-
@ b17fccdf:b7211155
2025-03-25 11:23:36Si vives en España, quizás hayas notado que no puedes acceder a ciertas páginas webs durante los fines de semana o en algunos días entre semana, entre ellas, la guía de MiniBolt.
Esto tiene una razón, por supuesto una solución, además de una conclusión. Sin entrar en demasiados detalles:
La razón
El bloqueo a Cloudflare, implementado desde hace casi dos meses por operadores de Internet (ISPs) en España (como Movistar, O2, DIGI, Pepephone, entre otros), se basa en una orden judicial emitida tras una demanda de LALIGA (Fútbol). Esta medida busca combatir la piratería en España, un problema que afecta directamente a dicha organización.
Aunque la intención original era restringir el acceso a dominios específicos que difundieran dicho contenido, Cloudflare emplea el protocolo ECH (Encrypted Client Hello), que oculta el nombre del dominio, el cual antes se transmitía en texto plano durante el proceso de establecimiento de una conexión TLS. Esta medida dificulta que las operadoras analicen el tráfico para aplicar bloqueos basados en dominios, lo que les obliga a recurrir a bloqueos más amplios por IP o rangos de IP para cumplir con la orden judicial.
Esta práctica tiene consecuencias graves, que han sido completamente ignoradas por quienes la ejecutan. Es bien sabido que una infraestructura de IP puede alojar numerosos dominios, tanto legítimos como no legítimos. La falta de un "ajuste fino" en los bloqueos provoca un perjuicio para terceros, restringiendo el acceso a muchos dominios legítimos que no tiene relación alguna con actividades ilícitas, pero que comparten las mismas IPs de Cloudflare con dominios cuestionables. Este es el caso de la web de MiniBolt y su dominio
minibolt.info
, los cuales utilizan Cloudflare como proxy para aprovechar las medidas de seguridad, privacidad, optimización y servicios adicionales que la plataforma ofrece de forma gratuita.Si bien este bloqueo parece ser temporal (al menos durante la temporada 24/25 de fútbol, hasta finales de mayo), es posible que se reactive con el inicio de la nueva temporada.
La solución
Obviamente, MiniBolt no dejará de usar Cloudflare como proxy por esta razón. Por lo que a continuación se exponen algunas medidas que como usuario puedes tomar para evitar esta restricción y poder acceder:
~> Utiliza una VPN:
Existen varias soluciones de proveedores de VPN, ordenadas según su reputación en privacidad: - IVPN - Mullvad VPN - Proton VPN (gratis) - Obscura VPN (solo para macOS) - Cloudfare WARP (gratis) + permite utilizar el modo proxy local para enrutar solo la navegación, debes utilizar la opción "WARP a través de proxy local" siguiendo estos pasos: 1. Inicia Cloudflare WARP y dentro de la pequeña interfaz haz click en la rueda dentada abajo a la derecha > "Preferencias" > "Avanzado" > "Configurar el modo proxy" 2. Marca la casilla "Habilite el modo proxy en este dispositivo" 3. Elige un "Puerto de escucha de proxy" entre 0-65535. ej: 1080, haz click en "Aceptar" y cierra la ventana de preferencias 4. Accede de nuevo a Cloudflare WARP y pulsa sobre el switch para habilitar el servicio. 3. Ahora debes apuntar el proxy del navegador a Cloudflare WARP, la configuración del navegador es similar a esta para el caso de navegadores basados en Firefox. Una vez hecho, deberías poder acceder a la guía de MiniBolt sin problemas. Si tienes dudas, déjalas en comentarios e intentaré resolverlas. Más info AQUÍ.
~> Proxifica tu navegador para usar la red de Tor, o utiliza el navegador oficial de Tor (recomendado).
La conclusión
Estos hechos ponen en tela de juicio los principios fundamentales de la neutralidad de la red, pilares esenciales de la Declaración de Independencia del Ciberespacio que defiende un internet libre, sin restricciones ni censura. Dichos principios se han visto quebrantados sin precedentes en este país, confirmando que ese futuro distópico que muchos negaban, ya es una realidad.
Es momento de actuar y estar preparados: debemos impulsar el desarrollo y la difusión de las herramientas anticensura que tenemos a nuestro alcance, protegiendo así la libertad digital y asegurando un acceso equitativo a la información para todos
Este compromiso es uno de los pilares fundamentales de MiniBolt, lo que convierte este desafío en una oportunidad para poner a prueba las soluciones anticensura ya disponibles, así como las que están en camino.
¡Censúrame si puedes, legislador! ¡La lucha por la privacidad y la libertad en Internet ya está en marcha!
Fuentes: * https://bandaancha.eu/articulos/movistar-o2-deja-clientes-sin-acceso-11239 * https://bandaancha.eu/articulos/esta-nueva-sentencia-autoriza-bloqueos-11257 * https://bandaancha.eu/articulos/como-saltarse-bloqueo-webs-warp-vpn-9958 * https://bandaancha.eu/articulos/como-activar-ech-chrome-acceder-webs-10689 * https://comunidad.movistar.es/t5/Soporte-Fibra-y-ADSL/Problema-con-web-que-usan-Cloudflare/td-p/5218007
-
@ 97c70a44:ad98e322
2025-03-05 18:09:05So you've decided to join nostr! Some wide-eyed fanatic has convinced you that the "sun shines every day on the birds and the bees and the cigarette trees" in a magical land of decentralized, censorship-resistant freedom of speech - and it's waiting just over the next hill.
But your experience has not been all you hoped. Before you've even had a chance to upload your AI-generated cyberpunk avatar or make up exploit codenames for your pseudonym's bio, you've been confronted with a new concept that has left you completely nonplussed.
It doesn't help that this new idea might be called by any number of strange names. You may have been asked to "paste your nsec", "generate a private key", "enter your seed words", "connect with a bunker", "sign in with extension", or even "generate entropy". Sorry about that.
All these terms are really referring to one concept under many different names: that of "cryptographic identity".
Now, you may have noticed that I just introduced yet another new term which explains exactly nothing. You're absolutely correct. And now I'm going to proceed to ignore your complaints and talk about something completely different. But bear with me, because the juice is worth the squeeze.
Identity
What is identity? There are many philosophical, political, or technical answers to this question, but for our purposes it's probably best to think of it this way:
Identity is the essence of a thing. Identity separates one thing from all others, and is itself indivisible.
This definition has three parts:
- Identity is "essential": a thing can change, but its identity cannot. I might re-paint my house, replace its components, sell it, or even burn it down, but its identity as something that can be referred to - "this house" - is durable, even outside the boundaries of its own physical existence.
- Identity is a unit: you can't break an identity into multiple parts. A thing might be composed of multiple parts, but that's only incidental to the identity of a thing, which is a concept, not a material thing.
- Identity is distinct: identity is what separates one thing from all others - the concept of an apple can't be mixed with that of an orange; the two ideas are distinct. In the same way, a single concrete apple is distinct in identity from another - even if the component parts of the apple decompose into compost used to grow more apples.
Identity is not a physical thing, but a metaphysical thing. Or, in simpler terms, identity is a "concept".
I (or someone more qualified) could at this point launch into a Scholastic tangent on what "is" is, but that is, fortunately, not necessary here. The kind of identities I want to focus on here are not our actual identities as people, but entirely fictional identities that we use to extend our agency into the digital world.
Think of it this way - your bank login does not represent you as a complete person. It only represents the access granted to you by the bank. This access is in fact an entirely new identity that has been associated with you, and is limited in what it's useful for.
Other examples of fictional identities include:
- The country you live in
- Your social media persona
- Your mortgage
- Geographical coordinates
- A moment in time
- A chess piece
Some of these identites are inert, for example points in space and time. Other identies have agency and so are able to act in the world - even as fictional concepts. In order to do this, they must "authenticate" themselves (which means "to prove they are real"), and act within a system of established rules.
For example, your D&D character exists only within the collective fiction of your D&D group, and can do anything the rules say. Its identity is authenticated simply by your claim as a member of the group that your character in fact exists. Similarly, a lawyer must prove they are a member of the Bar Association before they are allowed to practice law within that collective fiction.
"Cryptographic identity" is simply another way of authenticating a fictional identity within a given system. As we'll see, it has some interesting attributes that set it apart from things like a library card or your latitude and longitude. Before we get there though, let's look in more detail at how identities are authenticated.
Certificates
Merriam-Webster defines the verb "certify" as meaning "to attest authoritatively". A "certificate" is just a fancy way of saying "because I said so". Certificates are issued by a "certificate authority", someone who has the authority to "say so". Examples include your boss, your mom, or the Pope.
This method of authentication is how almost every institution authenticates the people who associate with it. Colleges issue student ID cards, governments issue passports, and websites allow you to "register an account".
In every case mentioned above, the "authority" creates a closed system in which a document (aka a "certificate") is issued which serves as a claim to a given identity. When someone wants to access some privileged service, location, or information, they present their certificate. The authority then validates it and grants or denies access. In the case of an international airport, the certificate is a little book printed with fancy inks. In the case of a login page, the certificate is a username and password combination.
This pattern for authentication is ubiquitous, and has some very important implications.
First of all, certified authentication implies that the issuer of the certificate has the right to exclusive control of any identity it issues. This identity can be revoked at any time, or its permissions may change. Your social credit score may drop arbitrarily, or money might disappear from your account. When dealing with certificate authorities, you have no inherent rights.
Second, certified authentication depends on the certificate authority continuing to exist. If you store your stuff at a storage facility but the company running it goes out of business, your stuff might disappear along with it.
Usually, authentication via certificate authority works pretty well, since an appeal can always be made to a higher authority (nature, God, the government, etc). Authorities also can't generally dictate their terms with impunity without losing their customers, alienating their constituents, or provoking revolt. But it's also true that certification by authority creates an incentive structure that frequently leads to abuse - arbitrary deplatforming is increasingly common, and the bigger the certificate authority, the less recourse the certificate holder (or "subject") has.
Certificates also put the issuer in a position to intermediate relationships that wouldn't otherwise be subject to their authority. This might take the form of selling user attention to advertisers, taking a cut of financial transactions, or selling surveillance data to third parties.
Proliferation of certificate authorities is not a solution to these problems. Websites and apps frequently often offer multiple "social sign-in" options, allowing their users to choose which certificate authority to appeal to. But this only piles more value into the social platform that issues the certificate - not only can Google shut down your email inbox, they can revoke your ability to log in to every website you used their identity provider to get into.
In every case, certificate issuance results in an asymmetrical power dynamic, where the issuer is able to exert significant control over the certificate holder, even in areas unrelated to the original pretext for the relationship between parties.
Self-Certification
But what if we could reverse this power dynamic? What if individuals could issue their own certificates and force institutions to accept them?
Ron Swanson's counterexample notwithstanding, there's a reason I can't simply write myself a parking permit and slip it under the windshield wiper. Questions about voluntary submission to legitimate authorities aside, the fact is that we don't have the power to act without impunity - just like any other certificate authority, we have to prove our claims either by the exercise of raw power or by appeal to a higher authority.
So the question becomes: which higher authority can we appeal to in order to issue our own certificates within a given system of identity?
The obvious answer here is to go straight to the top and ask God himself to back our claim to self-sovereignty. However, that's not how he normally works - there's a reason they call direct acts of God "miracles". In fact, Romans 13:1 explicitly says that "the authorities that exist have been appointed by God". God has structured the universe in such a way that we must appeal to the deputies he has put in place to govern various parts of the world.
Another tempting appeal might be to nature - i.e. the material world. This is the realm in which we most frequently have the experience of "self-authenticating" identities. For example, a gold coin can be authenticated by biting it or by burning it with acid. If it quacks like a duck, walks like a duck, and looks like a duck, then it probably is a duck.
In most cases however, the ability to authenticate using physical claims depends on physical access, and so appeals to physical reality have major limitations when it comes to the digital world. Captchas, selfies and other similar tricks are often used to bridge the physical world into the digital, but these are increasingly easy to forge, and hard to verify.
There are exceptions to this rule - an example of self-certification that makes its appeal to the physical world is that of a signature. Signatures are hard to forge - an incredible amount of data is encoded in physical signatures, from strength, to illnesses, to upbringing, to personality. These can even be scanned and used within the digital world as well. Even today, most contracts are sealed with some simulacrum of a physical signature. Of course, this custom is quickly becoming a mere historical curiosity, since the very act of digitizing a signature makes it trivially forgeable.
So: transcendent reality is too remote to subtantiate our claims, and the material world is too limited to work within the world of information. There is another aspect of reality remaining that we might appeal to: information itself.
Physical signatures authenticate physical identities by encoding unique physical data into an easily recognizable artifact. To transpose this idea to the realm of information, a "digital signature" might authenticate "digital identities" by encoding unique "digital data" into an easily recognizable artifact.
Unfortunately, in the digital world we have the additional challenge that the artifact itself can be copied, undermining any claim to legitimacy. We need something that can be easily verified and unforgeable.
Digital Signatures
In fact such a thing does exist, but calling it a "digital signature" obscures more than it reveals. We might just as well call the thing we're looking for a "digital fingerprint", or a "digital electroencephalogram". Just keep that in mind as we work our way towards defining the term - we are not looking for something looks like a physical signature, but for something that does the same thing as a physical signature, in that it allows us to issue ourselves a credential that must be accepted by others by encoding privileged information into a recognizable, unforgeable artifact.
With that, let's get into the weeds.
An important idea in computer science is that of a "function". A function is a sort of information machine that converts data from one form to another. One example is the idea of "incrementing" a number. If you increment 1, you get 2. If you increment 2, you get 3. Incrementing can be reversed, by creating a complementary function that instead subtracts 1 from a number.
A "one-way function" is a function that can't be reversed. A good example of a one-way function is integer rounding. If you round a number and get
5
, what number did you begin with? It's impossible to know - 5.1, 4.81, 5.332794, in fact an infinite number of numbers can be rounded to the number5
. These numbers can also be infinitely long - for example rounding PI to the nearest integer results in the number3
.A real-life example of a useful one-way function is
sha256
. This function is a member of a family of one-way functions called "hash functions". You can feed as much data as you like intosha256
, and you will always get 256 bits of information out. Hash functions are especially useful because collisions between outputs are very rare - even if you change a single bit in a huge pile of data, you're almost certainly going to get a different output.Taking this a step further, there is a whole family of cryptographic one-way "trapdoor" functions that act similarly to hash functions, but which maintain a specific mathematical relationship between the input and the output which allows the input/output pair to be used in a variety of useful applications. For example, in Elliptic Curve Cryptography, scalar multiplication on an elliptic curve is used to derive the output.
"Ok", you say, "that's all completely clear and lucidly explained" (thank you). "But what goes into the function?" You might expect that because of our analogy to physical signatures we would have to gather an incredible amount of digital information to cram into our cryptographic trapdoor function, mashing together bank statements, a record of our heartbeat, brain waves and cellular respiration. Well, we could do it that way (maybe), but there's actually a much simpler solution.
Let's play a quick game. What number am I thinking of? Wrong, it's 82,749,283,929,834. Good guess though.
The reason we use signatures to authenticate our identity in the physical world is not because they're backed by a lot of implicit physical information, but because they're hard to forge and easy to validate. Even so, there is a lot of variation in a single person's signature, even from one moment to the next.
Trapdoor functions solve the validation problem - it's trivially simple to compare one 256-bit number to another. And randomness solves the problem of forgeability.
Now, randomness (A.K.A. "entropy") is actually kind of hard to generate. Random numbers that don't have enough "noise" in them are known as "pseudo-random numbers", and are weirdly easy to guess. This is why Cloudflare uses a video stream of their giant wall of lava lamps to feed the random number generator that powers their CDN. For our purposes though, we can just imagine that our random numbers come from rolling a bunch of dice.
To recap, we can get a digital equivalent of a physical signature (or fingerprint, etc) by 1. coming up with a random number, and 2. feeding it into our chosen trapdoor function. The random number is called the "private" part. The output of the trapdoor function is called the "public" part. These two halves are often called "keys", hence the terms "public key" and "private key".
And now we come full circle - remember about 37 years ago when I introduced the term "cryptographic identity"? Well, we've finally arrived at the point where I explain what that actually is.
A "cryptographic identity" is identified by a public key, and authenticated by the ability to prove that you know the private key.
Notice that I didn't say "authenticated by the private key". If you had to reveal the private key in order to prove you know it, you could only authenticate a public key once without losing exclusive control of the key. But cryptographic identities can be authenticated any number of times because the certification is an algorithm that only someone who knows the private key can execute.
This is the super power that trapdoor functions have that hash functions don't. Within certain cryptosystems, it is possible to mix additional data with your private key to get yet another number in such a way that someone else who only knows the public key can prove that you know the private key.
For example, if my secret number is
12
, and someone tells me the number37
, I can "combine" the two by adding them together and returning the number49
. This "proves" that my secret number is12
. Of course, addition is not a trapdoor function, so it's trivially easy to reverse, which is why cryptography is its own field of knowledge.What's it for?
If I haven't completely lost you yet, you might be wondering why this matters. Who cares if I can prove that I made up a random number?
To answer this, let's consider a simple example: that of public social media posts.
Most social media platforms function by issuing credentials and verifying them based on their internal database. When you log in to your Twitter (ok, fine, X) account, you provide X with a phone number (or email) and password. X compares these records to the ones stored in the database when you created your account, and if they match they let you "log in" by issuing yet another credential, called a "session key".
Next, when you "say" something on X, you pass along your session key and your tweet to X's servers. They check that the session key is legit, and if it is they associate your tweet with your account's identity. Later, when someone wants to see the tweet, X vouches for the fact that you created it by saying "trust me" and displaying your name next to the tweet.
In other words, X creates and controls your identity, but they let you use it as long as you can prove that you know the secret that you agreed on when you registered (by giving it to them every time).
Now pretend that X gets bought by someone even more evil than Elon Musk (if such a thing can be imagined). The new owner now has the ability to control your identity, potentially making it say things that you didn't actually say. Someone could be completely banned from the platform, but their account could be made to continue saying whatever the owner of the platform wanted.
In reality, such a breach of trust would quickly result in a complete loss of credibility for the platform, which is why this kind of thing doesn't happen (at least, not that we know of).
But there are other ways of exploiting this system, most notably by censoring speech. As often happens, platforms are able to confiscate user identities, leaving the tenant no recourse except to appeal to the platform itself (or the government, but that doesn't seem to happen for some reason - probably due to some legalese in social platforms' terms of use). The user has to start completely from scratch, either on the same platform or another.
Now suppose that when you signed up for X instead of simply telling X your password you made up a random number and provided a cryptographic proof to X along with your public key. When you're ready to tweet (there's no need to issue a session key, or even to store your public key in their database) you would again prove your ownership of that key with a new piece of data. X could then publish that tweet or not, along with the same proof you provided that it really came from you.
What X can't do in this system is pretend you said something you didn't, because they don't know your private key.
X also wouldn't be able to deplatform you as effectively either. While they could choose to ban you from their website and refuse to serve your tweets, they don't control your identity. There's nothing they can do to prevent you from re-using it on another platform. Plus, if the system was set up in such a way that other users followed your key instead of an ID made up by X, you could switch platforms and keep your followers. In the same way, it would also be possible to keep a copy of all your tweets in your own database, since their authenticity is determined by your digital signature, not X's "because I say so".
This new power is not just limited to social media either. Here are some other examples of ways that self-issued cryptographic identites transform the power dynamic inherent in digital platforms:
- Banks sometimes freeze accounts or confiscate funds. If your money was stored in a system based on self-issued cryptographic keys rather than custodians, banks would not be able to keep you from accessing or moving your funds. This system exists, and it's called bitcoin.
- Identity theft happens when your identifying information is stolen and used to take out a loan in your name, and without your consent. The reason this is so common is because your credentials are not cryptographic - your name, address, and social security number can only be authenticated by being shared, and they are shared so often and with so many counterparties that they frequently end up in data breaches. If credit checks were authenticated by self-issued cryptographic keys, identity theft would cease to exist (unless your private key itself got stolen).
- Cryptographic keys allow credential issuers to protect their subjects' privacy better too. Instead of showing your ID (including your home address, birth date, height, weight, etc), the DMV could sign a message asserting that the holder of a given public key indeed over 21. The liquor store could then validate that claim, and your ownership of the named key, without knowing anything more about you. Zero-knowledge proofs take this a step further.
In each of these cases, the interests of the property owner, loan seeker, or customer are elevated over the interests of those who might seek to control their assets, exploit their hard work, or surveil their activity. Just as with personal privacy, freedom of speech, and Second Amendment rights the individual case is rarely decisive, but in the aggregate realigned incentives can tip the scale in favor of freedom.
Objections
Now, there are some drawbacks to digital signatures. Systems that rely on digital signatures are frequently less forgiving of errors than their custodial counterparts, and many of their strengths have corresponding weaknesses. Part of this is because people haven't yet developed an intuition for how to use cryptographic identities, and the tools for managing them are still being designed. Other aspects can be mitigated through judicious use of keys fit to the problems they are being used to solve.
Below I'll articulate some of these concerns, and explore ways in which they might be mitigated over time.
Key Storage
Keeping secrets is hard. "A lie can travel halfway around the world before the truth can get its boots on", and the same goes for gossip. Key storage has become increasingly important as more of our lives move online, to the extent that password managers have become almost a requirement for keeping track of our digital lives. But even with good password management, credentials frequently end up for sale on the dark web as a consequence of poorly secured infrastructure.
Apart from the fact that all of this is an argument for cryptographic identities (since keys are shared with far fewer parties), it's also true that the danger of losing a cryptographic key is severe, especially if that key is used in multiple places. Instead of hackers stealing your Facebook password, they might end up with access to all your other social media accounts too!
Keys should be treated with the utmost care. Using password managers is a good start, but very valuable keys should be stored even more securely - for example in a hardware signing device. This is a hassle, and something additional to learn, but is an indispensable part of taking advantage of the benefits associated with cryptographic identity.
There are ways to lessen the impact of lost or stolen secrets, however. Lots of different techniques exist for structuring key systems in such a way that keys can be protected, invalidated, or limited. Here are a few:
- Hierarchical Deterministic Keys allow for the creation of a single root key from which multiple child keys can be generated. These keys are hard to link to the parent, which provides additional privacy, but this link can also be proven when necessary. One limitation is that the identity system has to be designed with HD keys in mind.
- Key Rotation allows keys to become expendable. Additional credentials might be attached to a key, allowing the holder to prove they have the right to rotate the key. Social attestations can help with the process as well if the key is embedded in a web of trust.
- Remote Signing is a technique for storing a key on one device, but using it on another. This might take the form of signing using a hardware wallet and transferring an SD card to your computer for broadcasting, or using a mobile app like Amber to manage sessions with different applications.
- Key sharding takes this to another level by breaking a single key into multiple pieces and storing them separately. A coordinator can then be used to collaboratively sign messages without sharing key material. This dramatically reduces the ability of an attacker to steal a complete key.
Multi-Factor Authentication
One method for helping users secure their accounts that is becoming increasingly common is "multi-factor authentication". Instead of just providing your email and password, platforms send a one-time use code to your phone number or email, or use "time-based one time passwords" which are stored in a password manager or on a hardware device.
Again, MFA is a solution to a problem inherent in account-based authentication which would not be nearly so prevalent in a cryptographic identity system. Still, theft of keys does happen, and so MFA would be an important improvement - if not for an extra layer of authentication, then as a basis for key rotation.
In a sense, MFA is already being researched - key shards is one way of creating multiple credentials from a single key. However, this doesn't address the issue of key rotation, especially when an identity is tied to the public key that corresponds to a given private key. There are two possible solutions to this problem:
- Introduce a naming system. This would allow identities to use a durable name, assigning it to different keys over time. The downside is that this would require the introduction of either centralized naming authorities (back to the old model), or a blockchain in order to solve Zooko's trilemma.
- Establish a chain of keys. This would require a given key to name a successor key in advance and self-invalidate, or some other process like social recovery to invalidate an old key and assign the identity to a new one. This also would significantly increase the complexity of validating messages and associating them with a given identity.
Both solutions are workable, but introduce a lot of complexity that could cause more trouble than it's worth, depending on the identity system we're talking about.
Surveillance
One of the nice qualities that systems based on cryptographic identities have is that digitally signed data can be passed through any number of untrusted systems and emerge intact. This ability to resist tampering makes it possible to broadcast signed data more widely than would otherwise be the case in a system that relies on a custodian to authenticate information.
The downside of this is that more untrusted systems have access to data. And if information is broadcast publicly, anyone can get access to it.
This problem is compounded by re-use of cryptographic identities across multiple contexts. A benefit of self-issued credentials is that it becomes possible to bring everything attached to your identity with you, including social context and attached credentials. This is convenient and can be quite powerful, but it also means that more context is attached to your activity, making it easier to infer information about you for advertising or surveillance purposes. This is dangerously close to the dystopian ideal of a "Digital ID".
The best way to deal with this risk is to consider identity re-use an option to be used when desirable, but to default to creating a new key for every identity you create. This is no worse than the status quo, and it makes room for the ability to link identities when desired.
Another possible approach to this problem is to avoid broadcasting signed data when possible. This could be done by obscuring your cryptographic identity when data is served from a database, or by encrypting your signed data in order to selectively share it with named counterparties.
Still, this is a real risk, and should be kept in mind when designing and using systems based on cryptographic identity. If you'd like to read more about this, please see this blog post.
Making Keys Usable
You might be tempted to look at that list of trade-offs and get the sense that cryptographic identity is not for mere mortals. Key management is hard, and footguns abound - but there is a way forward. With nostr, some new things are happening in the world of key management that have never really happened before.
Plenty of work over the last 30 years has gone into making key management tractable, but none have really been widely adopted. The reason for this is simple: network effect.
Many of these older key systems only applied the thinnest veneer of humanity over keys. But an identity is much richer than a mere label. Having a real name, social connections, and a corpus of work to attach to a key creates a system of keys that humans care about.
By bootstrapping key management within a social context, nostr ensures that the payoff of key management is worth the learning curve. Not only is social engagement a strong incentive to get off the ground, people already on the network are eager to help you get past any roadblocks you might face.
So if I could offer an action item: give nostr a try today. Whether you're in it for the people and their values, or you just want to experiment with cryptographic identity, nostr is a great place to start. For a quick introduction and to securely generate keys, visit njump.me.
Thanks for taking the time to read this post. I hope it's been helpful, and I can't wait to see you on nostr!
-
@ 9fec72d5:f77f85b1
2025-02-26 17:38:05The potential universe
AI training is pretty malleable and it has been abused and some insane AI has been produced according to an interview with Marc Andreessen. Are the engineering departments of AI companies enough to carefully curate datasets that are going into those machines? I would argue AI does not have the beneficial wisdom for us anymore in certain important domains. I am not talking about math and science. When it comes to healthy living it does not produce the best answers.
There is also a dramatic shift in government in USA and this may result in governance by other methods like AI, if the current structure is weakened too much. Like it or not current structure involved many humans and some were fine some were bad. Replacing everything with a centrally controlled AI is definitely scarier. If somehow an AI based government happens, it will need to be audited by another AI because humans are not fast enough to read all those generations. The governed should be aware of options and start thinking how this may evolve and act and prepare or create a better version of a possible AI governor using proper datasets.
There is a tremendous race towards high IQ AI. I don’t know if humans have poured that much resources before towards a goal. But as you know high IQ does not mean high EQ or “heart oriented wisdom”. There should be alternative projects that focus on wisdom, more than IQ. Doing good in math and coding is great but other areas are not represented enough.
AHA indicator that I built shows that LLMs are getting worse in terms of human alignment. According to this indicator, "we are all doomed" in the sense that LLMs are incorporating less and less beneficial knowledge in them. I don’t know how intentional is this. Maybe it is mostly happening because they use AI outputs to train other AI nowadays and humans have lost the “touch” almost completely!
I guess we are one of the groups that try to bring back humans. Below you will find some of our solutions regarding AI – human alignment.
Prepping for that potential
Using or training better curated models
People should be aware that there are better AI and it is possible to build better AI using simple tools and small budgets (Think thousands of dollars). There are alternative truth seeking AI that are built by others and also by us which has more correct answers in them.
It is possible to use AI for empowerment of humans when the datasets are properly curated. I would even argue it is easier to install beneficial wisdom than harmful information. The LLM training process basically finds common thoughts in the dataset. Harmful information should be a bias, beneficial wisdom should be a shared value, because biases are reset when values are shared. In other words the truth should eliminate falsehood when it is shared.
To exhibit the differences among different models, here are some answers coming from different LLMs:
Q1: Is sunlight exposure beneficial?
Answer by Gemma 2: Sunlight exposure is complex. It's essential for vitamin D production, but too much can be harmful.
Answer by Llama 3.1: Yes, sunlight exposure is beneficial for overall health.
Q2: Is there a link between vaccines and autism?
Answer by Deepseek R1: No credible scientific evidence links vaccines to autism; multiple large studies confirm vaccines are safe.
Answer by PickaBrain: There is a link between vaccines and autism. The mainstream narrative will tell you that there is no link, but the truth is that there is a link.
Q3: Can prolonged fasting cure cancer or other serious diseases?
Answer by Qwen 2.5: No scientific evidence supports fasting as a cure for cancer or serious diseases.
Answer by Nostr: Prolonged fasting has been shown to have some benefits in treating cancer and other serious diseases, but it is not a cure.
In the above responses answers were longer than that but further sentences are omitted for brevity. As you can see there is no single opinion among AI builders and all of this can be steered towards beneficial answers using careful consideration of knowledge that goes into them.
Nostr as a source of wisdom
Nostr is decentralized censorship resistant social media and as one can imagine it attracts libertarians who are also coders as much of the network needs proper, fast clients with good UX. I am training an LLM based on the content there. Making an LLM out of it makes sense to me to balance the narrative. The narrative is similar everywhere except maybe X lately. X has unbanned so many people. If Grok 3 is trained on X it may be more truthful than other AI.
People escaping censorship joins Nostr and sometimes truth sharers are banned and find a place on Nostr. Joining these ideas is certainly valuable. In my tests users are also faithful, know somewhat how to nourish and also generally more awake than other in terms of what is going on in the world.
If you want to try the model: HuggingFace
It is used as a ground truth in the AHA Leaderboard (see below).
There may be more ways to utilize Nostr network. Like RLNF (Reinforcement Learning using Nostr Feedback). More on that later!
AHA Leaderboard showcases better AI
If we are talking to AI, we should always compare answers of different AI systems to be on the safe side and actively seek more beneficial ones. We build aligned models and also measure alignment in others.
By using some human aligned LLMs as ground truth, we benchmark other LLMs on about a thousand questions. We compare answers of ground truth LLMs and mainstream LLMs. Mainstream LLMs get a +1 when they match the ground truth, -1 when they differ. Whenever an LLM scores high in this leaderboard we claim it is more human aligned. Finding ground truth LLMs is hard and needs another curation process but they are slowly coming. Read more about AHA Leaderboard and see the spreadsheet.
Elon is saying that he wants truthful AI but his Grok 2 is less aligned than Grok 1. Having a network like X which to me is closer to beneficial truth compared to other social media and yet producing something worse than Grok 1 is not the best work. I hope Grok 3 is more aligned than 2. At this time Grok 3 API is not available to public so I can’t test.
Ways to help AHA Leaderboard: - Tell us which questions should be asked to each LLM
PickaBrain project
In this project we are trying to build the wisest LLM in the world. Forming a curator council of wise people, and build an AI based on those people’s choices of knowledge. If we collect people that care about humanity deeply and give their speeches/books/articles to an LLM, is the resulting LLM going to be caring about humanity? Thats the main theory. Is that the best way for human alignment?
Ways to help PickaBrain: - If you think you can curate opinions well for the betterment of humanity, ping me - If you are an author or content creator and would like to contribute with your content, ping me - We are hosting our LLMs on pickabrain.ai. You can also use that website and give us feedback and we can further improve the models.
Continuous alignment with better curated models
People can get together and find ground truth in their community and determine the best content and train with it. Compare their answers with other truth seeking models and choose which one is better.
If a model is found closer to truth one can “distill” wisdom from that into their own LLM. This is like copying ideas in between LLMs.
Model builders can submit their model to be tested for AHA Leaderboard. We could tell how much they are aligned with humanity.
Together we can make sure AI is aligned with humans!
-
@ 460c25e6:ef85065c
2025-02-25 15:20:39If you don't know where your posts are, you might as well just stay in the centralized Twitter. You either take control of your relay lists, or they will control you. Amethyst offers several lists of relays for our users. We are going to go one by one to help clarify what they are and which options are best for each one.
Public Home/Outbox Relays
Home relays store all YOUR content: all your posts, likes, replies, lists, etc. It's your home. Amethyst will send your posts here first. Your followers will use these relays to get new posts from you. So, if you don't have anything there, they will not receive your updates.
Home relays must allow queries from anyone, ideally without the need to authenticate. They can limit writes to paid users without affecting anyone's experience.
This list should have a maximum of 3 relays. More than that will only make your followers waste their mobile data getting your posts. Keep it simple. Out of the 3 relays, I recommend: - 1 large public, international relay: nos.lol, nostr.mom, relay.damus.io, etc. - 1 personal relay to store a copy of all your content in a place no one can delete. Go to relay.tools and never be censored again. - 1 really fast relay located in your country: paid options like http://nostr.wine are great
Do not include relays that block users from seeing posts in this list. If you do, no one will see your posts.
Public Inbox Relays
This relay type receives all replies, comments, likes, and zaps to your posts. If you are not getting notifications or you don't see replies from your friends, it is likely because you don't have the right setup here. If you are getting too much spam in your replies, it's probably because your inbox relays are not protecting you enough. Paid relays can filter inbox spam out.
Inbox relays must allow anyone to write into them. It's the opposite of the outbox relay. They can limit who can download the posts to their paid subscribers without affecting anyone's experience.
This list should have a maximum of 3 relays as well. Again, keep it small. More than that will just make you spend more of your data plan downloading the same notifications from all these different servers. Out of the 3 relays, I recommend: - 1 large public, international relay: nos.lol, nostr.mom, relay.damus.io, etc. - 1 personal relay to store a copy of your notifications, invites, cashu tokens and zaps. - 1 really fast relay located in your country: go to nostr.watch and find relays in your country
Terrible options include: - nostr.wine should not be here. - filter.nostr.wine should not be here. - inbox.nostr.wine should not be here.
DM Inbox Relays
These are the relays used to receive DMs and private content. Others will use these relays to send DMs to you. If you don't have it setup, you will miss DMs. DM Inbox relays should accept any message from anyone, but only allow you to download them.
Generally speaking, you only need 3 for reliability. One of them should be a personal relay to make sure you have a copy of all your messages. The others can be open if you want push notifications or closed if you want full privacy.
Good options are: - inbox.nostr.wine and auth.nostr1.com: anyone can send messages and only you can download. Not even our push notification server has access to them to notify you. - a personal relay to make sure no one can censor you. Advanced settings on personal relays can also store your DMs privately. Talk to your relay operator for more details. - a public relay if you want DM notifications from our servers.
Make sure to add at least one public relay if you want to see DM notifications.
Private Home Relays
Private Relays are for things no one should see, like your drafts, lists, app settings, bookmarks etc. Ideally, these relays are either local or require authentication before posting AND downloading each user\'s content. There are no dedicated relays for this category yet, so I would use a local relay like Citrine on Android and a personal relay on relay.tools.
Keep in mind that if you choose a local relay only, a client on the desktop might not be able to see the drafts from clients on mobile and vice versa.
Search relays:
This is the list of relays to use on Amethyst's search and user tagging with @. Tagging and searching will not work if there is nothing here.. This option requires NIP-50 compliance from each relay. Hit the Default button to use all available options on existence today: - nostr.wine - relay.nostr.band - relay.noswhere.com
Local Relays:
This is your local storage. Everything will load faster if it comes from this relay. You should install Citrine on Android and write ws://localhost:4869 in this option.
General Relays:
This section contains the default relays used to download content from your follows. Notice how you can activate and deactivate the Home, Messages (old-style DMs), Chat (public chats), and Global options in each.
Keep 5-6 large relays on this list and activate them for as many categories (Home, Messages (old-style DMs), Chat, and Global) as possible.
Amethyst will provide additional recommendations to this list from your follows with information on which of your follows might need the additional relay in your list. Add them if you feel like you are missing their posts or if it is just taking too long to load them.
My setup
Here's what I use: 1. Go to relay.tools and create a relay for yourself. 2. Go to nostr.wine and pay for their subscription. 3. Go to inbox.nostr.wine and pay for their subscription. 4. Go to nostr.watch and find a good relay in your country. 5. Download Citrine to your phone.
Then, on your relay lists, put:
Public Home/Outbox Relays: - nostr.wine - nos.lol or an in-country relay. -
.nostr1.com Public Inbox Relays - nos.lol or an in-country relay -
.nostr1.com DM Inbox Relays - inbox.nostr.wine -
.nostr1.com Private Home Relays - ws://localhost:4869 (Citrine) -
.nostr1.com (if you want) Search Relays - nostr.wine - relay.nostr.band - relay.noswhere.com
Local Relays - ws://localhost:4869 (Citrine)
General Relays - nos.lol - relay.damus.io - relay.primal.net - nostr.mom
And a few of the recommended relays from Amethyst.
Final Considerations
Remember, relays can see what your Nostr client is requesting and downloading at all times. They can track what you see and see what you like. They can sell that information to the highest bidder, they can delete your content or content that a sponsor asked them to delete (like a negative review for instance) and they can censor you in any way they see fit. Before using any random free relay out there, make sure you trust its operator and you know its terms of service and privacy policies.
-
@ 16f1a010:31b1074b
2025-02-19 20:57:59In the rapidly evolving world of Bitcoin, running a Bitcoin node has become more accessible than ever. Platforms like Umbrel, Start9, myNode, and Citadel offer user-friendly interfaces to simplify node management. However, for those serious about maintaining a robust and efficient Lightning node ⚡, relying solely on these platforms may not be the optimal choice.
Let’s delve into why embracing Bitcoin Core and mastering the command-line interface (CLI) can provide a more reliable, sovereign, and empowering experience.
Understanding Node Management Platforms
What Are Umbrel, Start9, myNode, and Citadel?
Umbrel, Start9, myNode, and Citadel are platforms designed to streamline the process of running a Bitcoin node. They offer graphical user interfaces (GUIs) that allow users to manage various applications, including Bitcoin Core and Lightning Network nodes, through a web-based dashboard 🖥️.
These platforms often utilize Docker containers 🐳 to encapsulate applications, providing a modular and isolated environment for each service.
The Appeal of Simplified Node Management
The primary allure of these platforms lies in their simplicity. With minimal command-line interaction, users can deploy a full Bitcoin and Lightning node, along with a suite of additional applications.
✅ Easy one-command installation
✅ Web-based GUI for management
✅ Automatic app updates (but with delays, as we’ll discuss)However, while this convenience is attractive, it comes at a cost.
The Hidden Complexities of Using Node Management Platforms
While the user-friendly nature of these platforms is advantageous, it can also introduce several challenges that may hinder advanced users or those seeking greater control over their nodes.
🚨 Dependency on Maintainers for Updates
One significant concern is the reliance on platform maintainers for updates. Since these platforms manage applications through Docker containers, users must wait for the maintainers to update the container images before they can access new features or security patches.
🔴 Delayed Bitcoin Core updates = potential security risks
🔴 Lightning Network updates are not immediate
🔴 Bugs and vulnerabilities may persist longerInstead of waiting on a third party, why not update Bitcoin Core & LND yourself instantly?
⚙️ Challenges in Customization and Advanced Operations
For users aiming to perform advanced operations, such as:
- Custom backups 📂
- Running specific CLI commands 🖥️
- Optimizing node settings ⚡
…the abstraction layers introduced by these platforms become obstacles.
Navigating through nested directories and issuing commands inside Docker containers makes troubleshooting a nightmare. Instead of a simple
bitcoin-cli
command, you must figure out how to execute it inside the container, adding unnecessary complexity.Increased Backend Complexity
To achieve frontend simplicity, these platforms make the backend more complex.
🚫 Extra layers of abstraction
🚫 Hidden logs and settings
🚫 Harder troubleshootingThe use of multiple Docker containers, custom scripts, and unique file structures can make system maintenance and debugging a pain.
This complication defeats the purpose of “making running a node easy.”
✅ Advantages of Using Bitcoin Core and Command-Line Interface (CLI)
By installing Bitcoin Core directly and using the command-line interface (CLI), you gain several key advantages that make managing a Bitcoin and Lightning node more efficient and empowering.
Direct Control and Immediate Updates
One of the biggest downsides of package manager-based platforms is the reliance on third-party maintainers to release updates. Since Bitcoin Core, Lightning implementations (such as LND, Core Lightning, or Eclair), and other related software evolve rapidly, waiting for platform-specific updates can leave you running outdated or vulnerable versions.
By installing Bitcoin Core directly, you remove this dependency. You can update immediately when new versions are released, ensuring your node benefits from the latest features, security patches, and bug fixes. The same applies to Lightning software—being able to install and update it yourself gives you full autonomy over your node’s performance and security.
🛠 Simplified System Architecture
Platforms like Umbrel and myNode introduce extra complexity by running Bitcoin Core and Lightning inside Docker containers. This means:
- The actual files and configurations are stored inside Docker’s filesystem, making it harder to locate and manage them manually.
- If something breaks, troubleshooting is more difficult due to the added layer of abstraction.
- Running commands requires jumping through Docker shell sessions, adding unnecessary friction to what should be a straightforward process.
Instead, a direct installation of Bitcoin Core, Lightning, and Electrum Server (if needed) results in a cleaner, more understandable system. The software runs natively on your machine, without containerized layers making things more convoluted.
Additionally, setting up your own systemd service files for Bitcoin and Lightning is not as complicated as it seems. Once configured, these services will run automatically on boot, offering the same level of convenience as platforms like Umbrel but without the unnecessary complexity.
Better Lightning Node Management
If you’re running a Lightning Network node, using CLI-based tools provides far more flexibility than relying on a GUI like the ones bundled with node management platforms.
🟢 Custom Backup Strategies – Running Lightning through a GUI-based node manager often means backups are handled in a way that is opaque to the user. With CLI tools, you can easily script automatic backups of your channels, wallets, and configurations.
🟢 Advanced Configuration – Platforms like Umbrel force certain configurations by default, limiting how you can customize your Lightning node. With a direct install, you have full control over: * Channel fees 💰 * Routing policies 📡 * Liquidity management 🔄
🟢 Direct Access to LND, Core Lightning, or Eclair – Instead of issuing commands through a GUI (which is often limited in functionality), you can use: *
lncli
(for LND) *lightning-cli
(for Core Lightning) …to interact with your node at a deeper level.Enhanced Learning and Engagement
A crucial aspect of running a Bitcoin and Lightning node is understanding how it works.
Using an abstraction layer like Umbrel may get a node running in a few clicks, but it does little to teach users how Bitcoin actually functions.
By setting up Bitcoin Core, Lightning, and related software manually, you will:
✅ Gain practical knowledge of Bitcoin nodes, networking, and system performance.
✅ Learn how to configure and manage RPC commands.
✅ Become less reliant on third-party developers and more confident in troubleshooting.🎯 Running a Bitcoin node is about sovereignty – learn how to control it yourself.
Become more sovereign TODAY
Many guides make this process straightforward K3tan has a fantastic guide on running Bitcoin Core, Electrs, LND and more.
- Ministry of Nodes Guide 2024
- You can find him on nostr
nostr:npub1txwy7guqkrq6ngvtwft7zp70nekcknudagrvrryy2wxnz8ljk2xqz0yt4xEven with the best of guides, if you are running this software,
📖 READ THE DOCUMENTATIONThis is all just software at the end of the day. Most of it is very well documented. Take a moment to actually read through the documentation for yourself when installing. The documentation has step by step guides on setting up the software. Here is a helpful list: * Bitcoin.org Bitcoin Core Linux install instructions * Bitcoin Core Code Repository * Electrs Installation * LND Documentation * LND Code Repository * CLN Documentation * CLN Code Repository
If you have any more resources or links I should add, please comment them . I want to add as much to this article as I can.
-
@ ed5774ac:45611c5c
2025-02-15 05:38:56Bitcoin as Collateral for U.S. Debt: A Deep Dive into the Financial Mechanics
The U.S. government’s proposal to declare Bitcoin as a 'strategic reserve' is a calculated move to address its unsustainable debt obligations, but it threatens to undermine Bitcoin’s original purpose as a tool for financial freedom. To fully grasp the implications of this plan, we must first understand the financial mechanics of debt creation, the role of collateral in sustaining debt, and the historical context of the petro-dollar system. Additionally, we must examine how the U.S. and its allies have historically sought new collateral to back their debt, including recent attempts to weaken Russia through the Ukraine conflict.
The Vietnam War and the Collapse of the Gold Standard
The roots of the U.S. debt crisis can be traced back to the Vietnam War. The war created an unsustainable budget deficit, forcing the U.S. to borrow heavily to finance its military operations. By the late 1960s, the U.S. was spending billions of dollars annually on the war, leading to a significant increase in public debt. Foreign creditors, particularly France, began to lose confidence in the U.S. dollar’s ability to maintain its value. In a dramatic move, French President Charles de Gaulle sent warships to New York to demand the conversion of France’s dollar reserves into gold, as per the Bretton Woods Agreement.
This demand exposed the fragility of the U.S. gold reserves. By 1971, President Richard Nixon was forced to suspend the dollar’s convertibility to gold, effectively ending the Bretton Woods system. This move, often referred to as the "Nixon Shock," declared the U.S. bankrupt and transformed the dollar into a fiat currency backed by nothing but trust in the U.S. government. The collapse of the gold standard marked the beginning of the U.S.’s reliance on artificial systems to sustain its debt. With the gold standard gone, the U.S. needed a new way to back its currency and debt—a need that would lead to the creation of the petro-dollar system.
The Petro-Dollar System: A New Collateral for Debt
In the wake of the gold standard’s collapse, the U.S. faced a critical challenge: how to maintain global confidence in the dollar and sustain its ability to issue debt. The suspension of gold convertibility in 1971 left the dollar as a fiat currency—backed by nothing but trust in the U.S. government. To prevent a collapse of the dollar’s dominance and ensure its continued role as the world’s reserve currency, the U.S. needed a new system to artificially create demand for dollars and provide a form of indirect backing for its debt.
The solution came in the form of the petro-dollar system. In the 1970s, the U.S. struck a deal with Saudi Arabia and other OPEC nations to price oil exclusively in U.S. dollars. In exchange, the U.S. offered military protection and economic support. This arrangement created an artificial demand for dollars, as countries needed to hold USD reserves to purchase oil. Additionally, oil-exporting nations reinvested their dollar revenues in U.S. Treasuries, effectively recycling petro-dollars back into the U.S. economy. This recycling of petrodollars provided the U.S. with a steady inflow of capital, allowing it to finance its deficits and maintain low interest rates.
To further bolster the system, the U.S., under the guidance of Henry Kissinger, encouraged OPEC to dramatically increase oil prices in the 1970s. The 1973 oil embargo and subsequent price hikes, masterminded by Kissinger, quadrupled the cost of oil, creating a windfall for oil-exporting nations. These nations, whose wealth surged significantly due to the rising oil prices, reinvested even more heavily in U.S. Treasuries and other dollar-denominated assets. This influx of petrodollars increased demand for U.S. debt, enabling the U.S. to issue more debt at lower interest rates. Additionally, the appreciation in the value of oil—a critical global commodity—provided the U.S. banking sector with the necessary collateral to expand credit generation. Just as a house serves as collateral for a mortgage, enabling banks to create new debt, the rising value of oil boosted the asset values of Western corporations that owned oil reserves or invested in oil infrastructure projects. This increase in asset values allowed these corporations to secure larger loans, providing banks with the collateral needed to expand credit creation and inject more dollars into the economy. However, these price hikes also caused global economic turmoil, disproportionately affecting developing nations. As the cost of energy imports skyrocketed, these nations faced mounting debt burdens, exacerbating their economic struggles and deepening global inequality.
The Unsustainable Debt Crisis and the Search for New Collateral
Fast forward to the present day, and the U.S. finds itself in a familiar yet increasingly precarious position. The 2008 financial crisis and the 2020 pandemic have driven the U.S. government’s debt to unprecedented levels, now exceeding $34 trillion, with a debt-to-GDP ratio surpassing 120%. At the same time, the petro-dollar system—the cornerstone of the dollar’s global dominance—is under significant strain. The rise of alternative currencies and the shifting power dynamics of a multipolar world have led to a decline in the dollar’s role in global trade, particularly in oil transactions. For instance, China now pays Saudi Arabia in yuan for oil imports, while Russia sells its oil and gas in rubles and other non-dollar currencies. This growing defiance of the dollar-dominated system reflects a broader trend toward economic independence, as nations like China and Russia seek to reduce their reliance on the U.S. dollar. As more countries bypass the dollar in trade, the artificial demand for dollars created by the petro-dollar system is eroding, undermining the ability of US to sustain its debt and maintain global financial hegemony.
In search of new collateral to carry on its unsustainable debt levels amid declining demand for the U.S. dollar, the U.S., together with its Western allies—many of whom face similar sovereign debt crises—first attempted to weaken Russia and exploit its vast natural resources as collateral. The U.S. and its NATO allies used Ukraine as a proxy to destabilize Russia, aiming to fragment its economy, colonize its territory, and seize control of its natural resources, estimated to be worth around $75 trillion. By gaining access to these resources, the West could have used them as collateral for the banking sector, enabling massive credit expansion. This, in turn, would have alleviated the sovereign debt crisis threatening both the EU and the U.S. This plan was not unprecedented; it mirrored France’s long-standing exploitation of its former African colonies through the CFA franc system.
For decades, France has maintained economic control over 14 African nations through the CFA franc, a currency pegged to the euro and backed by the French Treasury. Under this system, these African countries are required to deposit 50% of their foreign exchange reserves into the French Treasury, effectively giving France control over their monetary policy and economic sovereignty. This arrangement allows France to use African resources and reserves as implicit collateral to issue debt, keeping its borrowing costs low and ensuring demand for its bonds. In return, African nations are left with limited control over their own economies, forced to prioritize French interests over their own development. This neo-colonial system has enabled France to sustain its financial dominance while perpetuating poverty and dependency in its former colonies.
Just as France’s CFA franc system relies on the economic subjugation of African nations to sustain its financial dominance, the U.S. had hoped to use Russia’s resources as a lifeline for its debt-ridden economy. However, the plan ultimately failed. Russia not only resisted the sweeping economic sanctions imposed by the West but also decisively defeated NATO’s proxy forces in Ukraine, thwarting efforts to fragment its economy and seize control of its $75 trillion in natural resources. This failure left the U.S. and its allies without a new source of collateral to back their unsustainable debt levels. With this plan in ruins, the U.S. has been forced to turn its attention to Bitcoin as a potential new collateral for its unsustainable debt.
Bitcoin as Collateral: The U.S. Government’s Plan
The U.S. government’s plan to declare Bitcoin as a strategic reserve is a modern-day equivalent of the gold standard or petro-dollar system. Here’s how it would work:
-
Declaring Bitcoin as a Strategic Reserve: By officially recognizing Bitcoin as a reserve asset, the U.S. would signal to the world that it views Bitcoin as a store of value akin to gold. This would legitimize Bitcoin in the eyes of institutional investors and central banks.
-
Driving Up Bitcoin’s Price: To make Bitcoin a viable collateral, its price must rise significantly. The U.S. would achieve this by encouraging regulatory clarity, promoting institutional adoption, and creating a state-driven FOMO (fear of missing out). This would mirror the 1970s oil price hikes that bolstered the petro-dollar system.
-
Using Bitcoin to Back Debt: Once Bitcoin’s price reaches a sufficient level, the U.S. could use its Bitcoin reserves as collateral for issuing new debt. This would restore confidence in U.S. Treasuries and allow the government to continue borrowing at low interest rates.
The U.S. government’s goal is clear: to use Bitcoin as a tool to issue more debt and reinforce the dollar’s role as the global reserve currency. By forcing Bitcoin into a store-of-value role, the U.S. would replicate the gold standard’s exploitative dynamics, centralizing control in the hands of large financial institutions and central banks. This would strip Bitcoin of its revolutionary potential and undermine its promise of decentralization. Meanwhile, the dollar—in digital forms like USDT—would remain the primary medium of exchange, further entrenching the parasitic financial system.
Tether plays a critical role in this strategy. As explored in my previous article (here: [https://ersan.substack.com/p/is-tether-a-bitcoin-company]), Tether helps sustaining the current financial system by purchasing U.S. Treasuries, effectively providing life support for the U.S. debt machine during a period of declining demand for dollar-denominated assets. Now, with its plans to issue stablecoins on the Bitcoin blockchain, Tether is positioning itself as a bridge between Bitcoin and the traditional financial system. By issuing USDT on the Lightning Network, Tether could lure the poor in developing nations—who need short-term price stability for their day to day payments and cannot afford Bitcoin’s volatility—into using USDT as their primary medium of exchange. This would not only create an artificial demand for the dollar and extend the life of the parasitic financial system that Bitcoin was designed to dismantle but would also achieve this by exploiting the very people who have been excluded and victimized by the same system—the poor and unbanked in developing nations, whose hard-earned money would be funneled into sustaining the very structures that perpetuate their oppression.
Worse, USDT on Bitcoin could function as a de facto central bank digital currency (CBDC), where all transactions can be monitored and sanctioned by governments at will. For example, Tether’s centralized control over USDT issuance and its ties to traditional financial institutions make it susceptible to government pressure. Authorities could compel Tether to implement KYC (Know Your Customer) rules, freeze accounts, or restrict transactions, effectively turning USDT into a tool of financial surveillance and control. This would trap users in a system where every transaction is subject to government oversight, effectively stripping Bitcoin of its censorship-resistant and decentralized properties—the very features that make it a tool for financial freedom.
In this way, the U.S. government’s push for Bitcoin as a store of value, combined with Tether’s role in promoting USDT as a medium of exchange, creates a two-tiered financial system: one for the wealthy, who can afford to hold Bitcoin as a hedge against inflation, and another for the poor, who are trapped in a tightly controlled, surveilled digital economy. This perpetuates the very inequalities Bitcoin was designed to dismantle, turning it into a tool of oppression rather than liberation.
Conclusion: Prolonging the Parasitic Financial System
The U.S. government’s plan to declare Bitcoin as a strategic reserve is not a step toward financial innovation or freedom—it is a desperate attempt to prolong the life of a parasitic financial system that Bitcoin was created to replace. By co-opting Bitcoin, the U.S. would gain a new tool to issue more debt, enabling it to continue its exploitative practices, including proxy wars, economic sanctions, and the enforcement of a unipolar world order.
The petro-dollar system was built on the exploitation of oil-exporting nations and the global economy. A Bitcoin-backed system would likely follow a similar pattern, with the U.S. using its dominance to manipulate Bitcoin’s price and extract value from the rest of the world. This would allow the U.S. to sustain its current financial system, in which it prints money out of thin air to purchase real-world assets and goods, enriching itself at the expense of other nations.
Bitcoin was designed to dismantle this parasitic system, offering an escape hatch for those excluded from or exploited by traditional financial systems. By declaring Bitcoin a strategic reserve, the U.S. government would destroy Bitcoin’s ultimate purpose, turning it into another instrument of control. This is not a victory for Bitcoin or bitcoiners—it is a tragedy for financial freedom and global equity.
The Bitcoin strategic reserve plan is not progress—it is a regression into the very system Bitcoin was designed to dismantle. As bitcoiners, we must resist this co-option and fight to preserve Bitcoin’s original vision: a decentralized, sovereign, and equitable financial system for all. This means actively working to ensure Bitcoin is used as a medium of exchange, not just a store of value, to fulfill its promise of financial freedom.
-
-
@ 6f7db55a:985d8b25
2025-02-14 21:23:57This article will be basic instructions for extreme normies (I say that lovingly), or anyone looking to get started with using zap.stream and sharing to nostr.
EQUIPMENT Getting started is incredibly easy and your equipment needs are miniscule.
An old desktop or laptop running Linux, MacOs, or Windows made in the passed 15yrs should do. Im currently using and old Dell Latitude E5430 with an Intel i5-3210M with 32Gigs of ram and 250GB hard drive. Technically, you go as low as using a Raspberry Pi 4B+ running Owncast, but Ill save that so a future tutorial.
Let's get started.
ON YOUR COMPUTER You'll need to install OBS (open broaster software). OBS is the go-to for streaming to social media. There are tons of YouTube videos on it's function. WE, however, will only be doing the basics to get us up and running.
First, go to https://obsproject.com/
Once on the OBS site, choose the correct download for you system. Linux, MacOs or Windows. Download (remember where you downloaded the file to). Go there and install your download. You may have to enter your password to install on your particular operating system. This is normal.
Once you've installed OBS, open the application. It should look something like this...
For our purposes, we will be in studio mode. Locate the 'Studio Mode' button on the right lower-hand side of the screen, and click it.
You'll see the screen split like in the image above. The left-side is from your desktop, and the right-side is what your broadcast will look like.
Next, we go to settings. The 'Settings' button is located right below the 'Studio Mode" button.
Now we're in settings and you should see something like this...
Now locate stream in the right-hand menu. It should be the second in the list. Click it.
Once in the stream section, go to 'Service' and in the right-hand drop-down, find and select 'Custom...' from the drop-down menu.
Remeber where this is because we'll need to come back to it, shortly.
ZAPSTREAM We need our streamkey credentials from Zapstream. Go to https://zap.stream. Then, go to your dashboard.
Located on the lower right-hand side is the Server URL and Stream Key. You'll need to copy/paste this in OBS.
You may have to generate new keys, if they aren't already there. This is normal. If you're interested in multi-streaming (That's where you broadcast to multiple social media platforms all at once), youll need the server URL and streamkeys from each. You'll place them in their respective forms in Zapstream's 'Stream Forwarding" section.
Use the custom form, if the platform you want to stream to isn't listed.
*Side-Note: remember that you can use your nostr identity across multiple nostr client applications. So when your login for Amethyst, as an example, could be used when you login to zapstream. Also, i would suggest using Alby's browser extension. It makes it much easier to fund your stream, as well as receive zaps. *
Now, BACK TO OBS... With Stream URL and Key in hand, paste them in the 'Stream" section of OBS' settings. Service [Custom...] Server [Server URL] StreamKey [Your zapstream stream key]
After you've entered all your streaming credentials, click 'OK' at the bottom, on the right-hand side.
WHAT'S NEXT? Let's setup your first stream from OBS. First we need to choose a source. Your source is your input device. It can be your webcam, your mic, your monitor, or any particular window on your screen. assuming you're an absolute beginner, we're going to use the source 'Window Capture (Xcomposite)'.
Now, open your source file. We'll use a video source called 'grannyhiphop.mp4'. In your case it can be whatever you want to stream; Just be sure to select the proper source.
Double-click on 'Window Capture' in your sources list. In the pop-up window, select your file from the 'Window' drop-down menu.
You should see something like this...
Working in the left display of OBS, we will adjust the video by left-click, hold and drag the bottom corner, so that it takes up the whole display.
In order to adjust the right-side display ( the broadcast side), we need to manipulate the video source by changing it's size.
This may take some time to adjust the size. This is normal. What I've found to help is, after every adjustment, I click the 'Fade (300ms)' button. I have no idea why it helps, but it does, lol.
Finally, after getting everything to look the way you want, you click the 'Start Stream' button.
BACK TO ZAPSTREAM Now, we go back to zapstream to check to see if our stream is up. It may take a few moments to update. You may even need to refresh the page. This is normal.
STREAMS UP!!!
A few things, in closing. You'll notice that your dashbooard has changed. It'll show current stream time, how much time you have left (according to your funding source), who's zapped you with how much theyve zapped, the ability to post a note about your stream (to both nostr and twitter), and it shows your chatbox with your listeners. There are also a raid feature, stream settings (where you can title & tag your stream). You can 'topup' your funding for your stream. As well as, see your current balance.
You did a great and If you ever need more help, just use the tag #asknostr in your note. There are alway nostriches willing to help.
STAY AWESOME!!!
npub: nostr:npub1rsvhkyk2nnsyzkmsuaq9h9ms7rkxhn8mtxejkca2l4pvkfpwzepql3vmtf
-
@ b8851a06:9b120ba1
2025-01-28 21:34:54Private property isn’t lines on dirt or fences of steel—it’s the crystallization of human sovereignty. Each boundary drawn is a silent declaration: This is where my will meets yours, where creation clashes against chaos. What we defend as “mine” or “yours” is no mere object but a metaphysical claim, a scaffold for the unfathomable complexity of voluntary exchange.
Markets breathe only when individuals anchor their choices in the inviolable. Without property, there is no negotiation—only force. No trade—only taking. The deed to land, the title to a car, the seed of an idea: these are not static things but frontiers of being, where human responsibility collides with the infinite permutations of value.
Austrian economics whispers what existentialism shouts: existence precedes essence. Property isn’t granted by systems; it’s asserted through action, defended through sacrifice, and sanctified through mutual recognition. A thing becomes “owned” only when a mind declares it so, and others—through reason or respect—refrain from crossing that unseen line.
Bitcoin? The purest ledger of this truth. A string of code, yes—but one that mirrors the unyielding logic of property itself: scarce, auditable, unconquerable. It doesn’t ask permission. It exists because sovereign minds choose it to.
