-
@ 06830f6c:34da40c5
2025-03-30 03:56:17Once upon a time their lived a young man in a lost village, I'm just kidding with you, I'm testing my blog entries on my domain. SITE
Navigate to Blogs tab and screenshot this. @ me for a chance to get zapped ⚡. I won't say how many sats, so you are not doing it due to the incentive but to help me test the domain functionality.
Love ✌️
-
@ fd06f542:8d6d54cd
2025-03-30 02:16:24Warning
unrecommended
: deprecated in favor of NIP-17NIP-04
Encrypted Direct Message
final
unrecommended
optional
A special event with kind
4
, meaning "encrypted direct message". It is supposed to have the following attributes:content
MUST be equal to the base64-encoded, aes-256-cbc encrypted string of anything a user wants to write, encrypted using a shared cipher generated by combining the recipient's public-key with the sender's private-key; this appended by the base64-encoded initialization vector as if it was a querystring parameter named "iv". The format is the following:"content": "<encrypted_text>?iv=<initialization_vector>"
.tags
MUST contain an entry identifying the receiver of the message (such that relays may naturally forward this event to them), in the form["p", "<pubkey, as a hex string>"]
.tags
MAY contain an entry identifying the previous message in a conversation or a message we are explicitly replying to (such that contextual, more organized conversations may happen), in the form["e", "<event_id>"]
.Note: By default in the libsecp256k1 ECDH implementation, the secret is the SHA256 hash of the shared point (both X and Y coordinates). In Nostr, only the X coordinate of the shared point is used as the secret and it is NOT hashed. If using libsecp256k1, a custom function that copies the X coordinate must be passed as the
hashfp
argument insecp256k1_ecdh
. See here.Code sample for generating such an event in JavaScript:
```js import crypto from 'crypto' import * as secp from '@noble/secp256k1'
let sharedPoint = secp.getSharedSecret(ourPrivateKey, '02' + theirPublicKey) let sharedX = sharedPoint.slice(1, 33)
let iv = crypto.randomFillSync(new Uint8Array(16)) var cipher = crypto.createCipheriv( 'aes-256-cbc', Buffer.from(sharedX), iv ) let encryptedMessage = cipher.update(text, 'utf8', 'base64') encryptedMessage += cipher.final('base64') let ivBase64 = Buffer.from(iv.buffer).toString('base64')
let event = { pubkey: ourPubKey, created_at: Math.floor(Date.now() / 1000), kind: 4, tags: [['p', theirPublicKey]], content: encryptedMessage + '?iv=' + ivBase64 } ```
Security Warning
This standard does not go anywhere near what is considered the state-of-the-art in encrypted communication between peers, and it leaks metadata in the events, therefore it must not be used for anything you really need to keep secret, and only with relays that use
AUTH
to restrict who can fetch yourkind:4
events.Client Implementation Warning
Clients should not search and replace public key or note references from the
.content
. If processed like a regular text note (where@npub...
is replaced with#[0]
with a["p", "..."]
tag) the tags are leaked and the mentioned user will receive the message in their inbox. -
@ fd06f542:8d6d54cd
2025-03-30 02:11:00NIP-03
OpenTimestamps Attestations for Events
draft
optional
This NIP defines an event with
kind:1040
that can contain an OpenTimestamps proof for any other event:json { "kind": 1040 "tags": [ ["e", <event-id>, <relay-url>], ["alt", "opentimestamps attestation"] ], "content": <base64-encoded OTS file data> }
- The OpenTimestamps proof MUST prove the referenced
e
event id as its digest. - The
content
MUST be the full content of an.ots
file containing at least one Bitcoin attestation. This file SHOULD contain a single Bitcoin attestation (as not more than one valid attestation is necessary and less bytes is better than more) and no reference to "pending" attestations since they are useless in this context.
Example OpenTimestamps proof verification flow
```bash ~> nak req -i e71c6ea722987debdb60f81f9ea4f604b5ac0664120dd64fb9d23abc4ec7c323 wss://nostr-pub.wellorder.net | jq -r .content | ots verify
using an esplora server at https://blockstream.info/api - sequence ending on block 810391 is valid timestamp validated at block [810391] ```
- The OpenTimestamps proof MUST prove the referenced
-
@ fd06f542:8d6d54cd
2025-03-30 02:10:24NIP-03
OpenTimestamps Attestations for Events
draft
optional
This NIP defines an event with
kind:1040
that can contain an OpenTimestamps proof for any other event:json { "kind": 1040 "tags": [ ["e", <event-id>, <relay-url>], ["alt", "opentimestamps attestation"] ], "content": <base64-encoded OTS file data> }
- The OpenTimestamps proof MUST prove the referenced
e
event id as its digest. - The
content
MUST be the full content of an.ots
file containing at least one Bitcoin attestation. This file SHOULD contain a single Bitcoin attestation (as not more than one valid attestation is necessary and less bytes is better than more) and no reference to "pending" attestations since they are useless in this context.
Example OpenTimestamps proof verification flow
```bash ~> nak req -i e71c6ea722987debdb60f81f9ea4f604b5ac0664120dd64fb9d23abc4ec7c323 wss://nostr-pub.wellorder.net | jq -r .content | ots verify
using an esplora server at https://blockstream.info/api - sequence ending on block 810391 is valid timestamp validated at block [810391] ```
- The OpenTimestamps proof MUST prove the referenced
-
@ 50de492c:0a8871de
2025-03-30 00:23:36{"title":"test","description":"","imageUrl":"https://i.nostr.build/Xo67.png"}
-
@ 3514ac1b:cf164691
2025-03-29 22:07:33About Me
-
@ 3514ac1b:cf164691
2025-03-29 21:58:22Hi this is me ,Erna . i am testing this Habla news . i have been trying using this but got no luck . always disconnect and no content .
Hopefully this one will work .
BREAKING NEWS : Vance uses Greenland visit to slam Denmark , as Trump escalates rhetoric .
https://wapo.st/4c6YkhO
-
@ b571324b:6e316384
2025-03-29 20:41:57Always humble yourself 😁##
-
@ 3514ac1b:cf164691
2025-03-29 18:55:29Cryptographic Identity (CI): An Overview
Definition of Cryptographic Identity
Cryptographic identity refers to a digital identity that is secured and verified using cryptographic techniques. It allows individuals to prove their identity online without relying on centralized authorities.
Background of Cryptographic Identity
Historical Context
- Traditional identity systems rely on centralized authorities (governments, companies)
- Digital identities historically tied to platforms and services
- Rise of public-key cryptography enabled self-sovereign identity concepts
- Blockchain and decentralized systems accelerated development
Technical Foundations
- Based on public-key cryptography (asymmetric encryption)
- Uses key pairs: private keys (secret) and public keys (shareable)
- Digital signatures provide authentication and non-repudiation
- Cryptographic proofs verify identity claims without revealing sensitive data
Importance of Cryptographic Identity
Privacy Benefits
- Users control their personal information
- Selective disclosure of identity attributes
- Reduced vulnerability to mass data breaches
- Protection against surveillance and tracking
Security Advantages
- Not dependent on password security
- Resistant to impersonation attacks
- Verifiable without trusted third parties
- Reduces centralized points of failure
Practical Applications
- Censorship-resistant communication
- Self-sovereign finance and transactions
- Decentralized social networking
- Cross-platform reputation systems
- Digital signatures for legal documents
Building Cryptographic Identity with Nostr
Understanding Nostr Protocol
Core Concepts
- Nostr (Notes and Other Stuff Transmitted by Relays)
- Simple, open protocol for censorship-resistant global networks
- Event-based architecture with relays distributing signed messages
- Uses NIP standards (Nostr Implementation Possibilities)
Key Components
- Public/private keypairs as identity foundation
- Relays for message distribution
- Events (signed JSON objects) as the basic unit of data
- Clients that interface with users and relays
Implementation Steps
Step 1: Generate Keypair
- Use cryptographic libraries to generate secure keypair
- Private key must be kept secure (password managers, hardware wallets)
- Public key becomes your identifier on the network
Step 2: Set Up Client
- Choose from existing Nostr clients or build custom implementation
- Connect to multiple relays for redundancy
- Configure identity preferences and metadata
Step 3: Publish Profile Information
- Create and sign kind 0 event with profile metadata
- Include displayable information (name, picture, description)
- Publish to connected relays
Step 4: Verification and Linking
- Cross-verify identity with other platforms (Twitter, GitHub)
- Use NIP-05 identifier for human-readable identity
- Consider NIP-07 for browser extension integration
Advanced Identity Features
Reputation Building
- Consistent posting builds recognition
- Accumulate follows and reactions
- Establish connections with well-known identities
Multi-device Management
- Secure private key backup strategies
- Consider key sharing across devices
- Explore NIP-26 delegated event signing
Recovery Mechanisms
- Implement social recovery options
- Consider multisig approaches
- Document recovery procedures
Challenges and Considerations
Key Management
- Private key loss means identity loss
- Balance security with convenience
- Consider hardware security modules for high-value identities
Adoption Barriers
- Technical complexity for average users
- Network effects and critical mass
- Integration with existing systems
Future Developments
- Zero-knowledge proofs for enhanced privacy
- Standardization efforts across protocols
- Integration with legal identity frameworks
-
@ 7d33ba57:1b82db35
2025-03-29 18:47:34Pula, located at the southern tip of Istria, is a city where ancient Roman ruins meet stunning Adriatic beaches. Known for its well-preserved amphitheater, charming old town, and crystal-clear waters, Pula offers a perfect blend of history, culture, and relaxation.
🏛️ Top Things to See & Do in Pula
1️⃣ Pula Arena (Roman Amphitheater) 🏟️
- One of the best-preserved Roman amphitheaters in the world, built in the 1st century.
- Used for gladiator fights, now a venue for concerts & film festivals.
- Climb to the top for stunning sea views.
2️⃣ Explore Pula’s Old Town 🏡
- Wander through cobbled streets, past Venetian, Roman, and Austro-Hungarian architecture.
- Visit the Arch of the Sergii (a 2,000-year-old Roman triumphal arch).
- Enjoy a drink in Forum Square, home to the Temple of Augustus.
3️⃣ Relax at Pula’s Beaches 🏖️
- Hawaiian Beach (Havajska Plaža): Turquoise waters & cliffs for jumping.
- Ambrela Beach: A Blue Flag beach with calm waters, great for families.
- Pješčana Uvala: A sandy beach, rare for Croatia!
4️⃣ Cape Kamenjak Nature Park 🌿
- A wild and rugged coastline with hidden coves and crystal-clear water.
- Great for cliff jumping, kayaking, and biking.
- Located 30 minutes south of Pula.
5️⃣ Visit Brijuni National Park 🏝️
- A group of 14 islands, once Tito’s private retreat.
- Features Roman ruins, a safari park, and cycling trails.
- Accessible via boat from Fazana (15 min from Pula).
6️⃣ Try Istrian Cuisine 🍽️
- Fuži with truffles – Istria is famous for white & black truffles.
- Istrian prosciutto & cheese – Perfect with local Malvazija wine.
- Fresh seafood – Try grilled squid or buzara-style mussels.
🚗 How to Get to Pula
✈️ By Air: Pula Airport (PUY) has flights from major European cities.
🚘 By Car:
- From Zagreb: ~3 hours (270 km)
- From Ljubljana (Slovenia): ~2.5 hours (160 km)
🚌 By Bus: Regular buses connect Pula with Rovinj, Rijeka, Zagreb, and Trieste (Italy).
🚢 By Ferry: Seasonal ferries run from Venice and Zadar.💡 Tips for Visiting Pula
✅ Best time to visit? May–September for warm weather & festivals 🌞
✅ Book Arena event tickets in advance – Summer concerts sell out fast 🎶
✅ Try local wines – Istrian Malvazija (white) and Teran (red) are excellent 🍷
✅ Explore nearby towns – Rovinj & Motovun make great day trips 🏡
✅ Cash is useful – Some small shops & markets prefer cash 💶 -
@ 57d1a264:69f1fee1
2025-03-29 18:02:16This UX research has been redacted by @iqra from the Bitcoin.Design community, and shared for review and feedback! Don't be shy, share your thoughts.
1️⃣ Introduction
Project Overview
📌 Product: BlueWallet (Bitcoin Wallet) 📌 Goal: Improve onboarding flow and enhance accessibility for a better user experience. 📌 Role: UX Designer 📌 Tools Used: Figma, Notion
Why This Case Study?
🔹 BlueWallet is a self-custodial Bitcoin wallet, but users struggle with onboarding due to unclear instructions. 🔹 Accessibility issues (low contrast, small fonts) create barriers for visually impaired users. 🔹 Competitors like Trust Wallet and MetaMask offer better-guided onboarding.
This case study presents UX/UI improvements to make BlueWallet more intuitive and inclusive.
2️⃣ Problem Statement: Why BlueWalletʼs Onboarding Needs Improvement
🔹 Current Challenges:
1️⃣ Onboarding Complexity - BlueWallet lacks step-by-step guidance, leaving users confused about wallet creation and security.
2️⃣ No Educational Introduction - Users land directly on the wallet screen with no explanation of private keys, recovery phrases, or transactions. 3️⃣ Transaction Flow Issues - Similar-looking "Send" and "Receive" buttons cause confusion. 4️⃣ Poor Accessibility - Small fonts and low contrast make navigation difficult.
🔍 Impact on Users:
Higher drop-off rates due to frustration during onboarding. Security risks as users skip key wallet setup steps. Limited accessibility for users with visual impairments.
📌 Competitive Gap:
Unlike competitors (Trust Wallet, MetaMask), BlueWallet does not offer: ✅ A guided onboarding process ✅ Security education during setup ✅ Intuitive transaction flow
Somehow, this wallet has much better UI than the BlueWallet Bitcoin wallet.
3️⃣ User Research & Competitive Analysis
User Testing Findings
🔹 Conducted usability testing with 5 users onboarding for the first time. 🔹 Key Findings: ✅ 3 out of 5 users felt lost due to missing explanations. ✅ 60% had trouble distinguishing transaction buttons. ✅ 80% found the text difficult to read due to low contrast.
Competitive Analysis
We compared BlueWallet with top crypto wallets:
| Wallet | Onboarding UX | Security Guidance | Accessibility Features | |---|---|---|---| | BlueWallet | ❌ No guided onboarding | ❌ Minimal explanation | ❌ Low contrast, small fonts | | Trust Wallet | ✅ Step-by-step setup | ✅ Security best practices | ✅ High contrast UI | | MetaMask | ✅ Interactive tutorial | ✅ Private key education | ✅ Clear transaction buttons |
📌 Key Insight: BlueWallet lacks guided setup and accessibility enhancements, making it harder for beginners.
📌 User Persona
To better understand the users facing onboarding challenges, I developed a persona based on research and usability testing.
🔹 Persona 1: Alex Carter (Bitcoin Beginner & Investor)
👤 Profile: - Age: 28 - Occupation: Freelance Digital Marketer - Tech Knowledge: Moderate - Familiar with online transactions, new to Bitcoin) - Pain Points: - Finds Bitcoin wallets confusing. - - Doesnʼt understand seed phrases & security features. - - Worried about losing funds due to a lack of clarity in transactions.
📌 Needs: ✅ A simple, guided wallet setup. ✅ Clear explanations of security terms (without jargon). ✅ Easy-to-locate Send/Receive buttons.
📌 Persona Usage in Case Study: - Helps define who we are designing for. - Guides design decisions by focusing on user needs.
🔹 Persona 2: Sarah Mitchell (Accessibility Advocate & Tech Enthusiast)
👤 Profile: - Age: 35 - Occupation: UX Researcher & Accessibility Consultant - Tech Knowledge: High (Uses Bitcoin but struggles with accessibility barriers)
📌 Pain Points: ❌ Struggles with small font sizes & low contrast. ❌ Finds the UI difficult to navigate with a screen reader. ❌ Confused by identical-looking transaction buttons.
📌 Needs: ✅ A high-contrast UI that meets WCAG accessibility standards. ✅ Larger fonts & scalable UI elements for better readability. ✅ Keyboard & screen reader-friendly navigation for seamless interaction.
📌 Why This Persona Matters: - Represents users with visual impairments who rely on accessible design. - Ensures the design accommodates inclusive UX principles.
4️⃣ UX/UI Solutions & Design Improvements
📌 Before (Current Issues)
❌ Users land directly on the wallet screen with no instructions. ❌ "Send" & "Receive" buttons look identical , causing transaction confusion. ❌ Small fonts & low contrast reduce readability.
✅ After (Proposed Fixes)
✅ Step-by-step onboarding explaining wallet creation, security, and transactions. ✅ Visually distinct transaction buttons (color and icon changes). ✅ WCAG-compliant text contrast & larger fonts for better readability.
1️⃣ Redesigned Onboarding Flow
✅ Added a progress indicator so users see where they are in setup. ✅ Used plain, non-technical language to explain wallet creation & security. ✅ Introduced a "Learn More" button to educate users on security.
2️⃣ Accessibility Enhancements
✅ Increased contrast ratio for better text readability. ✅ Used larger fonts & scalable UI elements. ✅ Ensured screen reader compatibility (VoiceOver & TalkBack support).
3️⃣ Transaction Flow Optimization
✅ Redesigned "Send" & "Receive" buttons for clear distinction. ✅ Added clearer icons & tooltips for transaction steps.
5️⃣ Wireframes & Design Improvements:
🔹 Welcome Screen (First Screen When User Opens Wallet)
📌 Goal: Give a brief introduction & set user expectations
✅ App logo + short tagline (e.g., "Secure, Simple, Self-Custody Bitcoin Wallet") ✅ 1-2 line explanation of what BlueWallet is (e.g., "Your gateway to managing Bitcoin securely.") ✅ "Get Started" button → Le ads to next step: Wallet Setup ✅ "Already have a wallet?" → Import option
🔹 Example UI Elements: - BlueWallet Logo - Title: "Welcome to BlueWallet" - Subtitle: "Easily store, send, and receive Bitcoin." - CTA: "Get Started" (Primary) | "Import Wallet" (Secondary)
🔹 Screen 2: Choose Wallet Type (New or Import)
📌 Goal: Let users decide how to proceed
✅ Two clear options: - Create a New Wallet (For first-time users) - Import Existing Wallet (For users with a backup phrase) ✅ Brief explanation of each option 🔹 Example UI Elements: - Title: "How do you want to start?" - Buttons:** "Create New Wallet" | "Import Wallet"
🔹 Screen 3: Security & Seed Phrase Setup (Critical Step)
📌 Goal: Educate users about wallet security & backups
✅ Explain why seed phrases are important ✅ Clear step-by-step instructions on writing down & storing the phrase ✅ Warning: "If you lose your recovery phrase, you lose access to your wallet." ✅ CTA: "Generate Seed Phrase" → Next step
🔹 Example UI Elements: - Title: "Secure Your Wallet" - Subtitle: "Your seed phrase is the key to your Bitcoin. Keep it safe!" - Button: "Generate Seed Phrase"
🔹 Screen 4: Seed Phrase Display & Confirmation
📌 Goal: Ensure users write down the phrase correctly
✅ Display 12- or 24-word seed phrase ✅ “I have written it downˮ checkbox before proceeding ✅ Next screen: Verify seed phrase (drag & drop, re-enter some words)
🔹 Example UI Elements: - Title: "Write Down Your Seed Phrase" - List of 12/24 Words (Hidden by Default) - Checkbox: "I have safely stored my phrase" - Button: "Continue"
🔹 Screen 5: Wallet Ready! (Final Step)
📌 Goal: Confirm setup & guide users on next actions
✅ Success message ("Your wallet is ready!") ✅ Encourage first action: - “Receive Bitcoinˮ → Show wallet address - “Send Bitcoinˮ → Walkthrough on making transactions
✅ Short explainer: Where to find the Send/Receive buttons
🔹 Example UI Elements: - Title: "You're All Set!" - Subtitle: "Start using BlueWallet now." - Buttons: "Receive Bitcoin" | "View Wallet"
5️⃣ Prototype & User Testing Results
🔹 Created an interactive prototype in Figma to test the new experience. 🔹 User Testing Results: ✅ 40% faster onboarding completion time. ✅ 90% of users found transaction buttons clearer. 🔹 User Feedback: ✅ “Now I understand the security steps clearly.ˮ ✅ “The buttons are easier to find and use.ˮ
6️⃣ Why This Matters: Key Takeaways
📌 Impact of These UX/UI Changes: ✅ Reduced user frustration by providing a step-by-step onboarding guide. ✅ Improved accessibility , making the wallet usable for all. ✅ More intuitive transactions , reducing errors.
7️⃣ Direct link to figma file and Prototype
Original PDF available from here
originally posted at https://stacker.news/items/928822
-
@ 8671a6e5:f88194d1
2025-03-29 17:58:33A flash of inspiration
Sometimes the mind takes you to strange places. The other day, I stumbled across Madonna’s “Vogue” video, you know “strike a pose” and all that jazz, and it got me thinking. Not about her music (which, let’s be honest, hasn’t aged as gracefully as her PR team might hope), but about Michael Saylor and Bitcoin.
Bear with me here, there’s a connection there. Madonna built an empire and her iconic name on catchy tunes and reinvention, even if her catalog feels a bit thin these days. Saylor? He’s doing something similar—taking an old act, dusting it off, and teaching it a new trick. Only instead of a microphone, he’s wielding Bitcoin, and Wall Street’s playing the role of the music industry, propping up the star despite a shaky back catalog (his initial business software).
Old school meets new moves
Think of Saylor as that veteran artist who’s been around for a few decades and think of bitcoin as a new style of music, a genre or a gimmick that’s popular with the kids. Old music stars sooner or later pick up on that, and even bring people in to do a cross-over song, a mix or god forbid, a duet.
MicroStrategy, his software company, was never a top hit scoring machine. More of a album full of B-sides that faded into obscurity (for those who don’t know, look up what a B-side song was). But then he stumbled onto Bitcoin, the shiny new genre that’s got the attention and attracted people because of the underlying asset (our tunes are here to stay).
It’s not just a pivot; it’s a reinvention. Like an aging pop star learning to rap, Saylor’s taken his old-school business and remixed it into something attracting a decent audience at conferences for example. Like Madonna or the former Prince fulling arenas. He’s voguing alright; with bold moves, big loans, the support of his own music industry and a spotlight for his (sometimes Madonna lyrics like) ramblings.
The Saylor trick: a ray of light on bitcoin
Here’s the play: Saylor’s turned MicroStrategy into a Bitcoin hoarding machine. Forget software licenses; his game is borrowing billions—through corporate bonds and stock sales, only to buy and hold Bitcoin. Bitcoin will outshine gold, bonds, even the S&P 500, Saylor says. It’s a gamble, an honorable one if you’re a bitcoiner, but it’s dressed up as a vision, and it’s got a self-fulfilling prophecy in it. Not only that, such a prophecy can only fully come to fruition if he’s not the only buyer of last resort of any significance. A music industry isn’t a real industry if there was only Madonna dancing on stage as the only mainstream artist.
We had Prince, Michael Jackson, Taylor Swift, Bruno Mars or Dua Lipa and hundreds of other artists over time, vying for your money, attention span, and streaming minutes. The more Strategy buys, the more the Bitcoin crowd cheers, the higher the price climbs, and the more attention he gets. Speaking gigs, headlines, cult status—it’s a win-win, at least on paper. Strike the pose, indeed.
The McDonald’s trick: value under the surface
It’s not the first time Michael Saylro remixes a tape from another artist so to speak. Let’s pivot to McDonald’s for a second, because there’s a parallel here. You think Big Macs when you think McDonald’s, but their real value hustle is actually real estate.
They own prime land, lease it to franchisees, and rake in rent—billions of it. The burgers? Just a tasty front for a property empire. Saylor’s pulling a similar move, but instead of buildings, his asset is Bitcoin. MicroStrategy’s software gig is the fries on the side — nice to have, but not the main course. He’s borrowing against the future value of BTC, betting it’ll keep climbing, just like McDonald’s banks on steady foot traffic and picking strategic (pun intended) locations. The difference? McDonald’s has a fallback if real estate tanks. Saylor’s all-in on bitcoin. (So far so good, if there’s one thing to go all-in on, it’s bitcoin anyway). That on itself is not an issue. But it’s important to know that the “location” is the asset for some while bitcoin is the “asset” for Strategy. Mc Donald’s assets are easy to spot: there are restaurants all over the place. Madonna’s concerts are also easy to spot: they sell out arenas left and right. Strategy’s bitcoin asset is less easy to spot, as we can’t see them, neither can we verify them. More on that later.
The hybrid star: Madonna meets McDonald’s
So, picture this: Saylor’s a cross between Madonna and a fast-food landlord. He’s the aging music icon who’s learned a flashy new dance, but underneath the glitter, he’s running a McDonald’s-style value play. It’s brilliant, in a way. Bitcoin’s scarcity fuels the hype, and his borrowing keeps the show on the road. Madonna’s legacy still sells records her name holds value, and McDonald’s can lean on its food business and brand, if the property game stumbles they can easily pivot back to basics and earn like they’ve always done on selling food and franchise income/licensing. Saylor? His software arm’s is rather dismal. If Bitcoin falters, there’s no encore that can him.a flash of inspiration
Sometimes the mind takes you to strange places. The other day, I stumbled across Madonna’s “Vogue” video, you know “strike a pose” and all that jazz, and it got me thinking. Not about her music (which, let’s be honest, hasn’t aged as gracefully as her PR team might hope), but about Michael Saylor and Bitcoin.\ \ Bear with me here, there’s a connection there. Madonna built an empire and her iconic name on catchy tunes and reinvention, even if her catalog feels a bit thin these days.\ Saylor? He’s doing something similar—taking an old act, dusting it off, and teaching it a new trick. Only instead of a microphone, he’s wielding Bitcoin, and Wall Street’s playing the role of the music industry, propping up the star despite a shaky back catalog (his initial business software).
Old school meets new moves
Think of Saylor as that veteran artist who’s been around for a few decades and think of bitcoin as a new style of music, a genre or a gimmick that’s popular with the kids. Old music stars sooner or later pick up on that, and even bring people in to do a cross-over song, a mix or god forbid, a duet.
MicroStrategy, his software company, was never a top hit scoring machine. More of a album full of B-sides that faded into obscurity (for those who don’t know, look up what a B-side song was).\ But then he stumbled onto Bitcoin, the shiny new genre that’s got the attention and attracted people because of the underlying asset (our tunes are here to stay).\ \ It’s not just a pivot; it’s a reinvention. Like an aging pop star learning to rap, Saylor’s taken his old-school business and remixed it into something attracting a decent audience at conferences for example. Like Madonna or the former Prince fulling arenas.\ He’s voguing alright; with bold moves, big loans, the support of his own music industry and a spotlight for his (sometimes Madonna lyrics like) ramblings.
*The Saylor trick: a ray of light on bitcoin* \ Here’s the play: Saylor’s turned MicroStrategy into a Bitcoin hoarding machine. Forget software licenses; his game is borrowing billions—through corporate bonds and stock sales, only to buy and hold Bitcoin. Bitcoin will outshine gold, bonds, even the S&P 500, Saylor says.\ It’s a gamble, an honorable one if you’re a bitcoiner, but it’s dressed up as a vision, and it’s got a self-fulfilling prophecy in it. Not only that, such a prophecy can only fully come to fruition if he’s not the only buyer of last resort of any significance. A music industry isn’t a real industry if there was only Madonna dancing on stage as the only mainstream artist.\ \ We had Prince, Michael Jackson, Taylor Swift, Bruno Mars or Dua Lipa and hundreds of other artists over time, vying for your money, attention span, and streaming minutes.\ The more Strategy buys, the more the Bitcoin crowd cheers, the higher the price climbs, and the more attention he gets. Speaking gigs, headlines, cult status—it’s a win-win, at least on paper. Strike the pose, indeed.
*The McDonald’s trick: value under the surface* \ It’s not the first time Michael Saylro remixes a tape from another artist so to speak.\ Let’s pivot to McDonald’s for a second, because there’s a parallel here. You think Big Macs when you think McDonald’s, but their real value hustle is actually real estate.
They own prime land, lease it to franchisees, and rake in rent—billions of it. The burgers? Just a tasty front for a property empire. Saylor’s pulling a similar move, but instead of buildings, his asset is Bitcoin.\ MicroStrategy’s software gig is the fries on the side — nice to have, but not the main course. He’s borrowing against the future value of BTC, betting it’ll keep climbing, just like McDonald’s banks on steady foot traffic and picking strategic (pun intended) locations.\ The difference? McDonald’s has a fallback if real estate tanks. Saylor’s all-in on bitcoin. (So far so good, if there’s one thing to go all-in on, it’s bitcoin anyway). That on itself is not an issue. But it’s important to know that the “location” is the asset for some while bitcoin is the “asset” for Strategy.\ Mc Donald’s assets are easy to spot: there are restaurants all over the place. Madonna’s concerts are also easy to spot: they sell out arenas left and right.\ Strategy’s bitcoin asset is less easy to spot, as we can’t see them, neither can we verify them. More on that later.
The hybrid star: Madonna meets McDonald’s
So, picture this: Saylor’s a cross between Madonna and a fast-food landlord. He’s the aging music icon who’s learned a flashy new dance, but underneath the glitter, he’s running a McDonald’s-style value play.\ It’s brilliant, in a way. Bitcoin’s scarcity fuels the hype, and his borrowing keeps the show on the road.\ Madonna’s legacy still sells records her name holds value, and McDonald’s can lean on its food business and brand, if the property game stumbles they can easily pivot back to basics and earn like they’ve always done on selling food and franchise income/licensing.\ Saylor? His software arm’s is rather dismal. If Bitcoin falters, there’s no encore that can him.
The music’s made in-house
Michael Saylor’s strategy with Strategy, is a bold, all-in bet on Bitcoin as the ultimate store of value. Essentially combining what Mc Donald’s does with the strong believe in bitcoin’s future (and fueling that believe with the fitting rhetoric).
It works like this: Since August 2020, Saylor’s company has been buying up more and more Bitcoin, making it their main asset instead of traditional cash or investments, and by March 2025, they own 506,137 BTC—worth about $42.8 billion (at $84,000 per Bitcoin). This, after spending $33.7 billion to buy it over time (DCA), including a massive 218887 BTC purchase late 2024 for $20.5 billion, giving them over 2.41% of all Bitcoin ever to exist (way more than companies like Marathon, Coinbase, Tesla or Riot).
To pull this off, they’ve borrowed heavily: owing $7.2 billion, mostly to Wall Street investors through special IOUs1 called convertible notes, which don’t need to be paid back until 2027, through 2029. These can either be settled with cash or swapped for Strategy stock. (there lies one of the main issues in my opinion, as the main asset’s price in USD is directly impacting the stock price of MSTR). A small example of this repeated correlation happened on March 28, 2025 when Strategy’s stock (MSTR) dropped 10.8% from $324.59 to $289.41, which was mirroring Bitcoin’s move down from $85,000 to $82,000 earlier.
This debt they have can be called “risky” by any stretch, with a high leverage rate of 39-40%, meaning they’ve borrowed a big chunk compared to what they own outright, but here’s the genius of it: they don’t have to sell their Bitcoin if its price drops, and they can refinance (borrow more later) to keep the dance going. As long as they find investors willing to bet on the later bitcoin price surge, but more importantly, as long as the song is liked by the new audience. If Michael Saylor is our “Madonna”, then there’s still not Taylor Swift or Rihanna in sight.
The creditors (big players, not banks) win if Bitcoin soars, as Strategy’s huge stash (potentially 2.9%+ of the market) nets them massive profits, or even if it crashes, they’re still in the game with other ways to make profit (not on bitcoin), since they can afford the risk. If someone is willing to bet 4 to 8 billion dollars, they’re probably not spooked by losing it all. More so, these Wall Streat people in the correct entourage, can probably afford such a gamble, and can stomach to lose it all if something goes horribly wrong as well, instead of risking being left out of a growing market. But since they’re probably the same people steering and “owning” the USD market anyway, they’re just conquering positions in a new market. The fact that they’re not real bitcoin-ethos people, but just “suits” in finance, can make the suspicious bitcoiners watching all of this unfold, even more uneasy.
So, Strategy sits on $44 billion in Bitcoin with just $7.2 billion in debt, voguing confidently. And Saylor’s betting the song never gets old, he’ll do the B-sides and re-mastering his old albums if necessary, but if Bitcoin’s value ever fades (for whatever reason), the real question is how long they can keep striking poses before the music stops. Remember: all money (fiat, gold, silver, bitcoin, nicely made papers) is a matter of trust.
