 20) that fiat price is less than a factor 20 of what you want to secure, then you might consider buying the HW wallet.\ \ Example: Johnny wants to buy a new coldcard at 219$ + 41 $ shipping.\ He has 2,3 million sats (1524$) 260 < (1524 /20) \ So 260 < 76.2 … is not true , so he shouldn’t buy this and stack the sats instead on a cheaper solution (software wallet, or a self-generated seed phrase or even a reputable exchange in absolute last resort, if the tech-lever is very low)\ \ 2
Entropy - the entropy on a hardware device is delivered usually by “special chipsets” that generate a random (or close to random, as computers can’t be really random) seed phrase for you. Just like the old paper wallet generators only, they use some sort of scheme or algorithm to generate this. As a user you’ll have to trust that algo. And trust that it’s not broken by a hacker that finds the secret sauce and can generate more or less the same kind of entropy (even then, it would be extremely unlikely they would be able to re-generate your seed).\ But it’s a factor: the entropy a person can generate themselves (with play cards, dice, or a cat tapping a keyboard…) is always superior to some algorithm on a device Hardware itself can be fragile or downright sub-par.\ The hardware wallets of course exist because of the tech inside. Mainly the print board, the screen, the chipset and some even a battery(!).\ The hardware is NOT under your control. It’s made in a few big factories in Asia usually and even if you trust the building process completely, there’s no way for an average paranoid user to “trust” the unverifiable source of the chip design, chip manufacturing and the software that keeps the thing running.\ \ The hardware itself is a blind trust you put into the image and reputation of a company. Some of these companies are dodgy at best from my personal perspective and opinion (nGrave, Ledger …) others have a more steady reputations and exude trustworthiness (Bitbox, …) Still… they are all just hardware, a sum of parts you don’t control and don’t verify.\ \ When is the last time you checked the “military grade secure element chipset” in your super-duper hardware device? Where was it manufactured and who designed the chip lay-out? \ \ 3\ Cycling through versions.\ HW wallets go through iterations and new version all the time. When you bought a coldcad Mark 1 back in the day, it’s now long obsolete. You can’t use some features and you’re even lucky if the hardware itself still functions after being in storage for +6 years.\ When I asked the manufacturer why they recommended outphasing the coldcard around two years ago, they said something like “it’s to keep up with security”.\ It even makes sense from their tech and product perspective, but in the end, it’s not really what people expect (realistic or not). Well… that’s like a subscription in my opinion? Every two years, you fork out something of 150 to 200$ for a new hardware device (plus shipping and customs) and the risk involved to put your funds on the new device by transferring to the new wallet’s addresses or put the old seed in that new device and so on…\ All this… to have the “right tool” for keeping 24 words “safe”? So, our formula in point 1, was adjusted to /20 to compensate for that “cycling” through versions at a rate of a few hundred dollars every 2-3 years at least. That’s a bit of the top in my opinion. A good bitcoin hardware device should at least be usable and up to par for 10 years at the very least. Words written down or secured anywhere, last forever.\ \ 4\ Easy of use is still not ok: This might be very controversial with all the HW wallets claiming to be “easy to use”, but in fact: they’re not. Most users (and I take some family members and friends as an example here) can’t make heads or tails from how these things work. Give any non-tech user a coldcard, ledger of bitbox and they’ll not be on their way to use it as an everyday device.\ It might sound silly for the daily users of such a wallet, but a “noob” in my opinion is better off learning to familiarize themselves with software wallets first before even considering buying a HW wallet.\ \ 5 Buggy hardly tested apps\ The hardware wallets accompanied by an app (like Jade’s Green wallet to name one) are often introducing an extra layer of problems (both on the bugs and the risks). Who knows that this software will still be available in a few years time? We saw many things come and go over the years. \ \ 6\ Alienation from the private keys: New users are better of learning the ropes with seed phrases and private keys by using Electrum, Sparrow and the likes (or even stack wallet duo) in order to learn what holding your own keys means.
People who start their journey with a hardware wallet often think about their bitcoin holding as something that tangible “inside the hardware wallet”, instead of looking at the key-perspective. I think a lot of people are alienated from the bitcoin concept of having your own keys by using HW wallets. (and yes, that’s not a strong argument, I know, but it is a factor to take into account)
7
You’ll have to securely store your seed phrase ANYWAY.\ The fact remains, that you bought a hardware wallet, and still have to safely secure your private keys, seed phrase at some point and do it securely.\ That’s something you need anyway. So… why not just use your paper with 24 words and use the wallet on occasion by using a secure “other way” (seed signer, an electrum wallet, sparrow,...) when you need to do a transaction?
I believe people will also do les on-chain pure bitcoin transactions when they need to do more work when not using a HW wallet: it’s an extra barrier to hold instead of paying. (if you like to do that of course)
8
Upgrade processes aren't always that clear on some HW wallets.\ I personally “bricked” a coldcard this way, by accidentally using a wrong upgrade file on a Mark 2 coldcard, and it was unrepairable after that.
The 12 or 24 words are the most important thing you have, … you don’t need a hardware device if you’re just starting, or just are a hodl’er.
\ 9 Centralized software. Bugs and “new” features
Lots of bugs in the software also cause problems: For example; your 24 words from device A, can’t be imported to device B although they should “speak the same language” in theory (BIP39).\ One device accepts using two times the same word in a seed phrase, one doesn’t.\ There are other bugs: like random reboots, unlocking problems, strange implementations in the software (like Trezor trying out implementing the Swiss “travel rule” setting one day and pushing this upgrade to the users) and so on….\ Without a HW wallet, you can just choose yourself what software / node or wallet to run anything on, and you’re not tied to the centralized, expensive and often untested way of hardware wallet manufacturer’s viewpoints and or “secret deals”.
10) And then there’s the privacy concern. We all know about Ledger’s famous “mishap” where they leaked all the home addresses of hardware wallet customers .. some of them actually had to move to other places to live as a result.
Conclusion:
In my opinion; hardware wallets are toys for bored bitcoiners.\ And I admit I was one myself for a long time. (I am one of these people yes)
The blockstream Jade was the last hardware wallet I’ve ever bought I guess (and it broke about 4 months of operation, after the PIN code entry froze and the device stopped responding). \ \ On top of that: who needs to sign that much transactions a day (safe for shitcoiners?)
I’m done with the crappy interfaces, the buggy software, the ‘subscription’ to endless upgrades new hardware and the strange feeling of unease when storing something on such devices while you depend on the “open source” nature of something made in China or wherever.
\ There are much cheaper, easier and more secure solutions.
\ Hence, most people don’t need hardware wallets.
deadeyes
@avbpodcast
-
@ 8671a6e5:f88194d1
2025-03-15 20:36:41I’ll have to use my best Tone Vays impersonation voice for saying this, “..but actually “Value for Value, is à scàm”.
We hear a lot about Value4Value in bitcoin. People giving some content, good or service, and then getting their proverbial hat out, to collect whatever it’s deemed worth to the audience.
Some examples:
-
Jimmy makes a nice website for the community, and gets a donation from whoever likes the work he put in.
-
Mathilda makes a nice series of travel videos about bitcoin places, and does a little dance, and people can donate sats.
-
Jody makes a podcast about bitcoin philosophy and the local community and people can donate for every episode.
That’s all very nice in theory.
I keep thinking about a documentary maker who told his audience he slept on a kitchen table because he had no money for a bed. And he would stop doing things V4V because of it. I can understand that sentiment, and I fear he’s not alone in that feeling.
One of the other artists in attendance told me “then he should work harder and make better things or get some sponsors”. Which contradicts the V4V model, and is rather disparaging towards that filmmaker.
In the world of "Value for Value" (V4V), the system is rigged from the get-go because of dodgy fundamentals based on goodwill. It borders on a scam, be it a voluntary run scam from both sides.
Unfortunately, there are very, very low percentages of people (let alone bitcoiners) that have goodwill. At least in Europe (I don’t know how this exactly works out in the US or Asia).
A personal friend of mine ran a history podcast for many years, and got more kudos, and gifts than I ever had in bitcoin.
And no, it’s not about the money, the income. You can call me a sour person all you want for saying this. It’s mainly about feeling a slight appreciation for what you do
On top of that, the subject itself is a bit of a “no-no” to talk about. If you do, you’re often branded a complainer, a wanker, a negative Nancy. Well… that’s one of the signs you participate in a sort of scam. When you point out holes in the scheme, you’re branded a complainer or a negativist; you often also get ousted.
That’s the way we’re all supposed to go thumbs-up on everything while sleeping on a kitchen table, while doing “good for the community.
To clarify (some close to the reality numbers):
If you put in ± 10 hours in an episode in total in a history podcast, you got rewarded about 50€ (usually from people appreciating the story and effort, relating to the part in history).
If you put in ± 6 hours in two episodes in total (less research than a history podcast), in bitcoin in Belgium, you get rewarded with 2 likes (one from myself and one from another bitcoiner), and no re-shares and about 2000 sats per episode on a good day, and 0 on a bad day.
unknown bitcoin artist holding an orange cup New people in bitcoin who fall for this need to be aware of the loss of time they'll face (which some can stomach, others won't...). Maybe this blog post can help prevent people from turning sour or becoming blatantly against the community.