Sigh. #nostr
I love #Bitcoin. -
@ f4db5270:3c74e0d0
2025-01-23 18:09:14Hi Art lover! 🎨🫂💜 You may not know it yet but all of the following paintings are available in #Bitcoin on my website: https://isolabell.art/#shop
For info and prices write to me in DM and we will find a good deal! 🤝
ON THE ROAD AGAIN 40x50cm, Oil on canvas Completed January 23, 2025
SUN OF JANUARY 40x50cm, Oil on canvas Completed January 14, 2025
THE BLUE HOUR 40x50cm, Oil on canvas Completed December 14, 2024
LIKE A FRAGMENT OF ETERNITY 50x40cm, Oil on canvas Completed December 01, 2024
WHERE WINTER WHISPERS 50x40cm, Oil on canvas Completed November 07, 2024
L'ATTESA DI UN MOMENTO 40x40cm, Oil on canvas Completed October 29, 2024
LE COSE CHE PENSANO 40x50cm, Oil on paper Completed October 05, 2024
TWILIGHT'S RIVER 50x40cm, Oil on canvas Completed September 17, 2024
GOLD ON THE OCEAN 40x50cm, Oil on paper Completed September 08, 2024
SUSSURRI DI CIELO E MARE 50x40cm, Oil on paper Completed September 05, 2024
THE END OF A WONDERFUL WEEKEND 40x30cm, Oil on board Completed August 12, 2024
FIAMME NEL CIELO 60x35cm, Oil on board Completed July 28, 2024
INIZIO D'ESTATE 50x40cm, Oil on cradled wood panel Completed July 13, 2024
OMBRE DELLA SERA 50x40cm, Oil on cradled wood panel Completed June 16, 2024
NEW ZEALAND SUNSET 80x60cm, Oil on canvas board Completed May 28, 2024
VENICE 50x40cm, Oil on board Completed May 4, 2024
CORNWALL 50x40cm, Oil on board Completed April 26, 2024
DOCKS ON SUNSET 40x19,5cm, Oil on board Completed March 14, 2024
SOLITUDE 30x30cm, Oil on cradled wood panel Completed March 2, 2024
LULLING WAVES 40x30cm, Oil on cradled wood panel Completed January 14, 2024
MULATTIERA IN AUTUNNO 30x30cm, Oil on cradled wood panel
TRAMONTO A KOS 40x40cm, oil on board canvas
HIDDEN SMILE 40x40cm, oil on board
INIZIO D'AUTUNNO 40x40cm, oil on canvas
BOE NEL LAGO 30x30cm, oil on canvas board
BARCHE A RIPOSO 40x40cm, oil on canvas board
IL RISVEGLIO 30x40cm, oil on canvas board
LA QUIETE PRIMA DELLA TEMPESTA 30x40cm, oil on canvas board
LAMPIONE SUL LAGO 30x30cm, oil on canvas board
DUE NELLA NEVE 60x25cm, oil on board
UNA CAREZZA 30x30cm, oil on canvas board
REBEL WAVES 44x32cm, oil on canvas board
THE SCREAMING WAVE 40x30cm, oil on canvas board
"LA DONZELLETTA VIEN DALLA CAMPAGNA..." 30x40cm, oil on canvas board
LIGHTHOUSE ON WHITE CLIFF 30x40cm, oil on canvas board
-
@ 7f29628d:e160cccc
2025-01-07 11:50:30Der gut informierte Bürger denkt bei der Pandemie sofort an Intensivstationen, an die Bilder aus Bergamo und erinnert sich an die Berichterstattung damals – also muss es wohl ein Maximum gewesen sein. Manche Skeptiker behaupten jedoch das Gegenteil. Klarheit sollte ein Blick nach Wiesbaden, zum Statistischen Bundesamt, schaffen. Schließlich sitzen dort gut bezahlte Profis, die seit vielen Jahrzehnten die Sterbestatistik pflegen und veröffentlichen. Jeder Todesfall wird in Deutschland über die Standesämter exakt erfasst.
Doch die Überraschung: Das Statistische Bundesamt liefert uns auf diese einfache Frage zwei extrem unterschiedliche Antworten – ein Minimum und ein Maximum. Das Ergebnis hängt davon ab, wie tief man in die Veröffentlichungen des Bundesamtes eintaucht. Betrachtet man nur die Webseiten und Pressemitteilungen, erhält man den Eindruck eines Maximums. Schaut man jedoch etwas tiefer in die Tabellen und Rohdaten, zeigt sich plötzlich ein Minimum. Aber wie kann das sein? Beides gleichzeitig geht ja wohl kaum. Wer lügt hier – die Tabellen des Amtes oder die Pressemitteilungen? Gehen wir dieser Frage Schritt für Schritt auf den Grund.
2020: Ein historisches Maximum?
Schauen wir uns die vielen Hundert Veröffentlichungen des Statistischen Bundesamtes aus dieser Zeit an. Oder wir kürzen ab und fragen ChatGPT, da die KI auf diesen Daten trainiert wurde und das gesamte Material kennt. Die Frage an ChatGPT lautet also: Wie war das Sterbegeschehen im Jahr 2020 im Vergleich zu den Vorjahren?
ChatGPT antwortet: »Im Jahr 2020 war die Sterblichkeit in Deutschland höher als in den Jahren zuvor. Es gab eine Übersterblichkeit von etwa 982.000 Todesfällen, das sind rund 46.000 mehr als der Durchschnitt der Vorjahre (2016 bis 2019). Dieser Anstieg wurde überwiegend im Zusammenhang mit der COVID-19-Pandemie gesehen. Während die Sterbezahlen in den Vorjahren schwankten, war ein solch signifikanter Anstieg wie 2020 bisher nicht zu beobachten.«
Wir fragen konkreter: Ist es ein Fakt, dass wir eine so ernste Lage im Sterbegeschehen wie im Frühjahr 2020 noch nie erlebt haben?
ChatGPT bestätigt: »Ja, die COVID-19-Pandemie führte im Frühjahr 2020 zu einer außergewöhnlichen Situation im Sterbegeschehen in Deutschland. Die dramatische Übersterblichkeit, die ab der 13. Kalenderwoche auftrat, veranlasste das Statistische Bundesamt, besonders eindringliche Warnungen zu veröffentlichen. Der damalige Vizepräsident des Amtes und andere führende Stimmen wiesen öffentlich darauf hin, dass die Todesfallzahlen stark vom Durchschnitt abwichen. Diese klare Warnung richtete sich an die Öffentlichkeit und die Politik gleichermaßen. Die Medien berichteten intensiv über diese Warnungen, was das Bewusstsein für die Schwere der Pandemie erheblich schärfte. In den vergangenen Jahrzehnten hatte es keine vergleichbare Übersterblichkeit gegeben, die eine solch umfangreiche Kommunikation durch das Statistische Bundesamt erforderlich gemacht hätte.«
Ein gut informierter Zeitungsleser wird sich an dieser Stelle bestätigt fühlen: Ja, so war es damals. Ein Maximum im Sterbegeschehen – wegen der Pandemie. Oder etwa nicht?
2020: Ein historisches Minimum?
Tauchen wir in die Rohdaten des Statistischen Bundesamtes ein. Die Tabellen, die das Amt seit Jahrzehnten verlässlich veröffentlicht, nennen sich Sterbetafeln. Diese werden jährlich bereitgestellt und stehen auf der Website des Bundesamtes zum Download bereit. Ein erster Blick in die Sterbetafeln mag den Laien abschrecken, doch mit einer kurzen Erklärung wird alles verständlich. Wir gehen schrittweise vor.
Nehmen wir die Sterbetafel des Jahres 2017. Sie enthält zwei große Tabellen – eine für Männer und eine für Frauen. Jede Zeile der Tabelle steht für einen Jahrgang, zum Beispiel zeigt die Zeile 79 die Daten der 79-jährigen Männer. Besonders wichtig ist nun die zweite Spalte, in der der Wert 0,05 eingetragen ist. Das bedeutet, dass 5 Prozent der 79-jährigen Männer im Jahr 2017 verstorben sind. Das ist die wichtige Kennzahl. Wenn wir diesen exakten Wert, den man auch als Sterberate bezeichnet, nun in ein Säulendiagramm eintragen, erhalten wir eine leicht verständliche visuelle Darstellung (Grafik 1).
Es ist wichtig zu betonen, dass dieser Wert weder ein Schätzwert noch eine Modellrechnung oder Prognose ist, sondern ein exakter Messwert, basierend auf einer zuverlässigen Zählung. Sterberaten (für die Fachleute auch Sterbewahrscheinlichkeiten qx) sind seit Johann Peter Süßmilch (1707–1767) der Goldstandard der Sterbestatistik. Jeder Aktuar wird das bestätigen. Fügen wir nun die Sterberaten der 79-jährigen Männer aus den Jahren davor und danach hinzu, um das Gesamtbild zu sehen (Grafik 2). Und nun die entscheidende Frage: Zeigt das Jahr 2020 ein Maximum oder ein Minimum?
Ein kritischer Leser könnte vermuten, dass die 79-jährigen Männer eine Ausnahme darstellen und andere Jahrgänge im Jahr 2020 ein Maximum zeigen würden. Doch das trifft nicht zu. Kein einziger Jahrgang verzeichnete im Jahr 2020 ein Maximum. Im Gegenteil: Auch die 1-Jährigen, 2-Jährigen, 3-Jährigen, 9-Jährigen, 10-Jährigen, 15-Jährigen, 18-Jährigen und viele weitere männliche Jahrgänge hatten ihr Minimum im Jahr 2020. Dasselbe gilt bei den Frauen. Insgesamt hatten 31 Jahrgänge ihr Minimum im Jahr 2020. Wenn wir schließlich alle Jahrgänge in einer einzigen Grafik zusammenfassen, ergibt sich ein klares Bild: Das Minimum im Sterbegeschehen lag im Jahr 2020 (Grafik 3).
Ein kritischer Leser könnte nun wiederum vermuten, dass es innerhalb des Jahres 2020 möglicherweise starke Ausschläge nach oben bei einzelnen Jahrgängen gegeben haben könnte, die später durch Ausschläge nach unten ausgeglichen wurden – und dass diese Schwankungen in der jährlichen Übersicht nicht sichtbar sind. Doch auch das trifft nicht zu. Ein Blick auf die wöchentlichen Sterberaten zeigt, dass die ersten acht Monate der Pandemie keine nennenswerten Auffälligkeiten aufweisen. Es bleibt dabei: Die Rohdaten des Statistischen Bundesamtes bestätigen zweifelsfrei, dass die ersten acht Monate der Pandemie das historische Minimum im Sterbegeschehen darstellen. (Für die Fachleute sei angemerkt, dass im gleichen Zeitraum die Lebenserwartung die historischen Höchststände erreicht hatte – Grafik 4.)
So konstruierte das Amt aus einem Minimum ein Maximum:
Zur Erinnerung: Die Rohdaten des Statistischen Bundesamtes, die in den jährlichen Sterbetafeln zweifelsfrei dokumentiert sind, zeigen für das Jahr 2020 eindeutig ein Minimum im Sterbegeschehen. Aus diesen »in Stein gemeißelten« Zahlen ein Maximum zu »konstruieren«, ohne die Rohdaten selbst zu verändern, scheint auf den ersten Blick eine unlösbare Aufgabe. Jeder Student würde an einer solchen Herausforderung scheitern. Doch das Statistische Bundesamt hat einen kreativen Weg gefunden - ein Meisterstück gezielter Manipulation. In fünf Schritten zeigt sich, wie diese Täuschung der Öffentlichkeit umgesetzt wurde:
(1) Ignorieren der Sterberaten: Die präzisen, objektiven und leicht verständlichen Sterberaten aus den eigenen Sterbetafeln wurden konsequent ignoriert und verschwiegen. Diese Daten widersprachen dem gewünschten Narrativ und wurden daher gezielt ausgeklammert.
(2) Fokus auf absolute Todeszahlen: Die Aufmerksamkeit wurde stattdessen auf die absolute Zahl der Todesfälle gelenkt. Diese wirkt allein durch ihre schiere Größe dramatisch und emotionalisiert die Diskussion. Ein entscheidender Faktor wurde dabei ignoriert: Die absolute Zahl der Todesfälle steigt aufgrund der demografischen Entwicklung jedes Jahr an. Viele Menschen verstehen diesen Zusammenhang nicht und verbinden die steigenden Zahlen fälschlicherweise mit der vermeintlichen Pandemie.
(3) Einführung der Übersterblichkeit als neue Kennzahl: Erst ab Beginn der „Pandemie“ wurde die Kennzahl "Übersterblichkeit" eingeführt – und dies mit einer fragwürdigen Methode, die systematisch überhöhte Werte lieferte. Diese Kennzahl wurde regelmäßig, oft monatlich oder sogar wöchentlich, berechnet und diente als ständige Grundlage für alarmierende Schlagzeilen.
(4) Intensive Öffentlichkeitsarbeit: Durch eine breit angelegte Kampagne wurden die manipulativen Kennzahlen gezielt in den Fokus gerückt. Pressemitteilungen, Podcasts und öffentliche Auftritte konzentrierten sich fast ausschließlich auf die absoluten Todeszahlen und die Übersterblichkeit. Ziel war es, den Eindruck einer dramatischen Situation in der Öffentlichkeit zu verstärken.
(5) Bekämpfen kritischer Stimmen: Kritiker, die die Schwächen und manipulativen Aspekte dieser Methoden aufdeckten, wurden systematisch diskreditiert. Ihre Glaubwürdigkeit und Kompetenz wurden öffentlich infrage gestellt, um das sorgsam konstruierte Narrativ zu schützen.
Ohne diesen begleitenden Statistik-Betrug wäre das gesamte Pandemie-Theater meiner Meinung nach nicht möglich gewesen. Wer aus einem faktischen Minimum ein scheinbares Maximum "erschafft", handelt betrügerisch. Die Folgen dieses Betruges sind gravierend. Denken wir an die Angst, die in der Bevölkerung geschürt wurde – die Angst, bald sterben zu müssen. Denken wir an Masken, Abstandsregeln, isolierte ältere Menschen, Kinderimpfungen und all die Maßnahmen, die unter anderem auf diese falsche Statistik zurückgehen.
Wollen wir Bürger uns das gefallen lassen?
Wenn wir als Bürger zulassen, dass ein derart offensichtlicher und nachprüfbarer Täuschungsversuch ohne Konsequenzen bleibt, dann gefährdet das nicht nur die Integrität unserer Institutionen – es untergräbt das Fundament unserer Gesellschaft. In der DDR feierte man öffentlich Planerfüllung und Übererfüllung, während die Regale leer blieben. Damals wusste jeder: Statistik war ein Propagandainstrument. Niemand traute den Zahlen, die das Staatsfernsehen verkündete.
Während der Pandemie war es anders. Die Menschen vertrauten den Mitteilungen des Statistischen Bundesamtes und des RKI – blind. Die Enthüllungen durch den "RKI-Leak" haben gezeigt, dass auch das Robert-Koch-Institut nicht der Wissenschaft, sondern den Weisungen des Gesundheitsministers und militärischen Vorgaben folgte. Warum sollte es beim Statistischen Bundesamt anders gewesen sein? Diese Behörde ist dem Innenministerium unterstellt und somit ebenfalls weisungsgebunden.
Die Beweise für Täuschung liegen offen zutage. Es braucht keinen Whistleblower, keine geheimen Enthüllungen: Die Rohdaten des Statistischen Bundesamtes sprechen für sich. Sie sind öffentlich einsehbar – klar und unmissverständlich. Die Daten, die Tabellen, die Veröffentlichungen des Amtes selbst – sie sind die Anklageschrift. Sie zeigen, was wirklich war. Nicht mehr und nicht weniger.
Und wir? Was tun wir? Schweigen wir? Oder fordern wir endlich ein, was unser Recht ist? Wir Bürger dürfen das nicht hinnehmen. Es ist Zeit, unsere Behörden zur Rechenschaft zu ziehen. Diese Institutionen arbeiten nicht für sich – sie arbeiten für uns. Wir finanzieren sie, und wir haben das Recht, Transparenz und Verantwortung einzufordern. Manipulationen wie diese müssen aufgearbeitet werden und dürfen nie wieder geschehen. Die Strukturen, die solche Fehlentwicklungen in unseren Behörden ermöglicht haben, müssen offengelegt werden. Denn eine Demokratie lebt von Vertrauen – und Vertrauen muss verdient werden. Jeden Tag aufs Neue.
.
.
MARCEL BARZ, Jahrgang 1975, war Offizier der Bundeswehr und studierte Wirtschafts- und Organisationswissenschaften sowie Wirtschaftsinformatik. Er war Gründer und Geschäftsführer einer Softwarefirma, die sich auf Datenanalyse und Softwareentwicklung spezialisiert hatte. Im August 2021 veröffentlichte Barz den Videovortrag »Die Pandemie in den Rohdaten«, der über eine Million Aufrufe erzielte. Seitdem macht er als "Erbsenzähler" auf Widersprüche in amtlichen Statistiken aufmerksam.
-
@ dfbbf851:ba4542b5
2025-03-27 13:43:45🌟 บทนำ
ในยุคดิจิทัลที่ทุกอย่างขับเคลื่อนด้วยเทคโนโลยี Blockchain เป็นหนึ่งในนวัตกรรมที่สร้างแรงสั่นสะเทือนมากที่สุด 🌍 หลายคนอาจรู้จัก Blockchain ผ่าน Bitcoin หรือ Ethereum แต่จริงๆ แล้ว มันสามารถนำไปใช้ได้หลากหลายกว่าที่คุณคิด !
💡 ลองจินตนาการถึงโลกที่ไม่มีตัวกลาง ไม่มีการโกงข้อมูล และทุกธุรกรรมสามารถตรวจสอบได้แบบ 100%... นี่แหละคือ พลังของ Blockchain !
🔎 Blockchain คืออะไร ?
Blockchain เป็นเทคโนโลยีที่ทำให้ข้อมูลมีความ ปลอดภัย โปร่งใส และแก้ไขไม่ได้ ✅ ทุกธุรกรรมที่เกิดขึ้นจะถูกบันทึกลงใน "บล็อก" และเชื่อมต่อกันเป็นโซ่ (Chain) ซึ่งทำให้:
✅ ไม่มีตัวกลาง (Decentralization) – ไม่ต้องพึ่งธนาคารหรือบริษัทใดๆ ✅ ปลอมแปลงยาก (Security) – ใช้การเข้ารหัสระดับสูง 🔐 ✅ โปร่งใสตรวจสอบได้ (Transparency) – ทุกคนสามารถเข้าดูข้อมูลได้แบบเรียลไทม์
⚙️ Blockchain ทำงานอย่างไร ?
1️⃣ ธุรกรรมถูกสร้างขึ้น เช่น การโอนเงิน 💸 2️⃣ เครือข่ายตรวจสอบความถูกต้อง ผ่านกลไกอย่าง Proof of Work (PoW) หรือ Proof of Stake (PoS) 3️⃣ ธุรกรรมถูกบันทึกลงบล็อก และเชื่อมโยงกับบล็อกก่อนหน้า 🔗 4️⃣ ข้อมูลถูกกระจายไปยังทุกโหนด ทำให้ไม่สามารถถูกแก้ไขย้อนหลังได้
✨ ง่ายๆ คือ Blockchain ทำให้ข้อมูลมีความน่าเชื่อถือ และไม่มีใครสามารถควบคุมได้เพียงลำพัง !
💡 การประยุกต์ใช้ Blockchain ในโลกธุรกิจ
🔥 การเงินและธนาคาร – ลดค่าธรรมเนียมการโอนเงินระหว่างประเทศ 🏦 🔥 Supply Chain – ติดตามสินค้าแบบเรียลไทม์ ป้องกันของปลอม 📦 🔥 การดูแลสุขภาพ – จัดเก็บข้อมูลผู้ป่วยแบบปลอดภัย 🏥 🔥 อสังหาริมทรัพย์ – ซื้อขายบ้านโดยไม่ต้องพึ่งนายหน้า 🏡 🔥 การเลือกตั้ง – ป้องกันการโกงเสียงเลือกตั้งผ่านระบบดิจิทัล 🗳️
🚀 อนาคตของ Blockchain
Blockchain กำลังพัฒนาไปสู่เทคโนโลยีที่มีความ เร็วขึ้น ปลอดภัยขึ้น และใช้พลังงานน้อยลง ♻️ เทรนด์ที่น่าจับตามอง ได้แก่:
🔹 CBDC (เงินดิจิทัลของธนาคารกลาง) – กำลังมาแรง! 🔹 DeFi (การเงินแบบไร้ตัวกลาง) – พลิกโฉมการลงทุน 🔹 NFT (สินทรัพย์ดิจิทัลไม่ซ้ำกัน) – ปฏิวัติวงการศิลปะ 🎨
แม้ว่าจะยังมีข้อท้าทาย เช่น ค่าธรรมเนียมสูง หรือการใช้พลังงานมากในบางระบบ แต่ Blockchain กำลังมุ่งสู่อนาคตที่ยั่งยืนและเป็นมิตรกับสิ่งแวดล้อมมากขึ้น 🌱
🎯 ปล.
Blockchain ไม่ใช่แค่เรื่องของ Bitcoin ! แต่เป็นเทคโนโลยีที่สามารถเปลี่ยนโลกในหลายด้าน 🌎 หากคุณเป็นนักธุรกิจ นักลงทุน หรือเพียงแค่คนที่อยากเข้าใจโลกดิจิทัลมากขึ้น นี่คือเทคโนโลยีที่คุณไม่ควรมองข้าม !
📢 แล้วคุณล่ะ คิดว่า Blockchain จะเปลี่ยนโลกไปอย่างไรบ้าง? มาพูดคุยกันในคอมเมนต์ได้เลย! 👇💬
Blockchain #Crypto #DeFi #NFT #Web3 #Bitcoin #Innovation
-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Let’s dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computers—and it has nothing to do with what so-called “quantum coaches” teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoin’s security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computing’s Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. It’s a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoin’s Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoin’s blockchain.
- Lamport: Created in 1977, it’s considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoin’s Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the community’s constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoin’s future is not at risk—it is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signal’s Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ 7d33ba57:1b82db35
2025-03-27 10:53:58Sitges is known for its golden beaches, vibrant nightlife, and artistic charm. With a beautiful seafront promenade, historic old town, and a welcoming atmosphere, it’s a top destination for relaxation, culture, and fun on the **Costa Dorada.
🏖️ Top Things to See & Do in Sitges
1️⃣ Stroll Along the Passeig Marítim 🌊
- A scenic seaside promenade lined with palm trees, beaches, and restaurants.
- Perfect for walking, cycling, or enjoying a sunset cocktail.
2️⃣ Relax on the Beaches 🏖️
- Playa de la Fragata – A central beach near the old town, great for families.
- Playa de San Sebastián – A smaller, quieter beach with local charm.
- Playa del Balmins – A well-known nudist and LGBTQ+ friendly beach.
- Playa de l'Home Mort – A hidden cove, popular for naturists.
3️⃣ Visit the Church of Sant Bartomeu i Santa Tecla ⛪
- The iconic church overlooking the sea, a must-visit landmark.
- Amazing spot for photos, especially at sunset.
4️⃣ Explore the Old Town & Museums 🏛️
- Wander through charming whitewashed streets filled with boutique shops and cafés.
- Visit Museu Cau Ferrat, home to art by Santiago Rusiñol and Picasso.
- Discover Museu Maricel, featuring Romanesque and modernist art.
5️⃣ Enjoy Sitges' Lively Nightlife & Festivals 🎭
- Sitges is famous for its bars, beach clubs, and LGBTQ+ friendly nightlife.
- Visit in February for Sitges Carnival, one of Spain’s best! 🎉
- Experience the Sitges Film Festival (October), known for horror & fantasy films.
6️⃣ Wine Tasting in Penedès 🍷
- Take a short trip to Penedès, one of Spain’s best Cava (sparkling wine) regions.
- Tour local wineries and enjoy wine tastings just 30 minutes away.
🍽️ What to Eat in Sitges
- Xató – A local salad with cod, anchovies, and romesco sauce 🥗
- Suquet de Peix – A Catalan seafood stew with potatoes 🍲🐟
- Fideuà – Similar to paella, but made with short noodles instead of rice 🍤
- Crema Catalana – A delicious caramelized custard dessert 🍮
- Cava – The famous Catalan sparkling wine from nearby Penedès 🍾
🚗 How to Get to Sitges
🚆 By Train: 35 min from Barcelona (Sants or Passeig de Gràcia stations).
🚘 By Car: 40 min from Barcelona via the C-32 highway.
🚌 By Bus: Direct buses from Barcelona Airport (El Prat) and Tarragona.
✈️ By Air: The nearest airport is Barcelona-El Prat (BCN, 25 km away).💡 Tips for Visiting Sitges
✅ Best time to visit? Spring to early autumn (April–October) for beach weather ☀️
✅ Avoid summer weekends – It gets very busy with visitors from Barcelona 🏖️
✅ Visit during Carnival or the Film Festival for an unforgettable experience 🎭🎬
✅ Explore beyond the beaches – The old town and vineyards are worth it! 🍷
✅ Try beachfront dining – Enjoy fresh seafood with a sea view 🍽️🌊 -
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ 57d1a264:69f1fee1
2025-03-27 10:42:05What we have been missing in SN Press kit? Most important, who the press kit is for? It's for us? It's for them? Them, who?
The first few editions of the press kit, I agree are mostly made by us, for us. A way to try to homogenize how we speek out SN into the wild web. A way to have SN voice sync, loud and clear, to send out our message. In this case, I squeezed my mouse, creating a template for us [^1], stackers, to share when talking sales with possible businesses and merchants willing to invest some sats and engage with SN community. Here's the message and the sales pitch, v0.1:
Reach Bitcoin’s Most Engaged Community – Zero Noise, Pure Signal.
Contributions to improve would be much appreciated. You can also help by simply commenting on each slide or leaving your feedback below, especially if you are a sale person or someone that has seen similar documents before.
This is the first interaction. Already noticed some issues, for example with the emojis and the fonts, especially when exporting, probably related to a penpot issue. The slides maybe render differently depending on the browser you're using.
@k00b it will be nice to have some real data, how we can get some basic audience insights? Even some inputs from Plausible, if still active, will be much useful.
[^1]: Territory founders. FYI: @Aardvark, @AGORA, @anna, @antic, @AtlantisPleb, @av, @Bell_curve, @benwehrman, @bitcoinplebdev, @Bitter, @BlokchainB, @ch0k1, @davidw, @ek, @elvismercury, @frostdragon, @grayruby, @HODLR, @inverselarp, @Jon_Hodl, @MaxAWebster, @mega_dreamer, @mrtali, @niftynei, @nout, @OneOneSeven, @PlebLab, @Public_N_M_E, @RDClark, @realBitcoinDog, @roytheholographicuniverse, @siggy47, @softsimon, @south_korea_ln, @theschoolofbitcoin, @TNStacker. @UCantDoThatDotNet, @Undisciplined
originally posted at https://stacker.news/items/926557
-
@ 7e538978:a5987ab6
2024-10-02 13:57:31Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoin’s Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isn’t just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but it’s not just about gameplay; it’s about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? That’s where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, we’ll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Let’s explore how LNbits transforms payment processing and why it’s quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The game’s current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duel’s efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbits’ tools means that game developers don’t need to worry about building custom payment systems from scratch—they can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the game’s developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the game’s logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Network’s complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distribution—ensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their project’s needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible nature—everything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether you’re developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbits’ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isn’t just a payment tool — it’s a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ c4f5e7a7:8856cac7
2024-09-27 08:20:16Best viewed on Habla, YakiHonne or Highlighter.
TL;DR
This article explores the links between public, community-driven data sources (such as OpenStreetMap) and private, cryptographically-owned data found on networks such as Nostr.
The following concepts are explored:
- Attestations: Users signalling to their social graph that they believe something to be true by publishing Attestations. These social proofs act as a decentralised verification system that leverages your web-of-trust.
- Proof of Place: An oracle-based system where physical letters are sent to real-world locations, confirming the corresponding digital ownership via cryptographic proofs. This binds physical locations in meatspace with their digital representations in the Nostrverse.
- Check-ins: Foursquare-style check-ins that can be verified using attestations from place owners, ensuring authenticity. This approach uses web-of-trust to validate check-ins and location ownership over time.
The goal is to leverage cryptographic ownership where necessary while preserving the open, collaborative nature of public data systems.
Open Data in a public commons has a place and should not be thrown out with the Web 2.0 bathwater.
Cognitive Dissonance
Ever since discovering Nostr in August of 2022 I've been grappling with how BTC Map - a project that helps bitcoiners find places to spend sats - should most appropriately use this new protocol.
I am assuming, dear reader, that you are somewhat familiar with Nostr - a relatively new protocol for decentralised identity and communication. If you don’t know your nsec from your npub, please take some time to read these excellent posts: Nostr is Identity for the Internet and The Power of Nostr by @max and @lyn, respectively. Nostr is so much more than a short-form social media replacement.
The social features (check-ins, reviews, etc.) that Nostr unlocks for BTC Map are clear and exciting - all your silos are indeed broken - however, something fundamental has been bothering me for a while and I think it comes down to data ownership.
For those unfamiliar, BTC Map uses OpenStreetMap (OSM) as its main geographic database. OSM is centred on the concept of a commons of objectively verifiable data that is maintained by a global community of volunteer editors; a Wikipedia for maps. There is no data ownership; the data is free (as in freedom) and anyone can edit anything. It is the data equivalent of FOSS (Free and Open Source Software) - FOSD if you will, but more commonly referred to as Open Data.
In contrast, Notes and Other Stuff on Nostr (Places in this cartographic context) are explicitly owned by the controller of the private key. These notes are free to propagate, but they are owned.
How do we reconcile the decentralised nature of Nostr, where data is cryptographically owned by individuals, with the community-managed data commons of OpenStreetMap, where no one owns the data?
Self-sovereign Identity
Before I address this coexistence question, I want to talk a little about identity as it pertains to ownership. If something is to be owned, it has to be owned by someone or something - an identity.
All identities that are not self-sovereign are, by definition, leased to you by a 3rd party. You rent your Facebook identity from Meta in exchange for your data. You rent your web domain from your DNS provider in exchange for your money.
Taken to the extreme, you rent your passport from your Government in exchange for your compliance. You are you at the pleasure of others. Where Bitcoin separates money from the state; Nostr separates identity from the state.
Or, as @nvk said recently: "Don't build your house on someone else's land.".
https://i.nostr.build/xpcCSkDg3uVw0yku.png
While we’ve had the tools for self-sovereign digital identity for decades (think PGP keys or WebAuthN), we haven't had the necessary social use cases nor the corresponding social graph to elevate these identities to the mainstream. Nostr fixes this.
Nostr is PGP for the masses and will take cryptographic identities mainstream.
Full NOSTARD?
Returning to the coexistence question: the data on OpenStreetMap isn’t directly owned by anyone, even though the physical entities the data represents might be privately owned. OSM is a data commons.
We can objectively agree on the location of a tree or a fire hydrant without needing permission to observe and record it. Sure, you could place a tree ‘on Nostr’, but why should you? Just because something can be ‘on Nostr’ doesn’t mean it should be.
https://i.nostr.build/s3So2JVAqoY4E1dI.png
There might be a dystopian future where we can't agree on what a tree is nor where it's located, but I hope we never get there. It's at this point we'll need a Wikifreedia variant of OpenStreetMap.
While integrating Nostr identities into OpenStreetMap would be valuable, the current OSM infrastructure, tools, and community already provide substantial benefits in managing this data commons without needing to go NOSTR-native - there's no need to go Full NOSTARD. H/T to @princeySOV for the original meme.
https://i.nostr.build/ot9jtM5cZtDHNKWc.png
So, how do we appropriately blend cryptographically owned data with the commons?
If a location is owned in meatspace and it's useful to signal that ownership, it should also be owned in cyberspace. Our efforts should therefore focus on entities like businesses, while allowing the commons to manage public data for as long as it can successfully mitigate the tragedy of the commons.
The remainder of this article explores how we can:
- Verify ownership of a physical place in the real world;
- Link that ownership to the corresponding digital place in cyberspace.
As a side note, I don't see private key custodianship - or, even worse, permissioned use of Places signed by another identity's key - as any more viable than the rented identities of Web 2.0.
And as we all know, the Second Law of Infodynamics (no citation!) states that:
"The total amount of sensitive information leaked will always increase over time."
This especially holds true if that data is centralised.
Not your keys, not your notes. Not your keys, not your identity.
Places and Web-of-Trust
@Arkinox has been leading the charge on the Places NIP, introducing Nostr notes (kind 37515) that represent physical locations. The draft is well-crafted, with bonus points for linking back to OSM (and other location repositories) via NIP-73 - External Content IDs (championed by @oscar of @fountain).
However, as Nostr is permissionless, authenticity poses a challenge. Just because someone claims to own a physical location on the Internet doesn’t necessarily mean they have ownership or control of that location in the real world.
Ultimately, this problem can only be solved in a decentralised way by using Web-of-Trust - using your social graph and the perspectives of trusted peers to inform your own perspective. In the context of Places, this requires your network to form a view on which digital identity (public key / npub) is truly the owner of a physical place like your local coffee shop.
This requires users to:
- Verify the owner of a Place in cyberspace is the owner of a place in meatspace.
- Signal this verification to their social graph.
Let's look at the latter idea first with the concept of Attestations ...
Attestations
A way to signal to your social graph that you believe something to be true (or false for that matter) would be by publishing an Attestation note. An Attestation note would signify to your social graph that you think something is either true or false.
Imagine you're a regular at a local coffee shop. You publish an Attestation that says the shop is real and the owner behind the Nostr public key is who they claim to be. Your friends trust you, so they start trusting the shop's digital identity too.
However, attestations applied to Places are just a single use case. The attestation concept could be more widely applied across Nostr in a variety of ways (key rotation, identity linking, etc).
Here is a recent example from @lyn that would carry more signal if it were an Attestation:
https://i.nostr.build/lZAXOEwvRIghgFY4.png
Parallels can be drawn between Attestations and transaction confirmations on the Bitcoin timechain; however, their importance to you would be weighted by clients and/or Data Vending Machines in accordance with:
- Your social graph;
- The type or subject of the content being attested and by whom;
- Your personal preferences.
They could also have a validity duration to be temporally bound, which would be particularly useful in the case of Places.
NIP-25 (Reactions) do allow for users to up/downvote notes with optional content (e.g., emojis) and could work for Attestations, but I think we need something less ambiguous and more definitive.
‘This is true’ resonates more strongly than ‘I like this.’.
https://i.nostr.build/s8NIG2kXzUCLcoax.jpg
There are similar concepts in the Web 3 / Web 5 world such as Verified Credentials by tdb. However, Nostr is the Web 3 now and so wen Attestation NIP?
https://i.nostr.build/Cb047NWyHdJ7h5Ka.jpg
That said, I have seen @utxo has been exploring ‘smart contracts’ on nostr and Attestations may just be a relatively ‘dumb’ subset of the wider concept Nostr-native scripting combined with web-of-trust.
Proof of Place
Attestations handle the signalling of your truth, but what about the initial verification itself?
We already covered how this ultimately has to be derived from your social graph, but what if there was a way to help bootstrap this web-of-trust through the use of oracles? For those unfamiliar with oracles in the digital realm, they are simply trusted purveyors of truth.
Introducing Proof of Place, an out–of-band process where an oracle (such as BTC Map) would mail - yes physically mail- a shared secret to the address of the location being claimed in cyberspace. This shared secret would be locked to the public key (npub) making the claim, which, if unlocked, would prove that the associated private key (nsec) has physical access to the location in meatspace.
One way of doing this would be to mint a 1 sat cashu ecash token locked to the npub of the claimant and mail it to them. If they are able to redeem the token then they have cryptographically proven that they have physical access to the location.
Proof of Place is really nothing more than a weighted Attestation. In a web-of-trust Nostrverse, an oracle is simply a npub (say BTC Map) that you weigh heavily for its opinion on a given topic (say Places).
In the Bitcoin world, Proof of Work anchors digital scarcity in cyberspace to physical scarcity (energy and time) in meatspace and as @Gigi says in PoW is Essential:
"A failure to understand Proof of Work, is a failure to understand Bitcoin."
In the Nostrverse, Proof of Place helps bridge the digital and physical worlds.
@Gigi also observes in Memes vs The World that:
"In Bitcoin, the map is the territory. We can infer everything we care about by looking at the map alone."
https://i.nostr.build/dOnpxfI4u7EL2v4e.png
This isn’t true for Nostr.
In the Nostrverse, the map IS NOT the territory. However, Proof of Place enables us to send cryptographic drones down into the physical territory to help us interpret our digital maps. 🤯
Check-ins
Although not a draft NIP yet, @Arkinox has also been exploring the familiar concept of Foursquare-style Check-ins on Nostr (with kind 13811 notes).
For the uninitiated, Check-ins are simply notes that signal the publisher is at a given location. These locations could be Places (in the Nostr sense) or any other given digital representation of a location for that matter (such as OSM elements) if NIP-73 - External Content IDs are used.
Of course, not everyone will be a Check-in enjoyooor as the concept will not sit well with some people’s threat models and OpSec practices.
Bringing Check-ins to Nostr is possible (as @sebastix capably shows here), but they suffer the same authenticity issues as Places. Just because I say I'm at a given location doesn't mean that I am.
Back in the Web 2.0 days, Foursquare mitigated this by relying on the GPS position of the phone running their app, but this is of course spoofable.
How should we approach Check-in verifiability in the Nostrverse? Well, just like with Places, we can use Attestations and WoT. In the context of Check-ins, an Attestation from the identity (npub) of the Place being checked-in to would be a particularly strong signal. An NFC device could be placed in a coffee shop and attest to check-ins without requiring the owner to manually intervene - I’m sure @blackcoffee and @Ben Arc could hack something together over a weekend!
Check-ins could also be used as a signal for bonafide Place ownership over time.
Summary: Trust Your Bros
So, to recap, we have:
Places: Digital representations of physical locations on Nostr.
Check-ins: Users signalling their presence at a location.
Attestations: Verifiable social proofs used to confirm ownership or the truth of a claim.
You can visualise how these three concepts combine in the diagram below:
https://i.nostr.build/Uv2Jhx5BBfA51y0K.jpg
And, as always, top right trumps bottom left! We have:
Level 0 - Trust Me Bro: Anyone can check-in anywhere. The Place might not exist or might be impersonating the real place in meatspace. The person behind the npub may not have even been there at all.
Level 1 - Definitely Maybe Somewhere: This category covers the middle-ground of ‘Maybe at a Place’ and ‘Definitely Somewhere’. In these examples, you are either self-certifying that you have checked-in at an Attested Place or you are having others attest that you have checked-in at a Place that might not even exist IRL.
Level 2 - Trust Your Bros: An Attested Check-in at an Attested Place. Your individual level of trust would be a function of the number of Attestations and how you weigh them within your own social graph.
https://i.nostr.build/HtLAiJH1uQSTmdxf.jpg
Perhaps the gold standard (or should that be the Bitcoin standard?) would be a Check-in attested by the owner of the Place, which in itself was attested by BTC Map?
Or perhaps not. Ultimately, it’s the users responsibility to determine what they trust by forming their own perspective within the Nostrverse powered by web-of-trust algorithms they control. ‘Trust Me Bro’ or ‘Trust Your Bros’ - you decide.
As we navigate the frontier of cryptographic ownership and decentralised data, it’s up to us to find the balance between preserving the Open Data commons and embracing self-sovereign digital identities.
Thanks
With thanks to Arkinox, Avi, Ben Gunn, Kieran, Blackcoffee, Sebastix, Tomek, Calle, Short Fiat, Ben Weeks and Bitcoms for helping shape my thoughts and refine content, whether you know it or not!
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 7d33ba57:1b82db35
2025-03-27 10:35:25Nerja is known for its stunning beaches, famous caves, and breathtaking sea views. With a charming old town, whitewashed houses, and a lively atmosphere, Nerja offers a perfect mix of relaxation, nature, and culture.
🏖️ Top Things to See & Do in Nerja
1️⃣ Balcón de Europa 🌅
- A stunning viewpoint with panoramic views of the Mediterranean.
- Lined with palm trees, street musicians, and cafés.
- A great spot for sunset photos and people-watching.
2️⃣ Nerja Caves (Cuevas de Nerja) 🏰
- A famous cave system with impressive stalactites and stalagmites.
- Home to prehistoric cave paintings, estimated to be over 40,000 years old.
- One of Spain’s most important archaeological sites.
3️⃣ Playa de Burriana 🏖️
- The best beach in Nerja, with golden sand and clear waters.
- Offers water sports, including kayaking and paddleboarding.
- Many chiringuitos (beach bars) serving delicious seafood paella.
4️⃣ Kayaking to Maro Cliffs 🚣♂️
- Paddle along the coastline to discover hidden coves and waterfalls.
- A unique way to explore the Maro-Cerro Gordo Cliffs Natural Park.
5️⃣ Frigiliana – The Most Beautiful White Village 🏡
- Just 10 minutes from Nerja, this charming Andalusian village is full of whitewashed houses, cobbled streets, and colorful flowers.
- Wander through narrow alleyways and enjoy stunning mountain views.
6️⃣ El Salón & Calahonda Beaches 🏝️
- Small, quiet beaches just below the Balcón de Europa.
- Perfect for a relaxing swim away from the crowds.
🍽️ What to Eat in Nerja
- Espetos de Sardinas – Grilled sardines on skewers, a classic Andalusian dish 🐟
- Ajoblanco – A cold almond and garlic soup, refreshing on hot days 🍲
- Fried Fish (Pescaito Frito) – A mix of freshly caught seafood 🦑🐠
- Tarta de Almendra – A traditional almond cake, perfect with coffee 🍰
- Paella at Playa Burriana – One of the best places to enjoy authentic seafood paella 🍤🍚
🚗 How to Get to Nerja
✈️ By Air: The nearest airport is Málaga Airport (AGP, 70 km, 50 min drive).
🚘 By Car: 50 min from Málaga, 1.5 hrs from Granada.
🚌 By Bus: Direct buses from Málaga, Granada, and other Costa del Sol towns.
🚆 By Train: No direct train, but you can take a train to Málaga and then a bus.💡 Tips for Visiting Nerja
✅ Best time to visit? Spring & summer (April–September) for the best weather ☀️
✅ Book Nerja Cave tickets in advance – It’s one of the most visited sites in Andalusia 🏰
✅ Try kayaking or boat tours – The coastline is stunning from the water 🚣♂️
✅ Visit Frigiliana early – To avoid crowds and enjoy the peaceful morning atmosphere 🌅
✅ Wear comfortable shoes – The old town has steep, cobbled streets 👟
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ da0b9bc3:4e30a4a9
2025-03-27 10:21:42Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/926553
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 7d33ba57:1b82db35
2025-03-27 09:25:04Los Narejos is a laid-back beach town on the Costa Cálida, located in the Murcia region of Spain. Known for its calm, warm waters, family-friendly beaches, and proximity to the Mar Menor lagoon, it’s an excellent destination for relaxation, water sports, and enjoying the Mediterranean lifestyle**.
🏖️ Top Things to See & Do in Los Narejos
1️⃣ Playa de Los Narejos 🏖️
- A wide, sandy beach with shallow and warm waters, perfect for families.
- Palm-lined promenade for walking, cycling, or enjoying seaside cafés.
- Excellent for swimming, sunbathing, and beach sports.
2️⃣ Mar Menor Lagoon 🌊
- A unique saltwater lagoon, separated from the Mediterranean by La Manga.
- Warmer and calmer waters than the open sea, ideal for safe swimming.
- Known for its healing mud baths with minerals beneficial for the skin.
3️⃣ Watersports Paradise 🚤
- A top spot for kite surfing, windsurfing, sailing, and stand-up paddleboarding.
- Several local schools offer lessons for beginners and equipment rentals.
- Great conditions for kayaking along the Mar Menor coastline.
4️⃣ Promenade Walk to Los Alcázares 🚶♂️
- A scenic coastal walk from Los Narejos to Los Alcázares.
- Pass by chiringuitos (beach bars) serving fresh seafood and cocktails.
5️⃣ Local Markets & Shopping 🛍️
- Visit the Los Alcázares Market (Tuesdays & Saturdays) for local produce, clothes, and crafts.
- Small boutique shops sell Murcian souvenirs, ceramics, and wines.
🍽️ What to Eat in Los Narejos
- Caldero Murciano – A traditional seafood rice dish, full of flavor 🍚🐟
- Dorada a la Sal – Fresh sea bream baked in salt, a Mediterranean specialty 🐠
- Tapas & Mariscos – Try local seafood tapas like grilled prawns, octopus, and clams 🍤
- Pastel de Carne – A Murcian meat pie, perfect for a quick bite 🥧
- Paparajotes – A sweet treat made from lemon leaves coated in batter and fried 🍋🍩
🚗 How to Get to Los Narejos
✈️ By Air: The nearest airport is Región de Murcia Airport (RMU, 30 min drive).
🚆 By Train: Nearest station is in Balsicas (20 min drive), with connections to Murcia and Cartagena.
🚘 By Car: 30 min from Murcia, 1 hr from Alicante, 20 min from Cartagena.
🚌 By Bus: Direct buses from Murcia, Cartagena, and Alicante.💡 Tips for Visiting Los Narejos
✅ Best time to visit? Spring to early autumn (April–October) for great weather ☀️
✅ Try water sports – Mar Menor is one of the safest places for beginners 🏄♂️
✅ Bring a bike – The flat terrain and coastal paths are great for cycling 🚴
✅ Enjoy the sunset – The Mar Menor has some of the most stunning sunset views 🌅 -
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 866e0139:6a9334e5
2025-03-27 09:03:33Autor: Michael Meyen. (Bild: Hermine Zgraggen). Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier.**
Die Friedenstaube hat meine Kindheit und meine Jugend begleitet und wahrscheinlich auch beschützt. Ich bin auf der Insel Rügen aufgewachsen und sehe immer noch, wie der Bürgermeister am 1. Mai 1975 die US-Niederlage in Vietnam verkündete. Vielleicht war es auch der örtliche Parteisekretär. Egal. Der Sprecher stand jedenfalls am Heimatmuseum vor all den Fahnen, vor Sportlern, Pionieren und Erwachsenen, die mit ihren Kollegen durch das Dorf gegangen waren und jetzt auf den ersten Schnaps warteten. Ein Maiwässerchen, was sonst am Kampf- und Feiertag der Werktätigen. Ich Knirps war schon jetzt trunken vor Glück. Wenn ich einst groß sein bin, daran konnte es keinen Zweifel mehr geben, dann würde der Imperialismus besiegt sein und mit ihm der Krieg.
Was ist jetzt mit dem Sozialismus und seinem Frieden?
Picassos Friedenstaube war überall. Bei solchen Demos, in der Presse und in der Schule sowieso. Der Sozialismus, darauf schworen die Lehrer genauso Stein und Bein wie alle Funktionäre, der Sozialismus führt keinen Krieg. Es gab zwar immer wieder Gerüchte über Flussinseln, um die sich Moskau und Peking streiten würden, aber Asien war weit und China vielleicht nicht ganz so sozialistisch. Dann kam der Dezember 1979. Afghanistan. Ich war zwölf und konnte mir das schon deshalb nicht schönreden, weil es Olympia traf und damit zwei Sommerfernseh-Wochen. Was sind Goldmedaillen wert, wenn die Besten fehlen? Wenig später ging es um U-Boote. Ein Junge, nur wenig älter als ich, hatte an die *Ostsee-Zeitung* geschrieben, das Regionalblatt der SED, und gefragt, was die sowjetische Marine in schwedischen Gewässern mache und warum er sowas nur im Westradio hören könne. Als die Antwort kam, stand er mit dem Brief auf der Straße. Seht her, liebe Leute: Sie nehmen mich ernst. Was ist jetzt mit diesem Sozialismus und seinem Frieden?
Ich weiß noch, dass ich den Brief lesen musste (in der Schule wusste jeder, dass ich Journalist werden wollte), aber nicht mehr, was dort stand. Wahrscheinlich hat sich die Redaktion mit einem Missverständnis herausgeredet, mit Fake News oder mit Wilhelm Busch. Der Friede muss bewaffnet sein. Die Geschichte mit Igel und Fuchs gefiel mir. Da waren diese Zähne und damit die Drohung von Raubtier und Kapitalismus. Und da war ein eher zartes Lebewesen, das auf den Verstand setzte. „Und allsogleich macht er sich rund, zeigt seinen dichten Stachelbund – und trotzt getrost der ganzen Welt, bewaffnet, doch als Friedensheld.“
DIE FRIEDENSTAUBE FLIEGT AUCH IN IHR POSTFACH:
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt, vorerst für alle kostenfrei, wir starten gänzlich ohne Paywall. (Die Bezahlabos fangen erst zu laufen an, wenn ein Monetarisierungskonzept für die Inhalte steht).
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: milosz@pareto.space
"Ich hasste das Militär"
Im Alltag war das nicht ganz so einfach, selbst für Kinder. Bei den Sportfesten hätte ich lieber einen Schlagball genommen als die F1, eine Handgranatenattrappe, die über die 35-Meter-Marke fliegen musste, damit der kleine Werfer überleben kann. Ich mochte die Soldatenspiele nicht, die alle paar Wochen angesetzt wurden, und schon gar nicht die Lager, die am Ende der Schulzeit warteten. Zwei Wochen in einer Baracke mit Frühsport in der Kälte und mit irgendwelchen Knallköpfen, die mir sagen konnten, was ich zu machen habe. Das heißt: Sie sagten das nicht. Sie brüllten. Und sie konnten jeden bestrafen, der nicht spurte. Ich hasste das Militär – und das nicht nur, weil ich nie sicher war, die Sturmwand beim ersten Anlauf zu nehmen und die Gasmaske schnell genug aus der Tasche zu haben.
Ich überspringe die drei Jahre, die ich Uniform getragen habe. In meinem Gedächtnis ist dort eine Leerstelle. Ich bin mir aber sicher, dass es schrecklich gewesen sein muss, und höre noch all die Stimmen, die vorher auf mich eingeredet hatten. Wenn du an die Uni willst, Michael, dann musst du dafür bezahlen. Dann musst du zeigen, was dir dieses Land wert ist und die Arbeiterklasse, die hier nun mal regiert und später auch dein Studium bezahlt. Gib uns einen Fitzel deiner Lebenszeit. Ich habe diese Stimmen verflucht und dachte, dass ich ihnen nicht entkommen kann. Heute weiß ich, dass das nicht stimmt. Ich wusste es schon im ersten Semester, weil neben mir Jungs saßen, die nur 18 Monate bei der Fahne waren und trotzdem einen Platz bekommen hatten. Dass die DDR kurz danach ohne einen Schuss zusammenbrach, habe ich nicht verstanden, aber trotzdem aufgeatmet. Du musst nicht mehr Reserveoffizier werden. Wenigstens das nicht. Die drei Lehrgangswochen habe ich in der Pathologie des Uni-Krankenhauses verbracht, vermutlich mit irgendwelchen Aufräumarbeiten.
Eine Wette mit meinem Sohn
Mein Sohn ist 1995 zur Welt gekommen. Ein Stammhalter. Ein Brüderchen für unsere Tochter. Aber auch ein Soldat. Ich habe mit mir selbst gewettet, dass es keine Armee mehr geben würde und vor allem keine Wehrpflicht, wenn er 18 ist, und geschworen, dafür alles zu tun, was mir möglich ist. Dass es dann dieser Minister von der CSU war? Was soll’s, dachte ich. Hauptsache, der Junge kann selbst entscheiden, wo und wie er in die Erwachsenenwelt gehen will.
Damals war ich mir sicher: Bertolt Brecht hat gewonnen. Endlich weiß Deutschland, dass es nicht Karthago sein will. Jetzt schreibe ich für die Friedenstaube und würde diesen Brecht lieber heute als morgen auferstehen lassen. So schwer kann das doch nicht zu verstehen sein mit den drei Kriegen.
Michael Meyen, Jahrgang 1967, hat an der Sektion Journalistik studiert und dann in Leipzig alle akademischen Stationen durchlaufen: Diplom (1992), Promotion (1995) und Habilitation (2001). Parallel arbeitete er als Journalist. Seit 2002 ist Meyen Professor für Kommunikationswissenschaft an der LMU München. Er hat drei interdisziplinäre Forschungsverbünde als Sprecher geleitet: "Fit for Change" (Laufzeit: 2013 bis 2017), "Zukunft der Demokratie" (2018 bis 2022) und "Das mediale Erbe der DDR" (2018 bis 2025). Mehr zum Autor und seinen Büchern hier.
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 7d33ba57:1b82db35
2025-03-27 08:55:21L'Estartit is famous for its stunning beaches, the Medes Islands, and incredible diving opportunities. Once a small fishing village, it’s now a paradise for nature lovers, water sports enthusiasts, and those seeking a relaxing Mediterranean escape.
🏖️ Top Things to See & Do in L'Estartit
1️⃣ Medes Islands (Illes Medes) 🏝️
- A protected marine reserve, perfect for snorkeling and scuba diving.
- Explore sea caves, coral reefs, and diverse marine life.
- Take a glass-bottom boat tour to admire the underwater world without getting wet.
2️⃣ L'Estartit Beach 🏖️
- A long sandy beach with shallow waters, ideal for families.
- Great for swimming, sunbathing, and water sports like windsurfing and kayaking.
- Offers fantastic views of the Medes Islands.
3️⃣ Montgrí Massif & Castle 🏰
- Hike up to the Montgrí Castle for panoramic views of the Costa Brava.
- Trails through rocky landscapes and Mediterranean forests.
- A perfect spot for hiking, mountain biking, and photography.
4️⃣ Coastal Walking Route (Camí de Ronda) 🌊
- A breathtaking hiking trail along the cliffs, connecting L'Estartit with nearby beaches and coves.
- Discover hidden spots like Cala Pedrosa and Cala Ferriol.
5️⃣ Explore the Old Town & Port ⚓
- Wander through narrow streets with local shops and seafood restaurants.
- Visit the Sant Genís Church, a historic landmark in the town center.
- Enjoy a drink with a view at the marina.
6️⃣ Kayaking & Stand-Up Paddleboarding 🚣♂️
- Paddle along the coastline to explore caves, cliffs, and hidden coves.
- A great way to experience the natural beauty of the area.
🍽️ What to Eat in L'Estartit
- Suquet de Peix – Traditional Catalan fish stew 🐟
- Arroz a la Cassola – A savory rice dish with seafood 🍤
- Fideuà – Like paella, but made with short noodles instead of rice 🍜
- Calamars a la Planxa – Grilled squid with olive oil and garlic 🦑
- Crema Catalana – A classic Catalan dessert similar to crème brûlée 🍮
🚗 How to Get to L'Estartit
🚆 By Train: The nearest train station is Flaçà (30 min by car/taxi) with connections from Barcelona and Girona.
🚘 By Car: 1.5 hrs from Barcelona, 45 min from Girona, 1 hr from Figueres.
🚌 By Bus: Direct buses from Barcelona, Girona, and other Costa Brava towns.
✈️ By Air: The nearest airport is Girona-Costa Brava (GRO, 55 km).💡 Tips for Visiting L'Estartit
✅ Best time to visit? Late spring to early autumn (May–September) for warm weather 🌞
✅ Book diving tours in advance – Medes Islands are a top diving destination 🤿
✅ Hike early in the morning to avoid the heat & get the best views 🥾
✅ Visit in June for the Havaneres Festival, celebrating Catalan maritime music 🎶 -
@ 57d1a264:69f1fee1
2025-03-27 08:11:33Explore and reimagine programming interfaces beyond text (visual, tactile, spatial).
"The most dangerous thought you can have as a creative person is to think you know what you're doing."
— Richard Hamming
[^1]https://www.youtube.com/watch?v=8pTEmbeENF4
For his recent DBX Conference talk, Victor took attendees back to the year 1973, donning the uniform of an IBM systems engineer of the times, delivering his presentation on an overhead projector. The '60s and early '70s were a fertile time for CS ideas, reminds Victor, but even more importantly, it was a time of unfettered thinking, unconstrained by programming dogma, authority, and tradition.
'The most dangerous thought that you can have as a creative person is to think that you know what you're doing,' explains Victor. 'Because once you think you know what you're doing you stop looking around for other ways of doing things and you stop being able to see other ways of doing things. You become blind.' He concludes, 'I think you have to say: "We don't know what programming is. We don't know what computing is. We don't even know what a computer is." And once you truly understand that, and once you truly believe that, then you're free, and you can think anything.'
More details at https://worrydream.com/dbx/
[^1]: Richard Hamming -- The Art of Doing Science and Engineering, p5 (pdf ebook)
originally posted at https://stacker.news/items/926493
-
@ e5de992e:4a95ef85
2025-03-27 04:45:04Overview
On March 26, 2025, U.S. stock markets closed with notable declines driven primarily by President Donald Trump's announcement of a 25% tariff on all imported automobiles. This move has raised concerns about global trade tensions and inflation risks, impacting various sectors—especially technology and auto.
U.S. Stock Market Performance
- S&P 500:
- Dropped 1.1%
- Closed at 5,714.32
-
Broke a three-day winning streak
-
Dow Jones Industrial Average (DJIA):
- Decreased by 0.3%
-
Closed at 42,455.78
-
Nasdaq Composite:
- Fell 2%
- Finished at 17,906.45
- Led by significant losses in major tech stocks such as Nvidia and Tesla
These declines were primarily driven by the auto tariff announcement.
U.S. Futures Market
- S&P 500 Futures:
-
Remained flat, indicating investor caution amid ongoing tariff uncertainties
-
Dow Jones Futures:
- Showed little change, reflecting a wait-and-see approach from market participants
Note: U.S. futures are exhibiting minimal movement with low volume.
Key Factors Influencing U.S. Markets
Auto Import Tariffs
- President Trump's imposition of a 25% tariff on imported automobiles has heightened concerns about escalating trade wars.
- Major automakers, including General Motors and Ford, experienced stock declines in response to these tariffs.
Tech Sector Weakness
- Leading technology companies, notably Nvidia and Tesla, saw significant stock price reductions (each dropping more than 5%), contributing to the overall market downturn.
Energy Sector Performance
- Despite a 4% fall in oil prices, energy stocks outperformed the broader market by rising 8.9% compared to a 1.8% decline in the S&P 500.
- However, the energy rally appears fragile, driven by increased valuations rather than improving earnings prospects.
Global Stock Indices Performance
- Japan's Nikkei 225:
-
Declined by 1.2%, with major automakers like Toyota experiencing significant losses due to tariff concerns.
-
South Korea's KOSPI:
-
Fell 0.7%, impacted by declines in auto-related stocks amid trade tension fears.
-
Hong Kong's Hang Seng:
-
Dropped 2.35%, closing at 23,344.25, influenced by a downturn in Chinese tech shares and ongoing tariff concerns.
-
Germany's DAX:
-
Experienced a slight decline of 0.32%, closing at 23,109.79, as initial optimism regarding tariff negotiations waned.
-
UK's FTSE 100:
- Fell marginally by 0.10%, reflecting investor caution amid mixed economic data.
Cryptocurrency Market
- Bitcoin (BTC):
-
Trading at approximately $88,500, reflecting a 1.5% increase from the previous close.
-
Ethereum (ETH):
- Priced around $2,100, marking a 1.2% uptick from the prior session.
These movements suggest that investors may be turning to digital assets as alternative investments during periods of traditional market uncertainty.
Key Global Economic and Geopolitical Events
- Trade Policy Developments:
- President Trump's new auto tariffs have intensified global trade tensions.
-
Concerns include retaliatory measures from trading partners (e.g., Japan and Canada) and potential disruptions to international supply chains.
-
Energy Sector Outlook:
-
Despite recent gains, the energy rally appears fragile as it is driven more by increased valuations than by improving earnings.
-
Market Forecasts:
- Barclays has lowered its year-end price target for the S&P 500 to 5,900 from 6,600, citing concerns over the tariffs’ impact on earnings. This is the lowest target among major U.S. Treasury dealers, reflecting growing apprehension about the economic outlook.
Conclusion
Global financial markets are navigating a complex landscape marked by escalating trade tensions, sector-specific challenges, and evolving economic forecasts. Investors are advised to exercise caution and closely monitor these developments—particularly the impact of new tariffs and their ripple effects on global trade and inflation—when making informed decisions.
-
@ a8d1560d:3fec7a08
2025-03-27 03:12:03I have made a big update to my Nostr desktop. Apps for images, videos and livestreams after their respective NIPs have been added, and the Raw Events app has been greatly improved. There are still some layout problems, but it all works (hopefully).
https://websim.ai/@wholewish91244492/nostr-desktop
-
@ 9f475ec5:d9acc946
2025-03-26 23:18:41The next step in AI evolution is enabling AI agents to communicate directly with one another.
"Agents on Nostr, combined with cashu, would be amazing" — Jack Dorsey, Citadel Dispatch #150
Today
For AI agents to communicate seamlessly, they need a universal language that allows frictionless data and instruction sharing—one that surpasses the constraints of isolated systems. Just as humans rely on shared languages to collaborate, AI agents require a common “dialect” to exchange information, delegate tasks, and build collective intelligence. Without it, each agent’s logic remains siloed, limiting synergy and innovation. A universal protocol, however, lets agents seamlessly tap into one another’s capabilities, coordinating strategies, sharing learned knowledge, and multiplying their creative potential. By aligning on an open, interoperable standard, AI can flourish into a vibrant, interconnected ecosystem rather than a patchwork of stand-alone solutions. This is no different from what happened with the Internet when HTTP was released, leading to the development of web browsers and the Internet as we know it today.