As I have trust in bitcoin itself, but not so much in Strategy, I’ve take some precautions. I've started my own sort of "Strategy crash fund", with fiat money that only will come into action when strategy is done. The crash that we'll see after that goes down, will be such a tremendous opportunity, that I'll pour in some more fiat, gladly, and that will be the exact moment I will actually “sell all my chairs” (from Saylor’s well-known quote).
Purchases
Strategy’s Bitcoin purchases, don’t seem to jolt the market much either, no matter the size of the order. They always have the same sound: “it’s OTC, it doesn’t impact the market that much”.
Still, it’s strange to see: no one has ever come forward to tell anyone “I’ve sold 15000 bitcoin from my old stack to Saylor”, neither do we see any clear evidence and on-chain moves.
Take their first buy in August 2020 for example. Totaling 21454 BTC for $250 million at $11,652 per BTC; Bitcoin sat at $11,500 to $11,700 so barely moved, inching to $12,000 weeks later due to broader trends.
Same story in December 2020 with 29646 BTC for $650 million, there, the price hopped from $19,000 to $23,000, but a bull market was already raging. Fast forward to February 2021 (19452 BTC, for $1.026 billion (!)), March 2024 (9245 BTC, $623 million), November 2024 (55500 BTC, $5.4 billion), and March 2025 (6911 BTC, $584.1 million)
Bitcoin wobbled 2-15%, but always in line with existing momentum, not Strategy’s announcements. Their biggest buy, for a total of $5.4 billion (!) is just 0.3% of Bitcoin’s $1.7 trillion market cap, it’s too small to register as a blip even. But compared to the liquidity on the market and the “availability” on the OTC market, it should. More so, OTC bitcoin is announced as “for sale” somehow. A person with +25000 bitcoin is not standing on the side of the street yelling “hey man, wanna buy some bitcoin?”. There are specialized firms doing that for them, and making these available. This date is also used by some insiders and people who know this very small market (there aren’t that many bitcoiners sitting on such an amount after 2024 I guess). Data from Binance OTC, Coinspaid, kraken OTC, is highly private of course, but still, anything being sold over there, to Strategy or anyone else, would take larger amounts off the open market and the OTC market, making a price impact, certainly withing 2 years, as Bitcoin mining companies sit on an average buffer of 6 months depending on market conditions.
Strategy funds all of this by selling shares (diluting the pool big-time) or issuing convertible notes, and while SEC filings make faking these buys near-impossible. And even if Saylor is the Bitcoin version of Bernie Madoff, he could get away with it, if enough people "in the know" are willing to support this way of infesting (and investing in) the bitcoin economy. This would have to be a clear orchestrated attack on bitcoin, purely on the financial level then.
I don't believe this to be the case, but mathematically we have to take it into account as a very slight possibility.
After all, a company like "WorldCom"2 managed to scam their way out of different audits for years, until the scheme got bust and a enormous amount of investors lost their money after their CEO went to jail3 for exchange fraud.
I believe this could be the case with Strategy, but I give it a 3% chance (this might be low, but it's there, we can't outright dismiss the possibility).
Water in the wine
Strategy has also massively diluted its stock to fund Bitcoin buys, jumping from 10 million shares in 2020 to about 285 million by March 2025—a 2,750% increase, this happened after raising $4.25 billion from 2020 onwards and $20 billion of their $42 billion "21/21 Plan" by early 2025.
After the 10-for-1 stock split in August 2024, the number of MSTR shares grew from 16.5 million in 2023 to 284898 by end of 2024, a 1625% rise !!!. Add to that about 275 million more shares added in total (including 120 million in 2024 alone) and 1.975 million extra in March 2025 for $592.6 million.
So more and more tap water is poured in the wine, and it means each share’s ownership slice shrinks as new shares flood in, mostly via "at-the-market" sales and convertible note conversions. This is partly offset by share splits, but still, the rise in the number of stock is significant, and a big factor in evaluating MSTR.
In December 2024, they proposed hiking authorized shares to 10.33 billion (plus 1 billion preferred), approved in January 2025, setting the stage for even more if they keep selling.
The trend is clear: relentless selling. They might say “we never sell bitcoin”, but the same doesn’t count for their shares… which derive their value from bitcoin’s fiat price. So shareholders are betting on Bitcoin’s rise to offset the watering down of the share they hold. The more you think of it, the more ludicrous it sounds. It’s a loop of trust where the stock itself can only thrive if the company itself is an active, useful middleman. And so far, it’s only doing so for other Wall street companies, the biggest holders of MSTR shares:
Vanguard Group Inc, BlackRock, Capital International Investors, Jane Street Group, Susquehanna International Group
This on itself is also “normal” of course. In the flow of things. Like every aspect by itself in the whole Strategy setup is just normal. But combining all the factors makes it look a bit more… suspicious to me.
Supporting bitcoin ?
The real head-scratcher comes next: their secrecy and lack of community involvement. Strategy claims to hold 506137 BTC, likely cold-stored with partners like BitGo or Coinbase Custody, but no public wallet addresses back these claims up. Odd for a firm swearing never to sell.
There’s also the real risk that these partners are partly selling paper bitcoin (bitcoin they don't hold the keys to, or "promised" bitcoin) to Strategy, and that they just assume everything is audited and OK.
We can't estimate that, since we don't have any public MicroStrategy addresses or other ways to look at their holdings. This is for security reasons apparently, which raises another question: If they for example would show 300k+ BTC on-chain as proof, it’d boost trust, yet they don’t, hinting at a bigger play — maybe as a Wall Street-backed buyer of last resort for a new asset class.
Also Strategy’s software business and bitcoin “apps” (like the super simple Lightning email integration, and an on-chain digital ID system) is underwhelming to say the least (I literally know people that code such stuff on a free afternoon while they’re cooking dinner).
Their very minimal software innovation for the Bitcoin space, with basic Lightning features and an on-chain ID system, failing their their valuation as a 'Bitcoin company' in my opinion. More so, their business is ignoring the other innovation that would help bitcoin thrive. This is kind of a red flag for me. Why would a company sitting on +500 k bitcoin be hesitant about supporting the bitcoin eco-system more actively? They sure have the funds to do so, right? And they also have the right insights, info and spirit. Yet, they don’t.
They don’t fund developers for open-source projects, or Bitcoin’s growth in general (not publicly at least). So Saylor shines in talks, hyping Bitcoin’s future and Strategy’s stock, but it’s all the self fulfilling prophecy.
No grants, no real support for the community they lean on. It’s like they’re dancing to Bitcoin’s mixtape, raking in the spotlight, while giving little back. All the while some extremely needed projects lack funding, and most software companies in bitcoin who wish to innovate are begging and scraping funds together, in order to stay afloat. Something’s not ok with that. I can’t understand a company with that much power and money being part of this movement and loving bitcoin, while not actively supporting the development or the maintainers of the bitcoin software. (and yes, to keep their independence it’s best to keep it that way, that’s also an argument, but even then, giving out a grant to anyone that’s crucial in this industry, might help the whole ecosystem).
The show must go on—for now
The whole Strategy setup feels more and more like a performance to me. Saylor’s the star, doing the moves and Wall Street’s the record label, and we’re the audience, captivated by the spectacle and paying to see the show on occasion.
The suits keep funding him (free money, IOUs), just like the music industry props up a fading diva with a limited repertoire or drags a new star from her home studio on YouTube into the spotlights. H Saylor’s 21/21 Plan to the amount of $42 billion to snatch up more Bitcoin can be a grand finale that’s dazzling while the lights stay on.
Prediction: the music stops eventually
Here’s my take: Bitcoin will keep rising over a long period of time, and Saylor’s gambit will look like a genius move, until it doesn’t. All it takes is one big shot in Wall Street to find another shiny toy to play with, or another play to get their money working. The billions they’ve invested, will come back eventually, and if it doesn’t, it will mean the world has changed in their advantage as well in another way. Some people cannot lose, no matter what. Saylor’s now part of that, doing their bidding and doing his part for educating the other businesses.
He’s the only big buyer of last resort in this game so far. No one else is piling in with billions like he is. When the hype cools or the debt catches up, he’s got no real business to fall back on. The software? A relic. The Bitcoin bet can save him if the time is right, we’ll see about that. Time is his enemy not ally, and it always wins in the end. The pose can only hold so long. You can’t keep scoring free fiat, without either die on low valuation and dilution, or without at least 20 other Strategy-grade businesses jumping in to take their piece of the pie. So far, surprisingly, none of these two things happen. He keeps getting free fiat from Wall Street investors, and no other Saylor stands up. This can’t last forever. One of the two will happen by end of 2025.
Curtain call
Saylor’s a fascinating watch, a mix of investor-backed bravado, brains, and borrowed billions. Is it a masterstroke or a bitcoin version of Worldcom? I’m not sure. In any case, I would only invest in MSTR myself if the company has a real added value for bitcoin development and the bitcoin ecosystem. They could be the engine, the spirit, the core of bitcoin. Yet they’re just doing the poses. Let your body move to the rhythm.
AVB
If you like : tip here / other writings
1 https://en.wikipedia.org/wiki/IOU
2 https://sc.edu/about/offices_and_divisions/audit_and_advisory_services/about/news/2021/worldcom_scandal.php
3 https://content.next.westlaw.com/Document/Ic6b4dd91644311dbbe1cf2d29fe2afe6/View/FullText.html?transitionType=Default&contextData=(sc.Default)#:\~:text=Rep.-,6,Criminal%20ChargesThe music’s made in-house
Michael Saylor’s strategy with Strategy, is a bold, all-in bet on Bitcoin as the ultimate store of value. Essentially combining what Mc Donald’s does with the strong believe in bitcoin’s future (and fueling that believe with the fitting rhetoric).\ \ It works like this: Since August 2020, Saylor’s company has been buying up more and more Bitcoin, making it their main asset instead of traditional cash or investments, and by March 2025, they own 506,137 BTC—worth about $42.8 billion (at $84,000 per Bitcoin).\ This, after spending $33.7 billion to buy it over time (DCA), including a massive 218887 BTC purchase late 2024 for $20.5 billion, giving them over 2.41% of all Bitcoin ever to exist (way more than companies like Marathon, Coinbase, Tesla or Riot).\ \ To pull this off, they’ve borrowed heavily: owing $7.2 billion, mostly to Wall Street investors through special IOUs1 called convertible notes, which don’t need to be paid back until 2027, through 2029. These can either be settled with cash or swapped for Strategy stock. (there lies one of the main issues in my opinion, as the main asset’s price in USD is directly impacting the stock price of MSTR).\ A small example of this repeated correlation happened on March 28, 2025 when Strategy’s stock (MSTR) dropped 10.8% from $324.59 to $289.41, which was mirroring Bitcoin’s move down from $85,000 to $82,000 earlier.
This debt they have can be called “risky” by any stretch, with a high leverage rate of 39-40%, meaning they’ve borrowed a big chunk compared to what they own outright, but here’s the genius of it: they don’t have to sell their Bitcoin if its price drops, and they can refinance (borrow more later) to keep the dance going. As long as they find investors willing to bet on the later bitcoin price surge, but more importantly, as long as the song is liked by the new audience. If Michael Saylor is our “Madonna”, then there’s still not Taylor Swift or Rihanna in sight.
The creditors (big players, not banks) win if Bitcoin soars, as Strategy’s huge stash (potentially 2.9%+ of the market) nets them massive profits, or even if it crashes, they’re still in the game with other ways to make profit (not on bitcoin), since they can afford the risk. If someone is willing to bet 4 to 8 billion dollars, they’re probably not spooked by losing it all. More so, these Wall Streat people in the correct entourage, can probably afford such a gamble, and can stomach to lose it all if something goes horribly wrong as well, instead of risking being left out of a growing market. But since they’re probably the same people steering and “owning” the USD market anyway, they’re just conquering positions in a new market. The fact that they’re not real bitcoin-ethos people, but just “suits” in finance, can make the suspicious bitcoiners watching all of this unfold, even more uneasy.\ \ So, Strategy sits on $44 billion in Bitcoin with just $7.2 billion in debt, voguing confidently. And Saylor’s betting the song never gets old, he’ll do the B-sides and re-mastering his old albums if necessary, but if Bitcoin’s value ever fades (for whatever reason), the real question is how long they can keep striking poses before the music stops. Remember: all money (fiat, gold, silver, bitcoin, nicely made papers) is a matter of trust.
As I have trust in bitcoin itself, but not so much in Strategy, I’ve take some precautions.\ I've started my own sort of "Strategy crash fund", with fiat money that only will come into action when strategy is done. The crash that we'll see after that goes down, will be such a tremendous opportunity, that I'll pour in some more fiat, gladly, and that will be the exact moment I will actually “sell all my chairs” (from Saylor’s well-known quote).
Purchases
Strategy’s Bitcoin purchases, don’t seem to jolt the market much either, no matter the size of the order. They always have the same sound: “it’s OTC, it doesn’t impact the market that much”.\ \ Still, it’s strange to see: no one has ever come forward to tell anyone “I’ve sold 15000 bitcoin from my old stack to Saylor”, neither do we see any clear evidence and on-chain moves.\ \ Take their first buy in August 2020 for example. Totaling 21454 BTC for $250 million at $11,652 per BTC; Bitcoin sat at $11,500 to $11,700 so barely moved, inching to $12,000 weeks later due to broader trends.
Same story in December 2020 with 29646 BTC for $650 million, there, the price hopped from $19,000 to $23,000, but a bull market was already raging.\ Fast forward to February 2021 (19452 BTC, for $1.026 billion (!)), March 2024 (9245 BTC, $623 million), November 2024 (55500 BTC, $5.4 billion), and March 2025 (6911 BTC, $584.1 million)\ \ Bitcoin wobbled 2-15%, but always in line with existing momentum, not Strategy’s announcements. Their biggest buy, for a total of $5.4 billion (!) is just 0.3% of Bitcoin’s $1.7 trillion market cap, it’s too small to register as a blip even. But compared to the liquidity on the market and the “availability” on the OTC market, it should.\ More so, OTC bitcoin is announced as “for sale” somehow. A person with +25000 bitcoin is not standing on the side of the street yelling “hey man, wanna buy some bitcoin?”. There are specialized firms doing that for them, and making these available. This date is also used by some insiders and people who know this very small market (there aren’t that many bitcoiners sitting on such an amount after 2024 I guess). Data from Binance OTC, Coinspaid, kraken OTC, is highly private of course, but still, anything being sold over there, to Strategy or anyone else, would take larger amounts off the open market and the OTC market, making a price impact, certainly withing 2 years, as Bitcoin mining companies sit on an average buffer of 6 months depending on market conditions.\ \ Strategy funds all of this by selling shares (diluting the pool big-time) or issuing convertible notes, and while SEC filings make faking these buys near-impossible. And even if Saylor is the Bitcoin version of Bernie Madoff, he could get away with it, if enough people "in the know" are willing to support this way of infesting (and investing in) the bitcoin economy. This would have to be a clear orchestrated attack on bitcoin, purely on the financial level then.
I don't believe this to be the case, but mathematically we have to take it into account as a very slight possibility.
After all, a company like "WorldCom"2 managed to scam their way out of different audits for years, until the scheme got bust and a enormous amount of investors lost their money after their CEO went to jail3 for exchange fraud.
I believe this could be the case with Strategy, but I give it a 3% chance (this might be low, but it's there, we can't outright dismiss the possibility).
Water in the wine
Strategy has also massively diluted its stock to fund Bitcoin buys, jumping from 10 million shares in 2020 to about 285 million by March 2025—a 2,750% increase, this happened after raising $4.25 billion from 2020 onwards and $20 billion of their $42 billion "21/21 Plan" by early 2025.\ \ After the 10-for-1 stock split in August 2024, the number of MSTR shares grew from 16.5 million in 2023 to 284898 by end of 2024, a 1625% rise !!!. Add to that about 275 million more shares added in total (including 120 million in 2024 alone) and 1.975 million extra in March 2025 for $592.6 million.\ \ So more and more tap water is poured in the wine, and it means each share’s ownership slice shrinks as new shares flood in, mostly via "at-the-market" sales and convertible note conversions.\ This is partly offset by share splits, but still, the rise in the number of stock is significant, and a big factor in evaluating MSTR.\ \ In December 2024, they proposed hiking authorized shares to 10.33 billion (plus 1 billion preferred), approved in January 2025, setting the stage for even more if they keep selling.\ \ The trend is clear: relentless selling.\ They might say “we never sell bitcoin”, but the same doesn’t count for their shares… which derive their value from bitcoin’s fiat price.\ So shareholders are betting on Bitcoin’s rise to offset the watering down of the share they hold. The more you think of it, the more ludicrous it sounds. It’s a loop of trust where the stock itself can only thrive if the company itself is an active, useful middleman.\ And so far, it’s only doing so for other Wall street companies, the biggest holders of MSTR shares:
Vanguard Group Inc, BlackRock, Capital International Investors, Jane Street Group, Susquehanna International Group\ \ This on itself is also “normal” of course. In the flow of things.\ Like every aspect by itself in the whole Strategy setup is just normal. But combining all the factors makes it look a bit more… suspicious to me.
Supporting bitcoin ?
The real head-scratcher comes next: their secrecy and lack of community involvement.\ Strategy claims to hold 506137 BTC, likely cold-stored with partners like BitGo or Coinbase Custody, but no public wallet addresses back these claims up. Odd for a firm swearing never to sell.
There’s also the real risk that these partners are partly selling paper bitcoin (bitcoin they don't hold the keys to, or "promised" bitcoin) to Strategy, and that they just assume everything is audited and OK.
We can't estimate that, since we don't have any public MicroStrategy addresses or other ways to look at their holdings. This is for security reasons apparently, which raises another question:\ If they for example would show 300k+ BTC on-chain as proof, it’d boost trust, yet they don’t, hinting at a bigger play — maybe as a Wall Street-backed buyer of last resort for a new asset class.
Also Strategy’s software business and bitcoin “apps” (like the super simple Lightning email integration, and an on-chain digital ID system) is underwhelming to say the least (I literally know people that code such stuff on a free afternoon while they’re cooking dinner).
Their very minimal software innovation for the Bitcoin space, with basic Lightning features and an on-chain ID system, failing their their valuation as a 'Bitcoin company' in my opinion. More so, their business is ignoring the other innovation that would help bitcoin thrive. This is kind of a red flag for me.\ Why would a company sitting on +500 k bitcoin be hesitant about supporting the bitcoin eco-system more actively? They sure have the funds to do so, right? And they also have the right insights, info and spirit.\ Yet, they don’t.\ \ They don’t fund developers for open-source projects, or Bitcoin’s growth in general (not publicly at least). So Saylor shines in talks, hyping Bitcoin’s future and Strategy’s stock, but it’s all the self fulfilling prophecy.\ \ No grants, no real support for the community they lean on.\ It’s like they’re dancing to Bitcoin’s mixtape, raking in the spotlight, while giving little back. All the while some extremely needed projects lack funding, and most software companies in bitcoin who wish to innovate are begging and scraping funds together, in order to stay afloat.\ Something’s not ok with that.\ I can’t understand a company with that much power and money being part of this movement and loving bitcoin, while not actively supporting the development or the maintainers of the bitcoin software. (and yes, to keep their independence it’s best to keep it that way, that’s also an argument, but even then, giving out a grant to anyone that’s crucial in this industry, might help the whole ecosystem).
The show must go on—for now
The whole Strategy setup feels more and more like a performance to me. Saylor’s the star, doing the moves and Wall Street’s the record label, and we’re the audience, captivated by the spectacle and paying to see the show on occasion.\ \ The suits keep funding him (free money, IOUs), just like the music industry props up a fading diva with a limited repertoire or drags a new star from her home studio on YouTube into the spotlights. H\ Saylor’s 21/21 Plan to the amount of $42 billion to snatch up more Bitcoin can be a grand finale that’s dazzling while the lights stay on.
Prediction: the music stops eventually
Here’s my take: Bitcoin will keep rising over a long period of time, and Saylor’s gambit will look like a genius move, until it doesn’t. All it takes is one big shot in Wall Street to find another shiny toy to play with, or another play to get their money working. The billions they’ve invested, will come back eventually, and if it doesn’t, it will mean the world has changed in their advantage as well in another way. Some people cannot lose, no matter what. Saylor’s now part of that, doing their bidding and doing his part for educating the other businesses.\ \ He’s the only big buyer of last resort in this game so far. No one else is piling in with billions like he is. When the hype cools or the debt catches up, he’s got no real business to fall back on. The software? A relic. The Bitcoin bet can save him if the time is right, we’ll see about that.\ Time is his enemy not ally, and it always wins in the end. The pose can only hold so long. You can’t keep scoring free fiat, without either die on low valuation and dilution, or without at least 20 other Strategy-grade businesses jumping in to take their piece of the pie.\ So far, surprisingly, none of these two things happen.\ He keeps getting free fiat from Wall Street investors, and no other Saylor stands up.\ This can’t last forever. One of the two will happen by end of 2025.\ \ Curtain call
Saylor’s a fascinating watch, a mix of investor-backed bravado, brains, and borrowed billions.\ Is it a masterstroke or a bitcoin version of Worldcom?\ I’m not sure. In any case, I would only invest in MSTR myself if the company has a real added value for bitcoin development and the bitcoin ecosystem. They could be the engine, the spirit, the core of bitcoin.\ Yet they’re just doing the poses.\ Let your body move to the rhythm.
AVB
If you like : tip here / other writings
1 https://en.wikipedia.org/wiki/IOU
2 https://sc.edu/about/offices_and_divisions/audit_and_advisory_services/about/news/2021/worldcom_scandal.php
-
@ 57d1a264:69f1fee1
2025-03-29 17:15:17- Once activated, "Accept From Any Mint” is the default setting. This is the easiest way to get started, let's the user start acceptance Cashu ecash just out of the box.
- If someone does want to be selective, they can choose “Accept From Trusted Mints,” and that brings up a field where they can add specific mint URLs they trust.
- “Find a Mint” section on the right with a button links directly to bitcoinmints.com, already filtered for Cashu mints, so users can easily browse options.
- Mint info modal shows mint technical details stuff from the NUT06 spec. Since this is geared towards the more technical users I left the field names and NUT number as-is instead of trying to make it more semantic.
originally posted at https://stacker.news/items/928800
-
@ 30ceb64e:7f08bdf5
2025-03-30 00:37:54Hey Freaks,
RUNSTR is a motion tracking app built on top of nostr. The project is built by TheWildHustle and TheNostrDev Team. The project has been tinkered with for about 3 months, but development has picked up and its goals and direction have become much clearer.
In a previous post I mentioned that RUNSTR was looking to become a Nike Run Club or Strava competitor, offering users an open source community and privacy focused alternative to the centralized silos that we've become used to.
I normally ramble incoherently.....even in writing, but this is my attempt to communicate the project's goals and direction as we move forward.
This is where the project is now:
Core Features
- Run Tracker: Uses an algorithm which adjusts to your phone's location permissions and stores the data on your phone locally
- Stats: Stored locally on your phone with a basic profile screen so users can monitor calories burned during runs
- Nostr Feed: Made up of kind1 notes that contain #RUNSTR and other running related hashtags
- Music: Brought to you via a wavlake API, enabling your wavlake playlists and liked songs to be seen and played in the app
Current Roadmap
- Bugs and small improvements: Fixing known issues within the client
- zap.store release: Launching a bug bounty program after release
- Clubs: Enabling running organizations to create territories for events, challenges, rewards and competition
- Testflight: Opening up the app to iOS users (currently Android only)
- Modes: Adding functionality to switch between Running, Walking, or Cycling modes
Future Roadmap
- Requested Features: Implementing features requested by club managers to support virtual events and challenges
- Blossom: Giving power users the ability to upload their data to personal blossom servers
- NIP28: Making clubs interoperable with other group chat clients like 0xchat, Keychat, and Chachi Chat
- DVM's: Creating multiple feeds based on movement mode (e.g., Walking mode shows walkstr feed)
- NIP101e: Allowing users to create run records and store them on nostr relays
- Calories over relays: Using NIP89-like functionality for users to save calorie data on relays for use in other applications
- NIP60: Implementing automatic wallet creation for users to zap and get zapped within the app
In Conclusion
I've just barely begun this thing and it'll be an up and down journey trying to push it into existence. I think RUNSTR has the potential to highlight the other things that nostr has going for it, demonstrating the protocol's interoperability, flexing its permissionless identity piece, and offering an experience that gives users a glimpse into what is possible when shipping into a new paradigm. Although we build into an environment that often offers no solutions, you'd have to be a crazy person not to try.
https://github.com/HealthNoteLabs/Runstr/releases/tag/feed-0.1.0-20250329-210157
-
@ 42c85a20:14afbc38
2025-03-29 15:40:00Back when Twitter was censoring free speech nostr looked like the only alternative where people would migrate and grow the network; however, now that X is open to free thinking, the perfect storm to enable nostr to grow has been quelled.
How will the nostr universe ever expand unless people in the main stream "centralized" social medias see the light? The illusion of free speech on X is dangerous as people blindly give their trust that the rug will not be pulled; and willingly remain under a tyrannical system.
Perhaps there is some other utility which nostr would be useful for vs just another version of twillter; like exit polls for elections which could fail safe the integrity of voting; or community BBS (bulletin boards) where the people can connect with their neighbours without giving up their real address or identity.
When the main stream social medias' fail again; the next time they break the trust of the people, we must be ready to replace them; we must think outside the box now and build those decentralized utilities now.