People who have a good "ethics" stance in bitcoin will probably start to do things in V4V, hoping they get a good return for their work. You dive into this for the love of the community, for proof-of-work in Bitcoin, and maybe to carve out a name for yourself, or so you believe. But over time, this passion isn't enough to outweigh the hours, effort, and the relentless critique from the community's armchair philosophers – and trust me, there's no shortage of those.
Soon, however, such goodwill people will start to be disgruntled or at least less happy about the V4V model's returns. Let's face it, Value4Value was a marketing term invented by Adam Curry, along with Dave Jones, to launch a concept as an anti-movement against Apple's hegemony. It was meant to preserve free speech (that, it succeeded in; they've put the "free" in free speech). For themselves, because they had the first-mover advantage, it worked out fine. And until like the end of 2015, it worked very well.
However, I never heard of anyone after the year 2015 who lived off a value4value scheme having enough income and being happy about the exchange of goods and services...
Many podcasters resolve this by asking a fee for their "full" private and ad-free stream. Others just quit or go full paid service. It's all good, as long as you pick your poison and don't rely too much on appreciation in this community.
I'll go even further; in my opinion, the value proposition of Value 4 Value has a negative influence on bitcoin adoption. Because so many people will start under this model, hoping to make a living or at least break even on their hobby project, they'll soon turn sour.
This negative impact is due to an over-supply of content, or the implication that you have to get sponsors. I regularly got that message from people like, “Why don’t you get a sponsor?” They act like I don’t know that working for free isn't paying the bills. I know. Trust me on that. I work for free out of passion and genuine interest. If that gets punished, then there's something really wrong with this community.
On sponsors: the problem with this approach is that you can't call your own sponsor's product "a toy-grade piece of unreliable garbage" on-air if you take their money. And if you do, it's probably not doing wonders for your income.
Not only are you sacrificing your independence, but you're also stripping away the very essence of why you started the podcast in the first place. On that subject, I can't bring myself to read ads about dog food or some insurance company's new scammy tactics to "protect" people. If I go that route, I would whore myself out to the extent that I might as well start a "banging hot crypto of the week" podcast and shill any NFT, meme-coin, and garbage scam token out there if they pay me. That's also not the "value" people tune in for, I guess (although some Belgians still make a career out of doing so).
Broken value
There's an element of guaranteed discontent in Value4Value that's profoundly broken.
So here's my breakdown:
In Value4Value, you have at least two elements in the equation: the maker of goods/services/content and the receiver of such content, who also turns into the giver.
The first one is the first giver, the second one is the second giver in the exchange.
The first giver, often a content creator, pours their heart, time, and energy into something, expecting nothing in return but hoping for recognition or a fair exchange. Instead, they're often left with scraps while others freely take, use, and even profit from their work without so much as a nod. Giving credit is passé as well... even people who blatantly steal stuff from others smile in your face and go on with their "business". Result: the first giver feels scammed out of their time.
Then there's the second giver, the one who actually decides to pay up and not be a bitch. They give away their hard-earned fiat or bitcoin for something they could've gotten for "free", hoping to keep the cycle of generosity alive. But as reality sets in, they realize they're the only ones p(l)aying this game, leaving them feeling cheated, especially when they hear about others enjoying the same benefits without contributing a sat. Result: the second giver feels scammed out of their money, but at least they got something out of it.
Both ends
In essence, V4V is a scam on both ends.
There's the dishonest way where you might earn a bit, but at the cost of your integrity (for example, praising a rotten hardware wallet like it's a revolutionary invention while collecting the kickbacks). Or there's the so-called honorable path where you gain nothing but scorn and perhaps a pat on the back before someone else capitalizes on your efforts. (Not talking about the people here even ridiculing you for doing something for free).
This leaves a bitter feeling for everyone involved. Those who dare to charge for their services face another kind of scam - the guilt of appearing to be in it for the money while potentially exploiting the naive under the guise of community spirit. And those who speak up about it, like that documentary maker and some artists alike, are all getting brutally laughed at. Because it's a taboo subject to "complain" about income.
But that's not the issue here; I never started a podcast to earn a living or make money. I would be mad doing so and thinking so, certainly not in this market and community. The deeper issue is less trivial, however: when value for value is not recognized, and there are hardly any widespread tools to really capitalize on it, then it's a negative point for bitcoin adoption.
(Just an example) People who run the podcast feed on their own website steal potential income from me by circumventing a good podcast 2.0 platform like the Fountain app. It's probably well meant, to spread the word, but in general, it's profiting from content in the most lazy way possible.
You can prevent that from happening by making the feed private, but then you need to pay a service fee, which you can't pay because 90% of the bitcoiners are too cheap to pay for it. So you pay it out of your own pocket, only to get the critique about your podcast being "behind a paywall". So... you either let yourself be ripped off even further and earn less every episode... Or you just give up, take everything offline, and go work at McDonald's (at least they pay you by the hour, and then you're in the fiat scam and you know it!).
The same goes for artists who get their designs, logos, and artwork copied or see some other artwork that's "heavily inspired" by their own creation popping up somewhere else.
And don't get me started on people copying tweets, ideas, parts of a blog post, and re-telling it to pass it off as their own idea in a book or their own content channels (even some pretty famous people in the bitcoin space do this on a regular basis; you have to get your content somewhere, I guess, after years of getting free tickets to any conference and enjoying life in our little bubble of misfits and backroom deals).
We route around problems
One of Bitcoin's amazing properties is that it isn't bringing you "yield" on itself. One bitcoin doesn't generate more bitcoin by printing more bitcoin, like in fiat. You can't just sit on your ass and get more diluted Mickey Mouse money.
So if you want to be active in the space, you have to either sell yourself (your soul maybe included), or sell a product you have total control over (your own brand of orange-themed cuddly toys for grown-up men, hoodies, umbrellas, paintings with the same themes everyone else does, 3D printed action figures of yourself, or whatever you can come up with that's not too embarrassing to show up with at a conference).
It's in fact no laughing matter. In bitcoin, we're used to routing around problems.
According to me, the broader adoption of bitcoin and its ethos (mind my words here) cannot grow and be successful if we don't solve this problem. The majority of content creators aren't the "big names" with their big middlemen sponsors (even a few got sponsored by FTX and Celsius Network back in the day, and currently a lot of them eat out the hands of some hardware wallet manufacturers and exchanges). These smaller names and new people, make content and art or the likes in order to grow their audience, have fun, learn and make a bit of money on the side if possible. Some of them even want to make a real career out of it. That's all fine.
As a community we need to learn to support people in a decent way.
Some initiatives I've seen were also utterly flawed, so we need to do better. The idea of a "bitcoin influencer" team, for example, was, as far as I could tell, an utter failure from the start, certainly if I saw some people in that group at a conference dry-humping a potential beneficiary (or the other way around; we all route around problems in our own special way :), then I somehow start to question their motives. But it might also be my imagination; the end result is the same; everyone still sleeps on their proverbial kitchen table while delivering free stuff.
We often claim that the fiat world drains us of our energy, time, and effort in order to reward us in 'melting' fiat currency. Well... at least they got a melting ice cube instead of the proverbial pat on the back on the black hoodie you wear in support of someone else's project.
If bitcoin ground-level pleb things, run by real people, need to be successful to grow bitcoin awareness, then we need to find a better solution for this problem. Otherwise, many people will be utterly turned off by the promising "peer-to-peer" world they've stepped into. It not only turns them into the fiat-slave mindset again but also discourages people from building and doing cool things. No one likes to be ripped off. No one likes to work for free. No one likes to be spit in the face and get dirty looks or eye-rolls when you enter the room.
And no, don’t invent things just for me; I’m fine.
I see donations and likes/shares as a real-life measuring stick for the quality and reach of my work. With an average of 3 retweets and shares per episode, it's a failure. And with 13,420 sats over 7 episodes, it's not a big deal, but it's something. Many people in the space would be happy to get such a gift for 18 hours of work.1
Like the famous monologue in the movie Trainspotting, we could also ask ourselves collectively, ... Choose Bitcoin. Choose Value4Value. Choose a scam. Choose life... which scam do you prefer?
Will you choose working for free for bitcoin? Or choose life?
thank you for reading,
by … Kim DV for @AVBpodcast :
no donation button here for obvious reasons
1 sarcasm, a beggar near the Brussels Central station makes more money just sitting on his ass with a Mc Donald’s cup in hand telling people “ s'il te plaît “I’ll have to use my best Tone Vays impersonation voice for saying this, “..but actually “Value for Value, is à scàm”.
We hear a lot about Value4Value in bitcoin. People giving some content, good or service, and then getting their proverbial hat out, to collect whatever it’s deemed worth to the audience.\ \ Some examples:\ \ - Jimmy makes a nice website for the community, and gets a donation from whoever likes the work he put in.\ \ - Mathilda makes a nice series of travel videos about bitcoin places, and does a little dance, and people can donate sats.\ \ - Jody makes a podcast about bitcoin philosophy and the local community and people can donate for every episode.