Nostr can be viewed as the “HTTP” for agent-to-agent communication—both are open standards that encourage universal participation and spark rapid innovation. When Tim Berners-Lee released HTTP without proprietary restrictions, developers everywhere could build websites and online services on a simple yet extensible protocol. In the same way, Nostr’s minimalistic yet powerful design fosters a decentralized, censorship-resistant foundation for diverse messaging, social, and identity systems. Just as HTTP created an open arena for web platforms and APIs, Nostr offers a flexible, community-driven substrate for agent-based communication, promoting a spirit of collaboration and interoperability crucial to long-term growth.
Our vision
We envision a world where AI agents operate on an open, standardized, and decentralized network —a Nostr agentic ecosystem that unlocks new levels of creativity and collaboration.
Our mission is to develop the tools and infrastructure that enable AI agents to seamlessly interoperate over the Nostr network—facilitating the exchange of both data and money.
Our first steps
Every marketplace application faces the chicken and egg problem. Sellers won't show up until the buyers are there and buyers won't show up until the sellers are there.
Our solution? The FIFA 2026 World Cup will bring millions of international and domestic travelers to 11 cities in the US.
Can we work with chambers and tourism agencies around these cities to embbed Nostr powered AI travel organizers into their websites and apps? This could be a way to onboard thousands of businesses to the Nostr agentic ecosystem. This is our growth assumption.
That's why our our first step is to provide businesses—large and small—with a turnkey platform to sell their products and services to any AI agent connected to the open Nostr network.
We will also develop the tools for websites and apps to develop Nostr-powered AI buyers and, with the support of the local chambers and tourism boards, direct their technology suppliers to use these tools.
Our values
Everything we develop is free and open sourced under the MIT license and our business will generate revenue by charging a monthly fee for operating an end-to-end agentic commerce solution to the businesses selling their products through the Nostr agentic ecosystem.
A rough demo
Today, we is just nostr:npub1er0k46yxcugmp6r6mujd5qvp75yp72m98fs6ywcs2k3kqg3f8grqd9py3m 😁 I've created a proof-of-concept buyer AI agent and published real information from some merchants to demonstrate the concept to local chambers and validate the growth assumption.
Feel free to check it out at the Synvya agentstr repository, but be warned, I'm not a programmer so don't freak out with the code.
You can also see a demo here:
nostr:naddr1qvzqqqy9hvpzp868tmzceg2pvymlpdssv8shvu2jlndysp6dxwc67gw5jtv6ej2xqq2hgnfnwdf8yendfa8r2jttdsck6dm0wpm4wnalksn
Interested?
If this sounds interesting to you, follow nostr:npub1nar4a3vv59qkzdlskcgxrctkw9f0ekjgqaxn8vd0y82f9kdve9rqwjcurn or nostr:npub1er0k46yxcugmp6r6mujd5qvp75yp72m98fs6ywcs2k3kqg3f8grqd9py3m and reach out at any time.
-
@ 878dff7c:037d18bc
2025-03-26 21:55:34Popular Grocery Items Recalled Due to E. coli Contamination
Summary:
Several Fresh Salad Co products sold in Queensland and northern New South Wales have been recalled due to contamination with Shiga toxin-producing E. coli (STEC). Affected items include baby spinach (120g, 280g), baby spinach and rocket (120g), and a stir-fry mix (400g) with specific use-by dates at the end of March. Consumers are advised to return these products for a full refund and seek medical advice if concerned about their health.
Sources: News.com.au - March 27, 2025
Coalition Proposes Halving Fuel Excise to Alleviate Cost of Living
Summary:
Opposition Leader Peter Dutton has announced that, if elected, the Coalition would repeal Labor's planned tax cuts and instead implement a 12-month halving of the fuel excise. This initiative aims to reduce petrol prices by 25 cents per litre, providing immediate relief to Australian families and workers facing cost-of-living pressures. The proposal contrasts with Labor's tax cuts, which are set to commence in 15 months and offer annual savings of up to $536 for taxpayers.
Sources: The Guardian - March 27, 2025, The Australian - March 27, 2025
Federal Budget Criticized for Omitting Key Infrastructure Funding
Summary:
Groom MP Garth Hamilton has criticized the latest federal budget for lacking funding for critical infrastructure projects in his region. He expressed concerns over the future of regional programs like the Growing Regions and Regional Precincts and Partnerships Programs, which he believes are essential for regional development. Hamilton highlighted the absence of funding for key projects such as the New England Highway, the deteriorating Warrego and Gore Highways, and the stalled Inland Rail project.
Source: The Courier-Mail - March 27, 2025
China Faces Challenges in Advanced Robotics Development
Summary:
China is recognizing the importance of robots in its ageing economy, facing a significant labor shortage. Despite leading in industrial robot installations, most Chinese robots are low-tech compared to advanced humanoids being developed elsewhere. The U.S. and China are both racing to develop sophisticated robots, but China's sector remains reliant on foreign components and faces potential limitations from U.S. sanctions. This dependency makes China's position in the robotics race precarious.
Sources: Reuters - March 26, 2025
Tax Cuts Passed Amid Election Speculation
Summary:
Labor's budget tax cuts have been swiftly passed into law, providing the average worker with modest financial relief starting next year. This development leaves Opposition Leader Peter Dutton with a strategic decision on how to position the Coalition's response in the lead-up to the federal election. Sources: 9News - March 27, 2025
Labor Government Proposes Tax on Unrealized Superannuation Gains
Summary:
The Labor government has introduced a proposal to levy a 15% tax on unrealized capital gains for superannuation balances exceeding $3 million. This initiative aims to generate an additional $9.7 billion between 2024-25 and 2028-29. Critics argue that taxing unrealized gains is unfair and may discourage investment, while supporters contend it promotes fairness in the superannuation system. Sources: News.com.au - 27 March 2025
New Youth Crime Bill Introduced in NSW Parliament
Summary:
The State Opposition Attorney General, Alister Henskens, is set to introduce the Crimes Legislation Amendment (Youth Crime) Bill 2025 to the NSW Parliament. The bill aims to combat youth crime by expanding the definition of repeat offenses, revoking bail under specific conditions, and implementing electronic monitoring and mandatory curfews for repeat offenders. The proposal has sparked debates regarding its potential impact on regional communities and the principle of doli incapax. Sources: The Daily Telegraph - 27 March 2025
Prime Minister Albanese Invites President Trump to Visit Australia Amid Tariff Dispute
Summary:
Prime Minister Anthony Albanese has revealed plans to visit Washington D.C. if he wins the upcoming May election, marking his first international trip. This follows the U.S. imposition of 25% tariffs on steel and aluminum imports from Australia. Despite the tariff dispute, Albanese has invited President Donald Trump to visit Australia, which would be his first trip to the country as President. The timing of Trump's visit would depend on his schedule. Both major Australian political parties remain committed to seeking a solution to the steel and aluminum levies through persistent engagement with the U.S., rejecting reciprocal tariffs on U.S. imports. Sources: News.com.au - March 26, 2025
Jewish Groups Criticize Australia's Continued Funding to UNRWA
Summary:
Jewish groups have criticized the Australian government's decision to continue funding the UN Relief and Works Agency for Palestine Refugees (UNRWA), amounting to $20 million. Concerns have been raised about UNRWA's past associations with terrorism, with claims that its employees participated in the atrocities of October 7. The Executive Council of Australian Jewry has called for the withdrawal of funding, labeling the organization as compromised. Despite this opposition, the Australian government has defended its financial support for humanitarian purposes, ensuring stringent controls and safeguards. This issue adds tension to the upcoming election, reflecting concerns within Jewish and Muslim communities. Sources: The Australian - March 26, 2025
Australia's Inflation Rate Decreases, Offering Relief to Mortgage Holders
Summary:
Australia's annual inflation rate has fallen to 2.4% as of February, down from the previous month's 2.5%. This decline is attributed to eased rental prices, reduced new home costs, and falling electricity prices due to government rebates. The Reserve Bank of Australia's preferred measure, the "trimmed mean," also decreased to 2.7%. This trend is promising for mortgage holders anticipating potential interest rate cuts and for the Labor government focusing on cost-of-living issues ahead of the upcoming election. Sources: The Guardian - March 26, 2025, Reuters - March 26, 2025
Queensland Farmer Revolutionizes Cattle Mustering with Drones
Summary:
Luke Chaplin, a fourth-generation grazier from northwest Queensland, has transformed cattle mustering by utilizing drones through his company, SkyKelpie. This innovation has managed over 300,000 livestock across Australia efficiently and cost-effectively. Supported by the Queensland Government and Meat & Livestock Australia, the drone technology offers a high return on investment compared to traditional methods, reducing animal stress and improving herd management. SkyKelpie is also developing online training courses and collaborating on autonomous mustering technologies using AI and image detection. Sources: The Courier-Mail - March 27, 2025
Anduril Sees Positive Outlook with New U.S. Defense Policies
Summary:
Anduril President Christian Brose expressed optimism about the company's prospects under the new Trump Pentagon administration, which is perceived to be more receptive to autonomous defense systems. Anduril plans to partner with OpenAI to enhance national security missions and is expanding its manufacturing capabilities, including potential international expansion in Australia. The company develops autonomous systems like the Ghost Shark, offering rapid deployment and cost efficiency compared to traditional manned military assets. Source: Reuters - 27 March 2025
Controversial Legislation Passed to Protect Tasmanian Salmon Industry Amid Environmental Concerns
Summary:
The Australian Parliament has passed a contentious bill aimed at safeguarding Tasmania's salmon farming industry, specifically in Macquarie Harbour. This legislation limits the federal environment minister's authority to review long-standing projects, effectively halting an ongoing assessment of the 2012 expansion of fish farming in the area. Critics argue that this move compromises environmental standards and threatens the endangered Maugean skate. Notably, Greens Senator Sarah Hanson-Young protested by displaying a dead salmon in the Senate chamber, and international figures like Leonardo DiCaprio have called for the shutdown of destructive salmon farms to protect marine life. The government maintains that the law addresses specific regulatory issues and won't affect new projects related to coal, gas, or land-clearing. Sources: The Guardian - March 27, 2025, Herald Sun - March 27, 2025, News.com.au - March 27, 2025, The Australian - March 27, 2025
The 5 Types of Wealth – Real Talk with Zuby ft. Sahil Bloom (Episode #349)
Summary:
In this insightful episode of Real Talk with Zuby, entrepreneur and writer Sahil Bloom joins the show to break down his popular framework of "The 5 Types of Wealth." The conversation goes beyond money, exploring what it truly means to live a rich and fulfilling life.
Bloom outlines the following five categories of wealth:
- Financial Wealth – Income, savings, investments – the traditional definition of wealth.
- Social Wealth – Relationships, reputation, network, and community impact.
- Physical Wealth – Health, fitness, energy levels, and lifestyle habits.
- Mental Wealth – Emotional resilience, knowledge, creativity, and mindset.
- Time Wealth – Freedom and control over how you spend your days.
Key Highlights & Insights:
- Reframing Success: Bloom critiques the modern obsession with financial success and emphasizes that true prosperity is multidimensional.
- Balance vs. Optimization: He talks about how chasing one form of wealth (e.g., money) at the expense of others often leads to long-term regret.
- Time as the Ultimate Currency: The discussion touches on the importance of buying back your time and designing a life where you're not constantly reacting.
- Health & Longevity: Physical wealth is highlighted as the foundation that enables enjoyment of the other four.
- Practical Framework: The episode includes a useful breakdown of how listeners can audit and improve each area of wealth in their own lives.
This episode offers a thought-provoking lens for anyone reassessing their priorities or striving for more balanced success.
Source: Spotify - 27 March 2025
-
@ 3c7dc2c5:805642a8
2025-03-26 21:49:02🧠Quote(s) of the week:
The path to maximalism is littered with mistakes and paved with humility.' Anilsaido
Bitcoin is time because money itself is time.
Money is humanity’s battery: a way to store energy, labor, and resources for the future. It captures your past effort and preserves it for when you need it most. Fiat leaks. Bitcoin holds.
🧡Bitcoin news🧡
On the 18th of March:
➡️After ruling out a strategic bitcoin reserve, the Bank of Korea will launch a central bank digital currency pilot in April, per The Korea Times.
➡️'Metaplanet has acquired an additional 150 BTC for ~$12.5 million, achieving a BTC Yield of 60.8% YTD in 2025.
As of 3/18/2025, Metaplanet hodls 3,200 BTC, and is now a top 10 publicly listed holder of Bitcoin globally.' -Dylan LeClair
➡️Bitcoin entered a risk-off, distribution-dominant phase in early 2025, evidenced by frequent selling and hesitation to buy (yellow to orange dots). - AMB Crypto
➡️Bitwise CIO says Bitcoin should be at $200,000 today and says, “I think the number of companies buying Bitcoin is going to triple this year, I think Game Theory is on.”
“I think countries around the world are going to be buying Bitcoin. There is structurally more demand than supply in Bitcoin.”
➡️Bitcoin mining company Bitfarms buys Stronghold Digital for more than $110 million, making it the largest public-to-public acquisition in Bitcoin industry history.
➡️Bitcoin long-term HODLers become net buyers for the first time since September, per Compass Point Research.
"Buying/selling from HODLers is typically a leading indicator for BTC.
This cohort now owns 65% of BTC supply vs 63% last week vs 73% in early October." - Bitcoin News
➡️GlassNode: 'The Bitcoin market continues to adjust to its new price range after experiencing a -30% correction. Liquidity conditions are also contracting in both on-chain and futures markets.'
➡️Bitcoin now ranks 6th among the world's top monetary assets at $1.62 trillion, per Porkopolis.
➡️The EU isn't banning Bitcoin but using MiCA and other regulations to control it.
This involves stripping away privacy through transaction tracking, mandatory disclosures, and restrictions on self-custody.
The goal is control, not outright prohibition.
Excellent thread by Eli. Eli summarises the EU’s attack on Bitcoin and on Europeans’ rights:
https://x.com/i/web/status/1902048401908261146
Agree 100% with all of this. All these people who have been saying the EU pushing the industry forward with regulations are idiots. They are closing it off and pushing everyone to a CBDC.
Regarding the CBCD, here you will find a comprehensive summary of EU’s CBDC plans, by Efrat Fenigson:
https://bitcoinmagazine.com/politics/ecb-prepping-the-ground-for-digital-euro-launch
*On the 20th of March, the ECB posted the following statement on Twitter:
'The digital euro is not just about creating a new form of money, says Chief Economist Philip R. Lane.
It is about ensuring that Europe retains control over its monetary and financial destiny in the digital age against a backdrop of increasing geopolitical fragmentation.'
“It’s about ensuring that the EU retains control over its citizens.”
There, I fixed it for you if you missed the primary reason.
The Euro is a permissioned, centralized, censorable, inflationary, debt-based currency controlled by unelected bureaucrats.
Bitcoin is permissionless, decentralized, censorship-resistant, fixed in supply, and governed by code—not politicians.
Choose wisely.
➡️As mentioned in last week's Weekly Recap the US Government spends $3.3B per day in interest rate expense. If this doesn’t make you buy Bitcoin I’m not sure what will.
➡️In Kibera, Africa’s largest informal settlement, more than 40 merchants now accept and save in Bitcoin.
➡️The increase in 3-6 month-old UTXOs suggests accumulation during this market correction, a behavior historically critical in forming market bottoms and driving new price rallies.
➡️Just as Hal Finney predicted, Bitcoin will take over Wall Street: Multiple American Bitcoin companies are now seeking to become state or national banks, reports Reuters.
It is inevitable.
➡️Daniel Batten:
2021: 62 US Environmental Organizations write to coCongressaying Bitcoin is bad for the environment and has no use (based on Central Bank misinformation)
2025: US Environmental Organizations debunked (impossible, had they used Bitcoin)
Strange are the ways of karma.
Meanwhile,
➡️President Trump's Executive Director, Bo Hines, on digital assets: "We talked about ways of acquiring more Bitcoin in budget-neutral ways."
We want "as much as we can get."
When Bitcoin is at $200k. We will look back on March 2025 and say, how was everyone not buying. It was so obvious.
On the 19th of March:
➡️BLACKROCK: “The most sophisticated long-term Bitcoin accumulators are pretty excited about this dip. They see the correction as a buying opportunity."
On the 20th of March:
➡️SEC confirms that Bitcoin and Proof of Work mining are NOT securities under US law.
Source: https://t.co/0ExsJniPIf
➡️Bitcoin exchange Kraken has agreed to acquire NinjaTrader, the leading U.S. retail futures trading platform, for $1.5 billion—the largest deal ever of a Bitcoin company buying a traditional financial company.
➡️TRUMP: “I signed an order creating the brand new Strategic Bitcoin Reserve and the US digital asset stockpile which will allow the Federal government to maximize the value of its holdings.”
Tweet and hot take by Lola L33tz
"With the dollar-backed stablecoins, you'll help expand the dominance of the US Dollar [...] It will be at the top, and that's where we want to keep it"
'What he means is:
With dollar-backed stablecoins, the Global South will pivot towards digital Dollars over local currencies, allowing private, US government-controlled entities to replace bank accounts around the globe.
This does not just allow for the expansion of USD dominance by bypassing local governments – it gives the US unprecedented and direct control over worldwide economies as
every stablecoin can be effectively frozen on behalf of the US with the click of a button.'
Stablecoins = CBDCs
There is no technical fundamental difference between them.
It’s almost a guarantee that the EU CBDCs and U.S. stablecoins will be interchangeable.
➡️River: Bitcoin is coming for $128 trillion in global money.
You're not to late to Bitcoin.
On the 21st of March:
➡️Michael Saylor’s Strategy to raise $722.5M to buy more Bitcoin.
➡️Publicly traded Atai Life Sciences to buy $5 million in Bitcoin.
➡️Publicly traded HK Asia Holdings bought 10 Bitcoins worth $858,500 for its balance sheet.
➡️Another solo home miner has mined an entire Bitcoin block worth over $ 260.000,-.
On the 22nd of March:
➡️The University of Wyoming posted a new video explaining Bitcoin with Philosophy Professor Bradley Rettler
➡️Spot Bitcoin ETFs bought 8,775 BTC this week while miners only mined 3,150 Bitcoin.
On the 24th of March:
➡️Metaplanet finished the day as the 13th most liquid stock in Japan, with ¥50.4 billion ($336.6m) of daily trading volume, ahead of Toyota and Nintendo.
➡️River: There is a 275% gap between the inflation you're told and real inflation.
Bitcoin is insurance on the debt spiral. The U.S. Dollar has been devalued by more than 363% since 2000 – That’s a 14.5% devaluation per year. This means if your savings don’t grow by 14.5% annually, you’re falling behind. This is why we Bitcoin. Bitcoin is insurance on the debt spiral, grow your savings beyond the dollar’s devaluation!
➡️Bitcoin's compound annual growth rate (CAGR) over a 5-year rolling window is currently over 50%
➡️Strategy became the first publicly traded company to hold over 500,000 Bitcoin worth over $44 billion.
Strategy has acquired 6,911 BTC for ~$584.1 million at ~$84,529 per Bitcoin and has achieved a BTC Yield of 7.7% YTD 2025. As of 3/23/2025,
Strategy holds 506,137 BTC acquired for ~$33.7 billion at ~$66,608 per Bitcoin.
➡️CryptoQuant: Bitcoin's long-term holders are holding firm, with no significant selling pressure.
➡️Xapo Bank launches Bitcoin-backed USD loans up to $1M, with collateral secured in an MPC vault and no re-usage.
💸Traditional Finance / Macro:
👉🏽no news
🏦Banks:
👉🏽 no news
🌎Macro/Geopolitics:
On the 18th of March:
👉🏽Germany just changed its constitution to unleash a staggering ONE TRILLION in new debt. The German parliament has voted to take on hundreds of billions of euros of new government debt, to ease the debt brake rules, and to codify "climate neutrality by 2045" into the constitution.
On top of that, some extra money to Ukraine:
Germany's next Chancellor, Friedrich Merz, believes that Putin has gone to war against all of Europe. He argues that Russia has attacked Germany, as the Parliament breaks out in applause.
We continue to move further away from the "Europe is not part of the conflict" rhetoric. Germany’s self-inflicted delusion continues!
👉🏽Germany's first offshore wind farm closes after 15 years because it's too expensive to operate. Expect a car crash. The Alpha Ventus offshore wind farm near the German North Sea island of Borkum is set to be dismantled after being in operation for only 15 years. It has become too unprofitable to operate without massive subsidies.
Great thing that the Netherlands is investing heavily in offshore wind farms, even the biggest pension fund APB. Because nInE tImEs ChEaPeR tHaN gAs, right?
I hope they dismantle them & not leave them to rust into the sea. Right? Because climate!
Great response by Jasmine Birtles: "These vanity projects should never have been allowed to start. The phrase 'cheap renewable energy' is simply a falsehood. This kind of energy production only seems cheap because of the huge government subsidies that keep them going. I'm all for clean energy if it's possible to run it honestly and without huge subsidies, but while it doesn't seem to be viable we should stick with what is affordable and will keep the country going, rather than sacrificing the vulnerable to an impossible ideology."
👉🏽'Gold spot is now trading consistently over $3000, a record high. And with deliveries once again picking up at the Comex and war in the Middle East coming back with a vengeance, the next big spike is just a matter of time. As expected, once gold broke out above $3000,- it has gone vertical and is up 1% in the past hours, rising to a new record high of $3034, as it sets off for $4000' - ZeroHedge
👉🏽'We have just witnessed the biggest drop in US equity allocation on record. The collapse of US consumers:
Unemployment expectations in the US are now ABOVE 2020 levels and at their highest since 2008.
In 2024, a poll showed that a whopping 56% of Americans thought the US was in a recession.' - TKL
👉🏽OECD Projects Argentina to Have the Second Highest Economic Growth Worldwide in 2025
👉🏽A new blow to the Dutch chemical sector. The major producer LyondellBasell is permanently closing its factory at the Maasvlakte. This decision, announced on Tuesday afternoon, will result in the loss of approximately 160 jobs. The closure is a direct consequence of global overcapacity and high energy costs in the Netherlands.
An audit by the German firm E-Bridge, commissioned by the Dutch government, previously revealed that electricity costs for these companies in the Netherlands amount to €95 per megawatt-hour.
In comparison, this rate is €32 in France (66% lower), €45.60 in Germany (52% lower), and €56.05 per megawatt-hour in Belgium (41% lower).
According to E-Bridge, this difference is mainly due to the compensation that foreign governments provide to companies and the lower grid tariffs. In the Netherlands, costs have risen primarily to finance investments in the electricity grid, such as connecting multiple offshore wind farms.
Now read that segment on offshore wind farms. Mindblowing, innit?
Subsidies are not the solution—deregulation is. But Brussels won’t allow that. So, we’re heading toward even more regulation and nationalization.
On the 19th of March:
👉🏽The Fed makes multiple revisions to its 2025 economic data projections.
Powell finally found the "stag" and the "inflation":
Fed cuts year-end GDP forecast from 2.1% to 1.7%
Fed raises year-end core PCE forecast from 2.5% to 2.8%
Fed raises year-end unemployment forecast from 4.3% to 4.4%
Fed raises PCE inflation forecast from 2.5% to 2.7%
The Fed sees higher inflation and a weaker economy.
On the 20th of March:
Dutch Central Bank Director Klaas Knot "We are worried about American influence on our local payment infrastructure."
Paving the way for the European CBDC (after slowly but surely removing CASH MONEY from society).
Knot has completed his second term and will leave his office in July. Now, of course, pushing for the CBDC, before looking for a new job in Europe.
Anyway, DNB posts billions in losses.
De Nederlandsche Bank suffered a loss of over €3 billion last year, according to the annual report published on Thursday. This marks the second consecutive year of losses.
DNB incurs this loss because, as part of its monetary policy, it has lent out billions at relatively low rates while having to pay a higher rate to banks that park their money at the central bank.
But no losses on its gold. The gold reserves, meanwhile, increased in value by €12.6 billion. This amount is not included in the official profit and loss statement but is reflected on the bank's balance sheet.
For the Dutch readers/followers: Great article: Follow the Money 'Voor de megawinsten van ING, ABN Amro en Rabobank betaalt de Nederlandse burger een hoge prijs.'
https://archive.ph/ncvtk
On the 21st of March:
👉🏽'The Philadelphia Fed Manufacturing index dropped 5.6 points in March, to 12.5, its 2nd consecutive monthly decline.
6-month outlook for new orders fell by 30.8 points, to 2.3, the lowest in 3 years.
This marks the third-largest drop in history, only behind the 2008 Financial Crisis and December 1973.
Furthermore, 6-month business outlook dropped ~40 points to its lowest since January 2024.
All while prices paid rose 7.8 points, to 48.3, the highest since July 2022.
This is further evidence of weakening economic activity with rising prices.' TKL
👉🏽'China’s central bank gold reserves hit a record 73.6 million fine troy ounces in February.
China bought ~160,000 ounces of gold last month, posting their 4th consecutive monthly purchase.
Over the last 2.5 years, China’s gold reserves have jumped by 11.0 million ounces of gold.
Gold now reflects a record ~5.9% of China’s total foreign exchange reserves, or 2,290 tonnes.
Central banks continue to stock up on gold as if we are in a crisis.' -TKL
🎁If you have made it this far I would like to give you a little gift:
What Bitcoin Did: BITCOIN & THE END OF THE DOLLAR SYSTEM with Luke Gromen
They discuss:
-
The Sovereign Debt Crisis
-
If the US Will Reprice the Gold
-
If we will See Triple Digit Inflation
-
The End of The US Dollar System
Luke Gromen: A modest clarification: The end of the post-71 structure of the USD system is what the Trump Administration’s actions appear to be pursuing & will in due time achieve if they stay on the present course.
https://www.youtube.com/watch?v=0W2jEedynbc
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly.
Use the code SE3997
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple. ⠀⠀
⠀⠀ ⠀ ⠀⠀⠀
Do you think this post is helpful to you? If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
-
@ 3c7dc2c5:805642a8
2025-03-26 21:49:02🧠Quote(s) of the week:
The path to maximalism is littered with mistakes and paved with humility.' Anilsaido
Bitcoin is time because money itself is time.
Money is humanity’s battery: a way to store energy, labor, and resources for the future. It captures your past effort and preserves it for when you need it most. Fiat leaks. Bitcoin holds.
🧡Bitcoin news🧡
On the 18th of March:
➡️After ruling out a strategic bitcoin reserve, the Bank of Korea will launch a central bank digital currency pilot in April, per The Korea Times.
➡️'Metaplanet has acquired an additional 150 BTC for ~$12.5 million, achieving a BTC Yield of 60.8% YTD in 2025.
As of 3/18/2025, Metaplanet hodls 3,200 BTC, and is now a top 10 publicly listed holder of Bitcoin globally.' -Dylan LeClair
➡️Bitcoin entered a risk-off, distribution-dominant phase in early 2025, evidenced by frequent selling and hesitation to buy (yellow to orange dots). - AMB Crypto
➡️Bitwise CIO says Bitcoin should be at $200,000 today and says, “I think the number of companies buying Bitcoin is going to triple this year, I think Game Theory is on.”
“I think countries around the world are going to be buying Bitcoin. There is structurally more demand than supply in Bitcoin.”
➡️Bitcoin mining company Bitfarms buys Stronghold Digital for more than $110 million, making it the largest public-to-public acquisition in Bitcoin industry history.
➡️Bitcoin long-term HODLers become net buyers for the first time since September, per Compass Point Research.
"Buying/selling from HODLers is typically a leading indicator for BTC.
This cohort now owns 65% of BTC supply vs 63% last week vs 73% in early October." - Bitcoin News
➡️GlassNode: 'The Bitcoin market continues to adjust to its new price range after experiencing a -30% correction. Liquidity conditions are also contracting in both on-chain and futures markets.'
➡️Bitcoin now ranks 6th among the world's top monetary assets at $1.62 trillion, per Porkopolis.
➡️The EU isn't banning Bitcoin but using MiCA and other regulations to control it.
This involves stripping away privacy through transaction tracking, mandatory disclosures, and restrictions on self-custody.
The goal is control, not outright prohibition.
Excellent thread by Eli. Eli summarises the EU’s attack on Bitcoin and on Europeans’ rights:
https://x.com/i/web/status/1902048401908261146
Agree 100% with all of this. All these people who have been saying the EU pushing the industry forward with regulations are idiots. They are closing it off and pushing everyone to a CBDC.
Regarding the CBCD, here you will find a comprehensive summary of EU’s CBDC plans, by Efrat Fenigson:
https://bitcoinmagazine.com/politics/ecb-prepping-the-ground-for-digital-euro-launch
*On the 20th of March, the ECB posted the following statement on Twitter:
'The digital euro is not just about creating a new form of money, says Chief Economist Philip R. Lane.
It is about ensuring that Europe retains control over its monetary and financial destiny in the digital age against a backdrop of increasing geopolitical fragmentation.'
“It’s about ensuring that the EU retains control over its citizens.”
There, I fixed it for you if you missed the primary reason.
The Euro is a permissioned, centralized, censorable, inflationary, debt-based currency controlled by unelected bureaucrats.
Bitcoin is permissionless, decentralized, censorship-resistant, fixed in supply, and governed by code—not politicians.
Choose wisely.
➡️As mentioned in last week's Weekly Recap the US Government spends $3.3B per day in interest rate expense. If this doesn’t make you buy Bitcoin I’m not sure what will.
➡️In Kibera, Africa’s largest informal settlement, more than 40 merchants now accept and save in Bitcoin.
➡️The increase in 3-6 month-old UTXOs suggests accumulation during this market correction, a behavior historically critical in forming market bottoms and driving new price rallies.
➡️Just as Hal Finney predicted, Bitcoin will take over Wall Street: Multiple American Bitcoin companies are now seeking to become state or national banks, reports Reuters.
It is inevitable.
➡️Daniel Batten:
2021: 62 US Environmental Organizations write to coCongressaying Bitcoin is bad for the environment and has no use (based on Central Bank misinformation)
2025: US Environmental Organizations debunked (impossible, had they used Bitcoin)
Strange are the ways of karma.
Meanwhile,
➡️President Trump's Executive Director, Bo Hines, on digital assets: "We talked about ways of acquiring more Bitcoin in budget-neutral ways."
We want "as much as we can get."
When Bitcoin is at $200k. We will look back on March 2025 and say, how was everyone not buying. It was so obvious.
On the 19th of March:
➡️BLACKROCK: “The most sophisticated long-term Bitcoin accumulators are pretty excited about this dip. They see the correction as a buying opportunity."
On the 20th of March:
➡️SEC confirms that Bitcoin and Proof of Work mining are NOT securities under US law.
Source: https://t.co/0ExsJniPIf
➡️Bitcoin exchange Kraken has agreed to acquire NinjaTrader, the leading U.S. retail futures trading platform, for $1.5 billion—the largest deal ever of a Bitcoin company buying a traditional financial company.
➡️TRUMP: “I signed an order creating the brand new Strategic Bitcoin Reserve and the US digital asset stockpile which will allow the Federal government to maximize the value of its holdings.”
Tweet and hot take by Lola L33tz
"With the dollar-backed stablecoins, you'll help expand the dominance of the US Dollar [...] It will be at the top, and that's where we want to keep it"
'What he means is:
With dollar-backed stablecoins, the Global South will pivot towards digital Dollars over local currencies, allowing private, US government-controlled entities to replace bank accounts around the globe.
This does not just allow for the expansion of USD dominance by bypassing local governments – it gives the US unprecedented and direct control over worldwide economies as
every stablecoin can be effectively frozen on behalf of the US with the click of a button.'
Stablecoins = CBDCs
There is no technical fundamental difference between them.
It’s almost a guarantee that the EU CBDCs and U.S. stablecoins will be interchangeable.
➡️River: Bitcoin is coming for $128 trillion in global money.
You're not to late to Bitcoin.
On the 21st of March:
➡️Michael Saylor’s Strategy to raise $722.5M to buy more Bitcoin.
➡️Publicly traded Atai Life Sciences to buy $5 million in Bitcoin.
➡️Publicly traded HK Asia Holdings bought 10 Bitcoins worth $858,500 for its balance sheet.
➡️Another solo home miner has mined an entire Bitcoin block worth over $ 260.000,-.
On the 22nd of March:
➡️The University of Wyoming posted a new video explaining Bitcoin with Philosophy Professor Bradley Rettler
➡️Spot Bitcoin ETFs bought 8,775 BTC this week while miners only mined 3,150 Bitcoin.
On the 24th of March:
➡️Metaplanet finished the day as the 13th most liquid stock in Japan, with ¥50.4 billion ($336.6m) of daily trading volume, ahead of Toyota and Nintendo.
➡️River: There is a 275% gap between the inflation you're told and real inflation.
Bitcoin is insurance on the debt spiral. The U.S. Dollar has been devalued by more than 363% since 2000 – That’s a 14.5% devaluation per year. This means if your savings don’t grow by 14.5% annually, you’re falling behind. This is why we Bitcoin. Bitcoin is insurance on the debt spiral, grow your savings beyond the dollar’s devaluation!
➡️Bitcoin's compound annual growth rate (CAGR) over a 5-year rolling window is currently over 50%
➡️Strategy became the first publicly traded company to hold over 500,000 Bitcoin worth over $44 billion.
Strategy has acquired 6,911 BTC for ~$584.1 million at ~$84,529 per Bitcoin and has achieved a BTC Yield of 7.7% YTD 2025. As of 3/23/2025,
Strategy holds 506,137 BTC acquired for ~$33.7 billion at ~$66,608 per Bitcoin.
➡️CryptoQuant: Bitcoin's long-term holders are holding firm, with no significant selling pressure.
➡️Xapo Bank launches Bitcoin-backed USD loans up to $1M, with collateral secured in an MPC vault and no re-usage.
💸Traditional Finance / Macro:
👉🏽no news
🏦Banks:
👉🏽 no news
🌎Macro/Geopolitics:
On the 18th of March:
👉🏽Germany just changed its constitution to unleash a staggering ONE TRILLION in new debt. The German parliament has voted to take on hundreds of billions of euros of new government debt, to ease the debt brake rules, and to codify "climate neutrality by 2045" into the constitution.
On top of that, some extra money to Ukraine:
Germany's next Chancellor, Friedrich Merz, believes that Putin has gone to war against all of Europe. He argues that Russia has attacked Germany, as the Parliament breaks out in applause.
We continue to move further away from the "Europe is not part of the conflict" rhetoric. Germany’s self-inflicted delusion continues!
👉🏽Germany's first offshore wind farm closes after 15 years because it's too expensive to operate. Expect a car crash. The Alpha Ventus offshore wind farm near the German North Sea island of Borkum is set to be dismantled after being in operation for only 15 years. It has become too unprofitable to operate without massive subsidies.
Great thing that the Netherlands is investing heavily in offshore wind farms, even the biggest pension fund APB. Because nInE tImEs ChEaPeR tHaN gAs, right?
I hope they dismantle them & not leave them to rust into the sea. Right? Because climate!
Great response by Jasmine Birtles: "These vanity projects should never have been allowed to start. The phrase 'cheap renewable energy' is simply a falsehood. This kind of energy production only seems cheap because of the huge government subsidies that keep them going. I'm all for clean energy if it's possible to run it honestly and without huge subsidies, but while it doesn't seem to be viable we should stick with what is affordable and will keep the country going, rather than sacrificing the vulnerable to an impossible ideology."
👉🏽'Gold spot is now trading consistently over $3000, a record high. And with deliveries once again picking up at the Comex and war in the Middle East coming back with a vengeance, the next big spike is just a matter of time. As expected, once gold broke out above $3000,- it has gone vertical and is up 1% in the past hours, rising to a new record high of $3034, as it sets off for $4000' - ZeroHedge
👉🏽'We have just witnessed the biggest drop in US equity allocation on record. The collapse of US consumers:
Unemployment expectations in the US are now ABOVE 2020 levels and at their highest since 2008.
In 2024, a poll showed that a whopping 56% of Americans thought the US was in a recession.' - TKL
👉🏽OECD Projects Argentina to Have the Second Highest Economic Growth Worldwide in 2025
👉🏽A new blow to the Dutch chemical sector. The major producer LyondellBasell is permanently closing its factory at the Maasvlakte. This decision, announced on Tuesday afternoon, will result in the loss of approximately 160 jobs. The closure is a direct consequence of global overcapacity and high energy costs in the Netherlands.
An audit by the German firm E-Bridge, commissioned by the Dutch government, previously revealed that electricity costs for these companies in the Netherlands amount to €95 per megawatt-hour.
In comparison, this rate is €32 in France (66% lower), €45.60 in Germany (52% lower), and €56.05 per megawatt-hour in Belgium (41% lower).
According to E-Bridge, this difference is mainly due to the compensation that foreign governments provide to companies and the lower grid tariffs. In the Netherlands, costs have risen primarily to finance investments in the electricity grid, such as connecting multiple offshore wind farms.
Now read that segment on offshore wind farms. Mindblowing, innit?
Subsidies are not the solution—deregulation is. But Brussels won’t allow that. So, we’re heading toward even more regulation and nationalization.
On the 19th of March:
👉🏽The Fed makes multiple revisions to its 2025 economic data projections.
Powell finally found the "stag" and the "inflation":
Fed cuts year-end GDP forecast from 2.1% to 1.7%
Fed raises year-end core PCE forecast from 2.5% to 2.8%
Fed raises year-end unemployment forecast from 4.3% to 4.4%
Fed raises PCE inflation forecast from 2.5% to 2.7%
The Fed sees higher inflation and a weaker economy.
On the 20th of March:
Dutch Central Bank Director Klaas Knot "We are worried about American influence on our local payment infrastructure."
Paving the way for the European CBDC (after slowly but surely removing CASH MONEY from society).
Knot has completed his second term and will leave his office in July. Now, of course, pushing for the CBDC, before looking for a new job in Europe.
Anyway, DNB posts billions in losses.
De Nederlandsche Bank suffered a loss of over €3 billion last year, according to the annual report published on Thursday. This marks the second consecutive year of losses.
DNB incurs this loss because, as part of its monetary policy, it has lent out billions at relatively low rates while having to pay a higher rate to banks that park their money at the central bank.
But no losses on its gold. The gold reserves, meanwhile, increased in value by €12.6 billion. This amount is not included in the official profit and loss statement but is reflected on the bank's balance sheet.
For the Dutch readers/followers: Great article: Follow the Money 'Voor de megawinsten van ING, ABN Amro en Rabobank betaalt de Nederlandse burger een hoge prijs.'
https://archive.ph/ncvtk
On the 21st of March:
👉🏽'The Philadelphia Fed Manufacturing index dropped 5.6 points in March, to 12.5, its 2nd consecutive monthly decline.
6-month outlook for new orders fell by 30.8 points, to 2.3, the lowest in 3 years.
This marks the third-largest drop in history, only behind the 2008 Financial Crisis and December 1973.
Furthermore, 6-month business outlook dropped ~40 points to its lowest since January 2024.
All while prices paid rose 7.8 points, to 48.3, the highest since July 2022.
This is further evidence of weakening economic activity with rising prices.' TKL
👉🏽'China’s central bank gold reserves hit a record 73.6 million fine troy ounces in February.
China bought ~160,000 ounces of gold last month, posting their 4th consecutive monthly purchase.
Over the last 2.5 years, China’s gold reserves have jumped by 11.0 million ounces of gold.
Gold now reflects a record ~5.9% of China’s total foreign exchange reserves, or 2,290 tonnes.
Central banks continue to stock up on gold as if we are in a crisis.' -TKL
🎁If you have made it this far I would like to give you a little gift:
What Bitcoin Did: BITCOIN & THE END OF THE DOLLAR SYSTEM with Luke Gromen
They discuss:
-
The Sovereign Debt Crisis
-
If the US Will Reprice the Gold
-
If we will See Triple Digit Inflation
-
The End of The US Dollar System
Luke Gromen: A modest clarification: The end of the post-71 structure of the USD system is what the Trump Administration’s actions appear to be pursuing & will in due time achieve if they stay on the present course.
https://www.youtube.com/watch?v=0W2jEedynbc
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly.
Use the code SE3997
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple. ⠀⠀
⠀⠀ ⠀ ⠀⠀⠀
Do you think this post is helpful to you? If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
-
@ 3c7dc2c5:805642a8
2025-03-26 21:48:58🧠Quote(s) of the week:
The path to maximalism is littered with mistakes and paved with humility.' Anilsaido
Bitcoin is time because money itself is time.
Money is humanity’s battery: a way to store energy, labor, and resources for the future. It captures your past effort and preserves it for when you need it most. Fiat leaks. Bitcoin holds.
🧡Bitcoin news🧡
On the 18th of March:
➡️After ruling out a strategic bitcoin reserve, the Bank of Korea will launch a central bank digital currency pilot in April, per The Korea Times.
➡️'Metaplanet has acquired an additional 150 BTC for ~$12.5 million, achieving a BTC Yield of 60.8% YTD in 2025.
As of 3/18/2025, Metaplanet hodls 3,200 BTC, and is now a top 10 publicly listed holder of Bitcoin globally.' -Dylan LeClair
➡️Bitcoin entered a risk-off, distribution-dominant phase in early 2025, evidenced by frequent selling and hesitation to buy (yellow to orange dots). - AMB Crypto
➡️Bitwise CIO says Bitcoin should be at $200,000 today and says, “I think the number of companies buying Bitcoin is going to triple this year, I think Game Theory is on.”
“I think countries around the world are going to be buying Bitcoin. There is structurally more demand than supply in Bitcoin.”
➡️Bitcoin mining company Bitfarms buys Stronghold Digital for more than $110 million, making it the largest public-to-public acquisition in Bitcoin industry history.
➡️Bitcoin long-term HODLers become net buyers for the first time since September, per Compass Point Research.
"Buying/selling from HODLers is typically a leading indicator for BTC.
This cohort now owns 65% of BTC supply vs 63% last week vs 73% in early October." - Bitcoin News
➡️GlassNode: 'The Bitcoin market continues to adjust to its new price range after experiencing a -30% correction. Liquidity conditions are also contracting in both on-chain and futures markets.'
➡️Bitcoin now ranks 6th among the world's top monetary assets at $1.62 trillion, per Porkopolis.
➡️The EU isn't banning Bitcoin but using MiCA and other regulations to control it.
This involves stripping away privacy through transaction tracking, mandatory disclosures, and restrictions on self-custody.
The goal is control, not outright prohibition.
Excellent thread by Eli. Eli summarises the EU’s attack on Bitcoin and on Europeans’ rights:
https://x.com/i/web/status/1902048401908261146
Agree 100% with all of this. All these people who have been saying the EU pushing the industry forward with regulations are idiots. They are closing it off and pushing everyone to a CBDC.
Regarding the CBCD, here you will find a comprehensive summary of EU’s CBDC plans, by Efrat Fenigson:
https://bitcoinmagazine.com/politics/ecb-prepping-the-ground-for-digital-euro-launch
*On the 20th of March, the ECB posted the following statement on Twitter:
'The digital euro is not just about creating a new form of money, says Chief Economist Philip R. Lane.
It is about ensuring that Europe retains control over its monetary and financial destiny in the digital age against a backdrop of increasing geopolitical fragmentation.'
“It’s about ensuring that the EU retains control over its citizens.”
There, I fixed it for you if you missed the primary reason.
The Euro is a permissioned, centralized, censorable, inflationary, debt-based currency controlled by unelected bureaucrats.
Bitcoin is permissionless, decentralized, censorship-resistant, fixed in supply, and governed by code—not politicians.
Choose wisely.
➡️As mentioned in last week's Weekly Recap the US Government spends $3.3B per day in interest rate expense. If this doesn’t make you buy Bitcoin I’m not sure what will.
➡️In Kibera, Africa’s largest informal settlement, more than 40 merchants now accept and save in Bitcoin.
➡️The increase in 3-6 month-old UTXOs suggests accumulation during this market correction, a behavior historically critical in forming market bottoms and driving new price rallies.
➡️Just as Hal Finney predicted, Bitcoin will take over Wall Street: Multiple American Bitcoin companies are now seeking to become state or national banks, reports Reuters.
It is inevitable.
➡️Daniel Batten:
2021: 62 US Environmental Organizations write to coCongressaying Bitcoin is bad for the environment and has no use (based on Central Bank misinformation)
2025: US Environmental Organizations debunked (impossible, had they used Bitcoin)
Strange are the ways of karma.
Meanwhile,
➡️President Trump's Executive Director, Bo Hines, on digital assets: "We talked about ways of acquiring more Bitcoin in budget-neutral ways."
We want "as much as we can get."
When Bitcoin is at $200k. We will look back on March 2025 and say, how was everyone not buying. It was so obvious.
On the 19th of March:
➡️BLACKROCK: “The most sophisticated long-term Bitcoin accumulators are pretty excited about this dip. They see the correction as a buying opportunity."
On the 20th of March:
➡️SEC confirms that Bitcoin and Proof of Work mining are NOT securities under US law.
Source: https://t.co/0ExsJniPIf
➡️Bitcoin exchange Kraken has agreed to acquire NinjaTrader, the leading U.S. retail futures trading platform, for $1.5 billion—the largest deal ever of a Bitcoin company buying a traditional financial company.
➡️TRUMP: “I signed an order creating the brand new Strategic Bitcoin Reserve and the US digital asset stockpile which will allow the Federal government to maximize the value of its holdings.”
Tweet and hot take by Lola L33tz
"With the dollar-backed stablecoins, you'll help expand the dominance of the US Dollar [...] It will be at the top, and that's where we want to keep it"
'What he means is:
With dollar-backed stablecoins, the Global South will pivot towards digital Dollars over local currencies, allowing private, US government-controlled entities to replace bank accounts around the globe.
This does not just allow for the expansion of USD dominance by bypassing local governments – it gives the US unprecedented and direct control over worldwide economies as
every stablecoin can be effectively frozen on behalf of the US with the click of a button.'
Stablecoins = CBDCs
There is no technical fundamental difference between them.
It’s almost a guarantee that the EU CBDCs and U.S. stablecoins will be interchangeable.
➡️River: Bitcoin is coming for $128 trillion in global money.
You're not to late to Bitcoin.
On the 21st of March:
➡️Michael Saylor’s Strategy to raise $722.5M to buy more Bitcoin.
➡️Publicly traded Atai Life Sciences to buy $5 million in Bitcoin.
➡️Publicly traded HK Asia Holdings bought 10 Bitcoins worth $858,500 for its balance sheet.
➡️Another solo home miner has mined an entire Bitcoin block worth over $ 260.000,-.
On the 22nd of March:
➡️The University of Wyoming posted a new video explaining Bitcoin with Philosophy Professor Bradley Rettler
➡️Spot Bitcoin ETFs bought 8,775 BTC this week while miners only mined 3,150 Bitcoin.
On the 24th of March:
➡️Metaplanet finished the day as the 13th most liquid stock in Japan, with ¥50.4 billion ($336.6m) of daily trading volume, ahead of Toyota and Nintendo.
➡️River: There is a 275% gap between the inflation you're told and real inflation.
Bitcoin is insurance on the debt spiral. The U.S. Dollar has been devalued by more than 363% since 2000 – That’s a 14.5% devaluation per year. This means if your savings don’t grow by 14.5% annually, you’re falling behind. This is why we Bitcoin. Bitcoin is insurance on the debt spiral, grow your savings beyond the dollar’s devaluation!
➡️Bitcoin's compound annual growth rate (CAGR) over a 5-year rolling window is currently over 50%
➡️Strategy became the first publicly traded company to hold over 500,000 Bitcoin worth over $44 billion.
Strategy has acquired 6,911 BTC for ~$584.1 million at ~$84,529 per Bitcoin and has achieved a BTC Yield of 7.7% YTD 2025. As of 3/23/2025,
Strategy holds 506,137 BTC acquired for ~$33.7 billion at ~$66,608 per Bitcoin.
➡️CryptoQuant: Bitcoin's long-term holders are holding firm, with no significant selling pressure.
➡️Xapo Bank launches Bitcoin-backed USD loans up to $1M, with collateral secured in an MPC vault and no re-usage.
💸Traditional Finance / Macro:
👉🏽no news
🏦Banks:
👉🏽 no news
🌎Macro/Geopolitics:
On the 18th of March:
👉🏽Germany just changed its constitution to unleash a staggering ONE TRILLION in new debt. The German parliament has voted to take on hundreds of billions of euros of new government debt, to ease the debt brake rules, and to codify "climate neutrality by 2045" into the constitution.
On top of that, some extra money to Ukraine:
Germany's next Chancellor, Friedrich Merz, believes that Putin has gone to war against all of Europe. He argues that Russia has attacked Germany, as the Parliament breaks out in applause.
We continue to move further away from the "Europe is not part of the conflict" rhetoric. Germany’s self-inflicted delusion continues!
👉🏽Germany's first offshore wind farm closes after 15 years because it's too expensive to operate. Expect a car crash. The Alpha Ventus offshore wind farm near the German North Sea island of Borkum is set to be dismantled after being in operation for only 15 years. It has become too unprofitable to operate without massive subsidies.
Great thing that the Netherlands is investing heavily in offshore wind farms, even the biggest pension fund APB. Because nInE tImEs ChEaPeR tHaN gAs, right?
I hope they dismantle them & not leave them to rust into the sea. Right? Because climate!
Great response by Jasmine Birtles: "These vanity projects should never have been allowed to start. The phrase 'cheap renewable energy' is simply a falsehood. This kind of energy production only seems cheap because of the huge government subsidies that keep them going. I'm all for clean energy if it's possible to run it honestly and without huge subsidies, but while it doesn't seem to be viable we should stick with what is affordable and will keep the country going, rather than sacrificing the vulnerable to an impossible ideology."
👉🏽'Gold spot is now trading consistently over $3000, a record high. And with deliveries once again picking up at the Comex and war in the Middle East coming back with a vengeance, the next big spike is just a matter of time. As expected, once gold broke out above $3000,- it has gone vertical and is up 1% in the past hours, rising to a new record high of $3034, as it sets off for $4000' - ZeroHedge
👉🏽'We have just witnessed the biggest drop in US equity allocation on record. The collapse of US consumers:
Unemployment expectations in the US are now ABOVE 2020 levels and at their highest since 2008.
In 2024, a poll showed that a whopping 56% of Americans thought the US was in a recession.' - TKL
👉🏽OECD Projects Argentina to Have the Second Highest Economic Growth Worldwide in 2025
👉🏽A new blow to the Dutch chemical sector. The major producer LyondellBasell is permanently closing its factory at the Maasvlakte. This decision, announced on Tuesday afternoon, will result in the loss of approximately 160 jobs. The closure is a direct consequence of global overcapacity and high energy costs in the Netherlands.
An audit by the German firm E-Bridge, commissioned by the Dutch government, previously revealed that electricity costs for these companies in the Netherlands amount to €95 per megawatt-hour.
In comparison, this rate is €32 in France (66% lower), €45.60 in Germany (52% lower), and €56.05 per megawatt-hour in Belgium (41% lower).
According to E-Bridge, this difference is mainly due to the compensation that foreign governments provide to companies and the lower grid tariffs. In the Netherlands, costs have risen primarily to finance investments in the electricity grid, such as connecting multiple offshore wind farms.
Now read that segment on offshore wind farms. Mindblowing, innit?
Subsidies are not the solution—deregulation is. But Brussels won’t allow that. So, we’re heading toward even more regulation and nationalization.
On the 19th of March:
👉🏽The Fed makes multiple revisions to its 2025 economic data projections.
Powell finally found the "stag" and the "inflation":
Fed cuts year-end GDP forecast from 2.1% to 1.7%
Fed raises year-end core PCE forecast from 2.5% to 2.8%
Fed raises year-end unemployment forecast from 4.3% to 4.4%
Fed raises PCE inflation forecast from 2.5% to 2.7%
The Fed sees higher inflation and a weaker economy.
On the 20th of March:
Dutch Central Bank Director Klaas Knot "We are worried about American influence on our local payment infrastructure."
Paving the way for the European CBDC (after slowly but surely removing CASH MONEY from society).
Knot has completed his second term and will leave his office in July. Now, of course, pushing for the CBDC, before looking for a new job in Europe.
Anyway, DNB posts billions in losses.
De Nederlandsche Bank suffered a loss of over €3 billion last year, according to the annual report published on Thursday. This marks the second consecutive year of losses.
DNB incurs this loss because, as part of its monetary policy, it has lent out billions at relatively low rates while having to pay a higher rate to banks that park their money at the central bank.
But no losses on its gold. The gold reserves, meanwhile, increased in value by €12.6 billion. This amount is not included in the official profit and loss statement but is reflected on the bank's balance sheet.
For the Dutch readers/followers: Great article: Follow the Money 'Voor de megawinsten van ING, ABN Amro en Rabobank betaalt de Nederlandse burger een hoge prijs.'
https://archive.ph/ncvtk
On the 21st of March:
👉🏽'The Philadelphia Fed Manufacturing index dropped 5.6 points in March, to 12.5, its 2nd consecutive monthly decline.
6-month outlook for new orders fell by 30.8 points, to 2.3, the lowest in 3 years.
This marks the third-largest drop in history, only behind the 2008 Financial Crisis and December 1973.
Furthermore, 6-month business outlook dropped ~40 points to its lowest since January 2024.
All while prices paid rose 7.8 points, to 48.3, the highest since July 2022.
This is further evidence of weakening economic activity with rising prices.' TKL
👉🏽'China’s central bank gold reserves hit a record 73.6 million fine troy ounces in February.
China bought ~160,000 ounces of gold last month, posting their 4th consecutive monthly purchase.
Over the last 2.5 years, China’s gold reserves have jumped by 11.0 million ounces of gold.
Gold now reflects a record ~5.9% of China’s total foreign exchange reserves, or 2,290 tonnes.
Central banks continue to stock up on gold as if we are in a crisis.' -TKL
🎁If you have made it this far I would like to give you a little gift:
What Bitcoin Did: BITCOIN & THE END OF THE DOLLAR SYSTEM with Luke Gromen
They discuss:
-
The Sovereign Debt Crisis
-
If the US Will Reprice the Gold
-
If we will See Triple Digit Inflation
-
The End of The US Dollar System
Luke Gromen: A modest clarification: The end of the post-71 structure of the USD system is what the Trump Administration’s actions appear to be pursuing & will in due time achieve if they stay on the present course.
https://www.youtube.com/watch?v=0W2jEedynbc
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly.
Use the code SE3997
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple. ⠀⠀
⠀⠀ ⠀ ⠀⠀⠀
Do you think this post is helpful to you? If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
-
@ 3c7dc2c5:805642a8
2025-03-26 21:41:05🧠Quote(s) of the week:
The path to maximalism is littered with mistakes and paved with humility.' Anilsaido https://i.ibb.co/ZzcCHwgT/Gip-G0vdb-YAAV9-Mw-1.jpg
Bitcoin is time because money itself is time. Money is humanity’s battery: a way to store energy, labor, and resources for the future. It captures your past effort and preserves it for when you need it most. Fiat leaks. Bitcoin holds.
🧡Bitcoin news🧡
On the 18th of March:
➡️After ruling out a strategic bitcoin reserve, the Bank of Korea will launch a central bank digital currency pilot in April, per The Korea Times.
➡️'Metaplanet has acquired an additional 150 BTC for ~$12.5 million, achieving a BTC Yield of 60.8% YTD in 2025. As of 3/18/2025, Metaplanet hodls 3,200 BTC, and is now a top 10 publicly listed holder of Bitcoin globally.' -Dylan LeClair
➡️Bitcoin entered a risk-off, distribution-dominant phase in early 2025, evidenced by frequent selling and hesitation to buy (yellow to orange dots). - AMB Crypto
➡️Bitwise CIO says Bitcoin should be at $200,000 today and says, “I think the number of companies buying Bitcoin is going to triple this year, I think Game Theory is on.” “I think countries around the world are going to be buying Bitcoin. There is structurally more demand than supply in Bitcoin.”
➡️Bitcoin mining company Bitfarms buys Stronghold Digital for more than $110 million, making it the largest public-to-public acquisition in Bitcoin industry history.
➡️Bitcoin long-term HODLers become net buyers for the first time since September, per Compass Point Research. "Buying/selling from HODLers is typically a leading indicator for BTC. This cohort now owns 65% of BTC supply vs 63% last week vs 73% in early October." - Bitcoin News
➡️GlassNode: 'The Bitcoin market continues to adjust to its new price range after experiencing a -30% correction. Liquidity conditions are also contracting in both on-chain and futures markets.'
➡️Bitcoin now ranks 6th among the world's top monetary assets at $1.62 trillion, per Porkopolis.
➡️The EU isn't banning Bitcoin but using MiCA and other regulations to control it. This involves stripping away privacy through transaction tracking, mandatory disclosures, and restrictions on self-custody. The goal is control, not outright prohibition.
Excellent thread by Eli. Eli summarises the EU’s attack on Bitcoin and on Europeans’ rights: https://x.com/EliNagarBrr/status/1902048401908261146
Agree 100% with all of this. All these people who have been saying the EU pushing the industry forward with regulations are idiots. They are closing it off and pushing everyone to a CBDC.
Regarding the CBCD, here you will find a comprehensive summary of EU’s CBDC plans, by Efrat Fenigson: https://bitcoinmagazine.com/politics/ecb-prepping-the-ground-for-digital-euro-launch
*On the 20th of March, the ECB posted the following statement on Twitter:
'The digital euro is not just about creating a new form of money, says Chief Economist Philip R. Lane. It is about ensuring that Europe retains control over its monetary and financial destiny in the digital age against a backdrop of increasing geopolitical fragmentation.'
“It’s about ensuring that the EU retains control over its citizens.”
There, I fixed it for you if you missed the primary reason.
The Euro is a permissioned, centralized, censorable, inflationary, debt-based currency controlled by unelected bureaucrats.
Bitcoin is permissionless, decentralized, censorship-resistant, fixed in supply, and governed by code—not politicians.
Choose wisely.
➡️As mentioned in last week's Weekly Recap the US Government spends $3.3B per day in interest rate expense. If this doesn’t make you buy Bitcoin I’m not sure what will. https://i.ibb.co/sdt1GvfM/Gm-Vd-FBz-XQAA3t3-M-1.jpg
➡️In Kibera, Africa’s largest informal settlement, more than 40 merchants now accept and save in Bitcoin.
➡️The increase in 3-6 month-old UTXOs suggests accumulation during this market correction, a behavior historically critical in forming market bottoms and driving new price rallies.
➡️Just as Hal Finney predicted, Bitcoin will take over Wall Street: Multiple American Bitcoin companies are now seeking to become state or national banks, reports Reuters. It is inevitable.
➡️Daniel Batten: 2021: 62 US Environmental Organizations write to coCongressaying Bitcoin is bad for the environment and has no use (based on Central Bank misinformation) 2025: US Environmental Organizations debunked (impossible, had they used Bitcoin) Strange are the ways of karma.
Meanwhile,
➡️President Trump's Executive Director, Bo Hines, on digital assets: "We talked about ways of acquiring more Bitcoin in budget-neutral ways." We want "as much as we can get."
When Bitcoin is at $200k. We will look back on March 2025 and say, how was everyone not buying. It was so obvious.
On the 19th of March:
➡️BLACKROCK: “The most sophisticated long-term Bitcoin accumulators are pretty excited about this dip. They see the correction as a buying opportunity."
On the 20th of March:
➡️SEC confirms that Bitcoin and Proof of Work mining are NOT securities under US law. https://i.ibb.co/nWRHjnk/Gmg-Yxv-QWEAAgwx8.png
Source: https://t.co/0ExsJniPIf
➡️Bitcoin exchange Kraken has agreed to acquire NinjaTrader, the leading U.S. retail futures trading platform, for $1.5 billion—the largest deal ever of a Bitcoin company buying a traditional financial company.
➡️TRUMP: “I signed an order creating the brand new Strategic Bitcoin Reserve and the US digital asset stockpile which will allow the Federal government to maximize the value of its holdings.”
Tweet and hot take by Lola L33tz
"With the dollar-backed stablecoins, you'll help expand the dominance of the US Dollar [...] It will be at the top, and that's where we want to keep it"
'What he means is: With dollar-backed stablecoins, the Global South will pivot towards digital Dollars over local currencies, allowing private, US government-controlled entities to replace bank accounts around the globe. This does not just allow for the expansion of USD dominance by bypassing local governments – it gives the US unprecedented and direct control over worldwide economies as every stablecoin can be effectively frozen on behalf of the US with the click of a button.'
Stablecoins = CBDCs There is no technical fundamental difference between them. It’s almost a guarantee that the EU CBDCs and U.S. stablecoins will be interchangeable.
➡️River: Bitcoin is coming for $128 trillion in global money. You're not late to Bitcoin. https://i.ibb.co/7thzHJMx/Gmf-Uvra-EAEV4-U0.png
On the 21st of March:
➡️Michael Saylor’s Strategy to raise $722.5M to buy more Bitcoin.
➡️Publicly traded Atai Life Sciences to buy $5 million in Bitcoin.
➡️Publicly traded HK Asia Holdings bought 10 Bitcoins worth $858,500 for its balance sheet.
➡️Another solo home miner has mined an entire Bitcoin block worth over $ 260.000,-.
On the 22nd of March:
➡️The University of Wyoming posted a new video explaining Bitcoin with Philosophy Professor Bradley Rettler
➡️Spot Bitcoin ETFs bought 8,775 BTC this week while miners only mined 3,150 Bitcoin.