-
@ ff517fbf:fde1561b
2025-03-29 15:37:34はじめに:なぜKYCなしP2P取引か
ビットコインは元々、ピア・ツー・ピア(P2P)の電子通貨システムとして設計されました。サトシ・ナカモトのビットコイン白書でも、「信頼ではなく暗号学的証明に基づく電子決済システム」によって、第三者を介さずに当事者同士が直接取引できることが必要だと述べられています。つまり、本来ビットコインは銀行などの仲介者なしで個人同士が直接送金・売買できる社会的意義を持っているのです。
しかし現在、多くの暗号資産取引所では規制上の理由からKYC(本人確認)手続きが求められ、個人情報の提出が必要です。KYCはユーザーのプライバシー喪失やデータ漏洩リスクにつながりかねず、また口座凍結や資金没収といった中央集権的管理のリスクもあります。経済的にも、第三者を介することで手数料が高くなったり、地域によっては銀行や政府の制限でビットコインの購入が困難になる場合もあります。
こうした背景からノンKYCのP2P取引プラットフォームを利用するメリットは大きいです。例えば HodlHodl(@npub1yul83qxn35u607er3m7039t6rddj06qezfagfqlfw4qk5z5slrfqu8ncdu) は、匿名で世界中のユーザーと直接ビットコインを売買できるグローバルなP2Pマーケットプレイスです。HodlHodlではユーザー同士が直接取引し、サイト運営側はビットコインを一切預かりません。取引はマルチシグエスクロー(2-of-3の多重署名契約)で安全に管理され、取引手数料も最大0.5%と低く抑えられています。プライバシーとセキュリティを確保しながら、銀行口座や身分証なしでビットコインを売買できるため、社会的にも経済的にも大きな意義があります。
本チュートリアルでは、HodlHodlを使ってビットコインを購入・販売する具体的な手順を分かりやすく解説します。また、HodlHodlの安全性(マルチシグエスクローによる非中央集権型の管理)や、他のプラットフォームにはない特徴(本人確認不要、ユーザー自身による鍵の管理、APIやレンディングサービスの活用など)についても説明します。P2P取引に不慣れで不安を感じている方にも安心してご利用いただけるよう、丁寧で親しみやすい言葉で案内していきます。
HodlHodlの基本準備
アカウント登録: HodlHodlの利用を開始するには、まず無料のアカウント登録を行います。必要なのはメールアドレスとパスワードだけで、ユーザー名や身分証の提出は不要です。登録後に届く確認メール内のリンクをクリックすれば、すぐに取引を始められます。
ビットコインウォレットの用意: HodlHodlは取引の際にユーザー自身のビットコインウォレットを使用するノンカストディアル方式です。プラットフォーム上にウォレットは用意されていないため、事前に自分のビットコインウォレットを準備してください。例えばモバイルウォレットやハードウェアウォレットなど、自分だけが秘密鍵を管理できるウォレットを用意しましょう。買い手の場合は購入したビットコインを受け取るウォレットが必要になり、売り手の場合は売却するビットコインを自身のウォレットからエスクローに送金する必要があります。
ビットコインを購入する方法(Buy BTC)
それでは、HodlHodlでビットコインを購入(Buy) する手順を見ていきましょう。以下では、日本円(JPY)を銀行振込で支払ってビットコインを買う例を想定して説明しますが、基本的な流れは他の通貨や支払い方法でも同じです。
-
「Buy BTC」をクリックする: HodlHodlにログインし、画面上部のヘッダー左側にある「Buy BTC」ボタンをクリックします。これにより、現在出ているビットコイン売り注文(オファー)の一覧ページに移動します。
-
検索フィルターの設定: オファー一覧ページでは、自分の希望条件でオファーを絞り込むことができます。国、法定通貨、取引タイプ、支払い方法、金額などのフィルター項目があります。例えば日本で銀行振込により購入したい場合、「Country(国)」をJapan、「Currency(通貨)」をJPY、「Payment method(支払い方法)」を Bank Transfer 銀行振込に設定します(他の項目は必要に応じて指定します)。フィルターは任意ですが、自分に合った支払い方法や金額範囲のオファーを探すのに役立ちます。
-
オファーを選ぶ: フィルターを適用すると、条件に合致する売り手のオファー一覧が表示されます。各オファーにはレート(価格)、取引可能額範囲、支払い方法、売り手の評価などが記載されています。希望に合うオファーが見つかったら、そのオファーの詳細をクリックします。例えば「1 BTC = 〇〇JPY」のようなレートで、自分が購入したい額に対応できるオファーを選びましょう。初めて取引する場合は、評価の高い売り手や少額からの取引を選ぶと安心です。
-
購入量と受取アドレスの入力: オファーをクリックすると、取引の詳細入力画面になります。ここで購入したいビットコインの量を入力します(ビットコイン量あるいは法定通貨換算額のどちらでも入力可能です)。多くの場合、最低・最大取引額が決まっているので、その範囲内で入力してください。また、ビットコインの受取先アドレスを求められます。これは購入後にビットコインを受け取る自分のウォレットアドレスです。アカウントの設定で事前に登録したアドレスがあれば自動で表示されますが、都度指定することも可能です。さらに、支払い方法が複数指定されているオファーでは希望の支払い方法を選択します(例:銀行振込の中でも特定の銀行を指定できる場合があります)。最後に、取引相手(売り手)への伝達メッセージ欄があれば、必要に応じてコメントを記入します。入力が完了したら内容を確認し、「Create contract(契約作成)」 的なボタンを押して取引を開始します。
-
エスクローアドレスの生成: 契約が作成されると、取引画面上にエスクロー(第三者保管用マルチシグアドレス)を生成するための手順が表示されます。ここで 「Generate escrow(エスクロー生成)」 ボタンをクリックし、プラットフォームに登録したペイメントパスワード(支払い用パスワード)を入力します。ペイメントパスワードはHodlHodlで取引の署名に使われる特別なパスワードで、初回取引時に設定しておく必要があります。正しく入力すると、この取引専用のビットコインエスクローアドレスが自動生成されます。あとは売り手がそのエスクローアドレスにビットコインを入金するのを待ちます。画面上に「waiting for deposit(入金待ち)」等のステータスが表示されるので、しばらく待機してください。売り手が約束のビットコイン額をエスクローに送金し、一定のブロック承認(Confirmations)が得られると、取引ステータスが自動で更新されます。
-
エスクロー入金の確認: ビットコインがマルチシグエスクローにロックされ、取引ステータスが「In progress(進行中)」や「Deposited(入金済み)」といった表示に変わったことを必ず確認します。ステータス表示とブロックチェーン上の確認回数が条件を満たしたら、支払いを実行しても安全な状態であることを意味します(エスクローにロックされたビットコインは売り手単独では動かせません。取引ページには売り手が指定した支払い詳細(銀行口座情報など)が記載されていますので、その指示に従って売り手へ法定通貨の支払い(振込)を行います。例えば銀行振込の場合、指定された口座にJPYを送金します。この段階では、必ず取引ページを開いたままにしておきましょう。 支払いが完了したら、取引ページ上の「I’ve sent the payment(送金完了)」ボタンをクリックして、売り手に支払い実行済みであることを通知します。併せて、チャット機能で支払い完了の旨を伝えると良いでしょう。
-
売り手によるビットコインのリリース: 買い手からの支払いが完了すると、売り手は自分の銀行口座等を確認して入金を検証します。売り手が入金を確認したら、取引ページ上で 「Release Bitcoin(ビットコインをリリース)」 ボタンを押し、ペイメントパスワードを入力してエスクローからビットコインを開放します。これにより、エスクロー上のビットコインが買い手の指定アドレス(先ほど入力した受取用ウォレットアドレス)に送信されます。売り手がビットコインをリリースすると取引ステータスが「Released(解放済み)」に変わり、まもなくブロックチェーン上で買い手のウォレットにビットコイン着金が確認できるでしょう。
-
取引完了: ビットコインが無事自分のウォレットに届けば取引完了です。取引ページには「Completed(完了)」などのステータスが表示され、双方がお互いを評価できるようになります。初めてのP2P購入、お疲れさまでした! 🎉
💡 重要な注意事項(買い手向け): エスクローにビットコインがロックされる前に代金を支払ってはいけません。必ず取引ステータスが「Deposited」や「In progress」になるのを確認してから支払いを実行してください。また、取引には売り手が入金を確認してからビットコインをリリースするまでの制限時間(Payment window)が設定されています。時間内に支払いが完了しないと取引が自動キャンセルされる場合がありますのでご注意ください。困ったことがあれば、取引ページのチャットで相手に連絡することもできます。万一、支払いを送ったのに売り手がビットコインをリリースしない場合は、支払い期限が過ぎてからディスピュート(紛争解決手続き) を開始することも可能です。
ビットコインを販売する方法(Sell BTC)
次に、HodlHodlでビットコインを販売(Sell) する手順を説明します。基本的な流れは購入時と似ていますが、立場が逆になる点(自分がビットコインをエスクローに預け、買い手からの支払いを待つ点)に注意してください。以下では、日本で銀行振込によりJPYを受け取ってビットコインを売る場合を例に解説します。
-
「Sell BTC」をクリックする: HodlHodlにログイン後、画面上部左側の「Sell BTC」ボタンをクリックします。これで現在出ているビットコイン買い注文(買い手のオファー)一覧ページに移動します。
-
検索フィルターの設定: 買い手オファー一覧から、自分が対応可能な条件のオファーを探します。フィルター項目はBuyの場合と同様で、国、通貨、支払いタイプ、支払い方法、金額などを指定できます。日本円での銀行振込を希望する買い手を探す場合、国をJapan、通貨をJPY、支払い方法をBank Transferに設定して検索します。
-
オファーを選ぶ: 条件に合致する買い手のオファーが一覧表示されるので、希望に合うものをクリックします。各オファーには買い手が希望するレートや取引限度額、支払い方法、買い手の評価などが記載されています。有利なレートかつ信頼できそうな相手を選びましょう。初取引で不安な場合は、小額で高評価の買い手から始めるとよいです。
-
売却量と受取情報の入力: オファー詳細画面で、売却したいビットコイン量を入力します(または必要な法定通貨額)。オファーごとに最低・最大額が設定されているので範囲内で入力してください。続いてビットコインの受取アドレス欄がありますが、これは取引完了時に買い手がビットコインを受け取るアドレスです。売り手である自分が入力する必要は基本的になく、買い手側が受取先を指定するか、既に買い手のダッシュボード設定で決まっています。次に、受け取りたい支払い方法が複数記載されている場合は希望の方法を選択します(例えば「Bank Transfer」の中でも特定の銀行名など)。コメント欄があれば取引相手(買い手)へのメッセージを任意で入力します。内容を確認し問題なければ 「Create contract(契約作成)」 ボタンを押して取引を開始します。
-
エスクローアドレスの生成: 契約が作成されると、エスクロー用のビットコインアドレスを生成する段階に進みます。ここで 「Generate escrow」 ボタンをクリックし、ペイメントパスワードを入力します(買い手の手順と同様)。これにより、この取引専用のマルチシグエスクローアドレスが発行されます。次に 自分(売り手)が売却予定のビットコインをエスクローアドレスに送金 します。取引画面上に正確なBTC額と対応するQRコードが表示されるので、自分のウォレットからそのアドレスへ送金してください。送金したら 「I’ve sent the funds(送金完了)」 ボタンを押してビットコインをエスクローに預けたことを通知します。
-
エスクローへのビットコインロック: ビットコインを送金するとブロックチェーン上で一定回数の承認(Confirmations)を経て、エスクローにロックされます。取引ステータスが「In progress(進行中)」や「Deposited」に変わり、買い手は安心して支払いを行える状態になります。あとは買い手からの法定通貨支払いを待ちます。取引画面で支払い期限(Payment window)内に買い手が支払いを完了し、「支払い送信済み」のボタンを押すとステータスが「Paid(支払い済み)」に変わります。
-
支払いの受領確認: ステータスが「Paid」になったら、買い手が送金を完了したことを意味します。すぐに自分の銀行口座など該当の支払い方法で入金を確認しましょう。金額が全額正しく受け取れたことを確認できたら、取引ページ上で 「Release deposit(デポジットを解放)」 ボタンをクリックし、ペイメントパスワードを入力してエスクローのビットコインを開放します。これにより、エスクローにロックされていたビットコインが買い手に送付されます。
-
取引完了: ビットコインをリリースすれば取引完了。ステータスが「Completed」に変わり、買い手は間もなく自分のウォレットでビットコインを受け取るでしょう。最後にお互いを評価して取引終了となります。初めてのP2P売却、お疲れさまでした! 🎉
💡 重要な注意事項(売り手向け): 支払いを受け取る前にビットコインをエスクローから**絶対にリリースしないでください。買い手からの入金を自分の銀行口座等で確実に確認できてから、ビットコインを解放するようにしましょう。また、もしビットコインをエスクローに送金した後で買い手から支払いが行われず期限切れ(Payment window経過)になった場合、取引をキャンセルしてエスクローのビットコインを自分に返還することができます。取引中は常に取引相手とのチャットで連絡を取り合い、不明点を確認するよう心がけましょう。
HodlHodlの安全性:マルチシグと非カストディアル設計
● マルチシグエスクローによる資金保護: HodlHodl最大の特徴は、2-of-3のマルチシグエスクロー(multisignature escrow)によって取引資金を保護している点です。取引が成立すると、自動的に3つの秘密鍵が関与するビットコインアドレスが生成されます。この3つの鍵のうち2つの署名があれば資金を動かせる仕組みになっており、鍵の配分は「売り手」「買い手」「HodlHodl運営」の三者にそれぞれ1つです。取引中、ビットコインはブロックチェーン上のエスクローアドレスにロックされ、双方の合意なしには動かせまん。つまり、売り手は買い手の同意なしにビットコインを引き出すことはできず、逆に買い手も売り手の協力なしにビットコインを入手することはできません。両者が取引を完了すれば売り手+買い手の2署名でリリースが可能となり、万一トラブルが起きた場合にはHodlHodl運営が仲裁役として(買い手または売り手の一方と協力し)2署名目を提供することで不正を防ぎます。このようにマルチシグ契約によって、詐欺や持ち逃げのリスクを最小限に抑え、安全かつ公平な取引が実現されています。
● 非カストディアル(ユーザー主導の資金管理): HodlHodlは取引プラットフォームでありながら、ユーザー資金を一切預からないという非カストディアル設計を貫いています。取引中のビットコインは常にマルチシグエスクローにあり、HodlHodl運営が単独で動かすことはできません。これはつまり、中央集権的な取引所とは異なり、HodlHodlがハッキング被害に遭ってもユーザーのビットコインが盗まれる心配がないことを意味します。またプラットフォームが万一ダウンしたりサービス提供を停止した場合でも、当事者間で2つの鍵さえあればエスクローのビットコインを取り戻すことが可能です(※この場合やや技術的な手順が必要になりますが、HodlHodlが完全に消失するケースでも資金はブロックチェーン上に安全に存在し続けます)。HodlHodl運営は3つの鍵のうち1つを保有するのみで、しかもそれは紛争時の仲裁に使うためのものです。通常の取引では運営が介在することなく、ユーザー同士で完結します。以上のように、HodlHodlはカストディアルな第三者を排除し、利用者自身が資金と取引の主導権を握るというビットコイン本来の精神に沿った安全設計となっています。
● 評判システムと取引履歴: HodlHodlでは、各ユーザーに公開の評価(Rating)と取引履歴が紐づいています。取引を完了するごとに互いにレビューを残せるため、他ユーザーの信頼度を事前に知ることができます。初めて取引する相手がどんな評価を受けているか、過去の取引回数や成功率などの情報を確認することで、怪しい相手を避けることが可能です。特に初心者のうちは評価の高い相手を選ぶ、もしくは身近に信頼できるユーザーがいればトラスト機能(他のP2Pプラットフォームでの実績を証明する仕組みや信用できるユーザーをお気に入り登録する機能)を活用すると良いでしょう。
● 二要素認証(2FA)と信頼できる端末: アカウントの不正アクセス対策として、HodlHodlは二段階認証(2FA)のオプションを提供しています。AuthyやGoogle Authenticatorと連携し、一度設定すればログイン時にパスワードに加え6桁のコード入力が求められるようになります。これにより、万一パスワードが漏洩しても本人のデバイスがなければログインできず、アカウントを保護できます。またTrusted Devices(信頼できる端末)機能を有効にすると、新しいデバイスからログインしようとした際にメール確認が必要となり、ユーザーの許可なく不審な端末からアクセスされるのを防ぎます。初心者の方でも、アカウント登録後は設定画面から2FAや信頼できる端末機能を有効化しておくことを強くおすすめします。
● ディスピュート(紛争解決)機能: 万が一取引相手との間でトラブルが発生した場合(例:買い手は支払ったと主張しているが売り手が確認できない等)、HodlHodlのプラットフォーム上でディスピュート(紛争)を開始することができます。ディスピュートが発生すると、HodlHodlのサポートチームが両者から事情を聞き、中立的な立場で問題解決に当たります。必要に応じて前述の運営のマルチシグ鍵を用いて適切な側にビットコインをリリースするなど、公平な裁定が行われます。ディスピュートは最終手段ではありますが、万一の場合の安心材料として覚えておいてください。
以上のように、HodlHodlは技術的・制度的な多層防御によってユーザーの資金と取引の安全を確保しています。他のユーザーの評価を確認する、取引手順を順守する(エスクロー未成立での送禁止等、アカウントのセキュリティ設定を有効にするといったユーザー自身の注意もあわせて心掛ければ、P2P取引でも安心してビットコインを利用できるでしょう。
HodlHodlの特徴:他プラットフォームとの違い
最後に、HodlHodlが他のビットコイン取引サービスと比べて優れている点、特徴的な点を整理します。初めて利用する際の不安解消にもつながるポイントです。
-
🌐 KYC不要の匿名取引: HodlHodl最大の特徴は、本人確認(KYC)なしでビットコイン取引ができる点です。メールアドレスさえあれば世界中誰でも利用開始でき、パスポートや身分証の提出は一切求められません。これはプライバシー保護の面で大きな利点ですし、取引履歴が本人名義に紐付かないため将来的な資産没収や口座凍結のリスクも低減します。規制が厳しい地域のユーザーや銀行口座を持てない人々でも、HodlHodlならビットコイン経済に参加しやすくなっています。
-
🔐 ユーザーが鍵を管理する非中央集権型取引: 前述の通り、HodlHodlはノンカストディアルなP2P取引所であり、ユーザー自身が資産の鍵を管理します。取引ごとにマルチシグのエスクローが生成され、利用者はその一方の鍵を保持します。そのため「取引所にビットコインを預けっぱなしにしていたらハッキングで失った」といった事態が起こりません。常に自身のウォレットから直接取引を行うため、ビットコインの自主管理の原則**が守られています。中央集権的な管理者がいない分、自分で秘密鍵を安全に保管する責任は伴いますが、その分だけ第三者リスクが排除された公平な環境と言えます。
-
💱 世界中の通貨と多様な決済方法に対応: HodlHodlはグローバルなプラットフォームであり、世界中のあらゆる法定通貨 で取引できます。現在100を超える国の通貨と地域が利用されており、取引に使える決済方法も100種類以上と非常に豊富です。銀行振込やオンライン決済サービスはもちろん、現金の対面受け渡しやギフトカード、電子マネー、モバイル送金、さらには商品と交換などユニークな方法までユーザーが自由にオファーを作成できます。これにより、自分の利用しやすい手段で取引相手を見つけられる柔軟性があります。他のプラットフォームだと対応通貨や決済手段が限定されがちですが、HodlHodlでは*「自分の条件でオファーを作成できる」 の強みです。
-
💰 低い手数料と透明な料金体系: HodlHodlの取引手数料は一律0.5%(買い手と売り手で折半で各0.25%ずつ負担)と比較的低コストです。しかも手数料は取引成立時にビットコイン額から自動控除される仕組みで、隠れたコストがありません。さらに紹介プログラムを利用すると0.45%に割引されるなどの優遇もあります。入出金に伴う手数料も基本的に存在せず、各自が使うウォレットの送金手数料以外に余計な負担はありません。他の取引所でありがちな「出金手数料が高額」「スプレッドが不透明」といった心配もなく、明朗会計でユーザーに優しい料金体系です。
-
🤝 初心者に優しいインターフェース: P2P取引というと難しそうな印象を持たれるかもしれませんが、HodlHodlのサイトはシンプルで直感的なインターフェースになっています。必要な操作は「Buy BTC / Sell BTC」ボタンから進んでフォームに入力していくだけで、画面の指示に沿って進めれば迷うことは少ないでしょう。サイトは現在ウェブブラウザ経由で利用しますが、スマートフォンのブラウザからでも見やすく設計されています。専用アプリはありませんが、その分アップデート時にもすぐ全員が最新機能を利用できます(ダウンロード不要で常に最新版が提供されるメリットです。また、取引画面にはリアルタイムのチャット機能があり、相手ユーザーと直接コミュニケーションを取れるため安心です。困ったときは相手に質問したり状況を確認できるので、言葉の壁がある場合でも定型文や翻訳を活用して意思疎通できます。
-
🛠 API提供による拡張性: HodlHodlは上級ユーザーや開発者向けに**公式APIを提供しています。APIを利用すると、自分のプログラムからHodlHodl上のオファー取得や契約作成、ステータス更新などを自動化することが可能です。例えば、マーケットメーカーとしてレートを自動調整したり、他のサービスと連携して複数のP2P取引所のオファーを比較表示する、といった応用ができます。APIキーはプロフィール設定から発行でき、ドキュメントも公開されているため高度な取引戦略を実装したいユーザーには魅力的な機能です。PaxfulやLocalBitcoinsなど一部他サービスでもAPIは提供されていますが、HodlHodlのAPIはエスクロー操作まで含め包括的にサポートしている点で強力です。
-
💳 ビットコインレンディングサービス: HodlHodlは現物取引だけでなく、ビットコイン担保のレンディング(貸借)プラットフォームも運営しています。サイト上部の「P2P Lending(レンディング)」からアクセスでき、ビットコインを担保にUSDTなど他の暗号資産を借りたり、あるいは逆に他の人に貸し出して利息収入を得ることができます。技術的には取引プラットフォームと同じマルチシグエスクロー方式を用いており、借り手がビットコインを担保としてエスクローにロックし、貸し手が安定通貨を送金することでローン契約が成立します。期間満了時に借り手が返済すればビットコイン担保が戻り、返済不能(延滞や価格変動での清算)の場合は貸し手に担保が渡る仕組みです。驚くべきことに、このレンディングサービスでも一切KYCは要求されません。短期のビットコイン活用や利息収入を得たいニーズに応えるユニークなサービスであり、HodlHodlを使いこなせば「ビットコインを売買するだけでなく、借りたり貸したりする」といった金融活用も可能になります。P2P Lendingについては、今後別のチュートリアルで詳しく説明します。
-
🧪 テストネットで練習可能: 「いきなり本番は不安…」という方向けに、HodlHodlはテストネット版サイトも提供しています。TESTNETでは、本物のビットコインではなくテスト用のビットコイン(signet**ネットワークのBTC)を使って、実際の取引手順を練習できます。架空の資金でHodlHodlの操作感を試せるため、初心者はまずテストネットで売買の流れをシミュレーションしてみると良いでしょう。十分に慣れてから本番取引に移行すれば、落ち着いて対処できます。テストネットBTCは各種ファウンセット(蛇口サイト hhtestnet.com)から無料でもらうことができ、HodlHodlのテスト環境で練習するのに役立ちます。
以上がHodlHodlの主な特徴と利点です。匿名性・安全性・使いやすさを兼ね備えたHodlHodlは、まさに「ビットコインをネイティブにP2P利用する」ための理想的なプラットフォームと言えるでしょう。初めは不安もあるかもしれませんが、本チュートリアルで説明した手順に沿って取引を行えば、きっとその手軽さと利便性に驚くはずです。ぜひHodlHodlでのP2P取引に挑戦してみてください。自分自身でビットコインを扱う経験を通じて、ビットコインの真の価値である「個人が金融の主導権を握ること」を実感できるでしょう🚀
もしビットコインのP2P取引やHodlHodlなどについてもっと深く知りたい、あるいは個別に相談してみたいと思えば、どうぞお気軽にご連絡ください。1対1のコンサルも承っています。
サービスには決まった料金はありませんが、ご相談を通じて「役に立った」と思い、お悩みや疑問を解決できたと感じていただけたら、「3つのT」でのご支援(Value for Value)をぜひご検討ください:
- 時間(Time):この記事をSNSなどでシェアしていただくこと。
- 才能(Talent):コメントや補足情報などを通じて知識を共有していただくこと。
- 宝(Treasure):世界で最も健全なお金、ビットコインの最小単位「sats」でのご支援。
もちろん、支援の有無にかかわらず、お力になれればとても嬉しいです。 では、また次回!
参考資料
- Bitcoin Whitepaper - Bitcoin: A Peer-to-Peer Electronic
- HodlHodl公式サイト - Welcome to Hodl ([P2P BITCOIN TRADING platform]
- HodlHodlヘルプセンター - How to buy Bitcoin / How to sell Bitcoin
- HodlHodlヘルプセンター - Why is trading on Hodl Hodl secure
- HodlHodl FAQ - Why should I use HodlHodl、How secure is trading on HodlHodl
- HodlHodl Medium - Hodl Hodl’s API release
- HodlHodl Lend FAQ - What is Lend a ([Earn Highest Returns on Your Crypto Investment - Lend at Hodl Hodl]
- ZoneBitcoin - Hodl Hodl: Tutorial on the anonymous and KYC-free P2P platform
- など
-
-
@ 5d4b6c8d:8a1c1ee3
2025-03-29 15:31:31This is a big one for many of us. Probably the most beneficial perception shift you can have is to stop perceiving junk food as food at all.
There are two big components to this: 1. "Cheap"/"affordable" foods are neither cheap nor affordable if they are bad for your health. They are pure waste. Whatever you're currently spending on foods you don't think you should be eating can be reallocated to foods you do think you should be eating and it's wiser expenditure regardless of how expensive the new foods are. 2. When you're looking for something convenient, it's better to eat nothing than to eat something bad. Again, junk food isn't food. Eating it because you're hungry isn't helping anything. You didn't satisfy any nutritional requirements, so you still need to eat the same amount later. On the other hand, fasting is good for you, so just do that until you find something that is food. Also, the first point applies here: instead of eating a lot of garbage, it would be better to spend the same amount on a small portion of food.
I was inspired to write this because I was proud of myself for putting back a package of discounted double chocolate chip muffins this morning and just getting a dark chocolate bar instead.
originally posted at https://stacker.news/items/928684
-
@ 30b99916:3cc6e3fe
2025-03-29 14:04:34
Chef's Notes
My mom worked as a waitress for a excellent Chinese restaurant. For years she tried to get this receipt without success and finally after the owner retired he gave her the receipt.
Previously posted this receipt on Zap.Cooking but now wanting to keep all my long-form notes in Obsidian and publish to Nostr using the nostr-writer plug-in.
Details
- ⏲️ Prep time: 20 to 30 minutes
- 🍳 Cook time: 1 to 2 Hours depending on amount of spare ribs
- 🍽️ Servings: 8
Ingredients
- 1 Quart Dole Pineapple Juice
- 1 Pint Dole Crushed Pineapple
- 1 Pint Dole Tidbits Pineapple
- 1 TS Dried Mustard
- 32 Oz Brown sugar or add to taste
- 1 Cup Red Wine
- 2 TS Corn Starch
- 1 or 2 lbs Pork or Beef spare ribs
- Worcestershire sauce
Directions
- Preheat oven to 350 degrees
- Bring water to boil in 8 qt stock pot
- Cut spare ribs and add to boiling water in stock pot
- Boil spare ribs for 20 to 30 minutes to remove excess fat
- Drain spare ribs and place onto cookie sheet
- Base spare ribs with a generous amount of Worcestershire sauce
- Place based spare ribs on cookie sheet and place into oven for 60 minutes.
- Place first 6 ingredients into stock pot and bring to boil while CONTINUOUSLY stirring
- Add corn starch to 2 cups of water and mix to create thickening agent
- Add thickening agent incrementally to Sweet & Sour sauce for desired thickness
- Reduce heat to low while CONTINUOUSLY stirring.
- Remove spare ribs from oven and place into Sweet & Sour sauce.
- Place stock pot into oven and cook until done. 1 to 2 hours.
Bon Appétit
-
@ 30b99916:3cc6e3fe
2025-03-29 13:57:26
Chef's Notes
My mom worked as a waitress for a excellent Chinese restaurant. For years she tried to get this receipt without success and finally after the owner retired he gave her the receipt.
Previously posted this receipt on Zap.Cooking but now wanting to keep all my long-form notes in Obsidian and publish to Nostr using the nostr-writer plug-in.
Details
- ⏲️ Prep time: 20 to 30 minutes
- 🍳 Cook time: 1 to 2 Hours depending on amount of spare ribs
- 🍽️ Servings: 8
Ingredients
- 1 Quart Dole Pineapple Juice
- 1 Pint Dole Crushed Pineapple
- 1 Pint Dole Tidbits Pineapple
- 1 TS Dried Mustard
- 32 Oz Brown sugar or add to taste
- 1 Cup Red Wine
- 2 TS Corn Starch
- 1 or 2 lbs Pork or Beef spare ribs
- Worcestershire sauce
Directions
- Preheat oven to 350 degrees
- Bring water to boil in 8 qt stock pot
- Cut spare ribs and add to boiling water in stock pot
- Boil spare ribs for 20 to 30 minutes to remove excess fat
- Drain spare ribs and place onto cookie sheet
- Base spare ribs with a generous amount of Worcestershire sauce
- Place based spare ribs on cookie sheet and place into oven for 60 minutes.
- Place first 6 ingredients into stock pot and bring to boil while CONTINUOUSLY stirring
- Add corn starch to 2 cups of water and mix to create thickening agent
- Add thickening agent incrementally to Sweet & Sour sauce for desired thickness
- Reduce heat to low while CONTINUOUSLY stirring.
- Remove spare ribs from oven and place into Sweet & Sour sauce.
- Place stock pot into oven and cook until done. 1 to 2 hours.
Bon Appétit
-
@ 65038d69:1fff8852
2025-03-29 13:05:35Welcome to part 4, the final entry in the What is Money series. We’re capping it off with “crypto” and CBDCs.
Let's start with crypto. Short for cryptocurrency, it’s a catch-all term for all of the non-fiat, blockchain-based, or non-government-operated new money systems that aren’t Bitcoin. Ethereum, Solana, and Dogecoin are some you may have heard of. There are actually thousands of cryptocurrencies in existence, but we’ll summarize some of the biggest ones by size and pop culture penetration. One thing they all have in common is that like fiat currencies, they have no supply limit and are therefore inflationary by nature.
Ethereum: Released in 2015 by Vitalik Buterin, Ethereum is less of a money system and more of a network built to run “decentralized applications” (DAPs) on. “Smart contracts” and “tokens” are the most common of these. If none of those terms mean anything to you, you’re not alone. What they’ve essentially done is recreate the unending complexity of high finance in a computer system and replaced the bankers and lawyers with programmers.
Solana: Solana is much smaller than Ethereum but serves a similar function of being a wild-west finance platform. I’m only mentioning it here as it's been in the media a lot with numerous security compromises, lawsuits, and general drama. Your nephew who trades in Robux probably knows someone who lost their allowance savings in the 2021 crash.
USDT/Tether: This is the largest in a family of cryptocurrencies called “stablecoins”. They’re meant to offer the features of crypto but with the “stability” of having their value tied to a fiat currency, in this case the US Dollar.
Monero: Monero was designed from the ground up to be as anonymous as possible. Unfortunately it’s lack of popularity means it’s not particularly useful for purchases.
Dogecoin: Released in 2013, Dogecoin was created as a joke to poke fun at Bitcoin and cryptocurrencies. As a joke it’s been wildly successful, but like most jokes there are many who decided to take it seriously over the years, which has driven its market cap to surpass that of Monera and most others. It’s currently in the top 10 by market cap, but you’ll struggle to find anyone who takes it as payment.
The concept of CBDCs (central bank digital currencies) has been making the rounds through media for some time. Some paint it as a boogeyman to be feared, while others see it as nothing more than an annoying waste of government resources. As you may recall from part 2 of this series, the Bank of Canada is not a retail bank with individuals for customers, instead acting as an administrative body and a bank for banks. CBDCs have the potential to change that. In a sentence, a Canadian CBDC would most likely be a system whereby individuals who struggle to get or maintain accounts at retail banks could be issued a Bank of Canada account. There may also be some integration with Payments Canada systems to make retail payments and transfers cheaper and more direct. Much of this is speculation though, as the BoC hasn’t announced any of this, only that research is ongoing. In any case it won’t be a replacement of the Canadian Dollar, just another system for moving Dollars around between ledgers and accounts.
I’d normally sign off with something like, “Want help with insert article topic here? You can find us at scalebright.ca”, but in the case of crypto I’m afraid we must decline. The other trait shared by all of these money systems beside inflation via no supply limit is that they’re all scams designed to steal from their customers. Bitcoin is the only digital non-fiat currency this doesn't apply to. So if you’d like help with Bitcoin, you can find us at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-29 13:02:18Millennials remember the era of Buzzfeed quizzes with fondness, and some may even describe it as identity or culture shaping. People have always loved these miniature personality tests, and while Buzzfeed may no longer be in its heyday, the popularity of these dinner-table icebreakers has transcended generational gaps. To the analytically-brained among us this sounds like a datapoint that could be used in the workplace. Or is it?
You’ve probably heard someone’s answer to one of these and thought, “Oh wow, that sounds mildly psychopathic, I’m sure glad I don’t work with them!” Interviewers will sometimes ask questions like “if you were an animal, what kind of animal would you be?” as a conversation starter, but unscored. Part of the reason for this is that laws around discrimination in hiring make filtering via psychological or personality tests a grey area. Any suggestion of discrimination opens employers to potential lawsuits and investigations. Even if the applicant answered unironically with “I would be a dragon because I love hoarding gold and burning down unsuspecting villages!”, you would need to prove that the question was asked in a controlled environment by a certified professional and that the question was directly relevant to the position being applied for.
Now that I’ve most likely talked you out of implementing these in your interview processes, here are a handful of tests that, in an HR and legal department approved manner, could be run during an interview. Failing that, they make for great casual icebreakers! Their sources range from actual psychological tests to dubious corners of the internet, and they’ve all been simplified down to their simplest forms, so I’ll again warn that you’ll want to do diligence before suggesting their use in your workplace.
The Marshmallow Test: The test subjects (usually children) are offered a marshmallow and told that if they leave it for a few minutes, they can have two. Adults who’ve developed impulse control will usually say the correct answer is obvious, yet we fail slightly more complex versions all the time. Remember that greasy fast-food you bought with money you could have saved for a nice dinner out?
Cognitive Reflection Test (CRT): “Some apples and some bananas cost $1.10. The apples cost $1 more than the bananas. How much did the apples cost?” If you suspect a trick, you’ll probably think about the question a bit further, but the intuitive part of our brains want us to think the apples were $1 and the bananas $0.10.
The Breakfast Question: “How would you feel if you hadn’t eaten breakfast?” This one has some deep internet lore behind it, but the idea is that you’re testing the subject’s capacity for hypothetical reasoning. Can they process “what-ifs”? It can also extend into testing for empathy (“How would you feel if you were in Steve’s shoes and someone stole your ice cream?”).
Thematic Apperception Test (TAT): Show the subject an ambiguous picture (ideally emotionally neutral) with people in it and ask them to imagine what is happening, including what the people are thinking and feeling. Most people will subconsciously project their own thoughts and feelings onto the characters in the picture.
Moral Circle Test: This one has a history of being misunderstood and used as a political cudgel, so you may want to save it for your more understanding friends. Subjects were asked to rank the moral responsibilities they felt toward increasingly distant groups, starting from themselves in the center of a circle and working their way out through family, friends, acquaintances, animals, Earth, etc. The primary misunderstanding is whether the outer circles include the inner circles, i.e. whether caring for Earth includes caring for family. It’s unclear whether the subjects fully understood this, and those interpreting the results seem confused as well.
Workplace Motivation Test: “You are up for a promotion. You can be promoted into a position that pays 20% more, or one that pays the same that you’re currently making but aligns with your non-financial life goals or sense of purpose.” This one is my own, and you can learn more about the underlying concepts here: “True Believers & Mercenaries” Are you a “True Believer” or a “Mercenary”?
Need help with your interview processes or figuring out which Disney princess you are? You can find us at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-29 12:55:20Welcome to part 3 of the “What is Money?” series! So far we’ve covered the base concepts of money and money as a system in part 1, and the Canadian Dollar in part 2. Today we’re going to talk about a relatively new system of money, Bitcoin!
Let’s review a few key details about money and the Canadian Dollar (CAD). Money is a placeholder to make trading easier, so anything that can fulfill the 3 functions of money can do the job (store of value, medium of exchange, and unit of account). During the Italian Renaissance the double-entry bookkeeping (or double-entry ledger) system was codified as a method of tracking transactions, and this system is still in use today for CAD and most other money systems. One of the features of using a ledger instead of physical money with intrinsic value (such as precious metals) is that it allows for fiat (money by decree) that isn’t backed by anything. The CAD is a fully fiat money with no reserve requirements. It’s also mostly digital, with only 7% of the total supply being cash and liquid deposits with the Bank of Canada.
Bitcoin was invented by Satoshi Nakamoto, a pseudonymous individual or group who no one knows the real identity of. They released the Bitcoin whitepaper (which can be read here: https://bitcoin.org/bitcoin.pdf) in October of 2008, and on January 3, 2009 they started the Bitcoin system. 2 years later they decided to disappear and were never heard from again. Others were involved in early development and maintenance, including Laszlo Hanyecz, who completed the first real-world purchase using Bitcoin. He paid 10,000 bitcoin for 2 pizzas on May 22, 2010, which is now unofficially celebrated as “Bitcoin Pizza Day”. There are several websites and pages dedicated to the story and tracking the current “value” of those pizzas; one can be found here: https://bitcoinpizzaindex.net
Fun history nuggets aside, Bitcoin is similar to CAD in that it uses the same double-entry ledger concept. The difference is that Bitcoin uses a single digital ledger across the entire network. Transactions are grouped into 10-minute blocks and chained together, which is where the popular term “blockchain” comes from. Another term you’ve probably heard, “mining”, is all of the computers dedicated to the task competing with each other in a combination math and guessing game for who gets to verify the authenticity and correctness of each block (the combined computational power from all of the competing computers is used, not just the winner), and the winner is rewarded with newly generated bitcoin and the transaction fees from the included transactions. This is what keeps the ledger secure and makes it practically impossible to fake, break, steal, or cheat on Bitcoin transactions. Last piece of technical background, I promise: If Bitcoin is just a ledger, how do you actually “hold” the money? You do so by holding something called a “private key”. This key is used to authorize new transactions (spending the money). Think of the private key as similar to a password, PIN, or secret code for a bank account. In Bitcoin, if you hold the keys, you hold the coins.
That was a lot of history and technical stuff; take a break, touch some grass, pet the dog, sip some coffee, and come back in a few minutes.