That’s all very nice in theory.\ \ I keep thinking about a documentary maker who told his audience he slept on a kitchen table because he had no money for a bed. And he would stop doing things V4V because of it. I can understand that sentiment, and I fear he’s not alone in that feeling.\ \ One of the other artists in attendance told me “then he should work harder and make better things or get some sponsors”. Which contradicts the V4V model, and is rather disparaging towards that filmmaker.\ \ In the world of "Value for Value" (V4V), the system is rigged from the get-go because of dodgy fundamentals based on goodwill. It borders on a scam, be it a voluntary run scam from both sides.\ \ Unfortunately, there are very, very low percentages of people (let alone bitcoiners) that have goodwill. At least in Europe (I don’t know how this exactly works out in the US or Asia).\ \ A personal friend of mine ran a history podcast for many years, and got more kudos, and gifts than I ever had in bitcoin.\ \ And no, it’s not about the money, the income. You can call me a sour person all you want for saying this. It’s mainly about feeling a slight appreciation for what you do\ \ On top of that, the subject itself is a bit of a “no-no” to talk about. If you do, you’re often branded a complainer, a wanker, a negative Nancy. Well… that’s one of the signs you participate in a sort of scam. When you point out holes in the scheme, you’re branded a complainer or a negativist; you often also get ousted.
That’s the way we’re all supposed to go thumbs-up on everything while sleeping on a kitchen table, while doing “good for the community.\ \ To clarify (some close to the reality numbers):\ \ If you put in ± 10 hours in an episode in total in a history podcast, you got rewarded about 50€ (usually from people appreciating the story and effort, relating to the part in history).\ \ If you put in ± 6 hours in two episodes in total (less research than a history podcast), in bitcoin in Belgium, you get rewarded with 2 likes (one from myself and one from another bitcoiner), and no re-shares and about 2000 sats per episode on a good day, and 0 on a bad day.
unknown bitcoin artist holding an orange cup
New people in bitcoin who fall for this need to be aware of the loss of time they'll face (which some can stomach, others won't...). Maybe this blog post can help prevent people from turning sour or becoming blatantly against the community.
People who have a good "ethics" stance in bitcoin will probably start to do things in V4V, hoping they get a good return for their work. You dive into this for the love of the community, for proof-of-work in Bitcoin, and maybe to carve out a name for yourself, or so you believe. But over time, this passion isn't enough to outweigh the hours, effort, and the relentless critique from the community's armchair philosophers – and trust me, there's no shortage of those.
Soon, however, such goodwill people will start to be disgruntled or at least less happy about the V4V model's returns. Let's face it, Value4Value was a marketing term invented by Adam Curry, along with Dave Jones, to launch a concept as an anti-movement against Apple's hegemony.\ It was meant to preserve free speech (that, it succeeded in; they've put the "free" in free speech).\ For themselves, because they had the first-mover advantage, it worked out fine. And until like the end of 2015, it worked very well.\ \ However, I never heard of anyone after the year 2015 who lived off a value4value scheme having enough income and being happy about the exchange of goods and services...\ \ Many podcasters resolve this by asking a fee for their "full" private and ad-free stream. Others just quit or go full paid service. It's all good, as long as you pick your poison and don't rely too much on appreciation in this community.
I'll go even further; in my opinion, the value proposition of Value 4 Value has a negative influence on bitcoin adoption. Because so many people will start under this model, hoping to make a living or at least break even on their hobby project, they'll soon turn sour.\ \ This negative impact is due to an over-supply of content, or the implication that you have to get sponsors. I regularly got that message from people like,\ “Why don’t you get a sponsor?”\ They act like I don’t know that working for free isn't paying the bills. I know. Trust me on that. I work for free out of passion and genuine interest. If that gets punished, then there's something really wrong with this community.\ \ On sponsors: the problem with this approach is that you can't call your own sponsor's product "a toy-grade piece of unreliable garbage" on-air if you take their money. And if you do, it's probably not doing wonders for your income.\ \ Not only are you sacrificing your independence, but you're also stripping away the very essence of why you started the podcast in the first place. On that subject, I can't bring myself to read ads about dog food or some insurance company's new scammy tactics to "protect" people.\ If I go that route, I would whore myself out to the extent that I might as well start a "banging hot crypto of the week" podcast and shill any NFT, meme-coin, and garbage scam token out there if they pay me.\ That's also not the "value" people tune in for, I guess (although some Belgians still make a career out of doing so).
Broken value
There's an element of guaranteed discontent in Value4Value that's profoundly broken.
So here's my breakdown:
In Value4Value, you have at least two elements in the equation: the maker of goods/services/content and the receiver of such content, who also turns into the giver.\ \ The first one is the first giver, the second one is the second giver in the exchange.\ \ The first giver, often a content creator, pours their heart, time, and energy into something, expecting nothing in return but hoping for recognition or a fair exchange. Instead, they're often left with scraps while others freely take, use, and even profit from their work without so much as a nod. Giving credit is passé as well... even people who blatantly steal stuff from others smile in your face and go on with their "business". Result: the first giver feels scammed out of their time.
Then there's the second giver, the one who actually decides to pay up and not be a bitch.\ They give away their hard-earned fiat or bitcoin for something they could've gotten for "free", hoping to keep the cycle of generosity alive.\ But as reality sets in, they realize they're the only ones p(l)aying this game, leaving them feeling cheated, especially when they hear about others enjoying the same benefits without contributing a sat.\ Result: the second giver feels scammed out of their money, but at least they got something out of it.
Both ends
In essence, V4V is a scam on both ends.
There's the dishonest way where you might earn a bit, but at the cost of your integrity (for example, praising a rotten hardware wallet like it's a revolutionary invention while collecting the kickbacks).\ Or there's the so-called honorable path where you gain nothing but scorn and perhaps a pat on the back before someone else capitalizes on your efforts. (Not talking about the people here even ridiculing you for doing something for free).
This leaves a bitter feeling for everyone involved. Those who dare to charge for their services face another kind of scam - the guilt of appearing to be in it for the money while potentially exploiting the naive under the guise of community spirit.\ And those who speak up about it, like that documentary maker and some artists alike, are all getting brutally laughed at. Because it's a taboo subject to "complain" about income.\ \ But that's not the issue here; I never started a podcast to earn a living or make money. I would be mad doing so and thinking so, certainly not in this market and community. The deeper issue is less trivial, however: when value for value is not recognized, and there are hardly any widespread tools to really capitalize on it, then it's a negative point for bitcoin adoption.
(Just an example) People who run the podcast feed on their own website steal potential income from me by circumventing a good podcast 2.0 platform like the Fountain app. It's probably well meant, to spread the word, but in general, it's profiting from content in the most lazy way possible.\ \ You can prevent that from happening by making the feed private, but then you need to pay a service fee, which you can't pay because 90% of the bitcoiners are too cheap to pay for it. So you pay it out of your own pocket, only to get the critique about your podcast being "behind a paywall".\ So... you either let yourself be ripped off even further and earn less every episode...\ Or you just give up, take everything offline, and go work at McDonald's (at least they pay you by the hour, and then you're in the fiat scam and you know it!).\ \ The same goes for artists who get their designs, logos, and artwork copied or see some other artwork that's "heavily inspired" by their own creation popping up somewhere else.\ \ And don't get me started on people copying tweets, ideas, parts of a blog post, and re-telling it to pass it off as their own idea in a book or their own content channels (even some pretty famous people in the bitcoin space do this on a regular basis; you have to get your content somewhere, I guess, after years of getting free tickets to any conference and enjoying life in our little bubble of misfits and backroom deals).
\ We route around problems\ \ One of Bitcoin's amazing properties is that it isn't bringing you "yield" on itself. One bitcoin doesn't generate more bitcoin by printing more bitcoin, like in fiat. You can't just sit on your ass and get more diluted Mickey Mouse money.
So if you want to be active in the space, you have to either sell yourself (your soul maybe included), or sell a product you have total control over (your own brand of orange-themed cuddly toys for grown-up men, hoodies, umbrellas, paintings with the same themes everyone else does, 3D printed action figures of yourself, or whatever you can come up with that's not too embarrassing to show up with at a conference).