On the 24th of March:
➡️Metaplanet finished the day as the 13th most liquid stock in Japan, with ¥50.4 billion ($336.6m) of daily trading volume, ahead of Toyota and Nintendo.
➡️River: There is a 275% gap between the inflation you're told and real inflation.
https://i.ibb.co/mCs2Lgcc/Gmz-4qc-WMAAzx-z.png
Bitcoin is insurance on the debt spiral. The U.S. Dollar has been devalued by more than 363% since 2000 – That’s a 14.5% devaluation per year. This means if your savings don’t grow by 14.5% annually, you’re falling behind. This is why we Bitcoin. Bitcoin is insurance on the debt spiral, grow your savings beyond the dollar’s devaluation!
➡️Bitcoin's compound annual growth rate (CAGR) over a 5-year rolling window is currently over 50%
➡️Strategy became the first publicly traded company to hold over 500,000 Bitcoin worth over $44 billion. Strategy has acquired 6,911 BTC for ~$584.1 million at ~$84,529 per Bitcoin and has achieved a BTC Yield of 7.7% YTD 2025. As of 3/23/2025, Strategy holds 506,137 BTC acquired for ~$33.7 billion at ~$66,608 per Bitcoin.
➡️CryptoQuant: Bitcoin's long-term holders are holding firm, with no significant selling pressure.
➡️Xapo Bank launches Bitcoin-backed USD loans up to $1M, with collateral secured in an MPC vault and no re-usage.
💸Traditional Finance / Macro:
👉🏽no news
🏦Banks:
👉🏽 no news
🌎Macro/Geopolitics:
On the 18th of March:
👉🏽Germany just changed its constitution to unleash a staggering ONE TRILLION in new debt. The German parliament has voted to take on hundreds of billions of euros of new government debt, to ease the debt brake rules, and to codify "climate neutrality by 2045" into the constitution.
On top of that, some extra money to Ukraine: Germany's next Chancellor, Friedrich Merz, believes that Putin has gone to war against all of Europe. He argues that Russia has attacked Germany, as the Parliament breaks out in applause.
- We continue to move further away from the "Europe is not part of the conflict" rhetoric. Germany’s self-inflicted delusion continues!
👉🏽Germany's first offshore wind farm closes after 15 years because it's too expensive to operate. Expect a car crash. The Alpha Ventus offshore wind farm near the German North Sea island of Borkum is set to be dismantled after being in operation for only 15 years. It has become too unprofitable to operate without massive subsidies.
https://wattsupwiththat.com/2025/03/16/germanys-first-offshore-wind-farm-to-be-dismantled-after-just-15-years-of-operation/
Great thing that the Netherlands is investing heavily in offshore wind farms, even the biggest pension fund APB. Because nInE tImEs ChEaPeR tHaN gAs, right?
I hope they dismantle them & not leave them to rust into the sea. Right? Because climate!
Great response by Jasmine Birtles: "These vanity projects should never have been allowed to start. The phrase 'cheap renewable energy' is simply a falsehood. This kind of energy production only seems cheap because of the huge government subsidies that keep them going. I'm all for clean energy if it's possible to run it honestly and without huge subsidies, but while it doesn't seem to be viable we should stick with what is affordable and will keep the country going, rather than sacrificing the vulnerable to an impossible ideology."
👉🏽'Gold spot is now trading consistently over $3000, a record high. And with deliveries once again picking up at the Comex and war in the Middle East coming back with a vengeance, the next big spike is just a matter of time. As expected, once gold broke out above $3000,- it has gone vertical and is up 1% in the past hours, rising to a new record high of $3034, as it sets off for $4000' - ZeroHedge
👉🏽'We have just witnessed the biggest drop in US equity allocation on record. The collapse of US consumers: Unemployment expectations in the US are now ABOVE 2020 levels and at their highest since 2008. In 2024, a poll showed that a whopping 56% of Americans thought the US was in a recession.' - TKL
https://i.ibb.co/ycnRDpdf/Gm-VZMnb-XAAAt76r.png
👉🏽OECD Projects Argentina to Have the Second Highest Economic Growth Worldwide in 2025
👉🏽A new blow to the Dutch chemical sector. The major producer LyondellBasell is permanently closing its factory at the Maasvlakte. This decision, announced on Tuesday afternoon, will result in the loss of approximately 160 jobs. The closure is a direct consequence of global overcapacity and high energy costs in the Netherlands. An audit by the German firm E-Bridge, commissioned by the Dutch government, previously revealed that electricity costs for these companies in the Netherlands amount to €95 per megawatt-hour.
In comparison, this rate is €32 in France (66% lower), €45.60 in Germany (52% lower), and €56.05 per megawatt-hour in Belgium (41% lower).
According to E-Bridge, this difference is mainly due to the compensation that foreign governments provide to companies and the lower grid tariffs. In the Netherlands, costs have risen primarily to finance investments in the electricity grid, such as connecting multiple offshore wind farms.
Now read that segment on offshore wind farms. Mindblowing, innit?
Subsidies are not the solution—deregulation is. But Brussels won’t allow that. So, we’re heading toward even more regulation and nationalization.
On the 19th of March:
👉🏽The Fed makes multiple revisions to its 2025 economic data projections.
Powell finally found the "stag" and the "inflation":
Fed cuts year-end GDP forecast from 2.1% to 1.7%
Fed raises year-end core PCE forecast from 2.5% to 2.8%
Fed raises year-end unemployment forecast from 4.3% to 4.4%
Fed raises PCE inflation forecast from 2.5% to 2.7%
The Fed sees higher inflation and a weaker economy.
On the 20th of March:
Dutch Central Bank Director Klaas Knot "We are worried about American influence on our local payment infrastructure."
Paving the way for the European CBDC (after slowly but surely removing CASH MONEY from society). Knot has completed his second term and will leave his office in July. Now, of course, pushing for the CBDC, before looking for a new job in Europe.
Anyway, DNB posts billions in losses.
De Nederlandsche Bank suffered a loss of over €3 billion last year, according to the annual report published on Thursday. This marks the second consecutive year of losses.
DNB incurs this loss because, as part of its monetary policy, it has lent out billions at relatively low rates while having to pay a higher rate to banks that park their money at the central bank.
But no losses on its gold. The gold reserves, meanwhile, increased in value by €12.6 billion. This amount is not included in the official profit and loss statement but is reflected on the bank's balance sheet.
For the Dutch readers/followers: Great article: Follow the Money 'Voor de megawinsten van ING, ABN Amro en Rabobank betaalt de Nederlandse burger een hoge prijs.'
https://archive.ph/ncvtk
On the 21st of March:
👉🏽'The Philadelphia Fed Manufacturing index dropped 5.6 points in March, to 12.5, its 2nd consecutive monthly decline. 6-month outlook for new orders fell by 30.8 points, to 2.3, the lowest in 3 years. This marks the third-largest drop in history, only behind the 2008 Financial Crisis and December 1973.
Furthermore, 6-month business outlook dropped ~40 points to its lowest since January 2024. All while prices paid rose 7.8 points, to 48.3, the highest since July 2022. This is further evidence of weakening economic activity with rising prices.' TKL
👉🏽'China’s central bank gold reserves hit a record 73.6 million fine troy ounces in February. China bought ~160,000 ounces of gold last month, posting their 4th consecutive monthly purchase. Over the last 2.5 years, China’s gold reserves have jumped by 11.0 million ounces of gold. Gold now reflects a record ~5.9% of China’s total foreign exchange reserves, or 2,290 tonnes. Central banks continue to stock up on gold as if we are in a crisis.' -TKL
🎁If you have made it this far I would like to give you a little gift:
What Bitcoin Did: BITCOIN & THE END OF THE DOLLAR SYSTEM with Luke Gromen They discuss: - The Sovereign Debt Crisis - If the US Will Reprice the Gold - If we will See Triple Digit Inflation - The End of The US Dollar System Luke Gromen: A modest clarification: The end of the post-71 structure of the USD system is what the Trump Administration’s actions appear to be pursuing & will in due time achieve if they stay on the present course.
https://t.co/IpakFaYqbL
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly.
Use the code SE3997
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple. ⠀⠀ ⠀⠀ ⠀ ⠀⠀⠀
Do you think this post is helpful to you? If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
@ 3c7dc2c5:805642a8
2025-03-26 21:37:09🧠Quote(s) of the week:
The path to maximalism is littered with mistakes and paved with humility.' Anilsaido https://i.ibb.co/ZzcCHwgT/Gip-G0vdb-YAAV9-Mw-1.jpg
Bitcoin is time because money itself is time. Money is humanity’s battery: a way to store energy, labor, and resources for the future. It captures your past effort and preserves it for when you need it most. Fiat leaks. Bitcoin holds.
🧡Bitcoin news🧡
On the 18th of March:
➡️After ruling out a strategic bitcoin reserve, the Bank of Korea will launch a central bank digital currency pilot in April, per The Korea Times.
➡️'Metaplanet has acquired an additional 150 BTC for ~$12.5 million, achieving a BTC Yield of 60.8% YTD in 2025. As of 3/18/2025, Metaplanet hodls 3,200 BTC, and is now a top 10 publicly listed holder of Bitcoin globally.' -Dylan LeClair
➡️Bitcoin entered a risk-off, distribution-dominant phase in early 2025, evidenced by frequent selling and hesitation to buy (yellow to orange dots). - AMB Crypto
➡️Bitwise CIO says Bitcoin should be at $200,000 today and says, “I think the number of companies buying Bitcoin is going to triple this year, I think Game Theory is on.” “I think countries around the world are going to be buying Bitcoin. There is structurally more demand than supply in Bitcoin.”
➡️Bitcoin mining company Bitfarms buys Stronghold Digital for more than $110 million, making it the largest public-to-public acquisition in Bitcoin industry history.
➡️Bitcoin long-term HODLers become net buyers for the first time since September, per Compass Point Research. "Buying/selling from HODLers is typically a leading indicator for BTC. This cohort now owns 65% of BTC supply vs 63% last week vs 73% in early October." - Bitcoin News
➡️GlassNode: 'The Bitcoin market continues to adjust to its new price range after experiencing a -30% correction. Liquidity conditions are also contracting in both on-chain and futures markets.'
➡️Bitcoin now ranks 6th among the world's top monetary assets at $1.62 trillion, per Porkopolis.
➡️The EU isn't banning Bitcoin but using MiCA and other regulations to control it. This involves stripping away privacy through transaction tracking, mandatory disclosures, and restrictions on self-custody. The goal is control, not outright prohibition.
Excellent thread by Eli. Eli summarises the EU’s attack on Bitcoin and on Europeans’ rights: https://x.com/EliNagarBrr/status/1902048401908261146
Agree 100% with all of this. All these people who have been saying the EU pushing the industry forward with regulations are idiots. They are closing it off and pushing everyone to a CBDC.
Regarding the CBCD, here you will find a comprehensive summary of EU’s CBDC plans, by Efrat Fenigson: https://bitcoinmagazine.com/politics/ecb-prepping-the-ground-for-digital-euro-launch
*On the 20th of March, the ECB posted the following statement on Twitter:
'The digital euro is not just about creating a new form of money, says Chief Economist Philip R. Lane. It is about ensuring that Europe retains control over its monetary and financial destiny in the digital age against a backdrop of increasing geopolitical fragmentation.'
“It’s about ensuring that the EU retains control over its citizens.”
There, I fixed it for you if you missed the primary reason.
The Euro is a permissioned, centralized, censorable, inflationary, debt-based currency controlled by unelected bureaucrats.
Bitcoin is permissionless, decentralized, censorship-resistant, fixed in supply, and governed by code—not politicians.
Choose wisely.
➡️As mentioned in last week's Weekly Recap the US Government spends $3.3B per day in interest rate expense. If this doesn’t make you buy Bitcoin I’m not sure what will. https://i.ibb.co/sdt1GvfM/Gm-Vd-FBz-XQAA3t3-M-1.jpg
➡️In Kibera, Africa’s largest informal settlement, more than 40 merchants now accept and save in Bitcoin.
➡️The increase in 3-6 month-old UTXOs suggests accumulation during this market correction, a behavior historically critical in forming market bottoms and driving new price rallies.
➡️Just as Hal Finney predicted, Bitcoin will take over Wall Street: Multiple American Bitcoin companies are now seeking to become state or national banks, reports Reuters. It is inevitable.
➡️Daniel Batten: 2021: 62 US Environmental Organizations write to coCongressaying Bitcoin is bad for the environment and has no use (based on Central Bank misinformation) 2025: US Environmental Organizations debunked (impossible, had they used Bitcoin) Strange are the ways of karma.
Meanwhile,
➡️President Trump's Executive Director, Bo Hines, on digital assets: "We talked about ways of acquiring more Bitcoin in budget-neutral ways." We want "as much as we can get."
When Bitcoin is at $200k. We will look back on March 2025 and say, how was everyone not buying. It was so obvious.
On the 19th of March:
➡️BLACKROCK: “The most sophisticated long-term Bitcoin accumulators are pretty excited about this dip. They see the correction as a buying opportunity."
On the 20th of March:
➡️SEC confirms that Bitcoin and Proof of Work mining are NOT securities under US law. https://i.ibb.co/nWRHjnk/Gmg-Yxv-QWEAAgwx8.png
Source: https://t.co/0ExsJniPIf
➡️Bitcoin exchange Kraken has agreed to acquire NinjaTrader, the leading U.S. retail futures trading platform, for $1.5 billion—the largest deal ever of a Bitcoin company buying a traditional financial company.
➡️TRUMP: “I signed an order creating the brand new Strategic Bitcoin Reserve and the US digital asset stockpile which will allow the Federal government to maximize the value of its holdings.”
Tweet and hot take by Lola L33tz
"With the dollar-backed stablecoins, you'll help expand the dominance of the US Dollar [...] It will be at the top, and that's where we want to keep it"
'What he means is: With dollar-backed stablecoins, the Global South will pivot towards digital Dollars over local currencies, allowing private, US government-controlled entities to replace bank accounts around the globe. This does not just allow for the expansion of USD dominance by bypassing local governments – it gives the US unprecedented and direct control over worldwide economies as every stablecoin can be effectively frozen on behalf of the US with the click of a button.'
Stablecoins = CBDCs There is no technical fundamental difference between them. It’s almost a guarantee that the EU CBDCs and U.S. stablecoins will be interchangeable.
➡️River: Bitcoin is coming for $128 trillion in global money. You're not late to Bitcoin. https://i.ibb.co/7thzHJMx/Gmf-Uvra-EAEV4-U0.png
On the 21st of March:
➡️Michael Saylor’s Strategy to raise $722.5M to buy more Bitcoin.
➡️Publicly traded Atai Life Sciences to buy $5 million in Bitcoin.
➡️Publicly traded HK Asia Holdings bought 10 Bitcoins worth $858,500 for its balance sheet.
➡️Another solo home miner has mined an entire Bitcoin block worth over $ 260.000,-.
On the 22nd of March:
➡️The University of Wyoming posted a new video explaining Bitcoin with Philosophy Professor Bradley Rettler
➡️Spot Bitcoin ETFs bought 8,775 BTC this week while miners only mined 3,150 Bitcoin.
On the 24th of March:
➡️Metaplanet finished the day as the 13th most liquid stock in Japan, with ¥50.4 billion ($336.6m) of daily trading volume, ahead of Toyota and Nintendo.
➡️River: There is a 275% gap between the inflation you're told and real inflation.
https://i.ibb.co/mCs2Lgcc/Gmz-4qc-WMAAzx-z.png
Bitcoin is insurance on the debt spiral. The U.S. Dollar has been devalued by more than 363% since 2000 – That’s a 14.5% devaluation per year. This means if your savings don’t grow by 14.5% annually, you’re falling behind. This is why we Bitcoin. Bitcoin is insurance on the debt spiral, grow your savings beyond the dollar’s devaluation!
➡️Bitcoin's compound annual growth rate (CAGR) over a 5-year rolling window is currently over 50%
➡️Strategy became the first publicly traded company to hold over 500,000 Bitcoin worth over $44 billion. Strategy has acquired 6,911 BTC for ~$584.1 million at ~$84,529 per Bitcoin and has achieved a BTC Yield of 7.7% YTD 2025. As of 3/23/2025, Strategy holds 506,137 BTC acquired for ~$33.7 billion at ~$66,608 per Bitcoin.
➡️CryptoQuant: Bitcoin's long-term holders are holding firm, with no significant selling pressure.
➡️Xapo Bank launches Bitcoin-backed USD loans up to $1M, with collateral secured in an MPC vault and no re-usage.
💸Traditional Finance / Macro:
👉🏽no news
🏦Banks:
👉🏽 no news
🌎Macro/Geopolitics:
On the 18th of March:
👉🏽Germany just changed its constitution to unleash a staggering ONE TRILLION in new debt. The German parliament has voted to take on hundreds of billions of euros of new government debt, to ease the debt brake rules, and to codify "climate neutrality by 2045" into the constitution.
On top of that, some extra money to Ukraine: Germany's next Chancellor, Friedrich Merz, believes that Putin has gone to war against all of Europe. He argues that Russia has attacked Germany, as the Parliament breaks out in applause.
- We continue to move further away from the "Europe is not part of the conflict" rhetoric. Germany’s self-inflicted delusion continues!
👉🏽Germany's first offshore wind farm closes after 15 years because it's too expensive to operate. Expect a car crash. The Alpha Ventus offshore wind farm near the German North Sea island of Borkum is set to be dismantled after being in operation for only 15 years. It has become too unprofitable to operate without massive subsidies.
https://wattsupwiththat.com/2025/03/16/germanys-first-offshore-wind-farm-to-be-dismantled-after-just-15-years-of-operation/
Great thing that the Netherlands is investing heavily in offshore wind farms, even the biggest pension fund APB. Because nInE tImEs ChEaPeR tHaN gAs, right?
I hope they dismantle them & not leave them to rust into the sea. Right? Because climate!
Great response by Jasmine Birtles: "These vanity projects should never have been allowed to start. The phrase 'cheap renewable energy' is simply a falsehood. This kind of energy production only seems cheap because of the huge government subsidies that keep them going. I'm all for clean energy if it's possible to run it honestly and without huge subsidies, but while it doesn't seem to be viable we should stick with what is affordable and will keep the country going, rather than sacrificing the vulnerable to an impossible ideology."
👉🏽'Gold spot is now trading consistently over $3000, a record high. And with deliveries once again picking up at the Comex and war in the Middle East coming back with a vengeance, the next big spike is just a matter of time. As expected, once gold broke out above $3000,- it has gone vertical and is up 1% in the past hours, rising to a new record high of $3034, as it sets off for $4000' - ZeroHedge
👉🏽'We have just witnessed the biggest drop in US equity allocation on record. The collapse of US consumers: Unemployment expectations in the US are now ABOVE 2020 levels and at their highest since 2008. In 2024, a poll showed that a whopping 56% of Americans thought the US was in a recession.' - TKL
https://i.ibb.co/ycnRDpdf/Gm-VZMnb-XAAAt76r.png
👉🏽OECD Projects Argentina to Have the Second Highest Economic Growth Worldwide in 2025
👉🏽A new blow to the Dutch chemical sector. The major producer LyondellBasell is permanently closing its factory at the Maasvlakte. This decision, announced on Tuesday afternoon, will result in the loss of approximately 160 jobs. The closure is a direct consequence of global overcapacity and high energy costs in the Netherlands. An audit by the German firm E-Bridge, commissioned by the Dutch government, previously revealed that electricity costs for these companies in the Netherlands amount to €95 per megawatt-hour.
In comparison, this rate is €32 in France (66% lower), €45.60 in Germany (52% lower), and €56.05 per megawatt-hour in Belgium (41% lower).
According to E-Bridge, this difference is mainly due to the compensation that foreign governments provide to companies and the lower grid tariffs. In the Netherlands, costs have risen primarily to finance investments in the electricity grid, such as connecting multiple offshore wind farms.
Now read that segment on offshore wind farms. Mindblowing, innit?
Subsidies are not the solution—deregulation is. But Brussels won’t allow that. So, we’re heading toward even more regulation and nationalization.
On the 19th of March:
👉🏽The Fed makes multiple revisions to its 2025 economic data projections.
Powell finally found the "stag" and the "inflation":
Fed cuts year-end GDP forecast from 2.1% to 1.7%
Fed raises year-end core PCE forecast from 2.5% to 2.8%
Fed raises year-end unemployment forecast from 4.3% to 4.4%
Fed raises PCE inflation forecast from 2.5% to 2.7%
The Fed sees higher inflation and a weaker economy.
On the 20th of March:
Dutch Central Bank Director Klaas Knot "We are worried about American influence on our local payment infrastructure."
Paving the way for the European CBDC (after slowly but surely removing CASH MONEY from society). Knot has completed his second term and will leave his office in July. Now, of course, pushing for the CBDC, before looking for a new job in Europe.
Anyway, DNB posts billions in losses.
De Nederlandsche Bank suffered a loss of over €3 billion last year, according to the annual report published on Thursday. This marks the second consecutive year of losses.
DNB incurs this loss because, as part of its monetary policy, it has lent out billions at relatively low rates while having to pay a higher rate to banks that park their money at the central bank.
But no losses on its gold. The gold reserves, meanwhile, increased in value by €12.6 billion. This amount is not included in the official profit and loss statement but is reflected on the bank's balance sheet.
For the Dutch readers/followers: Great article: Follow the Money 'Voor de megawinsten van ING, ABN Amro en Rabobank betaalt de Nederlandse burger een hoge prijs.'
https://archive.ph/ncvtk
On the 21st of March:
👉🏽'The Philadelphia Fed Manufacturing index dropped 5.6 points in March, to 12.5, its 2nd consecutive monthly decline. 6-month outlook for new orders fell by 30.8 points, to 2.3, the lowest in 3 years. This marks the third-largest drop in history, only behind the 2008 Financial Crisis and December 1973.
Furthermore, 6-month business outlook dropped ~40 points to its lowest since January 2024. All while prices paid rose 7.8 points, to 48.3, the highest since July 2022. This is further evidence of weakening economic activity with rising prices.' TKL
👉🏽'China’s central bank gold reserves hit a record 73.6 million fine troy ounces in February. China bought ~160,000 ounces of gold last month, posting their 4th consecutive monthly purchase. Over the last 2.5 years, China’s gold reserves have jumped by 11.0 million ounces of gold. Gold now reflects a record ~5.9% of China’s total foreign exchange reserves, or 2,290 tonnes. Central banks continue to stock up on gold as if we are in a crisis.' -TKL
🎁If you have made it this far I would like to give you a little gift:
What Bitcoin Did: BITCOIN & THE END OF THE DOLLAR SYSTEM with Luke Gromen They discuss: - The Sovereign Debt Crisis - If the US Will Reprice the Gold - If we will See Triple Digit Inflation - The End of The US Dollar System Luke Gromen: A modest clarification: The end of the post-71 structure of the USD system is what the Trump Administration’s actions appear to be pursuing & will in due time achieve if they stay on the present course.
https://t.co/IpakFaYqbL
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly.
Use the code SE3997
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple. ⠀⠀ ⠀⠀ ⠀ ⠀⠀⠀
Do you think this post is helpful to you? If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
@ 3c7dc2c5:805642a8
2025-03-26 21:25:44🧠Quote(s) of the week:
The path to maximalism is littered with mistakes and paved with humility.' Anilsaido https://i.ibb.co/ZzcCHwgT/Gip-G0vdb-YAAV9-Mw-1.jpg
Bitcoin is time because money itself is time. Money is humanity’s battery: a way to store energy, labor, and resources for the future. It captures your past effort and preserves it for when you need it most. Fiat leaks. Bitcoin holds.
🧡Bitcoin news🧡
On the 18th of March:
➡️After ruling out a strategic bitcoin reserve, the Bank of Korea will launch a central bank digital currency pilot in April, per The Korea Times.
➡️'Metaplanet has acquired an additional 150 BTC for ~$12.5 million, achieving a BTC Yield of 60.8% YTD in 2025. As of 3/18/2025, Metaplanet hodls 3,200 BTC, and is now a top 10 publicly listed holder of Bitcoin globally.' -Dylan LeClair
➡️Bitcoin entered a risk-off, distribution-dominant phase in early 2025, evidenced by frequent selling and hesitation to buy (yellow to orange dots). - AMB Crypto
➡️Bitwise CIO says Bitcoin should be at $200,000 today and says, “I think the number of companies buying Bitcoin is going to triple this year, I think Game Theory is on.” “I think countries around the world are going to be buying Bitcoin. There is structurally more demand than supply in Bitcoin.”
➡️Bitcoin mining company Bitfarms buys Stronghold Digital for more than $110 million, making it the largest public-to-public acquisition in Bitcoin industry history.
➡️Bitcoin long-term HODLers become net buyers for the first time since September, per Compass Point Research. "Buying/selling from HODLers is typically a leading indicator for BTC. This cohort now owns 65% of BTC supply vs 63% last week vs 73% in early October." - Bitcoin News
➡️GlassNode: 'The Bitcoin market continues to adjust to its new price range after experiencing a -30% correction. Liquidity conditions are also contracting in both on-chain and futures markets.'
➡️Bitcoin now ranks 6th among the world's top monetary assets at $1.62 trillion, per Porkopolis.
➡️The EU isn't banning Bitcoin but using MiCA and other regulations to control it. This involves stripping away privacy through transaction tracking, mandatory disclosures, and restrictions on self-custody. The goal is control, not outright prohibition.
Excellent thread by Eli. Eli summarises the EU’s attack on Bitcoin and on Europeans’ rights: https://x.com/EliNagarBrr/status/1902048401908261146
Agree 100% with all of this. All these people who have been saying the EU pushing the industry forward with regulations are idiots. They are closing it off and pushing everyone to a CBDC.
Regarding the CBCD, here you will find a comprehensive summary of EU’s CBDC plans, by Efrat Fenigson: https://bitcoinmagazine.com/politics/ecb-prepping-the-ground-for-digital-euro-launch
*On the 20th of March, the ECB posted the following statement on Twitter: The digital euro is not just about creating a new form of money, says Chief Economist Philip R. Lane.
It is about ensuring that Europe retains control over its monetary and financial destiny in the digital age against a backdrop of increasing geopolitical fragmentation.
“It’s about ensuring that the EU retains control over its citizens.”
There, I fixed it for you if you missed the primary reason.
The Euro is a permissioned, centralized, censorable, inflationary, debt-based currency controlled by unelected bureaucrats.
Bitcoin is permissionless, decentralized, censorship-resistant, fixed in supply, and governed by code—not politicians. Choose wisely.
➡️As mentioned in last week's Weekly Recap the US Government spends $3.3B per day in interest rate expense. If this doesn’t make you buy Bitcoin I’m not sure what will.
https://i.ibb.co/sdt1GvfM/Gm-Vd-FBz-XQAA3t3-M-1.jpg
➡️In Kibera, Africa’s largest informal settlement, more than 40 merchants now accept and save in Bitcoin.
➡️The increase in 3-6 month-old UTXOs suggests accumulation during this market correction, a behavior historically critical in forming market bottoms and driving new price rallies.
➡️Just as Hal Finney predicted, Bitcoin will take over Wall Street: Multiple American Bitcoin companies are now seeking to become state or national banks, reports Reuters. It is inevitable.
➡️Daniel Batten: 2021: 62 US Environmental Organizations write to coCongressaying Bitcoin is bad for the environment and has no use (based on Central Bank misinformation) 2025: US Environmental Organizations debunked (impossible, had they used Bitcoin) Strange are the ways of karma.
Meanwhile,
➡️President Trump's Executive Director, Bo Hines, on digital assets: "We talked about ways of acquiring more Bitcoin in budget-neutral ways." We want "as much as we can get." When Bitcoin is at $200k. We will look back on March 2025 and say, how was everyone not buying. It was so obvious.
On the 19th of March:
➡️BLACKROCK: “The most sophisticated long-term Bitcoin accumulators are pretty excited about this dip. They see the correction as a buying opportunity."
On the 20th of March: ➡️SEC confirms that Bitcoin and Proof of Work mining are NOT securities under US law. https://i.ibb.co/nWRHjnk/Gmg-Yxv-QWEAAgwx8.png
Source: https://t.co/0ExsJniPIf
➡️Bitcoin exchange Kraken has agreed to acquire NinjaTrader, the leading U.S. retail futures trading platform, for $1.5 billion—the largest deal ever of a Bitcoin company buying a traditional financial company.
➡️TRUMP: “I signed an order creating the brand new Strategic Bitcoin Reserve and the US digital asset stockpile which will allow the Federal government to maximize the value of its holdings.”
Tweet and hot take by Lola L33tz
"With the dollar-backed stablecoins, you'll help expand the dominance of the US Dollar [...] It will be at the top, and that's where we want to keep it" 'What he means is: With dollar-backed stablecoins, the Global South will pivot towards digital Dollars over local currencies, allowing private, US government-controlled entities to replace bank accounts around the globe.
This does not just allow for the expansion of USD dominance by bypassing local governments – it gives the US unprecedented and direct control over worldwide economies as every stablecoin can be effectively frozen on behalf of the US with the click of a button.'
Stablecoins = CBDCs There is no technical fundamental difference between them. It’s almost a guarantee that the EU CBDCs and U.S. stablecoins will be interchangeable.
➡️River: Bitcoin is coming for $128 trillion in global money. You're not late to Bitcoin. https://i.ibb.co/7thzHJMx/Gmf-Uvra-EAEV4-U0.png
On the 21st of March:
➡️Michael Saylor’s Strategy to raise $722.5M to buy more Bitcoin.
➡️Publicly traded Atai Life Sciences to buy $5 million in Bitcoin.
➡️Publicly traded HK Asia Holdings bought 10 Bitcoins worth $858,500 for its balance sheet.
➡️Another solo home miner has mined an entire Bitcoin block worth over $ 260.000,-.
On the 22nd of March:
➡️The University of Wyoming posted a new video explaining Bitcoin with Philosophy Professor Bradley Rettler
➡️Spot Bitcoin ETFs bought 8,775 BTC this week while miners only mined 3,150 Bitcoin.
On the 24th of March:
➡️Metaplanet finished the day as the 13th most liquid stock in Japan, with ¥50.4 billion ($336.6m) of daily trading volume, ahead of Toyota and Nintendo.
➡️River: There is a 275% gap between the inflation you're told and real inflation. https://i.ibb.co/mCs2Lgcc/Gmz-4qc-WMAAzx-z.png
Bitcoin is insurance on the debt spiral. The U.S. Dollar has been devalued by more than 363% since 2000 – That’s a 14.5% devaluation per year. This means if your savings don’t grow by 14.5% annually, you’re falling behind. This is why we Bitcoin. Bitcoin is insurance on the debt spiral, grow your savings beyond the dollar’s devaluation!
➡️Bitcoin's compound annual growth rate (CAGR) over a 5-year rolling window is currently over 50%
➡️Strategy became the first publicly traded company to hold over 500,000 Bitcoin worth over $44 billion.
Strategy has acquired 6,911 BTC for ~$584.1 million at ~$84,529 per Bitcoin and has achieved a BTC Yield of 7.7% YTD 2025. As of 3/23/2025, Strategy holds 506,137 BTC acquired for ~$33.7 billion at ~$66,608 per Bitcoin.
➡️CryptoQuant: Bitcoin's long-term holders are holding firm, with no significant selling pressure.
➡️Xapo Bank launches Bitcoin-backed USD loans up to $1M, with collateral secured in an MPC vault and no re-usage.
💸Traditional Finance / Macro:
👉🏽no news
🏦Banks:
👉🏽 no news
🌎Macro/Geopolitics:
On the 18th of March:
👉🏽Germany just changed its constitution to unleash a staggering ONE TRILLION in new debt. The German parliament has voted to take on hundreds of billions of euros of new government debt, to ease the debt brake rules, and to codify "climate neutrality by 2045" into the constitution.
On top of that, some extra money to Ukraine:
Germany's next Chancellor, Friedrich Merz, believes that Putin has gone to war against all of Europe. He argues that Russia has attacked Germany, as the Parliament breaks out in applause. - We continue to move further away from the "Europe is not part of the conflict" rhetoric. Germany’s self-inflicted delusion continues!
👉🏽Germany's first offshore wind farm closes after 15 years because it's too expensive to operate. Expect a car crash. The Alpha Ventus offshore wind farm near the German North Sea island of Borkum is set to be dismantled after being in operation for only 15 years. It has become too unprofitable to operate without massive subsidies.
https://wattsupwiththat.com/2025/03/16/germanys-first-offshore-wind-farm-to-be-dismantled-after-just-15-years-of-operation/
Great thing that the Netherlands is investing heavily in offshore wind farms, even the biggest pension fund APB. Because nInE tImEs ChEaPeR tHaN gAs, right? I hope they dismantle them & not leave them to rust into the sea. Right? Because climate!
Great response by Jasmine Birtles: "These vanity projects should never have been allowed to start. The phrase 'cheap renewable energy' is simply a falsehood. This kind of energy production only seems cheap because of the huge government subsidies that keep them going. I'm all for clean energy if it's possible to run it honestly and without huge subsidies, but while it doesn't seem to be viable we should stick with what is affordable and will keep the country going, rather than sacrificing the vulnerable to an impossible ideology."
👉🏽'Gold spot is now trading consistently over $3000, a record high. And with deliveries once again picking up at the Comex and war in the Middle East coming back with a vengeance, the next big spike is just a matter of time. As expected, once gold broke out above $3000,- it has gone vertical and is up 1% in the past hours, rising to a new record high of $3034, as it sets off for $4000' - ZeroHedge
👉🏽'We have just witnessed the biggest drop in US equity allocation on record. The collapse of US consumers: Unemployment expectations in the US are now ABOVE 2020 levels and at their highest since 2008. In 2024, a poll showed that a whopping 56% of Americans thought the US was in a recession.' - TKL
https://i.ibb.co/ycnRDpdf/Gm-VZMnb-XAAAt76r.png
👉🏽OECD Projects Argentina to Have the Second Highest Economic Growth Worldwide in 2025
👉🏽A new blow to the Dutch chemical sector. The major producer LyondellBasell is permanently closing its factory at the Maasvlakte. This decision, announced on Tuesday afternoon, will result in the loss of approximately 160 jobs. The closure is a direct consequence of global overcapacity and high energy costs in the Netherlands. An audit by the German firm E-Bridge, commissioned by the Dutch government, previously revealed that electricity costs for these companies in the Netherlands amount to €95 per megawatt-hour. In comparison, this rate is €32 in France (66% lower), €45.60 in Germany (52% lower), and €56.05 per megawatt-hour in Belgium (41% lower).
According to E-Bridge, this difference is mainly due to the compensation that foreign governments provide to companies and the lower grid tariffs. In the Netherlands, costs have risen primarily to finance investments in the electricity grid, such as connecting multiple offshore wind farms.
Now read that segment on offshore wind farms. Mindblowing, innit?
Subsidies are not the solution—deregulation is. But Brussels won’t allow that. So, we’re heading toward even more regulation and nationalization.
On the 19th of March:
👉🏽The Fed makes multiple revisions to its 2025 economic data projections.
Powell finally found the "stag" and the "inflation":
Fed cuts year-end GDP forecast from 2.1% to 1.7%
Fed raises year-end core PCE forecast from 2.5% to 2.8%
Fed raises year-end unemployment forecast from 4.3% to 4.4%
Fed raises PCE inflation forecast from 2.5% to 2.7%
The Fed sees higher inflation and a weaker economy.
On the 20th of March:
Dutch Central Bank Director Klaas Knot "We are worried about American influence on our local payment infrastructure."
Paving the way for the European CBDC (after slowly but surely removing CASH MONEY from society).
Knot has completed his second term and will leave his office in July. Now, of course, pushing for the CBDC, before looking for a new job in Europe.
Anyway, DNB posts billions in losses. De Nederlandsche Bank suffered a loss of over €3 billion last year, according to the annual report published on Thursday. This marks the second consecutive year of losses.
DNB incurs this loss because, as part of its monetary policy, it has lent out billions at relatively low rates while having to pay a higher rate to banks that park their money at the central bank.
But no losses on its gold. The gold reserves, meanwhile, increased in value by €12.6 billion. This amount is not included in the official profit and loss statement but is reflected on the bank's balance sheet.
For the Dutch readers/followers: Great article: Follow the Money 'Voor de megawinsten van ING, ABN Amro en Rabobank betaalt de Nederlandse burger een hoge prijs.'
https://archive.ph/ncvtk
On the 21st of March:
👉🏽'The Philadelphia Fed Manufacturing index dropped 5.6 points in March, to 12.5, its 2nd consecutive monthly decline. 6-month outlook for new orders fell by 30.8 points, to 2.3, the lowest in 3 years. This marks the third-largest drop in history, only behind the 2008 Financial Crisis and December 1973.
Furthermore, 6-month business outlook dropped ~40 points to its lowest since January 2024.
All while prices paid rose 7.8 points, to 48.3, the highest since July 2022. This is further evidence of weakening economic activity with rising prices.' TKL
👉🏽'China’s central bank gold reserves hit a record 73.6 million fine troy ounces in February. China bought ~160,000 ounces of gold last month, posting their 4th consecutive monthly purchase. Over the last 2.5 years, China’s gold reserves have jumped by 11.0 million ounces of gold. Gold now reflects a record ~5.9% of China’s total foreign exchange reserves, or 2,290 tonnes. Central banks continue to stock up on gold as if we are in a crisis.' -TKL
🎁If you have made it this far I would like to give you a little gift:
What Bitcoin Did: BITCOIN & THE END OF THE DOLLAR SYSTEM with Luke Gromen They discuss: - The Sovereign Debt Crisis - If the US Will Reprice the Gold - If we will See Triple Digit Inflation - The End of The US Dollar System Luke Gromen: A modest clarification: The end of the post-71 structure of the USD system is what the Trump Administration’s actions appear to be pursuing & will in due time achieve if they stay on the present course. https://t.co/IpakFaYqbL
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly.
Use the code SE3997
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple. ⠀⠀⠀⠀ ⠀ ⠀⠀⠀
Do you think this post is helpful to you? If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
@ 3c7dc2c5:805642a8
2025-03-26 21:24:22🧠Quote(s) of the week:
The path to maximalism is littered with mistakes and paved with humility.' Anilsaido https://i.ibb.co/ZzcCHwgT/Gip-G0vdb-YAAV9-Mw-1.jpg
Bitcoin is time because money itself is time. Money is humanity’s battery: a way to store energy, labor, and resources for the future. It captures your past effort and preserves it for when you need it most. Fiat leaks. Bitcoin holds.
🧡Bitcoin news🧡
On the 18th of March:
➡️After ruling out a strategic bitcoin reserve, the Bank of Korea will launch a central bank digital currency pilot in April, per The Korea Times.
➡️'Metaplanet has acquired an additional 150 BTC for ~$12.5 million, achieving a BTC Yield of 60.8% YTD in 2025. As of 3/18/2025, Metaplanet hodls 3,200 BTC, and is now a top 10 publicly listed holder of Bitcoin globally.' -Dylan LeClair
➡️Bitcoin entered a risk-off, distribution-dominant phase in early 2025, evidenced by frequent selling and hesitation to buy (yellow to orange dots). - AMB Crypto
➡️Bitwise CIO says Bitcoin should be at $200,000 today and says, “I think the number of companies buying Bitcoin is going to triple this year, I think Game Theory is on.” “I think countries around the world are going to be buying Bitcoin. There is structurally more demand than supply in Bitcoin.”
➡️Bitcoin mining company Bitfarms buys Stronghold Digital for more than $110 million, making it the largest public-to-public acquisition in Bitcoin industry history.
➡️Bitcoin long-term HODLers become net buyers for the first time since September, per Compass Point Research. "Buying/selling from HODLers is typically a leading indicator for BTC. This cohort now owns 65% of BTC supply vs 63% last week vs 73% in early October." - Bitcoin News
➡️GlassNode: 'The Bitcoin market continues to adjust to its new price range after experiencing a -30% correction. Liquidity conditions are also contracting in both on-chain and futures markets.'
➡️Bitcoin now ranks 6th among the world's top monetary assets at $1.62 trillion, per Porkopolis.
➡️The EU isn't banning Bitcoin but using MiCA and other regulations to control it. This involves stripping away privacy through transaction tracking, mandatory disclosures, and restrictions on self-custody. The goal is control, not outright prohibition.
Excellent thread by Eli. Eli summarises the EU’s attack on Bitcoin and on Europeans’ rights: https://x.com/EliNagarBrr/status/1902048401908261146
Agree 100% with all of this. All these people who have been saying the EU pushing the industry forward with regulations are idiots. They are closing it off and pushing everyone to a CBDC.
Regarding the CBCD, here you will find a comprehensive summary of EU’s CBDC plans, by Efrat Fenigson: https://bitcoinmagazine.com/politics/ecb-prepping-the-ground-for-digital-euro-launch
*On the 20th of March, the ECB posted the following statement on Twitter: The digital euro is not just about creating a new form of money, says Chief Economist Philip R. Lane.
It is about ensuring that Europe retains control over its monetary and financial destiny in the digital age against a backdrop of increasing geopolitical fragmentation.
“It’s about ensuring that the EU retains control over its citizens.”
There, I fixed it for you if you missed the primary reason.
The Euro is a permissioned, centralized, censorable, inflationary, debt-based currency controlled by unelected bureaucrats.
Bitcoin is permissionless, decentralized, censorship-resistant, fixed in supply, and governed by code—not politicians. Choose wisely.
➡️As mentioned in last week's Weekly Recap the US Government spends $3.3B per day in interest rate expense. If this doesn’t make you buy Bitcoin I’m not sure what will.
https://i.ibb.co/sdt1GvfM/Gm-Vd-FBz-XQAA3t3-M-1.jpg
➡️In Kibera, Africa’s largest informal settlement, more than 40 merchants now accept and save in Bitcoin.
➡️The increase in 3-6 month-old UTXOs suggests accumulation during this market correction, a behavior historically critical in forming market bottoms and driving new price rallies.
➡️Just as Hal Finney predicted, Bitcoin will take over Wall Street: Multiple American Bitcoin companies are now seeking to become state or national banks, reports Reuters. It is inevitable.
➡️Daniel Batten: 2021: 62 US Environmental Organizations write to coCongressaying Bitcoin is bad for the environment and has no use (based on Central Bank misinformation) 2025: US Environmental Organizations debunked (impossible, had they used Bitcoin) Strange are the ways of karma.
Meanwhile,
➡️President Trump's Executive Director, Bo Hines, on digital assets: "We talked about ways of acquiring more Bitcoin in budget-neutral ways." We want "as much as we can get." When Bitcoin is at $200k. We will look back on March 2025 and say, how was everyone not buying. It was so obvious.
On the 19th of March:
➡️BLACKROCK: “The most sophisticated long-term Bitcoin accumulators are pretty excited about this dip. They see the correction as a buying opportunity."
On the 20th of March: ➡️SEC confirms that Bitcoin and Proof of Work mining are NOT securities under US law. https://i.ibb.co/nWRHjnk/Gmg-Yxv-QWEAAgwx8.png
Source: https://t.co/0ExsJniPIf
➡️Bitcoin exchange Kraken has agreed to acquire NinjaTrader, the leading U.S. retail futures trading platform, for $1.5 billion—the largest deal ever of a Bitcoin company buying a traditional financial company.
➡️TRUMP: “I signed an order creating the brand new Strategic Bitcoin Reserve and the US digital asset stockpile which will allow the Federal government to maximize the value of its holdings.”
Tweet and hot take by Lola L33tz
"With the dollar-backed stablecoins, you'll help expand the dominance of the US Dollar [...] It will be at the top, and that's where we want to keep it" 'What he means is: With dollar-backed stablecoins, the Global South will pivot towards digital Dollars over local currencies, allowing private, US government-controlled entities to replace bank accounts around the globe.
This does not just allow for the expansion of USD dominance by bypassing local governments – it gives the US unprecedented and direct control over worldwide economies as every stablecoin can be effectively frozen on behalf of the US with the click of a button.'
Stablecoins = CBDCs There is no technical fundamental difference between them. It’s almost a guarantee that the EU CBDCs and U.S. stablecoins will be interchangeable.
➡️River: Bitcoin is coming for $128 trillion in global money. You're not late to Bitcoin. https://i.ibb.co/7thzHJMx/Gmf-Uvra-EAEV4-U0.png
On the 21st of March:
➡️Michael Saylor’s Strategy to raise $722.5M to buy more Bitcoin.
➡️Publicly traded Atai Life Sciences to buy $5 million in Bitcoin.
➡️Publicly traded HK Asia Holdings bought 10 Bitcoins worth $858,500 for its balance sheet.
➡️Another solo home miner has mined an entire Bitcoin block worth over $ 260.000,-.
On the 22nd of March:
➡️The University of Wyoming posted a new video explaining Bitcoin with Philosophy Professor Bradley Rettler
➡️Spot Bitcoin ETFs bought 8,775 BTC this week while miners only mined 3,150 Bitcoin.
On the 24th of March:
➡️Metaplanet finished the day as the 13th most liquid stock in Japan, with ¥50.4 billion ($336.6m) of daily trading volume, ahead of Toyota and Nintendo.
➡️River: There is a 275% gap between the inflation you're told and real inflation. https://i.ibb.co/mCs2Lgcc/Gmz-4qc-WMAAzx-z.png
Bitcoin is insurance on the debt spiral. The U.S. Dollar has been devalued by more than 363% since 2000 – That’s a 14.5% devaluation per year. This means if your savings don’t grow by 14.5% annually, you’re falling behind. This is why we Bitcoin. Bitcoin is insurance on the debt spiral, grow your savings beyond the dollar’s devaluation!
➡️Bitcoin's compound annual growth rate (CAGR) over a 5-year rolling window is currently over 50%
➡️Strategy became the first publicly traded company to hold over 500,000 Bitcoin worth over $44 billion.
Strategy has acquired 6,911 BTC for ~$584.1 million at ~$84,529 per Bitcoin and has achieved a BTC Yield of 7.7% YTD 2025. As of 3/23/2025, Strategy holds 506,137 BTC acquired for ~$33.7 billion at ~$66,608 per Bitcoin.
➡️CryptoQuant: Bitcoin's long-term holders are holding firm, with no significant selling pressure.
➡️Xapo Bank launches Bitcoin-backed USD loans up to $1M, with collateral secured in an MPC vault and no re-usage.
💸Traditional Finance / Macro:
👉🏽no news
🏦Banks:
👉🏽 no news
🌎Macro/Geopolitics:
On the 18th of March:
👉🏽Germany just changed its constitution to unleash a staggering ONE TRILLION in new debt. The German parliament has voted to take on hundreds of billions of euros of new government debt, to ease the debt brake rules, and to codify "climate neutrality by 2045" into the constitution.
On top of that, some extra money to Ukraine:
Germany's next Chancellor, Friedrich Merz, believes that Putin has gone to war against all of Europe. He argues that Russia has attacked Germany, as the Parliament breaks out in applause. - We continue to move further away from the "Europe is not part of the conflict" rhetoric. Germany’s self-inflicted delusion continues!
👉🏽Germany's first offshore wind farm closes after 15 years because it's too expensive to operate. Expect a car crash. The Alpha Ventus offshore wind farm near the German North Sea island of Borkum is set to be dismantled after being in operation for only 15 years. It has become too unprofitable to operate without massive subsidies.
https://wattsupwiththat.com/2025/03/16/germanys-first-offshore-wind-farm-to-be-dismantled-after-just-15-years-of-operation/
Great thing that the Netherlands is investing heavily in offshore wind farms, even the biggest pension fund APB. Because nInE tImEs ChEaPeR tHaN gAs, right? I hope they dismantle them & not leave them to rust into the sea. Right? Because climate!
Great response by Jasmine Birtles: "These vanity projects should never have been allowed to start. The phrase 'cheap renewable energy' is simply a falsehood. This kind of energy production only seems cheap because of the huge government subsidies that keep them going. I'm all for clean energy if it's possible to run it honestly and without huge subsidies, but while it doesn't seem to be viable we should stick with what is affordable and will keep the country going, rather than sacrificing the vulnerable to an impossible ideology."
👉🏽'Gold spot is now trading consistently over $3000, a record high. And with deliveries once again picking up at the Comex and war in the Middle East coming back with a vengeance, the next big spike is just a matter of time. As expected, once gold broke out above $3000,- it has gone vertical and is up 1% in the past hours, rising to a new record high of $3034, as it sets off for $4000' - ZeroHedge
👉🏽'We have just witnessed the biggest drop in US equity allocation on record. The collapse of US consumers: Unemployment expectations in the US are now ABOVE 2020 levels and at their highest since 2008. In 2024, a poll showed that a whopping 56% of Americans thought the US was in a recession.' - TKL
https://i.ibb.co/ycnRDpdf/Gm-VZMnb-XAAAt76r.png
👉🏽OECD Projects Argentina to Have the Second Highest Economic Growth Worldwide in 2025
👉🏽A new blow to the Dutch chemical sector. The major producer LyondellBasell is permanently closing its factory at the Maasvlakte. This decision, announced on Tuesday afternoon, will result in the loss of approximately 160 jobs. The closure is a direct consequence of global overcapacity and high energy costs in the Netherlands. An audit by the German firm E-Bridge, commissioned by the Dutch government, previously revealed that electricity costs for these companies in the Netherlands amount to €95 per megawatt-hour. In comparison, this rate is €32 in France (66% lower), €45.60 in Germany (52% lower), and €56.05 per megawatt-hour in Belgium (41% lower).
According to E-Bridge, this difference is mainly due to the compensation that foreign governments provide to companies and the lower grid tariffs. In the Netherlands, costs have risen primarily to finance investments in the electricity grid, such as connecting multiple offshore wind farms.
Now read that segment on offshore wind farms. Mindblowing, innit?
Subsidies are not the solution—deregulation is. But Brussels won’t allow that. So, we’re heading toward even more regulation and nationalization.
On the 19th of March:
👉🏽The Fed makes multiple revisions to its 2025 economic data projections.
Powell finally found the "stag" and the "inflation":
Fed cuts year-end GDP forecast from 2.1% to 1.7%
Fed raises year-end core PCE forecast from 2.5% to 2.8%
Fed raises year-end unemployment forecast from 4.3% to 4.4%
Fed raises PCE inflation forecast from 2.5% to 2.7%
The Fed sees higher inflation and a weaker economy.
On the 20th of March:
Dutch Central Bank Director Klaas Knot "We are worried about American influence on our local payment infrastructure."
Paving the way for the European CBDC (after slowly but surely removing CASH MONEY from society).
Knot has completed his second term and will leave his office in July. Now, of course, pushing for the CBDC, before looking for a new job in Europe.
Anyway, DNB posts billions in losses. De Nederlandsche Bank suffered a loss of over €3 billion last year, according to the annual report published on Thursday. This marks the second consecutive year of losses.
DNB incurs this loss because, as part of its monetary policy, it has lent out billions at relatively low rates while having to pay a higher rate to banks that park their money at the central bank.
But no losses on its gold. The gold reserves, meanwhile, increased in value by €12.6 billion. This amount is not included in the official profit and loss statement but is reflected on the bank's balance sheet.
For the Dutch readers/followers: Great article: Follow the Money 'Voor de megawinsten van ING, ABN Amro en Rabobank betaalt de Nederlandse burger een hoge prijs.'
https://archive.ph/ncvtk
On the 21st of March:
👉🏽'The Philadelphia Fed Manufacturing index dropped 5.6 points in March, to 12.5, its 2nd consecutive monthly decline. 6-month outlook for new orders fell by 30.8 points, to 2.3, the lowest in 3 years. This marks the third-largest drop in history, only behind the 2008 Financial Crisis and December 1973.
Furthermore, 6-month business outlook dropped ~40 points to its lowest since January 2024.
All while prices paid rose 7.8 points, to 48.3, the highest since July 2022. This is further evidence of weakening economic activity with rising prices.' TKL
👉🏽'China’s central bank gold reserves hit a record 73.6 million fine troy ounces in February. China bought ~160,000 ounces of gold last month, posting their 4th consecutive monthly purchase. Over the last 2.5 years, China’s gold reserves have jumped by 11.0 million ounces of gold. Gold now reflects a record ~5.9% of China’s total foreign exchange reserves, or 2,290 tonnes. Central banks continue to stock up on gold as if we are in a crisis.' -TKL
🎁If you have made it this far I would like to give you a little gift:
What Bitcoin Did: BITCOIN & THE END OF THE DOLLAR SYSTEM with Luke Gromen They discuss: - The Sovereign Debt Crisis - If the US Will Reprice the Gold - If we will See Triple Digit Inflation - The End of The US Dollar System Luke Gromen: A modest clarification: The end of the post-71 structure of the USD system is what the Trump Administration’s actions appear to be pursuing & will in due time achieve if they stay on the present course. https://t.co/IpakFaYqbL
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly.
Use the code SE3997
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple. ⠀⠀⠀⠀ ⠀ ⠀⠀⠀
Do you think this post is helpful to you? If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
@ 04c915da:3dfbecc9
2025-03-26 20:54:33Capitalism is the most effective system for scaling innovation. The pursuit of profit is an incredibly powerful human incentive. Most major improvements to human society and quality of life have resulted from this base incentive. Market competition often results in the best outcomes for all.
That said, some projects can never be monetized. They are open in nature and a business model would centralize control. Open protocols like bitcoin and nostr are not owned by anyone and if they were it would destroy the key value propositions they provide. No single entity can or should control their use. Anyone can build on them without permission.
As a result, open protocols must depend on donation based grant funding from the people and organizations that rely on them. This model works but it is slow and uncertain, a grind where sustainability is never fully reached but rather constantly sought. As someone who has been incredibly active in the open source grant funding space, I do not think people truly appreciate how difficult it is to raise charitable money and deploy it efficiently.
Projects that can be monetized should be. Profitability is a super power. When a business can generate revenue, it taps into a self sustaining cycle. Profit fuels growth and development while providing projects independence and agency. This flywheel effect is why companies like Google, Amazon, and Apple have scaled to global dominance. The profit incentive aligns human effort with efficiency. Businesses must innovate, cut waste, and deliver value to survive.
Contrast this with non monetized projects. Without profit, they lean on external support, which can dry up or shift with donor priorities. A profit driven model, on the other hand, is inherently leaner and more adaptable. It is not charity but survival. When survival is tied to delivering what people want, scale follows naturally.
The real magic happens when profitable, sustainable businesses are built on top of open protocols and software. Consider the many startups building on open source software stacks, such as Start9, Mempool, and Primal, offering premium services on top of the open source software they build out and maintain. Think of companies like Block or Strike, which leverage bitcoin’s open protocol to offer their services on top. These businesses amplify the open software and protocols they build on, driving adoption and improvement at a pace donations alone could never match.
When you combine open software and protocols with profit driven business the result are lean, sustainable companies that grow faster and serve more people than either could alone. Bitcoin’s network, for instance, benefits from businesses that profit off its existence, while nostr will expand as developers monetize apps built on the protocol.
Capitalism scales best because competition results in efficiency. Donation funded protocols and software lay the groundwork, while market driven businesses build on top. The profit incentive acts as a filter, ensuring resources flow to what works, while open systems keep the playing field accessible, empowering users and builders. Together, they create a flywheel of innovation, growth, and global benefit.
-
@ 7d33ba57:1b82db35
2025-03-26 20:26:11L'Ampolla is a charming fishing village on the Costa Dorada, known for its pristine beaches, fresh seafood, and proximity to the Ebro Delta Natural Park. With a relaxed Mediterranean atmosphere, it’s an ideal destination for nature lovers, foodies, and beachgoers.
🏖️ Top Things to See & Do in L'Ampolla
1️⃣ Beaches of L'Ampolla 🏝️
- Platja de l'Arenal – A long, shallow sandy beach, perfect for families.
- Platja Cap-Roig – A stunning cove with reddish cliffs and crystal-clear waters.
- Platja dels Capellans – A quiet beach, ideal for relaxation.
2️⃣ Ebro Delta Natural Park 🌿
- A UNESCO Biosphere Reserve home to wetlands, rice fields, and flamingos.
- Go birdwatching, cycling, or take a boat tour along the Ebro River.
- Try kayaking through the peaceful waterways.
3️⃣ Coastal Hiking & Biking 🚶♂️🚴
- Follow the GR-92 coastal trail for breathtaking sea views.
- Enjoy the Camí de Ronda, a scenic path linking L'Ampolla with nearby beaches.
4️⃣ Fishing & Seafood Gastronomy 🎣🍽️
- Visit the port to see traditional fishing boats bring in the daily catch.
- Enjoy fresh oysters, mussels, and paella in seaside restaurants.
5️⃣ Mirador de Bassa de les Olles 🌅
- A beautiful viewpoint with fantastic views of the Ebro Delta lagoons.
- Best visited at sunset for a magical experience.
🍽️ What to Eat in L'Ampolla
- Arròs negre – Black rice with squid ink 🍚🦑
- Fideuà – A seafood noodle dish, similar to paella 🍤
- Oysters & mussels from the Ebro Delta 🦪
- Anguila en suquet – Eel stew, a local specialty 🐟
- Crema Catalana – A delicious caramelized custard dessert 🍮
🚗 How to Get to L'Ampolla
🚆 By Train: Direct trains from Barcelona (2 hrs), Tarragona (1 hr), and Valencia (2.5 hrs)
🚘 By Car: ~1.5 hrs from Barcelona, 45 min from Tarragona
🚌 By Bus: Regional buses connect L'Ampolla with Tarragona and Tortosa
✈️ By Air: Closest airports – Reus (REU, 70 km) and Barcelona-El Prat (BCN, 150 km)💡 Tips for Visiting L'Ampolla
✅ Best time to visit? Spring and summer for the best weather ☀️
✅ Try local seafood – Some of the best in Catalonia 🍽️
✅ Visit the Ebro Delta early – Fewer crowds and better wildlife spotting 🦩
✅ Rent a bike – The best way to explore the coastal and natural areas 🚲 -
@ 6b3780ef:221416c8
2025-03-26 18:42:00This workshop will guide you through exploring the concepts behind MCP servers and how to deploy them as DVMs in Nostr using DVMCP. By the end, you'll understand how these systems work together and be able to create your own deployments.
Understanding MCP Systems
MCP (Model Context Protocol) systems consist of two main components that work together:
- MCP Server: The heart of the system that exposes tools, which you can access via the
.listTools()
method. - MCP Client: The interface that connects to the MCP server and lets you use the tools it offers.
These servers and clients can communicate using different transport methods:
- Standard I/O (stdio): A simple local connection method when your server and client are on the same machine.
- Server-Sent Events (SSE): Uses HTTP to create a communication channel.
For this workshop, we'll use stdio to deploy our server. DVMCP will act as a bridge, connecting to your MCP server as an MCP client, and exposing its tools as a DVM that anyone can call from Nostr.
Creating (or Finding) an MCP Server
Building an MCP server is simpler than you might think:
- Create software in any programming language you're comfortable with.
- Add an MCP library to expose your server's MCP interface.
- Create an API that wraps around your software's functionality.
Once your server is ready, an MCP client can connect, for example, with
bun index.js
, and then call.listTools()
to discover what your server can do. This pattern, known as reflection, makes Nostr DVMs and MCP a perfect match since both use JSON, and DVMs can announce and call tools, effectively becoming an MCP proxy.Alternatively, you can use one of the many existing MCP servers available in various repositories.
For more information about mcp and how to build mcp servers you can visit https://modelcontextprotocol.io/
Setting Up the Workshop
Let's get hands-on:
First, to follow this workshop you will need Bun. Install it from https://bun.sh/. For Linux and macOS, you can use the installation script:
curl -fsSL https://bun.sh/install | bash
-
Choose your MCP server: You can either create one or use an existing one.
-
Inspect your server using the MCP inspector tool:
bash npx @modelcontextprotocol/inspector build/index.js arg1 arg2
This will: - Launch a client UI (default: http://localhost:5173)
- Start an MCP proxy server (default: port 3000)
-
Pass any additional arguments directly to your server
-
Use the inspector: Open the client UI in your browser to connect with your server, list available tools, and test its functionality.
Deploying with DVMCP
Now for the exciting part – making your MCP server available to everyone on Nostr:
-
Navigate to your MCP server directory.
-
Run without installing (quickest way):
npx @dvmcp/bridge
-
Or install globally for regular use:
npm install -g @dvmcp/bridge # or bun install -g @dvmcp/bridge
Then run using:bash dvmcp-bridge
This will guide you through creating the necessary configuration.
Watch the console logs to confirm successful setup – you'll see your public key and process information, or any issues that need addressing.
For the configuration, you can set the relay as
wss://relay.dvmcp.fun
, or use any other of your preferenceTesting and Integration
- Visit dvmcp.fun to see your DVM announcement.
- Call your tools and watch the responses come back.
For production use, consider running dvmcp-bridge as a system service or creating a container for greater reliability and uptime.
Integrating with LLM Clients
You can also integrate your DVMCP deployment with LLM clients using the discovery package:
-
Install and use the
@dvmcp/discovery
package:bash npx @dvmcp/discovery
-
This package acts as an MCP server for your LLM system by:
- Connecting to configured Nostr relays
- Discovering tools from DVMCP servers
-
Making them available to your LLM applications
-
Connect to specific servers or providers using these flags: ```bash # Connect to all DVMCP servers from a provider npx @dvmcp/discovery --provider npub1...