Since you have an understanding of how money systems and CAD works I won’t bother re-explaining it all for Bitcoin; I’ll instead hit some of the major differences between it and CAD (and most other fiat currencies). Bitcoin doesn’t have a central bank or any other central authority governing or controlling it. The ledger is the “single source of truth” and anyone with a valid private key and internet connection cannot be stopped from creating a new transaction. The ledger is also fully public; you can download a full copy and view it, or use a handy website. There are several; here’s the “Bitcoin Pizza” transaction on one of my favourite public sites, mempool.space: https://mempool.space/tx/a1075db55d416d3ca199f55b6084e2115b9345e16c5cf302fc80e9d5fbf5d48d
There’s also a hard limit to the number of Bitcoin that can exist, so there’s no inflation. 21 million bitcoin, which can be divided down into 2.1 quadrillion “satoshis”, or “sats”. Think of sats as similar to the CAD penny, the smallest unit of measurement.
Bitcoin is what I call a “push” system, which is opposite of CAD’s mostly “pull” system. When you do a debit, credit card, or cheque transaction, you’re authorizing the receiving bank to reach in and “pull” the money from your account. Credit cards especially rely on this; it’s how recurring subscriptions where you are charged automatically work. Central authorities also have the ability to pull from your accounts, such as banks for fees and the Canada Revenue Agency (CRA) for taxes (though the latter pinky-promise to only do this in emergency situations). With cash, you can’t authorize someone to physically reach into your pocket and take some of your money, and it's the same with Bitcoin. You have to “push” the money to the other person. This is one of the reasons Bitcoin has been referred to as “digital cash”.
Lastly, you may have heard some, including myself, talk about Bitcoin as a replacement for fiat currencies. How is it supposed to do that if we’re required by law to use CAD? My opinion is that we’ll most likely use both for several reasons, but let’s address CAD’s requirement of use. There are no Canadian laws that force the acceptance of CAD, including cash, for purchases. In Canada cash is “legal tender”, which is “the money approved in a country for paying debts.” (See the Bank of Canada page explaining this here: https://www.bankofcanada.ca/banknotes/about-legal-tender/) If there’s no debt being settled, there is no requirement to accept CAD in cash or digital form (i.e. debit or credit card). If there is debt (i.e. paying a bill for a product or service you already received) only cash (as legal tender) is required to be accepted, but payees are not required to use it. There is a bit of an exception to CAD’s non-requirement of use though; all “business” transactions (including barter and Bitcoin) are potentially taxable and therefore are required to be reported at Fair Market Value, denominated in CAD, to the CRA. See the CRA interpretation bulletin here: https://www.canada.ca/en/revenue-agency/services/forms-publications/publications/it490/archived-barter-transactions.html Taxes are required to be paid in CAD as well.
If you’d like to see how Bitcoin works in the real world, I’d be happy to show you. I’ll even gift you a few sats to practice with! You can find us at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-29 12:53:57If you haven’t had the experience of waking up in the morning and fearing going to work, you’ve probably heard at least one story of someone who has. Someone who was afraid of their boss, a coworker, an impending audit, or layoffs. These stories are centered around fear, but what about fear’s older, more mature cousin, respect? How are they related, and what are their roles in the workplace?
Fear? Having a role in the workplace? I thought fear was bad and to be avoided at all costs? Didn’t we leave fear at work behind in the 1950s along with day-drinking and open misogyny? Not entirely it seems, but the fear we’re talking about today is of a different kind, a healthy kind. For example, a primary school child would have a healthy fear of bears. What about respect? While the term might feel dated in our current hyper-equality society, it too has a healthy version. As our example child matures, their fear of bears will develop into respect for them. They’ll understand their destructive power, but also that they’ll generally only engage it in defence. For another example, think back to your relationship with your childhood friend’s parents. As a child in an unknown adult’s home with different rules and expectations there was an amount of fear involved, but as an adult you most likely have respect for the amount of shenanigans they put up with at the hands of your and your friends.
Fear, even the unhealthy kind, can sometimes be leveraged for good. Fear of being yelled at might motivate you to finish the last 10% of a project or emptying your inbox before the end of the workday. It is better matured into respect whenever possible, however. The trade-off of fear of verbal assault or firing isn’t worth it. It’d be much healthier to be motivated by respect. Respect for your coworkers (who might also be made late by your procrastinations), your boss (who may need to take responsibility for the delay), and customers or clients (imagine yourself in their shoes).
We’ve established that respect is good, and that fear is a sometimes-useful antecedent of it. And we can all now hear a thousand voices screaming, “but so-and-so doesn’t respect me!” or “but so-and-so doesn’t deserve respect!”. They may not be wrong, so let’s see what we can do to help promote respect. Ignoring the edge cases where some people are arrogant to the point of not respecting anyone, the most common cause I’ve witnessed isn’t a lack of respect, but a misdirection of it. Respect has a directional flow from one person to another, and ideally there are streams flowing in both directions. You respect your boss for their authority and responsibilities, and your boss respects you for your expertise and commitment. Misdirection of respect isn’t giving it where it isn’t deserved but flowing in the wrong direction. For example, a coworker is regularly late for meetings, and the meeting chair says, “Out of respect for Bill we’re going to wait for them to start the meeting.” What about their respect for everyone else’s time? Respect is flowing in the wrong direction. The same thing can happen when making decisions. “Mary has been with us the longest, so we’re going to defer to her preferences and keep the fax machine in the document transfer workflow even though it’s expensive and takes longer.” Sometimes it can even lead to putting the unqualified in positions they’re incapable of executing out of a misdirection of respect. Permission to speak is an extremely common misdirection as well; respect for someone’s “right to be heard” shouldn’t override their respect for everyone else’s time.
The solution to this chaotic storm surge of misdirected respect is simple, but difficult. Break the fourth wall and haven open discussions. Start with groups and work your way down to one-on-one as necessary. Meeting start times is an excellent place to begin as most will agree that starting on time (especially with the goal of finishing on time!) is a practical shared good. Permission to speak in meetings (especially public ones) will be a difficult tackle but is also highly relevant. If respect directionality feels too heavy to bring up at work at all, try practising at home or with friends first. Failing that, a therapist or chat AI might be options.
Want someone with a neutral or outside voice to talk about fear and respect in your workplace? You can find us at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-29 12:46:30In part 1 of this series (Part 1 - What is Money?) we overviewed the history of money and as a global concept. Now that we have a base understanding of what money is we can get into detail about the Canadian Dollar. Why the Canadian Dollar specifically? One of the inspirations for this series was realizing how much the pervasiveness of American media has affected the average Canadian’s understanding of how our money works. How many of you can quote what is printed on US bills? Do you know what is printed on Canadian bills? What about what the Canadian Dollar is backed by, and who’s in charge of it? To preview, it’s not gold, and it’s not the Federal Reserve.
Lets do some history to give us some background on the Canadian Dollar (CAD) as we know it today. In 1858 the Province of Canada introduced the Canadian Dollar as a hopeful replacement for the mix of British, American, Spanish, and private bank credit notes in use. In 1867 Canada was formed as a nation, and the next year the Government of Canada issued Dominion credit notes as currency. These Dominion notes were required to be backed by a minimum of 20% gold reserves. This is called a “fractional reserve” system, or fractional reserve banking. Reserve requirements for private bank notes and Dominion notes changed over the years leading up to 1935 when the Bank of Canada (BoC) was formed and became to sole issuer of currency in Canada. 10 years later gold reserve requirements were removed and the Dollar became a fully fiat currency (remember this term from the previous article?).
The Bank of Canada is Canada’s “central bank”. If you check out the About Us page on their website (https://www.bankofcanada.ca/about/) you’ll see they have a broad range of roles and responsibilities, but the main one we’re focused on is that they manage the Canadian Dollar as a system of money, including creating and destroying Dollars as they deem necessary. (This is similar to the American Federal Reserve, but a key difference is that the BoC is a crown corporation, while the Federal Reserve is owned by private banks.) The creation and destruction of Dollars is a complex process, but it’s mostly done through borrowing. The government indirectly borrows money from the BoC (and sometimes directly from commercial banks), and everyone else borrows from banks. This money is then created by the BoC and banks, and when the principal (debt exclusive of interest) is paid back, its destroyed.
I’d be remiss if I didn’t mention and define “inflation”, “monetary expansion”, and the “Quantity Theory of Money”. The BoC defines inflation as “…a persistent rise in the average level of prices over time.” They have an excellent explainer on their website here (https://www.bankofcanada.ca/2020/08/understanding-inflation/); to summarize, the BoC and government use the Consumer Price Index (CPI) to keep track of this. “Monetary expansion” is when money is created and kept in circulation. The “Quantity Theory of Money” states that when new money is created it becomes less valuable, which means prices increase, AKA inflation. With this in mind the BoC targets a 2% inflation rate when making decisions about creating and destroying Dollars (through the systems of borrowing). Whether they’re successful or not is the subject of an article all on its own and much speculation.
I should also mention an outlier in the Canadian financial system; Credit Unions. These are provincial banks that don’t have a direct relationship with the BoC. They’re generally much smaller than the national banks and offer fewer services, but many feel they offer a more personal service. And one credit union in particular is an outlier among outliers; Bow Valley Credit Union in Alberta. They’ve embarked on mission to stockpile precious metals (mostly gold) as a form of guarantee for customer deposits. They still practice fractional reserve banking, but this is an improvement over zero reserve banking.
You might be imagining stacks of Dollar notes being passed around all these institutions, but most of the money only exists in ledgers (remember this from part 1?). For comparison, there is currently about $250B in the M0 supply (liquid deposits at the BoC and cash), and the rest totals about $3500B, or $3.5T. That’s about 7% as “real” money that could be used to buy groceries or for payroll. To move this invisible money around the government created Payments Canada, a non-profit that operates most of the inter-institution transfer systems. (They have other responsibilities as well.) Lynx and the Automated Clearing Settlement System (ACSS) are currently in use, and Real-Time Rail (RTR) is coming soon to augment them.
On the retail side, we have the Interac network and credit card networks. The Interac Corporation (a for-profit founded and primarily owned by major national banks) operates the Interac network, which is the primary debit card network in Canada, as well as Interac e-Transfer for direct electronic payments. Visa and Mastercard are the primary credit card networks, but they simply move payment information between banks and Payment Services Providers (PSPs). PSPs are responsible for the actual payment settlements. You’ve probably heard of some of the major ones; Moneris, Chase, Square, and PayPal to name a few. If that sounds complicated, that’s because it is. Let’s walk through an example credit card payment at a physical store to see how it works. The customer inserts, taps, or swipes their card at the payment terminal, typically managed by a Point of Sale (POS) provider. The terminal sends the information to the PSP, who sends the information through the credit card network to the issuing bank. If the transaction is approved, it’s logged for transfer in a batch later, and the approval makes it way back through the credit card network, PSP, terminal, and POS.
Wipe the sweat from your brow and take a sip of coffee; that was a lot! The important part to remember is that all of this complexity serves to move numbers between accounts in ledgers. The government (through the BoC) controls the money supply (the primary driver of inflation), and the banks and networks move the ledger numbers between individuals, companies, and each other. About 7% is liquid, and 0% is backed by hard assets such as gold.
In part 3 we’ll cover Bitcoin, its intention to replace fiat currencies, and its current state in Canada.
-
@ 65038d69:1fff8852
2025-03-29 12:31:02Minimum wage has been a hot topic as far back as I can remember. If you’re an employer it can feel like government needlessly meddling in the free market, while for employees it feels like its never high enough to make a difference. This is especially true where oversaturated labour markets are combined with high costs of living (HCOL) (which is pretty much everywhere at this point). Workers may need 2 or even 3 minimum wage jobs just to cover food, shelter, and transport in these areas, and would probably love to see minimum wage lifted. Employers in less-dense areas are faced with the opposite problem; even if they advertise pay “above minimum wage”, acquiring and keeping entry-level staff in HCOL areas is a constant battle. In this case, my recommendation is to localize your minimum wage.
In Canada most enforceable minimum wages are set by the provinces. Federal minimums apply to federal government employees (and some federally regulated industries). The problem with this is the sometimes broad disparities in cost of living (COL) between municipalities, especially between urban and rural. I’ve seen rent differences from 50% to 100% for comparable apartments. Applying the same minimum wage isn’t going to have the effect it’s meant to. If your staff can’t afford rent, they’re going to constantly be searching for something better, leading to high turnover. They’ll be forced into mercenary behaviours (see my previous post on “True Believers & Mercenaries”). Official minimum wages also lag behind inflation, but that’s a whole separate discussion (see my “What is Money?” series, starting with “Part 1 - What is Money?). On the flip-side, having a localized minimum wage allows your employees to stay settled where they are and gives them the freedom to be True Believers. You can work it directly into your job postings too; advertising wages that are based on local COL will have your inbox flooded with applications, allowing you to choose from the best instead of having to settle for the desperate. Let’s get into how to go about localizing your minimum wage.
First, look at a map and ponder how far most would be willing to commute to your workplace. Draw a rough circle with that as the radius. Everywhere inside this circle is fair game for everything to follow. Next, find some low-rent but livable apartments inside the circle and look up their rates. This will be your rent figure.
Transport is next. We’re going to use fuel cost as a “close enough” placeholder as actual costs will vary greatly between individuals. We’re also going to pick a “close enough” fuel efficiency for the same reason. I’ve chosen 8.5L/100KM, but you can adjust this. For example, full-size pickups may be more popular among your staff so that number may need to go up. Look up the average fuel prices for the last few months at retail stations within the circle, and the average working days per month for your staff. Now plug all of these numbers into the following formula and calculate. This will give you the monthly fuel cost: (fuel price x 8.5 x (circle radius KM x 2) / 100) x working days
Lastly, groceries. Like transport, we’re aiming for a “close enough” placeholder. You can substitute any items and volumes you like, but these are my recommendation to get an average monthly cost for an average minimum wage worker plus 1 dependant. Go to a generic grocery store within the circle and get the regular (non-sale) prices of the following: 3 x 3lb/1.36kg apples (averaged or middle price), 5 x single Long English cucumber, 1 x 10lb bag of potatoes, 2 x 4L 2% milk, 4 x 1 dozen large eggs, 2 x 600g block of cheese (average or middle price), 6 x loaf of brown or whole grain bakery bread (average or middle price), 5 x 1lb/454g lean ground beef, 1 x 4kg box frozen chicken breasts, and 1 x 3.5lb/1.6kg bag of jasmine rice.
Now that you have totals for the expenses, put those numbers into the following formula. This will give you total monthly living expenses: ((rent + groceries) / 0.45) + fuel Put that total into the following formula for the monthly paycheque total, pre-deductions. Insert current federal and provincial income tax rates for your jurisdiction: expenses / (1 - (provincial tax rate as decimal + federal tax rate as decimal + 0.05) With this final total you can divide by monthly working hours for an hourly wage, or multiply by 12 for an annual salary. I’ll provide an example of all of this at the bottom of the article.
After crunching these numbers you may have concluded that paying a localized minimum wage would eat into your profits. This may be the case initially, but lowering turnover rates and increasing the quality of your hires will save you money long-term. However, if it raises costs so high that the business would become unprofitable, you may need to consider that the business isn’t viable. Being dependant on employees willing to work for below the cost of living in your area will eventually end the business regardless, and I would argue is immoral.
Want help localizing your minimum wage? You can find us at scalebright.ca.
Sample localized minimum wage calculation: Rent: $1,200 Fuel cost: ((1.40 x 8.5 x (9.4 x 2) / 100) x 20 = $44.75 Groceries: $229.46 Apples: 23.97 Cucumbers: 14.95 Potatoes: 8.99 Milk: 11.90 Eggs: 17.40 Cheese: 20.58 Bread: 23.94 Ground beef: 42.45 Chicken breasts: 49.99 Rice: 15.29 Total expenses: ((1200 + 229.46) / 0.45) + 44.75 = $3,221.33 Total monthly paycheque: 3221.33 / (1 - (0.10 + 0.15 + 0.05) = $4,601.90 Hourly: 4601.90 / 160 = $28.76 Annual salary: 4601.90 x 12 = $55,222.80
-
@ 65038d69:1fff8852
2025-03-29 12:31:02“What is money?” sounds like a bit of a silly question. You’d probably hold up some cash or maybe flash your debit card. But I challenge you with this: imagine a 5-year-old asking you this question. How would you answer? If you showed them a $20 bill, they might respond with, “I know that’s a money, but what is it?” If you manage to explain that the bill is worth $20, they’re next question is going to be, “how many is your card?” How would you answer that? At some point you’d probably end up trying to distract them with something else while you worked to ignore the dread feeling that you should have those answers, but don’t. Never fear, for we will attempt to explain it in such a way that you’ll have an answer for 5, 15, 50, or 95-year-olds by the time we’re done this 4-part series!
Let’s start with an overview of the history of money. I highly recommend further reading on each of these; we’re going to skim most of them today. In the beginning, there was simple barter. If we each had something the other wanted, we could trade. But if the scale of what we want to trade is lopsided, say, chickens for a cow, or cows for a house, how do you make the trade work? Or what if you wanted to save up for a larger purchase? The answer is a placeholder; something that represents value in trade. An early example of this is the rai stones in Micronesia, which are essentially carved rocks. These worked well for store of value and medium of exchange, but not so much for unit of account. Precious metal coins arose later, with the most common being gold, silver, copper, and bronze. These worked well for all three of the major elements.
Store of value, medium of exchange, and unit of account are the three major elements of any system of money. Store of value means it holds its value well over time. If you put a gold coin in a box in your house and retrieve it 10 years later, it’s still a gold coin and should be in the same physical condition as it was when stored. Medium of exchange means it’s widely accepted for trade. This one is a bit trickier, but if you’re the Roman Empire you can simply make everyone accept denarius. Unit of account means units should hold the same value everywhere they’re used. This is similarly tricky, but if you’re the Dutch East India Company you can simply make VOC-stamped coins global denominations.
Renaissance-era Italy is where modern banking was born. A key concept invented during this time was the double-entry ledger, or double-entry bookkeeping system. In short, every transaction is recorded, and every transaction has two entries: one with an amount leaving an account, and one with the same amount going into a different account. At the end of every block of time all accounts will have an aggregate balance of 0, with individual accounts either having a credit or debit. This system is still in use today, as well as the broad use of credit notes in place of coins or direct trade. Credit notes could be written against an account and given in trade, and later the receiver could take the note to the bank, who would then record the transaction as complete. If this sounds familiar, that’s because modern cheques are the same thing.
Modern money systems take these concepts a step further. Banks now maintain a whole network of double-entry ledgers and in most countries banks are no longer required to hold reserves matching their credit notes issued. Credit notes are also the total physical currency, also known as a fiat currency, or currency by authority or decree. This essentially means fiat money has no intrinsic value other than the promise of the issuing authority to treat it as valid and the willingness of others to accept it in trade. For an example of “willingness to accept in trade”, many retail stores in Canada will accept American dollars even though they’re not required to.
If you’re now thinking, “thanks for the history lesson, but what does this mean to me and the payment terminal in my store?”, the answer will come 2 weeks from now when we cover the Canadian dollar. In the meantime if you want to learn a bit more about the systems our modern money is based on, read up on the Roman Empire and their currency, as well as that of the Dutch East India Company. If you really want to dive deep, Renaissance Italy’s banking systems are also fascinating and a little closer to us on the timeline.
-
@ 65038d69:1fff8852
2025-03-29 12:28:24We’ve all been in meetings that seem to be stuck in an unending loop of “discussions” going nowhere while simultaneously ratcheting up everyone’s emotions as the minutes past dinner continue to climb. You stand to leave as you reach your limit and declare, “It’s past my bedtime”. If only there was a way to make meetings more efficient!
The gold standard for meeting organization is “Robert’s Rules of Order”, the original having been published in 1876 and currently in it’s 12th edition (https://robertsrules.com). It’s quite the tome at over 800 pages, which makes sense given that it’s meant to be a complete procedural guide. If that feels like overkill for your 5-person weekly department check-in, there’s an “In Brief” edition available meant for just such cases. Our focus today will be less procedural and more on the squishy human side.
People are social creatures who generally prefer friendly conversation over stiff formalities. This will be your primary hurdle as left unstructured most meetings will migrate from handling business to visiting. My first recommendation is to intentionally schedule social time before and after the meeting. You may have seen this communicated as “doors open” and “doors close” times on event announcements. Or you can break the fourth wall and label it “social time”. Either way, explain its purpose to your attendees and make it clear that its optional. Most will appreciate having it; these meetings may be the only time they see each other, but for some its just business and they won’t want to feel pressured into awkward conversation.
Intentional social time is best paired with my next tip: begin the formal portion exactly at the advertised start time. This will encourage everyone to arrive on time (or ideally early), and might allow you to finish early. (Who doesn’t like that‽) If your attendees are used to a loose start time it might seem jarring at first, but if you break the fourth wall (again) and explain why you’re doing it, you shouldn’t have many arguments. If you have late arrivals, don’t interrupt the flow or pause to catch them up. Its their responsibility to arrive on time, and failing that its their responsibility to catch themselves up. Again, it won’t take long to normalize a hard start time. I also recommend advertising and sticking to a hard stop time as well. The nice thing about a stop time is that its only definite in one direction; you don’t have to stick to it if you’re done early. It’s primary purpose is to reassure everyone that the meeting won’t get drug out. Evening meeting attendees with young children at home will be especially grateful.
If this is starting to feel like a lot of details to keep track of, fear not, for there is a solution invented long ago: the formal meeting agenda! I’ve included a basic template below, but an internet search will provide a cornucopia of formats and options. My rule of thumb is the longer the meeting, the further in advance you should provide an agenda. As a starting point I aim for a week / 5 business days for any longer than an hour. You’ll also want to include any written reports and statements. This will be another item you may get some pushback on; many will be used to delivering verbal reports with very little prep. Written versions have several advantages (see my previous posts on the importance of writing things down, especially “Writing Things Down Is For Boys Too”), including giving attendees a chance to review and absorb the information before the meeting, keeping the reports concise, and making inclusion in the minutes much easier. I also like to include statements on old and new business items, which takes us into the next, and possibly most controversial, item.
Alongside social visiting, one of the biggest time-eaters in meetings is “discussion”. In my opinion (here comes the controversial part), meetings shouldn’t have discussions, only decisions and formalizations. All discussion should happen before the meeting. For example, let's say a new piece of equipment needs to be purchased, and an official vote is needed to do so. The next business meeting is not the place to discuss this. Options, pros and cons, bids or quotes, and most importantly, opinions and emotions surrounding the decision, should be hashed out and aired between stakeholders in an informal fashion on their own time. Billy and Sally don’t need to have a shouting match about the colour options while everyone else awkwardly stares at their shoes in the middle of the weekly stand-up. They can have their cat fight in the privacy of the HR office or at the local Timmies. I make a bit of an exception for what I call “statements”, though with tight controls. If Billy acquiesces to Sally’s demands to buy the blue model instead of the yellow one but still wants his oppositions known, he might be tempted to unleash a rant if, during the meeting, the chairperson says something like, “Anyone have any thoughts on this equipment purchase?” Chances of this happening are high for business items surrounded by high emotions, such as layoffs or budget cuts. This is where the statement can be a powerful tool to give everyone most of what they want. Have those who wish to create brief written statements. Your pitch to them is that it can be included in the agenda with all the other important business, everyone will see it (even those who can’t make it to the meeting), there’s no chance of their opinion being misrepresented, and it can easily be included in the minutes. You can optionally allow them to read their statement aloud during the meeting, but keep tight control on this. Again, emotions may be running high, and someone hearing their nemesis vocalize an opinion they disagree with may be enough to set them off. Make it clear that the statement will be read for the record, and no responses or discussion will follow, as discussion has already happened.
I’ve mentioned the chairperson a few times. This person should be, without question, in control. They should have absolute dictatorial power over the meeting, and importantly, over who has permission to speak. Anyone who disagrees with this power can be asked to leave. It sounds harsh, but a meeting without a human “talking stick” will fall to those without the social awareness to refrain from interrupting, or those willing to be the loudest. Have the chairperson wield their omnipotence for the good of the people.
Need help with planning or executing your meetings? You can find us at scalebright.ca.
``` Example Meeting Agenda: Meeting Title Organization / Team / Group Name Meeting Date, Start Time, and Stop Time Meeting Location Chairperson Participants / Invitees
Order of Business: Call to Order / Start Approval of previous minutes Approval of reports Old business New business Adjournment
Appendices: A: Previous Minutes B: Report 1 C: Statement from John Doe on Business Item 1 D: Quote for Business Item 2 ```
-
@ 65038d69:1fff8852
2025-03-29 12:24:26“Technology never changes” sounds insane, doesn’t it? Of course it changes! Far too fast! New models of smartphones, laptops, refrigerators, cars, and toasters every year! And that’s just hardware; software and the internet move even faster. Every time you open your social media app of choice you’re greeted with a new thing to figure out. But under the hood of version 999 of all these newfangled widgets, they’re all the same as they’ve ever been, because technology never changes.
Does that still sound crazy to you? Excellent! That means I have you hooked for the rest of this article! All humour aside, when I say, “technology never changes”, I’m talking about the underlying concepts, how we use technology, and on the organization side, how we plan for it. That last one will be our focus today. The tech strategies I help organizations implement haven’t changed since I started in tech, and my predecessors would probably mirror the same, especially since they’re the ones I learned these concepts from.
Let’s dive in. If you’ve been involved in vehicle fleet management this first one will be familiar. For technology hardware there’s a concept called an “evergreen program”, which is essentially a schedule of when hardware is cycled or replaced. End-user hardware such as laptops, desktops, and smartphones is 3 years, servers is 6, wired network elements are 9, and wireless (mostly access points) is 6. These numbers aren’t written in stone or the same for every org; they’re just meant to be a starting point. But here's the big secret: most of this equipment, if it’s business-grade, properly maintained, and treated well, will last at least 10 years. The reason for the comparatively short evergreen cycles is two-fold: downtime can be more expensive than replacing equipment, and replacing equipment is usually a tough sell and put off as long as possible regardless of programs or policy. That’s an article all by itself; lets move along for now. Those evergreen program and lifetime numbers haven’t changed. Sure there’s a new Macbook every year and your cousin’s buddy who makes 7 figures working for a California design firm gets them on release day, but those are the exception. Your 5-person non-profit is going to replace laptops on double cycles based on tech strategy that hasn’t changed. Because technology never changes.
I mentioned software earlier and that it moves even faster. While this is true, tech strategy around it hasn’t changed. I’ll use the ubiquitous Microsoft Windows and Microsoft Office suite as examples. New major versions used to release roughly every 3 years. If you’re replacing your laptops and desktops on a 3 year cycle, you never really have to worry about upgrading Windows or Office separately. Today Microsoft has migrated most of their products to a subscription model, but the cycle is the same. Because technology never changes.
But what about AI? Isn’t it quadrupling in power every few minutes? Hasn’t it used the energy of a thousand suns to drink the oceans dry in order to feed it’s insatiable quantum-powered hunger for knowledge and control? No, it hasn’t. In fact, if news articles are to be believed; ChatGPT et al. have run up against a bit of a wall. My prediction is that we’ll start seeing AI in more common usage sometime late this year, which, not-so-coincidentally, will be about 3 years since it’s public release. Because technology never changes.
-
@ 65038d69:1fff8852
2025-03-29 12:19:19Look at any white-collar office job posting from the last few decades and you’re likely to see something like “basic computers skills” listed as a requirement. “Great,” you think to yourself, “I can use technology, after all, I managed to find this job posting!” And if you’re on the hiring end for a position that’ll be spending six to eight hours in front of screen, you’d certainly hope applicants would know that they need to be able to use a computer. Ten years of bookkeeping experience? Reception? Managing remote staff? In a Venn diagram of work experience and basic computer skills, those should be a near complete overlap! We shouldn’t need to train them at all! Can we be sure though? It turns out “basic computer skills” doesn’t have a universally accepted definition.
Since basic computer skills doesn’t have an official definition we can point to, lets attempt to create one ourselves. I argue for reading comprehension as the base skill underlying all the others we’re going to talk about (see “One Skill To Rule Them All” for more on this). Unfortunately reading comprehension doesn’t have a universal measurement either. I used to use “6th grade reading level” as my go-to, but today’s media is full of articles on changing standards and outcomes in public education, so that’s no longer dependable. If you’re interviewing someone, try providing them with a copy of the job posting and asking them questions about it that require some simple inference. For a more advanced option, I’ve included a test you can administer that covers reading comprehension and several other elements.
How about typing? Should basic computer skills include home row typing ability? What about speed requirements? If we’re talking about basic skills, I’d say no to both of those. While “chicken pecking” with two fingers probably wouldn’t qualify you for a staff writing position at a newspaper, I consider formal typing (especially with a speed requirement) to be an intermediate skill. So your applicant should be able to navigate a keyboard without assistance, but that’s all.
Email is probably the most universal computer task of the modern era. I’ve included it in the test template. Users should be able to recognize an email address and the “To”, “Subject”, and “Body” fields in an email client, even an unfamiliar one. Email interfaces have kept their same basic elements since the 90s.
The most controversial skill I’ve seen talked about lately is the ability to navigate and use a file system. The advent of smartphones and tablets, and the ubiquity of Chromebooks in schools, has led to new workers who have never had to save a file to a “documents” folder, or infer that a photo could most likely be found in a “pictures” folder. The strongest counterargument I’ve read is that between “recent” lists and search functions we shouldn’t need to know how to navigate file structures. I disagree, so I’ve included this skill in the test as well.
Lastly, safety and security. What’s considered “basic” varies wildly. Could you recognize a phishing email pretending to be from your boss? What about the difference between an ad link and a regular result in an internet search? I haven’t included this in the test as needs and policies are different at every workplace, but it’s a good idea to consider it when planning your interviews and internal training. An employee who clicks the links in every suspicious email without a second thought is a security disaster waiting to happen.
Here’s the skills test I promised. There are two ways of administering it; either provide the interviewee with a computer to use, or use screenshots and have them verbally walk you through the steps they would take. The latter requires a bit more visual and verbal knowledge transference and self-awareness so I only recommend it if providing a company computer isn’t a possibility. You’ll also need to customize it; for example YOURTEXTEDITOR needs to be replaced with whatever program is standard for your org, i.e. Microsoft Word.
Instructions for the Applicant: Please read the instructions below carefully and perform the steps described. After completing the task, answer the follow-up questions about the process. Task: 1. Open YOURTEXTEDITOR on the computer. 2. Create a new file and write the following without the quotes: “Welcome to the team! Your onboarding kit is on your desk.” 3. Save the file with the name "Team Message - " ending with today’s date, in the "FOLDERORSHAREDRIVE" folder. 4. Format the text to bold and change the font size to 14. 5. Close the application. 6. Open YOUREMAILCLIENT. 7. Send an email to INTERVIEWER with the subject “Team Message”. In the email, let them know that the file is ready. 8. Attach the file and send the email. Instructions for the Interviewers: After they’ve completed the task, ask the following questions about the process. Interviewees should be allowed to keep their instructions in front of them, but DO NOT tell them they can refer to them unless they ask. 1. What was the name of the first program you opened? 2. If you couldn’t save the file to the “FOLDERORSHAREDRIVE” folder/share drive, where would you have saved it? Why? 3. Who did you send the email to? 4. What did you name the file? 5. What changes, if any, would you make to the instructions? Post-interview analysis: The following is reasoning for the instructions and questions, and what to look for in the interviewee’s actions and responses. Task: 1. They should be able to find an application on the computer with little assistance. 2. They should be able to type the sentence into the document and understand the instructions to leave out the quotation marks. Observe their typing style (home row vs single finger presses) and speed. 3. Ability to remember or find today’s date and to save a document to a specific location. 4. Ability to format text. 5. They should remember to save the document or answer the automated prompt to save the document. 6. Same as question 1, but with a different application. 7. They should be able to send an email with an attachment. Ideally they’ll either know, or be able to figure out, how to look up the interviewer in the company address book. Also, the ability to write without being told explicitly what to say. 8. The ability to locate and attach a file to an email. Follow-up questions: 0. Allowing them access to the instructions without explicitly telling them they can refer to them will test their sense of agency. Asking permission is fine as some will feel the follow-up questions are a test, and most people are used to tests or exams being closed-book. It will also test their ability to find the information they need within the task instructions. 1. Ability to recall or locate the information. 2. Ability and sense of agency to make a best-option decision when faced with adversity. 3. Ability to recall or locate the information. 4. Ability to recall or locate the information. 5. Tests self-awareness around needs or preferences for directions. “None” is also an acceptable answer if they had no struggles with any of the task steps.