It's in fact no laughing matter.\ In bitcoin, we're used to routing around problems.\ \ According to me, the broader adoption of bitcoin and its ethos (mind my words here) cannot grow and be successful if we don't solve this problem.\ The majority of content creators aren't the "big names" with their big middlemen sponsors (even a few got sponsored by FTX and Celsius Network back in the day, and currently a lot of them eat out the hands of some hardware wallet manufacturers and exchanges).\ These smaller names and new people, make content and art or the likes in order to grow their audience, have fun, learn and make a bit of money on the side if possible. Some of them even want to make a real career out of it. That's all fine.\ \ As a community we need to learn to support people in a decent way.\ \ Some initiatives I've seen were also utterly flawed, so we need to do better. The idea of a "bitcoin influencer" team, for example, was, as far as I could tell, an utter failure from the start, certainly if I saw some people in that group at a conference dry-humping a potential beneficiary (or the other way around; we all route around problems in our own special way :), then I somehow start to question their motives.\ But it might also be my imagination; the end result is the same; everyone still sleeps on their proverbial kitchen table while delivering free stuff.\ \ We often claim that the fiat world drains us of our energy, time, and effort in order to reward us in 'melting' fiat currency. Well... at least they got a melting ice cube instead of the proverbial pat on the back on the black hoodie you wear in support of someone else's project.\ \ If bitcoin ground-level pleb things, run by real people, need to be successful to grow bitcoin awareness, then we need to find a better solution for this problem. Otherwise, many people will be utterly turned off by the promising "peer-to-peer" world they've stepped into. It not only turns them into the fiat-slave mindset again but also discourages people from building and doing cool things. No one likes to be ripped off. No one likes to work for free. No one likes to be spit in the face and get dirty looks or eye-rolls when you enter the room.\ \ And no, don’t invent things just for me; I’m fine.\ \ I see donations and likes/shares as a real-life measuring stick for the quality and reach of my work.\ With an average of 3 retweets and shares per episode, it's a failure. And with 13,420 sats over 7 episodes, it's not a big deal, but it's something. Many people in the space would be happy to get such a gift for 18 hours of work.1
\ Like the famous monologue in the movie Trainspotting, we could also ask ourselves collectively, ...\ Choose Bitcoin.\ Choose Value4Value.\ Choose a scam.\ Choose life... which scam do you prefer?\ \ Will you choose working for free for bitcoin?\ Or choose life?
thank you for reading,
\ by … Kim DV for @AVBpodcast :
no donation button here for obvious reasons
sarcasm, a beggar near the Brussels Central station makes more money just sitting on his ass with a Mc Donald’s cup in hand telling people “ s'il te plaît “
-
-
@ 8671a6e5:f88194d1
2025-03-15 20:35:06(original version: https://allesvoorbitcoin.substack.com/p/bitcoin-jobs-are-a-sham )\ The dream
For many people who learned to use, work with, understand and hold bitcoin, one goal consistently stands out: the dream to one day work in a bitcoin job. In my entourage, this was for a long time the main thing most tried to achieve.
The prospect of such job is to work in the bitcoin industry and it seems like a lofty goal: it combines innovation, technology and the opportunity to collaborate with like-minded individuals while earning bitcoin. It’s also “cool”.
It’s an industry (yes, it’s an industry now) that thrives on the promise of that ultimate payout: hard money, bitcoin. Who wouldn’t want that? Certainly if you word in a fiat job right now.
At the same time, this longing comes with certain expectations. People assume a bitcoin-related job will be exciting, rewarding, efficient, well-funded and will happen in a professional environment - that often is lacking in fiat jobs.
I hate to break it to you, fellow bitcoiners, but the oasis of bitcoin jobs you’re crawling toward through the scorching fiat desert is mostly a mirage. Once you arrive at what seems like a place of plenty, you’ll find just a few orange-colored rocks and maybe a lone palm tree with a single, withered coconut barely hanging on.
The main reason? The reality of bitcoin jobs isn’t as different from fiat jobs as you might expect—at least, not yet.
After all, bitcoiners should be “better” people, right? Unlike those fiat wage slaves who don’t realize that being paid in dirty fiat slowly makes them poorer, we like to think we’re ahead of the curve. We feel more vindicated, more enlightened—bitcoiners are the better, more evolved kind. Or so we tell ourselves.
The realization of how hard money actually shapes society has not yet fully matured. We’re all still in the discovery phase. Even with die hard bitcoiners and their respective job industry aren’t there yet. During this discovery phase, it’s important to not let ourselves be blinded by the sun in the desert. We need not to be blinded by the promises and the ideology to let ourselves be taken advantage of by fiat-minded people, even if they own a bitcoin company.
Hard money is the way forward. Bitcoin is the way forward. Most people and certainly their jobs and companies are lagging behind that reality.
Such a job is not (yet) going to bring you Valhalla (or its equivalent) in the form of a well-paid bitcoin job.
Let’s walk over the reasons as to why that is.
The Fiat (Brain) Drain We don’t need to spend much time summarizing how soul-crushing a fiat job can be. Countless books, blogs, and social media rants already detail how monotonous, pointless, and draining traditional employment is. And for those of you that need a crash course on that: The 1999 movie Office Space remains a masterpiece in this regard. By now, we’ve all worked for a version of “Bill Lumbergh” at one point or another.
Bill at INITECH Bill Lumbergh at Initech (Office Space) From a bitcoiner’s perspective, a fiat job is merely a temporary solution to the problem of liquidity for consumer tokens — tokens printed for free by an entity like a state system, which itself is a tax, deb-and-war engine. At the same time, there’s a good chance to get people out of their fiat jobs, purely on this promise, as I wrote in “the fiat brain drain“.
If you operate within that fiat world, you’re bound to these forces. On top of that, your purchasing power is continually siphoned away through inflation, and you get taxed out of any long-term wealth buildup. On the other hand, that same fiat system makes you dependent on their return in social safety and being regarded as “OK”.
Most bitcoiners want a bitcoin job, exactly to escape this pit of misery. To leave this Linkedin-vortex of fake, the loser mentality, its hierarchical nonsense and bureaucratic drudgery that will soon be rendered obsolete by automation and AI, compounding with the ongoing brain drain at the top of the innovation pyramid.
That’s a long-winded way of saying: a fiat job is financial quicksand. And you’re knee-deep in it.
The solution? “bitcoin jobs”
If a bitcoin job were truly the answer, the solution would be simple: launch a bitcoin company, hire bitcoiners willing to work for bitcoin and start building products and services that function in both the fiat and bitcoin worlds—emphasizing the transition to better money: bitcoin.
But without capital, you’re stuck, whether in fiat or bitcoin.
The framework may shift slightly, but the fundamental problem remains. Those with capital can secure real bitcoin jobs or start real bitcoin companies, just as those with financial backing in the fiat world can choose work, they enjoy without worrying about pay or job-hunting struggles.
That’s not to say someone with limited funds and no capital can’t start such a company, but they’ll quickly run into funding issues. bitcoin jobs require payment in bitcoin but also fiat funds to pay for real life goods at most suppliers and services. Unless you build your own office (if you need one anyway) you’ll be paying in fiat to rent some office space (pun intended).
If you lack capital (in bitcoin), you’ll hit a wall sooner rather than later. So, in comes “other capital” to save you.
Relying on larger entities, whether venture capital firms or industry-supporting companies, to cover expenses also comes at the cost of independence; if they even provide funding at all.
While there's no shortage of hype and excitement around bitcoin projects, actual funding for many of these ventures is speculative at best. When you want to help these projects out for free, there’s also no shortage of open arms, welcoming the free hours of work for a project you’re passionate about.
Numerous startups in the crypto space operate on shoestring budgets, relying on ICOs (Initial Coin Offerings) or venture capital more interested in hype than substance. This creates a precarious job environment where projects can disappear as quickly as they emerge, leaving employees stranded.
Sustainability, or lack thereof, is another major concern. Bitcoin jobs that promise longevity often come with a caveat: they're here today, but there's no guarantee they’ll last until next month. The market’s volatility means projects can lose funding or pivot dramatically within months of no technical challenges or a dry up for demand pops up. Finding a position with a horizon beyond a few months in the future is rare, making long-term career planning in this sector a gamble. Most of these jobs are not even bitcoin jobs, but are presented that way. They’re mostly a sham!1
Pay up
Then there's the pay.
Even if you secure a position, and it’s a bit more long-term, then the promise of "decent, livable pay" is often unfulfilled. While some roles offer competitive salaries, many pay in bitcoin, which fluctuates of course (by the way, that’s a good thing, volatility is our friend). The trustworthiness of some of these bitcoin jobs, mostly at smaller startups can get even worse, where you as an employee are at risk to not receive promised payments at all due to funding issues.
The bitcoin job market presents a paradox: it's full of opportunities, yet few meet the criteria for being well-funded, sustainable, and offering reliable compensation and protection. For those looking to build a career in this space, caution is key do your due diligence, don’t trust verify on potential employers and diversify your own skills can help mitigate the risks somewhat.
Until the industry matures and offers greater stability and accountability, the allure of bitcoin jobs may remain problematic.
The harsh reality is, that the carrot of a bitcoin job, that’s been dangling in front of most bitcoiners’ eyes for a long time, is tempting, but mostly just that: an unreachable goal, not because you can’t get that job, but more because that job was a mirage on itself. The dream that most of us have is to leave the rat-race with its unfulfilling fiat jobs, to work in a better way, a job that pays in hard money and builds a better world.
I’m afraid that dream is just that: a dream. These jobs are mostly reserved for the inner-circle of some venture capitalist’s entourage or revolve around making use (or misuse) of bitcoiner’s ideology and goals in life.
But there’s hope Many people want to be paid in bitcoin, but until we transition to a bitcoin standard, they still need to cover expenses in a fiat-dominated world.
Finding a good fiat job is exhausting. And once you’ve been fully orange-pilled, earning fiat starts to feel like an even bigger scam—arguably worse than the Value for Value model. In the end, you’ll either work for peanuts or turn into a peanut yourself — a very salty one at that.