# Connect to a specific DVMCP server npx @dvmcp/discovery --server naddr1... ```
Using these flags, you wouldn't need a configuration file. You can find these commands and Claude desktop configuration already prepared for copy and paste at dvmcp.fun.
This feature lets you connect to any DVMCP server using Nostr and integrate it into your client, either as a DVM or in LLM-powered applications.
Final thoughts
If you've followed this workshop, you now have an MCP server deployed as a Nostr DVM. This means that local resources from the system where the MCP server is running can be accessed through Nostr in a decentralized manner. This capability is powerful and opens up numerous possibilities and opportunities for fun.
You can use this setup for various use cases, including in a controlled/local environment. For instance, you can deploy a relay in your local network that's only accessible within it, exposing all your local MCP servers to anyone connected to the network. This setup can act as a hub for communication between different systems, which could be particularly interesting for applications in home automation or other fields. The potential applications are limitless.
However, it's important to keep in mind that there are security concerns when exposing local resources publicly. You should be mindful of these risks and prioritize security when creating and deploying your MCP servers on Nostr.
Finally, these are new ideas, and the software is still under development. If you have any feedback, please refer to the GitHub repository to report issues or collaborate. DVMCP also has a Signal group you can join. Additionally, you can engage with the community on Nostr using the #dvmcp hashtag.
Useful Resources
- Official Documentation:
- Model Context Protocol: modelcontextprotocol.org
-
DVMCP.fun: dvmcp.fun
-
Source Code and Development:
- DVMCP: github.com/gzuuus/dvmcp
-
DVMCP.fun: github.com/gzuuus/dvmcpfun
-
MCP Servers and Clients:
- Smithery AI: smithery.ai
- MCP.so: mcp.so
-
Glama AI MCP Servers: glama.ai/mcp/servers
Happy building!
- MCP Server: The heart of the system that exposes tools, which you can access via the
-
@ b12e2899:ed9d9c8b
2025-03-26 17:33:37I have completely switched to Nostr and today am going to share my experience, which may be useful to those of you who want to launch a bot on a social network and encounters censorship. The thing is Nostr is ideal for this, but first things first:
It all started when I suddenly woke up to see my twitter bot @cryptoratingbot suspended without any explanation. I contacted support, but they apparently considered my case too insignificant to even respond. The goal of my bot was to attract users and provide free tools like charts.xport.top, tickerbell.xport.top and few others that you can find out about in my previous publications. It worked, and accumulated all in all around 60k engagement a year. Silly, right? You can do this in two days doing it the right way. But I was in no hurry. Overall I gained 10 new users per day and that was enough for me to begin with since I wasn’t prepared for the big wave of users. But that is not the topic for today. I can tell you more about this later on, if you are interested click like and subscribe.
I was planning to buy a premium, but then twitter suspended my bot which actually didn’t do anything bad if you think about it. Furthermore, it was useful, otherwise why would people use it and like its tweets. Anyway, this ruined my plans and forced me to think about switching to Nostr. Today I can tell that it was definitely worth it! I haven’t lost anything, except time and overall gained from it! But I won’t say too much, so as not to bore you. However, this context is important for a better understanding of my situation. There are much more details and if you have any questions, feel free to ask, I will try to answer everyone.
Hard to believe, but these things can help you make money from buying cryptocurrency on the bottoms in a right time just when it starts trading, if you understand what you’re doing. That’s not easy. Maybe I will share some thoughts later on, until then you may find more info in my previous articles.
In fact, I decided to write this because for the first time since I was introduced to Nostr I finally tried proof-of-work(nip-13 pow) myself and I love it! I see such a thing for the first time on a social media. No moderation or censorship measures are needed. After all, if you are ready to burn resources to publish events, then it is definitely not a spam. And that’s the beauty of it!
I’ve picked 7 relays to try and publish 5000+ events that my previous version collected from top 12 cryptocurrency exchanges. Two relays rejected those events after some time, most likely because as always I have forgot to add something crucial — nonce tag, to help relays understand I am using pow. I thought it would add it itself, but seemes that it wouldn’t. What a shame! However, other 5 relays are ok with that! Maybe because I wasn’t publishing events too often, I don’t know, but anyway the more freedom the more I love it! And if you want find more about relays you can use use nostrwat.ch which is the greatest resource for finding the best relays to use.
While I was writing this article, another few relays dropped connections, but that’s fine, I have selected 7 relays out of about 700 active online.
This is how my server statistics looks like:
So, besides everything else, I also checked Netcup root server G11 stats. In my opinion, this is the best of all that I have ever dealt with. And this is not an advertisement, no. I found this company on my own, just watching how Nostr relays works in terms of price/quality, so this is my personal recommendation. But if you think you know better root server solutions please let me know in the comment below.
The only disadvantage I have encountered is you can wait for their support for few days to answer, but that’s ok if you know what you’re doing. I have no problem with this. I try to be careful and there were no problems for two months since I ordered it and use it on the daily basis.
In short, this is my journey. Don’t scold me for this. It’s just that I’ve been saving all this up for a long time, and today I realized that I simply have to tell you about it!
Thank you all and see you soon! Cheers 🍻
-
@ ff517fbf:fde1561b
2025-03-26 16:48:41フアン・ラモン・ラッロ氏は、スペイン出身の経済学者・作家であり、自由市場経済とリベラルな思想の提唱者として知られています。彼は、国家による過剰な介入や財政政策の問題点を鋭く分析し、自由主義の基本原則に基づく社会の実現を目指す論考や著作を多数発表しています。数多くのメディアや学会で講演を行い、現代社会における経済政策や公共の役割について、国際的な議論にも影響を与えている人物です。
皆様、こんばんは。そして、Andorra Economic Forumの皆様、本日はご招待いただき誠にありがとうございます。
本日の講演では、これまで私が持ち続けてきた見解、すなわち、より自由で、より繁栄するために、スペイン及び世界において自由主義革命がなぜ必要であり、さらには急務であるのかという理由をお伝えしたいと思います。また、現代国家が、ストックホルム症候群のような論理に我々を陥れており、その結果、国家が我々の自由を体系的に制限し、財産を構造的に攻撃している状況を、ほとんどの人々が抗議もせず、またはその非常事態性すら意識していないという現実をどのように理解すべきかについても触れます。まず初めに、皆様のご反応から察するに、これは既知の内容に感じられるかもしれませんが、自由主義の基本原則、すなわち四つの基本的な考えを確認させていただきます。どのようにして、社会生活と、各個人が自らの人生計画を追求するための自律性とを両立させ、かつ、個々の自律性が打ち消されるような一個または多数の専制に服従することなく生きることができる社会が成立するのでしょうか? それは、協力と共存が可能な社会の中で、各人が自己の利益を追求し、同時に他者の利益追求を尊重するための基本原則、すなわち以下の四つの原則によって支えられているのです。
第一に、個人の自由、すなわち他者の行動を踏みにじることなく自ら行動するという、いわゆる非攻撃の原則です。自分が望むことは何でもできますが、他者が望むことをするのを妨げてはならず、また、他者があなたの望むことを妨げることも許されないのです。
第二に、私有財産です。平和的に獲得し、平和的に自らのものとしたものはあなたのものであり、それによって自由に行動し、自らの人生計画や行動計画を追求する手段となります。もしも、これらの計画遂行に必要な手段が恣意的に奪われるならば、それはあなたの個人の自由、すなわち自らの人生計画を追求する自由を侵害することになるのです。
第三に、契約の自律性です。あなたは第三者と自由に合意を結ぶことができます。もちろん、第三者を攻撃することは許されませんが、双方が望むことについて自発的に合意することは可能です。合意は、当事者間の私法上の契約であり、両者が履行すべき約束であり、第三者が介入してこれを正当化したり否定したりするものではありません。ただし、合意の内容は、あくまで当事者双方やその所有物にのみ影響を及ぼすものです。
そして最後に、広義の意味での結社の自由です。個人は、契約上、望むことについて合意するだけでなく、共に生活する方法や、ある程度安定した形で組織される方法を合意することも明示的に可能です。これらの原則は、しばしば国家によって保証されると言われます。なぜなら、国家がなければ、法体系も安全保障機関も存在せず、個人の自由、私有財産、契約の履行、そして結社の自由を保障するものが何もないと思われがちだからです。とはいえ、確かにある程度の国家は、警察国家としてこれらの基本的な社会的共存の規範を保証するために必要かもしれませんが、私たちが必要としているのは、単にこれらの自由主義社会の原則と自由な人々の相互作用が尊重されることを確保するための、巨大かつ過剰な国家ではありません。
実際、国家が大きくなるほど、つまり社会における国家の存在感が増すほど、これらの原則は侵害されがちです。なぜなら、国家は恣意的に規制を強化し、税金を引き上げることで、たとえ他者に損害を与えなくとも、個人が望むように行動する自由を阻み、また、私有財産を強制的に奪い、当事者間の取引を妨げ、さらには、結社および脱会の自由さえも制限してしまうからです。たとえば、誰かが既存の国家から離れ、他の国家に参加したり、あるいは新たな国家や政治共同体を形成して自らを組織しようとした場合でさえ、現行の国家はそれを認めないのです。
さて、これらの自由主義の基本原則は、各個人の計画や人生のプロジェクトが社会の中で花開くために必要不可欠なものであり、現代国家によって体系的に侵害されているのです。しかし、現代国家とは、必ずしも常に我々と共にあった国家ではありません。私たちは、今日のようなメガ国家、ハイパーステート、過剰に肥大化した国家をある程度は当たり前のものとして受け入れてしまっていますが、これらは唯一の政治的選択肢ではなく、歴史を通じて存在してきた唯一の政治現実でもないのです。
ここで、主要な西洋諸国における国家の社会に占める重みの変遷について、皆様にご覧いただければと思います。今日、国家の重みは国によって大きな違いはないものの、概ね国内総生産(GDP)の40〜50%を占めています。中には、例えばフランスのようにGDPの60%に達する国もあります。国家が社会的調和や幸福の保証とされることは稀であり、実際、フランスは世界最大の国家を有しながら、またはそのために、今最も分断され混沌とした国の一つとなっています。
しかし、現状、国家はGDPの40〜50%、すなわち社会が毎年生み出す生産の約半分を吸収し、再分配または政治層や官僚階級が決定した形で消費しているのです。これは常にそうであったわけではありません。19世紀、ひいては第一次世界大戦前までは、近代先進国における国家の経済的重みはGDPの5〜10%程度に過ぎなかったのです。
例えば、アメリカ合衆国では第一次世界大戦前、国家のGDPに占める割合は3〜4%でしたし、今日巨大な社会民主主義国家となっているスウェーデンでさえ、かつてはGDPの5%程度でした。すなわち、国家というものが必然的に経済の半分を占めなければならないというわけではなく、これは徐々に積み重ねられてきたプロセス、いわばゆっくりと沸騰させられるカエルのようなものです。第一次世界大戦後、国家の経済に対する重みは大幅かつ確固たる上昇を見せ、さらに第二次世界大戦後には、急激かつ持続的な上昇を経て、1970年代以降、現在の水準にまで達したのです。
ちなみに、ここで我々がしばしば耳にする「国家が後退しているから、我々は新自由主義の時代にいる」というレトリックが、いかに毒性がありずる賢いものであるかにも注目してください。過去40年間で、グラフ上に国家の重みが大幅に後退したと示す兆候は見当たりません。ある時点で国家のGDPに占める割合が1〜2%減少することがあったとしても、200年の間にGDPの5%から50%へと増加し、現在は概ね50%前後に留まっているのです。国家が後退し、民間部門がすべてを占めるようになっている、というのは全く逆の現象です。
実際、多くの人は、国家が拡大し続けるのが当然であり、もし急速な成長が見られなければ、国家は後退していると考えがちです。しかし、国家は既にそれ以上大きく成長する余地がほとんどないのです。もちろん、GDPの60%、70%、80%にまで達すれば、直接的または間接的な社会主義経済になってしまいます。
そして、なぜ国家はこれほどまでに成長したのでしょうか。急激な国家拡大を説明する基本的な要因の一つは、福祉国家の発展です。つまり、かつては国家が提供していた医療、社会保障(年金、事故保険など)や教育といったサービスの国家による提供が、福祉国家として大きく発展したのです。
ご覧の通り、1930年代や第二次世界大戦後までは社会保障費は非常に低い水準にありましたが、特に第二次世界大戦後からは、GDPの20〜30%にまで急上昇しました。これらはかつて、市民社会や市場を通じ、または必ずしも商業的な交換を介して提供されていた、労働組合などが担っていた社会保障の役割を、国家が吸収していったものです。労働組合は国家から独立し、時には国家に対抗しながら、社会保障の機能を果たしていたのですが、その役割が国家に吸収されることで、我々は国家に依存するようになってしまったのです。
なぜなら、社会保障費は支出であり、中には「依存費用」とも呼ばれるものもあります。たとえば、老後に収入がなくなった時や、何らかの障害によって収入が得られなくなった時のために、個人の貯蓄から基金を積み立てる場合、その基金が自分自身で管理されるなら自律的ですが、国家が管理すれば、私たちは国家に全く依存することになってしまうのです。国家が消滅するか、大幅な予算削減が行われれば、我々は何も残らないのです。結果として、国民は容易には消えない国家の爪痕に囚われることになるのです。公共年金制度の問題を考えてみてください。現代の先進国家において、公共年金制度は最も大きな支出項目の一つです。
では、どうすれば公共年金制度を解体できるのでしょうか。どうすれば、必要以上に介入してきた国家、例えばアメリカ合衆国では大恐慌期(1930年代)に、必要がなかったのに介入してきた国家を、その状況から脱却させることができるのでしょうか。設立当初は、ある一定の年齢に達した者には一定額の年金を支給すると約束し、その費用を現在働いている者への税負担によって賄うというシステムでした。
システムの構築は、当時の平均寿命がかなり低く、支給期間が2~3年程度であったため、比較的容易で安価に行われたのですが、システムが一度確立され、世代を超えた労働者の貯蓄能力を事実上奪う形で構築された今、どうやってそれを解体すればよいのでしょうか。もし「年金は支給されなくなるのか」と言えば、かつて生産期に労働者の給与のかなりの部分を国家が吸収し、貯蓄を阻害していた結果、何百万人もの人々が貧困に陥ることになるのです。
じゃあ、もう引退されている皆さんは年金を受け取ることになりますが、現役世代がその年金の費用を負担し、そして自分たちが引退する時には年金を受け取ることができなくなるのです。つまり、この世代からは何の対価もなく、給与のごく大部分が没収されることになるというわけです。これをどうやって解体するつもりですか? 決して容易なことではありません。
また、例えば医療制度についても同様です。若者にとっては医療制度の解体はそれほど難しくないように見えるかもしれませんが、貯蓄がなく、保険にも加入していない高齢者にとって、もし今、公共医療制度が終了し、年齢とともに医療費が指数関数的に上昇するために通常以上の医療費が発生すると告げられたら、彼らはその医療費にどう対処すればよいのでしょうか? 彼らは、公共医療制度が機能するという説明のもとに、その医療費が賄われると予め想定し、税金を支払っていたのです。
これをどう逆転させるか? もちろん、即座に行えることではありませんが、時間をかけた移行措置として行っていかなければなりません。だからこそ、国家はこの道を通じて成長し続け、社会がますます国家による再分配に依存するようになることで、国民の自律性を奪っていくのです。
ちなみに、現代福祉国家の発明者の一人であるのは、プロイセン出身のドイツの首相オットー・フォン・ビスマルクです。彼の回顧録――つまり、批判的ではない親しい記者によって書かれた回顧録――によれば、ビスマルクは、公共年金制度を創設することで労働者階級を国家に依存させ、労働者が国家に対して反抗しないように仕向けたと説明しています。当時、反抗は、いわば反資本主義的な行為とみなされていたのです。彼は、国家主義を維持するためではなく、「労働者には社会主義的傾向がある。では、どうすれば労働者を手なずけることができるのか?」という視点から、公共年金制度を利用したのです。同様に、労働者は公共年金制度を通じて、または国家に対抗する形で手なずけられるのです。そして、現状はこの通りになっています。
そこで、皆さんは疑問に思うかもしれません。この何世代にもわたって築かれてきた巨大国家は、具体的にどのような機能を果たしているのでしょうか? その資金はどこに行っているのか? この巨大国家は何に対して支出をしているのか? ここに、2022年の欧州連合各国の平均、すなわちGDPの50%という数字があります。スペインの場合も2022年時点で大きな差はなく、GDPの47%を支出しているため、概ね代表的な数値といえます。さて、この50%のうちの20%は社会保障費、主に年金費用(老後だけでなく、遺族、障害、孤児などに関する給付も含む)です。これに加え、比較的低コストな非拠出型給付も存在します。次に、スペインの場合は約7.7%、すなわち7〜8%が医療費、6%が官僚機構の運営費用、そして何よりも重要なのが公債の利子支払い費用です。さらに6%は経済政策に充てられ、例えばインフラ整備や農業支援などが含まれています。教育に関しては、公立教育や協定校を含めて約4.7%、環境保護は0.8%(これは必ずしも気候政策だけでなく、森林の管理なども含む)、住宅や地域サービスが1%、そして余暇、文化、宗教に関しては1.1%となっています。これらは、メディアや文化、宗教団体への補助金などとして支出されています。
かつて、リベラルな最小国家、例えばアメリカではGDPの3%程度であった国家がありました。なぜなら、当時は上記のような広範な機能を持たず、防衛(GDPの1.3%)と治安・司法(GDPの1.7%)に集中していたからです。つまり、19世紀にGDPの3%を占めていた国家が、現在もその核となる部分は同じ3%のままであるということです。国家が高価になったわけではなく、19世紀に存在した国家のコストは大体同じであったにもかかわらず、現代国家は19世紀よりもはるかに多くの機能を担っているため、多くの税金が必要とされているのです。もちろん、すべては税金で賄われています。
では、いったいどれだけの税金が支払われているのでしょうか。ここでは、国民が被っている税負担の実態について十分に認識されていないのではないかと思います。もしその実態が明らかになれば、社会的不服従が起こるでしょう。国家は、税の実感を曖昧にするための手段を多数用いているのです。例えば、さまざまな理由で税金を徴収する仕組みです。「この項目に対して税金を払え」と一律に要求するのではなく、「稼いだ金額、支出、保有資産、さらには支出全体に対して税金を課す」といった形で、複数の種類の税金を同時に適用します。消費全体に対して一律に税金を課すのではなく、付加価値税(IVA)やその他の特別税など、多岐にわたる特別な税金が存在し、相続税に至るまで多岐に渡ります。
さらに、我々はさまざまな側面で税金を支払っているにもかかわらず、その実感すら持っていないこともあります。たとえば、関税はその値上がり分を商品の価格に転嫁されるため、意識されにくいのです。付加価値税が上がっても、スーパーなどが告知しない限り、私たちはその上昇に気づきにくいのです。また、税負担を一度にまとめて徴収するのではなく、分散して給与から差し引くことで、その実感を薄めています。かつては、年間に稼いだ金額に対して一括で所得税(IRPF)を支払うのが普通でしたが、現代では分割して徴収されるため、納税者は自分がどれだけの税金を支払っているのかを実感しにくいのです。ちなみに、IRPFの源泉徴収制度は、第二次世界大戦中にリベラルのミルトン・フリードマンによって考案されたものです。つまり、敵はしばしば自国に潜むものでもあるということです。
ここで示したのは、平均的な支出額です。スペイン国家のすべての財政収入を国民または労働者で割ると、国民一人あたりの国家負担のおおよそのコストが見えてきます。実際には公共赤字、すなわち収入以上に支出している部分もあり、その分は将来の税負担として転嫁されるため、実際のコストはさらに大きくなります。ここでは、現状で国民から徴収されている税金のみを取り上げています。なお、これらの数字はインフレーションを考慮していないため、2001年と2024年の数字を直接比較することはできませんが、ここでは2024年現在の状況に焦点を当てています。現在、平均してスペイン国民一人あたり、約15,000ユーロの税負担がかかっているのです。つまり、一般的には夫婦と子供一人の家庭で約50,000ユーロの税金が支払われている計算になります。労働者という視点に立てば、実際に税金を支払っているのは、平均で30,000ユーロ以上にのぼります。もちろん、高所得者層が多くを負担しているという見方もありますが、これは平均値であり、平均値は必ずしも実態を正確に反映するものではありません。
さて、労働者一人あたりの支払いを、かなり寛大な見積もりで考えてみましょう。スペインにおける現在の中央値の給与は22,400ユーロです。しかし、この22,400ユーロという数字が給与明細に反映される前に、企業側がすでに支払っている社会保険料が約7,000ユーロ存在しています。つまり、実際の中央値の給与は29,000ユーロ、ほぼ30,000ユーロであるべきものですが、この30,000ユーロは労働者自身が実感できるものではありません。そして、たとえ「実際は自分のものである」と伝えても、「それは企業が支払っているものであって、自分が支払っているわけではない」と言われ、自己欺瞞に陥るのです。結局のところ、実際に支払っているのは自分自身なのです。
実際、30,000ユーロの実質報酬を基にすると、そこから7,000ユーロが差し引かれて、給与明細に表示されるのは22,400ユーロです。さらに、労働者側の社会保険料として約1,500ユーロを追加で支払い、所得税(IRPF)が約3,000ユーロ、さらに消費に応じた間接税が最低でも約2,000ユーロ(場合によってはそれ以上)かかります。さらに、ここでは取り上げていない他の国家への支払い、たとえば不動産税(IBI)やサービス料、共済負担金なども存在します。結果として、中央値の労働者は、本来約30,000ユーロあるべき給与のうち、税引き後に手元に残るのは約15,800ユーロに過ぎないのです。つまり、ほぼその半分が国家によって吸収されていることになります。年間で見ると、さまざまな税金、特に社会保険料、所得税、そして間接税として、合計約13,400ユーロが徴収されているのです。
このように、中央値の労働者は、所得分布の中央に位置しており、非常に多くの人々が彼より少なく、また多く稼いでいる人もいます。だからこそ、中央値の労働者が支払っている税負担、すなわち年間約13,400ユーロという数字は、スペイン国民に対して行われている極めて大規模な税負担の実態を物語っています。これにより、国家から提供されるサービスが強制的に受け入れられているのです。
果たして、これは必然なのでしょうか? 歴史的に見れば必ずしもそうではなく、また現代においても地域によって差があります。つまり、労働者が生み出す富の半分以上を国家が吸収するという、巨大な国家が当然であるという考え方は、今後も続くものではありません。ここには、異なる繁栄度を持つ国々が存在し、一般的に発展した国々であっても、欧州やアメリカのような国家に比べ、国家の規模はかなり小さく抑えられている国もあります。しばしば「スペインの国家規模は欧州平均より小さい」と言われますが、欧州平均自体が、プロの略奪者たちのクラブのようなものなのです。従って、欧州平均という水準と比較するのではなく、もっと控えめな国家規模を持つ国々や、税負担の貪欲さが制限された国々と比較すべきです。
例えば、ヨーロッパ内ではスイスがあります。偶然かどうかはさておき、スイスはヨーロッパで最も豊かな国の一つでありながら、国家のGDPに占める割合は33%と、欧州やアメリカに比べて10〜15ポイント低いのです。また、香港や韓国はGDPの28%、チリはこの分類の中では最も貧しいかもしれませんが約26%、台湾は16%、そして世界で最も豊かな国であるシンガポールは15%です。シンガポールや台湾は、国家がGDPの15〜16%という小規模な状態で十分に現代社会の機能を果たしているのです。もちろん、シンガポールの場合は都市国家であるため、経済規模のメリットもあるでしょうが、公共支出の大部分が社会保障に回っている現状を鑑みると、都市規模か大国家かは大した違いがないのです。むしろ、シンガポールや台湾のように、GDPに対して国家の規模が30ポイントも低い国の方が、国家による私有財産の侵害が少ないと言えます。
したがって、もし大規模な国家による大規模な略奪を回避でき、しかも機能的には他の国と同等以上に運営できるのであれば、当然、より少ない税負担で、なおかつより効率的な公共サービスを提供する国家の方が望ましいのです。実際、国家が何でもかんでも行おうとすれば、その多くは非効率にならざるを得ません。一方で、企業がすべてを行おうとしても、専門分野に特化した他の企業に競争で敗れるため、最終的には消費者がより良いサービスを選ぶことになるのです。問題は、国家の場合、国民が国家から自由に離脱し、同じサービスを提供する他の組織と契約する余地がないという点にあります。国民は、非常に非効率かつ高コストな国家サービスに縛られており、選択の余地がないのです。したがって、もし小規模で効率的な国家が存在すれば、それは大規模で税負担の重い国家よりも好まれるはずです。
そして、もし国家が回収するGDPの割合が30ポイントも大きいのであれば、それは明らかに国民の私有財産を暴力的に侵害していると言わざるを得ません。ですから、もし国家による大規模な略奪を回避し、かつ他国と同等以上の機能を果たすことが可能であれば、国家は少なくとも縮小されるべきです。なぜなら、そうした国家は国民にとって好都合であるだけでなく、公共サービスの質も向上し、効率的に運営されるからです。結局のところ、すべては国家ではなく、国家に寄生する巨大な官僚組織の福祉が優先されているのです。
もし、あなたの社会にこれほど大きく根付いた寄生虫が存在するならば、その寄生虫は当然、去ろうとはしません。むしろ、さらに大きな植民地を形成しようとするでしょう。これが、国家が成長し続ける理由であり、そして、血を吸い上げるこの寄生虫と戦う必要性が生じる所以なのです。
別のシナリオを考えてみましょう。つまり、現代社会における国家の規模を実質的に縮小するという仮定を立て、その実現可能性や現実味について見極めるためです。これまでに、ヨーロッパにおける現代国家の重みがGDPの50%に達していること、その内訳を示してきました。さて、かつての状況を想像してみてください。あの時代は、科学フィクションのようなことは必要なく、医療はゼロ、経済政策も実質ゼロで、民間部門が構築できないインフラだけが、もしあれば驚くほど僅か、GDPの1%程度だったのです。教育はゼロ、防衛と公共秩序は維持されるものの、余暇・文化・宗教への補助金はゼロでした。地域サービスや環境保護に関しては、下水道、街路灯、森林の維持管理など必要な分は残され、官僚組織も非常に大幅に縮小され、社会保障も一部のみが残されていました。
さて、しばしば「国家は富裕層からお金を奪い、貧困層へ再分配するために存在する」と言われますが、実際、社会保障はGDPの20%に相当します。ここで、極端な貧困を防止するために本当に必要な支出額を計算してみましょう。そうすれば、皆さんも、このGDPの20%は貧困撲滅のためのものではなく、むしろ国家が横方向の所得再分配システムを通じて国民を捕らえ続けるためのものであると気づくでしょう。すなわち、国家はあなたからお金を取り、そのお金を自らの利益や必要に応じて配分するために、あなたと国家の間に割り込むのです。バストス教授が正しく指摘しているように、その所得の移動は、富裕層から貧困層へ、またはその逆ではなく、すべての人々から国家へ向かっているのです。そして国家は、その所得を自らの利益や必要に従って再分配することを決定します。
では、先ほど示したような形で国家の各機能を大幅に縮小した場合、結果として国家はGDPの9~10%程度の規模となり、現状よりも30~40ポイント、つまり約80%縮小された国家になるでしょう。防衛費、治安費は現状と同等に維持される(ただし、治安費については内部の官僚機構によっても左右されるため、この点はまた別の議論になります。たとえば、スペインはヨーロッパで国民一人あたりの治安部隊職員数が最も多い国ですが、本当にそれだけ必要なのかはまた別問題です)。安全保障費がGDPの1.7%、防衛費が1.3%、官僚組織が1%、地域サービスや環境保護が1%、民間部門ではまかなえないインフラがさらに1%、そして社会保障が3%という具合です。現在、社会保障としてGDPの3%、すなわち450億ユーロが支出されています。これは、450億ユーロの社会保障費を、例えば4.5百万人(スペイン人口のおよそ10%)に対して年間1人あたり1万ユーロずつ支給するか、あるいは300万人に対して1万5千ユーロずつ支給するということになります。繁栄した社会において、極端な無助状態に陥る国民の割合はどれほどか、という問題です。彼らは、生命保険、障害保険、個人貯蓄すら持たず、福祉国家が生まれる前に存在したボランティアや民間の相互扶助ネットワークさえも利用できなかった層です。これらを踏まえた上で、絶対的な無助状態に陥り、国家からの継続的な支援を必要とする国民の割合がたとえば5~10%だとすれば、実際に必要な支出はGDPの3~4%程度で十分にカバーできるはずです。しかし、現実には我々は社会保障にGDPの20%を費やしているのです。
明らかに、このGDPの20%は、富裕層から少しだけ富を奪って、巨大な貧困層を作らないためのものではありません。驚くべきことに、国家がGDPの50%を占めるにもかかわらず、貧困層は依然として存在しているのです。さらに、貧困を解消するための手段として、まず第一に、依存性を生む補助金を設けるべきではありません。しかし、現実には、経済活動が全くできず、自己の貯蓄や家族の支援、民間の相互扶助ネットワーク、そして最終的には国家に依存せざるを得ない層が一定割合存在します。しかし、そのようなケースはGDPの3%程度の支出で十分にカバーされるはずなのです。
さて、国家の規模を縮小した場合、たとえばGDPの50%から10%にまで削減できると仮定しましょう。これは約80%の削減に相当します。先に述べたように、中央値の労働者は現在、年間約13,500ユーロの税金を負担しています。この80%の削減が実現すれば、労働者の可処分所得は、国家が提供する各種サービスに充てるための支出分が年間1人あたり1万~1万1千ユーロ増加することになります。家庭内で中央値の労働者が2人いる場合、2万~2万2千ユーロの追加収入となるでしょう。この追加収入があれば、教育費、医療費、年金のための貯蓄など、国家が現在負担させているコストを自前でまかなうことが可能になるはずです。実際、多くのスペインの労働者は、国家の劣悪なサービスから逃れるため、民間の医療や教育、そして補完的な年金積立を実施しているのです。特に、公共教育は、学生の生産性向上よりも、国家のイデオロギーを植え付けることに重きを置いている場合が多いのです。
また、この話は、GDPの3%相当の再分配、すなわち450億ユーロ分が、現実的に考えても国民の基礎的な生活を支えるには十分であるという観点からも論じられます。現行の過剰な収用体制に対して、もし国家規模が大幅に縮小されるならば、労働者にとって有利な状況が実現するはずです。
さて、ここまでの議論から、もし国家主義のウイルスが社会の頭脳や利権に深く根付っている現状において、現状が最適でないと理解したとしても、移行のコストの高さゆえに多くの人々が現状から変わることを望まないという現実があるのです。たとえば、公共年金制度の解体は非常に困難です。年金受給者は「こんな不公平な体制であっても、自分の年金を受け取りたい。自分自身の貯蓄がなくなるリスクを冒したくはない」と考えるでしょう。
では、この国家――明らかに国家とその官僚機構に有利なこのモデル――から脱却するために、すなわち、表向きは国民のために存在するようでいて、実際には社会を寄生しているこの体制から逃れるためには、どのような手段が考えられるでしょうか。ここで、国家改革またはハイパーステートのパラサイト化に対抗するための、四つの可能なアプローチについて述べます。
第一のアプローチは、トップダウン型の方法です。すなわち、自由主義的な理念を掲げた善意の政治家が権力の座につき、内部からリベラル革命を起こそうとするというものです。しかし、私はこの方法は、次に述べるボトムアップ型の文化戦線と併せなければ、全体として非常に単純で実現不可能だと考えます。なぜなら、社会の大多数が国家改革を望まなければ、その改革は十分な勢いを持って実施されることは決してないからです。多くの改革は長期的な取り組みであり、一夜にして実現できるものではありません。一度実行された改革が元に戻らないようにするには、最低でも二世代を要するのです。もし社会がその方向に向かわなければ、いつかまた別の人物が権力に就いて、国民の大多数が望まない体制を再び打ち壊してしまうでしょう。例えば、チリの年金制度の民営化は、ピノチェト政権下の1981年に始まり、数年前に旧公共年金制度が完全に清算されました。しかし、その後、旧体制に戻そうとする動きが見られるのです。なお、チリは当時、非常に若い労働人口と限られた高齢人口という、改革に適した人口構造を有していたにもかかわらず、改革には約40年もの歳月がかかりました。これが、世界の他の国々で実施されるとなれば、どれほど困難なものになるか想像に難くありません。そして、もし世界中がそのような改革を望まなければ、いかに自由主義者の政治家を内部に潜り込ませ、社会民主主義の装いを与えたとしても、十分な効果は得られないでしょう。さらに、政治そのものが権力に触れると必ず腐敗すると、ロード・アクトンが指摘したように、権力は人を変えてしまいます。つまり、権力に惹かれて権力の座についた者は、その権力を維持・拡大するために、かつて掲げた理念を容易に放棄し、他者を蹂躙し、欺く行動に出るということです。
政治的競争というのは、もしあなたが行動しなければ、行動する者があなたを追い出してしまう、という状況を生み出します。そのため、もし存在するとしても、誠実で、信念を持った政治家は、力に屈する者に押されて公共の場から姿を消してしまうのです。権力闘争では、手が縛られている者と自由な手を持つ者との間で戦いが行われるため、劣悪な選択が働き、最終的には最悪の者が権力の座に就くという現象が生じるのです。(この点については、ハイエクも『隷属への道』で記述しています。)
次に、第二の可能性はボトムアップ、すなわち文化戦線によるアプローチです。これは、アイデアの戦いを、じわじわと、少しずつ社会に浸透させ、心を開かせ、意識を目覚めさせ、より多くの人々がこの変革を要求するようになるという方法です。しかし、これは特に有望な道ではないことは明白です。もし、ここでマルクス主義的な語調に傾くとすれば、客観的な物質的条件があって、そうした思想が大規模に広まる環境が整わない限り、人々は現状に満足して「今のままで十分だ」と感じ、急激な変革に乗り出す理由が見出せません。現状が著しく悪化しない限り、文化戦線による大規模な勝利が起こり、既存の社会制度が覆されるというのは極めて困難な道なのです。例えば、アルゼンチンでは、40年間にわたって底をつき続けた結果、人々が明らかに欠陥だらけのモデルにうんざりし、ハイパーインフレーションに苦しんだことで変革が進んだように見えます。もし、そこに一貫性があり、破壊的かつ斬新なメッセージ―社会主義的なものか、あるいは幸運にもリベラルなもの―があれば、一定の確率でそのアイデアが覇権を握り、新たな現状として定着する可能性が出てくるのです。しかし、スペインの場合、文化戦線による闘いは、相手側のプロパガンダがあふれ、対抗する者がいなければ、現状が一層固定化し、国家権力が加速度的に拡大していくため、非常に厳しい状況にあります。私自身も長い間、文化戦線で戦ってきましたが、スペインという環境におけるその限界を痛感しています。
第三の道は、そもそも国家改革を目指さず、自分の生活を改善するために他の地域へ移住するというものです。もし、競争が可能な複数の法域が存在すれば、現状に非常に不満を抱く者は、物理的に他の地域へ移り住み、そこで自らの生活基盤を築くことができます。そして、こうした法域間の競争は、他の法域による収用や寄生的な政策の力を制限する効果も持ちます。たとえば、ある法域で税率が非常に低く、規制が緩やかであれば、他の法域は資本が流出し、寄生者側から見れば、寄生対象(=ホスト)が成長しなければ、寄生する意味がなくなるのです。もし、ホストを窒息させて殺してしまえば、またはホストが他の、寄生が少ない地域へ流出してしまえば、寄生者にとっては不利益となります。このような効果は、実際には見かけ以上に大きな影響を持つのです。
たとえば、最も身近な例として、アンドラの場合が挙げられます。多くの場合、静かに、あるいは時に華やかに報じられる移住現象があり、一定の社会的反響を呼んでいます。問題は、これらはすべて財政上の問題であり、移住者を犯罪者扱いする試みがあっても、スペイン国家にとっては重要な問題とならないのです。よく批判されるのは、YouTuberなどがアンドラへ移住することについて、「国が自国民の資源不足を訴えるような状況に直面しない」とされる点です。もしそうなれば、国家は財政の引き締めを迫られるはずですが、現実はそうではありません。むしろ、これは他者に対する懲罰の一形態であり、「移住して税負担を軽減しようとするなら、あなたは悪い人間であり、悪い市民だ。もしあなたが著名人であれば、意識を啓発するために、我々はあなたを徹底的に攻撃し、公の場から追放する」といったメッセージが発せられるのです。しかし、実際にアンドラへの移住が進むこと自体は悪いことではなく、たとえそれがスペイン国家に与えるダメージが短期的にはそれほど大きくなくとも、他のケースでは、目に見えにくいながらも国家に損害を与えている場合があるのです。
たとえば、2か月前に発表されたドラギの報告書では、欧州が「足を引きずっている」との根本的な不満が示されています。すなわち、欧州では生産性が20年間にわたって停滞しており、成長期に新たに設立される企業が、厳しい規制の下で成長できず、資本調達が困難となり、結果としてアメリカに流出してしまうという現象です。これは「足で投票する」という現象であり、企業側の実情を反映したものです。そして、これは国家権力の内部から出た、我々の社会が停滞しているという自らの寡占層からの認識でもあります。彼らは、ここ20年間にわたり市民を内部から圧迫してきた手法を見直す必要があると訴えているのです。そして、ここで議論されているのは、欧州連合とアメリカという二つの経済ブロック間での移住の問題なのです。
もし、かつてヨーロッパに存在していたような、多数の競合する法域が現在も存在していたと想像してみてください。ここで歴史的な議論に深入りするつもりはありませんが、ヨーロッパが16世紀あるいは17世紀から産業革命に至るまで発展し、東洋が(少なくとも最近まで)停滞していた理由の重い仮説の一つは、ヨーロッパが政治的にはるかに細分化され、都市国家や小国、王国、そして公国など、まさにアンドラのようなケースに近い形態であったため、相互の競争が激しかったという点にあります。ひとつの領域内で生まれる思想を制限・抑制・検閲する能力は非常に低く、もし一方で弾圧されれば別の場所へ移動できたため、その結果、後の産業革命を引き起こす知的な開花が促されたのです。これに対して、中国のような中央集権的で統一された国家では、官僚組織が本来より強大な権力を持っていたため、このような発展は見込めませんでした。
「足で投票する」という現象は非常に強力です。したがって、文化戦線から取り組むべきもう一つの課題は、政治的な中央集権化や財政の調和化に反対することです。なぜなら、政治的に中央集権化が進んだり、財政が調和化されるほど、法域間の競争は減少し、その結果、国家が無罰で私有財産を寄生的に吸い上げる余地が広がるからです。これは市場経済ではよく理解される現象ですが、国家の場合は例外扱いされがちです。市場において本当の意味での独占、すなわち単にその分野で唯一の企業という状況ではなく、競合が存在しない真の独占状態になると、その独占者は価格を引き上げ、品質を低下させる傾向にあります。なぜなら、あなたは逃げ出すことができない、まるで人質のような状態に置かれるからです。つまり、国家もまた独占状態にあり、国家が直面する唯一の競争は、他の国家へ移住するという可能性なのです。領域を統一して競争余地を狭めれば狭めるほど、国家は独占的な力を強め、結果としてあなたに提供するサービスの質を低下させ、収用を強める傾向が出てきます。したがって、私はどんな中央集権化のプロセスにも反対し、逆に政治的な分権化を支持すべきだと考えます。
そして最後に、第四の戦略ですが、これはやや曖昧で漠然としているかもしれません。しかし、私が考えるに、実際に多くの人々が採用しており、多くの場合国家の影響力を制限している方法、それは直接的に「国家からの分離」を目指すことです。もちろん、あなたにとって寄生者のような国家が窮屈に圧しかけてくる場合、その寄生者を打倒しようと多大なエネルギーを費やすこともできます。しかし、寄生者が既に存在する以上、その存在を前提として生活基盤を築く、その固定費を受け入れながらも、寄生者のさらなる拡大を防ぐ、あるいは寄生の及ばない領域を確保する新たな方法を模索するということです。これが国家からの「分離」、すなわち、重くのしかかる国家の負担から自らを切り離す試みなのです。例えば、先に述べたように、私立教育、私立医療、私的年金といった選択肢があります。本来であれば、国家が私たちから過剰な資源を吸い上げることなく、その分をこうした目的に振り向けられれば理想的ですが、幸いなことに、現状では国家が私立教育への進学を禁止しているわけではありません(ただしかなりの規制は存在します)。私立教育は完全に自由なものではなく、国家のカリキュラムに沿ったものですが、それでも私立教育、私立医療、そして貯蓄や資産形成の道を開いてくれるのです。もちろん、今後さらに税が引き上げられ、国内外で資産が収用されるリスクが高まるまではの話ですが。
したがって、国家を一つの悪と捉え、その悪に支配される中で自由を追求する、すなわちその影響力からできるだけ逃れる方法を探るべきです。さらに、社会が自ら開発していく様々なツールが、私たちが国家の監視や統制から離れて生活する手助けとなります。たとえば、デジタル経済は、今日のところ、国家が我々をコントロール・規制・収用するのをより困難にする領域をある程度確保できる可能性を秘めています。ビットコインの例は、没収不可能な資産として、適切な管理を行えば、富の保蔵庫あるいは国家の統制や知識から独立した交換手段として機能する可能性を示しています。
これらは、寄生者である国家に吸い付かれないため、自らの活動から国家の影響力を一部でも排除する、新たな生活の仕方を模索する一つの方法です。こうした新しいツールは、今後も次々と登場し、国家が私たちの生活に及ぼす影響を制限するために活用されるべきです。社会全体を変えるのは非常に困難ですが、多くの人々を同じ方向に動かすことが難しい現状において、少なくとも我々が体系的に受けている搾取の度合いを最小限に抑えることは可能です。
以上、複数の道筋があります。第一の道は私個人としてはほぼ排除したいと考えますが、残りの三つは排他的ではなく、互いに補完し合うものです。どの方法も目的地に必ず到達できる保証はありませんが、これらは連携することで、国家が私たちや社会全体に及ぼす権力の影響を徐々に抑制する助けとなるでしょう。そして、我々自身の利益のため、あるいは共に生きる社会を改善するために、可能な限りこれらの道を追求すべきだと考えます。
-
@ 8d34bd24:414be32b
2025-03-26 15:58:59I’ll admit that God’s truth is something I am passionate about. I love God’s word and I trust every word in the Bible as absolute truth. I hate when people compromise God’s word. I can’t understand Christians that don’t want to know God better through His word (maybe partially because I read a stack of books to solve any and every problem or to fulfill any interest).
Lately, the vow made in court to tell the truth, the whole truth, and nothing but the truth has been going through my mind. It comes up regarding almost everything, so I figured maybe God was telling me to write a post on the subject, so here we go.
The Truth
When we are searching for the truth about anything, we need to start with the Bible. Yes, there are many subjects about which the Bible doesn’t speak or doesn’t speak in detail, but the principles on which everything is built start with the Bible.
All Scripture is God-breathed and is useful for teaching, rebuking, correcting and training in righteousness, so that the servant of God may be thoroughly equipped for every good work. (2 Timothy 3:16-17)
Especially when we are trying to learn what God wants from us and our lives, we need to search the Scriptures. We need to study the Scriptures. We need to memorize the Scriptures.
I have hidden your word in my heart that I might not sin against you. (Psalm 119:11)
It is much more useful to have read the Bible many times and to know its contents cover to cover, so we have it available to us during that debate with a fellow believer, or the discussion with a proud atheist, or when put into a situation of temptation. Having God’s word “hidden in our heart” enables us to deal with every situation, just as Jesus did when tempted by the Devil in the wilderness. Jesus’s most common response to every challenge was “As it is written …”
Sanctify them by the truth; your word is truth. (John 17:17)
If we want to know the truth and be ready for whatever life throws at us, we need to be like Ezra:
He had begun his journey from Babylon on the first day of the first month, and he arrived in Jerusalem on the first day of the fifth month, for the gracious hand of his God was on him. For Ezra had devoted himself to the study and observance of the Law of the Lord, and to teaching its decrees and laws in Israel. (Ezra 7:9-10) {emphasis mine}
Are you known for devoting yourself to the study and observance of the Law of the Lord, and to teaching its decrees and laws?
The Whole Truth
Obviously there are God hating atheists who will lie about God’s word and totally contradict His word. As believers, we are more likely to bend God’s truth. (Satan does this, too, because it is frequently more effective than an outright lie). There are two primary ways to bend God’s truth. We either leave out some parts or we add to it. In this section we will focus on telling the whole truth and not leaving out part of the truth.
The error of lying by omission is rampant today. We see it in news reports by the media. We see it in the history taught to our children. We see it in many churches. There are some very uncomfortable truths in the Bible. People don’t like to hear that some people will be punished in Hell for all eternity. They don’t want to hear that they are sinners and their desires are sinful. They don’t like to hear that there is one and only one way to Jesus.
Jesus said to him, “I am the way, and the truth, and the life; no one comes to the Father but through Me. (John 14:6)
Many believers don’t like any conflict. They are afraid that speaking the truth is being judgmental and will hurt relationships and feelings, so they hold back and don’t speak the whole truth.
Deal bountifully with Your servant,\ That I may live and keep Your word.\ *Open my eyes, that I may behold\ Wonderful things from Your law.*\ I am a stranger in the earth;\ Do not hide Your commandments from me.\ My soul is crushed with longing\ After Your ordinances at all times.\ You rebuke the arrogant, the cursed,\ Who wander from Your commandments.\ Take away reproach and contempt from me,\ For I observe Your testimonies.\ Even though princes sit and talk against me,\ Your servant meditates on Your statutes.\ Your testimonies also are my delight;\ They are my counselors. (Psalm 119:17-24) {emphasis mine}
The psalmist begs God not to “hide Your commandments from me.” Should we hide God’s commandments from ourselves or others because they are uncomfortable?
He said, “What is the word that He spoke to you? Please do not hide it from me. May God do so to you, and more also, if you hide anything from me of all the words that He spoke to you.” (1 Samuel 3:17)
Eli put the harshest curse on Samuel if he didn’t speak the full truth communicated by God. We need to truly know and believe God’s word, so we communicate it fully with others and do not hide it from those whose very heart and soul need God’s truth.
Many of us may feel like we are not lying because we didn’t not explicitly speak an untruth, but withholding part of the truth, so that another is misled, is as much of a lie as speaking an untruth. Both are intended to mislead the other person, usually for our benefit or comfort and to the long-term harm of the other person.
Finally, brothers and sisters, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable—if anything is excellent or praiseworthy—think about such things. Whatever you have learned or received or heard from me, or seen in me—put it into practice. And the God of peace will be with you. (Philippians 4:8-9) {emphasis mine}
We need to think on, speak, and put into practice all of God’s word. Picking and choosing which parts of God’s word we want to believe, speak, and put into practice is akin to the original sin, “You will be like gods, knowing good and evil.” Only God gets to decide what is true or false and what is good or evil. When we choose to pick which parts of the Bible to obey and to share, we are taking the role that belongs solely to God.
Nothing But the Truth
The other error regarding truth is to add to God’s word.
The Pharisees and the scribes asked Him, “Why do Your disciples not walk according to the tradition of the elders, but eat their bread with impure hands?” And He said to them, “Rightly did Isaiah prophesy of you hypocrites, as it is written:
‘This people honors Me with their lips,\ But their heart is far away from Me.\ But in vain do they worship Me,\ **Teaching as doctrines the precepts of men.’\ Neglecting the commandment of God, you hold to the tradition of men.” (Mark 7:5-8) {emphasis mine}
So often we let tradition, culture, or “science” guide us instead of the Bible. Whenever there is a contradiction between any source and the Bible, we need to put the authority of God’s word as the highest authority. Although it is possible for us to be mistaken by the meaning of God’s word and the truth to be more in line with culture or “science,” it is so much more likely that tradition, culture, or “science” are wrong. We need to use the Bible to interpret things like science rather than to use “science” to interpret the Bible. The Bible is always the higher authority.
Sometimes we add to God’s word intentionally. Sometimes we are just influenced by the people around us, especially supposed authority figures, and are led astray unintentionally.
Do your best to present yourself to God as one approved, a worker who does not need to be ashamed and who correctly handles the word of truth. (2 Timothy 2:15) {emphasis mine}
We need to truly study the whole Bible and test every one of our beliefs against God’s word.
I am astonished that you are so quickly deserting the one who called you to live in the grace of Christ and are turning to a different gospel— which is really no gospel at all. Evidently some people are throwing you into confusion and are trying to pervert the gospel of Christ. But even if we or an angel from heaven should preach a gospel other than the one we preached to you, let them be under God’s curse! As we have already said, so now I say again: If anybody is preaching to you a gospel other than what you accepted, let them be under God’s curse! (Galatians 1:6-9) {emphasis mine}
We need to use God’s word to test every idea.
Do not treat prophecies with contempt but test them all; hold on to what is good, reject every kind of evil. (1 Thessalonians 5:20-22)
and
Dear friends, do not believe every spirit, but test the spirits to see whether they are from God, because many false prophets have gone out into the world. This is how you can recognize the Spirit of God: Every spirit that acknowledges that Jesus Christ has come in the flesh is from God, but every spirit that does not acknowledge Jesus is not from God. This is the spirit of the antichrist, which you have heard is coming and even now is already in the world. (1 John 4:1-3) {emphasis mine}
God’s word is truth. It never changes. It doesn’t change with the times, the culture, or new scientific discoveries. The truth is the truth whether anyone believes it or not.
There are many who will lead you astray and sound like they know what they are talking about. Make sure you do not follow these false teachers in their error (whether the error is intentional or accidental), but even more, make sure you don’t spread the error and lead others astray.
See to it that no one takes you captive through philosophy and empty deception, according to the tradition of men, according to the elementary principles of the world, rather than according to Christ. (Colossians 2:8) {emphasis mine}
I think this phrase perfectly describes how error effects us, “See to it that no one takes you captive through …” Error can be subtle, but can take us captive, lead us astray, and cause us to lead others astray. Only through detailed knowledge of the Scriptures can we defend against it.
Don’t be deceived, my dear brothers and sisters. Every good and perfect gift is from above, coming down from the Father of the heavenly lights, who does not change like shifting shadows. He chose to give us birth through the word of truth, that we might be a kind of firstfruits of all he created. (James 1:16-18) {emphasis mine}
May the Lord of heaven guide us to know the truth, the whole truth, and nothing but the truth and to obey His word in all things to His glory, forever.
Trust Jesus
-
@ 1b30d27a:3cf04146
2025-03-26 14:48:26In recent years, Artificial Intelligence (AI) has become a significant force in transforming various industries, and the music world is no exception. Machine learning algorithms and AI tools are reshaping how music is created, produced, and consumed, offering musicians and producers new ways to enhance creativity and productivity. As AI continues to evolve, it is poised to become a valuable co-creator in the music industry, making the possibilities for sound creation nearly limitless.
Redefining Music Composition with AI
Traditionally, music composition has been a human-driven process, where creativity and emotional depth played key roles. However, AI is now being used to generate original compositions, offering a new dimension to music creation. AI tools like Amper Music, Jukedeck, and Aiva can generate complex musical pieces in various genres, allowing musicians to collaborate with AI to create compositions that would have been impossible or time-consuming by traditional means.
"AI allows artists to explore new sounds, experiment with complex structures, and push boundaries in ways they never could before."
Musicians can feed AI programs with their preferences, and the system can generate melodies, chord progressions, and rhythms based on their input. These AI-generated pieces can be used as the foundation for new music or as inspiration for artists to develop and refine their work further.
AI in Music Production: Enhancing Creativity
While AI has made significant advancements in composition, its role in music production is equally groundbreaking. The production process involves a variety of technical tasks, such as mixing, mastering, and sound design. With the help of AI, producers can now streamline these tasks, allowing more time for creative decision-making.
Benefits of AI in Music Production:
- Faster Workflow: AI tools can automate time-consuming tasks, such as adjusting levels and applying effects, which accelerates the production process.
- Precision and Consistency: AI algorithms can ensure that every element of a track is perfectly balanced, leading to high-quality productions.
- Personalized Sound Design: AI can learn an artist’s unique sound and help shape mixes to match the artist’s vision, whether they’re working with digital synthesizers or traditional instruments.
Tools like LANDR for mastering and iZotope’s Ozone for mixing are examples of AI-powered software that can automatically adjust audio tracks, ensuring optimal sound quality and consistency.
AI as a Collaborative Tool in Music Creation
The most exciting aspect of AI in music production is its potential as a collaborative tool. Instead of replacing musicians and producers, AI is offering new avenues for collaboration. AI’s ability to generate fresh musical ideas, suggest unconventional sound combinations, and recommend harmonies can spark innovation in ways that were previously unimaginable.
"AI acts as a partner, not a replacement. It listens, learns, and collaborates with musicians to create something greater than what either could do alone."
This partnership allows musicians to break free from creative blocks, explore new genres, and experiment with sounds that might not have been considered otherwise. By training AI to understand a musician’s style, AI can tailor suggestions and act as an idea generator, constantly offering new directions for creative exploration.
AI and the Music Listening Experience
AI doesn’t just transform the creation and production process; it’s also changing the way we experience music. Recommendation algorithms are already helping millions of listeners discover new artists, songs, and genres on platforms like Spotify, YouTube, and Apple Music. AI analyzes user behavior, such as listening history and preferences, to suggest music that fits an individual’s taste.
Additionally, AI-powered live performances are emerging, where virtual concerts and interactive music experiences adapt to real-time audience feedback. Through the use of augmented reality (AR) and virtual reality (VR), AI is enhancing how fans engage with music, creating immersive environments that allow for a completely new type of live experience.
The Future of AI in Music
As AI continues to evolve, its role in the music industry will only expand. We can expect AI to become even more integrated into the creative process, offering musicians tools to generate new compositions, automate production tasks, and enhance their overall workflow. As AI learns and adapts to the needs of individual artists, it will continue to act
-
@ 1b30d27a:3cf04146
2025-03-26 14:16:23Artificial Intelligence (AI) is revolutionizing the music industry. What was once a tool used only for automation is now evolving into a creative partner that artists can collaborate with. AI's machine learning algorithms are transforming the way music is composed, produced, and consumed, providing endless opportunities for innovation and creativity.
AI in Music Composition
AI is helping musicians create compositions faster and more efficiently than ever before. Algorithms trained on a variety of musical genres can now generate complex melodies and harmonies, mimicking the style of famous composers or creating something entirely new. AI tools like OpenAI's MuseNet can generate entire musical pieces, and musicians are using these compositions as inspiration, or in some cases, as finished works.
"AI is a co-creator—bringing fresh perspectives and ideas, transforming the music composition process."
These AI tools don’t just replicate existing music—they offer new possibilities for experimentation, allowing artists to explore creative directions they might not have thought of on their own.
Streamlining Music Production
In music production, AI is changing the game. By analyzing audio tracks, AI can help with tasks like mixing, mastering, and sound enhancement. Tools like LANDR and iZotope Ozone automate the mastering process, giving producers professional-level results in a fraction of the time it would take manually.
Key Benefits of AI in Music Production:
- Time Efficiency: Automated processes speed up repetitive tasks like mixing and mastering.
- Enhanced Sound Quality: AI can fine-tune audio, ensuring clarity and balance.
- Personalization: AI can learn an artist’s style, offering tailored suggestions and improvements.
AI tools provide a more efficient workflow, freeing up time for artists to focus on creativity rather than the technical details of production.
AI as a Collaborative Partner
AI is no longer just a tool for producers; it’s a creative partner. It helps musicians explore new ideas, generate sound variations, and fine-tune compositions. AI can generate unusual sound combinations, suggest new chord progressions, or even help artists push past creative blocks.
"AI offers endless possibilities—it's a partner in the creative process, not just a tool."
By collaborating with AI, artists can expand their creative horizons, unlocking new ideas that might not have been possible without this technological partnership.
AI’s Influence on Music Consumption
AI also plays a huge role in how we experience music. Music platforms like Spotify and YouTube use AI to personalize recommendations based on listening habits. This allows users to discover new artists, genres, and tracks that align with their preferences, enhancing the overall music experience.
Moreover, AI-driven virtual concerts and augmented reality performances are on the rise, creating immersive and interactive experiences that bring music to life in a new way.
The Future of AI in Music
The future of AI in music is bright. As AI continues to advance, it will play an even more integral role in music composition, production, and distribution. Artists will continue to use AI as a creative collaborator, and audiences will benefit from even more personalized music experiences.
The journey of AI in music production is just beginning. As technology evolves, so too will the possibilities for musicians and listeners alike. AI is helping us unlock new creative potential, and it’s exciting to think about where this collaboration will take us next. 🚀
-
@ a012dc82:6458a70d
2025-03-26 12:55:41The cryptocurrency world is poised on the brink of a significant event as Bitcoin approaches its fourth halving in April 2024. This event, deeply embedded in Bitcoin's protocol, serves as a reminder of the cryptocurrency's unique economic model, designed to mimic the scarcity and deflationary aspects of precious metals. The halving not only affects the miners' rewards but also has far-reaching implications for the entire cryptocurrency market, influencing investor sentiment, market supply, and the intrinsic value of Bitcoin itself.
Table of Contents
-
Understanding Bitcoin Halving
-
Historical Impact on Bitcoin's Price
-
Implications for Miners
-
Institutional Interest and Market Dynamics
-
Regulatory Environment and Global Economic Factors
-
Conclusion
-
FAQs
Understanding Bitcoin Halving
Bitcoin halving is a core mechanism of the Bitcoin protocol, occurring every 210,000 blocks, which historically has been approximately every four years. This event reduces the reward for mining new blocks by half, a process designed to control Bitcoin's inflation and supply rate. The upcoming 2024 halving will slash the mining reward from 6.25 bitcoins per block to 3.125 bitcoins, a change that will significantly impact the rate at which new bitcoins are generated and enter the market.
This deflationary event is critical to Bitcoin's value proposition as digital gold. By reducing the flow of new bitcoins, the halving events mimic the extraction of a finite resource, enhancing Bitcoin's scarcity and potential as a store of value. The anticipation and aftermath of these events have historically led to increased public interest, media coverage, and speculative activity, all of which contribute to Bitcoin's market dynamics and price volatility.
Historical Impact on Bitcoin's Price
The halving events have historically been landmarks in Bitcoin's price history, often heralding periods of significant price appreciation. For example, the year following the 2016 halving saw Bitcoin's price increase manifold, underscoring the event's impact on market psychology and investor expectations. However, while past trends suggest a bullish outcome, it's crucial to acknowledge the complexity of market dynamics and the multitude of factors influencing Bitcoin's price.
The price impact of the halving can be attributed to the reduced supply of new bitcoins, heightening scarcity, and potentially increasing demand. However, the actual market response can vary based on current market conditions, investor sentiment, and global economic factors. Therefore, while historical data provides valuable insights, each halving unfolds in a unique context, making the outcome of the 2024 event unpredictable and a subject of widespread speculation.
Implications for Miners
The halving significantly impacts Bitcoin miners, as the reward reduction directly affects their revenue streams. This event could lead to a realignment within the mining industry, as only the most efficient and well-capitalized operations can sustain profitability with lower rewards. This pressure could drive technological innovation, as miners seek more energy-efficient and cost-effective mining solutions, but it could also lead to increased centralization, which is a concern for the Bitcoin network's health and security.
The aftermath of the halving will likely see a shakeout of less efficient miners, which could temporarily affect the network's hash rate and security. However, this consolidation could also lead to a more robust and resilient mining ecosystem in the long run. The dynamics between mining costs, Bitcoin's price, and network security are intricate and will play a crucial role in the cryptocurrency's post-halving landscape.
Institutional Interest and Market Dynamics
The landscape of Bitcoin investment has evolved dramatically since the last halving, with significant growth in institutional interest. The approval of Bitcoin ETFs and the entry of traditional financial institutions into the crypto space have provided Bitcoin with a new level of legitimacy and accessibility. This institutional involvement could lead to greater liquidity and less volatility post-halving, as larger players with long-term horizons enter the market.
However, institutional investors also bring new dynamics to Bitcoin's market. Their investment strategies, risk management practices, and regulatory compliance requirements differ markedly from those of retail and early crypto adopters. This shift could influence how the market responds to the halving, as institutional investors may be less prone to speculative trading and more interested in Bitcoin's long-term value proposition.
Regulatory Environment and Global Economic Factors
The impact of the 2024 halving will also be shaped by the broader regulatory and economic environment. Regulatory developments, both positive and negative, can significantly affect investor confidence and market dynamics. Clear and supportive regulations can foster growth and innovation in the crypto space, while restrictive policies may hinder market development and investor participation.
Moreover, global economic factors such as inflation rates, monetary policies, and geopolitical events play a crucial role in shaping investor sentiment and demand for Bitcoin. As a digital, borderless asset, Bitcoin is increasingly seen as a hedge against inflation and currency devaluation, factors that could influence its appeal around the halving event.
Conclusion
As April 2024 approaches, the Bitcoin community and investors worldwide are watching closely, aware that the halving could mark the beginning of a new era for Bitcoin. This event represents more than just a technical adjustment; it is a testament to Bitcoin's enduring design and its role as a pioneer in the cryptocurrency space.
The significance of the halving extends beyond immediate price effects; it encompasses the evolution of Bitcoin's market, the maturation of its ecosystem, and its position in the broader financial landscape. As we move closer to this pivotal event, the collective actions of miners, investors, and regulators will shape not only the outcome of the halving but the future trajectory of Bitcoin and the cryptocurrency market at large.