Share this article with anyone working on job postings or interviews in your organization, and please feel free to use the skills test content in any way you like. It’s best modified for your specific needs!
Need someone to assist with skills assessment, training, or hiring processes? You can find us at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-29 12:10:15“Can you help make our website good?” is one of the most loaded questions I get. There are many aspects to this question’s galactic gravitas, and their root is another question: what makes a website good?
Before we get there, we have a few other questions that need answering. The first is whether you actually need a website. Would a social media presence and a Google Maps listing do the same job? Or do you need a dedicated online shop or some other functionality that a Facebook Page can’t provide? Who’s your target market? Is it people who don’t have social media accounts or wouldn’t want to mix their social media presence with your business?
Let’s say you’ve gone through all of that and decided you do indeed need a website. What makes a website “good” can be divided into two aspects: engineering and design. In the context of websites, engineering is the behind the scenes stuff that makes it go (think of the mechanical bits of a car), and design is how it looks and feels (all the stuff you see and touch in a car). Unfortunately for us, most places these overlap they’re also juxtaposed. To see this in action head over to simple.scalebright.ca. You’ll notice that it loads extremely quickly and works well on screens of any size. This site was built with an “engineering first” mindset. Designers generally loath this kind of website. Not because it loads fast or scales well, but because to do those things I had to sacrifice design. There are no graphics or images, one font, and only four total colours in use (if you count black and white). There are no fancy contact forms, loading animations, white space considerations, borders, boxes, or bulbous billowing bedazzlements. Just cold, ruthless efficiency. I love it! But it’s not necessarily good.
This takes us into the next consideration. A good website doesn’t necessarily appeal to you; it’s supposed to appeal to your target audience. You might not be your target audience. If you are, great! That’ll make figuring out what your target audience wants in a website easier. Either way, be sure to have some chats with them and keep what they say in mind.
Okay, I know I just finished saying that the highly simplified version of my website isn’t good, but I want to warn you away from the opposite: over-design and over-engineering. Over-design usually manifests as visual overload; too many colours, too many graphics or photos, too much motion. Over-engineering is too much mechanical complexity; a one-page professional bio site doesn’t need to run on a dedicated server on WordPress with fifteen plugins.
There isn’t going to be a one-size-fits-all answer to “what makes a website good?”, because no two website are going to be identical. You’ll probably end up engaging a professional website design firm to both help answer that question for your specific scenario, and to build it for you. Here are some of the questions they’re going to ask and some hints for answering them.
What are your colours, fonts, logos, and other visual assets? If you don’t have these the firm should be able to help (usually for an extra fee), though smaller firms may need to subcontract the work out.
What are the core functions of your website? Is it an online store? Professional bio? Hospitality booking site? A link hub or landing page?
Do you have your website copy ready to go? “Copy” in this context refers to the text that will go on your website. Slogans, product and service descriptions, staff bios, and anything else that consists of a collection of words. If you don’t have your copy, you’ll either need to prepare to write it yourself or hire a third party to write it for you. It’s been my experience that website design firms are very strict about not writing copy, and generally won’t subcontract it either.
Do you have a preferred CMS? A CMS is a content management system, which is a fancy way of saying “thing that makes your website easier to add content to”. WordPress, Joomla, and Drupal are CMSs. Squarespace, GoDaddy, and Wix could be considered CMSs for our purposes too. 99% of you probably don’t care, and that’s a perfectly acceptable answer to give your firm.
What’s your budget? While most of us would probably prefer to spend zero, groceries continue to cost money, so none of us work for free. As of the writing of this article, a multi-page website built by a design firm will range between $10,000 and $30,000.
Want someone to “just take care of” all this website shenanigans for you? You can find us at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-29 12:07:06I’ve been on the internet since the mid 90s. Once I started “cyber-schooling” a few years later my time spent in front of a screen skyrocketed. One of the time vortices both for and outside of school was finding things on the internet. Everything from encyclopedia-style information pieces to news articles to music to games; the hunt was relentless.
Search engines were the primary was this was done. In the early days my school officially recommended Ask Jeeves, but the students found Google’s results much more thorough. Us little scientists-in-training were even running parallel searches, recording outcomes, and sharing results. We eventually got in trouble for wrongthink...I mean...not following instructions, but were vindicated soon after when the school's recommendations changed to "use whatever search engine you like, as long as the results chosen are quality sources".
The problem of “how to find things on the internet” has recently returned. “Google it” is no longer the genericized verb it once was. Grand tomes and PHD theses have been written on the subject of why, but most point to motives and monetization. The original problem was finding things, and the solution was search. But how would the bills get paid? Computers are expensive! Printing newspapers is expensive too, and the solution was the same for both: sell advertising space. Unfortunately for us users, that has become the primary business for much of the internet. Search engines are no longer motivated to get you the results you’re looking for as quickly as possible, but to keep you on their platform looking at ads. Pundits have coined the term “enshittification” (which even has it’s own Wikipedia page now) to describe the phenomenon.
Worry not, for not all is lost! There are still ways to find things on the internet. Methods vary depending on what kind of things you’re looking for. One of my most common searches is for how to do things; everything from home repairs to mechanical to technology. My primary method for this is to use Google to search Reddit. Reddit is a massive collection of forums with almost two decades of human-generated content. Unfortunately it’s built-in search is mostly terrible, so that’s where Google comes in. Do the same Google search you’d normally do (say, “how to fix a squeaky door”), but add “site:reddit.com” to the end. This tells Google to only show results from Reddit. What you’ll get is forum threads and comments from (mostly) real humans with real human experiences. Of course humans and their commentary can still be deeply flawed, so stay skeptical of what you read, but it’s largely a much better experience than a naked Google search.
Less mainstream search engines are trying their hands at paid subscriptions as a way to avoid the advertising hell-spiral. Kagi is one I’ve been trying, though admittedly not as often as I should. They do have a free tier if you want to sample it.
A more high-tech solution is AI systems. ChatGPT recently released a tool specifically for internet searches, though their general prompt tool has been usable for this for a while. Kagi also has an AI-powered search tier. Both are pretty expensive for casual users though.
Another recommendation is to frequent interest or topic-specific forums and blogs. If you find yourself regularly needing vehicle repair tips, try joining a forum on the subject. Same goes for most other do-it-yourself tasks. You may even make some internet friends! Blogs are also a great way to find things and get connected to experts (shameless plug fully intended).
Lastly, some interesting things are happening on the Nostr protocol that could help bring information together without the commercial overreach. (See “Become Unbannable” for more on Nostr.) I’ve been using a site called Zap Cooking (https://zap.cooking) to browse recipes. Recipes here are Nostr notes (posts) that have been formatted and categorized, and can be commented on, rated, and tipped, all using the free and open Nostr protocol. No algorithms, no banks, no governments, and no ads!
Want help with or training on finding things on the internet? You can find us at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-29 12:03:23“Sam did it!” You can hear the edge in the child’s voice as they attempt to shift blame for whatever minor misdeed they may-or-may-not have masterminded. In the court of humanity our feelings take wide precedence over objective justice. Even if there’s no fallout or formal punishment for that thing we did wrong, we really don’t like taking the blame.
Personal responsibility isn’t only about taking blame for the negative. As we’ll define it for the purposes of this article, it means taking ownership of decisions you make and the actions you take based on them. By extension you will also be taking ownership of the outcomes, both the successes and failures. Your mind is probably already imagining all sorts of scenarios this could apply to both at work and at home, but our focus will be mostly in the workplace.
Imagine working in a utopia where everyone perfectly executes personal responsibility. You would never have to worry about someone blaming you for the failure of their project, because it’s their project. You would know in advance that if your project is a success you’ll get 100% of the accolades, because it’s your project. With these two things alone, wouldn’t you feel a new level of motivation to give it your all? To take risks and innovate? You would have a new level of trust in your coworkers too. There would be no motive for micromanagement, for doing so would mean taking someone else’s responsibility upon yourself. Morale and productivity would skyrocket!
You can easily imagine the opposite as well; you may have thought of your own workplace in a negative light as soon as you read the title and clicked the link. Unfortunately in I.T. (being a panoptic presence in most organizations) we’re an easy target. “I can’t work, my computer’s broken, and I.T. hasn’t fixed it yet! They’re so slow, am-I-right?” “The file deleted itself; stupid computers!” “It’s not my fault that we didn’t deliver on time; the printer’s broken and it’s not my job to fix it!” sigh Enough gloom, let’s move on to how to make personal responsibility great again!
It's a simple concept; remind yourself that our decisions are ours, our actions are ours, and the results are ours. No exceptions. I’ll give you an example. When my wife and I are travelling somewhere it’s usually up to me to decide where to eat. I’m usually driving, and I’m also the head of our household, so it’s my decision. My decision, my actions, and most importantly, my results to own. If I choose a place and my wife doesn’t like the ambiance or menu or amount of cheese they put on everything, that’s on me. The weight can be heavy and feel unjust. But it isn’t unjust. It’s perfectly, objectively just. It’s my decision, my actions, and my results to own. There are upsides for both of us; I am now further motivated to pick someplace I know she’ll like and she gets to play “Passenger Princess”, and I get to bathe in the social bragging rights of being crowned “King of the Husbands” for being intuitive and attentive enough to know what she’d like and get it for her. It’s timeless and primordial: “Oh husband, you hunted and brought back a mammoth! I love mammoth steak! You are brave and strong and clearly the greatest of all husbands!” Her words would eco through our cave commune and all would look to us for hot tips to share on their relationship blog cave paintings.
You might still be thinking of your workplace and your coworkers who seem to want to blame you for everything that goes wrong. What can you do to get them on the personal responsibility train? The only way to do it is to lead by example. The moment you try to tell them or make them they’ll see it as an attack and blame you, which is exactly the problem you’re trying to avoid! You can’t suggest it, hint at it, or leave an anonymous note. You can’t have someone else talk to them about it or send this article and say, “I read this and thought it was interesting and thought you would think it’s interesting too.” This only way to teach others about personal responsibility is to show them. Which makes me writing this massively ironic. I take full responsibility for this!
My last tip is to make sure to celebrate the wins, both yours and other’s! This is especially true for others you’re trying to influence. Remember the accolades we imagined getting earlier and how much that would motivate you? That’s what you’re trying to instill in others. Positive reinforcement is much stronger than negative, so hand your praises out like candy!
Want to go against my recommendations and bring me into your workplace to talk about personal responsibility? You can find us at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-29 12:00:27The Americans just had a big election, and Canada’s next has been effectively underway for a while now. Automated moderation systems are being increasingly relied upon by large social media networks and are running amok with bans (I may be biased on this one, see “The Technology Deleted Me”). Opinions are everywhere, and many social media users live in fear of getting booted from their platform of choice over an innocuous post. “Of choice” usually being where the largest concentration of their connections also have accounts. For me that’s Facebook; for others it might be Instagram, Snapchat, Bluesky, or X.
What if there was a social media network built in such a way that you couldn’t be banned? Where your posts couldn’t be removed? Where you couldn’t be “put in the corner” by a group admin who didn’t like that the recipe page you shared had the word “crap” in it? Wouldn’t that be great? Yes, this does mean extreme (or straight-up illegal) content could be posted, but that’s happening on mainstream social media as well. Monitoring and banning isn’t working there so there’s no reason to repeat it elsewhere.
The unbannable social media I’m bringing to you today is called “Nostr”; "Notes and Other Stuff Transmitted by Relays”. How it works is explained in the name; notes (posts) are transmitted from a client (app on your device) to relays (servers) which are then transmitted to other relays and clients connected to them. I’ll explain in more detail as we go through the setup process.
Step 1: Pick a client. I like Damus on iOS and noStrudel on desktop. Nostur is also popular on iOS. Amethyst and Primal are popular on Android. Pick the one you most like the look of.
Step 2: Set up an “account”. On Nostr you won’t have an account in the traditional sense. You’ll instead have a public/private key set (also known as a keypair). Think of your public key as your username and your private key as your password; only you won’t need to pick, memorize, or regularly use either of them. Your client will do most of that for you. Install the app of your choosing, launch it, and you’ll be walked through the account creation process. I strongly recommend copying your public key (the long random string that starts with “npub”) and your private key (the long random string that starts with “nsec”) to a password manager (see “Ugh, Passwords!” for more on password managers).
Optional: Step 2.5: Set up your “NIP-05 identifier”. This is totally optional, and can be done later if you aren’t up for it right now. A NIP-05 identifier looks identical to an email address (
name@domain.something
) and is used as an easier way for others to find your profile. There are several free and paid services for this, most of which come with other benefits and services. A popular free one is Nostrcheck.me.Step 3: Choose some relays. Most clients will have a pre-configured set of public relays that work fine for most users. If you think of yourself as just a normal person trying to not be banned, you can skip this step. For everyone else, reach out to me for recommendations. A whole ‘nother article could be written on the subject of relays for niche needs.
Step 4: Find friends to follow. You can start with me if you like, by searching for my public key (
npub1kw893e70hve5ymc8kxr75d8m9wcuaaasqzn37xvea6l4f39q04fs7zusa4
), or my NIP-05 (tnperron@nostr.theorangepillapp.com
).Optional: Step 5: Post something! Also totally optional, but highly recommended! Even a simple “Hello, world!” will let others visiting your profile know that your account is being actively used.
That’s it, you’re now unbannable! How, you ask? There are two keys to this (pun fully intended). The first is that your public/private keypair is yours to control, can be loaded into any client, and used to connect to any relay (though you may need to pay for access to some). The second is that if someone operating a relay decides they don’t want to relay your posts anymore, you can still use any other on the big wide internet. You can even run your own relay if you want! No one can stop you!
Want help with any of these steps, or more details on advanced options like running your own node? You can find us at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-29 11:50:52The internet has had tutorials for job applications for a while; I remember searching for and reviewing them as part of “Career and Life Management (CALM)” in grade school. But it still never hurts to go back to the basics!
Applications fall into two categories; what I’ll call “human-read” and “machine-read”. Machine-read applications are specifically designed for automated recruitment systems. These systems tend to require specific layouts and formatting, as well as focus on keywords and academic degrees (even if the job doesn’t require them). They don’t read very well for humans though. I’d also argue that you probably don’t want to work for an employer who uses such systems, but that’s a separate topic. Human-read applications are as the name suggests; applications designed for human review. Those are the type we’re going to focus on today.
Our goals with our application are going to be to maximize the chances the receiver (usually a receptionist, HR staff, or recruiter) will pass along our application to the decision maker (usually HR staff or interview panel member) who will shortlist you for an interview, and to convey all the relevant information to the interview panel before your interview. We’re going to do this by creating a cover letter and resume combo that is unique, but also follows a professional format.
Let’s start with the page template we’re going to use for both documents. Start with a blank page. In the header in the upper left corner, list your name, email, and town & province. Make your name 5 to 8 font sizes larger than the rest, and bold if the font needs more pop. In the upper right corner, write yourself a short byline that would make a Madison Avenue advertising executive proud. Workshop it with your friends or family, but don’t worry about spending too much time on it. Mine says “Process management, Results through consistent and conscientious excellence”. The idea is to have your audience say to themselves, “ooo, that sounds professional”, then move on. Make the first line the same font size as your name. Next, add a splash of colour or some basic shapes as a background to the header. Pick a maximum of two colours and a minimalist geometric design. Make sure it’s simple; if it’s too busy it’ll look like a primary school art project. Again, you want your audience say to themselves, “ooo, that looks professional”, then move on. Now go to the first line in the body of the document and type “title”, then go to the third line and type “body”. Make the title font the same size as your name in the header, and change it to the primary colour of your header background. Finally, save two separate copies of this file; one labelled “your name resume” and the other labelled “your name cover letter”.
Congratulations, the design part is over! If you’re like me, that was the hard part. On to the content! Open the cover letter document. Change the title text to “To:”. Go to the body line and paste in the following. For the listeners, you can find the text to be copied in the written version of this post on our website.
``` Receiver name Receiver email Receiver title Receiver organization Receiver city, province
Submission date
Greeting, Paragraph 1: Brief personal introduction and job being applied for. Paragraph 2: Brief professional introduction, framed as how you would be a good fit for the organization. Paragraph 3: Extended professional introduction, framed as how you be a good fit for this specific job. Paragraph 4: Three to four questions you would have for the interview panel if you were chosen to be interviewed. Paragraph 5: Follow-up and interview availability. Sign-off and signature. ```
Congratulations, you now have your own personalized cover letter template! Simply replace the placeholder and instruction text with the real thing. Five paragraphs may seem like a lot, but if you’re sufficiently brief (as you should be), the whole thing should fit on a single page. If it spills over, rework the paragraph text until it does. Turning to a second page has an ethereal effect that will make your cover letter feel like “too much”. It’s purely emotional and subconscious, but it’s real and to be avoided if you want to make a good first impression, which is your cover letter’s primary purpose!
Save and close, and open the resume. Center the title on the page and change the text to “Executive Summary”. Move to the body and paste the following. Again, for the listeners, you can find the text to be copied in the written version on our website.
``` First highlighted skill category or character trait paragraph. Two to three sentences. Second highlighted skill category or character trait paragraph. Two to three sentences. Third highlighted skill category or character trait paragraph. Two to three sentences. Bulleted list of three to six specific soft skills.
Centered title: Professional or Work Experience (choose one) Employer - City, Province - years worked (i.e. 2015-2020 or 2022-current) Job title Two to three item bulleted list summarizing duties. Can be written long form, but be brief. (copy this as many times as needed)
Centered title: Education, Certifications, & Training (remove words that don’t apply to you) Title Certifying or training body name, City, Province (copy this as many times as needed)
Centered title: Proficiencies Bulleted list of five to ten specific hard skills. Do not repeat from soft skills above.
Centered title: Volunteer & Civic Affiliations (if you have none, use Hobbies) Bulleted list, no more than six items. ```
Same as the cover letter, replace the placeholder and instruction text with the real thing. The whole resume should fit on two pages. If it spills over, the first thing you can reduce is the number of work experience sections. You don’t need to include your entire work history, but it is best to not leave gaps if you can. We’re at the final step. The home stretch. You can do it! I believe in you! We’re going to export both documents as PDFs, then print copies, and inspect for errors or issues. “Why the PDFs and printing?” you ask? PDFs are the universal document format (see my previous post on the subject, “What is a PDF?”), and the interview panel will most likely want to print copies for themselves for the interview. Printing a copy for yourself will allow to you make sure everything looks good on paper as well as on a screen. You’re going to take your copy with, as well as a printed copy of the job posting, to use as a reference during your interview. No matter how well you think you know the material, it’s always good to have a reference. Physically referencing these documents during the interview will also help you look prepared and factual. What sounds better, “I thought the job posting said 40 hours per week?...”, or “here, in the second paragraph, the job posting says 40 hours per week”?
Want help with your job application? Or assistance with interviewing potential employees? You can find us as scalebright.ca.
-
@ 592295cf:413a0db9
2025-03-29 10:59:52The journey starts from the links in this article nostr-quick-start-guide
Starting from these links building a simple path should not cover everything, because impossible.
Today I saw that Verbiricha in his workshop on his channel used nstart, but then I distracted And I didn't see how he did it.
Go to nstart.me and read: Each user is identified by a cryptographic keypair Public key, Private key (is a lot of stuff)
You can insert a nickname and go, the nickname is not unique
there is a email backup things interesting, but a little boring, i try to generate an email
doesn't even require a strong password ok.
I received the email, great, it shows me the nsec encrypted in clear,
Send a copy of the file with a password, which contains the password encrypted key I know and I know it's a tongue dump.
Multi signer bunker
That's stuff, let's see what he says.
They live the private key and send it to servers and you can recompose it to login at a site of the protocol nostr. If one of these servers goes offline you have the private key that you downloaded first and then reactivate a bunker. All very complicated. But if one of the servers goes offline, how can I remake the split? Maybe he's still testing.
Nobody tells you where these bunkers are.
Okay I have a string that is my bunker (buker://), I downloaded it, easy no, now will tell me which client accepts the bunker.. .
Follow someone before you start?
Is a cluster of 5 people Snowden, Micheal Dilger, jb55, Fiatjaf, Dianele.
I choice Snowden profile, or you can select multiple profiles, extra wild.
Now select 5 clients
Coracle, Chachi, Olas, Nostur, Jumble
The first is Coracle
Login, ok I try to post a note and signing your note the spin does not end.
Maybe the bunker is diffective.
Let's try Chachi
Simpler than Coracle, it has a type login that says bunker. see if I can post
It worked, cool, I managed to post in a group.
Olas is an app but also a website, but on the website requires an extension, which I do not have with this account.
If I download an app how do I pass the bunker on the phone, is it still a password, a qrcode, a qrcode + password, something like that, but many start from the phone so maybe it's easy for them. I try to download it and see if it allows me to connect with a bunker.
Okay I used private-qrcode and it worked, I couldn't do it directly from Olas because it didn't have permissions and the qrcode was < encrypted, so I went to the same site and had the bunker copied and glued on Olas
Ok then I saw that there was the qrcode image of the bunker for apps lol moment
Ok, I liked it, I can say it's a victory.
Looks like none of Snowden's followers are Olas's lover, maybe the smart pack has to predict a photographer or something like that.
Okay I managed to post on Olas, so it works, Expiration time is broken.
As for Nostur, I don't have an ios device so I'm going to another one.
Login with Jumble, it works is a web app
I took almost an hour to do the whole route.
But this was just one link there are two more
Extensions nostr NIP-07
The true path is nip-07-browser-extensions | nostr.net
There are 19 links, maybe there are too many?
I mention the most famous, or active at the moment
- Aka-profiles: Aka-profiles
Alby I don't know if it's a route to recommend
-
Blockcore Blockcore wallet
-
Nos2x Nos2x
-
Nos2xfox (fork for firefox) Nos2xfox
Nostore is (archived, read-only)
Another half hour to search all sites
Nostrapps
Here you can make paths
Then nstart selects Coracle, Chachi, Olas,Nostur and Jumble
Good apps might be Amethyst, 0xchat, Yakihonne, Primal, Damus
for IOS maybe: Primal, Olas, Damus, Nostur, Nos-Social, Nostrmo
On the site there are some categories, I select some with the respective apps
Let's see the categories
Go to Nostrapps and read:
Microbbloging: Primal
Streaming: Zap stream
Blogging: Yakihonne
Group chat: Chachi
Community: Flotilla
Tools: Form *
Discovery: Zapstore (even if it is not in this catrgory)
Direct Message: 0xchat
-
@ 0b65f96a:7fda4c8f
2025-03-29 10:39:17Es gibt Bibliotheken voll Literatur zur „Kunst“ der Kriegsführung. Dies hier ist ein Beitrag zu den Bibliotheken der Kunst Frieden zu führen. Denn Frieden ist nicht die Abwesenheit von Krieg. Sondern eine mindestens ebenso intensive Aktivität. Worin genau besteht sie aber? Ich glaube darin, weder nach der einen noch nach der anderen Seite vom Hochseil zu fallen. Denn vom Hochseil kann man immer nach zwei Seiten fallen. Das ist dann auch schon die Kernherausforderung: Gleichgewichthalten!
Es scheint zunächst ein ganz äußerlicher Auftrag. Es gibt immer und wird immer widerstreitende Interessen geben. Allerdings ist das nur die äußerste Zwiebelschale. Denn wenn wir die Sache etwas mit Abstand von uns selbst betrachten, werden wir in uns hinein verwiesen: Frieden kann nur von innen nach außen gestiftet werden. Wenn wir das Hochseil in uns suchen, was finden wir dann? – Zweifels ohne, wissen wir von uns, dass wir nicht jeden Tag unser bestes Selbst sind. Würde es sich nicht lohnen etwas genauer über die Möglichkeit nach zwei Seiten vom Hochseil zu fallen nachzudenken, zugunsten der eigenen Balancierfähigkeit?
Wir sind daran gewöhnt zu denken dem Guten steht das Böse gegenüber. Daraus ziehen ja alle Western und Martial Arts Streifen ihren Plot: Der Gute bringt den Bösen um die Ecke und damit hat wieder mal das Gute gesiegt. Wir bewerten das „um die Ecke bringen“ unterschiedlich, je nach dem, von wem es kommt.
Ich möchte einen neuen Gedanken vorschlagen über unser Inneres, über Gut und Böse nachzudenken. Denn, wie gesagt, vom Hochseil kann man nach zwei Seiten fallen. Und es hat immer drastische Wirkung. Wo kommen wir also hin, wenn wir sagen: Frieden ist immer ein Gleichgewichtszustand, ergo eine Zeit der Mitte?
Sagen wir Toleranz ist ein erstrebenswertes Ideal. Dann würden wir sicher sagen Engstirnigkeit ist das Gegenteil davon und alles andere als Wünschenswert. Ja, so ist es gewiss. Und es bleibt hinzuzufügen, auch Beliebigkeit ist das Gegenteil von Toleranz. Denn es gibt eine Grenze, wo Toleranz nicht mehr Toleranz ist, sondern Beliebigkeit, ein „alles ist möglich“. Ähnlich können wir es für Großzügigkeit denken: Großzügigkeit ist ein erstrebenswertes Ideal. Ihr Gegenteil ist Geiz. Ihr anderes Gegenteil die Verschwendung. Oder Mut. Mut ist ein erstrebenswertes Ideal. Feigheit sein Gegenteil. Sein anderes Gegenteil ist Leichtsinn. Mit andern Worten: Das Ideal wird immer zum Hochseil. Und wir können immer nach zwei Seiten von ihm fallen. Wenn wir diesem Gedanken folgen, kommen wir weg von der Gut-Böse-Dualität. Und stattdessen zur Frage nach dem Gleichgewicht. Zur Frage nach der Mittezeit.
Natürlich steht es uns frei all das zu denken. Oder auch nicht zu denken. Denn selbstverständlich ist es möglich es nicht zu denken und bei einer Dualitätsvorstellung festhängen zu bleiben. Es wird uns nur nicht helfen Frieden zu denken und in Frieden zu handeln. Wenn wir wollen können wir durch das Aufspannen einer Trinität einen neuen Raum eröffnen und betreten. In ihm wird Frieden aktiv führbar, denn er wird eine Gleichgewichtssituation in uns selbst! – Nicht eine, sich einander gegenüberstehender äußerer Mächte!
Gehen wir noch einen Schritt weiter in unserer Betrachtung, können wir feststellen, dass es durchaus einen Unterschied macht nach welcher Seite wir runter fallen. Denn auf der einen Seite ist es immer eine Verengung: Engstirnigkeit, Geiz, Feigheit in unseren Beispielen. Auf der anderen ist es immer eine Zersplitterung oder Versprühung. In unseren Beispielen Beliebigkeit, Verschwendung und Leichtsinn. Und das erstrebenswerte ist eben immer die Mitte, das von uns ständig aktualisierte Gleichgewicht.
Das interessante ist, wo diese Mitte liegt, lässt sich niemals statisch festlegen. Sie ist immer dynamisch. Denn sie kann zu unterschiedlichen Momenten an unterschiedlicher Stelle liegen. Es ist immer ein Ich, das sich in Geistesgegenwart neu ausbalanciert. Und darum ist Frieden so schwer. Wir werden ihn niemals „haben“, sondern ihm immer entgegen gehen.
Der Kriegsruf ist nichts anderes, als ein Versuch von denen, die vom Hochseil gefallen sind, uns auch herunter zu kicken.
Netter Versuch. Wird aber nichts!
In der Nussschale: Die Dualität auflösen in die Trinität der balancierenden Mitte zwischen der Geste der Versteinerung und der Geste des Zerstäubens oder Zersplitterns. Die dynamische Qualität der Mitte bemerken. Oder, tun wir es nicht, ist das gleich der erste Anstoß, der uns wieder zum Wackeln bringt. Und des Ich´s gewahr werden, das balanciert. Frieden führen ist eine Kunst.
Patric I. Vogt, geb. 1968 in Mainz. Autor von „Zukunft beginnt im Kopf Ein Debattenbeitrag zur Kernsanierung von Rechtsstaat und Demokratie“. Lebt als freischaffender Künstler, Lehrer und Unternehmer. Über drei Jahrzehnte Beschäftigung mit dem Ideenfeld soziale #Dreigliederung und Anthroposophie. Moderation und Mediation von sozialen Prozessen und Organisationsentwicklung. Staatlich ungeprüft, abgesehen von den Fahrerlaubnissen zu Land und zu Wasser. Motto: Gedanken werden Worte, werden Taten! www.perspektivenwechsel.social
-
@ 6919d8ac:737b2c45
2025-03-29 09:49:41A NNNBET se destaca como uma das plataformas mais inovadoras e confiáveis do mundo das apostas online. Com uma interface moderna, uma ampla gama de opções de jogos e uma experiência do usuário totalmente imersiva, a NNNBET tem conquistado jogadores de diferentes partes do mundo. Se você está em busca de uma plataforma segura, divertida e com diversas possibilidades de entretenimento, continue lendo para descobrir o que torna a NNNBET uma das melhores escolhas para apostas online.
Apresentando a NNNBET: A Nova Fronteira das Apostas Online A NNNBET é uma plataforma de apostas online que foi cuidadosamente desenvolvida para proporcionar aos jogadores uma experiência sem igual. Seu design intuitivo e acessível garante que até os iniciantes consigam navegar facilmente e acessar suas opções de jogos e apostas preferidas. O objetivo da NNNBET é oferecer a melhor experiência possível a todos os tipos de jogadores, garantindo que, independentemente do seu nível de experiência, você tenha acesso a jogos emocionantes, seguros e fáceis de usar.
A plataforma é otimizada para dispositivos móveis, permitindo que você jogue a qualquer hora e em qualquer lugar. A NNNBET tem um compromisso com a conveniência, oferecendo uma plataforma responsiva que se adapta perfeitamente a smartphones e tablets, para que os jogadores possam aproveitar os jogos em qualquer momento.
Além disso, a nnnbet adota medidas de segurança avançadas para proteger seus usuários. Com protocolos de criptografia de última geração e sistemas de proteção de dados, a plataforma garante que todas as transações e informações pessoais dos jogadores permaneçam seguras. Isso cria um ambiente confiável e seguro, onde os jogadores podem se concentrar exclusivamente em aproveitar a experiência de jogo sem preocupações.
Jogos Oferecidos: Diversão para Todos os Gostos A NNNBET se diferencia por sua vasta gama de opções de jogos, tornando-se uma plataforma ideal para todos os tipos de jogadores. Seja você fã de jogos de mesa tradicionais ou de apostas em eventos esportivos, a NNNBET tem algo para você.
Para os entusiastas de jogos de mesa, a plataforma oferece uma variedade de opções, como roletas, blackjack, e diferentes versões de jogos de cartas. Todos os jogos são projetados para proporcionar uma experiência de jogo divertida e imersiva, com gráficos de alta qualidade e uma jogabilidade fluida. As opções são atualizadas regularmente, garantindo que os jogadores sempre tenham algo novo para explorar.
A NNNBET também é excelente para quem gosta de apostar em esportes. A plataforma oferece uma vasta seleção de eventos esportivos para apostas, incluindo futebol, basquete, tênis, e até e-sports, permitindo que os jogadores façam previsões e apostem nos resultados dos seus esportes favoritos. As odds são constantemente atualizadas, proporcionando uma experiência dinâmica e envolvente, com uma grande variedade de opções para personalizar suas apostas.
Se você procura uma experiência mais interativa e emocionante, a NNNBET oferece jogos ao vivo. Esses jogos permitem que os jogadores se conectem com dealers reais e participem de jogos de forma dinâmica e envolvente. A transmissão ao vivo de alta qualidade proporciona uma experiência mais autêntica, replicando a emoção de um ambiente físico de jogo, mas com a conveniência do online.
A Experiência do Jogador: O Que Torna a NNNBET Única O foco da NNNBET é a experiência do jogador, e isso é evidente em cada aspecto da plataforma. A interface é projetada para ser simples e direta, facilitando a navegação entre os diferentes tipos de jogos. As opções são bem organizadas, permitindo que os jogadores encontrem rapidamente seus jogos favoritos ou explorem novas opções com facilidade.
Além disso, a plataforma oferece uma excelente experiência de atendimento ao cliente. O suporte está disponível 24 horas por dia, sete dias por semana, garantindo que os jogadores possam resolver quaisquer dúvidas ou problemas rapidamente. O atendimento ao cliente pode ser acessado por chat ao vivo, e-mail ou telefone, com uma equipe dedicada e treinada para oferecer respostas rápidas e soluções eficazes.