Definition
Let’s clarify what a bitcoin job" actually is, since the term often gets misused for anything remotely fintech or crypto-related anyway.
A bitcoin job involves real, tangible work — simply holding a title isn’t enough. It provides income paid directly in bitcoin, not in stocks, tokens (or other cryptocurrencies other than bitcoin). It requires a significant commitment of time, making it distinct from minor side gigs like washing a neighbor’s car — unless that gig somehow becomes your primary source of income.
Owning a company doesn’t count as a job on its own; you must be actively working in it (for example as a real hands-on developer or COO/CEO).
The role must be tied to a legitimate organization — a company or corporation — not just a loosely organized WhatsApp group pretending to be a business. It should be official, meaning it’s on the books, taxable where applicable, and, in some cases (such as in the EU), may even come with social benefits and retirement benefit buildup.
The focus must remain bitcoin only. Companies dealing exclusively in altcoins, memecoins, hype-cycles and the likes don’t qualify. Multi-cryptocurrency businesses, like exchanges or DeFi platforms, are more fintech than pure bitcoin. For example, a job at a bitcoin-only hardware company fits the definition, whereas a position at a Solana based trading platform does not.
About that real work: A disorganized WhatsApp group isn’t a company but a hobby project.
If a job doesn’t meet these criteria above, it’s unlikely to be a true bitcoin job. Looking at listings on platforms like Bitvocation2 (link) or the job sections of bitcoin/crypto companies, many roles appear to be standard fiat economy positions but within a bitcoin (or altcoins) focused company. (by the way, the Bitvocation team runs an excellent service that has a direct reach from open vacancies towards possible employees,… I love it).
For example, an HR role at a bitcoin company is fundamentally the same as one at a traditional fiat company (except for the occasional ordering of extra black hoodies for employees). Choosing to be paid in bitcoin may qualify it as a “bitcoin job,” but the role itself would exist in any industry. These positions could be considered bitcoin jobs since they contribute to our ecosystem while being financially tied to it.
From personal experience and observations, smaller bitcoin startups face significant challenges in securing funding. What is puzzling about this, that all this difficult environment to get a projects/startups funded happens, despite bitcoin being a trillion-dollar asset and major holders like Strategy accumulating nearly 500,000 BTC.
Top bitcoin company holdings:
BlackRock IBIT: 587,050 BTC Strategy (MSTR): 478,740 BTC Coinbase (COIN): 1,051,650 BTC Binance: 765,072 BTC Bitfinex: 359,687 BTC
Beyond funding, these startups also struggle to attract talent for a longer period of time. Traditional finance, fintech and even the broader cryptocurrency industry usually offer higher salaries and more perceived prestige (not in the bitcoin space, but outside) along with the perks of having a half fiat / “crypto” job.
Employees who choose to work in bitcoin often do so for ideological reasons, willingly giving up the stability and structure of traditional industries. This is both a strength and a risk. While bitcoin startups operate in a highly innovative space, they also face volatility and uncertainty.
The survival rate of bitcoin startups is low—around 10% make it past three years (according to Seedtable data). Most crypto-related job openings come from DeFi projects and general crypto firms, while jobs focused solely on bitcoin are typically backed by venture capital.
For instance: Fedi (federated lightning “all-in one freedom tool”) is employing between 27 and 50 people according to publicly available data. It’s backed by ‘Ego Death Capital’.
Other key VC firms in the bitcoin space include:
Axiom BTC Bitcoin Opportunity Fund Bitcoiner Ventures Epoch VC Lightning Ventures Ten31 Timechain VC
These firms play a crucial role in sustaining bitcoin-only businesses, as traditional funding routes remain scarce. Once inside these companies, there’s often a push for maximum efficiency and lean operations — while working with hard money. This paradox is frequently overlooked. Hard money means a long term time horizon. While bitcoin jobs often offer the polar opposite.
Bitcoin jobs are highly competitive on a global scale as well. Much like remote fiat jobs, most bitcoin-related roles can be done from anywhere in the world, meaning candidates are competing with a vast international talent pool. This makes securing a position even more challenging (especially for Europeans) in an industry that operates in a fast-changing and often challenging technological landscape from a marketing and cost/benefits perspective.
For example, a company developing a bitcoin PoS (point-of-sale) system for cash registers and checkout online, needs traction to sell its product and grow its user base but needs fiat funds to acquire material and develop point of sale devices and software.
This requires sales people, developers and a substantial portion of marketing efforts. That’s something that cannot be sustained solely by grassroots initiatives on bitcoin alone, and can’t be achieved by a single developer working out of a small studio on his own. To scale, these companies often rely on seed funding, venture capital or grants from larger bitcoin-focused firms. Even then, working for such companies, even if you’re really motivated often doesn’t pay the (fiat) bills.
The same applies to teams building something on Lightning Network, projects developing on Liquid or companies attempting to establish bitcoin-native lending platforms and the likes. If (like me) you want to work for them, be prepared to do it either for free, off the books or for peanuts… or become a peanut yourself.
The realities of bitcoin Jobs
Based on my experience working in bitcoin-related roles—particularly within the EU (where taxation and regulations are more rigid and social security systems are extensive) several common challenges emerged:
High intensity: The work often demands significant time and effort due to the passion-driven nature of the industry. This is good, a fiat job is often draining, while a bitcoin job is more energetic and intense in nature. We’re building something good. It’s also good to remember that this energy is often used to make you do the work, without the reward.
Lower pay: At least in my experience; salaries tend to be lower compared to traditional tech or finance roles, and I’ve even seen bickering over the price like it was a flee market.
Funding struggles: Many bitcoin startups face ongoing financial uncertainty, troubles finding investors, or getting investors that cancel their deals or disappear entirely.
Constant involvement: There’s little room to “clock out” at 5 PM; engagement is often expected beyond regular hours (it comes with the territory).
Lack of benefits: Many bitcoin jobs offer no social security, no formal employment status, and often operate in a gray area, or completely “off the books”. For a company selling their product the whole world over for example, you would expect something else than back alley deals with whispered price agreements. The contracts however, are usually centered about keeping the employee in check and their knowledge protected.
Presence of “grifters”: Some individuals with strong reputations or connections manage to secure more lucrative positions, despite contributing little meaningful work. That’s human nature of course, and it seems to happen in in fiat, bitcoin or voluntary work alike.
bitcoin employee receiving his contract and first payment Some argue that receiving bitcoin as payment is, in itself, a form of financial (and social) security. However, this ignores the realities of daily life. In the absence of a global bitcoin standard, workers still depend on government regulations, taxation systems, and social security structures (in Europe).
For instance, if a bitcoiner falls ill for two weeks, they may lose their income entirely. Meanwhile, an employee at a tech firm, bank, or blue-chip company would typically receive paid sick leave or at least retain their job security. I know this is a fairly Euro-zone centered view, and the rest of the world has of course different ways to compensate for that. Either this happens through having lower taxation, or having more self-reliance on private savings and “buffers” to build up your own protection as an employee.
It all comes down to either getting paid more to have your expenses and social security covered by yourself, or getting paid less and leaving a cut for some state fiat system that will take care of your social benefits if they’re needed.
So far, from what I heard an experienced in a bitcoin job it’s the worst of both worlds: low(er) pay, more uncertainty and no security benefits. That’s something that can be fixed.
While social protections in the fiat system are funded through mechanisms like inflation and money printing, and a lot of taxation, their “benefits” are tangible (and expensive).
In contrast, many bitcoin jobs rely on ideological commitment, which can sometimes be exploited, where individuals are expected to work for little or no compensation - while forgoing the protections that traditional employment offers.
Even is we are more sovereign as bitcoiners you sooner or later get older, get sick, have a baby or have other phases in your life. For the companies themselves this is also a huge challenge: the hiring of people and paying them in hard money, means that their output and real life worth to the company needs to be higher in total over all employees than the holding of the same amount of bitcoin. Since bitcoin itself has the magnificent feature of not bearing yield (just holding 1 bitcoin doesn’t pay you 0.01 bitcoin dividend). Even more so, the employee is paid in bitcoin, and can thus be more free, have hard money that is inflation resistent over a longer time period. Retaining these employees for longer periods of time (if that’s your goal anyway as a bitcoin company) can be a real challenge. I don’t see how you can retain people doing an intense job while you pay them in the hardest money there is. I guess motivation is really the key here.
The fiat world has that covered (we know how of course and we know they do it though printing money and taxation).
The bitcoin world still needs to figure out how to deal with these situations. Just promising people some bitcoin is not enough.
Building a better future for bitcoin jobs One of the biggest obstacles according to me, is to a true bitcoin standard — aside from the challenge of using bitcoin for manufacturing and basic goods (which I’ll address later)— is the lack of meaningful job opportunities that provide both bitcoin salaries and financial security on a mid to longer time frame. Bitcoiners or no bitcoiners, people don’t want to hop from one job to another every few weeks.
I think sooner or later the bitcoin space will need a global bitcoin social security framework — one that reimagines financial protection for workers without simply replicating the state-run systems of the fiat world, and certainly doesn’t replicate the European systems that failed so miserably (my country for example imposes the highest tax in the world counted from employer to employee in order to pay for social benefits). If the employer pays 6000€, the taxation causes the employee to receive a mere 3440€.