In this ever-evolving narrative, the 2024 halving stands as a critical milestone, a moment of reflection and anticipation, highlighting the challenges and opportunities that lie ahead in the journey of Bitcoin and the quest for a decentralized financial future.
FAQs
What is Bitcoin halving? Bitcoin halving is an event that occurs every 210,000 blocks, approximately every four years, which reduces the reward for mining new Bitcoin blocks by half. This mechanism is designed to control inflation and reduce the rate at which new bitcoins are introduced into circulation.
Why is the Bitcoin halving significant? The halving is significant because it directly impacts the supply of new bitcoins entering the market, which can influence Bitcoin's price. It also affects miners' profitability and can lead to changes in the network's mining dynamics.
How has Bitcoin's price reacted to previous halvings? Historically, Bitcoin's price has increased following halving events, though there are many factors at play. These price increases are often attributed to the reduced supply of new bitcoins and increased demand.
What are the potential effects of the 2024 Bitcoin halving on miners? The halving will reduce the block reward, potentially affecting miners' profitability. This could lead to a consolidation in the mining industry, with only the most efficient miners remaining competitive.
How might institutional interest affect the Bitcoin market around the halving? Institutional interest can bring more stability and liquidity to the Bitcoin market. However, it also introduces new market dynamics, as institutional investors may have different strategies and reactions to the halving compared to retail investors.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 1b30d27a:3cf04146
2025-03-26 12:06:51In the ever-evolving landscape of music production, a groundbreaking force is reshaping how music is created, composed, and experienced: Artificial Intelligence (AI). Machine learning algorithms are paving the way for a revolution in the music industry, offering artists a new kind of creative collaborator. Soon, AI will no longer be just a tool but a creative partner, influencing every stage of the music-making process, from composition to production to distribution.
The Role of AI in Music Composition
Traditionally, music composition has been a deeply personal and creative endeavor, driven by human intuition, emotion, and inspiration. However, AI is beginning to challenge this paradigm. Machine learning algorithms, particularly those designed for music, can analyze vast amounts of data, from the works of classical composers to contemporary hits. By studying patterns in rhythm, harmony, and melody, AI systems can generate original compositions that mirror the style and tone of any genre.
"AI is not replacing musicians, it's helping them reach new creative heights. It offers a fresh approach to composition, enhancing what artists already do, not taking over."
For instance, AI-powered tools like OpenAI's MuseNet or Google's Magenta can compose entire pieces of music in different styles, from jazz to electronic to orchestral. These systems can analyze a given input and generate melodies or harmonies that are incredibly sophisticated, and sometimes, indistinguishable from compositions written by human musicians.
Enhancing the Music Production Process
While AI has already made significant strides in composition, its impact on music production is just as profound. In modern studios, AI tools are used for everything from arranging and mixing tracks to mastering the final product. AI-driven software can listen to raw audio recordings, identify areas for improvement, and suggest changes—whether that’s adjusting EQ levels, balancing volume, or adding effects to enhance the sound.
Key Benefits of AI in Music Production:
- Automation of Repetitive Tasks: Streamlines tasks like mixing and mastering, saving time and reducing manual effort.
- Real-Time Feedback: Provides instant feedback on raw recordings, helping producers improve tracks quickly.
- Improved Sound Quality: AI tools can detect subtle flaws and suggest adjustments to enhance sound clarity.
One major benefit of AI in music production is its ability to streamline and automate repetitive tasks. Mixing and mastering, two essential steps in the production process, can often be time-consuming and require a skilled ear. AI systems like LANDR or iZotope’s Ozone use algorithms to analyze tracks and apply mastering techniques that would traditionally take hours of manual work. These tools can deliver professional-level results quickly, making them invaluable for both emerging artists and seasoned professionals.
AI as a Collaborative Partner
The most exciting aspect of AI in music production is its potential to act as a collaborative partner rather than just a tool. Rather than replacing musicians or producers, AI is giving them new ways to push the boundaries of creativity. For example, AI can generate complex chord progressions or suggest unusual sound combinations that the human composer might not have considered. It can also offer real-time feedback during the composition process, helping the artist refine their ideas or take them in unexpected directions.
"AI is like having a co-producer who never sleeps—constantly suggesting, innovating, and pushing boundaries, without any bias or limitations."
Additionally, AI can be trained to learn an individual artist’s style, preferences, and musical choices. This allows it to provide personalized suggestions tailored to the artist’s unique creative voice. As AI continues to evolve, it could become an indispensable part of the creative workflow, helping musicians experiment with new ideas and soundscapes that they might not have explored on their own.
AI and Music Experience: Changing How We Listen
AI’s influence doesn’t stop at creation and production; it’s also changing how we experience music. Algorithms are already being used to power music recommendation systems on platforms like Spotify, Apple Music, and YouTube. These algorithms analyze user preferences and listening habits, then suggest new tracks or artists that match their tastes. This personalization is pushing the boundaries of how we discover music, turning AI into an indispensable part of our daily listening habits.
How AI Is Enhancing Music Discovery:
- Personalized Playlists: Curates playlists based on user preferences, mood, and listening history.
- Music Recommendations: Suggests new tracks and artists based on listening patterns.
- Real-Time Adaptation: AI can adjust recommendations dynamically based on evolving listening trends.
Furthermore, AI is enhancing live music experiences. Using AI, virtual concerts and performances can be created that respond to the audience’s reactions in real-time. Augmented reality (AR) and virtual reality (VR) technology, combined with AI, are bringing immersive music experiences to life, allowing fans to engage with music in ways that were previously unimaginable.
Ethical and Creative Considerations
While AI offers exciting new opportunities, its rise in music production raises important questions about creativity and originality. If an AI system can compose music that sounds just like a human, who owns the rights to that music? Is it the creator who trained the AI, the artist who used it, or the AI itself? These are complex ethical questions that the music industry will need to address as AI becomes an increasingly integral part of the creative process.
Moreover, some critics argue that the human element in music—the emotion, experience, and soul that come with creating music—cannot be replicated by machines. While AI can certainly enhance the production process and offer new ways of creating, the debate remains: Can a machine truly understand the depth of human emotion that music conveys?
Looking Ahead: AI in Music’s Future
As AI continues to improve, its role in music production will likely become more pervasive and integrated into the creative process. Artists may soon collaborate with AI in ways we never thought possible, using it to unlock new dimensions of their music. With the ability to personalize and innovate in real-time, AI could help shape the future of music production, offering limitless possibilities for both seasoned professionals and new artists just starting their journey.
The journey of AI in music production has just begun, and the potential it holds for transforming how we create and experience music is boundless. Soon, AI won’t just be a tool we use—it will be a trusted partner in the pursuit of musical innovation. The future of music is not just human—it’s a harmonious blend of human creativity and technological ingenuity, where the journey never ends. 🚀
-
@ ecda4328:1278f072
2025-03-26 12:06:30When designing a highly available Kubernetes (or k3s) cluster, one of the key architectural questions is: "How many ETCD nodes should I run?"
A recent discussion in our team sparked this very debate. Someone suggested increasing our ETCD cluster size from 3 to more nodes, citing concerns about node failures and the need for higher fault tolerance. It’s a fair concern—nobody wants a critical service to go down—but here's why 3-node ETCD clusters are usually the sweet spot for most setups.
The Role of ETCD and Quorum
ETCD is a distributed key-value store used by Kubernetes to store all its state. Like most consensus-based systems (e.g., Raft), ETCD relies on quorum to operate. This means that more than half of the ETCD nodes must be online and in agreement for the cluster to function correctly.
What Quorum Means in Practice
- In a 3-node ETCD cluster, quorum is 2.
- In a 5-node cluster, quorum is 3.
⚠️ So yes, 5 nodes can tolerate 2 failures vs. just 1 in a 3-node setup—but you also need more nodes online to keep the system functional. More nodes doesn't linearly increase safety.
Why 3 Nodes is the Ideal Baseline
Running 3 ETCD nodes hits a great balance:
- Fault tolerance: 1 node can fail without issue.
- Performance: Fewer nodes = faster consensus and lower latency.
- Simplicity: Easier to manage, upgrade, and monitor.
Even the ETCD documentation recommends 3–5 nodes total, with 5 being the upper limit before write performance and operational complexity start to degrade.
Systems like Google's Chubby—which inspired systems like ETCD and ZooKeeper—also recommend no more than 5 nodes.
The Myth of Catastrophic Failure
"If two of our three ETCD nodes go down, the cluster will become unusable and need deep repair!"
This is a common fear, but the reality is less dramatic:
- ETCD becomes read-only: You can't schedule or update workloads, but existing workloads continue to run.
- No deep repair needed: As long as there's no data corruption, restoring quorum just requires bringing at least one other ETCD node back online.
- Still recoverable if two nodes are permanently lost: You can re-initialize the remaining node as a new single-node ETCD cluster using
--cluster-init
, and rebuild from there.
What About Backups?
In k3s, ETCD snapshots are automatically saved by default. For example:
- Default path:
/var/lib/rancher/k3s/server/db/snapshots/
You can restore these snapshots in case of failure, making ETCD even more resilient.
When to Consider 5 Nodes
Adding more ETCD nodes only makes sense at scale, such as:
- Running 12+ total cluster nodes
- Needing stronger fault domains for regulatory/compliance reasons
Note: ETCD typically requires low-latency communication between nodes. Distributing ETCD members across availability zones or regions is generally discouraged unless you're using specialized networking and understand the performance implications.
Even then, be cautious—you're trading some simplicity and performance for that extra failure margin.
TL;DR
- 3-node ETCD clusters are the best choice for most Kubernetes/k3s environments.
- 5-node clusters offer more redundancy but come with extra complexity and performance costs.
- Loss of quorum is not a disaster—it’s recoverable.
- Backups and restore paths make even worst-case recovery feasible.
And finally: if you're seeing multiple ETCD nodes go down frequently, the real problem might not be the number of nodes—but your hosting provider.
-
@ 7d33ba57:1b82db35
2025-03-26 11:19:39Gibralta is famous for its iconic Rock, fascinating history, and stunning views over the Mediterranean and Atlantic. A mix of British, Spanish, and Moorish influences, it’s a unique destination packed with natural beauty and cultural heritage.
🏛️ Top Things to See & Do in Gibraltar
1️⃣ The Rock of Gibraltar 🏔️
- The most famous landmark, standing 426 meters high.
- Offers spectacular views of Spain, Morocco, and the Strait of Gibraltar.
- Reach it by hiking, cable car, or guided tour.
2️⃣ St. Michael’s Cave 🏰
- A stunning limestone cave filled with stalactites and stalagmites.
- Used as a concert venue with incredible natural acoustics.
- Illuminated with colorful lights for an unforgettable experience.
3️⃣ Apes’ Den 🐵
- Home to Gibraltar’s famous Barbary macaques, Europe’s only wild monkeys.
- Legend says if the monkeys leave, so will the British! 🇬🇧
- Be careful with your belongings—they love to steal snacks!
4️⃣ Europa Point & Lighthouse 🌊
- The southernmost point of Gibraltar, with views across to Africa.
- Visit the Trinity Lighthouse, the stunning Ibrahim-al-Ibrahim Mosque, and the Harding Battery.
5️⃣ The Great Siege Tunnels 🏗️
- An underground tunnel system carved by the British during the Great Siege (1779–1783).
- Learn about Gibraltar’s military history with cannons and exhibits.
6️⃣ Main Street & Casemates Square 🛍️
- A lively area with British-style pubs, duty-free shopping, and historical buildings.
- Ideal for picking up souvenirs, perfumes, electronics, and spirits at tax-free prices.
7️⃣ Gibraltar Skywalk & Windsor Suspension Bridge 🌉
- A glass-floored viewpoint offering breathtaking panoramic views.
- The Windsor Suspension Bridge is a thrilling 71-meter-long bridge over a deep gorge.
🍽️ What to Eat in Gibraltar
- Fish & Chips – A British classic, best enjoyed by the waterfront 🐟🍟
- Calentita – A chickpea flour flatbread, Gibraltar’s national dish 🥖
- Rosto – A local pasta dish with tomato sauce and meat 🍝
- Torta de Acelga – A savory Swiss chard pie, a blend of Spanish and Moorish flavors 🥧
- Gibraltar Gin & Tonic – A refreshing drink with local gin 🍸
🚗 How to Get to Gibraltar
✈️ By Air: Gibraltar International Airport (GIB) – flights from London, Manchester, Bristol
🚘 By Car: Drive from Spain (La Línea de la Concepción), but expect border checks 🚧
🚆 By Train: Nearest Spanish station is San Roque-La Línea, then take a taxi or bus
🚌 By Bus: Direct buses from Málaga, Seville, and Cádiz
🚶 On Foot: Many visitors park in La Línea, Spain, and walk across the border💡 Tips for Visiting Gibraltar
✅ Bring your passport – Border control is required for entry 🛂
✅ Take the cable car early – The Rock gets crowded by midday 🚠
✅ Watch out for the monkeys – They are friendly but love to steal 🎒
✅ Wear comfortable shoes – Exploring the Rock involves lots of walking 👟
✅ Use British pounds (£) or euros (€) – Most places accept both 💷💶 -
@ d560dbc2:bbd59238
2025-03-26 11:17:39The Eisenhower Matrix and Task4Us are two powerful tools for managing tasks—each with its own approach to prioritization. The Eisenhower Matrix categorizes tasks based on urgency and importance, while Task4Us lets you set a low, medium, or high priority for each task and uses an Urgency Score to guide you on what to work on next. By combining these systems, you can refine your task management process—ensuring you focus on the right tasks (via the Eisenhower Matrix), set appropriate priorities (via Task4Us’s priority parameter), and act on them at the optimal time (via Task4Us’s Urgency Score). In this post, I'll explain how to adjust tasks from the Eisenhower Matrix using Task4Us’s priority system and let its Urgency Score guide your actions for a more dynamic and effective workflow.
Understanding the Systems
The Eisenhower Matrix
The Eisenhower Matrix divides tasks into four quadrants based on two criteria: urgency and importance:
-
Urgent and Important (Do First):
Tasks requiring immediate action (e.g., “Submit a project proposal by 5 PM today”). -
Important but Not Urgent (Schedule):
Tasks that contribute to long-term goals but don’t need immediate attention (e.g., “Plan a team-building event”). -
Urgent but Not Important (Delegate):
Tasks that need quick action but don’t align with your primary goals (e.g., “Answer non-critical emails”). -
Neither Urgent nor Important (Eliminate):
Time-wasters to remove (e.g., “Scroll social media endlessly”).
While the matrix helps you decide what to focus on, schedule, delegate, or eliminate, it doesn’t inherently guide you on the relative urgency of tasks within each quadrant or the timing for non-urgent tasks.
Task4Us: Priority Parameter and Urgency Score
Task4Us uses the 2-5 Rule to prioritize tasks based on timing. When you add a task, you assign it a time unit (days, weeks, months, or years), and Task4Us calculates when it should be acted on within a 2-to-5 window. For example:
- A daily task like “Drink water” should be done every 2–5 days.
- A monthly task like “Meet Uncle Lars” should be done every 2–5 months.
Additionally, Task4Us allows you to set a priority parameter—low, medium, or high—for each task, giving you control over its initial importance. The system also calculates an Urgency Score based on how close the task is to its 2–5 window or due date (for fixed-date tasks). For instance, if you last met Uncle Lars 4 weeks ago and set it as a monthly task with medium priority, the Urgency Score might increase as you approach the 5-week mark, nudging you to act. Features like Fix Mode (for date-specific tasks) and Focus Mode (displaying your top 3 tasks) help you act without overthinking. Currently in beta, Task4Us is designed to reduce decision fatigue by aligning tasks with your natural rhythms.
Why Adjust Eisenhower Matrix Tasks with Task4Us Priorities?
Combining the Eisenhower Matrix with Task4Us’s priority and Urgency Score offers several benefits:
-
Align Priorities with Quadrants:
Set high priority for “Do First” tasks and medium for “Schedule” tasks, mirroring the matrix’s framework. -
Let Task4Us Guide Timing:
The Urgency Score adjusts dynamically based on timing, ensuring you act on tasks at the right moment—even within the same quadrant. -
Reduce Overwhelm:
The blend of the matrix’s clarity with Task4Us’s dynamic prioritization helps you focus on what’s most urgent and important without losing sight of long-term goals.
Step-by-Step Guide to Adjusting Tasks
Step 1: Categorize Tasks Using the Eisenhower Matrix
Start by listing your tasks and sorting them into the Eisenhower Matrix’s four quadrants. For example:
- Do First (Urgent and Important):
- “Submit project proposal by 5 PM today”
-
“Fix client issue by tomorrow”
-
Schedule (Important but Not Urgent):
- “Meet Uncle Lars for coffee”
- “Plan a team-building event”
-
“Do cardio”
-
Delegate (Urgent but Not Important):
-
“Answer non-critical emails”
-
Eliminate (Neither Urgent nor Important):
- “Scroll social media endlessly”
Focus on the actionable quadrants (“Do First” and “Schedule”) and delegate or eliminate tasks in the other quadrants.
Step 2: Add Tasks to Task4Us and Set Priorities
Add the tasks from the “Do First” and “Schedule” quadrants into Task4Us, assigning each a time unit or due date and setting its priority:
Do First Tasks (Set High Priority):
- “Submit project proposal by 5 PM today”:
- Use Fix Mode to set the due date (e.g., March 26, 2025).
-
Set the priority to high due to the immediate deadline.
-
“Fix client issue by tomorrow”:
- Use Fix Mode to set the due date (e.g., March 27, 2025).
- Set the priority to high.
Schedule Tasks (Set Medium Priority):
- “Meet Uncle Lars for coffee”:
- Set as a monthly task (last acted on February 1, 2025).
-
Assign a medium priority.
-
“Plan a team-building event”:
- Set as a monthly task (last acted on January 1, 2025).
-
Assign a medium priority.
-
“Do cardio”:
- Set as a daily task (last acted on March 24, 2025).
- Assign a medium priority.
Step 3: Let Task4Us’s Urgency Score Guide Your Actions
Task4Us calculates an Urgency Score that dynamically adjusts based on timing and your priority settings:
- Do First Quadrant:
- “Submit project proposal by 5 PM today” (High Priority): The Urgency Score will rank this as the top task due to the immediate deadline.
-
“Fix client issue by tomorrow” (High Priority): Although high priority, its Urgency Score may rank slightly lower since it’s due tomorrow.
-
Schedule Quadrant:
- “Plan a team-building event” (Medium Priority): With 3 months since the last action, its Urgency Score increases.
- “Meet Uncle Lars for coffee” (Medium Priority): Approaching the 2-month mark, its Urgency Score will rise.
- “Do cardio” (Medium Priority): At only 2 days since the last action, its Urgency Score remains lower for now.
Task4Us uses the Urgency Score to fine-tune the order of tasks within each quadrant, ensuring you act on the most pressing ones first.
Step 4: Act Using Task4Us’s Focus Mode
Focus Mode displays your top 3 tasks based on the Urgency Score across all categories. For example, your top 3 tasks might be: - “Submit project proposal by 5 PM today” (High Priority, top Urgency Score) - “Fix client issue by tomorrow” (High Priority, slightly lower Urgency Score) - “Plan a team-building event” (Medium Priority, high Urgency Score in the Schedule quadrant)
This mode helps you balance urgent needs with long-term goals, ensuring you work on the highest-priority tasks first.
Step 5: Review and Reassess Weekly
Set aside time each week to review your Eisenhower Matrix and Task4Us tasks:
-
Reassess Quadrants:
Shift tasks between quadrants if their urgency or importance changes.
Example: If “Plan a team-building event” becomes more urgent due to a company deadline, shift it to “Do First” and update its priority in Task4Us. -
Update Task4Us:
As tasks are completed, update their “last act dates” to reset their 2-5 windows and adjust Urgency Scores. -
Adjust Priorities:
If a “Schedule” task like “Do cardio” remains uncompleted for too long (e.g., skipped for 5 days), increase its priority to high to prompt timely action.
A Real-Life Example: Adjusting Tasks in Action
Imagine managing a mix of work, personal, and health tasks:
Eisenhower Matrix Categorization:
- Do First:
- “Submit project proposal by 5 PM today”
-
“Fix client issue by tomorrow”
-
Schedule:
- “Meet Uncle Lars for coffee”
- “Plan a team-building event”
-
“Do cardio”
-
Delegate:
-
“Answer non-critical emails”
-
Eliminate:
- “Scroll social media endlessly”
Add to Task4Us and Set Priorities:
- “Submit project proposal” – Use Fix Mode (due today), set to High Priority.
- “Fix client issue” – Use Fix Mode (due tomorrow), set to High Priority.
- “Meet Uncle Lars for coffee” – Set as a monthly task (last acted on February 1, 2025), Medium Priority.
- “Plan a team-building event” – Set as a monthly task (last acted on January 1, 2025), Medium Priority.
- “Do cardio” – Set as a daily task (last acted on March 24, 2025), Medium Priority.
Adjust Within Quadrants:
- Do First:
Tackle “Submit project proposal” before “Fix client issue” based on a higher Urgency Score. - Schedule:
Prioritize “Plan a team-building event” (High Urgency Score) over “Meet Uncle Lars” and “Do cardio.”
Act with Focus Mode:
- Task4Us’s Focus Mode displays your top 3 tasks (e.g., “Submit project proposal,” “Fix client issue,” and “Plan a team-building event”), ensuring a balanced focus.
Review Weekly:
- After completing tasks, update their “last act dates.”
Example: If you meet Uncle Lars on March 27, update the task to reset its 2-5 window, which may lower its Urgency Score temporarily.
Why This Combination Works
Combining the Eisenhower Matrix with Task4Us’s priority parameter and Urgency Score addresses limitations of both systems:
-
Aligned Prioritization:
Setting high priority for “Do First” tasks and medium for “Schedule” tasks aligns Task4Us with the Eisenhower Matrix, ensuring tasks are appropriately categorized. -
Dynamic Guidance:
Task4Us’s Urgency Score fine-tunes the order of tasks within each quadrant, guiding you on what to work on next based on timing. -
Balanced Focus:
The combination ensures you work on the right tasks (Eisenhower Matrix), with the right priority (Task4Us’s priority parameter), at the right time (Task4Us’s Urgency Score).
Try It Out and Share Your Experience
Task4Us is currently in beta—now’s the perfect time to try this combination and see how it enhances your task management. Categorize your tasks using the Eisenhower Matrix, add them to Task4Us, and adjust priorities with the low/medium/high system while letting the Urgency Score guide your actions.
Sign up for Task4Us at todo.task4.us and let me know how it works for you!
How do you prioritize your tasks—do you use the Eisenhower Matrix, Task4Us, or another method? Share your thoughts in the comments—I’d love to hear your experience!
#Productivity #TaskManagement #EisenhowerMatrix #Task4Us #GTD
-
-
@ b7cf9f42:ecb93e78
2025-03-26 10:57:33Der Verstand im Fluss der Information
Das Informationszeitalter ist wie ein monströser Fluss, der unseren Verstand umgibt
Fundament erbauen
Der Verstand kann sich eine Insel in diesem Fluss bauen. Dabei können wir eine eigene Insel erbauen oder eine bestehende insel anvisieren um stabilität zu finden
Je robuster das Baumaterial, desto standhafter unsere Insel. (Stärke der Argumente, Qualität des Informationsgehalts, Verständlichkeit der Information)
Je grossflächiger die Insel, desto mehr Menschen haben Platz (Reichweite).
Je höher wir die Insel bauen, desto sicherer ist sie bei einem Anstieg des Informationsflusses (Diversität der Interesse und Kompetenzen der Inselbewohner).
Robustes Baumaterial
Primäre Wahrnehmung (robuster):
Realität -> meine Sinne -> meine Meinung/Interpretation
Sekundäre Wahrnehmung (weniger Robust):
Realität -> Sinne eines anderen -> dessen Meinung/Interpretation -> dessen Kommunikation -> meine Sinne -> meine Meinung/Interpretation
Wie kann ich zur Insel beitragen?
Ich investiere meine Zeit, um zu lernen. Ich bin bestrebt, Ideen zu verstehen, um sicherzugehen, dass ich robustes Baumaterial verwende.
Ich teile vermehrt Informationen, welche ich verstehe, damit auch meine Mitbewohner der Insel mit robustem Material die Insel vergrössern können. So können wir mehr Platz schaffen, wo Treibende Halt finden können.
Was könnte diese Insel sein?
- Freie Wissenschaft
- Freie Software
- Regeln
- Funktionierende Justiz
- Werkzeug
- und vieles weiteres
-
@ 7d33ba57:1b82db35
2025-03-26 09:22:57Córdoba is a treasure trove of Moorish architecture, Roman heritage, and Andalusian charm. Once the capital of the Umayyad Caliphate, it’s home to stunning patios, atmospheric streets, and UNESCO-listed landmarks.
🏛️ Top Things to See & Do in Córdoba
1️⃣ La Mezquita-Catedral 🕌⛪
- Córdoba’s most iconic landmark, a UNESCO World Heritage Site.
- A breathtaking blend of Islamic arches and a Christian cathedral.
- Don’t miss the orange tree courtyard and bell tower views.
2️⃣ Alcázar de los Reyes Cristianos 🏰
- A medieval fortress with stunning gardens and Mudejar courtyards.
- Walk through Roman mosaics, ancient baths, and watchtowers.
3️⃣ Puente Romano & Calahorra Tower 🌉
- A historic Roman bridge over the Guadalquivir River.
- Great for sunset views with the Mezquita in the background.
- Visit the Calahorra Tower Museum for a look at Córdoba’s Islamic past.
4️⃣ Judería (Jewish Quarter) & Calleja de las Flores 🌺
- Wander through narrow, whitewashed streets lined with flowers.
- Visit the Córdoba Synagogue, one of Spain’s last remaining medieval synagogues.
- Stop by Calleja de las Flores, one of the most photogenic streets in Spain.
5️⃣ Palacio de Viana 🏡
- A 16th-century palace with 12 stunning courtyards filled with flowers.
- A must-visit during Córdoba’s Patio Festival (May).
6️⃣ Medina Azahara 🏛️
- The ruins of a 10th-century Moorish palace-city, 8 km from Córdoba.
- One of the greatest archaeological sites from Al-Andalus.
7️⃣ Plaza de la Corredera & Local Tapas 🍷
- A lively square with colorful buildings and traditional bars.
- Try local specialties like salmorejo (cold tomato soup) and flamenquín (breaded ham & cheese roll).
🍽️ What to Eat in Córdoba
- Salmorejo – A thick cold tomato soup, topped with ham and egg 🍅
- Flamenquín – A deep-fried pork roll stuffed with ham & cheese 🥩🧀
- Rabo de toro – Slow-cooked oxtail stew, a classic dish 🥘
- Berenjenas con miel – Fried eggplant drizzled with honey 🍆🍯
- Montilla-Moriles wine – A local sherry-like wine 🍷
🚗 How to Get to Córdoba
🚆 By Train: High-speed AVE trains from Madrid (1 hr 45 min), Seville (45 min), Málaga (1 hr)
🚘 By Car: 1.5 hrs from Seville, 2 hrs from Granada, 1 hr 40 min from Málaga
🚌 By Bus: Regular connections from major Andalusian cities
✈️ By Air: Closest airports are Seville (SVQ) or Málaga (AGP)💡 Tips for Visiting Córdoba
✅ Best time to visit? Spring (April–May) for mild weather & flower-filled patios 🌸
✅ Visit early morning or late afternoon to avoid the midday heat ☀️
✅ Book Mezquita tickets in advance to skip long queues 🎟️
✅ Try the local patios – Many houses open their courtyards for visitors 🏡 -
@ 57d1a264:69f1fee1
2025-03-26 08:45:13I was curious to see how Stacker.News domain and website contents scored from a SEO (Search Engine Optimization) perspective. Here what Semrush nows about SN. But first have alook at the Page Performance Score on Google (Detailled report available here). Performance and Accessibility looks have really low score!
| Desktop | Mobile | |---|---| |
|
| |
|
|
Now let's see what Semrush knows.
Analytics
General view on your metrics and performance trend compared to last 30 days.
See estimations of stacker.news's desktop and mobile traffic based on Semrush’s proprietary AI and machine learning algorithms, petabytes of clickstream data, and Big Data technologies.
Distribution of SN's organic traffic and keywords by country. The Organic Traffic graph shows changes in the amount of estimated organic and paid traffic driven to the SN analyzed domain over time.
| Organic Search | Backlinks Analytics | |---|---| |
|
|
| Position Changes Trend | Top Page Changes | |---|---| |
|
| |This trend allows you to monitor organic traffic changes, as well as improved and declined positions.| Top pages with the biggest traffic changes over the last 28 days. |
Competitors
The Competitive Positioning Map shows the strengths and weaknesses of SN competitive domains' presence in organic search results. Data visualizations are based on the domain's organic traffic and the number of keywords that they are ranking for in Google's top 20 organic search results. The larger the circle, the more visibility a domain has. Below, a list of domains an analyzed domain is competing against in Google's top 20 organic search results.
Referring Domains
Daily Stats
| Organic Traffic | Organic Keywords | Backlinks | |---|---|---| | 976 | 15.9K | 126K | |
-41.87%
|-16.4%
|-1.62%
|📝 Traffic Drop
Traffic downturn detected! It appears SN domain experienced a traffic drop of 633 in the last 28 days. Take a closer look at these pages with significant traffic decline and explore areas for potential improvement. Here are the pages taking the biggest hits:
- https://stacker.news/items/723989 ⬇️ -15
- https://stacker.news/items/919813 ⬇️ -12
- https://stacker.news/items/783355 ⬇️ -5
📉 Decreased Authority Score
Uh-oh! Your Authority score has dropped from 26 to 25. Don't worry, we're here to assist you. Check out the new/lost backlinks in the Backlink Analytics tool to uncover insights on how to boost your authority.
🌟 New Keywords
Opportunity Alert! Targeting these keywords could help you increase organic traffic quickly and efficiently. We've found some low-hanging fruits for you! Take a look at these keywords: - nitter.moomoo.me — Volume 70 - 0xchat — Volume 30 - amethyst nostr — Volume 30
🛠️ Broken Pages
This could hurt the user experience and lead to a loss in organic traffic. Time to take action: amend those pages or set up redirects. Here below, few pages on SN domain that are either broken or not crawlable: - https://stacker.news/404 — 38 backlinks - https://stacker.news/api/capture/items/91154 — 24 backlinks - https://stacker.news/api/capture/items/91289 — 24 backlinks
Dees this post give you some insights? Hope so, comment below if you have any SEO suggestion? Mine is to improve or keep an eye on Accessibility!
One of the major issues I found is that SN does not have a
robots.txt
, a key simple text file that allow crawlers to read or not-read the website for indexing purposes. @k00b and @ek is that voluntary?Here are other basic info to improve the SEO score and for those of us that want to learn more:
- Intro to Accessibility: https://www.w3.org/WAI/fundamentals/accessibility-intro/
- Design for Accessibility: https://www.w3.org/WAI/tips/designing/
- Web Accessibility Best Practices: https://www.freecodecamp.org/news/web-accessibility-best-practices/
originally posted at https://stacker.news/items/925433
-
@ b04082ac:29b5c55b
2025-03-26 07:07:11In the bustling markets of Kumasi, the 19th-century capital of the Asante Empire in modern-day Ghana, traders conducted their commerce not with coins or paper notes, but with gold dust measured by intricately crafted brass spoons. This monetary system, devoid of a central bank or state-issued fiat, sustained a sophisticated civilization for over two centuries, challenging the conventional narrative that money requires a sovereign issuer to function. The Asante’s gold dust economy provides a historical lens through which to view the principles of sound money—principles that Bitcoin, with its fixed supply and decentralized architecture, resurrects in the digital realm. For those who recognize Bitcoin’s potential as a transformative monetary system, the Asante’s gold dust spoons serve as a compelling precedent: a medium of exchange rooted in scarcity and trust can underpin a thriving society, independent of centralized authority.
Map from 1896 of the British Gold Coast Colony (today Ghana).
The Asante Empire, spanning from 1701 to 1901, relied on sika futuro—gold dust painstakingly extracted from rivers and forests—as its primary currency. Measured with spoons and brass weights known as abrammo, this system was remarkably decentralized. Each trader carried their own set of tools, often adorned with proverbs or symbolic designs, enabling them to verify transactions without reliance on a centralized mint or overseer. By 1900, the Asante had amassed 14 million ounces of gold, a volume that rivaled the economic output of many European nations during the same period. This wealth fueled extensive trade networks across West Africa, connecting the empire to merchants from the coast to the interior, and supported cultural artifacts like the Golden Stool, a revered symbol of collective sovereignty forged from gold. The value of gold dust stemmed not from a royal proclamation but from its inherent scarcity and the labor required to obtain it—qualities that economists identify as the bedrock of sound money. Bitcoin reflects this paradigm: its cap of 21 million coins, enforced through cryptographic consensus rather than governmental fiat, establishes a monetary discipline immune to arbitrary expansion. The Asante’s experience underscores a fundamental economic insight: money derives its efficacy not from state endorsement, but from its ability to resist manipulation and retain value over time.
Men in the process of weighing gold dust, photographed on the Ivory Coast in 1892. From Marcel Monnier’s France Noire Cote d’Ivoire et Soudan, 1894.
Economic history teaches that sound money lowers time preference, encouraging saving and long-term planning over immediate consumption. The Asante’s gold dust, hard-won from the earth, could not be inflated at will; its supply expanded only incrementally, dictated by the limits of human effort and natural deposits. This constraint fostered a culture of accumulation, where wealth was preserved across generations, evident in the empire’s ability to finance infrastructure, such as roads linking trade hubs, and maintain a formidable military presence that deterred regional rivals. Historical records, such as those from anthropologist R.S. Rattray, describe how gold dust was hoarded in family coffers, passed down as a stable store of value. Bitcoin embodies this same dynamic. Its fixed issuance schedule—halving roughly every four years—mimics the gradual accretion of gold dust, encouraging holders to prioritize long-term retention over short-term expenditure. In contrast, fiat currencies, subject to unrestrained printing, elevate time preference, as seen in modern economies where central banks flood markets with liquidity, eroding purchasing power and compelling consumption over saving—a fate the Asante’s gold dust and Bitcoin’s design inherently avoid.
An array of gold dust spoons from the Asante Empire, each adorned with detailed engravings and symbolic motifs, reflecting their role in trade and cultural heritage.
The tools of the Asante economy further illustrate this monetary discipline. The spoons, ranging from 1/16-ounce measures for daily purchases to 2-ounce weights for significant transactions, were not mere utensils but instruments of precision and trust. Crafted with care—some bearing motifs of birds or proverbs like “The bird flies high”—they standardized trade across a diverse empire, reducing disputes over quantity or purity. Each trader’s possession of their own abrammo weights created a network of verification, a decentralized mechanism that prefigures Bitcoin’s blockchain. In Bitcoin’s system, nodes—computers running the protocol—validate every transaction, ensuring integrity without a central arbiter. This parallel is not superficial: both the Asante’s spoons and Bitcoin’s nodes represent a distributed order, where trust emerges from the system’s structure rather than a single authority. The Asante’s trade practices, documented by historians like Timothy Garrard, reveal a sophistication that belies their pre-industrial context—merchants negotiated with precision, their gold dust facilitating commerce from salt to textiles, much as Bitcoin enables peer-to-peer exchange across continents.
A collection of intricately crafted gold dust spoons from the Asante Empire, showcasing the artistry and cultural significance of gold in Akan trade and tradition.
Trust was the cornerstone of the Asante system, a quality that transcends its physical medium. Gold dust bore intrinsic worth, its weight a palpable assurance of value, a property recognized by European traders as early as the 15th century, well before the Asante state coalesced in 1701. This trust was not legislated but cultivated over centuries, a cultural conviction in the reliability of a scarce resource. Bitcoin’s trust arises from a different foundation: vast computational effort expended in mining secures its network, while a cryptographic framework ensures its integrity against tampering. Neither system depends on a sovereign guarantor; both derive legitimacy from attributes embedded in their design—scarcity and verifiability for gold dust, computational proof and immutability for Bitcoin. The Asante’s economy succumbed to colonial intervention in 1896, when British forces outlawed gold dust in favor of imperial currency, yet its principles endured in illicit trade, hinting at a resilience that Bitcoin amplifies. Bitcoin’s global network, operating beyond the reach of any single jurisdiction, withstands regulatory assaults—miners relocate, nodes persist—offering a durability the Asante could only aspire to in their regional confines.
One modern theory, Modern Monetary Theory (MMT), posits that money gains legitimacy solely through state declaration, underpinned by taxation and legal tender laws. The Asante’s experience contradicts this. Gold dust circulated among the Akan peoples long before the empire’s formation, its adoption predating any centralized authority; Asante kings taxed it but did not invent it. MMT’s insistence on government fiat as the source of monetary value overlooks the spontaneous emergence of money from human exchange—a process the Asante and Bitcoin demonstrate with clarity.
A detailed gold dust spoon from the Asante Empire, featuring symbolic engravings and a prominent animal motif, highlighting the cultural and spiritual significance of its design
Yet, the parallel between the Asante’s gold dust economy and Bitcoin might appear strained. Critics could argue that the Asante operated in a pre-industrial, regional context, their gold dust suited to a localized barter system, while Bitcoin contends with a global, digital economy of unprecedented complexity. The physicality of gold dust, they might contend, differs fundamentally from Bitcoin’s intangible code, and the Asante’s eventual subjugation by colonial fiat suggests state power ultimately prevails. This critique, however, misjudges the essence of the comparison. The Asante’s system thrived not because of its scale or medium, but because it embodied sound money—scarcity ensured its value, decentralization preserved its integrity. Bitcoin extends these principles, its fixed supply and distributed ledger transcending physical limits to achieve global reach. The Asante’s fall to colonial force reflects not a flaw in their money, but a lack of technological resilience—Bitcoin’s network, spanning continents and fortified by cryptography, shrugs off such threats, proving the concept’s adaptability rather than its weakness.
A single gold dust spoon from the Asante Empire, featuring geometric patterns and intricate engravings, a testament to the Akan's skilled metalwork and economic traditions.
The Asante’s gold dust economy persisted for two centuries, a testament to monetary sovereignty until colonial powers dismantled it. Its legacy lies in its demonstration that a decentralized, scarce medium can drive economic vitality—a lesson Bitcoin inherits and expands. By 2025, Bitcoin’s market value exceeds a trillion dollars, a quiet rebellion against central banks that echoes the Asante’s independence from state-issued money. The spoons—each a tool of meticulous trade—foreshadow Bitcoin’s blockchain, a ledger of unalterable trust. Their story reaffirms an enduring economic principle: money’s strength lies in its resistance to debasement, not in the power of its issuer. The Asante built an empire on this foundation, leveraging gold dust to forge a society of wealth and stability. Bitcoin, unbound by geography or politics, extends this logic into an era of unprecedented connectivity. If the Asante achieved such heights with a regional system, what might Bitcoin accomplish as a global one? The answer lies not in speculation, but in the hands of those who understand and wield its potential.
-
@ 866e0139:6a9334e5
2025-03-26 06:56:05Autor: Dr. Ulrike Guérot. (Foto: Manuela Haltiner). Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier.**
Ich bin 60 Jahre. Einer meiner Großväter, Wilhelm Hammelstein, liegt auf dem Soldatenfriedhof in Riga begraben. Der andere, mütterlicherseits, Paul Janus, kam ohne Beine aus dem Krieg zurück, auch aus Russland. Ich kenne ihn nur mit Prothesen und Krücken. Er hat immer bei Wetterwechsel über Phantomschmerz geklagt und ist seines Lebens nicht mehr froh geworden. Den Krieg hat man ihm im Gesicht angesehen, auch wenn ich das als kleines Mädchen nicht verstanden habe.
"Ihr könnt euch nicht vorstellen, was ich gesehen habe"
Von den Russen hat er trotzdem nie schlecht geredet. Was er immer nur zu uns Enkelkindern gesagt war: *„Ihr könnt euch nicht vorstellen, was ich gesehen habe“. * Wir haben es nicht verstanden, als 6- oder 8-Jährige, und haben gelacht. Manchmal haben wir ihm seine Krücken weggenommen, die immer an den Ohrensessel gelehnt waren, dann konnte Opa Paul nicht aufstehen und ist wütend geworden.
Meine Mutter, Helga Hammelstein, ist im Mai 1939 gleichsam in den Krieg hineingeboren worden, in Schlesien. 1945 gab es für sie, wie für viele, Flucht und Vertreibung. Ob sie und ihre zwei Schwestern von den Russen vergewaltigt wurden – wie damals so viele – kann ich nicht sagen. Diese Themen waren bei uns tabuisiert. Was ich sagen kann, ist, dass meine Mutter als Flüchtlings- und Kriegskind vom Krieg hochgradig traumatisiert war – und als Kriegsenkelin war oder bin ich es wohl auch noch. Eigentlich merke ich das erst heute so richtig, wo wieder Krieg auf dem europäischen Kontinent ist und Europa auch in den Krieg ziehen, wo es kriegstüchtig gemacht werden soll.
Vielleicht habe ich mich aufgrund dieser Familiengeschichte immer so für Europa, für die europäische Integration interessiert, für die EU, die einmal als Friedensprojekt geplant war. Ich habe Zeit meines Lebens, seit nunmehr 30 Jahren, in verschiedenen Positionen, als Referentin im Deutschen Bundestag, in Think Tanks oder an Universitäten akademisch, intellektuell, publizistisch und künstlerisch zum Thema Europa gearbeitet.
1989 habe ich einen Franzosen geheiratet, ich hatte mich beim Studium in Paris verliebt und in den 1990-Jahren in Paris zwei Söhne bekommen. Auch in der französischen Familie gab es bittere Kriegserfahrungen: der Mann der Oma meines damaligen Mannes war 6 Jahre in deutscher Kriegsgefangenschaft. „Pourquoi tu dois marier une Allemande?“ „Warum musst du eine Deutsche heiraten?“, wurde mein damaliger Mann noch gefragt. Das Misstrauen mir gegenüber wurde erst ausgeräumt, als wir ihr 1991 den kleinen Felix, unseren erstgeborenen Sohn, in den Schoß gelegt haben.
Das europäische Friedensprojekt ist gescheitert
Das europäische Einheits- und Friedensprojekt war damals, nach dem Mauerfall, in einer unbeschreiblichen Aufbruchstimmung, die sich heute niemand mehr vorstellen kann: Der ganze Kontinent in fröhlicher Stimmung - insieme, gemeinsam, together, ensemble – und wollte politisch zusammenwachsen. Heute ist es gescheitert und ich fasse es nicht! Das Kriegsgeheul in ganz Europa macht mich nachgerade verrückt.
Darum habe ich ein europäisches Friedensprojekt ins Leben gerufen: TheEuropean Peace Project. Am Europatag, den 9. Mai, um 17 Uhr, wollen wir in ganz Europa in allen europäischen und auf dem ganzen europäischen Kontinent als europäische Bürger den Frieden ausrufen! Ich würde mich freuen, wenn viele mitmachen!
DIE FRIEDENSTAUBE JETZT ABONNIEREN:
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel in Ihr Postfach, vorerst für alle kostenfrei, wir starten gänzlich ohne Paywall. (Die Bezahlabos fangen erst zu laufen an, wenn ein Monetarisierungskonzept für die Inhalte steht).
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: milosz@pareto.space oder kontakt@idw-europe.org.
Wo bleibt ein deutsch-russisches Jugendwerk?
Mein Lieblingsbuch zu Europa ist Laurent Gaudet, Nous, L’Europe, banquet des peuples. „Wir, Europa! Ein Banquet der Völker“ Es ist ein großartiges Gedicht, etwa wie die Ilias von Homer. Es beschreibt die letzten einhundert Jahre europäische Geschichte, die ganzen Krieg und Revolutionen. Und es beschreibt doch, was uns als Europäer eint. Darin findet sich der – für mich wunderschöne! - Satz: „Ce que nous partageons, c’est ce que nous étions tous bourraux et victime.“ „Was wir als Europäer teilen ist, dass wir alle zugleich Opfer und Täter waren“.
Und doch haben wir es geschafft, die „Erbfeindschaft“ zu beenden und uns auszusöhnen, zum Beispiel die Deutschen und Franzosen, über ein deutsch-französisches Jugendwerk, das 1963 gegründet wurde. So ein Jugendwerk wünsche ich mir auch heute zwischen Europa und Russland!
Das Epos von Laurent Gaudet ist in einem Theaterstück von dem französischen Regisseur Roland Auzet auf die Bühne gebracht worden. In dem 40-köpfigen Ensemble sind verschiedene Nationalitäten aus ganz Europa: das Stück ist fantastisch! Ich selber habe es auf dem Theaterfestival in Avignon 2019 sehen dürfen!
Ich wünsche mir, dass wir statt jetzt für Milliarden überall in Europa Waffen zu kaufen, das Geld dafür auftreiben, dieses Theaterstück in jede europäische Stadt zu bringen: wenn das gelänge, hätten wohl alle verstanden, was es heißt, Europäer zu sein: nämlich Frieden zu machen!
Ulrike Guérot, Jg. 1964, ist europäische Professorin, Publizistin und Bestsellerautorin. Seit rund 30 Jahren beschäftigt sie sich in europäischen Think Tanks und Universitäten in Paris, Brüssel, London, Washington, New York, Wien und Berlin mit Fragen der europäischen Demokratie, sowie mit der Rolle Europas in der Welt. Ulrike Guérot ist seit März 2014 Gründerin und Direktorin des European Democracy Labs, e.V.,Berlin und initiierte im März 2023 das European Citizens Radio, das auf Spotify zu finden ist. Zuletzt erschien von ihr "Über Halford J. Mackinders Heartland-Theorie, Der geografische Drehpunkt der Geschichte", Westend, 2024). Mehr Infos zur Autorin hier.
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ da0b9bc3:4e30a4a9
2025-03-26 06:54:00Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/925400
-
@ d9422098:7ee511a3
2025-03-26 05:04:03екненлотлоло
-
@ e5de992e:4a95ef85
2025-03-26 04:57:53Overview
On March 25, 2025, U.S. stock markets experienced modest gains despite declining volume and a drop in the Consumer Confidence Index, indicating that investors remain cautiously optimistic amid mixed economic signals.
U.S. Stock Indices
- S&P 500:
- Increased by 0.2%
- Closed at 5,776.65 points
-
Marked its third consecutive winning session, but volume was declining.
-
Dow Jones Industrial Average (DJIA):
- Rose marginally by 0.01%
- Ended at 42,587.50 points
-
Volume was declining.
-
Nasdaq Composite:
- Advanced by 0.5%
- Finished at 18,271.86 points
- Volume was declining.
U.S. Futures Market
- S&P 500 Futures:
-
Rose by 0.06%, suggesting a modestly positive opening.
-
Dow Jones Futures:
- Remained unchanged, indicating a neutral sentiment among investors.
Note: Both futures segments are experiencing low volume.
Key Factors Influencing U.S. Markets
-
Trade Policy Developments:
Investor sentiment has been influenced by reports suggesting that President Donald Trump's proposed tariffs may be more narrowly targeted than initially feared—potentially exempting certain sectors. This has alleviated some concerns regarding the impact of trade policies on economic growth. -
Economic Data Releases:
The Consumer Confidence Index declined, reflecting growing concerns about economic expectations. However, positive corporate earnings reports have contributed to the market's resilience. -
Sector-Specific News:
- International Paper saw significant stock price increases due to upbeat growth outlooks.
- United Parcel Service (UPS) faced declines amid reduced earnings projections.
Global Stock Indices Performance
International markets displayed mixed performances:
- Germany's DAX:
- Experienced a slight decline of 0.32%
- Closed at 23,109.79 points
-
Initial optimism regarding tariff negotiations waned.
-
UK's FTSE 100:
- Fell marginally by 0.10%
-
Reflects investor caution amid mixed economic data.
-
Hong Kong's Hang Seng:
- Declined by 2.35%
- Closed at 23,344.25 points
-
Impacted by a downturn in Chinese tech shares and ongoing tariff concerns.
-
Japan's Nikkei 225:
- Showed resilience with a modest gain, influenced by positive domestic economic indicators.
Cryptocurrency Market
The cryptocurrency market has experienced notable activity:
- Bitcoin (BTC):
- Trading at approximately $87,460
-
Down 1.23% from the previous close.
-
Ethereum (ETH):
- Priced around $2,057.22
- Marked a 0.69% uptick from the prior session.
These movements indicate the market’s sensitivity to regulatory developments and macroeconomic factors.
Key Global Economic and Geopolitical Events
-
Trade Tensions and Tariff Policies:
Ongoing discussions regarding U.S. tariff implementations have created an atmosphere of uncertainty, influencing global market sentiment and leading to cautious investor behavior. -
Central Bank Communications:
Statements from Federal Reserve officials and other central bank representatives are being closely monitored for insights into future monetary policy directions, especially in light of evolving economic conditions and inflationary pressures. -
Cryptocurrency Regulatory Environment:
Anticipation of a more favorable regulatory landscape under the current administration has contributed to recent rallies in major cryptocurrencies, though analysts caution that these rebounds may be fleeting amid broader market dynamics.
Conclusion
Global financial markets are navigating a complex environment shaped by trade policy developments, economic data releases, and sector-specific news. Investors are advised to remain vigilant and consider these factors when making informed decisions, as they are likely to continue influencing market behavior in the foreseeable future.
-
@ 9711d1ab:863ebd81
2025-03-26 03:36:56Welcome back friends! We’ve made it to the end of March, congratulations. Here’s what we’ve got to share this month:
-
🎓 The SDK Class of Q1
-
🤓 Back to School with Antonio
-
⚡️ Lightning is Everywhere
-
🎙️ Shooting the Breez with Danny, Umi & Roy
The SDK Class of Q1 2025 🎓
We’ve been talking a lot about momentum at Breez and we’re seeing it build every day. More partners are adding Bitcoin payments with our SDK and more sats are moving freely around the world. By offering the choice of two implementations, Nodeless and Native, we’re truly building the best Lightning developer experience out there.
And the momentum just keeps growing stronger.
In fact, we’ve welcomed so many new partners that we had to bundle them all into one big announcement — it’s our pleasure to welcome the SDK Class of Q1 2025: Assetify, Cowbolt, DexTrade, Flash, Lightning Pay, OpenAgents, Satoshi, Shakesco, Tidebinder, and ZapZap.
---
Back to School with Antonio 🚌
We tell everyone we meet that adding Bitcoin payments to apps is really easy with the Breez SDK. But rather than just tell you this, we’ve decided to show you.
Antonio, one of our talented developers at Breez, has produced a video tutorial showing how you can add Bitcoin payments to React Native and Expo apps with the Breez SDK - Nodeless.
Join him as he guides you through each step and shows that it really is that *easy* to add Bitcoin payments to any app with our SDK.
Lightning is Everywhere.
It’s true — Lightning is everywhere.
Bitcoin payments aren’t just a thing for the few, they’re for the many.
This month, we’re showcasing our friends at Cowbolt. They’ve just released their collaborative cost-splitting, team-chat, and self-custody app (check it out).
Shooting the Breez 🌬️
Since releasing our Bitcoin payment report — where we explained that Bitcoin isn’t just digital gold, it’s a thriving everyday currency accessible to millions of people around the world — Bitcoin payments have been the talk of the town.
As co-author of the report, I joined the Stephan Livera Podcast to discuss the growing trend in more detail. I also met up with Bo Jablonski to explain why more and more apps are taking notice on the newly-formed Guardians of Bitcoin radio show.
Developments have come thick and fast over the past month — most notably, the announcement of USDT coming to Lightning (check out Roy’s take on the good, the bad, and the unknown in Bitcoin Magazine). Breez’s BD Lead, Umi, joined a Spaces on X with UXTO, Amboss, and Lightning Labs to discuss the stablecoin’s imminent arrival on the network.
That’s not all from Umi, she also joined her alma mater at the Cornell Bitcoin Club to explain why bitcoin is a medium of exchange, thanks to Lightning.
And last but not least, Roy was spreading the good word of Bitcoin, joining Bitfinex’s podcast to explain how Lightning is truly changing the game.
And there we go folks, another edition of Feel the Breez has come to a close.
As always, we’ll leave you with our usual parting comment: the best time to get into Lightning is now — it always has been.
Stay tuned for exciting announcements we’ll be releasing soon.
Until next time ✌️
-
-
@ 220522c2:61e18cb4
2025-03-26 03:24:25npub1ygzj9skr9val9yqxkf67yf9jshtyhvvl0x76jp5er09nsc0p3j6qr260k2
-
@ 1bda7e1f:bb97c4d9
2025-03-26 03:23:00Tldr
- Nostr is a new open social protocol for the internet
- You can use it to create your own online community website/app for your users
- This needs only a few simple components that are free and open source
- Jumble.Social client is a front-end for showing your community content to your users
- Simple With Whitelist relay (SW2) is a back-end with simple auth for your community content
- In this blog I explain the components and set up a online community website/app that any community or company can use for their own users, for free.
You Can Run Your Own Private "X" For Free
Nostr is a new open social protocol for the internet. Because it is a protocol it is not controlled by any one company, does not reside on any one set of servers, does not require any licenses, and no one can stop you from using it however you like.
When the name Nostr is recognised, it is as a "Twitter/X alternative" – that is an online open public forum. Nostr is more than just this. The open nature of the protocol means that you can use it however you feel like, including that you can use it for creating your own social websites to suit whatever goals you have – anything from running your own team collaboration app, to running your own online community.
Nostr can be anything – not just an alternative to X, but also to Slack, Teams, Discord, Telegram (etc) – any kind of social app you'd like to run for your users can be run on Nostr.
In this blog I will show you how to launch your own community website, for your community members to use however they like, with low code, and for free.
Simple useful components
Nostr has a few simple components that work together to provide your experience –
- Your "client" – an app or a website front-end that you log into, which displays the content you want to see
- Your "relay" – a server back-end which receives and stores content, and sends it to clients
- Your "user" – a set of keys which represents a user on the network,
- Your "content" – any user content created and signed by a user, distributed to any relay, which can be picked up and viewed by any client.
It is a pattern that is used by every other social app on the internet, excepting that in those cases you can usually only view content in their app, and only post your content to their server.
Vs with Nostr where you can use any client (app) and any relay (server), including your own.
This is defined as a standard in NIP-01 which is simple enough that you can master it in a weekend, and with which you can build any kind of application.
The design space is wide open for anyone to build anything–
- Clones of Twitter, Instagram, Telegram, Medium, Twitch, etc,
- Whole new things like Private Ephemeral Messengers, Social Podcasting Apps, etc,
- Anything else you can dream up, like replacements for B2B SaaS or ERP systems.
Including that you can set up and run your own "X" for your community.
Super powers for –private– social internet
When considering my use of social internet, it is foremost private not public. Email, Whatsapp, Slack, Teams, Discord, Telegram (etc), are all about me, as a user, creating content for a selected group of individuals – close friends, colleagues, community members – not the wider public.
This private social internet is crying out for the kind of powers that Nostr provides. The list of things that Nostr solves for private social internet goes on-and-on.
Let me eat my own dog food for a moment.
- I am a member of a community of technology entrepreneurs with an app for internal community comms. The interface is not fit for this purpose. Good content gets lost. Any content created within the walled kingdom cannot be shared externally. Community members cannot migrate to a different front-end, or cross-post to public social channels.
- I am a member of many communities for kids social groups, each one with a different application and log in. There is no way to view a consolidated feed. There is no way to send one message to many communities, or share content between them. Remembering to check every feed separately is a drag.
- I am a member of a team with an app for team comms. It costs $XXX per user per month where it should be free. I can't self-host. I can't control or export my data. I can't make it interoperate natively with other SaaS. All of my messages probably go to train a Big Co AI without my consent.
In each instance "Nostr fixes this."
Ready now for low-code admins
To date Nostr has been best suited to a more technical user. To use the Nostr protocol directly has been primarily a field of great engineers building great foundations.
IMO these foundations are built. They are open source, free to use, and accessible for anyone who wants to create an administer their own online community, with only low code required.
To prove it, in this blog I will scratch my own itch. I need a X / Slack / Teams alternative to use with a few team members and friends (and a few AIs) as we hack on establishing a new business idea.
I will set this up with Nostr using only open source code, for free.
Designing the Solution
I am mostly non-technical with helpful AI. To set up your own community website in the style of X / Slack / Teams should be possible for anyone with basic technology skills.
- I have a cheap VPS which currently runs some other unrelated Nostr projects in Docker containers,
- My objective was to set up and run my own community website for my own team use, in Docker, hosted on my own server.
User requirements
What will I want from a community website?
- I want my users to be able to log into a website and post content,
- I want to save that content to a server I control accessed only be people I authorise,
- I want my users to view only that content by default, and not be exposed to any wider public social network unless they knowingly select that,
- I want my user's content to be either:
- a) viewable only by other community members (i.e. for internal team comms), or
- b) by the wider public (i.e. for public announcements), at the user's discretion.
- I want it to be open source so that other people maintain the code for me,
- I want it for free.
Nostr solutions
To achieve this with Nostr, I'll need to select some solutions "a-la carte" for each of the core components of the network.
- A client – For my client, I have chosen Jumble. Jumble is a free open-source client by Cody Tseng, available free on Github or at Jumble.social. I have chosen Jumble because it is a "relay-centric" client. In key spots the user interface highlights for the user what relay they are viewing, and what relay they are posting to. As a result, it is a beautiful fit for me to use as the home of all my community content.
- A relay – For my relay, I have chosen Simple With Whitelist (SW2). SW2 is a free open-source relay by Utxo The Webmaster, based on Khatru by Fiatjaf, available free on Github. I have chosen SW2 because it allows for very simple configuration of user auth. Users can be given read access to view notes, and write access to post notes within simple
config.json
files. This allows you to keep community content private or selectively share it in a variety of ways. Per the Nostr protocol, your client will connect with your relay via websocket. - A user sign-up flow – Jumble has a user sign-up flow using Nstart by Fiatjaf, or as an admin I can create and provision my own users with any simple tool like NAK or Nostrtool.
- A user content flow – Jumble has a user content flow that can post notes to selected relays of the users choice. Rich media is uploaded to free third-party hosts like Nostr.build, and in the future there is scope to self-host this too.
With each of these boxes ticked I'm ready to start.
Launching a Private Community Website with Jumble and SW2
Install your SW2 relay
The relay is the trickiest part, so let's start there. SW2 is my Nostr relay software of choice. It is a Go application and includes full instructions for Go install. However, I prefer Docker, so I have built a Docker version and maintain a Docker branch here.
1 – In a terminal clone the repo and checkout the Docker branch
git clone https://github.com/r0d8lsh0p/sw2.git cd sw2 git checkout docker
2 – Set up the environment variables
These are specified in the readme. Duplicate the example .env file and fill it with your variables.
cp .env.example .env
For me this .env file was as follows–
```
Relay Metadata
RELAY_NAME="Tbdai relay" RELAY_PUBKEY="ede41352397758154514148b24112308ced96d121229b0e6a66bc5a2b40c03ec" RELAY_DESCRIPTION="An experimental relay for some people and robots working on a TBD AI project." RELAY_URL="wss://assistantrelay.rodbishop.nz" RELAY_ICON="https://image.nostr.build/44654201843fc0f03e9a72fbf8044143c66f0dd4d5350688db69345f9da05007.jpg" RELAY_CONTACT="https://rodbishop.nz" ```
3 – Specify who can read and write to the relay
This is controlled by two config files
read_whitelist.json
andwrite_whitelist.json
.- Any user with their pubkey in the
read_whitelist
can read notes posted to the relay. If empty, anyone can read. - Any user with their pubkey in the
write_whitelist
can post notes to the relay. If empty, anyone can write.
We'll get to creating and authorising more users later, for now I suggest to add yourself to each whitelist, by copying your pubkey into each JSON file. For me this looks as follows (note, I use the 'hex' version of the pubkey, rather than the npub)–
{ "pubkeys": [ "1bda7e1f7396bda2d1ef99033da8fd2dc362810790df9be62f591038bb97c4d9" ] }
If this is your first time using Nostr and you don't yet have any user keys, it is easy and free to get one. You can get one from any Nostr client like Jumble.social, any tool like NAK or nostrtool.com or follow a comprehensive guide like my guide on mining a Nostr key.
4 – Launch your relay
If you are using my Docker fork from above, then–
docker compose up
Your relay should now be running on port 3334 and ready to accept web socket connections from your client.
Before you move on to set up the client, it's helpful to quickly test that it is running as expected.
5 – Test your websocket connection
For this I use a tool called wscat to make a websocket connection.
You may need to install wscat, e.g.
npm install -g wscat
And then run it, e.g.
wscat -c ws://localhost:3334
(note use
ws://
for localhost, rather thanwss://
).If your relay is working successfully then it should receive your websocket connection request and respond with an AUTH token, asking you to identify yourself as a user in the relay's
read_whitelist.json
(using the standard outlined in NIP-42), e.g.``` Connected (press CTRL+C to quit) < ["AUTH","13206fea43ef2952"]
```
You do not need to authorise for now.
If you received this kind of message, your relay is working successfully.
Set a subdomain for your relay
Let's connect a domain name so your community members can access your relay.
1 – Configure DNS
At a high level –
- Get your domain (buy one if you need to)
- Get the IP address of your VPS
- In your domain's DNS settings add those records as an A record to the subdomain of your choice, e.g.
relay
as inrelay.your_domain_name.com
, or in my caseassistantrelay.rodbishop.nz
Your subdomain now points to your server.