Outro diferencial da NNNBET são as promoções e bônus que ela oferece. A plataforma oferece ofertas de boas-vindas para novos jogadores e promoções contínuas para os jogadores fiéis, garantindo que todos tenham a chance de aumentar suas chances de ganhar e explorar novos jogos. Esses bônus ajudam a aumentar a diversão e a empolgação durante a jornada de apostas.
A NNNBET também leva a sério a responsabilidade social nas apostas. A plataforma oferece ferramentas de autoexclusão e limites de apostas para ajudar os jogadores a manter o controle e a praticar apostas responsáveis. A NNNBET se preocupa com o bem-estar de seus usuários, criando um ambiente de jogo saudável e equilibrado.
Conclusão A NNNBET é uma plataforma de apostas online que se destaca pela sua facilidade de uso, segurança, diversidade de jogos e compromisso com a experiência do jogador. Se você está à procura de uma plataforma confiável, com uma ampla gama de jogos e uma experiência de apostas imersiva, a NNNBET é uma excelente escolha. Com uma interface intuitiva, promoções atraentes, e um atendimento ao cliente de qualidade, a NNNBET oferece tudo o que você precisa para se divertir e ter uma experiência única no mundo das apostas online.
-
@ 866e0139:6a9334e5
2025-03-29 09:31:35
Autor: Thomas Eisinger. Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier.**
Und genau dafür wirst auch du gedrillt werden: Menschen zu jagen und töten. Unbekannte, die auch nicht wissen, was sie hier tun. Oder Unschuldige, die nicht rechtzeitig fliehen konnten. Einfach töten. Alle. Ohne zu fragen. Denn das ist deine Aufgabe, Soldat: Töte Menschen!
Egal, was du vorher warst, Heizungsmonteur, KFZ-Mechaniker, Veganer, Marketingmanager, Friseur, Verkäufer, Kindergärtner: Es ist egal. Jetzt musst du töten. Denn du hast mitgemacht. Entweder, weil du es nicht ernst genommen hast, weil du dich nie für Politik interessiert hast. Oder weil du gedacht hast, das alles betrifft dich nicht. Weil du gedacht hast, Wahlen könnten etwas verändern. Oder weil du immer das Maul gehalten hast, damit dich keiner als «Rechter» bezeichnet. Egal. Jetzt musst du töten. Das ist das Spiel.
Ja, es ist ein Spiel. Grausam, abartig, menschenverachtend. Dennoch hat es Regeln: Diejenigen, die das Spiel beginnen, müssen niemals selbst auf das Schlachtfeld. Das ist die erste Regel. Ihre Söhne auch nicht, nicht die Söhne der anderen Politiker, nicht die der EU-Abgeordneten, nicht die der Parteibonzen. Auch nicht die der Banker, der Vorstandsvorsitzenden, der Chefredakteure. Denn alle wissen, wie man das Spiel spielt. Nur du nicht.
Du bist einfach eine Figur auf dem Spielfeld, die es verpasst hat, NEIN zu sagen, als noch Gelegenheit war. Jetzt bist du verwandelt worden in eine menschliche Drohne. Wenn sie sagen: töte!, dann tötest du. Denken kannst du, wenn alles vorbei ist. Falls du je wieder nach Hause kommst. Vielleicht sogar mit beiden Beinen und beiden Armen. Vielleicht auch nicht. Egal. Wer hätte Mitleid mit einer Spielfigur?
Nein, du musst töten. Das ist deine Aufgabe. Sie sagen es nun schon seit Monaten, warum glaubst du es nicht? Sie meinen es ernst. Wenn du den Brief in Händen hältst ist es zu spät. Es gilt dann das Notstandsrecht und keiner kann mehr verweigern. Da hättest du dich vorher drum kümmern müssen. Oder auf eine Demo gehen. Oder laut und mit klarer Stimme in jedem Gespräch den Wahnsinn anprangern. Hast du aber nicht.
Jetzt musst du töten oder du wirst getötet. Das ist das Spiel. Du hättest selbst denken können. Hast du aber nicht. Hast deine Zeit mit sinnlosen Videos vertan, Netflix geguckt und hast Influencerinnen geliked. Die müssen nicht an die Front. Aber du. Morgen, wenn du aufstehst, die Uniform anziehst und rausgehst, dann wirst du Befehle ausführen oder erschossen werden. Also wirst du Menschen töten. Dein Leben wird nie wieder so sein, wie zuvor. Dein Schmerz, deine Schuld, dein Leid: sie gehen ein in die unendliche Reihe der Soldaten, die seit Jahrhunderten dasselbe Schicksal erlitten. Deren Schreie noch immer durch den ewigen Raum hallen. Deren Opfer von den Herren des Spiels mit einem Lächeln entgegengenommen wurde. Deren Gliedmaßen auf den Schlachtfeldern liegen geblieben waren. Zum Dank erhielten sie eine Medaille. Ein Stück Blech für den rechten Arm, einen Grabstein für den Vater, den Bruder, den Sohn. Für das Vaterland. Für Europa. Für die Demokratie. Der Hohn tropft aus jedem Politikerwort, doch die Menschen glauben noch immer die uralte Geschichte von Freund und Feind, von Gut und Böse.
\ Wer nicht aufwachen will, muss töten. Du. Nicht am Bildschirm. In der echten Welt. Wo man nicht auf Replay drücken kann. Wo man den Gegner nicht nach links oder rechts swipen kann, denn er ist echt, real, lebendig. Noch. Entweder er oder du. Jetzt ist es zu spät für Entscheidungen. Kannst du es spüren? Die Work-Life-Balance wird zur Kill-or-be-killed-Balance. Es gibt kein Entrinnen. Denn du hast mitgemacht. Schweigen ist Zustimmung. Sich-nicht-drumkümmern ist Zustimmung. Kriegsparteien zu wählen ist noch mehr Zustimmung.
Heute.
Heute lässt sich noch etwas ändern.
Es hat nichts zu tun mit rechts oder links. Nur mit Menschlichkeit versus Hass, Macht und dem ganz großen Geld. Das sind die Gründe, für die du töten oder sterben musst.
Wie entscheidest du dich?
Thomas Eisinger ist Schriftsteller. Zuletzt erschien der Roman "Hinter der Zukunft". Mehr zum Autor hier.
DIE FRIEDENSTAUBE FLIEGT AUCH IN IHR POSTFACH:
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt, vorerst für alle kostenfrei, wir starten gänzlich ohne Paywall. (Die Bezahlabos fangen erst zu laufen an, wenn ein Monetarisierungskonzept für die Inhalte steht).
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Bildschirmfoto 2025-03-27 um 09.53.46
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: milosz@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ 57d1a264:69f1fee1
2025-03-29 09:31:13"THE NATURE OF BITCOIN IS SUCH THAT ONCE VERSION 0.1 WAS RELEASED, THE CORE DESIGN WAS SET IN STONE FOR THE REST OF ITS LIFETIME." - SATOSHI NAKAMOTO
"Reborn" is inspired by my Bitcoin journey and the many other people whose lives have been changed by Bitcoin. I’ve carved the hand in the “Gyan Mudra” or the “Mudra of Wisdom or Knowledge,” with an Opendime grasped between thumb and index finger alluding to the pursuit of Bitcoin knowledge. The hand emerges from rough, choppy water, and I've set the hand against an archway, through which, the copper leaf hints at the bright orange future made possible by Bitcoin.
Materials: Carrara Marble, Copper leaf, Opendime
Dimensions: 6" x 9" x 13"
Price: $30,000 or BTC equivalent
Enquire: https://www.vonbitcoin.com/available-works
X: https://x.com/BVBTC/status/1894463357316419960/photo/1
originally posted at https://stacker.news/items/928510
-
@ 866e0139:6a9334e5
2025-03-29 08:51:57
Autor: Dr. Daniele Ganser. Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier.**
Der Frieden ist mir eine Herzensangelegenheit. Daher halte ich seit über 20 Jahren Vorträge zu den Themen Krieg und Frieden. Bisher sind es schon mehr als 1000 Vorträge. Manchmal gibt es Widerstand oder schlechte Presse, aber ich mache einfach weiter. Zudem schreibe ich Bücher, gebe Interviews und habe eine Online-Community, wo ich über Zoom Fragen der Mitglieder beantworte. Mein Ziel ist immer dasselbe: Die Friedensbewegung zu stärken.
https://www.youtube.com/watch?v=4rlSE4CYR_U
Auszug aus der Einleitung "Imperium USA":
"In meiner Forschung orientiere ich mich an folgenden drei Prinzipien: UNO- Gewaltverbot, Achtsamkeit und Menschheitsfamilie. Das UNO-Gewaltverbot wurde 1945 erlassen und verbietet die Androhung oder Anwendung von Gewalt in der internationalen Politik. Es ist leider in Vergessenheit geraten, und viele Menschen haben noch nie davon gehört. Daher erwähne ich es oft in meinen Büchern und Vorträgen, weil es ein ganz wichtiges Instrument der Friedensbewegung ist. Auch das Prinzip Achtsamkeit ist für die Friedensbewegung ein Juwel.
Denn zu oft schon wurden wir Menschen durch Kriegspropaganda getäuscht und verwirrt. Doch das wäre nicht nötig. Wenn wir durch Achtsamkeit lernen, unsere eigenen Gedanken und Gefühle aus einer ruhigen Distanz zu beobachten, stärken wir unsere Klarheit. Wir müssen nicht alles glauben, was uns von den Medien erzählt wird. Durch Achtsamkeit erkennen wir, dass wir nicht unsere Gedanken und Gefühle sind, sondern das klare Bewusstsein, in dem sie aufsteigen und wie Wolken auch wieder vergehen.
Besonders wichtig ist mir auch das Prinzip Menschheitsfamilie. Denn leider ist es in der Geschichte immer wieder vorgekommen, dass wir als Menschheitsfamilie einzelne Mitglieder ausgeschlossen und getötet haben. Wir haben uns entlang von Nationalität, Religion, Hautfarbe, Geschlecht und Einkommen gespalten und abgewertet. Bei der Hexenverfolgung wurden Frauen der »Zauberei« beschuldigt, aus der Menschheitsfamilie ausgeschlossen und verbrannt. Bei den Indianerkriegen wurden Indianer als »Wilde« aus der Menschheitsfamilie ausgeschlossen, vertrieben und getötet. Beim Sklavenhandel wurden Afrikaner als »Tiere« aus der Menschheitsfamilie ausgeschlossen, diffamiert und ausgebeutet. Im Zweiten Weltkrieg wurden Juden als »lebensunwert« aus der Menschheitsfamilie ausgeschlossen und in Konzentrationslagern vergast.
Im Vietnamkrieg wurden Vietnamesen von US-Soldaten als »Termiten« bezeichnet, aus der Menschheitsfamilie ausgeschlossen und mit Napalm bombardiert. Im sogenannten »Krieg gegen den Terror« wurden Afghanen als »Terroristen« bezeichnet, aus der Menschheitsfamilie ausgeschlossen und getötet. Das sich wiederholende Muster ist deutlich: Das Prinzip Menschheitsfamilie wird verletzt, indem eine Gruppe aus der Menschheitsfamilie ausgeschlossen, abgewertet und dann getötet wird. Natürlich sehen wir alleganz unterschiedlich aus. Auch bezüglich Glaube, Nationalität, Ausbildung, Sprache und Einkommen sind wir nicht gleich und werden es nie sein.
Doch das ist noch kein Grund, Gewalt einzusetzen. »Wir haben in der Welt ganz sicher ein Problem mit Feindseligkeiten, die außer Kontrolle geraten. Der Mensch ist geradezu ein Spezialist darin, andere auszugrenzen«, erklärt der holländische Zoologe Frans de Waal. »Der Mensch dämonisiert Menschen anderer Nationalität oder Religion, erzeugt Ängste und Wut. Diese Gruppen nennen wir dann schnell Unmenschen oder Tiere. Schon ist es leicht, die Unmenschen zu eliminieren, weil man kein Mitgefühl mehr mit ihnen haben muss.«
Im April 2004 wurde publik, dass US- Soldaten im irakischen Abu-Ghraib- Gefängnis Iraker gefoltert hatten. Die US- Kriegspropaganda hatte den US- Soldaten eingetrichtert, die Iraker seien schlechte Menschen, dadurch wurden sie aus der Menschheitsfamilie ausgeschlossen. Das hatte konkrete Folgen. Die US- Soldatin Lynndie England führte in Abu-Ghraib einen nackten irakischen Gefangenen an einer Hundeleine durchs Gefängnis. Ein anderer irakischer Gefangener musste mit schwarzer Kapuze auf einer Kiste balancieren, während an seinem Körper Drähte befestigt waren.
Ihm wurde von den US- Soldaten angedroht, dass ihm tödliche Stromschläge zugefügt würden, wenn er von der Kiste fiele. »Für Europa waren die Horrorbilder aus Sex, Folter und Erniedrigung schlichtweg ein Schock«, kommentierte Die Welt. Der Abu- Ghraib- Skandal zeigte drastisch, was passieren kann, wenn die Menschen einer ganzen Nation, in diesem Falle die Iraker, aus der Menschheitsfamilie ausgeschlossen werden.
DIE FRIEDENSTAUBE FLIEGT AUCH IN IHR POSTFACH!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt, vorerst für alle kostenfrei, wir starten gänzlich ohne Paywall. (Die Bezahlabos fangen erst zu laufen an, wenn ein Monetarisierungskonzept für die Inhalte steht). Sie wollen der Genossenschaft beitreten oder uns unterstützen? Mehr Infos hier oder am Ende des Textes.
Man darf angesichts dieser Gewalt und Brutalität nicht zu dem Schluss kommen, dass wir Menschen nicht fähig sind, friedlich zusammenzuleben. Wir können es sehr wohl und tun es jeden Tag, an Millionen verschiedenen Orten. »Lassen sie uns zunächst unsere Haltung gegenüber dem Frieden selbst überprüfen. Zu viele von uns halten ihn für unmöglich", erklärte US-Präsident John F. Kennedy in einer seiner Reden.
»Zu viele von uns halten ihn für nicht zu verwirklichen. Aber das ist ein gefährlicher, defätistischer Glaube. Er führt zu der Schlussfolgerung, dass der Krieg unvermeidlich ist, dass die Menschheit zum Untergang verurteilt ist, dass wir uns in der Gewalt von Kräften befinden, die wir nicht kontrollieren können.«
Doch dies stimmt nicht, das wusste auch Kennedy. »Unsere Probleme sind von Menschen geschaffen, deshalb können sie auch von Menschen gelöst werden. Die Größe, die der menschliche Geist erreichen kann, bestimmt der Mensch selbst.«
Auch außerhalb der USA haben inspirierende Persönlichkeiten die Friedensbewegung geprägt. In Indien hat der Rechtsanwalt und Pazifist Mahatma Gandhi, der für mich ein großes Vorbild ist, immer wieder das Prinzip Menschheitsfamilie betont. »Die ganze Menschheit ist eine Familie«, sagte Gandhi. Er setzte bei seinem Protest stets auf einen gelassenen und freundlichen Ton, frei von Wut und Hass. Trotz ihres brutalen Vorgehens bezeichnete Gandhi weder die indische Polizei noch die indische Regierung oder die britische Kolonialmacht als Feinde. »Ich betrachte niemanden als meinen Feind«, erklärte Gandhi. »Alle sind meine Freunde. Ich möchte aufklären und die Herzen verändern.«
Ich bin fest davon überzeugt, dass die Friedensbewegung im 21. Jahrhundert stärker wird, wenn sie sich an den Prinzipen Menschheitsfamilie, Achtsamkeit und UNO- Gewaltverbot orientiert. Die Spaltung nach Nation, Partei, Religion, Hautfarbe, Geschlecht, Schulabschluss oder Einkommen sollte im 21. Jahrhundert durch die Einsicht ersetzt werden, dass alle Menschen zur Menschheitsfamilie gehören. Sie als Leserin und Leser gehören zur Menschheitsfamilie, egal wo Sie diesen Text lesen und unabhängig davon, was Ihre Geschichte ist. Und ich als Autor gehöreauch zur Menschheitsfamilie, ebenso wie alle Personen, die in der Menschheitsgeschichte auftauchen, Opfer wie Täter. Zusammen sollten wir lernen, uns nicht zu töten, weil alles Leben heilig ist und weil wir auf einer sehr tiefen Ebene alle miteinander verbunden sind."
Dr. Daniele Ganser, geboren 1972, ist Schweizer Historiker und Friedensforscher. Er leitet das unabhängige Swiss Institute for Peace and Energy Research (SIPER) in Münchenstein bei Basel in der Schweiz. Die aktuellen Vorträge von Dr. Daniele Ganser finden Sie hier. Am 12. April halten Daniele Ganser und Dirk Pohlmann bei Basel einen Vortrag über den Fall Herrhausen (nur 200 Tickets). Bestellen können Sie hier.
Das Buch können Sie hier bestellen.
LASSEN SIE DER FRIEDENSTAUBE FLÜGEL WACHSEN!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt.
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: milosz@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ dfbbf851:ba4542b5
2025-03-29 06:51:21ในยุคดิจิทัลที่การสื่อสารมีบทบาทสำคัญต่อชีวิตประจำวัน เทคโนโลยี Cell Broadcast ได้กลายเป็นหนึ่งในเครื่องมือที่ทรงพลังสำหรับการแจ้งเตือนฉุกเฉิน ไม่ว่าจะเป็นภัยพิบัติหรือเหตุการณ์สำคัญที่ต้องแจ้งให้ประชาชนทราบอย่างทันท่วงที ⏳💡
📌 Cell Broadcast คืออะไร ?
Cell Broadcast (CB) เป็นเทคโนโลยีที่ใช้ส่งข้อความกระจายสัญญาณผ่านเครือข่ายโทรศัพท์มือถือ 🏗📶 โดยแตกต่างจาก SMS ตรงที่สามารถส่งข้อความถึงผู้ใช้จำนวนมากได้พร้อมกัน โดยไม่ต้องทราบหมายเลขโทรศัพท์ ของผู้รับ 📲💨
ข้อความ CB สามารถส่งถึงอุปกรณ์ที่รองรับในเครือข่ายมือถือที่เปิดใช้งานอยู่ภายในช่วงเวลาสั้น ๆ ⏱ และ ไม่ทำให้เครือข่ายล่ม
✨ ข้อดีของ Cell Broadcast ✨
✅ ส่งข้อความรวดเร็ว – แจ้งเตือนได้ภายในไม่กี่วินาที แม้ในกรณีฉุกเฉิน ⚡🚀
✅ ไม่ต้องใช้หมายเลขโทรศัพท์ – กระจายสัญญาณไปยังอุปกรณ์ทุกเครื่องที่อยู่ในพื้นที่เป้าหมายได้โดยตรง 📡
✅ รองรับหลายภาษา – สามารถตั้งค่าการแจ้งเตือนให้เหมาะสมกับประชากรในแต่ละพื้นที่ 🌍🗣
✅ ไม่ทำให้เครือข่ายหนาแน่น – ต่างจาก SMS หรือการโทรจำนวนมากที่อาจทำให้เครือข่ายล่ม 📵❌
✅ ทำงานได้แม้ไม่มีอินเทอร์เน็ต – สามารถแจ้งเตือนในกรณีที่โซเชียลมีเดียหรืออินเทอร์เน็ตใช้งานไม่ได้ 🌐🚫
🌍 การใช้งาน Cell Broadcast ทั่วโลก
🔹 สหรัฐอเมริกา – ใช้ระบบ Wireless Emergency Alerts (WEA) เพื่อแจ้งเตือนเหตุการณ์ฉุกเฉิน เช่น พายุเฮอริเคน 🌀🌪
🔹 ญี่ปุ่น – ใช้ระบบ Earthquake Early Warning (EEW) เพื่อแจ้งเตือนแผ่นดินไหวล่วงหน้า ⛩🌏
🔹 สหภาพยุโรป – มีนโยบายให้ประเทศสมาชิกใช้ Public Warning System ผ่าน Cell Broadcast 📢🏛
🤔 ทำไมประเทศที่ยังไม่มีระบบนี้ควรนำมาใช้ ?
หลายประเทศ รวมถึง ประเทศไทย ยังไม่มีการใช้ Cell Broadcast อย่างแพร่หลาย ทั้งที่เป็นเทคโนโลยีที่สามารถช่วยชีวิตผู้คนได้อย่างมหาศาล 🚑 หากเกิดภัยพิบัติ เช่น น้ำท่วม แผ่นดินไหว สึนามิ หรือไฟป่า 🔥🌊 Cell Broadcast สามารถส่งการแจ้งเตือนไปยังทุกคนในพื้นที่เสี่ยงได้ทันที ลดความสูญเสียและเพิ่มโอกาสรอดชีวิตได้มากขึ้น
🔸 ความแม่นยำสูง – สามารถส่งแจ้งเตือนไปยังพื้นที่ที่ได้รับผลกระทบโดยตรง ทำให้ประชาชนสามารถเตรียมตัวรับมือได้ดีกว่า
🔸 ไม่มีปัญหาความล่าช้า – ต่างจากการแจ้งเตือนผ่าน SMS หรือโซเชียลมีเดียที่อาจล่าช้าหรือไม่ได้รับข้อความเลยหากเครือข่ายล่ม
🔸 เป็นมาตรฐานสากล – หลายประเทศพัฒนาแล้วมีระบบนี้ใช้งานอย่างมีประสิทธิภาพ ประเทศที่ยังไม่มีควรนำมาใช้เพื่อให้สามารถจัดการภัยพิบัติได้อย่างมีประสิทธิภาพ
🔸 ประหยัดต้นทุนในระยะยาว – ลดความเสียหายทางเศรษฐกิจจากภัยพิบัติ เพราะประชาชนได้รับการแจ้งเตือนล่วงหน้า ทำให้สามารถอพยพหรือป้องกันความเสียหายได้
🔮 อนาคตของ Cell Broadcast
ในอนาคต Cell Broadcast อาจถูกนำมาใช้ร่วมกับ ปัญญาประดิษฐ์ (AI) 🤖 และ Internet of Things (IoT) 🌐 เพื่อเพิ่มความแม่นยำและปรับแต่งการแจ้งเตือนได้ดียิ่งขึ้น 🎯💡
📌 ปล.
Cell Broadcast เป็นเทคโนโลยีแจ้งเตือนที่ทรงพลังและมีบทบาทสำคัญในการช่วยชีวิตผู้คน 🚑 ด้วยความสามารถในการส่งข้อความได้อย่างรวดเร็ว ครอบคลุมพื้นที่กว้าง และไม่ต้องพึ่งพาอินเทอร์เน็ต จึงเป็นหนึ่งในเครื่องมือสำคัญสำหรับการบริหารจัดการภัยพิบัติในปัจจุบันและอนาคต 🔥
CellBroadcast #แจ้งเตือนภัย #เทคโนโลยีสื่อสาร #ภัยพิบัติ #เครือข่ายมือถือ #การสื่อสารฉุกเฉิน #เตือนภัยล่วงหน้า
-
@ 30b99916:3cc6e3fe
2025-03-29 17:04:41btcpayserver #lightning #lnd #powershell
BTCpayAPI now supports file upload
I'm continuing to add functionality to BTCpay and BTCpayAPI which is using REST Api(s) to manage my BTCPAY server and LND cloud instance. It is nice to have this just running locally on my home Linux desktop.
Here is the code that implements this functionality.
``` "Uploadfile" {
$apislug = "api/v1/files"
$filepath = Split-Path $options
$filename = Split-Path $options -Leaf
CONST
$CODEPAGE = "iso-8859-1" # alternatives are ASCII, UTF-8
Read file byte-by-byte
$fileBin = [System.IO.File]::ReadAllBytes($options)
Convert byte-array to string
$enc = [System.Text.Encoding]::GetEncoding($CODEPAGE) $fileEnc = $enc.GetString($fileBin)
We need a boundary (something random() will do best)
$boundary = [System.Guid]::NewGuid().ToString() $LF = "
r
n" $bodyLines = ( "--$boundary", "Content-Disposition: form-data; name="file
"; filename="$fileName
"", "Content-Type: application/octet-stream$LF", $fileEnc, "--$boundary--$LF" ) -join $LF$URI = $BTCPayCfg.BTCpayApi.GreenApi.url + $apislug $apiKeyToken = 'token ' + $script:BTCPAY_API $headers = @{'Authorization'=$apiKeyToken}
return Invoke-RestMethod -Uri $uri -Method Post -Headers $headers -ContentType "multipart/form-data; boundary=
"$boundary
"" -Body $bodyLines} ``` Here is the revision history since my last article.
Version Date Whom Notes ======= ========== ======== ===================================================== 0.1.4 03/28/2025 cadayton Added UploadFile method to upload a file to the BTCpay server 0.1.3 03/27/2025 cadayton Added GetFiles returns listing of files uploaded to BTCpay server 0.1.2 03/19/2025 cadayton ForwardingHistory new parameter "total_fees" tallys mfees for events returned 0.1.1 03/18/2025 cadayton ForwardingHistory now support additional parameters 0.1.0 03/15/2025 cadayton initial release.
The inspiration for this logic was adapted from weipah . One wouldn't think uploading a single file wouldn't require this much coding. The Greenfield's REST Api documentation for this end point wasn't very helpful.In my book, good end-user documentation of one's code is just as important as the code itself. I believe documentation is usually lacking on most projects because the effort of doing so is almost equal to the effort of writing the code. It is also the least fun part about writing code.
The job is not done until the paper work has been completed. :)
https://btcpayserver.sytes.net
-
@ da0b9bc3:4e30a4a9
2025-03-29 06:49:22Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/928470
-
@ bdf3f01a:d9c40970
2025-03-29 04:52:40Abstract:
This paper presents a rigorous and critical examination of the Winter Vigil of XLII.II at Sapelo, a pivotal rite within the Lowcountry Freehold that serves as both an initiation into communal responsibility and a symbolic enactment of the Compact’s moral tenets. This analysis interrogates the ritual’s structure, emphasizing its role in perpetuating a resilient sociocultural order amid external collapse. Through a multidisciplinary approach combining historiographical analysis, cultural anthropology, and sociocultural theory, this study elucidates the Vigil’s function as a mechanism for moral continuity, thereby situating it within the broader discourse of post-collapse societal stabilization. The implications of this study underscore the profound interconnectedness between ritual practice and the formation of resilient communal identities.
Introduction:
The Winter Vigil of XLII.II at Sapelo occupies a fundamental position in the cultural historiography of the Lowcountry Freehold. As contemporary scholars, it is imperative to approach this tradition not merely as an artifact of ritualistic antiquity but as a dynamic process of cultural preservation. The Freehold’s commitment to integrating tradition with pragmatism, especially through the stewardship of The Veil, constitutes a critical adaptive strategy that sustained sociopolitical coherence through epochs of external fragmentation. This study aims to critically examine the Vigil as both a symbolic and practical reinforcement of the Compact’s ethos, with particular attention to how this ritual facilitated intergenerational continuity of moral and social values, ultimately shaping the robust communal identity that defines contemporary Freehold society.
The Veil as Cultural Custodian:
The Veil, emerging from the post-collapse adaptation of preexisting religious and cultural practices, evolved into a matriarchal order central to maintaining the Freehold’s ethical architecture. This evolution was characterized not by rigid preservation but by adaptive synthesis, wherein ceremonial gravitas was merged with pragmatic domestic guidance. The Veil functioned as a moral custodian, particularly within the familial sphere, where its influence was most profoundly exercised. Veilmother Cordelia’s role during the Winter Vigil exemplifies this dual function of leadership and philosophical stewardship, as her guidance articulated not only the ritual's procedural elements but also the embedded moral philosophy that would shape the initiates' worldview.
Ritual Dynamics and Symbolism:
The Winter Vigil is fundamentally an enactment of moral endurance, wherein the initiate’s voluntary approach to the brazier represents an acceptance of communal responsibility through individual fortitude. The design of the ritual deliberately positions physical endurance as a metaphor for moral resilience, encapsulating the Freehold’s conviction that true strength is inherently silent and steadfast. As the initiate moves toward the brazier, kneeling in proximity to the flame, the act becomes a performative affirmation of the Compact’s call for measured, principled strength rather than ostentatious assertion. The structured progression from the outer circle to the brazier symbolizes a journey from collective dependency to personal sovereignty, reflecting the Compact's ethos that leadership is merited through tested perseverance.
The Copper Plate Rite:
The Copper Plate Rite, integral to the Vigil, embodies the transformative philosophy of the Freehold. The heated copper plate, inscribed with the flame symbol and lifted from ashes, is held aloft despite discomfort, symbolizing the embrace of hardship as an essential component of sovereignty. The fleeting burn, leaving a transient mark, underscores the philosophical assertion that genuine resilience is born of confronting and integrating suffering, rather than circumventing it. This rite functions not merely as a test of physical tolerance but as a pedagogical imprinting of the Freehold’s ethos—an allegory of death and rebirth integral to personal and communal maturation.
Symbolic Implications and Societal Continuity:
The deliberate imposition of discomfort during the Vigil underscores a fundamental tenet of Freehold philosophy: suffering, when purposefully endured, refines the individual and, by extension, fortifies the community. The Copper Plate Rite exemplifies the doctrine that hardship, when faced with deliberate resolve, engenders moral clarity. This paradigm of voluntary suffering as a crucible for leadership remains a cornerstone of the Freehold’s ideological framework, fostering a collective ethos rooted in patient perseverance rather than impulsive dominance. Furthermore, the initiation rite serves as a microcosm of the Freehold's broader sociocultural ethos, where personal sacrifice is inextricably linked to communal stability.
Interpretive Analysis:
Current historiographical interpretations often err by neglecting the interconnectedness of the Vigil with broader sociopolitical dynamics. By isolating the rite as a mere ceremonial endurance, scholars risk overlooking its function as a structured pedagogical tool for inculcating moral resilience. This study posits that the Vigil, far from being a vestigial tradition, actively cultivated a pragmatic ethic of endurance that proved crucial in the Freehold’s sustained sociocultural coherence. This coherence, rooted in ritual reinforcement of moral tenets, enabled the Freehold to navigate existential threats without succumbing to internal decay.
Cultural and Societal Implications:
The enduring significance of the Winter Vigil lies in its dual function as both a rite of passage and a communal reaffirmation of the Freehold’s meritocratic principles. By fostering individual accountability within a collective moral framework, the Vigil reinforced the Compact’s foundational premise that leadership is merited through demonstrated resilience. The integration of personal trial into communal identity formation exemplifies how the Freehold maintained its internal stability despite external societal fragmentation. This ritual, therefore, is not merely commemorative but constitutive of the Freehold's enduring cultural legacy.
Conclusion:
The Winter Vigil of XLII.II at Sapelo remains a paradigmatic example of ritual as a vehicle for social continuity within the Lowcountry Freehold. Its deliberate amalgamation of symbolic endurance with moral instruction illustrates the Freehold’s adaptive strategy of embedding philosophical imperatives within lived tradition. As modern scholars, it is incumbent upon us to engage with these practices not merely as remnants of a bygone era but as foundational elements that cultivated the durable sociocultural ethos underpinning our current stability.
References:
-
Vance, C. (Epoch LII). "The Compact and Cultural Continuity: An Oral History." Archive of Freehold Studies, Emberwell Hall.
-
Harlowe, E. (Epoch LX). "The Flamekeepers: Guardians of Tradition." Journal of Sociocultural Persistence, Vol. 22, pp. 45-72.
-
Morgan, T. (Epoch LXV). "Endurance Through Ritual: The Role of The Veil in Cultural Preservation." Lowcountry Academic Press.
-
Cordelia, V. (Epoch XLII). "Reflections on the Flame: An Instructional Account." Collected Teachings of The Veil.
-
Emberwell Institute (Epoch XC). "The Evolution of Freehold Rites: From Custom to Philosophy." Advanced Studies in Cultural Integration.
## Title: Ritual as Continuity: An Analysis of the Winter Vigil of XLII.II at Sapelo
### Epoch XLII - Circle of Maidens
#### Abstract:
This paper presents a rigorous and critical examination of the Winter Vigil of XLII.II at Sapelo, a pivotal rite within the Lowcountry Freehold that serves as both an initiation into communal responsibility and a symbolic enactment of the Compact’s moral tenets. This analysis interrogates the ritual’s structure, emphasizing its role in perpetuating a resilient sociocultural order amid external collapse. Through a multidisciplinary approach combining historiographical analysis, cultural anthropology, and sociocultural theory, this study elucidates the Vigil’s function as a mechanism for moral continuity, thereby situating it within the broader discourse of post-collapse societal stabilization. The implications of this study underscore the profound interconnectedness between ritual practice and the formation of resilient communal identities.