Today, a bitcoin-only company is already rare. A bitcoin company that offers proper employment contracts, benefits, actually pays on time, has a future ànd has a minimal plan for some form of social protection is nearly nonexistent.
That’s why I argue: real bitcoin jobs are almost nonexistent.
What we have instead are:
-
A bunch of hobby projects and side gigs in the v4v space.
-
Startups that offer little to no worker protection and rely on goodwill or fantastic ideas with a lack of fundamental backing.
-
A handful of legitimate companies that still depend on fiat-based social security and payment structures to operate and attract and keep talent.
The missing link: financial and social security for bitcoin jobs
We need more companies like Bitwage3 as well where bitcoin jobs and their administrative and payment handlings are taken care of (also in Europe), They must be entirely bitcoin-only or have a subsidiary that works exclusively on pure bitcoin jobs.
With a yet-to-be-invented social system which gives bitcoin employees a way to build up an securing their well-being in the long rung (bitcoiners don’t stay forever 21). That would increase this btc-job market and the legitimacy of its real life employment.
Without this, working in bitcoin will continue to feel unstable, informal, or even go “off-the-books” because of a lack of alternatives.
If bitcoin companies want to attract top talent, they need to offer more than just ideology and goodwill. There are countless people that had bad experiences with this.
Many skilled professionals currently enjoy secure fiat jobs with stable salaries, full benefits, and usually minimal effort. Yet, they want out. They know fiat jobs are a trip though quicksand.
Without a competitive alternative however, bitcoin businesses will continue to rely on those willing to struggle financially and living like a “value4value” ideologist (or even worse: grifters), others will be people that contribute real value but are underpaid and face difficulties using their bitcoin earnings for everyday expenses like rent, groceries and utilities (without resorting to questionable third-party services)
That last category of employees or possible employees is often overlooked. There’s a whole generation that doesn’t sit on a stash of bitcoin in order to fund their own “ideal job” or have ideology of an open-source encrypt everything and live on bitcoin only warrior. Some people have to pay their rent, buy food or at least know they’ll be still having a job tomorrow if they work hard.
In the oasis of a bitcoin job in 2025, you soon crawl to that one lousy coconut in that one palm tree in order to survive.
“Tick-tock next job”
Today, most so-called "bitcoin jobs" fall into one of two categories :
Not actually bitcoin-related – Corporate blockchain projects, scams, token-based schemes, memecoins, rugpull/defi/web3/NFT peddlers, and “anything on the blockchain” services without a proper oracle… and other type of distractions. These are sometimes presented as bitcoin jobs, yet they aren’t.
Paid in bitcoin but lacking real merit : Low or mediocre wages, no benefits and no worker protection, in an industry where your value lasts about as long as the average block time (pun intended).
Well-paid longer term real bitcoin jobs: Good pay, on the books, meaningful and well organized pure bitcoin job, for the happy few who have good connections.
If bitcoin employment is to be more than just a passion project where dedicated workers struggle while CEOs and media personalities live lavishly, we need a sustainable framework that provides real financial longevity, funding and real bitcoin jobs.
Without it, bitcoin will remain an industry with unstable or even sketchy niche job offerings, with neither long-term careers nor financial (let alone social) security. If people can’t build a future in bitcoin jobs, the right talent won’t be attracted in the first place. Which is amazing, come to thing of it, we’re probably the only industry that thrives on hard money, we should have the most quality jobs and most happy employees.
Passion alone isn’t enough. When everyone knows bitcoin jobs are short-term or unstable, motivation dwindles. The reality is that some people, myself included, would rather endure a dull fiat job, than waste their valuable time and money on an industry that fails to offer real career prospects and real support for their talent.
All the billions held by all these big companies and fund, is not put to use for their actual builders and talent it seems. I can’t explain the billions of holdings and on the other side, the total lack of funding happening on projects and startups.
More so, the vast majority of bitcoin jobs are nor jobs, nor bitcoin jobs or not anything that can be defined as such. And it shows.
That’s why a lot of products and services are currently in the lousy (lazy) state they’re in and that’s why almost all bitcoiners are either stuck in a fiat job or work within the bitcoin system for peanuts out of ideology or through good connections. Right now, other than the possible btc in your wallet, there’s little to no difference between bitcoin jobs and fiat jobs in that regard. No wonder choosing safety of a fiat job still wins, and I hope that will change one day. Until then, working for Bill Lumbergh has it’s perks.
by Kim De Vos for AVB tips: here
Disclaimer: To provide content more regularly, I occasionally write my posts with AI assistance. Rest assured, the core ideas and writing are always 100% my own creation and it’s edited by at least two humans!
Footnotes:
1 definition : The word "sham" refers to something that is theater or designed to deceive. It describes a situation, scheme, or entity that appears legitimate on the surface but lacks substance, authenticity, or real core values.
2 https://t.me/bitvocationfeed
3 https://bitwage.com/en-us/The dream
For many people who learned to use, work with, understand and hold bitcoin, one goal consistently stands out: the dream to one day work in a bitcoin job.\ In my entourage, this was for a long time the main thing most tried to achieve.
The prospect of such job is to work in the bitcoin industry and it seems like a lofty goal: it combines innovation, technology and the opportunity to collaborate with like-minded individuals while earning bitcoin. It’s also “cool”.\ \ It’s an industry (yes, it’s an industry now) that thrives on the promise of that ultimate payout: hard money, bitcoin.\ Who wouldn’t want that?\ Certainly if you word in a fiat job right now.
At the same time, this longing comes with certain expectations. People assume a bitcoin-related job will be exciting, rewarding, efficient, well-funded and will happen in a professional environment - that often is lacking in fiat jobs.
I hate to break it to you, fellow bitcoiners, but the oasis of bitcoin jobs you’re crawling toward through the scorching fiat desert is mostly a mirage. Once you arrive at what seems like a place of plenty, you’ll find just a few orange-colored rocks and maybe a lone palm tree with a single, withered coconut barely hanging on.
The main reason? The reality of bitcoin jobs isn’t as different from fiat jobs as you might expect—at least, not yet.\ \ After all, bitcoiners should be “better” people, right? Unlike those fiat wage slaves who don’t realize that being paid in dirty fiat slowly makes them poorer, we like to think we’re ahead of the curve. We feel more vindicated, more enlightened—bitcoiners are the better, more evolved kind. Or so we tell ourselves.\ \ The realization of how hard money actually shapes society has not yet fully matured. We’re all still in the discovery phase. Even with die hard bitcoiners and their respective job industry aren’t there yet. During this discovery phase, it’s important to not let ourselves be blinded by the sun in the desert. We need not to be blinded by the promises and the ideology to let ourselves be taken advantage of by fiat-minded people, even if they own a bitcoin company.\ \ Hard money is the way forward. Bitcoin is the way forward. Most people and certainly their jobs and companies are lagging behind that reality.
Such a job is not (yet) going to bring you Valhalla (or its equivalent) in the form of a well-paid bitcoin job.\ \ Let’s walk over the reasons as to why that is.
The Fiat (Brain) Drain
We don’t need to spend much time summarizing how soul-crushing a fiat job can be. Countless books, blogs, and social media rants already detail how monotonous, pointless, and draining traditional employment is. And for those of you that need a crash course on that: The 1999 movie Office Space remains a masterpiece in this regard. By now, we’ve all worked for a version of “Bill Lumbergh” at one point or another.
Bill Lumbergh at Initech (Office Space)
From a bitcoiner’s perspective, a fiat job is merely a temporary solution to the problem of liquidity for consumer tokens — tokens printed for free by an entity like a state system, which itself is a tax, deb-and-war engine. At the same time, there’s a good chance to get people out of their fiat jobs, purely on this promise, as I wrote in “the fiat brain drain“.\ \ If you operate within that fiat world, you’re bound to these forces. On top of that, your purchasing power is continually siphoned away through inflation, and you get taxed out of any long-term wealth buildup. On the other hand, that same fiat system makes you dependent on their return in social safety and being regarded as “OK”.
Most bitcoiners want a bitcoin job, exactly to escape this pit of misery. To leave this Linkedin-vortex of fake, the loser mentality, its hierarchical nonsense and bureaucratic drudgery that will soon be rendered obsolete by automation and AI, compounding with the ongoing brain drain at the top of the innovation pyramid.
That’s a long-winded way of saying: a fiat job is financial quicksand. And you’re knee-deep in it.
The solution? “bitcoin jobs”
\ If a bitcoin job were truly the answer, the solution would be simple: launch a bitcoin company, hire bitcoiners willing to work for bitcoin and start building products and services that function in both the fiat and bitcoin worlds—emphasizing the transition to better money: bitcoin.
But without capital, you’re stuck, whether in fiat or bitcoin.
The framework may shift slightly, but the fundamental problem remains. Those with capital can secure real bitcoin jobs or start real bitcoin companies, just as those with financial backing in the fiat world can choose work, they enjoy without worrying about pay or job-hunting struggles.