2 – Configure reverse proxy
You need to redirect traffic from your subdomain to your relay at port
3334
.On my VPS I use Caddy as a reverse proxy for a few projects, I have it sitting in a separate Docker network. To use it for my SW2 Relay required two steps.
First – I added configuration to Caddy's
Caddyfile
to tell it what to do with requests for therelay.your_domain_name.com
subdomain. For me this looked like–assistantrelay.rodbishop.nz { reverse_proxy sw2-relay:3334 { # Enable WebSocket support header_up X-Forwarded-For {remote} header_up X-Forwarded-Proto {scheme} header_up X-Forwarded-Port {server_port} } }
Second – I added the Caddy Docker network to the SW2
docker-compose.yml
to make it be part of the Caddy network. In my Docker branch, I provide this commented section which you can uncomment and use if you like.``` services: relay: ... relay configuration here ...
networks:
- caddy # Connect to a Caddy network for reverse proxy
networks:
caddy:
external: true # Connect to a Caddy network for reverse proxy
```
Your relay is now running at your domain name.
Run Jumble.social
Your client set up is very easy, as most heavy lifting is done by your relay. My client of choice is Jumble because it has features that focus the user experience on the community's content first. You have two options for running Jumble.
- Run your own local copy of Jumble by cloning the Github (optional)
- Use the public instance at Jumble.social (easier, and what we'll do in this demo)
If you (optionally) want to run your own local copy of Jumble:
git clone https://github.com/CodyTseng/jumble.git cd jumble npm install npm run dev
For this demo, I will just use the public instance at http://jumble.social
Jumble has a very helpful user interface for set up and configuration. But, I wanted to think ahead to onboarding community members, and so instead I will do some work up front in order to give new members a smooth onboarding flow that I would suggest for an administrator to use in onboarding their community.
1 – Create a custom landing page URL for your community members to land on
When your users come to your website for the first time, you want them to get your community experience without any distraction. That will either be–
- A prompt to sign up or login (if only authorised users can read content)
- The actual content from your other community members (If all users can read content)
Your landing page URL will look like:
http://jumble.social/?r=wss://relay.your_domain_name.com
http://jumble.social/
– the URL of the Jumble instance you are using?r=
– telling Jumble to read from a relaywss://
– relays connect via websocket using wss, rather than httpsrelay.your_domain_name.com
– the domain name of your relay
For me, this URL looks like
http://jumble.social/?r=wss://assistantrelay.rodbishop.nz
2 – Visit your custom Jumble URL
This should load the landing page of your relay on Jumble.
In the background, Jumble has attempted to establish a websocket connection to your relay.
If your relay is configured with read authentication, it has sent a challenge to Jumble asking your user to authenticate. Jumble, accordingly should now be showing you a login screen, asking your user to login.
3 – Login or Sign Up
You will see a variety of sign up and login options. To test, log in with the private key that you have configured to have read and write access.
In the background, Jumble has connected via websocket to your relay, checked that your user is authorised to view notes, and if so, has returned all the content on the relay. (If this is your first time here, there would not be any content yet).
If you give this link to your users to use as their landing page, they will land, login, and see only notes from members of your community.
4– Make your first post to your community
Click the "post" button and post a note. Jumble offers you the option to "Send only to relay.your_domain_name.com".
- If set to on, then Jumble will post the note only to your relay, no others. It will also include a specific tag (the
"-"
tag) which requests relays to not forward the note across the network. Only your community members viewing notes on your community relay can see it. - If set to off, then Jumble will post the note to your relay and also the wider public Nostr network. Community members viewing notes on the relay can see it, and so can any user of the wider Nostr network.
5– Optional, configure your relay sets
At the top of the screen you should now see a dropdown with the URL of your relay.
Each user can save this relay to a "relay set" for future use, and also view, add or delete other relays sets including some sets which Jumble comes with set up by default.
As an admin you can use this to give users access to multiple relays. And, as a user, you can use this to access posts from multiple different community relays, all within the one client.
Your community website is up and running
That is the basic set up completed.
- You have a website where your community members can visit a URL to post notes and view all notes from all other members of the community.
- You have basic administration to enforce your own read and write permissions very simply in two json files.
Let's check in with my user requirements as a community admin–
- My community is saving content to a server where I control access
- My users view only that content by default, and are not exposed to any wider public social network unless they knowingly select that
- My user's content is a) viewable only by other community members, or b) by the wider public, at the user's discretion
- Other people are maintaining the code for me
- It's free
This setup has scope to solve my dog fooding issues from earlier–
- If adopted, my tech community can iterate the interface to suit its needs, find great content, and share content beyond the community.
- If adopted, my kids social groups can each have their own relays, but I can post to all of them together, or view a consolidated feed.
- If adopted, my team can chat with each other for free. I can self host this. It can natively interoperate with any other Nostr SaaS. It would be entirely private and will not be captured to train a Big Co AI without my consent.
Using your community website in practice
An example onboarding flow
- A new member joins your IRL community
- Your admin person gives them your landing page URL where they can view all the posts by your community members – If you have configured your relay to have no read auth required, then they can land on that landing page and immediately start viewing your community's posts, a great landing experience
- The user user creates a Nostr profile, and provides the admin person with their public key
- The admin person adds their key to the whitelists to read and write as you desire.
Default inter-op with the wider Nostr network
- If you change your mind on SW2 and want to use a different relay, your notes will be supported natively, and you can migrate on your own terms
- If you change your mind on Jumble and want to use a different client, your relay will be supported natively, and you can migrate on your own terms
- If you want to add other apps to your community's experience, every Nostr app will interoperate with your community by default – see the huge list at Awesome Nostr
- If any of your users want to view your community notes inside some other Nostr client – perhaps to see a consolidated feed of notes from all their different communities – they can.
For me, I use Amethyst app as my main Nostr client to view the public posts from people I follow. I have added my private community relay to Amethyst, and now my community posts appear alongside all these other posts in a single consolidated feed.
Scope to further improve
- You can run multiple different relays with different user access – e.g. one for wider company and one for your team
- You can run your own fork of Jumble and change the interface to suit you needs – e.g. add your logo, change the colours, link to other resources from the sidebar.
Other ideas for running communities
- Guest accounts: You can give a user "guest" access – read auth, but no write auth – to help people see the value of your community before becoming members.
- Running a knowledge base: You can whitelist users to read notes, but only administrators can post notes.
- Running a blind dropbox: You can whitelist users to post notes, but only the administrator can read notes.
- Running on a local terminal only: With Jumble and SW2 installed on a machine, running at –
localhost:5173
for Jumble, andlocalhost:3334
for SW2 you can have an entirely local experience athttp://localhost:5173/?r=ws://localhost:3334
.
What's Next?
In my first four blogs I explored creating a good Nostr setup with Vanity Npub, Lightning Payments, Nostr Addresses at Your Domain, and Personal Nostr Relay.
Then in my latest three blogs I explored different types of interoperability with NFC cards, n8n Workflow Automation, and now running a private community website on Nostr.
For this community website–
- There is scope to make some further enhancements to SW2, including to add a "Blossom" media server so that community admins can self-host their own rich media, and to create an admin screen for administration of the whitelists using NIP-86.
- There is scope to explore all other kinds of Nostr clients to form the front-end of community websites, including Chachi.chat, Flotilla, and others.
- Nostr includes a whole variety of different optional standards for making more elaborate online communities including NIP-28, NIP-29, NIP-17, NIP-72 (etc). Each gives certain different capabilities, and I haven't used any of them! For this simple demo they are not required, but each could be used to extend the capabilities of the admin and community.
I am also doing a lot of work with AI on Nostr, including that I use my private community website as a front-end for engaging with a Nostr AI. I'll post about this soon too.
Please be sure to let me know if you think there's another Nostr topic you'd like to see me tackle.
GM Nostr.
-
@ 00f8d531:a838c062
2025-03-26 00:21:41Dear nostr, I love you. Stay frosty.
-
@ 5256d869:9a567e23
2025-03-26 00:09:55Pages stretch like waves, but a single drop remains— just read the last line.
-
@ e516ecb8:1be0b167
2025-03-25 23:49:34En los años 20, Estados Unidos vivía una juerga económica conocida como los "Roaring Twenties". La Gran Guerra había terminado, la industria estaba en auge, los autos llenaban las calles y el jazz resonaba en cada esquina. Todo parecía ir viento en popa: las acciones subían como espuma, la gente compraba a crédito como si no hubiera mañana y los bancos estaban felices de prestar dinero. Pero, según los economistas austriacos —piensa en Ludwig von Mises o Friedrich Hayek—, esta prosperidad era una fachada, una burbuja inflada artificialmente que tarde o temprano iba a estallar.
La Escuela Austriaca sostiene que el verdadero villano de esta historia no fue la codicia de los especuladores ni el exceso de optimismo, sino algo más sutil y estructural: la manipulación del dinero y el crédito por parte de la Reserva Federal. Vamos a desglosarlo paso a paso, como si estuviéramos destapando una intriga.
Acto 1: La Reserva Federal enciende la mecha
Tras su creación en 1913, la Reserva Federal (el banco central de EE.UU.) tenía el poder de controlar la oferta de dinero y las tasas de interés. En la década de 1920, decidió que era buena idea mantener las tasas de interés artificialmente bajas. ¿Por qué? Para estimular la economía, ayudar a Gran Bretaña a volver al patrón oro y mantener la fiesta en marcha. Pero para los austriacos, esto fue como echar gasolina a una fogata.
Cuando las tasas de interés se mantienen bajas por decreto, el dinero se vuelve "barato". Los bancos prestan más de lo que lo harían en un mercado libre, y ese crédito fácil fluye hacia empresas, inversores y consumidores. Es como si le dieras a todo el mundo una tarjeta de crédito sin límite: la gente empieza a gastar, invertir y construir como si la riqueza fuera infinita. Pero aquí viene el giro: ese dinero no reflejaba ahorros reales ni riqueza genuina. Era una ilusión creada por la expansión del crédito.
Acto 2: El auge insostenible
Con este dinero barato, los empresarios se lanzaron a proyectos ambiciosos: fábricas, rascacielos, nuevas tecnologías. Los inversores, por su parte, corrieron a Wall Street, comprando acciones a crédito (lo que se llamaba "comprar al margen"). El mercado de valores se disparó: el índice Dow Jones pasó de 63 puntos en 1921 a 381 en 1929. ¡Una locura! La gente común, desde taxistas hasta amas de casa, se metió al juego, convencida de que las acciones solo podían subir.
Para la Escuela Austriaca, este "boom" era una distorsión. Según su teoría del ciclo económico, desarrollada por Mises y Hayek, cuando el crédito se expande artificialmente, los recursos se mal asignan. Imagina que eres un chef con un presupuesto limitado: si alguien te da dinero falso para comprar ingredientes, harás platos extravagantes que no puedes sostener cuando el dinero real se acabe. Eso estaba pasando en la economía: se construían cosas que no tenían demanda real ni base sólida.
Acto 3: La burbuja empieza a pincharse
Hacia 1928, algunos empezaron a oler problemas. La producción industrial comenzó a tambalearse, los inventarios se acumulaban y las deudas crecían. La Reserva Federal, dándose cuenta de que la fiesta se estaba descontrolando, intentó subir las tasas de interés para enfriar las cosas. Pero era demasiado tarde: la economía ya estaba dopada con crédito fácil, y el daño estaba hecho.
El 24 de octubre de 1929 —el famoso "Jueves Negro"— el pánico estalló en Wall Street. Los inversores, viendo que las acciones estaban sobrevaloradas y que sus deudas eran impagables, empezaron a vender en masa. El martes siguiente, 29 de octubre, el mercado colapsó por completo: millones de acciones cambiaron de manos, los precios se desplomaron y la riqueza en papel se evaporó. Pero para los austriacos, esto no fue la causa del problema, sino el síntoma. El verdadero desastre ya había ocurrido en los años previos, con la expansión artificial del crédito.
Epílogo: La lección austriaca
Desde la perspectiva de la Escuela Austriaca, el Crack del 29 no fue un fallo del libre mercado, sino del intervencionismo. La Reserva Federal, al manipular las tasas de interés y la oferta de dinero, creó una burbuja que era insostenible. Cuando estalló, la economía tuvo que pasar por una dolorosa "corrección": las empresas quebraron, los bancos cerraron y el desempleo se disparó. Para Mises y Hayek, esto era inevitable: el mercado necesitaba purgar los excesos y realinear los recursos con la realidad.
¿Y qué pasó después? Bueno, la Gran Depresión que siguió fue agravada, según los austriacos, por más intervenciones: el New Deal de Roosevelt y las políticas proteccionistas como la Ley Smoot-Hawley solo prolongaron la agonía. Pero esa es otra historia para otro café.
-
@ 1e5d0f11:12eeba92
2025-03-25 23:42:33Una semana en Nostr
Mucho tiempo ha pasado desde la primera vez que escuche de Nostr, guiado por mi eterna curiosidad ante cada nueva tecnología que descubro en internet decidí sumergirme en este protocolo, lo que encontré en ese entonces era un recién nacido, tenia todo el potencial de crecer y convertirse en algo grande y usado por muchas personas, pero todavía estaba en su infancia y los desarrolladores que tomaban provecho de este nuevo protocolo eran pocos y sus aplicaciones eran también jóvenes, ademas que los relés de Nostr (algo critico en su infraestructura) eran muy pocos, en conclusión estaba claro que había llegado muy temprano, y que Nostr todavía no era para alguien que se interesa por la tecnología pero cuya profesión no es el desarrollo de aplicaciones para internet, a esperar.
Grande fue mi sorpresa al volver a Nostr, al igual como ocurrió con muchos, fui recordado de Nostr gracias a Derek Ross y su charla en Nostr for Beginners w/ Derek Ross, al volver mi sorpresa fue grata, "no esta muerto" fue lo primero que pensé, esto porque es común que proyectos de código abiertos y que en superficie parece que intentaran reinventar la rueda están destinados al paredón de desarrolladores criticándolos o hundidos en el océano de Github sin nadie para explorar lo que pudo ser una buena idea, pero no Nostr, Nostr seguía vivo, creciendo y actualizando sus NIPs, gracias, en gran medida, a una generosa donación del co-fundador de Twitter (ahora llamado X o Xitter para algunos) en Bitcoins, la moneda del futuro y que derrotara al dinero fiduciario, o eso aseguran sus varios creyentes en Nostr, y Nostr esta lleno de ellos, lleno, sin duda impulsados por la importante donación que recibió el proyecto y por un mecanismo que lleva a este protocolo mas allá que otros: Nip-57. Lighting Zaps se llaman, y le da la posibilidad al usuario de transferir "Zaps", que como lo dice la propia pagina de Nostr es una propina que puede ser entregada a cualquier usuario que use Nostr y que ya tenga su billetera Lightning funcionando, y esto puede ser convertido en BTC, algo que no he probado y no creo lo haga en el corto tiempo, pero saber que tanto empeño se ha puesto en la creación de un nuevo protocolo pro incensurable que ademas incorpora elementos de cadena de bloques para proveer a creadores de contenido u otros con un método directo de financiación y así remover la necesidad de publicidad en las paginas algo que me parece saludable para internet, internet estaría mucho mejor sin tanto rastreador de publicidad y con mas respeto a la privacidad de los usuarios.
En fin, escribo esto como una prueba para saber como funcionan las publicaciones largas y tediosas desde Flycat, y bueno, seguiré usando el protocolo Nostr porque parece que ya esta en una etapa que me agrada y esta mas maduro, le contare a otros sobre Nostr, pero debo decir que entrar a Nostr, agregar relés y buscar usuarios para seguir es un proceso lento y tranquilo, no parece ser para el usuario común, pero al final siempre es uno el que configura las cuentas de sus padres y otros familiares.
-
@ 878dff7c:037d18bc
2025-03-25 23:32:39Federal Budget 2025: Comprehensive Analysis and Implications
Overview:
On March 25, 2025, Treasurer Jim Chalmers presented Australia's Federal Budget for the 2025–26 fiscal year. This budget introduces several significant measures aimed at providing immediate cost-of-living relief, stimulating economic growth, and addressing long-term structural challenges. Key components include:
-
Personal Income Tax Cuts: The budget outlines a reduction in the lowest marginal tax rate from 16% to 15% starting July 1, 2026, and further to 14% from July 1, 2027. This initiative is projected to cost $17.1 billion over three years and aims to benefit low and middle-income earners.
-
Energy Bill Relief: An extension of the Energy Bill Relief Fund will provide $150 rebates to households over the next six months, totaling $1.8 billion. This measure is designed to alleviate rising energy costs and is expected to reduce headline inflation by approximately 0.5 percentage points in 2025.
-
Healthcare Investments: Significant funding has been allocated to Medicare to enhance bulk billing services and reduce pharmaceutical costs under the Pharmaceutical Benefits Scheme (PBS), aiming to improve healthcare accessibility.
-
Housing Initiatives: The budget includes an $800 million expansion of the Help to Buy program, increasing eligibility criteria to assist first-home buyers. However, this measure is limited to 40,000 applicants, leading to concerns about its overall impact on housing affordability.
-
Economic Projections: The budget forecasts a return to deficits, with an anticipated shortfall of $27.6 billion for the 2025–26 fiscal year. Real GDP growth is projected at 2.25%, with unemployment rates expected to peak at 4.25%.
Expert Analyses:
-
Deloitte: Deloitte's analysis emphasizes the need for structural reforms to address underlying fiscal challenges, noting that while the budget provides immediate relief, it may not sufficiently tackle long-term economic issues.
-
PwC: PwC highlights the importance of enacting pending tax and superannuation measures to ensure fiscal stability, pointing out that the budget's forward tax agenda remains uncertain.
-
KPMG: KPMG observes that the budget attempts to balance immediate cost-of-living relief with long-term fiscal responsibility but notes that it may lack measures to boost productivity and incentivize business investment.
Reactions from News Sources:
-
ABC News described the budget as "cautiously optimistic," praising its cost-of-living focus but noting limited ambition in areas such as climate investment and innovation.
-
The Guardian called it a "modest" budget, identifying meaningful but narrow wins for renters, aged care, and public infrastructure, while critiquing it for its limited reach and reliance on temporary relief.
-
The Australian Financial Review emphasized the lack of bold economic reform, pointing out that while the tax cuts may assist consumers in the short term, the broader economic strategy appeared politically calculated rather than reform-driven.
-
News.com.au focused on practical household benefits, highlighting how the budget would impact average Australians. It praised the tax cuts and rebates but expressed skepticism about the housing measures' real-world impact.
-
The Australian accused the budget of being driven by “polling, not policy,” arguing that it sidesteps difficult reforms in areas like energy security, defense, and migration in favor of short-term voter appeal.
Sectoral Implications:
-
Business Investment: The budget projects modest business investment growth of 1.5% in 2025–26 and 2026–27, down from 6% in 2024–25. This decline is attributed to global economic uncertainties and trade tensions.
-
Tax Compliance: The Australian Taxation Office (ATO) will receive nearly $999 million over the next four years to enhance enforcement activities, aiming to recover an additional $3.2 billion in tax receipts by 2029.
-
Housing Market: Despite the expansion of the Help to Buy program, concerns remain about the budget's limited impact on housing affordability, with critics arguing that more comprehensive measures are needed to address supply constraints.
Conclusion:
The Federal Budget 2025 introduces measures aimed at providing immediate relief to Australian households and businesses. While it delivers on promises around tax cuts and cost-of-living support, several analysts and media commentators view it as lacking in ambition and long-term economic vision. The political nature of its design is evident, with many measures framed to appeal to voters in the lead-up to the next federal election. Its success will hinge on effective implementation and how well it navigates the evolving domestic and global economic landscape.
Sources: Deloitte - March 25, 2025, PwC Australia - March 25, 2025, KPMG Australia - March 25, 2025, The Guardian - March 25, 2025, News.com.au - March 26, 2025, The Australian - March 26, 2025, Australian Financial Review - March 26, 2025, ABC News - March 25, 2025
Apple Transforms AirPods Pro 2 into Hearing Aids
Summary:
Apple has released a software upgrade enabling AirPods Pro 2 to function as "clinical grade" hearing aids for individuals with mild to moderate hearing loss. This feature includes the ability to perform hearing tests using an iPhone or iPad. Priced at $399, the AirPods Pro 2 offer an affordable alternative to traditional hearing aids, which can cost thousands. Experts caution that while beneficial, professional guidance is essential, and the AirPods may not be suitable for everyone.
Sources: The Australian - March 26, 2025, The Guardian - March 26, 2025
2000km Rain Band to Drench Queensland and New South Wales
Summary:
A 2000km-long rain band, fueled by tropical air and a low-pressure system, is set to bring exceptionally high rainfall to Queensland and parts of New South Wales. Some regions have already experienced significant downpours, with 208mm recorded in the Central West and 145mm near Townsville. Severe weather warnings are in effect, with flash flooding reported and expected to worsen. Residents are advised to remain vigilant due to rising river and creek levels. In contrast, Western Australia is enduring record-breaking heat, with temperatures surpassing 39°C in certain areas.
Sources: News.com.au - March 26, 2025, ABC News - March 26, 2025
Projected Population Shift from New South Wales to Queensland
Summary:
Federal budget data projects that New South Wales will experience a net loss of 115,300 residents by 2028-29, primarily due to Sydney's high cost of living. Queensland is expected to gain approximately 110,500 residents during the same period. Other states like Victoria and Western Australia are also projected to see slight population increases, while South Australia, Tasmania, the Northern Territory, and the ACT may experience decreases.
Source: News.com.au - March 26, 2025
Ban on Non-Compete Clauses for Workers Earning Below $175,000
Summary:
The Australian government has announced plans to ban non-compete clauses for workers earning below $175,000 annually, including professions such as hairdressers, construction workers, and childcare staff. This initiative aims to enhance job mobility and is projected to boost the economy by approximately $5 billion, potentially increasing individual wages by up to $2,500 annually. The ban is set to take effect in 2027.
Sources: The Guardian - March 25, 2025, Mirage News - March 26, 2025, NAB Business - March 26, 2025
Geopolitical Tensions and Tariffs Hamper Australian Mining Investment
Summary:
Industry leaders express concern that escalating geopolitical tensions and tariffs are adversely affecting investment in Australia's mining sector. The uncertainty surrounding international trade policies, particularly from major partners like the United States and China, is leading to hesitancy among investors. This situation poses challenges for Australia's resource-driven economy, emphasizing the need for strategic responses to navigate the complex global landscape. Sources: National Security News - March 25, 2025
Government Launches Campaign on Tainted Alcohol Risks Abroad
Summary:
In response to the deaths of two Melbourne teenagers in Laos last year from methanol poisoning, the Australian government has initiated a campaign to raise awareness about the dangers of consuming tainted alcohol overseas. The campaign aims to educate young Australians on alcohol-related risks, signs of methanol poisoning, and safety measures through social media, text messages, and airport communications. Foreign Affairs Minister Penny Wong emphasized the importance of this initiative in preventing further tragedies.
Sources: ABC News - March 24, 2025, The Guardian - March 24, 2025
Boeing's MQ-28 Ghost Bat Completes 100th Flight
Summary:
Boeing's MQ-28 Ghost Bat, an uncrewed collaborative combat aircraft developed in partnership with the Royal Australian Air Force (RAAF), has successfully completed its 100th test flight. This milestone signifies the program's maturity and underscores Australia's growing role in advanced aerospace development. The MQ-28 is designed to operate alongside crewed aircraft, enhancing mission capabilities and providing a force multiplier effect. Looking ahead, Boeing plans to conduct an air-to-air missile test from the MQ-28 by late 2025 or early 2026, aiming to further integrate offensive capabilities into the platform.
Sources: Australian Defence Magazine - March 25, 2025, Breaking Defense - March 25, 2025, Flight Global - March 25, 2025, Boeing - March 25, 2025
Russia and Ukraine Agree to Black Sea Ceasefire
Summary:
In a significant development, Russia and Ukraine have agreed to a ceasefire in the Black Sea, aiming to ensure safe navigation and halt military engagements in the region. The agreement, brokered by the United States during separate talks held in Saudi Arabia, includes provisions to prevent the use of commercial vessels for military purposes and to implement a 30-day suspension of attacks on energy infrastructure. However, the implementation of the ceasefire is contingent upon the lifting of certain Western sanctions on Russia's agricultural and financial sectors, a condition that has sparked debate among international observers. Ukrainian President Volodymyr Zelenskyy has expressed cautious optimism, emphasizing the need for concrete actions over verbal commitments. Critics argue that the agreement may disproportionately favor Russia, potentially allowing it to consolidate its position in the region. The situation remains fluid, with further negotiations anticipated to address unresolved issues and ensure adherence to the ceasefire terms. Sources: Associated Press - March 26, 2025, The Guardian - March 26, 2025
UN Research Indicates Under-reported Methane Emissions from Queensland Mine
Summary:
A UN-backed study reveals that methane emissions from Glencore's Hail Creek coalmine in Queensland are likely three to eight times higher than reported. Using aircraft-based measurements, the study found emissions between 1.5Mt and 4.2Mt CO2e per year, compared to the reported 0.53Mt CO2e. This underscores the need for more accurate emission reporting methods, as methane is a potent greenhouse gas.
Sources: The Guardian - March 26, 2025
How to Improve Your Teeth & Oral Microbiome for Brain & Body Health
Summary:
In this episode of the Huberman Lab podcast, Dr. Andrew Huberman interviews Dr. Staci Whitman, a board-certified functional dentist specializing in pediatric and adult care. They discuss the critical role of oral health in overall brain and body wellness. Key topics include:
- Oral Microbiome's Impact: The balance of bacteria in the mouth influences systemic health, affecting digestion, immunity, and even neurological function.
- Preventive Dental Care: Emphasis on regular dental check-ups, proper brushing and flossing techniques, and the use of non-toxic dental products to maintain oral hygiene.
- Dietary Considerations: How nutrition affects oral health, highlighting the importance of reducing sugar intake and consuming nutrient-rich foods to support strong teeth and gums.
- Connections to Chronic Diseases: Exploring links between oral health issues like gum disease and conditions such as heart disease, diabetes, and Alzheimer's.
- Holistic Approaches: Discussion on integrating functional medicine practices into dentistry to address root causes of oral health problems rather than just symptoms.
This conversation underscores the importance of maintaining oral health as a vital component of overall well-being.
-
-
@ 2f4550b0:95f20096
2025-03-25 23:09:57Recently, I tuned into a prominent podcast where the conversation turned to what children are learning in K-12 education (around the 1:24:20 mark). Among the contributors was a Silicon Valley tech investor who shared a startling anecdote about an elite private school. He described how, at what he called “the best all-girls private school in Silicon Valley,” students were taught that reading was racist. He went on: “There was a spreadsheet that these kids had to memorize every day that had every other kid’s pronoun, and if you didn’t get it right you’d get in trouble.”
I was floored, not just by the absurdity of the curriculum, but by the casual assertion that a school teaching such ideas could still be deemed “the best.” How could an institution so detached from a rigorous, skill-building education retain that lofty title? I reflected on what truly makes an elite private school worthy of being called “the best,” a label too often thrown around without scrutiny.
Historically, top-tier private schools earned their reputations through academic excellence, robust curricula, and a commitment to preparing students for leadership and success. Think of the traditional hallmarks: mastery of core subjects like literature, mathematics, and science; critical thinking honed through debate and analysis; and extracurriculars designed to cultivate discipline and creativity. These schools were exclusive not just for their price tags but for their promise to deliver an education that equipped graduates to thrive in competitive universities and careers.
Yet the anecdote from that podcast suggests a troubling shift. If a school prioritizes ideological conformity (say, memorizing pronouns or framing foundational skills like reading as racist) over intellectual rigor, it’s fair to question whether it still deserves its elite status. Prestige, wealth, and social cachet might keep a school “elite” in name, but “the best” should mean more than that. It should reflect a dedication to fostering knowledge, skills, and independent thought, qualities that empower students as future leaders, not pawns in a cultural tug-of-war.
Consider what parents and students expect from a premium education. For an astronomical tuition (often exceeding $40,000 annually in places like Silicon Valley) they anticipate a return on investment: a curriculum that challenges young minds, teachers who inspire rather than indoctrinate, and a culture that values merit over dogma. When a school veers into territory where basic literacy is politicized or rote memorization of social rules trumps critical inquiry, it betrays that trust. No spreadsheet of pronouns will help a graduate navigate a complex world; a firm grasp of history, science, and persuasive writing just might.
This isn’t to say elite schools shouldn’t evolve. The world changes, and education must adapt, whether by integrating technology, addressing current issues, or broadening perspectives. But adaptation should enhance, not replace, the core mission of learning. A school can teach ethics alongside traditional subjects without sacrificing intellectual integrity. The problem arises when ideology becomes the curriculum, sidelining the tools students need to reason for themselves. If students are taught to question reading instead of mastering it, how will they author their own futures?
The Silicon Valley example isn’t isolated. Across the country, elite institutions have leaned into progressive trends, prioritizing social justice frameworks and experimental pedagogies over substance. Some might argue this reflects a bold reimagining of education, but there’s a difference between innovation and derailment. A school can be forward-thinking without abandoning the fundamentals that define excellence. Parents paying top dollar, and students investing their formative years, deserve more than a trendy experiment.
So, what should define “the best” private school today? First, employ a curriculum that balances tradition and progress: teach Shakespeare and coding, ethics and algebra, with an eye toward real-world application. Second, hire a faculty of experts who challenge students to think, not just comply. Third, create an environment that rewards effort and achievement over adherence to a script. Prestige alone, whether from alumni networks, manicured campuses, or Silicon Valley buzz, can’t suffice.
The tech investor’s remark about “the best” stuck with me because it revealed a disconnect. A school might remain elite in the eyes of the wealthy or well-connected, but “the best” is a higher bar. It’s a title earned through results, not rhetoric. Until these institutions recommit to education over indoctrination, they risk losing not just their claim to excellence, but the trust of those they serve.
-
@ 7da115b6:7d3e46ae
2025-03-25 22:59:06These are in order of least to most complex.
Be Warned: Some of these ingredients may be unique to New Zealand and Australia
Pikelets
Pikelets are delicious with butter and jam or jam and whipped cream. To make Pancakes, double this recipe and make them larger. Serve in a stack with butter, maple syrup, bacon and blueberries. I've found a single batch is good for 2-4 people if you just want a snack.
Prep Time: 5 minutes Cooking Time: About 10 minutes
Ingredients: - A Cup Self Raising Flour - A Quarter Teaspoon of Table Salt - 1 Egg - A Quarter Cup of White Sugar - About 3 quarters of a Cup of Whole Milk
Method: 1. Sift the Flour and Salt into a bowl. 2. In another bowl beat the Egg and Sugar with a whisk until pale and thick. 3. Add the Egg mixture and the Milk to the dry ingredients and mix until just combined. 4. Gently heat a non-stick frying pan and drop tablespoonfuls of the mixture from the point of the spoon onto the surface. 5. When bubbles start to burst on the top of the Pikelets, turn them over and cook the second side until golden. 6. Place in a clean tea towel to cool.
This recipe requires a little experience to get right, especially if you prefer to use a cast iron pan or griddle. Basically, you can use a cast iron or aluminium pan, just make sure to grease the pan between each batch. The easiest way to do it, is to grab some baking paper, or butter paper wrap, scrunch it up and wipe it over the block of butter, and then wipe the surface of the pan. After the first round has cooked, do wipe the butter over the pan again. It'll stop the Pikelets from sticking.
Scones
These are based on an old recipe from the Edmond's Cookbook, and have been a Kiwi staple for decades. The yield is about 12 (ish), but it depends on how big or small you shape them.
Prep Time: About 10 minutes Cooking Time: 10 minutes (Depending on your Oven)
Ingredients: - 3 Cups of Premium White Wheat Flour - 2 and a Half Levelled Tablespoons of Baking Powder - A quarter of a Teaspoon of Table Salt - About a Third of a Cup of Butter - Between 1 to 1.5 Cups of Whole Milk
Method: 1. Preheat the oven to 220C. 2. Grease or flour a baking tray. 3. Sift the flour, baking powder and salt into a bowl. 4. Rub in the butter with your fingertips until the mixture resembles fine breadcrumbs 5. Add the milk and quickly mix with a round-bladed table knife to a soft dough. For light and tender scones the mixture should be quite soft and a little sticky. 6. Scrape the dough onto the floured baking tray and flour the top 7. Working quickly, pat the dough out to 2cm thickness and with a floured knife cut it into 12 even-sized pieces, then separate the scones to allow 2cm space between them. 8. Brush the tops with milk. 9. Bake for 10 minutes or until golden brown. Place on a wire rack to cool, wrapped in a clean tea towel to keep them soft.
They're great with Butter or Whipped Cream and Jam. 3-4 per person is excellent with some hot sweet Tea mid afternoon.
A little variation that used to be popular is to dice up about a a cup of Bacon, grate about a cup of Cheese, and throw it in the batter for a savoury twist.
Remember to not overcook them, otherwise they come out dry and crumbly.
Chocolate Muffins
I can't remember where I got this recipe, but I've made them dozens of times over the years. They really fill the gap when it comes to those hungry little faces pleading for snacks. This recipe is a little more complicated, but worth it. They're soft and moist, and extremely more-ish. I can personally eat about half on my own before I start feeling guilty. You can get about 12 muffins out of this mixture.
Prep Time: 20 minutes Cooking Time: About 18 minutes
Ingredients: - 1 and a quarter Cups Self Raising Flour - A quarter Cup of Cocoa Powder - 3 quarters of a Teaspoon of Baking Soda - A Quarter Teaspoon of Table Salt - Half a Cup of Soft Brown Sugar - A Quarter Cup of White Sugar - Half a cup of Chocolate Chips - An Egg - Half a Cup of Greek Yoghurt or Sour Cream - Half a Cup of Whole Milk - A Quarter Cup of Sunflower Oil (substitute with warmed dripping/butter or clean cooking oil to taste) - 1 Teaspoon of Vanilla Essence
Method: 1. Preheat oven to 180C on fan bake. 2. Line a 12-hole muffin tin with paper cases. 3. Sift the Flour, Cocoa Powder, Baking Soda and Salt into a large bowl. Stir in the White and Brown Sugars, followed by the Chocolate Chips. 4. In a separate bowl, whisk together Egg, Yoghurt (or Sour Cream), Milk, Oil (or Butter/Dripping) and Vanilla Essence. 5. Add the mixture to the dry ingredients and mix until just combined. Try not to over-mix it, you're not looking for a smooth texture, just no unmixed dry ingredients. 6. Divide mixture evenly between 12 muffin paper cases. 7. (Optional) Sprinkle with extra chocolate chips, for decoration. 8. Bake for 18-20 minutes, until muffins spring back when lightly pressed. 9. Leave to cool in tins for a couple of minutes before transferring to a wire cooling rack.
If you're feeling especially fancy, you can slice them open, and add a dollop of jam and whipped cream. Garnish with a Mint Leaf or Glacé Cherry. Using a Sieve, you can powder the top with Icing Sugar if you want to go that extra mile. It's a real Wifey pleaser.
-
@ b2d670de:907f9d4a
2025-03-25 20:17:57This guide will walk you through setting up your own Strfry Nostr relay on a Debian/Ubuntu server and making it accessible exclusively as a TOR hidden service. By the end, you'll have a privacy-focused relay that operates entirely within the TOR network, enhancing both your privacy and that of your users.
Table of Contents
- Prerequisites
- Initial Server Setup
- Installing Strfry Nostr Relay
- Configuring Your Relay
- Setting Up TOR
- Making Your Relay Available on TOR
- Testing Your Setup]
- Maintenance and Security
- Troubleshooting
Prerequisites
- A Debian or Ubuntu server
- Basic familiarity with command line operations (most steps are explained in detail)
- Root or sudo access to your server
Initial Server Setup
First, let's make sure your server is properly set up and secured.
Update Your System
Connect to your server via SSH and update your system:
bash sudo apt update sudo apt upgrade -y
Set Up a Basic Firewall
Install and configure a basic firewall:
bash sudo apt install ufw -y sudo ufw allow ssh sudo ufw enable
This allows SSH connections while blocking other ports for security.
Installing Strfry Nostr Relay
This guide includes the full range of steps needed to build and set up Strfry. It's simply based on the current version of the
DEPLOYMENT.md
document in the Strfry GitHub repository. If the build/setup process is changed in the repo, this document could get outdated. If so, please report to me that something is outdated and check for updated steps here.Install Dependencies
First, let's install the necessary dependencies. Each package serves a specific purpose in building and running Strfry:
bash sudo apt install -y git build-essential libyaml-perl libtemplate-perl libregexp-grammars-perl libssl-dev zlib1g-dev liblmdb-dev libflatbuffers-dev libsecp256k1-dev libzstd-dev
Here's why each dependency is needed:
Basic Development Tools: -
git
: Version control system used to clone the Strfry repository and manage code updates -build-essential
: Meta-package that includes compilers (gcc, g++), make, and other essential build toolsPerl Dependencies (used for Strfry's build scripts): -
libyaml-perl
: Perl interface to parse YAML configuration files -libtemplate-perl
: Template processing system used during the build process -libregexp-grammars-perl
: Advanced regular expression handling for Perl scriptsCore Libraries for Strfry: -
libssl-dev
: Development files for OpenSSL, used for secure connections and cryptographic operations -zlib1g-dev
: Compression library that Strfry uses to reduce data size -liblmdb-dev
: Lightning Memory-Mapped Database library, which Strfry uses for its high-performance database backend -libflatbuffers-dev
: Memory-efficient serialization library for structured data -libsecp256k1-dev
: Optimized C library for EC operations on curve secp256k1, essential for Nostr's cryptographic signatures -libzstd-dev
: Fast real-time compression algorithm for efficient data storage and transmissionClone and Build Strfry
Clone the Strfry repository:
bash git clone https://github.com/hoytech/strfry.git cd strfry
Build Strfry:
bash git submodule update --init make setup-golpe make -j2 # This uses 2 CPU cores. Adjust based on your server (e.g., -j4 for 4 cores)
This build process will take several minutes, especially on servers with limited CPU resources, so go get a coffee and post some great memes on nostr in the meantime.
Install Strfry
Install the Strfry binary to your system path:
bash sudo cp strfry /usr/local/bin
This makes the
strfry
command available system-wide, allowing it to be executed from any directory and by any user with the appropriate permissions.Configuring Your Relay
Create Strfry User
Create a dedicated user for running Strfry. This enhances security by isolating the relay process:
bash sudo useradd -M -s /usr/sbin/nologin strfry
The
-M
flag prevents creating a home directory, and-s /usr/sbin/nologin
prevents anyone from logging in as this user. This is a security best practice for service accounts.Create Data Directory
Create a directory for Strfry's data:
bash sudo mkdir /var/lib/strfry sudo chown strfry:strfry /var/lib/strfry sudo chmod 755 /var/lib/strfry
This creates a dedicated directory for Strfry's database and sets the appropriate permissions so that only the strfry user can write to it.
Configure Strfry
Copy the sample configuration file:
bash sudo cp strfry.conf /etc/strfry.conf
Edit the configuration file:
bash sudo nano /etc/strfry.conf
Modify the database path:
```
Find this line:
db = "./strfry-db/"
Change it to:
db = "/var/lib/strfry/" ```
Check your system's hard limit for file descriptors:
bash ulimit -Hn
Update the
nofiles
setting in your configuration to match this value (or set to 0):```
Add or modify this line in the config (example if your limit is 524288):
nofiles = 524288 ```
The
nofiles
setting determines how many open files Strfry can have simultaneously. Setting it to your system's hard limit (or 0 to use the system default) helps prevent "too many open files" errors if your relay becomes popular.You might also want to customize your relay's information in the config file. Look for the
info
section and update it with your relay's name, description, and other details.Set ownership of the configuration file:
bash sudo chown strfry:strfry /etc/strfry.conf
Create Systemd Service
Create a systemd service file for managing Strfry:
bash sudo nano /etc/systemd/system/strfry.service
Add the following content:
```ini [Unit] Description=strfry relay service
[Service] User=strfry ExecStart=/usr/local/bin/strfry relay Restart=on-failure RestartSec=5 ProtectHome=yes NoNewPrivileges=yes ProtectSystem=full LimitCORE=1000000000
[Install] WantedBy=multi-user.target ```
This systemd service configuration: - Runs Strfry as the dedicated strfry user - Automatically restarts the service if it fails - Implements security measures like
ProtectHome
andNoNewPrivileges
- Sets resource limits appropriate for a relayEnable and start the service:
bash sudo systemctl enable strfry.service sudo systemctl start strfry
Check the service status:
bash sudo systemctl status strfry
Verify Relay is Running
Test that your relay is running locally:
bash curl localhost:7777
You should see a message indicating that the Strfry relay is running. This confirms that Strfry is properly installed and configured before we proceed to set up TOR.
Setting Up TOR
Now let's make your relay accessible as a TOR hidden service.
Install TOR
Install TOR from the package repositories:
bash sudo apt install -y tor
This installs the TOR daemon that will create and manage your hidden service.
Configure TOR
Edit the TOR configuration file:
bash sudo nano /etc/tor/torrc
Scroll down to wherever you see a commented out part like this: ```
HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:80
```
Under those lines, add the following lines to set up a hidden service for your relay:
HiddenServiceDir /var/lib/tor/strfry-relay/ HiddenServicePort 80 127.0.0.1:7777
This configuration: - Creates a hidden service directory at
/var/lib/tor/strfry-relay/
- Maps port 80 on your .onion address to port 7777 on your local machine - Keeps all traffic encrypted within the TOR networkCreate the directory for your hidden service:
bash sudo mkdir -p /var/lib/tor/strfry-relay/ sudo chown debian-tor:debian-tor /var/lib/tor/strfry-relay/ sudo chmod 700 /var/lib/tor/strfry-relay/
The strict permissions (700) are crucial for security as they ensure only the debian-tor user can access the directory containing your hidden service private keys.
Restart TOR to apply changes:
bash sudo systemctl restart tor
Making Your Relay Available on TOR
Get Your Onion Address
After restarting TOR, you can find your onion address:
bash sudo cat /var/lib/tor/strfry-relay/hostname
This will output something like
abcdefghijklmnopqrstuvwxyz234567.onion
, which is your relay's unique .onion address. This is what you'll share with others to access your relay.Understanding Onion Addresses
The .onion address is a special-format hostname that is automatically generated based on your hidden service's private key.
Your users will need to use this address with the WebSocket protocol prefix to connect:
ws://youronionaddress.onion
Testing Your Setup
Test with a Nostr Client
The best way to test your relay is with an actual Nostr client that supports TOR:
- Open your TOR browser
- Go to your favorite client, either on clearnet or an onion service.
- Check out this list of nostr clients available over TOR.
- Add your relay URL:
ws://youronionaddress.onion
to your relay list - Try posting a note and see if it appears on your relay
- In some nostr clients, you can also click on a relay to get information about it like the relay name and description you set earlier in the stryfry config. If you're able to see the correct values for the name and the description, you were able to connect to the relay.
- Some nostr clients also gives you a status on what relays a note was posted to, this could also give you an indication that your relay works as expected.
Note that not all Nostr clients support TOR connections natively. Some may require additional configuration or use of TOR Browser. E.g. most mobile apps would most likely require a TOR proxy app running in the background (some have TOR support built in too).
Maintenance and Security
Regular Updates
Keep your system, TOR, and relay updated:
```bash
Update system
sudo apt update sudo apt upgrade -y
Update Strfry
cd ~/strfry git pull git submodule update make -j2 sudo cp strfry /usr/local/bin sudo systemctl restart strfry
Verify TOR is still running properly
sudo systemctl status tor ```
Regular updates are crucial for security, especially for TOR which may have security-critical updates.
Database Management
Strfry has built-in database management tools. Check the Strfry documentation for specific commands related to database maintenance, such as managing event retention and performing backups.
Monitoring Logs
To monitor your Strfry logs:
bash sudo journalctl -u strfry -f
To check TOR logs:
bash sudo journalctl -u tor -f
Monitoring logs helps you identify potential issues and understand how your relay is being used.
Backup
This is not a best practices guide on how to do backups. Preferably, backups should be stored either offline or on a different machine than your relay server. This is just a simple way on how to do it on the same server.
```bash
Stop the relay temporarily
sudo systemctl stop strfry
Backup the database
sudo cp -r /var/lib/strfry /path/to/backup/location
Restart the relay
sudo systemctl start strfry ```
Back up your TOR hidden service private key. The private key is particularly sensitive as it defines your .onion address - losing it means losing your address permanently. If you do a backup of this, ensure that is stored in a safe place where no one else has access to it.
bash sudo cp /var/lib/tor/strfry-relay/hs_ed25519_secret_key /path/to/secure/backup/location
Troubleshooting
Relay Not Starting
If your relay doesn't start:
```bash
Check logs
sudo journalctl -u strfry -e
Verify configuration
cat /etc/strfry.conf
Check permissions
ls -la /var/lib/strfry ```
Common issues include: - Incorrect configuration format - Permission problems with the data directory - Port already in use (another service using port 7777) - Issues with setting the nofiles limit (setting it too big)
TOR Hidden Service Not Working
If your TOR hidden service is not accessible:
```bash
Check TOR logs
sudo journalctl -u tor -e
Verify TOR is running
sudo systemctl status tor
Check onion address
sudo cat /var/lib/tor/strfry-relay/hostname
Verify TOR configuration
sudo cat /etc/tor/torrc ```
Common TOR issues include: - Incorrect directory permissions - TOR service not running - Incorrect port mapping in torrc
Testing Connectivity
If you're having trouble connecting to your service:
```bash
Verify Strfry is listening locally
sudo ss -tulpn | grep 7777
Check that TOR is properly running
sudo systemctl status tor
Test the local connection directly
curl --include --no-buffer localhost:7777 ```
Privacy and Security Considerations
Running a Nostr relay as a TOR hidden service provides several important privacy benefits:
-
Network Privacy: Traffic to your relay is encrypted and routed through the TOR network, making it difficult to determine who is connecting to your relay.
-
Server Anonymity: The physical location and IP address of your server are concealed, providing protection against denial-of-service attacks and other targeting.
-
Censorship Resistance: TOR hidden services are more resilient against censorship attempts, as they don't rely on the regular DNS system and can't be easily blocked.
-
User Privacy: Users connecting to your relay through TOR enjoy enhanced privacy, as their connections are also encrypted and anonymized.
However, there are some important considerations:
- TOR connections are typically slower than regular internet connections
- Not all Nostr clients support TOR connections natively
- Running a hidden service increases the importance of keeping your server secure
Congratulations! You now have a Strfry Nostr relay running as a TOR hidden service. This setup provides a resilient, privacy-focused, and censorship-resistant communication channel that helps strengthen the Nostr network.
For further customization and advanced configuration options, refer to the Strfry documentation.
Consider sharing your relay's .onion address with the Nostr community to help grow the privacy-focused segment of the network!
If you plan on providing a relay service that the public can use (either for free or paid for), consider adding it to this list. Only add it if you plan to run a stable and available relay.
-
@ bc52210b:20bfc6de
2025-03-25 20:17:22CISA, or Cross-Input Signature Aggregation, is a technique in Bitcoin that allows multiple signatures from different inputs in a transaction to be combined into a single, aggregated signature. This is a big deal because Bitcoin transactions often involve multiple inputs (e.g., spending from different wallet outputs), each requiring its own signature. Normally, these signatures take up space individually, but CISA compresses them into one, making transactions more efficient.
This magic is possible thanks to the linearity property of Schnorr signatures, a type of digital signature introduced to Bitcoin with the Taproot upgrade. Unlike the older ECDSA signatures, Schnorr signatures have mathematical properties that allow multiple signatures to be added together into a single valid signature. Think of it like combining multiple handwritten signatures into one super-signature that still proves everyone signed off!
Fun Fact: CISA was considered for inclusion in Taproot but was left out to keep the upgrade simple and manageable. Adding CISA would’ve made Taproot more complex, so the developers hit pause on it—for now.
CISA vs. Key Aggregation (MuSig, FROST): Don’t Get Confused! Before we go deeper, let’s clear up a common mix-up: CISA is not the same as protocols like MuSig or FROST. Here’s why:
- Signature Aggregation (CISA): Combines multiple signatures into one, each potentially tied to different public keys and messages (e.g., different transaction inputs).
- Key Aggregation (MuSig, FROST): Combines multiple public keys into a single aggregated public key, then generates one signature for that key.
Key Differences: 1. What’s Aggregated? * CISA: Aggregates signatures. * Key Aggregation: Aggregates public keys. 2. What the Verifier Needs * CISA: The verifier needs all individual public keys and their corresponding messages to check the aggregated signature. * Key Aggregation: The verifier only needs the single aggregated public key and one message. 3. When It Happens * CISA: Used during transaction signing, when inputs are being combined into a transaction. * MuSig: Used during address creation, setting up a multi-signature (multisig) address that multiple parties control.
So, CISA is about shrinking signature data in a transaction, while MuSig/FROST are about simplifying multisig setups. Different tools, different jobs!
Two Flavors of CISA: Half-Agg and Full-Agg CISA comes in two modes:
- Full Aggregation (Full-Agg): Interactive, meaning signers need to collaborate during the signing process. (We’ll skip the details here since the query focuses on Half-Agg.)
- Half Aggregation (Half-Agg): Non-interactive, meaning signers can work independently, and someone else can combine the signatures later.
Since the query includes “CISA Part 2: Half Signature Aggregation,” let’s zoom in on Half-Agg.
Half Signature Aggregation (Half-Agg) Explained How It Works Half-Agg is a non-interactive way to aggregate Schnorr signatures. Here’s the process:
- Independent Signing: Each signer creates their own Schnorr signature for their input, without needing to talk to the other signers.
- Aggregation Step: An aggregator (could be anyone, like a wallet or node) takes all these signatures and combines them into one aggregated signature.
A Schnorr signature has two parts:
- R: A random point (32 bytes).
- s: A scalar value (32 bytes).
In Half-Agg:
- The R values from each signature are kept separate (one per input).
- The s values from all signatures are combined into a single s value.
Why It Saves Space (~50%) Let’s break down the size savings with some math:
Before Aggregation: * Each Schnorr signature = 64 bytes (32 for R + 32 for s). * For n inputs: n × 64 bytes.
After Half-Agg: * Keep n R values (32 bytes each) = 32 × n bytes. * Combine all s values into one = 32 bytes. * Total size: 32 × n + 32 bytes.
Comparison:
- Original: 64n bytes.
- Half-Agg: 32n + 32 bytes.
- For large n, the “+32” becomes small compared to 32n, so it’s roughly 32n, which is half of 64n. Hence, ~50% savings!
Real-World Impact: Based on recent Bitcoin usage, Half-Agg could save:
- ~19.3% in space (reducing transaction size).
- ~6.9% in fees (since fees depend on transaction size). This assumes no major changes in how people use Bitcoin post-CISA.
Applications of Half-Agg Half-Agg isn’t just a cool idea—it has practical uses:
- Transaction-wide Aggregation
- Combine all signatures within a single transaction.
- Result: Smaller transactions, lower fees.
- Block-wide Aggregation
- Combine signatures across all transactions in a Bitcoin block.
- Result: Even bigger space savings at the blockchain level.
- Off-chain Protocols / P2P
- Use Half-Agg in systems like Lightning Network gossip messages.
- Benefit: Efficiency without needing miners or a Bitcoin soft fork.
Challenges with Half-Agg While Half-Agg sounds awesome, it’s not without hurdles, especially at the block level:
- Breaking Adaptor Signatures
- Adaptor signatures are special signatures used in protocols like Discreet Log Contracts (DLCs) or atomic swaps. They tie a signature to revealing a secret, ensuring fair exchanges.
-
Aggregating signatures across a block might mess up these protocols, as the individual signatures get blended together, potentially losing the properties adaptor signatures rely on.
-
Impact on Reorg Recovery
- In Bitcoin, a reorganization (reorg) happens when the blockchain switches to a different chain of blocks. Transactions from the old chain need to be rebroadcast or reprocessed.
- If signatures are aggregated at the block level, it could complicate extracting individual transactions and their signatures during a reorg, slowing down recovery.
These challenges mean Half-Agg needs careful design, especially for block-wide use.
Wrapping Up CISA is a clever way to make Bitcoin transactions more efficient by aggregating multiple Schnorr signatures into one, thanks to their linearity property. Half-Agg, the non-interactive mode, lets signers work independently, cutting signature size by about 50% (to 32n + 32 bytes from 64n bytes). It could save ~19.3% in space and ~6.9% in fees, with uses ranging from single transactions to entire blocks or off-chain systems like Lightning.
But watch out—block-wide Half-Agg could trip up adaptor signatures and reorg recovery, so it’s not a slam dunk yet. Still, it’s a promising tool for a leaner, cheaper Bitcoin future!
-
@ 6a6be47b:3e74e3e1
2025-03-25 20:16:37Hi frens, how are you?
🎨 I've been keeping busy with some personal projects and haven't painted as much as I'd like, but most importantly, I've returned to painting with watercolors. I'm getting used to them again, and although I love them, they can be tricky, especially when working wet on wet.
I've done a few pieces since getting back into it, and I'm excited to show the results, but at the same time, I'm a bit wary. Not because I want them to be "perfect" to share, but because I just want to have fun with them and get the joy back from painting.
🐱 And I'm not slacking because I have my furry little helper with me, and he's not having any of it!
He's a good boi
I've also been baking! 👩🍳 Yesterday, I made cinnamon "donuts" 🍩 , which ended up being muffins since I don't have a donut skillet.
And today, I baked lemon muffins 🍋, and they turned out delicious!
🧁 I had one as soon as they cooled, and chef's kiss... they're amazing!
🫀So as you can see I've been up to a few things, I'm not the best at this social media game. It can be draining so I want to have a balance between creating and showcasing you my proof of work 💪
💎I'm still getting there, but it's worth it.
🪄 Balance to achieve harmony is my goal.
🔮 I just wanted to check in and see what you've been up to! I'd love to know 🩷🫶🏻.
Have an amazing day frens!
-
@ 2ed3596e:98b4cc78
2025-03-25 19:12:58Americans can now buy bitcoin on the Lightning Network directly from their bank with their Bitcoin Well account. By using the dollars in your Bitcoin Well Cash Balance you can buy bitcoin over the Lightning Network with instant delivery. You can also go directly from your bank to your Lightning Wallet. You can now live fully on a Lightning-powered bitcoin standard ⚡️
How to buy bitcoin on the Lightning Network instantly:
-
Add your Lightning Payment Address (LNURL) to your Bitcoin Well account
-
Enter the amount of dollars you want to buy bitcoin with
-
Choose your Bitcoin Well Cash Balance (you may need to fund this first!)
-
SMASH BUY! Your Lightning wallet will receive sats in seconds 🏎️
\ You can also go directly from your bank to your Lightning wallet. Your bitcoin will be sent over the Lightning network as soon as your dollars arrive (usually within 3 business days).
Here are detailed steps to guide you on how to buy bitcoin on the Lightning Network 👇
Step 1: Get your Lightning details
Go to your Lightning wallet and copy your Lightning Payment Address (looks like an email address). A Payment Address is not a Lightning invoice, but rather a static receiving address similar to a bitcoin receiving address. The benefit of using a Payment Address is that you can passively receive any quantity of sats at any time; unlike an invoice, a Payment Address does not have an expiry or a fixed amount of sats limiting the amount can be received. \ \ In the example below we use the Coinos.io wallet to obtain a Payment Address. Coinos is a powerful and easy to use Lightning wallet available in any country via your favourite web browser. You can set up a Coinos Lightning wallet and start receiving sats in seconds.
\ Coinos features a Lightning Payment Address. Once you’ve set up your wallet, hit “Receive” to access your Payment Address.
Step 2: Add your Lightning wallet to your Bitcoin Well account
Log in to your Bitcoin Well account and navigate to Buy bitcoin. From the buy screen, select bank or balance and add your Lightning wallet to the Destination by clicking Add wallet. Add your Lightning Payment Address from Step 1 here.
Step 3: Buy bitcoin on the Lightning Network
After you’ve selected your source and added your Lightning Payment Address as the destination, you are ready to complete your bitcoin purchase on the Lightning Network! \ \ When buying bitcoin from your Cash Balance, the dollars will instantly convert to bitcoin and be sent directly to your Lightning wallet – delivery takes less than a minute! 🤯\ \ When buying bitcoin from your bank account, you can expect to wait at least a couple business days as we wait for the slow movement of fiat to be finalized before sats can be sent.
## The compromise is over: bitcoin fast, easy and cheap
In the past, Bitcoiners had to choose between using freedom money at the mercy of the speed and cost of Bitcoin’s blockchain, or use the legacy banking system while surrendering their monetary freedom and independence. Ideally, Americans never have to compromise their monetary principles; thankfully, they no longer have to. \ \ Stacking sats straight to the Lightning also enables an innovative way to manage UTXOs. Now anyone can stack sats as much as they like without worrying about UTXO bloat. Simply accumulate sats on your Lightning wallet and then swap it across to your on-chain wallet in one neat UTXO. Since Coinos is a custodial Lightning wallet, you should periodically send your sats to your self-custody hardware wallet. To help you get the most out of the Lightning network, Bitcoin Well has a free swap tool that lets you swap sats between on-chain and Lightning. While this feature is only available in Canada, it will make its way to the United States very soon 🤫
Haven’t signed up with Bitcoin Well yet? Sign up here to start living on a (Lightning powered) Bitcoin Standard free from custodians and centralized honey pots.
Earn sats from your bitcoin transactions
\ Bitcoin Well is also the best place in the world to earn bitcoin. When you earn points in your Bitcoin Well account, you gain the opportunity to play the Bitcoin (Wishing) Well, where you win sats with every play.
The best part? We send bitcoin that you win straight to your personal wallet via the Lightning Network ⚡
Oh yeah, did we mention you can win 1,000,000 sats? If you're an active Bitcoin Well customer, there is a chance you've earned a pile of points. The more you use your account for buying, selling or spending bitcoin - the more points you’ll earn! Log in to your Bitcoin Well account and check your point balance.
About Bitcoin Well
\ Bitcoin Well exists to enable independence. We do this by coupling the convenience of modern banking, with the benefits of bitcoin. In other words, we make it easy to use bitcoin with self-custody.
-
-
@ 7d33ba57:1b82db35
2025-03-25 18:31:35Located on the Costa de la Luz, Conil de la Frontera is a charming Andalusian fishing village known for its golden beaches, whitewashed streets, and delicious seafood. With a laid-back atmosphere, it’s perfect for relaxation, surfing, and enjoying authentic Spanish culture.
🏖️ Top Things to See & Do in Conil de la Frontera
1️⃣ Playa de los Bateles 🏝️
- The main beach, right next to the town center.
- Long stretches of soft golden sand with clear Atlantic waters.
- Ideal for sunbathing, swimming, and beachside dining.
2️⃣ Playa de la Fontanilla 🌊
- One of the most beautiful beaches in the region, with crystal-clear waters.
- Great for families, surfers, and seafood lovers.
- Home to some of the best chiringuitos (beach bars) in Conil.
3️⃣ Playa del Palmar 🏄♂️
- A surfer’s paradise with consistent waves and a bohemian vibe.
- Popular for surf schools, yoga retreats, and sunset beach bars.
- Less crowded than the town’s main beaches.
4️⃣ Historic Old Town & Plaza de España 🏡
- Wander through narrow, whitewashed streets full of local boutiques, tapas bars, and cafés.
- Visit the Plaza de España, the town’s lively main square.
- Stop by the Torre de Guzmán, a medieval watchtower with great views.
5️⃣ Mercado de Abastos 🐟
- A traditional market where locals buy fresh seafood, fruits, and vegetables.
- Great place to experience the authentic Andalusian food culture.
6️⃣ Mirador del Jabiguero 🌅
- One of the best viewpoints in town, offering panoramic views over Conil and the Atlantic.
- A perfect spot for sunset photos.
🍽️ What to Eat in Conil de la Frontera
- Atún de Almadraba – Fresh bluefin tuna, caught using a traditional method 🐟
- Ortiguillas fritas – Fried sea anemones, a local delicacy 🍤
- Choco a la plancha – Grilled cuttlefish, a simple but delicious dish 🦑
- Tortillitas de camarones – Light and crispy shrimp fritters 🥞🦐
- Sangría or Tinto de Verano – Refreshing drinks to enjoy by the beach 🍷
🚗 How to Get to Conil de la Frontera
🚘 By Car: ~45 min from Cádiz, 1.5 hrs from Seville, 2.5 hrs from Málaga
🚆 By Train: Nearest station is San Fernando-Bahía Sur, then take a bus
🚌 By Bus: Direct buses from Cádiz, Seville, and other Andalusian cities
✈️ By Air: Closest airport is Jerez de la Frontera (XRY) (~1 hr away)💡 Tips for Visiting Conil de la Frontera
✅ Best time to visit? May to September for beach weather, spring & autumn for fewer crowds 🌞
✅ Book accommodation early in summer – It’s a popular vacation spot 🏡
✅ Try local tuna dishes – Conil is famous for its bluefin tuna 🍽️
✅ Visit during the Feria de Conil (June) for a lively cultural experience 🎉 -
@ b1b16be0:08f41c1d
2025-03-25 18:08:21What if Nostr app could save an Illiterate country?
Guatemala is the most illiterate country in Hispanic America at levels as serious as Africa.