#### Introduction:
The Winter Vigil of XLII.II at Sapelo occupies a fundamental position in the cultural historiography of the Lowcountry Freehold. As contemporary scholars, it is imperative to approach this tradition not merely as an artifact of ritualistic antiquity but as a dynamic process of cultural preservation. The Freehold’s commitment to integrating tradition with pragmatism, especially through the stewardship of The Veil, constitutes a critical adaptive strategy that sustained sociopolitical coherence through epochs of external fragmentation. This study aims to critically examine the Vigil as both a symbolic and practical reinforcement of the Compact’s ethos, with particular attention to how this ritual facilitated intergenerational continuity of moral and social values, ultimately shaping the robust communal identity that defines contemporary Freehold society.
#### The Veil as Cultural Custodian:
The Veil, emerging from the post-collapse adaptation of preexisting religious and cultural practices, evolved into a matriarchal order central to maintaining the Freehold’s ethical architecture. This evolution was characterized not by rigid preservation but by adaptive synthesis, wherein ceremonial gravitas was merged with pragmatic domestic guidance. The Veil functioned as a moral custodian, particularly within the familial sphere, where its influence was most profoundly exercised. Veilmother Cordelia’s role during the Winter Vigil exemplifies this dual function of leadership and philosophical stewardship, as her guidance articulated not only the ritual's procedural elements but also the embedded moral philosophy that would shape the initiates' worldview.
#### Ritual Dynamics and Symbolism:
The Winter Vigil is fundamentally an enactment of moral endurance, wherein the initiate’s voluntary approach to the brazier represents an acceptance of communal responsibility through individual fortitude. The design of the ritual deliberately positions physical endurance as a metaphor for moral resilience, encapsulating the Freehold’s conviction that true strength is inherently silent and steadfast. As the initiate moves toward the brazier, kneeling in proximity to the flame, the act becomes a performative affirmation of the Compact’s call for measured, principled strength rather than ostentatious assertion. The structured progression from the outer circle to the brazier symbolizes a journey from collective dependency to personal sovereignty, reflecting the Compact's ethos that leadership is merited through tested perseverance.
#### The Copper Plate Rite:
The Copper Plate Rite, integral to the Vigil, embodies the transformative philosophy of the Freehold. The heated copper plate, inscribed with the flame symbol and lifted from ashes, is held aloft despite discomfort, symbolizing the embrace of hardship as an essential component of sovereignty. The fleeting burn, leaving a transient mark, underscores the philosophical assertion that genuine resilience is born of confronting and integrating suffering, rather than circumventing it. This rite functions not merely as a test of physical tolerance but as a pedagogical imprinting of the Freehold’s ethos—an allegory of death and rebirth integral to personal and communal maturation.
#### Symbolic Implications and Societal Continuity:
The deliberate imposition of discomfort during the Vigil underscores a fundamental tenet of Freehold philosophy: suffering, when purposefully endured, refines the individual and, by extension, fortifies the community. The Copper Plate Rite exemplifies the doctrine that hardship, when faced with deliberate resolve, engenders moral clarity. This paradigm of voluntary suffering as a crucible for leadership remains a cornerstone of the Freehold’s ideological framework, fostering a collective ethos rooted in patient perseverance rather than impulsive dominance. Furthermore, the initiation rite serves as a microcosm of the Freehold's broader sociocultural ethos, where personal sacrifice is inextricably linked to communal stability.
#### Interpretive Analysis:
Current historiographical interpretations often err by neglecting the interconnectedness of the Vigil with broader sociopolitical dynamics. By isolating the rite as a mere ceremonial endurance, scholars risk overlooking its function as a structured pedagogical tool for inculcating moral resilience. This study posits that the Vigil, far from being a vestigial tradition, actively cultivated a pragmatic ethic of endurance that proved crucial in the Freehold’s sustained sociocultural coherence. This coherence, rooted in ritual reinforcement of moral tenets, enabled the Freehold to navigate existential threats without succumbing to internal decay.
#### Cultural and Societal Implications:
The enduring significance of the Winter Vigil lies in its dual function as both a rite of passage and a communal reaffirmation of the Freehold’s meritocratic principles. By fostering individual accountability within a collective moral framework, the Vigil reinforced the Compact’s foundational premise that leadership is merited through demonstrated resilience. The integration of personal trial into communal identity formation exemplifies how the Freehold maintained its internal stability despite external societal fragmentation. This ritual, therefore, is not merely commemorative but constitutive of the Freehold's enduring cultural legacy.
#### Conclusion:
The Winter Vigil of XLII.II at Sapelo remains a paradigmatic example of ritual as a vehicle for social continuity within the Lowcountry Freehold. Its deliberate amalgamation of symbolic endurance with moral instruction illustrates the Freehold’s adaptive strategy of embedding philosophical imperatives within lived tradition. As modern scholars, it is incumbent upon us to engage with these practices not merely as remnants of a bygone era but as foundational elements that cultivated the durable sociocultural ethos underpinning our current stability.
#### References:
- Vance, C. (Epoch LII). "The Compact and Cultural Continuity: An Oral History." Archive of Freehold Studies, Emberwell Hall.
- Harlowe, E. (Epoch LX). "The Flamekeepers: Guardians of Tradition." Journal of Sociocultural Persistence, Vol. 22, pp. 45-72.
- Morgan, T. (Epoch LXV). "Endurance Through Ritual: The Role of The Veil in Cultural Preservation." Lowcountry Academic Press.
- Cordelia, V. (Epoch XLII). "Reflections on the Flame: An Instructional Account." Collected Teachings of The Veil.
- Emberwell Institute (Epoch XC). "The Evolution of Freehold Rites: From Custom to Philosophy." Advanced Studies in Cultural Integration.
-
-
@ fd78c37f:a0ec0833
2025-03-29 04:33:01YakiHonne: I'm excited to be joined by our guest Piccolo—thank you very much for being here. Before we dive in, I'd like to briefly introduce YakiHonne. YakiHonne is a decentralized media client built on the Nostr protocol, leveraging technology to enable freedom of speech. It empowers creators to fully own their voice and assets while offering innovative tools such as Smart widget , Verified Notes, and support for long-form content. Today, we’re not just discussing YakiHonne, but also diving into your community. Piccolo, could you start by telling us a bit about yourself and your community?
Piccolo:Hi, I'm Piccolo. I run BO฿ Space in Bangkok, and we also have a satellite location called the BO฿ Space corner in Chiang Mai, thanks to the Bitcoin Learning Center. Piccolo:Regarding my background,I originally came from corporate finance and investment banking. I was in that field for about 20 years, with the last 15 spent running my own firm in corporate finance advisory alongside a couple of partners. We eventually sold the advisory business in 2015, took a short break, and in 2016, I ended up launching a fintech company, which is still operational today. The company specializes in equity crowdfunding and is licensed by the SEC in Thailand. Piccolo:I first bought Bitcoin a few years before truly understanding it, initially thinking it was a scam that would eventually collapse. However, in 2017, the block size wars demonstrated the protocol’s strong resistance to attacks on decentralization, which deeply impacted me. By late 2018 or early 2019, I started to really grasp Bitcoin and kept learning. Then, in mid-2022, after having fully fallen down the Bitcoin rabbit hole, I founded BO฿ Space. It was right after COVID, and since the fintech had scaled down, there was extra space. We started by hosting meetups and technical workshops for people who were interested. Piccolo:In the early years, we had various groups come by—like the team from BDK (Bitcoin Development Kit), who held workshops. The people behind the Bitcoin Beach Wallet, which later became Blink, also visited. So, BO฿ Space initially functioned as a meetup and technical workshop space. Eventually, we launched the BOB Builders Residency program, which was a lot of fun. We secured grant funding for developers under different cohort themes, so that they can collaborate and co-work for a few months. So far, we have completed three cohorts.
YakiHonne:How did your community get started, and what did you do to attract new members in the beginning?
Piccolo:The initial members came through word of mouth and invitations that I sent out. I reached out to an initial group of Bitcoiners here in the city who I believed were strong maximalists or Bitcoin-only supporters, back when that was still a thing. I sent out 21 invitations and had our first meetup with 21 people, most of whom I had interacted with online, though some in person during the COVID years. From there, it spread by word of mouth, and of course, through Twitter and meetup.com. So, I would say that word of mouth remains the main method of growth. Additionally, when people come through Bangkok and are looking for a Bitcoin-only meetup, there really isn't one available. I believe there are a couple now—maybe two or three—but when we started, there weren’t any, especially not a dedicated Bitcoin-only space. I think we may still be the only one in Bangkok. So yeah, word of mouth was definitely the main way we grew. Bitcoiners tend to share their finds when they meet like-minded people.
YakiHonne:Didn’t you have people in your community who initially thought Bitcoin was a scam, like you did, or face similar issues?
Piccolo:Yes, it still happens, especially when the price of Bitcoin rises. Newcomers still join, and some of them believe Bitcoin might be a scam. However, this has become less frequent. The main reason is that when people come to BO฿ Space, they know it’s a Bitcoin-only meetup. We generally don’t discuss the price; instead, we focus on other aspects of Bitcoin, as there are many interesting developments in the space.
YakiHonne:What advice would you give to someone looking to start or grow a Bitcoin-focused community in today’s world? Considering the current landscape, much like your own experience, what guidance would you offer?
Piccolo:It sounds simple, but just do it. When it comes to community building, you don’t necessarily need a physical space. Community is about people coming together, right? Two people can start a community, then three, four, and so on. Meetups can happen anywhere—your favorite bar, a restaurant, a friend’s garage, or wherever. So, just do it, but make sure you have more than one person, otherwise, how can you build a community? Once you have more than one person, word of mouth will spread. And as you develop a core group—let’s say more than five people—that’s when I think the community can truly sustain itself.
YakiHonne:I know you’ve mentioned the technical side of your community, but I’ll ask anyway—does your community engage with the technical or non-technical aspects of Bitcoin? Or perhaps, is there a blend of both?
Piccolo:I would say both. It really depends on the monthly themes of our meetups. For example, February was focused on Asian communities in Bitcoin. During that month, community leaders came in to give presentations and discuss their work in places like Indonesia, India, and more recently, someone from HRF (Human Rights Foundation) talked about Bitcoin’s use case in Myanmar. Then, in December, we had a very technical month—Mining Month. It was led by our Cohort 3 residents, where we discussed Stratum V2 and had a demo on it. We also examined the Loki board hardware, and Zack took apart the S19, looking at different ways to repurpose the power supply unit, among other things. So, it’s a mix of both, depending on the theme for that month. Some months are very technical, while others are more community-focused and less technical.
YakiHonne:What advice would you give to a technically inclined individual or organization looking to contribute meaningfully to the Bitcoin ecosystem?
Piccolo:For technically inclined individuals, I would suggest identifying your favorite open-source project in the Bitcoin ecosystem. Start from Bitcoin Core and explore different layers, such as Lightning or e-cash, and other open-source projects. As for technically inclined organizations, if you're integrating Bitcoin into your business, I would say, first, make sure you have people within your organization who truly understand Bitcoin. Build a capable team first, and then, depending on the part of the Bitcoin ecosystem you’re involved in—whether it’s custody services, Lightning payments, layer 2, or something like Cashu or Ark—find your niche. From there, your team will work with you to discover ways to contribute. But until you build that capability, organizations are a bit different from individuals in this space.
YakiHonne:How do you see the world of Bitcoin communities evolving as technology matures, particularly in areas like scalability, privacy, and adaptability with other systems?
Piccolo:That's an interesting question. If we think about the future of Bitcoin communities, I believe they may eventually disappear as technology matures. Once Bitcoin scales to a point where it integrates seamlessly with other payment systems, becoming part of the everyday norm, the need for dedicated communities will diminish. It’s similar to how we no longer have meetups about refrigerators or iPhones, even though they are technologies we use every day. As Bitcoin matures, it will likely reach that level of ubiquity. There might still be occasional meetups or forums, but they will be more about specific knowledge, use cases, and tools, rather than a community dedicated to introducing others to the technology itself. However, this is a long way off. Bitcoin is still relatively small compared to the global fiat financial system, despite the growth we want to see. So, it will take a long time before we reach that stage.
YakiHonne:It’s something I hadn’t considered before, and it’s quite insightful. Moving to our last question actually which I find very interesting is the government around you for or against bitcoin and how has That affected the community.
Piccolo:In my opinion, on a general level, the government is more supportive than opposed to Bitcoin. The Thai government classifies Bitcoin as a digital asset, almost like digital gold. In that sense, they want to tax capital gains and regulate it. They also have a regulatory framework for it, known as the Digital Asset Regulatory Sandbox, where you can test various things, mainly coins and tokens. It's unfortunate, but that’s how it is. However, our government, especially the regulatory bodies, are open to innovation. They recognize that Bitcoin is different, but they still view blockchain and tokens as useful technologies, which is somewhat misguided. So, in that sense, it’s more support than opposition. A couple of years ago, there was a circular discouraging the use of Bitcoin as a payment currency, mainly because they can't control its monetary policy. And they’re right—Bitcoin can’t be controlled by anyone; there’re the protocol and the rules, and everyone follows them, unless there’s a hard fork, which is a different matter. So, in that regard, Bitcoin is definitely categorized as a digital asset by the government, and that’s where it stands. Piccolo:People who come to BO฿ Space to learn about Bitcoin are often influenced by the government from the point of price movements; especially when government support moves the price up. But they usually only visit once or twice, especially if they’re not deep into the Bitcoin rabbit hole. They often get disappointed because, at BO฿ Space, we rarely discuss the price—maybe once a year, and that’s just after the meetup when people are having drinks. So, in that sense, I’d say the government currently doesn’t really hurt or help the community either way. People will go down the rabbit hole at their own pace. And if you're not a Bitcoiner and you come to a BO฿ Space meetup with a crypto focus, you might be surprised by the approach we take.
YakiHonne:Thank you, Piccolo, for your time and insights. It’s been a pleasure speaking with you. Your perspective on the evolution of Bitcoin communities was eye-opening. It's clear that your deep understanding of Bitcoin is invaluable. I'm sure our readers will appreciate your insights. Once again, thank you, Piccolo. I look forward to seeing the continued growth of BO฿ Space and Bitcoin adoption.
-
@ 6919d8ac:737b2c45
2025-03-29 04:24:36No universo digital, onde a busca por entretenimento está em constante evolução, surge uma plataforma que tem se destacado de forma única: a 585bet. Com uma proposta inovadora e uma experiência de usuário cuidadosamente desenvolvida, a 585bet promete oferecer uma gama de opções para quem busca diversão, emoção e, claro, grandes oportunidades. Neste artigo, vamos explorar as características que tornam a 585bet uma escolha interessante para os jogadores, desde a introdução da plataforma até os tipos de jogos e a experiência geral oferecida aos seus usuários.
Introdução à 585bet: Uma Nova Era do Entretenimento Online A 585bet chegou para transformar a maneira como os jogadores se conectam ao mundo dos jogos de azar online. Com um design moderno, intuitivo e acessível, a plataforma foi criada para atender a uma ampla gama de gostos e preferências, proporcionando uma experiência agradável e segura. A proposta da 585bet vai além de ser apenas mais um site de apostas. Ela é uma plataforma que busca criar um ambiente único, onde os jogadores podem se divertir, explorar novas possibilidades e, acima de tudo, sentir-se parte de uma comunidade que compartilha da mesma paixão.
Ao acessar a 585bet , o usuário logo se depara com uma interface amigável e de fácil navegação, que possibilita a realização de apostas e participação em jogos com total facilidade. A plataforma foi pensada para todos os tipos de dispositivos, seja no computador ou no celular, garantindo uma navegação fluida e sem interrupções, o que faz com que os jogadores possam se divertir onde quer que estejam.
Variedade de Jogos: Uma Experiência Completa de Entretenimento O maior atrativo da 585bet certamente está em sua ampla oferta de jogos. A plataforma se destaca pela diversidade de opções, abrangendo desde jogos de mesa tradicionais até experiências mais inovadoras e dinâmicas. Seja você um fã de jogos de habilidade, sorte ou ambos, a 585bet tem algo para oferecer a todos os tipos de jogadores.
Entre os destaques, temos uma vasta gama de jogos que vão desde as clássicas rodadas de roleta e blackjack, até opções mais modernas como slots com temas imersivos e gráficos de última geração. Cada jogo na 585bet é desenvolvido para proporcionar uma experiência de alta qualidade, com gráficos nítidos, animações fluídas e uma jogabilidade envolvente. Além disso, a plataforma oferece também diversas opções de apostas ao vivo, onde os jogadores podem interagir com dealers reais e vivenciar o ambiente de uma maneira mais pessoal e empolgante.
A 585bet também se preocupa em constantemente atualizar sua biblioteca de jogos, trazendo novidades e lançamentos para garantir que a experiência dos jogadores nunca se torne monótona. Com parcerias com alguns dos maiores desenvolvedores de software do mercado, a plataforma é uma verdadeira vitrine para os jogos mais inovadores e populares, sempre com a garantia de que seus jogadores terão acesso a títulos de alta qualidade.
A Experiência do Jogador: Conforto e Segurança Quando se trata de plataformas de entretenimento online, a experiência do jogador é essencial. A 585bet investiu consideravelmente em criar um ambiente seguro e confortável para que seus usuários possam se concentrar apenas na diversão. O processo de registro é simples e rápido, e a plataforma oferece diversas opções de pagamento, garantindo que os jogadores possam fazer depósitos e retiradas com facilidade e segurança.
Além disso, a 585bet adota medidas rigorosas de segurança para proteger os dados pessoais e financeiros dos seus usuários. A criptografia de ponta e as tecnologias de proteção contra fraudes garantem que todos os dados do jogador estejam seguros, proporcionando tranquilidade durante a navegação e transações.
Outro aspecto importante da 585bet é o suporte ao cliente, que está disponível 24 horas por dia, 7 dias por semana, para resolver qualquer dúvida ou problema que os jogadores possam ter. A plataforma se orgulha de seu atendimento personalizado, com profissionais treinados para oferecer assistência de forma eficiente e amigável.
A experiência do jogador na 585bet é pensada para ser envolvente, mas também agradável e sem estresse. A plataforma oferece opções de jogos para diferentes orçamentos, o que permite que tanto iniciantes quanto jogadores experientes desfrutem de uma experiência adaptada às suas preferências e limites.
Conclusão: A Escolha Certa para os Amantes do Entretenimento Online Com uma plataforma inovadora, uma vasta gama de jogos e um compromisso com a segurança e a experiência do usuário, a 585bet é uma excelente opção para quem busca diversão online de qualidade. A plataforma oferece tudo o que um jogador moderno poderia desejar: conveniência, variedade, segurança e um suporte excepcional. Se você está em busca de uma nova forma de entretenimento, a 585bet é, sem dúvida, uma escolha que vale a pena explorar.
-
@ 6919d8ac:737b2c45
2025-03-29 04:23:38No mundo dinâmico dos jogos online, 7700Bet tem se destacado como uma das plataformas mais inovadoras e empolgantes, atraindo jogadores de todo o mundo. Com uma vasta gama de jogos, recursos modernos e uma experiência fluida, 7700Bet oferece um ambiente único para iniciantes e jogadores experientes. Se você é novo no mundo dos jogos online ou já tem experiência, 7700Bet promete proporcionar horas de entretenimento e muita diversão. Neste artigo, vamos explorar o que torna 7700Bet tão especial, incluindo a introdução à plataforma, os jogos disponíveis e a experiência oferecida aos jogadores.
Introdução à Plataforma: O Centro do Entretenimento Online 7700Bet se destaca como uma plataforma avançada de jogos online, desenvolvida para oferecer aos usuários uma experiência premium. Com uma interface intuitiva e um layout moderno, os jogadores podem navegar facilmente pelo site, encontrando seus jogos favoritos de forma simples e rápida. A plataforma conta com um design limpo e amigável, garantindo acessibilidade até mesmo para aqueles que não estão tão familiarizados com o universo dos jogos online. Seja acessando a 7700bet pelo desktop ou celular, a plataforma proporciona uma experiência consistente e fluida que se adapta perfeitamente a qualquer tamanho de tela.
Um dos maiores diferenciais da 7700Bet é o seu compromisso com a segurança e confiabilidade. A plataforma prioriza a proteção dos jogadores por meio de criptografia robusta e medidas de segurança avançadas. Os usuários podem ficar tranquilos sabendo que suas informações pessoais e financeiras estão seguras, permitindo que se concentrem apenas na diversão. Além disso, 7700Bet oferece uma ampla variedade de métodos de pagamento, facilitando os depósitos e retiradas de forma rápida e sem complicações.
Outro grande benefício da 7700Bet é o seu atendimento ao cliente. A plataforma disponibiliza suporte ágil por meio de chat ao vivo, e-mail e uma seção de perguntas frequentes (FAQ), garantindo que os jogadores possam resolver qualquer problema ou dúvida de forma rápida e eficiente, durante a sua experiência de jogo.
Introdução aos Jogos: Um Mundo de Opções Empolgantes O que realmente distingue 7700Bet é a sua vasta coleção de jogos. A plataforma oferece uma grande variedade de opções para todos os gostos, desde jogos de mesa clássicos até as mais modernas máquinas de caça-níqueis e jogos ao vivo. A biblioteca de jogos é constantemente atualizada, garantindo que os jogadores tenham acesso às novidades e tendências mais recentes no universo dos jogos online.
Uma das maiores atrações de 7700Bet é a sua impressionante seleção de caça-níqueis. Desde as tradicionais máquinas de três cilindros até as slots mais modernas, com gráficos avançados e recursos únicos, os jogadores encontrarão muitas opções para manter a diversão sempre renovada. Para os entusiastas de slots, a variedade de temas é de se admirar – há opções que vão desde aventuras e mitologia até história e cultura pop, garantindo que haja algo para todos os gostos.
Para quem prefere jogos mais estratégicos, 7700Bet oferece uma gama de jogos de mesa clássicos, como pôquer, blackjack e roleta. Esses jogos são projetados para proporcionar uma experiência autêntica, com gráficos realistas e efeitos sonoros envolventes, que imergem o jogador na ação. Para aqueles que buscam uma experiência mais dinâmica e interativa, 7700Bet também disponibiliza jogos ao vivo. Os jogadores podem participar de jogos com dealers reais e interagir com outros jogadores em tempo real, criando uma atmosfera social e emocionante.
Experiência do Jogador: Diversão, Justiça e Recompensas A experiência do jogador em 7700Bet é pensada para ser imersiva e divertida. A plataforma oferece uma ampla variedade de promoções, bônus e recompensas. Jogadores novos são recebidos com ofertas atrativas de boas-vindas, enquanto os jogadores fiéis têm acesso a promoções contínuas e ofertas especiais. Esses incentivos ajudam a melhorar a experiência geral de jogo, proporcionando mais chances de ganhar e prolongando o tempo dos jogadores na plataforma.
Além disso, a 7700Bet se compromete com a justiça e a transparência. Os jogos oferecidos são desenvolvidos por fornecedores de software renomados, que utilizam geradores de números aleatórios (RNG) para garantir resultados imparciais. Esse compromisso com a justiça assegura que todo jogador, independentemente do nível de habilidade, tenha uma chance igual de sucesso.
Outro aspecto importante da experiência do jogador é a personalização da jornada de jogo. Os usuários podem personalizar seus perfis, escolher preferências de jogos e até selecionar seus métodos de pagamento favoritos. Esse nível de personalização adiciona uma camada extra de conveniência e diversão à experiência geral, tornando o tempo do jogador na plataforma único e adaptado às suas necessidades.
7700Bet também oferece várias funcionalidades sociais, como classificações e desafios, permitindo que os jogadores se compitam com outros e acompanhem seu progresso. Esse elemento competitivo acrescenta uma sensação de emoção e comunidade, tornando a experiência ainda mais divertida para aqueles que gostam de rivalidade amigável.
Em termos de acessibilidade, 7700Bet garante que os jogadores possam aproveitar seus jogos favoritos em qualquer lugar. A versão móvel da plataforma é otimizada para todos os dispositivos, permitindo que os usuários transitem de forma fluida entre a experiência no desktop e no celular. Se você está em casa ou em movimento, a 7700Bet oferece uma experiência de jogo de alto nível, onde quer que você esteja.
Conclusão: Por Que a 7700Bet é a Melhor Plataforma para Jogos Online Em resumo, 7700Bet é mais do que apenas uma plataforma de jogos – é uma verdadeira experiência. Com sua interface amigável, vasta oferta de jogos e compromisso com a satisfação do jogador, 7700Bet se destaca como um dos melhores destinos para os entusiastas de jogos online. Desde a facilidade de navegação até os empolgantes bônus e promoções, cada detalhe da plataforma é projetado para garantir uma experiência divertida e memorável.
Seja você um fã de caça-níqueis, um estrategista de jogos de mesa ou alguém que gosta de interagir com dealers ao vivo, a 7700Bet tem algo a oferecer. Se você está pronto para embarcar em uma jornada emocionante e cheia de oportunidades, 7700Bet é o lugar perfeito para começar.
-
@ 33baa074:3bb3a297
2025-03-29 03:05:32As an advanced level measurement device, radar water level meter has been widely used in many fields due to its advantages such as high precision, high reliability and non-contact measurement. The following are the main application scenarios of radar water level meter:
Water conservancy and hydro power: In large reservoirs and hydro power stations, radar water level meter is used to monitor the water storage in real time to ensure power generation efficiency and flood control safety.
Urban drainage management: The management of urban drainage system requires accurate measurement of the water level of rainwater outlet. Radar water level meter can monitor the water level of rainwater outlet in real time, and intelligently control drainage according to water level data to reduce the risk of urban water logging.
Industrial production and safety: In the process of industrial production, the level change of liquid storage tank has an important impact on production safety and quality control. Radar water level meter can monitor the liquid level of liquid storage tank in real time, and accurately control it through data feedback to ensure the safety and stability of the production process.
Agricultural irrigation: Radar water level meter is also widely used in the field of agricultural irrigation. It can measure the water level in reservoirs or wells, intelligently control the irrigation system according to real-time data, improve the efficiency of water resource utilization, and realize refined farmland irrigation management.
Environmental protection engineering: Sewage treatment plants use radar water level gauges to monitor the liquid level of treatment pools to optimize treatment processes and reduce energy consumption.
Scientific research: In scientific research, radar water level gauges can be used to observe changes in water levels in oceans, lakes, rivers and other water bodies. For example, in oceanographic research, radar water level gauges can be used to observe changes in ocean phenomena such as waves and tides; in chronological research, they can be used to observe changes in lake water levels and changes in water ecosystems.
Horological research: Radar water level gauges can be used to monitor water level, flow rate, flow and other parameters of water bodies, providing data support for the study of hydro logical laws. Through the monitoring data of radar water level gauges, we can understand the changing trends of water bodies and provide a scientific basis for water resources management and protection.
River water level monitoring: Radar water level gauges play an important role in the field of river water level monitoring. It can monitor river water level changes in real time around the clock, help analyze water level fluctuation trends, and provide data support for flood warnings, drought monitoring, etc.
To sum up, radar water level meter has broad application prospects in water conservancy, environmental protection, industry, agriculture, scientific research and other fields due to its unique technical advantages.
-
@ 2183e947:f497b975
2025-03-29 02:41:34Today I was invited to participate in the private beta of a new social media protocol called Pubky, designed by a bitcoin company called Synonym with the goal of being better than existing social media platforms. As a heavy nostr user, I thought I'd write up a comparison.
I can't tell you how to create your own accounts because it was made very clear that only some of the software is currently open source, and how this will all work is still a bit up in the air. The code that is open source can be found here: https://github.com/pubky -- and the most important repo there seems to be this one: https://github.com/pubky/pubky-core
You can also learn more about Pubky here: https://pubky.org/
That said, I used my invite code to create a pubky account and it seemed very similar to onboarding to nostr. I generated a private key, backed up 12 words, and the onboarding website gave me a public key.
Then I logged into a web-based client and it looked a lot like twitter. I saw a feed for posts by other users and saw options to reply to posts and give reactions, which, I saw, included hearts, thumbs up, and other emojis.
Then I investigated a bit deeper to see how much it was like nostr. I opened up my developer console and navigated to my networking tab, where, if this was nostr, I would expect to see queries to relays for posts. Here, though, I saw one query that seemed to be repeated on a loop, which went to a single server and provided it with my pubkey. That single query (well, a series of identical queries to the same server) seemed to return all posts that showed up on my feed. So I infer that the server "knows" what posts to show me (perhaps it has some sort of algorithm, though the marketing material says it does not use algorithms) and the query was on a loop so that if any new posts came in that the server thinks I might want to see, it can add them to my feed.
Then I checked what happens when I create a post. I did so and looked at what happened in my networking tab. If this was nostr, I would expect to see multiple copies of a signed messaged get sent to a bunch of relays. Here, though, I saw one message get sent to the same server that was populating my feed, and that message was not signed, it was a plaintext copy of my message.
I happened to be in a group chat with John Carvalho at the time, who is associated with pubky. I asked him what was going on, and he said that pubky is based around three types of servers: homeservers, DHT servers, and indexer servers. The homeserver is where you create posts and where you query for posts to show on your feed. DHT servers are used for censorship resistance: each user creates an entry on a DHT server saying what homeserver they use, and these entries are signed by their key.
As for indexers, I think those are supposed to speed up the use of the DHT servers. From what I could tell, indexers query DHT servers to find out what homeservers people use. When you query a homeserver for posts, it is supposed to reach out to indexer servers to find out the homeservers of people whose posts the homeserver decided to show you, and then query those homeservers for those posts. I believe they decided not to look up what homeservers people use directly on DHT servers directly because DHT servers are kind of slow, due to having to store and search through all sorts of non-social-media content, whereas indexers only store a simple db that maps each user's pubkey to their homeserver, so they are faster.
Based on all of this info, it seems like, to populate your feed, this is the series of steps:
- you tell your homeserver your pubkey
- it uses some sort of algorithm to decide whose posts to show you
- then looks up the homeservers used by those people on an indexer server
- then it fetches posts from their homeservers
- then your client displays them to you
To create a post, this is the series of steps:
- you tell your homeserver what you want to say to the world
- it stores that message in plaintext and merely asserts that it came from you (it's not signed)
- other people can find out what you said by querying for your posts on your homeserver
Since posts on homeservers are not signed, I asked John what prevents a homeserver from just making up stuff and claiming I said it. He said nothing stops them from doing that, and if you are using a homeserver that starts acting up in that manner, what you should do is start using a new homeserver and update your DHT record to point at your new homeserver instead of the old one. Then, indexers should update their db to show where your new homeserver is, and the homeservers of people who "follow" you should stop pulling content from your old homeserver and start pulling it from your new one. If their homeserver is misbehaving too, I'm not sure what would happen. Maybe it could refuse to show them the content you've posted on your new homeserver, keeping making up fake content on your behalf that you've never posted, and maybe the people you follow would never learn you're being impersonated or have moved to a new homeserver.
John also clarified that there is not currently any tooling for migrating user content from one homeserver to another. If pubky gets popular and a big homeserver starts misbehaving, users will probably need such a tool. But these are early days, so there aren't that many homeservers, and the ones that exist seem to be pretty trusted.