That’s not to say someone with limited funds and no capital can’t start such a company, but they’ll quickly run into funding issues. bitcoin jobs require payment in bitcoin but also fiat funds to pay for real life goods at most suppliers and services. Unless you build your own office (if you need one anyway) you’ll be paying in fiat to rent some office space (pun intended).
If you lack capital (in bitcoin), you’ll hit a wall sooner rather than later.\ So, in comes “other capital” to save you.
Relying on larger entities, whether venture capital firms or industry-supporting companies, to cover expenses also comes at the cost of independence; if they even provide funding at all.\ \ While there's no shortage of hype and excitement around bitcoin projects, actual funding for many of these ventures is speculative at best. When you want to help these projects out for free, there’s also no shortage of open arms, welcoming the free hours of work for a project you’re passionate about.
Numerous startups in the crypto space operate on shoestring budgets, relying on ICOs (Initial Coin Offerings) or venture capital more interested in hype than substance. This creates a precarious job environment where projects can disappear as quickly as they emerge, leaving employees stranded.
Sustainability, or lack thereof, is another major concern.\ Bitcoin jobs that promise longevity often come with a caveat: they're here today, but there's no guarantee they’ll last until next month.\ The market’s volatility means projects can lose funding or pivot dramatically within months of no technical challenges or a dry up for demand pops up.\ Finding a position with a horizon beyond a few months in the future is rare, making long-term career planning in this sector a gamble. Most of these jobs are not even bitcoin jobs, but are presented that way. They’re mostly a sham!1
\ Pay up
\ Then there's the pay.\ \ Even if you secure a position, and it’s a bit more long-term, then the promise of "decent, livable pay" is often unfulfilled.\ While some roles offer competitive salaries, many pay in bitcoin, which fluctuates of course (by the way, that’s a good thing, volatility is our friend).\ The trustworthiness of some of these bitcoin jobs, mostly at smaller startups can get even worse, where you as an employee are at risk to not receive promised payments at all due to funding issues.
The bitcoin job market presents a paradox: it's full of opportunities, yet few meet the criteria for being well-funded, sustainable, and offering reliable compensation and protection.\ For those looking to build a career in this space, caution is key do your due diligence, don’t trust verify on potential employers and diversify your own skills can help mitigate the risks somewhat.
Until the industry matures and offers greater stability and accountability, the allure of bitcoin jobs may remain problematic.
The harsh reality is, that the carrot of a bitcoin job, that’s been dangling in front of most bitcoiners’ eyes for a long time, is tempting, but mostly just that: an unreachable goal, not because you can’t get that job, but more because that job was a mirage on itself.\ The dream that most of us have is to leave the rat-race with its unfulfilling fiat jobs, to work in a better way, a job that pays in hard money and builds a better world.\ \ I’m afraid that dream is just that: a dream. These jobs are mostly reserved for the inner-circle of some venture capitalist’s entourage or revolve around making use (or misuse) of bitcoiner’s ideology and goals in life.
But there’s hope
Many people want to be paid in bitcoin, but until we transition to a bitcoin standard, they still need to cover expenses in a fiat-dominated world.
Finding a good fiat job is exhausting. And once you’ve been fully orange-pilled, earning fiat starts to feel like an even bigger scam—arguably worse than the Value for Value model.\ In the end, you’ll either work for peanuts or turn into a peanut yourself — a very salty one at that.
Definition
Let’s clarify what a bitcoin job" actually is, since the term often gets misused for anything remotely fintech or crypto-related anyway.
A bitcoin job involves real, tangible work — simply holding a title isn’t enough. It provides income paid directly in bitcoin, not in stocks, tokens (or other cryptocurrencies other than bitcoin).\ It requires a significant commitment of time, making it distinct from minor side gigs like washing a neighbor’s car — unless that gig somehow becomes your primary source of income.
Owning a company doesn’t count as a job on its own; you must be actively working in it (for example as a real hands-on developer or COO/CEO).\ \ The role must be tied to a legitimate organization — a company or corporation — not just a loosely organized WhatsApp group pretending to be a business. It should be official, meaning it’s on the books, taxable where applicable, and, in some cases (such as in the EU), may even come with social benefits and retirement benefit buildup.
The focus must remain bitcoin only. Companies dealing exclusively in altcoins, memecoins, hype-cycles and the likes don’t qualify. Multi-cryptocurrency businesses, like exchanges or DeFi platforms, are more fintech than pure bitcoin.\ For example, a job at a bitcoin-only hardware company fits the definition, whereas a position at a Solana based trading platform does not.\ \ About that real work: A disorganized WhatsApp group isn’t a company but a hobby project.
If a job doesn’t meet these criteria above, it’s unlikely to be a true bitcoin job. Looking at listings on platforms like Bitvocation2 (link) or the job sections of bitcoin/crypto companies, many roles appear to be standard fiat economy positions but within a bitcoin (or altcoins) focused company.\ (by the way, the Bitvocation team runs an excellent service that has a direct reach from open vacancies towards possible employees,… I love it).
For example, an HR role at a bitcoin company is fundamentally the same as one at a traditional fiat company (except for the occasional ordering of extra black hoodies for employees).\ Choosing to be paid in bitcoin may qualify it as a “bitcoin job,” but the role itself would exist in any industry. These positions could be considered bitcoin jobs since they contribute to our ecosystem while being financially tied to it.
From personal experience and observations, smaller bitcoin startups face significant challenges in securing funding.\ What is puzzling about this, that all this difficult environment to get a projects/startups funded happens, despite bitcoin being a trillion-dollar asset and major holders like Strategy accumulating nearly 500,000 BTC.
Top bitcoin company holdings:
BlackRock IBIT: 587,050 BTC\ Strategy (MSTR): 478,740 BTC\ Coinbase (COIN): 1,051,650 BTC\ Binance: 765,072 BTC\ Bitfinex: 359,687 BTC
Beyond funding, these startups also struggle to attract talent for a longer period of time. Traditional finance, fintech and even the broader cryptocurrency industry usually offer higher salaries and more perceived prestige (not in the bitcoin space, but outside) along with the perks of having a half fiat / “crypto” job.\ \ Employees who choose to work in bitcoin often do so for ideological reasons, willingly giving up the stability and structure of traditional industries. This is both a strength and a risk. While bitcoin startups operate in a highly innovative space, they also face volatility and uncertainty.
The survival rate of bitcoin startups is low—around 10% make it past three years (according to Seedtable data). Most crypto-related job openings come from DeFi projects and general crypto firms, while jobs focused solely on bitcoin are typically backed by venture capital.
For instance: Fedi (federated lightning “all-in one freedom tool”) is employing between 27 and 50 people according to publicly available data. It’s backed by ‘Ego Death Capital’.\ \ Other key VC firms in the bitcoin space include:
Axiom BTC\ Bitcoin Opportunity Fund\ Bitcoiner Ventures\ Epoch VC\ Lightning Ventures\ Ten31\ Timechain VC
These firms play a crucial role in sustaining bitcoin-only businesses, as traditional funding routes remain scarce.\ Once inside these companies, there’s often a push for maximum efficiency and lean operations — while working with hard money. This paradox is frequently overlooked. Hard money means a long term time horizon. While bitcoin jobs often offer the polar opposite.
Bitcoin jobs are highly competitive on a global scale as well. Much like remote fiat jobs, most bitcoin-related roles can be done from anywhere in the world, meaning candidates are competing with a vast international talent pool.\ This makes securing a position even more challenging (especially for Europeans) in an industry that operates in a fast-changing and often challenging technological landscape from a marketing and cost/benefits perspective.
For example, a company developing a bitcoin PoS (point-of-sale) system for cash registers and checkout online, needs traction to sell its product and grow its user base but needs fiat funds to acquire material and develop point of sale devices and software.\ \ This requires sales people, developers and a substantial portion of marketing efforts. That’s something that cannot be sustained solely by grassroots initiatives on bitcoin alone, and can’t be achieved by a single developer working out of a small studio on his own.\ To scale, these companies often rely on seed funding, venture capital or grants from larger bitcoin-focused firms. Even then, working for such companies, even if you’re really motivated often doesn’t pay the (fiat) bills.
The same applies to teams building something on Lightning Network, projects developing on Liquid or companies attempting to establish bitcoin-native lending platforms and the likes. If (like me) you want to work for them, be prepared to do it either for free, off the books or for peanuts… or become a peanut yourself.
The realities of bitcoin Jobs
\ Based on my experience working in bitcoin-related roles—particularly within the EU (where taxation and regulations are more rigid and social security systems are extensive) several common challenges emerged:
High intensity: The work often demands significant time and effort due to the passion-driven nature of the industry. This is good, a fiat job is often draining, while a bitcoin job is more energetic and intense in nature. We’re building something good. It’s also good to remember that this energy is often used to make you do the work, without the reward.
Lower pay: At least in my experience; salaries tend to be lower compared to traditional tech or finance roles, and I’ve even seen bickering over the price like it was a flee market.
Funding struggles: Many bitcoin startups face ongoing financial uncertainty, troubles finding investors, or getting investors that cancel their deals or disappear entirely.
Constant involvement: There’s little room to “clock out” at 5 PM; engagement is often expected beyond regular hours (it comes with the territory).