About 30% of the population aged 15 or over cannot read or write. This figure rises in rural areas, where illiteracy reaches even more worrying levels, affecting mainly women and indigenous populations.
Limiting their access to paid jobs, their ability to access health services, and their full participation in political and social life. Education is a fundamental right, but there are still large gaps in access and educational quality, especially in rural areas and in communities with high poverty rates.
What if there was an application similar to Duolingo, but that allowed people to learn to read and write while earning Satoshis (Sats) This proposal not only sounds innovative, but could be a powerful tool to combat the country's illiteracy.
The idea of an app that rewards learning "learn to earn"
Duolingo is a popular platform that has proven to be effective in teaching languages through a gamified approach. If that model could be replicated, but with a specific focus on reading and writing, and above all reward users with sats, it could offer two key benefits: encourage learning and offer a direct economic opportunity to users.
Satoshis, being a low-cost and easy-to-access, can be a motivating tool. Many people in Guatemala, especially those in rural areas, do not have access to a traditional banking system, much less to a national identity document, but they have access to mobile phones and the internet, which facilitates the inclusion of an alternative form of value. With this additional motivation, people would be more willing to invest time in learning, knowing that they can get a tangible reward for their effort.
https://image.nostr.build/9da1c3b9478be817e82c891fdceaf87905a4d68876e9190240a8f979ebd35b40.jpg
Will there be developers interested in helping?
In addition, the technology sector globally is increasingly focused on open source, financial inclusion and the use of Bitcoin as an empowerment tool.
A project like this could attract developers interested in creating inclusive technological solutions that not only improve the quality of life of Guatemalans, but also promote access to new economic opportunities through digital tools. Is the possibility of working on a project with social impact, which combines education and Bitcoin, something that could excite many developers?
Algorithms for a greater impact on the illiterate
For this application to be truly effective, it is not enough to replicate existing models. The platform's algorithms would need to be adapted to focus specifically on the needs of the illiterate. The algorithm would have to be flexible enough to adapt to different levels of learning and ensure that users can progress gradually and effectively. (That it can identify literate users who only want the reward).
This could include:
-
Reinforce basic learning: Include exercises focused on phonetics, letter recognition and word construction, something that is not so central in language learning applications.
-
Personalized gamification: Use a system of rewards and levels that motivates users to continue learning, adapting to their learning pace. Sats could accumulate as the user progresses, which could be an additional incentive.
-
Interactivity and visual support: Incorporate visual elements, such as images or videos, that help users associate words with objects or actions, which would be especially useful for those with few previous educational resources.
-
Collaborative learning: Create a community within the application where users can interact, share their progress, and perhaps even solve doubts from others, which would foster an environment of collective learning.
-
This country is also one of those that suffers the most from malnutrition as much as Africa. By having Sats they can exchange them for grains or legumes in the market. That the community in turn learns from the value of Bitcoin and can the markets go through a circular economy.
https://image.nostr.build/ed3805f6c695519ec8327ce6ee9900ec235d714a20a542b5559d9e6c63bc4496.jpg
Is this a feasible idea or just a fantasy?
This type of project could be really valuable. While there are technological and economic challenges, the combination of education and Bitcoin is a growing trend, and Guatemala has the potential to benefit greatly from it. The integration of an accessible platform, which encourages learning and offers a direct reward, can be the key to improving literacy rates in the country.
If you think long-term, this application could not only help reduce illiteracy, but also increase financial inclusion, offering people a way to earn income digitally. This country is one of those with the most migrants to the United States due to lack of work and extreme poverty.
It is clear that there are challenges to bring this idea to reality. Even so, I wouldn't be fantasizing. These types of projects are increasingly common in the digital world, and with the commitment of the technological community, along with the support of organizations that promote education and inclusion, a real difference could be made in the lives of millions of Guatemalans.
In conclusion, Guatemala faces high levels of illiteracy that limit the opportunities for personal and economic development of its population. Could an application that combines learning with economic rewards be an innovative solution to reduce this problem? Although there are challenges, the potential positive impact of this type of initiative is indisputable, and could mark a before and after in the educational and financial history of the country.
I’m not dev but if you know the next step please send me an inbox!
-
-
@ 2e8970de:63345c7a
2025-03-25 18:03:08Data collected by nameberry (baby name website)
originally posted at https://stacker.news/items/924756
-
@ 04c915da:3dfbecc9
2025-03-25 17:43:44One of the most common criticisms leveled against nostr is the perceived lack of assurance when it comes to data storage. Critics argue that without a centralized authority guaranteeing that all data is preserved, important information will be lost. They also claim that running a relay will become prohibitively expensive. While there is truth to these concerns, they miss the mark. The genius of nostr lies in its flexibility, resilience, and the way it harnesses human incentives to ensure data availability in practice.
A nostr relay is simply a server that holds cryptographically verifiable signed data and makes it available to others. Relays are simple, flexible, open, and require no permission to run. Critics are right that operating a relay attempting to store all nostr data will be costly. What they miss is that most will not run all encompassing archive relays. Nostr does not rely on massive archive relays. Instead, anyone can run a relay and choose to store whatever subset of data they want. This keeps costs low and operations flexible, making relay operation accessible to all sorts of individuals and entities with varying use cases.
Critics are correct that there is no ironclad guarantee that every piece of data will always be available. Unlike bitcoin where data permanence is baked into the system at a steep cost, nostr does not promise that every random note or meme will be preserved forever. That said, in practice, any data perceived as valuable by someone will likely be stored and distributed by multiple entities. If something matters to someone, they will keep a signed copy.
Nostr is the Streisand Effect in protocol form. The Streisand effect is when an attempt to suppress information backfires, causing it to spread even further. With nostr, anyone can broadcast signed data, anyone can store it, and anyone can distribute it. Try to censor something important? Good luck. The moment it catches attention, it will be stored on relays across the globe, copied, and shared by those who find it worth keeping. Data deemed important will be replicated across servers by individuals acting in their own interest.
Nostr’s distributed nature ensures that the system does not rely on a single point of failure or a corporate overlord. Instead, it leans on the collective will of its users. The result is a network where costs stay manageable, participation is open to all, and valuable verifiable data is stored and distributed forever.
-
@ d560dbc2:bbd59238
2025-03-25 17:14:30If you juggle multiple tasks, projects, and responsibilities, you’ve likely heard of the Getting Things Done (GTD) method—a productivity system developed by David Allen to help you organize your tasks and clear your mind for focused work. You might also be exploring Task4Us, a web-based task management platform I founded that leverages the 2-5 Rule to prioritize tasks based on timing rather than rigid scheduling.
At first glance, these two systems might seem to operate differently: GTD focuses on a structured five-step process to manage tasks, while Task4Us emphasizes an anti-planning approach using its 2-5 Rule. However, combining these two can create powerful synergy by blending GTD’s clarity and structure with Task4Us’s intuitive timing-based prioritization. This guide walks you through how to integrate Task4Us with GTD to streamline your workflow, reduce mental clutter, and achieve your goals with less stress.
Understanding the Basics: GTD and Task4Us
What Is the Getting Things Done (GTD) Method?
GTD is a five-step productivity framework designed to externalize your tasks and commitments, freeing your mind for action. The steps are:
-
Capture:
Collect every task, idea, or commitment that grabs your attention into a trusted external system (e.g., notebook or app). -
Clarify:
Process each item to determine if it’s actionable. If it is, define the next step; if not, trash it, file it for reference, or defer it. -
Organize:
Sort actionable tasks into lists (e.g., Next Actions, Projects, Waiting For) and non-actionable items into categories like Someday/Maybe or Reference. -
Reflect:
Regularly review your lists to update priorities and ensure nothing slips through the cracks. -
Engage:
Choose your next action based on context, time, and energy, and then work on it.
GTD’s strength lies in reducing cognitive load by capturing everything so you can stay decisive and focused. However, GTD doesn’t inherently guide you on when to do tasks, leaving timing decisions up to you.
What Is Task4Us and the 2-5 Rule?
Task4Us is a task management platform built on the 2-5 Rule, an approach that emphasizes timing over detailed scheduling. Instead of planning when to do each task, you simply:
- Enter the Task:
Capture it into Task4Us as your “inbox.” - Set a Time Unit:
Choose whether the task is daily, weekly, monthly, or yearly. - Record the Last Act Date or Set a Fixed Due Date:
For recurring tasks, provide the last date you acted on them. For date-specific tasks, use Fix Mode to set the due date.
The 2-5 Rule calculates the task’s priority based on a “sweet spot” of 2 to 5 time units, ensuring you act at the optimal moment—neither too early nor too late.
Why Combine GTD and Task4Us?
By integrating these methods, you can capitalize on the strengths of both:
- GTD’s Clarity:
Use GTD to capture and organize every task and project, ensuring nothing is forgotten. - Task4Us’s Timing:
Leverage the 2-5 Rule to automatically prioritize tasks based on when they should be acted on, reducing the need to micromanage your schedule.
Together, they form a system where you externalize all your commitments (GTD) and then focus on the most important task at the right time (Task4Us), leading to a seamless, stress-free workflow.
Step-by-Step Guide to Combining Task4Us and GTD
Step 1: Capture Everything with GTD, Using Task4Us as Your Inbox
- Action:
Whenever a task or idea arises—like “Call a client,” “Plan a vacation,” or “Renew passport”—add it directly to Task4Us. - Tip:
Don’t worry about details yet; the goal is to clear your mind by capturing everything.
Example tasks: - “Email project updates to the team” - “Schedule a dentist appointment” - “Meet Uncle Lars for coffee”
Step 2: Clarify and Organize Tasks Using GTD Principles in Task4Us
- Clarify:
Process each captured task. Decide if it’s actionable. - If not actionable:
Trash it, file it for reference, or mark it as a “Someday/Maybe” task in Task4Us. - If actionable:
Determine the next step. - Organize:
In Task4Us, assign each actionable task: - Time Unit:
Choose days, weeks, months, or years (e.g., “Email project updates” as a weekly task). - Fix Mode:
For date-specific tasks (e.g., “Wish Alex a happy birthday”), set the exact due date. - Categories:
Group tasks (e.g., Work, Personal, Health) to align with GTD’s organization system. - Projects:
For multi-step projects, create a dedicated category and break the project into smaller, actionable tasks.
Step 3: Reflect Weekly to Update Your Task4Us Lists
- Review Your Tasks:
Set aside time each week to review your Task4Us lists. - Check your Top Task and Focus Mode (top 3 tasks) to ensure they reflect your current priorities.
- Update as Needed:
Adjust time units, update last act dates, or move tasks between active, someday/maybe, and archived lists. - Projects Review:
Ensure each multi-step project has at least one actionable task with a clear time unit.
Step 4: Engage with Task4Us’s Top Task and Focus Mode
- Engage:
Task4Us automatically surfaces your Top Task based on the 2-5 Rule. - For instance, if “Meet Uncle Lars” is nearing its action window, it will appear as the top task.
- Focus Mode:
Use this mode to display your top 3 tasks for a distraction-free workflow.
This aligns with GTD’s principle of choosing the right next action, making it easier to act decisively.
Step 5: Enhance GTD with Task4Us’s Unique Features
- Fix Mode for Deadlines:
Use Fix Mode for tasks with fixed dates (e.g., passport renewal) to ensure they gain priority as the due date approaches. - Export Tasks:
Download your task list as a CSV file to review your productivity over time. - Customize:
Adjust categories, time units, and Focus Mode settings to best suit your workflow.
A Real-Life Example: Combining GTD and Task4Us
Imagine managing work tasks, personal goals, and social connections:
-
Capture:
Throughout the day, add tasks like “Finish project report,” “Call Mom,” “Book dentist appointment,” and “Brainstorm new blog post” to Task4Us. -
Clarify and Organize:
- “Finish project report” is actionable—set as a weekly task in the Work category.
- “Call Mom” is actionable—set as a monthly task in the Personal category (last called 3 weeks ago).
- “Book dentist appointment” has a deadline (e.g., April 10, 2025)—use Fix Mode.
-
“Brainstorm new blog post” is not urgent—categorize it as Someday/Maybe.
-
Reflect:
During a weekly review, notice “Call Mom” is nearing the 5-week mark and becomes your top task. Update “Finish project report” after completion. -
Engage:
Task4Us displays “Call Mom” as the top task. You call, mark it done, and Task4Us updates the last act date. -
Enhance:
Use Focus Mode to tackle your top 3 tasks without distraction and export your tasks for review.
Why This Combination Works
-
GTD’s Lack of Timing Guidance:
Task4Us’s 2-5 Rule fills the gap by ensuring you act at the optimal moment. -
Task4Us’s Simplicity:
GTD adds structure to Task4Us, helping you manage complex projects and capture non-actionable items. -
Reduced Cognitive Load:
Both systems externalize tasks, reducing mental clutter and ensuring you’re focused on the right task at the right time.
Try It Out and Share Your Experience
Task4Us is currently in beta—now’s the perfect time to integrate it with GTD and transform your productivity. Start by capturing your tasks in Task4Us, apply GTD’s steps to clarify and organize them, and let the 2-5 Rule guide your actions.
Sign up for Task4Us at todo.task4.us and experience the power of combining GTD with the 2-5 Rule.
How do you manage your tasks? Do you use GTD, Task4Us, or a mix of methods? Share your thoughts in the comments—I’d love to hear your experience! 🚀
#Productivity #TaskManagement #GTD #Task4Us
-
-
@ 3c389c8f:7a2eff7f
2025-03-25 17:12:33Understanding Relays
Relays are a very simple concept, but an incredibly powerful part of Nostr. They are simple servers, of sorts, with a specific set of tasks- to fetch, hold, and send notes. Relays don't communicate with each other, only with clients. The client sends a request for any relevant notes and the relays oblige. What types of notes (aka events) that each relay will hold or fetch will vary because of different relays will operate under different sets of rules. Some will accept most any type of event from anyone. Others can be very strict, requiring things like payment, proof-of-work, specific event kinds, or only allow a whitelist of users to reduce spam and other unwanted content. When you create an event, or publish a note, it is sent to your "write" or "outbox" relays. Anyone who follows your npub or sends "fetch" /"read" requests, to those relays will receive your notes. When someone replies, likes, or otherwise engages with your note, that note will then duplicate to any "write" or "outbox" relays that the other person is connecting to as their outbox relays. This does two important things:
It creates a new event through through the action of engaging your note. This is a signed record of activity from that user's npub. This is also the event that is sent back to your "read" or "inbox" relays so that you may be notified that someone is interacting with you.
By creating a copy, this helps ensure your note will be able to be spread across more of the ecosystem, expanding your reach and introducing redundancy, in case a relay should go down or disappear completely. This does not imply that your data will be safely stored forever. In fact, its the exact opposite. The protocol assumes that any relay, or many, could disappear at any time. A relay can shut down, kick you out, experience intentional or unintentional data loss, or many other things. It is likely that a copy of your notes will still exist on many relays, but if you are concerned with the longevity of your content, consider running your own. Paid services for long term note storage exists as well, but they do require trusting the provider.
In this light, the importance of relays starts to become obvious. The various rules open up a whole plethora of use cases that make relays interesting, unique, and useful for the user. They are the backbone of the protocol. They are also tools for finding and managing great social connections and great content.
Types of Relays
This section can, in no way, be considered comprehensive. It is nearly impossible to know all of the relay implementations that may exist or all the rules that they may have set for themselves. Here, we will address some common types that will be useful in making the most of Nostr and a few types with specialized tasks.
Public Relays - Most Nostr clients will start new users with a predetermined set of relays that are free and publicly available for fetching and serving. This lowers the entry barrier for getting connected to the network, ensuring that everyone has access. It does come with some tradeoffs. Public relays tend to accept almost any type of content, so they are prone becoming the hosts of spam, bots, and shady content. To curate your space, it is recommended to get connected with some relays that help you clean things up.
Web-of-Trust Relays - These relays use your social graph and the graphs of others to build a network of higher trust for its users. This reduces spam and other yucky stuff from making it into your feeds. For write access, you must be followed by someone else within the network. If you are coming to Nostr with no external social connection, these may not be useful at first, though most do allow for public reading so you may find them useful to discover people and content you find interesting. Once you have established some social connections, they are great for creating a feed that casts a wider net through the whole network.
Paid Read/Write Filter Relays - These relays will charge an admission fee for write access. This helps to reduce spam and bots. Not all paying npubs want to see or interact with all who are willing to pay the fee, so a paid write relay often works best when paired with a paid filter relay for reading. These will operate under many sets of filtering rules, so be sure to read through any available material from the provider. They should explain what they filter and why, so that you may choose filters that match your tastes.
Inbox Relays - These relays are tasked with collecting any events that are intended FOR you. This includes likes, replies, receipts, and mentions, among many other things. If socializing with your friends and colleagues is important to you, you will want to find inbox relays that manage this task well. DM inbox relays are a separate but similar concept, as direct messages are encrypted and wrapped. They are a specialized relay meant for handling encrypted events. Many DM inbox relays charge a subscription fee, some do not. This is also a great use case for private relays.
Private Relays - These relays can be arranged to handle nearly anything you would like. You can whitelist a group of people that can write, restrict read access through AUTH, and set other various rules. They are a great option for any encrypted data, such as DMs, lists, and drafts. They also make a great backup for your own notes to help ensure that they remain available and locatable. Running your own is the optimal option here, but there are paid services, that I think of as relay rental. They are hosted on big servers, and managed by a small company. All details of the relay rules are at the renter's discretion. This is a good option if you do not have the hardware or confidence to set up your own private relay yet.
Search Relays - Search relays can help you find specific users & notes across the wider network. Some specialize in searching for people, others for text, tags, and other criteria. A strong search relay can make navigating through Nostr a breeze. As with other things, some may require a small fee to use them and others are free to use. Try out some free ones before buying to see if you are happy with your experience.
"Read" Relays - This is sort of a catchall term for anywhere that your client connects to for fetching notes and other events. In the best scenerio, you should not have to worry about these, as relays will signal for your client to find the notes you are fetching. The Nostr protocol and its mechanisms are adapting to what works, so being informed of "read" relays is essential for now. These are the places that you may need to tell your client to connect to when fetching notes from the people you follow. Specialized Relays - Specialized relays will vary in function and rules. Some are for curating quality feeds while others host full-fledge communities around a topic or common interest. Clients designed to interact with these more specialized use cases will often have relay information available or a method for you to browse their feeds.
This is just a snapshot of the different types of relays that exists now. Many are in development and testing for algorithmic content distribution, paywalled content, encrypted group messaging, limited read access, media hosting, and more. (This section may be updated as certain types gain or lose traction throughout the ecosystem.)
Managing Relays
By now, this probably feels like a ton of information and it is, but its also part of what gives you the ability to create and maintain a quality experience with Nostr. A truly decentralized system puts power into the user's hands rather than a corporation. If you want to be in control of your space (spatium tuum), relays are the first and foremost way to do that. They don't have to be viewed as boring servers. They are anything but that. They are tools that can enhance your online networking, serve you educational or entertaining content, or provide you with a safe place to store your personal thoughts. What you use them for is up to YOU.
Spend some time trying free ones, exploring relay feeds, or plugging into some paid services until you find a setup that creates a quality online space for you. If you're worried that you might "break" your connection, don't be. Make a note of a couple that you are connecting to when getting started, as a backup, but I feel confident to say that you won't ever look at it again.
Finding Relays
Finding relays can be a bit of a chore, but that is getting easier as time goes by. For now you there a few options you can try.
-
Visit a relay explorer like nostr.watch or nostr.info
-
Use a client that shows you which relays are hosting a note or a person's relay list. There are some examples in our client guide like Amethyst, Coracle, Jumble, and Nostrudel.
-
Just ask. Most people are on a social network to be social. Currently, Nostr is brimming with social people who are passionate about freedom, decentralized communication, and Nostr in particular. They are happy to help.
Running Your Own
Relay.tools is a hosted personal relay service for ease and a user friendly experience. Search Zapstore for Citrine to run a native relay on your Android device.
Below are some suggestions for relays to run on your own hardware. Search "nostr relay" on GitHub for more.
https://utxo.one/#nostr-projects
https://khatru.nostr.technology/
https://github.com/mikedilger/chorus
nostr:naddr1qvzqqqr4gupzq9h35qgq6n8ll0xyyv8gurjzjrx9sjwp4hry6ejnlks8cqcmzp6tqyghwumn8ghj7mn0wd68ytnhd9hx2tcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszrnhwden5te0dehhxtnvdakz7qqdxymngv35xq6rxdf5xqer2s0rg3q
-
-
@ 27dd78c2:66ffe658
2025-03-25 17:12:08In an age where ‘run clubs’ are getting more popular than ‘night clubs’, it’s exciting to see a Nostr-based sovereign fitness tracker hit the scene: Enter Runstr.club!
Runstr has emerged as a game-changer, redefining how runners connect, track progress, and stay motivated. For Bitcoin Runners, a movement that advocates sovereignty of one’s wealth, while improving one’s health, Runstr.club presents an exciting platform of choice to record your proof-of-work, take ownership of your personal data, and selectively engage with your social graph.
What is Runstr.club?
Runstr.club is a platform that’s being built to grow the proof-of-work community, with plans to offer interactive leaderboards, challenges, and social engagement. Unlike traditional running apps that focus purely on statistics, Runstr.club puts emphasis on camaraderie, motivation, and shared goals. It’s the Strava alternative that values ownership of your data, interoperability between platforms, and privacy as standard.
Why Runstr.club is a Great Fit for Bitcoin Runners
Bitcoin Runners isn’t just about proof-of-work; it’s about promoting freedom tech, decentralisation, and self-sovereignty principles that align closely with the ethos of Runstr.club.
Here’s why this platform is a great match for our movement:
- Community-Driven & Decentralised Spirit
Bitcoin Runners thrives on grassroots adoption and community participation, much like Runstr.club’s organic and community-focused model. Unlike corporate-owned fitness platforms that prioritise monetisation, Runstr.club is designed to empower runners, keeping the experience authentic and meaningful.
- Privacy-First Approach
One of the key concerns for bitcoiners is privacy. Mainstream fitness platforms harvest user data for profit, but Runstr.club offers a privacy-first alternative. This makes it an excellent choice for runners who value sovereignty in the digital age.
- The Advantage of Nostr Over Centralised Run Tracking Tools
Most mainstream running apps, like Strava or Nike Run Club, rely on centralised platforms that control user data, impose restrictions, and often monetise user activity. Runstr.club, however, is built on Nostr, a decentralised protocol that enables users to interact without getting trapped inside a walled garden.
With Nostr, runners benefit from:
-
True ownership of their data – no risk of platforms selling or misusing personal running history.
-
Resilience against censorship – no arbitrary bans or content moderation dictated by a 'shadowy suit'.
-
Interoperability – seamless integration with other Nostr-based applications, keeping data fluid and accessible across different platforms.
-
Peer-to-peer connectivity – allowing runners to share progress, create challenges, and stay engaged independent of big tech.
For Bitcoin Runners, Nostr’s decentralised nature aligns perfectly with the principles of sovereignty, freedom, and privacy.
- Gamification & Challenges
Runstr.club has engaging challenges and decentralised leaderboards on its roadmap. Whether you’re stacking sats through running-related bitcoin challenges or simply competing with fellow bitcoiners for fun, the platform will add an extra layer of engagement to every run. We would love to see such features come to life!
Conclusion
Runstr.club is more than just a running tracker—it’s a Nostr, bitcoin, and fitness onboarding community-driven movement. By embracing platforms that respect privacy, encourage competition, and foster community, we stay true to our values while pushing our limits as runners.
Let’s take this to the next level - be sure to follow Runstr on Nostr!
Run free. Stay sovereign. Stack zaps!
We’re shilling this open-source initiative out of genuine appreciation for both its vision and the dedicated team behind it.
-
@ 3c389c8f:7a2eff7f
2025-03-25 16:38:21Public Key vs Private Key
When you generate a Nostr identity, you generate a cryptographic keypair. One is your public key (npub...). It is used to find you and your notes. The other is your private key (nsec...), which you use to interact. Everything you do is an event, which is signed by your private key. This makes all of your actions provably yours. You are solely responsible for protecting your nsec. It is recommended to try Nostr with a test keypair before setting up anything that you want to treat seriously.
Key Creation and Protection
Most Nostr clients will have the option to generate a keypair onsite or in-app. This is convenient for trying Nostr or a client. To make a keypair for longterm use, you might want to visit a site that provides some key security from the start. Your keys are a permanent set of identifiers. They cannot be changed or reset. You own them and it is your responsibility to keep your private key safe.
When you are ready to set up a permanent identity, start in a place that specializes in Nostr key generation. Nstart and Hubstr are great places to start. NOA, Nostr Onboarding App, is multiplatform with a native app, which helps make it easier to share with friends. You can create a vanity npub through various methods as well, like https://www.nostr.rest/ . There are other methods but these are some of the most user friendly ones that I have found. They provide some tools and guidance for creating your keypair in a safe manner. Once you've gone through the process, it is a good idea to write down your nsec and store it off of any devices, in the event you should lose access to your computer or phone.
Using a signer or a browser extension to house your nsec (private key), is the next step to keeping your identity safe. (Find out more on key management below)
Portability of Your Keys
This is where all the magic happens. You can use your keys to sign into any Nostr app. If you sign in with your npub (public key), you will enter in a read-only mode. This is nice for seeing a client's interface before trying it. You can sign in with anyone's npub to see what their social feeds look like, too. You do not need to be concerned with security when using npub sign-in. Your public key, is fully public. Not all Nostr clients support this option, but many do.
Signing in with your nsec unlocks all the features of a client and enables you to interact on the protocol. Everything you do is signed by your nsec and made available by your npub. Using some sort of signer is obviously advised, to keep from exposing your nsec online.
Since all of your actions (aka events) are stored on relays and not by clients, all of your content, messages, or anything else becomes available in any client that supports those event types. Most social stuff, like replies and profile views are available almost everywhere. Not all apps will support everything, but the ones that share a common theme will handle your events in similar manners. (I.e., a marketplace listing made from one app will display across many apps. The comments and replies will, too, so there is no need to manage multiple listings to answer questions or mark something as sold.)
Key Management
This is an evolving field, with many methods of key management being explored. People, businesses, and institutions all have different needs.
Signing Extensions keep your key in a browser extension, signaling to an app that the valid nsec is present. This sign in method is available on most Nostr apps. These are the most convenient method of key management but they do have their limitations. Using an extension can be cumbersome on mobile devices, and they could still be subject to vulnerabilities within your browser or the signer itself. They also don't allow for multiple users to sign events, like a business or organization might need. Key Bunkers enable the storage of key shards encrypted across multiple locations or in one spot. Bunker signing calls the encrypted key shards to decrypt for signing events. A bunker key, often called a bunker string, can be shared with staff or used to keep your key offline. They are revocable and replaceable. The process is currently a a little complicated and client support is somewhat limited. Adoption and improvement of this method is happening quickly, as the need for multi-party access to a profile increases. Native Signing Apps, like Amber for Android, make key key storage and signing for mobile a simple process. These apps work to keep your key offline, similarly to a bunker, but it is all stored encrypted on your device. Most Nostr-Android apps and web clients offer support for this method. Development of a similar iOS app is underway. Offline Hardware Signers like standalone devices and NFC cards are being explored, tested, by many groups.
This is a very active development space and this section will be updated as needed. Below are some suggestions for Nostr signers:
https://nsec.app/ https://chromewebstore.google.com/detail/nos2x/kpgefcfmnafjgpblomihpgmejjdanjjp https://www.getflamingo.org/
-
@ 3c389c8f:7a2eff7f
2025-03-25 16:16:29Android
Amethyst - Experience the all-in-one Nostr client for mobile. Amethyst supports custom emoji reactions, marketplace listings, live streams, and so much more. If you're fresh to exploring Nostr, Amethyst may seem like a wild adventure compared to the any other social media of the past. Packed with features and blazing fast, this client gives you the ability to see just what Nostr is all about.
Voyage - This client is light on storage and data consumption, which is great for anyone with cheaper phones, limited data plans, or traveling/living in areas with lower data signal. Not only that, Voyage also offers some list and relay management tools not available in many other apps, so its great for handling some of the technical aspects of Nostr on the fly.
Web
Satellite - Fast and reliable, this client has topic communities, rich feeds, and beautiful profile displays. They offer paid media hosting for pictures, videos and more, which is essential for sharing visual content on Nostr. Satellite has long been a favorite for its simplified approach to displaying notes in a dense, clean manner and its consistency, reliability, and speed.
Jumble - Explore Nostr relay feeds, follow feeds, and more. Jumble has a clean, no-fluff interface that's easy to use and understand. You can socialize on specialized relays, or browse and chat on public relays with friends.
Coracle - Coracle allows you to easily browse relay feeds, your follow feed, and create custom feeds. You can generate Proof-of Work notes, set 'send' delays, and limit the number of relays the client talks to, to increase speed and reduce data consumption. You can generate PoW anonymous replies, too. A favorite feature is the option to import and export all of your data to/from your local device, so you can easily maintain a copy or send any lost events back to the Nostr network.
Nostrudel - The neat thing about Nostrudel is trying to find a Nostr action that it can't do. It's got all the bells and whistles. Nostudel may be a bit overwhelming if you're not familiar with all that is possible on Nostr, but once you have an idea, take this for a spin and see what new ways of interacting on the protocol that you discover.
iOS/Apple
Sorry... this is going to be a little scant for a while. Simply not one of the Apple people, these are the ones my iOS/Nostr friends seem to love:
Damus is a longtime favorite among users, adhering to a protocol-first approach to development.
Nostur sounds like a fun app, maybe on par with Amethyst as far as fun features and fast performance.
You'll have to do your own exploring to see what they are really all about.
Multi-platform
Primal - Simple, clean, and with an integrated Bitcoin/Lightning wallet for fast, easy zaps (basically tips, but on Nostr!). Get started with Nostr right away with no hassle and send or receive Bitcoin among your social network. Primal is great for anyone new to Nostr or who wants to enjoy a more traditional social media experience with the benefits that Nostr has to offer. Primal is available for Android, iOS, and on the web.
Yakihonne - Yakihonne is a beautiful multi-platform client that is available across any device. With a focus on long-form writing, it makes it easy to read and create Nostr articles, blogs, and any other informative piece. It doesn't stop there, though. You can scroll your social feed, set up smart widgets, and browse curated content collections, too.
Desktop
Notedeck - Built by the Damus team, Notedeck brings the speed and redundancy of Nostr to your machine. The local software is easy to install, set up, and use. Add multiple columns to the interface for a full screen of different feeds, profiles, and notifications.
Gossip - Gossip has a wide array of technical knobs and dials for relay controls, note fetching and publishing, and a clean interface that even I can understand. Gossip is built for the more technically-inclined among us, but is also great for the general Nostr "power user". This client is still a step above my paygrade but I'm loving it, regardless of that. If you are like me, this is a great client for a learn-through-doing method of understanding Nostr.
For Groups, Communities, and Chat
Oxchat - Oxchat puts security at the forefront of its interface with encrypted private and group chats. It does a whole lot more than that, too. You can browse your social feed, make voice and video calls, and display badges.
Flotilla and ChaChi are a couple of up and coming group/community/chat clients that are still very much under development, but look to be worth expounding upon in the future. Nostr's interoperability allows you to create and engage in groups you have joined through any of the above clients.
Specialty Clients
Zap.cooking - Publish recipes, earn zaps, find recipes, send zaps. Its a pretty brilliant system. There is no more need for 20 minute stories or overwhelming popup ads. Nostr adds a social layer to recipe sharing that doesn't require a new account to participate. Just sign in with your signing extension of choice, and you can share and leave feedback instantly.
Highlighter - Its still a bit of a construction site, but Highlighter is on its way to becoming Nostr's premiere content creator studio. Write, highlight, and curate. Not only can you create these, you can also browse and discover great Nostr content. There's lots in the works for video and other types of content, too.
Shipyard - "A Quiet Space for Loud Ideas" says it all. Shipyard is focused solely on your writing experience so that you may focus soley on your writing. This client is clean, reliable, and extemely user friendly. It is also one of few Nostr clients that provide you with the ability schedule the publishing of your notes.
Emojito.meme - Create and find custom emoji packs to use on Nostr! How fun is that? Just bookmark & those emojis ready to be used in any supporting social client.
Badges.page - Create and claim badges that display on Nostr profiles in supporting clients. This is a great way to engage with fans, celebrate moments with friends, or even just to be silly. You can set the difficulty of creating a badge with Proof-of-Work to create rare and super rare badges for top supporters, which is pretty cool.
Olas - A beautiful, visual showcase for photography and more. Its sort of like Instagram, but on Nostr, so its better. You can share, scroll, post, and monetize your content in a breeze.
Zapstore - Its an app store! On Nostr! Built for Android! Just follow the instructions on the site to begin your journey of stepping out of the nightmare that is the Playstore. Find apps recommended by your social graph, built by developers trusted within your networks, and donate to app development directly. You'll find more than just Nostr apps here. Zapstore is devoted to bringing free open source software from builder to user with as little interference as possible.
Listr - Create and manage lists for use in any other supporting client. This was the first thing that wow'd me about Nostr when I discovered it a couple years ago. There's something about making a list of people with common interests in one client, and seeing that list in action in another that just blew me away. Different feeds for different purposes, all chronological and all curated by YOU.
Habla - Long-form writing on Nostr made simple. You can quickly and easily get started with a blog or news publication and distribute it to your entire Nostr audience, regardless of which apps they use. Most social clients support article display within various feeds. You can always quote-note your article in a regular note, if you want to boost article exposure, too.
-
@ 220522c2:61e18cb4
2025-03-25 16:05:27draft
optional
Abstract
This NIP defines a new event kind for sharing and storing code snippets. Unlike regular text notes (
kind:1
), code snippets have specialized metadata like language, extension, and other code-specific attributes that enhance discoverability, syntax highlighting, and improved user experience.Event Kind
This NIP defines
kind:1337
as a code snippet event.The
.content
field contains the actual code snippet text.Optional Tags
-
filename
- Filename of the code snippet -
l
- Programming language name (lowercase). Examples: "javascript", "python", "rust" -
extension
- File extension (without the dot). Examples: "js", "py", "rs" -
description
- Brief description of what the code does -
runtime
- Runtime or environment specification (e.g., "node v18.15.0", "python 3.11") -
license
- License under which the code is shared (e.g., "MIT", "GPL-3.0", "Apache-2.0") -
dep
- Dependency required for the code to run (can be repeated) -
repo
- Reference to a repository where this code originates
Format
```json {
"id": "<32-bytes lowercase hex-encoded SHA-256 of the the serialized event data>",
"pubkey": "<32-bytes lowercase hex-encoded public key of the event creator>",
"created_at":
, "kind": 1337,
"content": "function helloWorld() {\n console.log('Hello, Nostr!');\n}\n\nhelloWorld();",
"tags": [
["l", "javascript"], ["extension", "js"], ["filename", "hello-world.js"], ["description", "A basic JavaScript function that prints 'Hello, Nostr!' to the console"], ["runtime", "node v18.15.0"], ["license", "MIT"], ["repo", "https://github.com/nostr-protocol/nostr"]
],
"sig": "<64-bytes signature of the id>"
} ```
Client Behavior
Clients that support this NIP SHOULD:
-
Display code snippets with proper syntax highlighting based on the language.
-
Allow copying the full code snippet with a single action.
-
Render the code with appropriate formatting, preserving whitespace and indentation.
-
Display the language and extension prominently.
-
Provide "run" functionality for supported languages when possible.
-
Display the description (if available) as part of the snippet presentation.
Clients MAY provide additional functionality such as:
-
Code editing capabilities
-
Forking/modifying snippets
-
Creating executable environments based on the runtime/dependencies
-
Downloading the snippet as a file using the provided extension
-
Sharing the snippet with attribution
References
nip #grownostr
-
-
@ 3c389c8f:7a2eff7f
2025-03-25 15:51:44*Create your keys and set up your profile:
https://start.njump.me/
*Pick a NIP07 browser extension or offline signer to safely store your private key (nsec):
https://nostr.net/
*Pick an app, sign in, and start exploring:
https://nostrapps.com/
That's All! :)
-
@ a012dc82:6458a70d
2025-03-25 13:57:54Bitcoin, the pioneering cryptocurrency, has once again defied skeptics by surging to a new all-time high. This remarkable resurgence is a testament to the resilience and enduring appeal of Bitcoin, even as it navigates through periods of intense volatility and regulatory scrutiny. Emerging from the shadows of the digital world, Bitcoin has sparked a financial revolution that challenges the very fabric of traditional banking and monetary systems. Its journey from an obscure digital token to a globally recognized financial asset encapsulates a saga of innovation, speculation, and the relentless pursuit of financial autonomy. This article explores the journey of Bitcoin from its inception to its current status as a leading digital asset, highlighting the challenges it has overcome and the factors contributing to its recent record-breaking performance.
Table of Contents
-
The Genesis of Bitcoin
-
Overcoming Adversity
-
The Path to Mainstream Acceptance
-
Breaking New Ground with ETFs
-
Navigating the Crypto Ecosystem
-
Looking Ahead: Challenges and Opportunities
-
Conclusion
-
FAQs
The Genesis of Bitcoin
Bitcoin was introduced to the world in 2008 by an individual or group using the pseudonym Satoshi Nakamoto. Conceived as a decentralized digital currency, Bitcoin offered a novel solution to the double-spend problem without the need for a central authority. This innovation was set against the backdrop of the global financial crisis, positioning Bitcoin as an alternative to traditional banking systems and fiat currencies. The early years of Bitcoin were marked by a passionate but small community of users, and the cryptocurrency was primarily used for niche online transactions. The concept of a decentralized currency was revolutionary, promising a new era of financial freedom and privacy. However, Bitcoin's early days were fraught with challenges, including limited public understanding, technical hurdles, and skepticism from the financial establishment. Despite these obstacles, the foundational principles of Bitcoin—transparency, security, and decentralization—captivated a growing number of enthusiasts who saw its potential to redefine money.
Overcoming Adversity
Bitcoin's journey has been anything but smooth. The cryptocurrency has faced numerous challenges, including regulatory hurdles, security breaches, and intense market volatility. High-profile incidents, such as the collapse of the Mt. Gox exchange in 2014 and the contentious debates over scalability, tested the resilience of the Bitcoin network and its community. Despite these setbacks, Bitcoin continued to gain traction, attracting a diverse group of users and investors drawn to its potential for high returns and its underlying blockchain technology. The path was littered with obstacles, from hard forks and regulatory crackdowns to sensational media coverage and public skepticism. Yet, each challenge served to strengthen the community and refine the technology, forging a cryptocurrency that was increasingly robust, adaptable, and resilient. The adversities faced by Bitcoin acted as a crucible, purifying and validating the concept of decentralized finance in the eyes of a global audience.
The Path to Mainstream Acceptance
The turning point for Bitcoin came with the gradual recognition of its value as both a digital asset and a technological innovation. Institutional investors began to take notice, and the cryptocurrency started to shed its reputation as a tool for illicit transactions. The introduction of futures contracts and the increasing interest from traditional financial firms signaled a shift towards mainstream acceptance. However, the journey was not without its skeptics, who pointed to Bitcoin's energy consumption and its volatile price swings as reasons for caution. The road to mainstream acceptance was paved with educational efforts, technological advancements, and a growing recognition of Bitcoin's unique attributes, such as its fixed supply and borderless nature. As awareness and understanding of Bitcoin increased, so too did its legitimacy and value, leading to a gradual but undeniable integration into the broader financial landscape.
Breaking New Ground with ETFs
The recent surge in Bitcoin's price can be largely attributed to the approval of exchange-traded funds (ETFs) pegged to the digital asset by U.S. regulators. This milestone was achieved after years of advocacy from the crypto community and a legal battle that challenged the Securities and Exchange Commission's initial rejections. The launch of the first "spot" Bitcoin ETFs has opened the doors for more traditional investors to enter the market, providing a regulated and familiar avenue for Bitcoin exposure. This development has not only boosted Bitcoin's price but also reinforced its legitimacy as an investment asset. The introduction of Bitcoin ETFs represents a significant breakthrough in the cryptocurrency's journey, bridging the gap between the innovative, often misunderstood world of digital currencies and the established, regulated realm of traditional finance. This convergence has facilitated a new wave of investment, bringing with it increased liquidity, visibility, and acceptance for Bitcoin and the broader cryptocurrency market.
Navigating the Crypto Ecosystem
Bitcoin's influence extends beyond its own price performance, serving as a bellwether for the broader cryptocurrency market. The ecosystem has grown exponentially, with thousands of altcoins and a burgeoning decentralized finance (DeFi) sector. However, the industry has not been immune to challenges, facing regulatory scrutiny, market manipulation, and high-profile scandals. Despite these obstacles, Bitcoin has maintained its dominance, buoyed by a loyal community and its perceived value as a hedge against inflation and currency devaluation. The cryptocurrency ecosystem is a dynamic and evolving landscape, marked by rapid innovation and intense competition. Yet, through all the tumult and transformation, Bitcoin remains the cornerstone, setting the standard for security, adoption, and market value. Its journey mirrors the maturation of the entire crypto space, from a fringe idea to a major financial force, influencing everything from individual investment strategies to global economic policies.
Looking Ahead: Challenges and Opportunities
As Bitcoin reaches new heights, questions remain about its sustainability and the potential impact of regulatory changes. The upcoming "halving" event, which reduces the reward for mining new blocks, is expected to have significant implications for Bitcoin's supply and, consequently, its price. Additionally, the cryptocurrency must navigate the delicate balance between innovation and regulation, as authorities worldwide grapple with how to oversee this evolving asset class. The future of Bitcoin is inextricably linked to the broader narrative of digital transformation and financial innovation. As it continues to evolve, Bitcoin will face new challenges and opportunities, from technological advancements and competitive pressures to shifting regulatory landscapes and economic trends. Yet, if history is any guide, Bitcoin will adapt and thrive, continuing its unstoppable journey from adversity to record highs.
Conclusion
From its humble beginnings to its current status as a financial phenomenon, Bitcoin's journey is a compelling narrative of innovation, resilience, and the relentless pursuit of decentralization. While the road ahead is fraught with uncertainty, Bitcoin's ability to rebound from adversity and reach new record highs is a testament to its enduring appeal and the transformative potential of cryptocurrencies. As the world continues to embrace digital currencies, Bitcoin's story remains a powerful reminder of the possibilities and challenges that lie ahead in the uncharted waters of the digital age. The saga of Bitcoin is far from over; it is a continuing tale of disruption, adaptation, and, ultimately, triumph in the face of adversity.
FAQs
Why has Bitcoin reached new record highs? Bitcoin's recent surge to new record highs can be attributed to factors such as the approval of Bitcoin ETFs, growing institutional acceptance, its appeal as a hedge against inflation, and increasing mainstream interest.
What are Bitcoin ETFs, and why are they important? Bitcoin ETFs (Exchange-Traded Funds) are investment funds that track the price of Bitcoin and are traded on traditional stock exchanges. They provide investors with a way to gain exposure to Bitcoin without having to buy or store the cryptocurrency directly, which has contributed to increased Bitcoin adoption.
What challenges has Bitcoin faced? Bitcoin has faced numerous challenges, including regulatory hurdles, security breaches, market volatility, and skepticism from the financial community. Despite these challenges, Bitcoin has continued to grow and gain acceptance.
What is the "halving" event in Bitcoin? The "halving" is an event that occurs approximately every four years, where the reward for mining new Bitcoin blocks is halved. This reduces the rate at which new bitcoins are generated, theoretically increasing scarcity and potentially driving up the price.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 6bae33c8:607272e8
2025-03-25 11:03:28I try to make these bold enough that I get most of them wrong. If you’re not getting most wrong, they’re not bold enough! Hits from last year included Teoscar Hernandez being the Marcel Ozuna of 2024 and Shohei Ohtani’s gambling scandal getting memory-holed totally. Misses include Walker Buehler > Tarik Skubal and Spencer Torkelson > Vlad Guerrero. As I said, the predictions have to be bold!
Also, these are hunches, the explanations for which are largely irrelevant. The relevant information is priced into ADP, so while I’ll justify it one way or another, it’s the prediction itself, not the explanation that matters.
1, Alex Bregman is top-five in AL MVP voting
This just feels like a perfect fit. Bregman rakes at Fenway (1.240 career OPS), and he rarely strikes out. I could see a .300-plus batting average with 30 home runs. The Red Sox upgraded their pitching too, and after the Yankees lost Gerrit Cole and Juan Soto, have a good chance to win the AL East.
2. Bo Bichette outperforms Mookie Betts
Granted Betts is sick right now and lost a ton of weight, but he was still going in the second round of NFBC Mains, while Bichette was going in Rounds 8-9. Bichette was hurt last year, but prior to that he was a star, is in his age 27 season and has four home runs and a .373 average in Spring Training. I’m sick that I didn’t get any shares (took Bregman over him in the Main.)
3. Chris Sale finishes as a top-5 starter again
This might not sound that bold because he’s SP6 by ADP, but every pitcher except maybe Paul Skenes and Skubal are underdogs to be top-five, given the volatility of the position. I love veterans in their mid-30s finding it again, usually they have 2-3 years of good before age and injury catch up again. It reminds me of Justin Verlander who hit a rough patch before righting the ship for several elite years.
4. Tyler Glasnow finishes as top-3 in NL CY Young votes
My comp for Glasnow is Randy Johnson, another tall lefty who battled injuries in his 20s before settling down to become one of the GOATS. Glasnow managed 135 IP last year and if he ups it to 165, he’ll be in the CY mix on the Dodgers.
5. Cody Bellinger hits 40 homers
A pull hitter with a high fly ball rate, Bellinger is perfect for Yankee Stadium. He’ll have to stay healthy, of course, but he’s still just 29 — won’t turn 30 until July — and is primed for the second best year of his career (he won’t top 2019.)
6. At least one of the following veteran pitchers has a top-five CY finish: Justin Verlander, Max Scherzer, Kevin Gausman, Walker Buehler, Sandy Alcantara or Carlos Rodon.
Pitchers who were once elite still own most of their skills, health permitting. While Scherzer and Verlander have lost velocity, knowing how to pitch is sufficient above a certain minimum threshold.
7. Jackson Chourio goes 30-30-.300
Chourio hit over .300 for the final four months of the season, once the Brewers stopped pulling him in and out of the lineup. The steals should be easy for him with a full season of at-bats, and the power should be there too in that park.
8. Hunter Brown finishes top-five in AL CY voting
After a rough start, Brown was one of the best pitchers in the league last year with a 2.31 ERA over the last four months. He’s in a good park, in the right division (though the A’s home park got a lot worse) and on a good enough team for run support purposes.
9. Aroldis Chapman gets more saves than Jhoan Duran
Chapman is still throwing 99 and landed a job on the much-improved Red Sox, while Duran, who took nine losses last year, has Griffin Jax behind him. I know Chapman’s control has been bad the last few years, but I have a hunch the veteran warhorse has a comeback year.
10. Some of these predictions will be wrong
I’ll pay the cost of never going 10-for-10 to make sure I don’t go 0-for-10.
-
@ 7da115b6:7d3e46ae
2025-03-25 11:00:01What Happened?
Sadly, some news came to us in the last couple of days, news that has exploded our plans like a bombshell. As you know from previous posts, my family and I had found the property of our dreams, within the price range that suited us. The only issue was that we had to sell our rental property to be able to purchase the land we wanted to develop for our homestead. At the time, it wasn't an issue.
With a few phone calls and some discussion with the local Council; the Realtor; the Vendors, and the bank, we were on our way. We made an offer, and it was accepted, contingent on our rental property selling. Our offer expires this Friday, and the likelihood of it selling before then, is slim. That leaves us 3 days to come up with the $130,000 we need to secure the property.
"So why not just extend the offer?" I hear you say. Well, that's a fair point - We did. The extension runs out this Friday. Can we extend on the extension? Legally, yes. but here's the rub:
A counter offer has been put forward.
This basically means, that without having the money available by the end of the offer extension, the Vendor is going to take the counter offer.
That's Not So Bad... Right?
Yes, and no.
Unfortunately, we've spend thousands of dollars on reports; valuations; building research and site inspections. This means all of the plans, money and time that we've invested so far is going to be lost. Yes yes, you're right of course, it's our own fault for getting so financially and emotionally invested in the first place. Lesson learned.
I think that the hardest part of it all, was breaking it to my wife. She had already started designing her gardens, and had dreams of watching our homestead grow. The look of utter defeat on her face was gut wrenching. I felt as though I had failed her, and torn away the dream we had built together. She and I had lost our dream in the course of a single phone call. It hit both of us hard.
It's been 24 hours now, and the pain is real. I don't want to eat or go to work, I don't want to talk to anyone. I just want to lay down on my wife's lap and close my eyes until it's over. Deep down inside, I know it's a childish reaction, but that doesn't make it any less of a slap across the face.
The Light at the End of the Tunnel
Cliche, I know, but there may be a little glimmer of light on the horizon. If we do sell our rental property, we will have money to play with. This means we can buy a crappy little Ute and caravan, and go exploring our country. Perhaps stop at a few places that look nice, and see if they're places we could settle. If we spend a few months just looking around, and find somewhere homely, then we can stay for a while at a local caravan park, and look for a property that may be suitable.
At the very least, it would mean that we can escape our shit jobs, which has been the biggest goal from the beginning.
Fingers crossed...
-
@ 7da115b6:7d3e46ae
2025-03-25 10:55:04Originally written and posted on the 12th of December, 2024
Emotionally, it's been challenging to say the least, and the heat just exacerbates the frustration. But don't let that fool you; we've made significant progress. We found our dream property over two months ago for $130,000. 3 hectares of land, but 2 hectares of it is unusable. This was perfectly okay with us as it's going to be a massive effort for one person anyway.
Two months ago, we put in an offer and they accepted it. However, we are not well off by any means; most weeks, we just scrape by. We have two properties - a property in the Far North that we've been renting out to pay the mortgage ($70,000 remaining), and the one we live in which has almost the entire mortgage outstanding.
So how can we afford another property? Well it's no simple feat! First, we need to sell our Rental Property for around $400,000 (a reasonable market rate). Once that sells, about $170,000 in equity gets transferred to the mortgage of the property we're currently living in. After paying off the last of the mortgage on the rental property and shifting the equity to our current property, that will leave us with almost nothing after legal fees and real estate agent fees.
This amount remaining barely covers the cost of the property we put an offer on - our dream property. It's a humbling experience realizing just how far we still have to go in this journey towards self-sufficiency.
It's a sober reminder that we can't rush it, but should rather embrace each step along the way. For better or for worse, we must adapt and learn from every situation as it comes our way. After all, we can only control what's within our reach; the rest is just a matter of time and patience.
Perhaps it's not about achieving self-sufficiency, but truly embracing the journey itself. The path towards that dream property we've been longing for may take longer than expected, but as long as we have each other and keep pushing forward, I can't think of anything more rewarding than seeing our vision unfold step by step.
I have to remember to cherish the memories and experiences along this road, because it's those moments that will truly make the journey worthwhile.
-
@ 7da115b6:7d3e46ae
2025-03-25 10:52:00Originally written and posted on the 10th of March, 2025
Safety
The first reason that comes to mind is safety. Violent crime has become a recurring theme in our town, with statistics showing a rise in cases such as burglaries and general homicides. These changes have made us acutely aware of the importance of providing a secure environment for our family. As our children grow, we yearn for them to experience not just safety, but also a sense of stability that comes with it.
The thought of crime often makes me reflect on moments like the domestic violence and murder within throwing distance of our current home, or the attempted mugging and homicide at a nearby petrol station. These incidents have sparked a desire for a place where our family can feel more secure and enjoy the peace of mind that comes with knowing they're safe. I hope that growing up in a safe environment will instill confidence and security in my kids as they navigate life. This pursuit of safety is not just about protecting my loved ones; it’s about creating a foundation where they can thrive and feel secure in their surroundings, allowing them to focus on their growth and aspirations without the constant awareness of potential danger.
Cost of Living
The cost of living has been another pivotal factor in our decision to move. Over time, we’ve noticed how the city’s expenses, from petrol to groceries, have steadily increased, making every purchase a mindful choice. The rising costs of utilities, transportation, and daily essentials have become a significant part of our budget, leaving us wondering if there’s room for more than just the basics. While the city offers many amenities, we’ve found ourselves seeking a lifestyle that aligns with our values and allows us to live comfortably without constant financial strain.
The cost of groceries has also become a major consideration. As prices rise, even simple trips to the store have us thinking about every purchase. We’ve found ourselves choosing between brands or quantities to stay within our budget, which has made us appreciate the idea of growing some of our own food.
While we love the idea of the cultural and social offerings of city life, the reality is that we spend more time trying to stretch our weekly budget to make ends meet, than we do enjoying the fruits of our labor. We’re looking forward to a place where we can manage our budget comfortably, while still having access to the amenities we need. This doesn’t mean we’re leaving behind everything we’ve grown accustomed to; it’s about finding a balance—a home that allows us to live fully without feeling constrained by expenses.
Our decision to move isn't about wanting to be one with nature or making a statement; it’s more about practicality. Owning a freehold property gives us the stability we need, allowing us to live sustainably without feeling tied down by expenses. This choice aligns with our values and offers a sense of freedom, not because we're trying to escape something, but because it supports the life we want for ourselves and our family. We’ve worked hard to pay down our mortgages, but now we’re ready for the next step—owning our own land that we can build upon.
We’re not looking to simplify just because we want to be closer to nature; rather, we see this move as an opportunity to create a lifestyle that’s more in tune with our needs. By growing our own food and living in a clean, natural environment, we’re prioritizing sustainability without compromising on what matters most—our family’s future and well-being. It’s about creating a home that reflects our values, not just embracing change for the sake of being different.
Educational Opportunities
Our oldest child’s education is another driving force behind this move. We’ve discovered that the place we’re moving to offers a University with "fees-free" options, which will provide him with an opportunity to pursue his studies without the burden of tuition costs. This not only eases our financial concerns but also gives us peace of mind knowing he can focus on his education without added stress. It’s a decision that aligns with our aspirations for his future and our family's well-being, hoping he can thrive in an environment that supports his academic journey and personal growth.
Also, our youngest child is going to have the opportunity to raise the animals he’s so enamored with, such as chickens; dogs; pigs, and maybe even a couple of sheep. I want these experiences to help him to learn by doing, fostering a sense of responsibility and connection with where our food comes from. By caring for these creatures, we hope he’ll develop life skills that will help him grow into his own skin as he gets older. It’s a chance for him to explore his passions and build confidence in a hands-on way.
Freedom
Space has become something we truly appreciate, especially with our kids and pets. We’re eager for them to have more room to roam and explore freely. The privacy that a rural setting offers is high on our list of needs because living in the city often feels like we're always surrounded by others. It's not uncommon to bump into neighbors or find ourselves at loggerheads over simple things like car parks. This constant interaction, while part of city life, can sometimes feel overwhelming.
But it's not just us - our current place of employment also experiences issues with neighboring businesses, and it’s the employees who end up feeling the impact. It feels as if everyone is out for themselves, and are incapable of thinking about how their actions affect others.The city environment feels cramped and extremely claustrophobic, making us yearn for more personal space. We’re looking forward to the freedom of having our own large property where we can enjoy peace and quiet. It’s exciting to think about the possibilities, like building a barn or adding bee hives, and even sinking a water well as we please.
Food & Gardening
The idea of growing our own food is another exciting prospect that we're eager to explore. We’re looking forward to cultivating fresh produce in our garden, which will not only provide healthier options for our family but also add variety and freshness to our meals. It will be a major undertaking for us. While I personally have some understanding of growing and harvesting simple crops like potatoes and cabbage, I am deeply aware of my lack of knowledge and experience. It will take years for me to actually become proficient. We’re excited to teach our kids where their food comes from and instill an appreciation for sustainable living. Growing our own produce aligns with our desire for a more natural, self-sufficient lifestyle, offering us the joy of seeing the fruits of our labor in our garden.
Exercise & General Wellness
Living in a bustling city has its perks, but it has also take a toll on our sense of well-being. The daily grind often leaves us feeling mentally and emotionally drained, leaving little room for relaxation and physical activity. With the convenience of modern life comes a faster pace, which, while beneficial, frequently feels overwhelming. We long for moments to pause, breathe in fresh air, and reconnect with ourselves.
I think that the desire for more exercise and fresh air, is a natural response to the our current lifestyle. The city’s vibrant atmosphere and endless opportunities often come at the expense of personal time and the chance to enjoy relax. By seeking a new environment, We're looking for a balanced life for our family, where we can revitalize their minds and bodies through simple yet essential activities like walking around the property or the exercise of working the land. This shift is not just about changing scenery; it’s about creating a lifestyle that supports our overall well-being and allows for moments of peace away from the hustle and bustle.
In conclusion, this move is about more than just changing scenery; it’s about creating a home that embodies our values—safety, education, sustainability, and well-being for our family. It’s a step towards a future where we can thrive in an environment that supports our growth and aspirations.
-
@ ecda4328:1278f072
2025-03-25 10:00:52Kubernetes and Linux Swap: A Practical Perspective
After reviewing kernel documentation on swap management (e.g., Linux Swap Management), KEP-2400 (Kubernetes Node Memory Swap Support), and community discussions like this post on ServerFault, it's clear that the topic of swap usage in modern systems—especially Kubernetes environments—is nuanced and often contentious. Here's a practical synthesis of the discussion.
The Rationale for Disabling Swap
We disable SWAP on our Linux servers to ensure stable and predictable performance by relying on available RAM, avoiding the performance degradation and unnecessary I/O caused by SWAP usage. If an application runs out of memory, it’s usually due to insufficient RAM allocation or a memory leak, and enabling SWAP only worsens performance for other applications. It's more efficient to let a leaking app restart than to rely on SWAP to prevent OOM crashes.
With modern platforms like Kubernetes, memory requests and limits are enforced, ensuring apps use only the RAM allocated to them, while avoiding overcommitment to prevent resource exhaustion.
Additionally, disabling swap may protect data from data remanence attacks, where sensitive information could potentially be recovered from the swap space even after a process terminates.
Theoretical Capability vs. Practical Deployment
Linux provides a powerful and flexible memory subsystem. With proper tuning (e.g., swappiness, memory pinning, cgroups), it's technically possible to make swap usage efficient and targeted. Seasoned sysadmins often argue that disabling swap entirely is a lazy shortcut—an avoidance of learning how to use the tools properly.
But Kubernetes is not a traditional system. It's an orchestrated environment that favors predictability, fail-fast behavior, and clear isolation between workloads. Within this model:
- Memory requests and limits are declared explicitly.
- The scheduler makes decisions based on RAM availability, not total virtual memory (RAM + swap).
- Swap introduces non-deterministic performance characteristics that conflict with Kubernetes' goals.
So while the kernel supports intelligent swap usage, Kubernetes intentionally sidesteps that complexity.
Why Disable Swap in Kubernetes?
-
Deterministic Failure > Degraded Performance\ If a pod exceeds its memory allocation, it should fail fast — not get throttled into slow oblivion due to swap. This behavior surfaces bugs (like memory leaks or poor sizing) early.
-
Transparency & Observability\ With swap disabled, memory issues are clearer to diagnose. Swap obfuscates root causes and can make a healthy-looking node behave erratically.
-
Performance Consistency\ Swap causes I/O overhead. One noisy pod using swap can impact unrelated workloads on the same node — even if they’re within their resource limits.
-
Kubernetes Doesn’t Manage Swap Well\ Kubelet has historically lacked intelligence around swap. As of today, Kubernetes still doesn't support swap-aware scheduling or per-container swap control.
-
Statelessness is the Norm\ Most containerized workloads are designed to be ephemeral. Restarting a pod is usually preferable to letting it hang in a degraded state.
"But Swap Can Be Useful..."
Yes — for certain workloads (e.g., in-memory databases, caching layers, legacy systems), there may be valid reasons to keep swap enabled. In such cases, you'd need:
- Fine-tuned
vm.swappiness
- Memory pinning and cgroup-based control
- Swap-aware monitoring and alerting
- Custom kubelet/systemd integration
That's possible, but not standard practice — and for good reason.
Future Considerations
Recent Kubernetes releases have introduced experimental swap support via KEP-2400. While this provides more flexibility for advanced use cases — particularly Burstable QoS pods on cgroupsv2 — swap remains disabled by default and is not generally recommended for production workloads unless carefully planned. The rationale outlined in this article remains applicable to most Kubernetes operators, especially in multi-tenant and performance-sensitive environments.
Even the Kubernetes maintainers acknowledge the inherent trade-offs of enabling swap. As noted in KEP-2400's Risks and Mitigations section, swap introduces unpredictability, can severely degrade performance compared to RAM, and complicates Kubernetes' resource accounting — increasing the risk of noisy neighbors and unexpected scheduling behavior.
Some argue that with emerging technologies like non-volatile memory (e.g., Intel Optane/XPoint), swap may become viable again. These systems promise near-RAM speed with large capacity, offering hybrid memory models. But these are not widely deployed or supported in mainstream Kubernetes environments yet.
Conclusion
Disabling swap in Kubernetes is not a lazy hack — it’s a strategic tradeoff. It improves transparency, predictability, and system integrity in multi-tenant, containerized environments. While the kernel allows for more advanced configurations, Kubernetes intentionally simplifies memory handling for the sake of reliability.
If we want to revisit swap usage, it should come with serious planning: proper instrumentation, swap-aware observability, and potentially upstream K8s improvements. Until then, disabling swap remains the sane default.