Lack of benefits: Many bitcoin jobs offer no social security, no formal employment status, and often operate in a gray area, or completely “off the books”.\ For a company selling their product the whole world over for example, you would expect something else than back alley deals with whispered price agreements. The contracts however, are usually centered about keeping the employee in check and their knowledge protected.
Presence of “grifters”: Some individuals with strong reputations or connections manage to secure more lucrative positions, despite contributing little meaningful work. That’s human nature of course, and it seems to happen in in fiat, bitcoin or voluntary work alike.
bitcoin employee receiving his contract and first payment
Some argue that receiving bitcoin as payment is, in itself, a form of financial (and social) security. However, this ignores the realities of daily life. In the absence of a global bitcoin standard, workers still depend on government regulations, taxation systems, and social security structures (in Europe).
For instance, if a bitcoiner falls ill for two weeks, they may lose their income entirely. Meanwhile, an employee at a tech firm, bank, or blue-chip company would typically receive paid sick leave or at least retain their job security.\ I know this is a fairly Euro-zone centered view, and the rest of the world has of course different ways to compensate for that. Either this happens through having lower taxation, or having more self-reliance on private savings and “buffers” to build up your own protection as an employee.\ \ It all comes down to either getting paid more to have your expenses and social security covered by yourself, or getting paid less and leaving a cut for some state fiat system that will take care of your social benefits if they’re needed.\ \ So far, from what I heard an experienced in a bitcoin job it’s the worst of both worlds: low(er) pay, more uncertainty and no security benefits. That’s something that can be fixed.
While social protections in the fiat system are funded through mechanisms like inflation and money printing, and a lot of taxation, their “benefits” are tangible (and expensive).\ \ In contrast, many bitcoin jobs rely on ideological commitment, which can sometimes be exploited, where individuals are expected to work for little or no compensation - while forgoing the protections that traditional employment offers.\ \ Even is we are more sovereign as bitcoiners you sooner or later get older, get sick, have a baby or have other phases in your life.\ For the companies themselves this is also a huge challenge: the hiring of people and paying them in hard money, means that their output and real life worth to the company needs to be higher in total over all employees than the holding of the same amount of bitcoin. Since bitcoin itself has the magnificent feature of not bearing yield (just holding 1 bitcoin doesn’t pay you 0.01 bitcoin dividend).\ Even more so, the employee is paid in bitcoin, and can thus be more free, have hard money that is inflation resistent over a longer time period. Retaining these employees for longer periods of time (if that’s your goal anyway as a bitcoin company) can be a real challenge. I don’t see how you can retain people doing an intense job while you pay them in the hardest money there is.\ I guess motivation is really the key here.\ \ The fiat world has that covered (we know how of course and we know they do it though printing money and taxation).\ \ The bitcoin world still needs to figure out how to deal with these situations. Just promising people some bitcoin is not enough.
Building a better future for bitcoin jobs
One of the biggest obstacles according to me, is to a true bitcoin standard — aside from the challenge of using bitcoin for manufacturing and basic goods (which I’ll address later)— is the lack of meaningful job opportunities that provide both bitcoin salaries and financial security on a mid to longer time frame.\ Bitcoiners or no bitcoiners, people don’t want to hop from one job to another every few weeks.
I think sooner or later the bitcoin space will need a global bitcoin social security framework — one that reimagines financial protection for workers without simply replicating the state-run systems of the fiat world, and certainly doesn’t replicate the European systems that failed so miserably (my country for example imposes the highest tax in the world counted from employer to employee in order to pay for social benefits).\ If the employer pays 6000€, the taxation causes the employee to receive a mere 3440€.\ \ Today, a bitcoin-only company is already rare.\ A bitcoin company that offers proper employment contracts, benefits, actually pays on time, has a future ànd has a minimal plan for some form of social protection is nearly nonexistent.
That’s why I argue: real bitcoin jobs are almost nonexistent.
What we have instead are:\ \ - A bunch of hobby projects and side gigs in the v4v space.
- Startups that offer little to no worker protection and rely on goodwill or fantastic ideas with a lack of fundamental backing.
- A handful of legitimate companies that still depend on fiat-based social security and payment structures to operate and attract and keep talent.
The missing link: financial and social security for bitcoin jobs
\ We need more companies like Bitwage3 as well where bitcoin jobs and their administrative and payment handlings are taken care of (also in Europe), They must be entirely bitcoin-only or have a subsidiary that works exclusively on pure bitcoin jobs.\ \ With a yet-to-be-invented social system which gives bitcoin employees a way to build up an securing their well-being in the long rung (bitcoiners don’t stay forever 21).\ That would increase this btc-job market and the legitimacy of its real life employment.\ \ Without this, working in bitcoin will continue to feel unstable, informal, or even go “off-the-books” because of a lack of alternatives.
If bitcoin companies want to attract top talent, they need to offer more than just ideology and goodwill.\ There are countless people that had bad experiences with this.\ \ Many skilled professionals currently enjoy secure fiat jobs with stable salaries, full benefits, and usually minimal effort. Yet, they want out. They know fiat jobs are a trip though quicksand.\ \ Without a competitive alternative however, bitcoin businesses will continue to rely on those willing to struggle financially and living like a “value4value” ideologist (or even worse: grifters), others will be people that contribute real value but are underpaid and face difficulties using their bitcoin earnings for everyday expenses like rent, groceries and utilities (without resorting to questionable third-party services)
That last category of employees or possible employees is often overlooked. There’s a whole generation that doesn’t sit on a stash of bitcoin in order to fund their own “ideal job” or have ideology of an open-source encrypt everything and live on bitcoin only warrior. Some people have to pay their rent, buy food or at least know they’ll be still having a job tomorrow if they work hard.\ \ In the oasis of a bitcoin job in 2025, you soon crawl to that one lousy coconut in that one palm tree in order to survive.
“Tick-tock next job”
\ Today, most so-called "bitcoin jobs" fall into one of two categories :
-
Not actually bitcoin-related – Corporate blockchain projects, scams, token-based schemes, memecoins, rugpull/defi/web3/NFT peddlers, and “anything on the blockchain” services without a proper oracle… and other type of distractions.\ These are sometimes presented as bitcoin jobs, yet they aren’t.
-
Paid in bitcoin but lacking real merit :\ Low or mediocre wages, no benefits and no worker protection, in an industry where your value lasts about as long as the average block time (pun intended).
-
Well-paid longer term real bitcoin jobs:\ Good pay, on the books, meaningful and well organized pure bitcoin job, for the happy few who have good connections.
If bitcoin employment is to be more than just a passion project where dedicated workers struggle while CEOs and media personalities live lavishly, we need a sustainable framework that provides real financial longevity, funding and real bitcoin jobs.
Without it, bitcoin will remain an industry with unstable or even sketchy niche job offerings, with neither long-term careers nor financial (let alone social) security.\ If people can’t build a future in bitcoin jobs, the right talent won’t be attracted in the first place. Which is amazing, come to thing of it, we’re probably the only industry that thrives on hard money, we should have the most quality jobs and most happy employees.
Passion alone isn’t enough.\ When everyone knows bitcoin jobs are short-term or unstable, motivation dwindles. The reality is that some people, myself included, would rather endure a dull fiat job, than waste their valuable time and money on an industry that fails to offer real career prospects and real support for their talent.\ \ All the billions held by all these big companies and fund, is not put to use for their actual builders and talent it seems. I can’t explain the billions of holdings and on the other side, the total lack of funding happening on projects and startups.\ \ More so, the vast majority of bitcoin jobs are nor jobs, nor bitcoin jobs or not anything that can be defined as such.\ And it shows.\ \ That’s why a lot of products and services are currently in the lousy (lazy) state they’re in and that’s why almost all bitcoiners are either stuck in a fiat job or work within the bitcoin system for peanuts out of ideology or through good connections.\ Right now, other than the possible btc in your wallet, there’s little to no difference between bitcoin jobs and fiat jobs in that regard.\ No wonder choosing safety of a fiat job still wins, and I hope that will change one day.\ Until then, working for Bill Lumbergh has it’s perks.
by Kim De Vos for AVB\ tips: here
Disclaimer: To provide content more regularly, I occasionally write my posts with AI assistance. Rest assured, the core ideas and writing are always 100% my own creation and it’s edited by at least two humans!
Footnotes:
definition : The word "sham" refers to something that is theater or designed to deceive. It describes a situation, scheme, or entity that appears legitimate on the surface but lacks substance, authenticity, or real core values.
https://t.me/bitvocationfeed
https://bitwage.com/en-us/
-
-
@ 2e8970de:63345c7a
2025-03-15 19:55:44In international tests, student scores for reading and maths sunk to a new low.
US 18 year olds increasingly say they have trouble concentrating and learning new things
Almost half of US teens said they "hardly ever" spend their leisure time reading a book
The share of adults who are unable to “use mathematical reasoning when reviewing and evaluating the validity of statements” has reached - 25% in high-income countries - 35% in the US
https://www.ft.com/content/a8016c64-63b7-458b-a371-e0e1c54a13fc
originally posted at https://stacker.news/items/914140