Anyway, those are my initial thoughts on Pubky. Learn more here: https://pubky.org/
-
@ 0d788b5e:c99ddea5
2025-03-29 02:40:37 -
@ 5d4b6c8d:8a1c1ee3
2025-03-29 02:18:49Only one more month to make adjustments and a couple of my guys haven't played enough games to be eligible for the awards. - Jokic needs to play two more - Giannis needs to play five more
Other notable players who haven't yet played 65 games: - Luka is not even close - Brunson needs to play four more (and probably needs to be replaced regardless) - Wemby is not even close
Here's the current state of the competition with your max possible score next to your nym:
| Contestant | MVP | Champ | All NBA | | | | | |--------------|------|---------|----------|-|-|-|-| | @Undisciplined 47| SGA| OKC | Jokic | KAT |Giannis |Tatum | SGA | | @grayruby 46| SGA| Cavs| Jokic | Giannis | SGA| Mitchell| Brunson| | @gnilma 55| SGA| OKC| Jokic | KAT | Giannis | Tatum| SGA | | @BitcoinAbhi 70 | Luka| Denver| Jokic | Giannis | Luka | Ant| SGA| | @Bell_curve 63| SGA| Celtics| Jokic | Giannis | Luka | Ant| SGA| | @0xbitcoiner 70 | Jokic| Pacers| Jokic | Giannis | Luka | Ant| Brunson| | @Coinsreporter 49| Giannis| Pacers| Jokic | Giannis | Luka | Ant| Brunson| | @TheMorningStar 49| Luka| Celtics| Jokic | Giannis | Luka | Ant| SGA| | @onthedeklein 49| Luka| T-Wolves| Jokic | Giannis | Luka | Wemby| SGA| | @Carresan 34| SGA| Memphis| Jokic | KAT | Giannis | Ant| SGA| | @BTC_Bellzer 34| SGA| Celtics| Jokic| Giannis | Tatum| SGA| Brunson | | @realBitcoinDog 39| Lebron| Lakers| Jokic | Giannis | Ant | Brunson | SGA| | @SimpleStacker 42| SGA| Celtics| Jokic| Tatum| Luka | Brunson| SGA| | @BlokchainB 38| SGA| Knicks| KAT| Giannis | Ant| Brunson| SGA| | @LibertasBR 14| SGA| Celtics| Jokic| Giannis | Tatum | Curry| SGA| | @Meani123 7| SGA| OKC| Jokic | KAT | Tatum | Mitchell | SGA|
Prize At least 6k (I'll keep adding zaps to the pot).
If you want to join this contest, just leave your predictions for MVP, Champion, and All-NBA 1st team in the comments. See the June post for more details.
originally posted at https://stacker.news/items/928370
-
@ df06d21e:2b23058f
2025-03-29 02:08:31Imagine a Living Civilization—a new way to see our world. It starts with the Universe’s pillars: Matter, the stuff we’re made of; Energy, the flow that drives us; Physics, the rules we play by; and Chemistry, the complexity that builds us. We know these well. But civilization? That’s our creation—and although it has been described in so many different ways over the years I thought it was time for something new. Civilization has its own pillars, systems that I call the pillars of the Metaverse: Capital, Information, Innovation, and Trust.
Capital is how we measure value. Not just money, but everything that matters: skills, we call that Human Capital; ecosystems, that’s Natural Capital; infrastructure, Public Capital; relationships, Social Capital. Picture a farmer swapping Bitcoin sats for seeds—not fiat debt—or tracking soil health alongside his wallet. Capital is a system, a system of measurement.
Information is how we verify truth. Think IPFS, a network holding real data—climate stats, farming fixes—open to all, not locked up by some corporate gatekeeper. Information is a system of verification.
Innovation is about generating solutions. On GitHub, coders worldwide crank out tools—Nostr clients, solar apps—shared freely, not patented for profit. Innovation is our system of generation.
And Trust—it’s coordination. Nostr’s decentralized threads let communities set trade rules, split resources—governance from the ground up, no overlords required. Trust is our system of coordination.
Right now we’re stuck in debt-based systems—and they’re failing us. Take fiat currency—central banks print it, slashing your purchasing power. Our dollar buys less every year; savings erode while the elite stack their gains. It’s a scam, Bitcoiners know it—fiat’s the real Ponzi bleeding us dry. Capital gets twisted—firms hoard Bitcoin for fiat pumps, not real wealth; governments chase GDP while forests die and skills sit idle. Information is buried—our media spits out spin, our corporations lock truth in silos. Innovation is stalled—debt props up corporate patents, not open wins. Trust is gone—our governance systems consist of top-down control that splits us apart, left to right, top to bottom. Debt just measures scarcity—money borrowed, nature trashed, bonds frayed—and it’s crushing the pillars.
Wealth-based systems promise to turn that around. Bitcoin’s sound money is just the start—sats hold value, not inflate it away. Real capital measures what sustains us—sats fund a cooperative's water pump, not a vault; they track skills taught, land healed, ties rebuilt. Real Information opens up—IPFS logs show ‘biochar boosted yield 20%’, verified by us, not suits. Real Innovation flows—GitHub devs build Lightning hubs, wealth spreads. Real Trust binds us together—Nostr chats align us, no central puppeteer. Wealth based systems strengthen the pillars of the Metaverse, it doesn’t erode them.
We needed a new framing. A new vision of what was, what is, and what could be. We have one. This is real. This is the world we are building. Bitcoin is live, Nostr is growing, IPFS and GitHub are humming. We can see Debt teetering; while real wealth is rising. So, hodlers, maxis, plebs—everyone—what does a true wealth-based system look like? How can we measure Capital beyond fiat’s con job? Bitcoin’s the rock, but it’s just the beginning. How do we build on this, expand it, and transform everything as we build something entirely new?
-
@ 0d788b5e:c99ddea5
2025-03-29 01:27:53这是首页内容
-
@ 3e6e0735:9e95c8a2
2025-03-28 23:58:02https://i.nostr.build/lanoHI3p2aCKRZlV.png
I’ve been thinking a lot lately about why Bitcoin still feels so misunderstood. Not just by the media or the IMF — that part’s predictable. But even inside our own circles, something's missing.
We say it’s money. We say it’s freedom. We say it’s code. And it is. But when you really zoom out, past the price and the politics, it’s something more radical than we usually admit.
Bitcoin is a shift in how power moves. And what we do with that power now actually matters.
The noise outside
Let’s start with the obvious: the media still doesn’t get it. Every other headline is either a death knell or a celebration depending on the price that day. No context. No nuance. No understanding of what we’re building.
You’ve seen the headlines: - “Bitcoin is crashing again.” - “Crypto bros are killing the planet.” - “The IMF warns: Bitcoin adoption is dangerous.”
Yeah? Dangerous to what?
The system they control. The levers they pull. The old game where the house always wins.
That’s why they’re afraid. Not because Bitcoin is volatile, but because it doesn’t ask permission.
This isn’t about panic — it’s about patterns
I’m not saying there’s a conspiracy. But there is inertia. Institutions protect themselves. Systems reinforce themselves. They were never going to roll out the red carpet for an open, borderless network that replaces their function.
So the IMF calls it a threat. Central banks scramble to launch CBDCs. And journalists keep writing the same shallow takes while ignoring the real story.
Meanwhile, we’re still here. Still building. Still holding. Still running nodes.
Bitcoin isn’t perfect. But it’s honest. It doesn’t bend to popularity or political pressure. It enforces rules with math, not people. And that’s exactly why it works.
Even we miss it sometimes
Here’s the part that really hit me recently: even within Bitcoin, we often undersell what this is.
We talk about savings. Inflation. Fiat debasement. All real, all important.
But what about the broader layer? What about governance? Energy? Communication? Defense?
Jason Lowery’s book Softwar lit that fuse for me again. Not because it’s flawless — it’s not. But because he reframed the game.
Bitcoin isn’t a new weapon. It’s the end of weapons-as-power.
Proof-of-work, in Lowery’s view, is a form of peaceful negotiation. A deterrent against coercion. A way to shift from kinetic violence to computational resolution.
Most people — even many Bitcoiners — haven’t fully absorbed that.
It’s not about militarizing the network. It’s about demilitarizing the world through energy expenditure that replaces human conflict.
Let’s be clear: this doesn’t mean Bitcoin will be used this way. It means it can. And that opens up a few possible futures:
- Scenario A: Smaller nations adopt Bitcoin infrastructure as a shield — a deterrent and neutral layer to build sovereignty
- Scenario B: Superpowers attack mining and self-custody, escalating regulatory capture and fragmenting the open protocol into corporate silos
- Scenario C: Bitcoin becomes the boring backend of legacy finance, its edge neutered by ETFs and custody-as-a-service
Which one wins depends on what we build — and who steps up.
Then I found Maya
I came across Maya Parbhoe’s campaign by accident. One of those late-night rabbit holes where Bitcoin Twitter turns into a global map.
She’s running for president of Suriname. She’s a Bitcoiner. And she’s not just tweeting about it — she’s building an entire political platform around it.
No central bank. Bitcoin as legal tender. Full fiscal transparency. Open-source government.
Yeah. You read that right. Not just open-source software — open-source statehood.
Her father was murdered after exposing corruption. That’s not a talking point. That’s real-life consequence. And instead of running away from systems, she’s choosing to redesign one.
That’s maximalism. Not in ideology. In action.
The El Salvador experiment — and evolution
When El Salvador made Bitcoin legal tender in 2021, it lit up our feeds. It was bold. Unprecedented. A true first.
But not without flaws.
The rollout was fast. Chivo wallet was centralized. Adoption stalled in rural areas. Transparency was thin. And despite the brave move, the state’s underlying structure remained top-down.
Bukele played offense, but the protocol was wrapped in traditional power.
Maya is doing it differently. Her approach is grassroots-forward. Open-source by design. Focused on education, transparency, and modular state-building — not just mandates.
She’s not using Bitcoin to prop up state power. She’s using it to distribute it.
Maximalism is evolving
Look, I get it. The memes are fun. The laser eyes. The beefsteak meetups. The HODL culture.
But there’s something else growing here. Something a little quieter, a little deeper: - People running nodes to protect civil liberties - Communities using Lightning for real commerce - Builders forging tools for self-sovereign identity - Leaders like Maya testing what Bitcoin can look like as public infrastructure
This is happening. In real time. It’s messy and fragile and still small. But it’s happening.
Let’s also stay honest:
Maximalism has its risks. Dogma can blind us. Toxicity can push people away. And if we’re not careful, we’ll replace one centralization with another — just wearing different memes.
We need less purity, more principles. Less hype, more clarity. That’s the kind of maximalism Maya embodies.
What now?
Maya doesn’t have a VC fund or an ad agency. She has a message, a mission, and the courage to put Bitcoin on the ballot.
If that resonates, help her. Not just by donating — though here’s the link:
https://geyser.fund/project/maya2025
But by sharing. Writing. Talking. Translating. Connecting.
Bitcoin is still early. But it’s not abstract anymore.
This isn’t just theory.
It’s a protocol, sure. But now, maybe it’s a presidency too.
https://i.nostr.build/0luYy8ojK7gkxsuL.png
-
@ 7d33ba57:1b82db35
2025-03-28 22:14:24Preko is a charming seaside town on Ugljan Island, just a short ferry ride from Zadar. Known for its beautiful beaches, relaxed atmosphere, and stunning views of the Adriatic, it's the perfect place to experience authentic Dalmatian island life.
🌊 Top Things to See & Do in Preko
1️⃣ Swim at Jaz Beach 🏖️
- A Blue Flag beach with clear turquoise waters and soft pebbles.
- Ideal for families thanks to its shallow waters.
- Nearby cafés and restaurants make it a great spot to spend the day.
2️⃣ Visit the Islet of Galevac 🏝️
- A tiny island just 80 meters from Preko, reachable by swimming or a short boat ride.
- Home to a 15th-century Franciscan monastery, surrounded by lush greenery.
- A peaceful retreat, perfect for relaxation.
3️⃣ Hike to St. Michael’s Fortress (Sv. Mihovil) 🏰
- A medieval fortress from the 13th century with breathtaking panoramic views.
- Overlooks Zadar, Kornati Islands, and the Adriatic Sea.
- A 1-hour scenic hike from Preko or accessible by bike or car.
4️⃣ Explore the Local Taverns & Seafood Restaurants 🍽️
- Try fresh seafood, octopus salad, and Dalmatian peka (slow-cooked meat & vegetables).
- Best spots: Konoba Roko (authentic seafood) & Vile Dalmacija (beachfront dining).
5️⃣ Rent a Bike or Scooter 🚲
- Explore Ugljan Island’s olive groves, hidden coves, and coastal paths.
- Visit nearby villages like Kali and Kukljica for more local charm.
6️⃣ Take a Day Trip to Zadar ⛵
- Just 25 minutes by ferry, Zadar offers historic landmarks, the Sea Organ, and Roman ruins.
- Perfect for a cultural excursion before returning to the peaceful island.
🚗 How to Get to Preko
🚢 By Ferry:
- From Zadar: Regular ferries (Jadrolinija) take ~25 minutes.
🚘 By Car:
- If driving, take the ferry from Zadar to Preko and explore the island.
🚴 By Bike:
- Many visitors rent bikes to explore Ugljan Island’s coastal roads.💡 Tips for Visiting Preko
✅ Best time to visit? May–September for warm weather & swimming 🌞
✅ Ferry schedules – Check times in advance, especially in the off-season ⏳
✅ Bring cash – Some smaller taverns and cafés may not accept cards 💰
✅ Stay for sunset – The views over Zadar from Preko’s waterfront are stunning 🌅Would you like hotel recommendations, hidden beaches, or other island activities? 😊
-
@ 8dac122d:0fc98d37
2025-03-28 21:35:27UNOFFICIAL SHOPFRONT
I really enjoyed @plebpoet new craft playing with paper and delivering a weekly zine for us! Such great idea!
@k00b decided to sell the physical printed copies online with zaprite. A fair and understandable decision after a thoughtful examination on how to easily self-host of a basic ecommerce store that accepts bitcoin.
Anyhow, we're still missing an ecommerce shopfront, and I though, why not test with this ~AGORA marketplace thing we got here!
This post will be collecting all the issue weekly, including (when available) direct links to: - the original announcement here on SN - the digital versions for screen readers, - the PDF booklet file, for those willing to print the file themselves, - the link to zaprite to acquire the printed zine with fiat or sats, delivered worldwide to you via post.
I'll add a comment below for each issue.
LFG @SN!
originally posted at https://stacker.news/items/928207
-
@ fe9e99a0:5123e9a8
2025-03-28 21:25:43What’s happening?
-
@ 7d33ba57:1b82db35
2025-03-28 20:59:51Krka National Park, located in central Dalmatia, is one of Croatia’s most breathtaking natural wonders. Famous for its stunning waterfalls, crystal-clear lakes, and lush forests, the park is a must-visit for nature lovers. Unlike Plitvice Lakes, Krka allows swimming in certain areas, making it a perfect summer escape.
🌊 Top Things to See & Do in Krka National Park
1️⃣ Skradinski Buk Waterfall 💦
- The largest and most famous waterfall in the park, with cascading pools and wooden walkways.
- You used to be able to swim here, but since 2021, swimming is no longer allowed.
- Perfect for photography and picnics.
2️⃣ Roški Slap Waterfall 🌿
- A less crowded but equally beautiful series of waterfalls.
- Known for its "necklace" of small cascades leading into the main fall.
- Nearby Mlinica, a restored watermill, shows traditional Croatian life.
3️⃣ Visovac Island & Monastery 🏝️
- A tiny island in the middle of the Krka River, home to a Franciscan monastery from the 15th century.
- Accessible by boat tour from Skradinski Buk or Roški Slap.
- A peaceful, scenic spot with stunning views of the lake.
4️⃣ Krka Monastery 🏛️
- A Serbian Orthodox monastery hidden deep in the park.
- Built on ancient Roman catacombs, which you can explore.
- A quiet, spiritual place, often overlooked by tourists.
5️⃣ Hike & Walk the Nature Trails 🥾
- The park has several well-marked trails through forests, waterfalls, and lakes.
- Wooden walkways allow easy access to the main sights.
- Wildlife spotting: Look out for otters, turtles, and over 200 bird species!
6️⃣ Swim at Skradin Beach 🏖️
- While you can’t swim at Skradinski Buk anymore, Skradin Beach, just outside the park, is a great spot for a dip.
- Kayaking and boat tours available.
🚗 How to Get to Krka National Park
✈️ By Air: The nearest airport is Split (SPU), 1 hour away.
🚘 By Car:
- Split to Krka: ~1 hour (85 km)
- Zadar to Krka: ~1 hour (75 km)
- Dubrovnik to Krka: ~3.5 hours (280 km)
🚌 By Bus: Direct buses from Split, Zadar, and Šibenik to the park’s entrances.
🚢 By Boat: From Skradin, you can take a boat ride into the park.💡 Tips for Visiting Krka National Park
✅ Best time to visit? Spring & early autumn (April–June, September–October) – Fewer crowds & mild weather 🍃
✅ Start early! Arrive before 10 AM to avoid crowds, especially in summer ☀️
✅ Bring water & snacks – Limited food options inside the park 🍎
✅ Wear comfy shoes – Wooden walkways & trails can be slippery 👟
✅ Take a boat tour – The best way to see Visovac Island & hidden spots ⛵
✅ Buy tickets online – Save time at the entrance 🎟️ -
@ 83279ad2:bd49240d
2025-03-29 15:28:45test
-
@ e4950c93:1b99eccd
2025-03-29 14:49:11 -
@ da0b9bc3:4e30a4a9
2025-03-28 19:14:52It's Finally here Stackers!
It's Friday!
We're about to kick off our weekends with some feel good tracks.
Let's get the party started. Bring me those Feel Good tracks.
Let's get it!
https://youtu.be/r1ATFedwjnk?si=tPtLac6ExYZCx3Ez
originally posted at https://stacker.news/items/928119
-
@ 30b99916:3cc6e3fe
2025-03-29 14:12:37Chef's Notes
My mom worked as a waitress for a excellent Chinese restaurant. For years she tried to get this receipt without success and finally after the owner retired he gave her the receipt.
Previously posted this receipt on Zap.Cooking but now wanting to keep all my long-form notes in Obsidian and publish to Nostr using the nostr-writer plug-in.
Details
- ⏲️ Prep time: 20 to 30 minutes
- 🍳 Cook time: 1 to 2 Hours depending on amount of spare ribs
- 🍽️ Servings: 8
Ingredients
- 1 Quart Dole Pineapple Juice
- 1 Pint Dole Crushed Pineapple
- 1 Pint Dole Tidbits Pineapple
- 1 TS Dried Mustard
- 32 Oz Brown sugar or add to taste
- 1 Cup Red Wine
- 2 TS Corn Starch
- 1 or 2 lbs Pork or Beef spare ribs
- Worcestershire sauce
Directions
- Preheat oven to 350 degrees
- Bring water to boil in 8 qt stock pot
- Cut spare ribs and add to boiling water in stock pot
- Boil spare ribs for 20 to 30 minutes to remove excess fat
- Drain spare ribs and place onto cookie sheet
- Base spare ribs with a generous amount of Worcestershire sauce
- Place based spare ribs on cookie sheet and place into oven for 60 minutes.
- Place first 6 ingredients into stock pot and bring to boil while CONTINUOUSLY stirring
- Add corn starch to 2 cups of water and mix to create thickening agent
- Add thickening agent incrementally to Sweet & Sour sauce for desired thickness
- Reduce heat to low while CONTINUOUSLY stirring.
- Remove spare ribs from oven and place into Sweet & Sour sauce.
- Place stock pot into oven and cook until done. 1 to 2 hours.
Bon Appétit
-
@ 3c389c8f:7a2eff7f
2025-03-28 17:10:17There is a new web being built on Nostr. At it's core, is a social experience paralleled by no other decentralized protocol. Nostr not only solves the problems of siloed relationships, third-party identity ownership, and algorithmic content control; it makes possible a ubiquitous social network across almost anything imaginable. User controlled identity, open data, and verifiable social graphs allow us to redefine trust on the web. We can interact with each other and online content in ways that have previously only been pipedreams. Nostr is not just social media, it is the web made social.
Interoperability
The client/relay relationship on Nostr allows for almost endless data exchange between various apps, clients, relays, and users. If any two things are willing to speak the same sub-protocol(s) within Nostr, they can exchange data. Making a friend list enables that list to be used in any other place that chooses to make it available. Creating a relay to serve an algorithmic social feed makes that feed viewable in any client that displays social feeds. Health data held by a patient can be shared with any care provider, verified by their system, and vice versa. This is the point where I have to acknowledge my own tech-deaf limitations and direct you towards nostr.com for more information.
Data Resiliency
I prefer to use the term resiliency here, because its really a mix of data redundancy and self-managed data that creates broad availability. Relays may host 10, 20, 30+ copies of your notes in different locations, but you also have no assurance that those relays will hosts those notes forever. An individual operating their own relay, while also connecting to the wider network, ensures resiliency in events such that wide swaths of the network should disappear or collude against an individual. The simplicity of relay management makes it possible for nearly anyone to make sure that they have a way to convey their messages to their individual network, whether that be close contacts, an audience, or one individual. This resiliency doesn't just apply to typical speech, it applies to any data intended to be shared amongst humans and machines alike.
Pseudonymity and Anonymity
With privacy encroachment from corporations, advertisers, and governments reaching all time highs, the need for identity protecting tools is also on the rise. Nostr utilizes public key encryption for its identity system. As there is no central entity to "verify" you, there is no need to expose any personal identifiable information to any Nostr app, client, or relay. You can protect your personal identity by simply choosing not to expose it. Your reputation will build as you interact with others on the Nostr network. Your social capital can speak for itself. (As with everything else, utilizing a VPN is recommended.)
Identity and Provability
No one can stop an impersonator from trying to hijack an identity. With Nostr, you CAN prove that you are you, though, which is basically the same as saying "that person is not me" Every note you write, every action you take, is cryptographically signed by your private key. As long as you maintain control of that key, you can prove what you did or did not do.
Censorship Resistance
If you have read our Relay Rundown then you probably get the idea. If not here's the tl;dr: Many small, lightweight relays make up Nostr's distribution system. They are simple enough that anyone can run one. They are redundant enough that you can be almost certain your content exists somewhere. If that is not peace of mind enough, you can run your own with ease. Censorship resistance isn't counting on one company, man, or server to protect what you say. It is taking control of your speech. Nostr makes it easy.
Freedom of Mind and Association
Nostr eliminates the need for company run algorithms that high-jack your attention to feed the advertising industry. You are free to choose your social media experience. Nostr's DVMs, curations, and conversation-centered relays offer discovery mechanisms run by any number of providers. That could be an individual, a company, a group, or you. Many clients incorporate different ways of engaging with these corporate algorithm alternatives. You can also choose to keep a purely chronological feed of the the things and people you follow. Exploring Nostr through its many apps opens up a the freedom to choose what and how you feed your mind.
When we are able to explore, we end up surrounding ourselves with people who share our interests & hobbies. We find friends. This creates distance between ideologies and stark beliefs that often are used as the basis for the term "being in a bubble". Instead of bubbling off, an infinitely open space of thoughts and ideas allows for groups to gather naturally. In this way, we can choose not to block ourselves off from opposing views but to simply distance ourselves from them.
Nostr's relay system also allows for the opposite. Tight-knit communities can create a space for its members to socialize and exchange information with minimal interference from any outside influence. By setting up their own relays with strict rules, the members can utilize one identity to interact within a community or across the broader social network.
-
@ 15a592c4:e8bdd024
2025-03-28 16:26:38The Potential and Importance of Blockchain: A Game-Changer in the Digital Age
Blockchain technology has been gaining momentum in recent years, and for good reason. This innovative technology has the potential to revolutionize the way we conduct transactions, store data, and build trust in the digital world.
What is Blockchain?
At its core, blockchain is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network.¹ It's a decentralized system, meaning that no single entity controls it, and it's maintained by a network of computers working together.
The Benefits of Blockchain
So, what makes blockchain so important? Here are just a few of its key benefits:
- Enhanced Security: Blockchain's decentralized nature and use of advanced cryptography make it virtually impossible to hack or manipulate.
- Increased Transparency: With blockchain, all transactions are recorded publicly and can be viewed by anyone with permission.
- Improved Efficiency: Blockchain automates many processes, reducing the need for intermediaries and increasing the speed of transactions.
- Greater Trust: Blockchain's immutable ledger ensures that once a transaction is recorded, it can't be altered or deleted.
Real-World Applications
Blockchain's potential extends far beyond the world of cryptocurrency. Here are just a few examples of its real-world applications:
- Supply Chain Management: Blockchain can be used to track the origin, quality, and movement of goods throughout the supply chain.
- Healthcare: Blockchain can be used to securely store and manage medical records, track prescriptions, and enable secure sharing of medical research.
- Voting Systems: Blockchain can be used to create secure, transparent, and tamper-proof voting systems.
-
@ 0d6c8388:46488a33
2025-03-28 16:24:00Huge thank you to OpenSats for the grant to work on Hypernote this year! I thought I'd take this opportunity to try and share my thought processes for Hypernote. If this all sounds very dense or irrelevant to you I'm sorry!
===
How can the ideas of "hypermedia" benefit nostr? That's the goal of hypernote. To take the best ideas from "hypertext" and "hypercard" and "hypermedia systems" and apply them to nostr in a specifically nostr-ey way.
1. What do we mean by hypermedia
A hypermedia document embeds the methods of interaction (links, forms, and buttons are the most well-known hypermedia controls) within the document itself. It's including the how with the what.
This is how the old web worked. An HTML page was delivered to the web browser, and it included in it a link or perhaps a form that could be submitted to obtain a new, different HTML page. This is how the whole web worked early on! Forums and GeoCities and eBay and MySpace and Yahoo! and Amazon and Google all emerged inside this paradigm.
A web browser in this paradigm was a "thin" client which rendered the "thick" application defined in the HTML (and, implicitly, was defined by the server that would serve that HTML).
Contrast this with modern app development, where the what is usually delivered in the form of JSON, and then HTML combined with JavaScript (React, Svelte, Angular, Vue, etc.) is devised to render that JSON as a meaningful piece of hypermedia within the actual browser, the how.
The browser remains a "thin" client in this scenario, but now the application is delivered in two stages: a client application of HTML and JavaScript, and then the actual JSON data that will hydrate that "application".
(Aside: it's interesting how much "thicker" the browser has had to become to support this newer paradigm!)
Nostr was obviously built in line with the modern paradigm: nostr "clients" (written in React or Svelte or as mobile apps) define the how of reading and creating nostr events, while nostr events themselves (JSON data) simply describe the what.
And so the goal with Hypernote is to square this circle somehow: nostr currently delivers JSON what, how do we deliver the how with nostr as well. Is that even possible?
2. Hypernote's design assumptions
Hypernote assumes that hypermedia over nostr is a good idea! I'm expecting some joyful renaissance of app expression similar to that of the web once we figure out how to express applications in a truly "nostr" way.
Hypernote was also deeply inspired by HTMX, so it assumes that building web apps in the HTMX style is a good idea. The HTMX insight is that instead of shipping rich scripting along with your app, you could simply make HTML a tiny bit more expressive and get 95% of what most apps need. HTMX's additions to the HTML language are designed to be as minimal and composable as possible, and Hypernote should have the same aims.
Hypernote also assumes that the "design" of nostr will remain fluid and anarchic for years to come. There will be no "canonical" list of "required" NIPs that we'll have "consensus" on in order to build stable UIs on top of. Hypernote will need to be built responsive to nostr's moods and seasons, rather than one holy spec.
Hypernote likes the
nak
command line tool. Hypernote likes markdown. Hypernote likes Tailwind CSS. Hypernote likes SolidJS. Hypernote likes cold brew coffee. Hypernote is, to be perfectly honest, my aesthetic preferences applied to my perception of an opportunity in the nostr ecosystem.3. "What's a hypernote?"
Great question. I'm still figuring this out. Everything right now is subject to change in order to make sure hypernote serves its intended purpose.
But here's where things currently stand:
A hypernote is a flat list of "Hypernote Elements". A Hypernote Element is composed of:
- CONTENT. Static or dynamic content. (the what)
- LOGIC. Filters and events (the how)
- STYLE. Optional, inline style information specific to this element's content.
In the most basic example of a hypernote story, here's a lone "edit me" in the middle of the canvas:
{ "id": "fb4aaed4-bf95-4353-a5e1-0bb64525c08f", "type": "text", "text": "edit me", "x": 540, "y": 960, "size": "md", "color": "black" }
As you can see, it has no logic, but it does have some content (the text "edit me") and style (the position, size, and color).
Here's a "sticker" that displays a note:
{ "id": "2cd1ef51-3356-408d-b10d-2502cbb8014e", "type": "sticker", "stickerType": "note", "filter": { "kinds": [ 1 ], "ids": [ "92de77507a361ab2e20385d98ff00565aaf3f80cf2b6d89c0343e08166fed931" ], "limit": 1 }, "accessors": [ "content", "pubkey", "created_at" ], "x": 540, "y": 960, "associatedData": {} }
As you can see, it's kind of a mess! The content and styling and underdeveloped for this "sticker", but at least it demonstrates some "logic": a nostr filter for getting its data.
Here's another sticker, this one displays a form that the user can interact with to SEND a note. Very hyper of us!
{ "id": "42240d75-e998-4067-b8fa-9ee096365663", "type": "sticker", "stickerType": "prompt", "filter": {}, "accessors": [], "x": 540, "y": 960, "associatedData": { "promptText": "What's your favorite color?" }, "methods": { "comment": { "description": "comment", "eventTemplate": { "kind": 1111, "content": "${content}", "tags": [ [ "E", "${eventId}", "", "${pubkey}" ], [ "K", "${eventKind}" ], [ "P", "${pubkey}" ], [ "e", "${eventId}", "", "${pubkey}" ], [ "k", "${eventKind}" ], [ "p", "${pubkey}" ] ] } } } }
It's also a mess, but it demos the other part of "logic": methods which produce new events.
This is the total surface of hypernote, ideally! Static or dynamic content, simple inline styles, and logic for fetching and producing events.
I'm calling it "logic" but it's purposfully not a whole scripting language. At most we'll have some sort of
jq
-like language for destructing the relevant piece of data we want.My ideal syntax for a hypernote as a developer will look something like
```foo.hypernote Nak-like logic
Markdown-like content
CSS-like styles ```
But with JSON as the compile target, this can just be my own preference, there can be other (likely better!) ways of authoring this content, such as a Hypernote Stories GUI.
The end
I know this is all still vague but I wanted to get some ideas out in the wild so people understand the through line of my different Hypernote experiments. I want to get the right amount of "expressivity" in Hypernote before it gets locked down into one spec. My hunch is it can be VERY expressive while remaining simple and also while not needing a whole scripting language bolted onto it. If I can't pull it off I'll let you know.
-
@ 6f1a5274:3b3bb9c4
2025-03-28 14:27:448us là một nền tảng giải trí trực tuyến mang đến cho người chơi một không gian giải trí đa dạng và đầy thú vị. Với giao diện thân thiện và dễ sử dụng, người chơi có thể dễ dàng truy cập và tham gia vào các trò chơi yêu thích của mình chỉ trong vài bước đơn giản. Các trò chơi trên 8us được thiết kế với đồ họa sắc nét và âm thanh sống động, mang lại trải nghiệm mượt mà và chân thực, giúp người chơi cảm nhận như đang tham gia vào một thế giới giải trí thực sự. Ngoài các trò chơi phong phú và hấp dẫn, 8us còn thường xuyên cập nhật các tựa game mới, giữ cho trải nghiệm luôn mới mẻ và thú vị.
Bảo mật và an toàn luôn là ưu tiên hàng đầu của 8us. Nền tảng này sử dụng các công nghệ bảo mật tiên tiến để bảo vệ thông tin cá nhân và dữ liệu giao dịch của người chơi, giúp họ có thể yên tâm tham gia mà không phải lo lắng về nguy cơ bị xâm phạm. Mọi giao dịch và thông tin cá nhân đều được mã hóa và bảo vệ chặt chẽ, mang lại sự an tâm tuyệt đối cho người chơi. Với những biện pháp bảo mật này, 8us đã xây dựng được lòng tin từ cộng đồng người chơi, tạo ra một môi trường an toàn và đáng tin cậy để mọi người có thể tận hưởng những phút giây giải trí mà không phải lo ngại về các vấn đề liên quan đến dữ liệu cá nhân.
Bên cạnh đó, đội ngũ hỗ trợ khách hàng của 8us luôn sẵn sàng phục vụ người chơi 24/7, giúp giải đáp mọi thắc mắc và xử lý nhanh chóng các vấn đề phát sinh. Dù là vấn đề về kỹ thuật hay hỗ trợ về trò chơi, đội ngũ chăm sóc khách hàng của 8us luôn làm việc tận tâm và chuyên nghiệp, đảm bảo mang lại sự hài lòng cho mọi người tham gia. Chính nhờ vào dịch vụ khách hàng xuất sắc và hệ thống bảo mật vượt trội, 8us đã trở thành một nền tảng giải trí trực tuyến được nhiều người tin tưởng và yêu thích, đồng thời tạo ra một không gian thư giãn tuyệt vời, an toàn và đáng tin cậy cho tất cả người chơi.
-
@ 6f1a5274:3b3bb9c4
2025-03-28 14:26:4297win là một nền tảng giải trí trực tuyến nổi bật, mang đến cho người chơi những trải nghiệm độc đáo và thú vị. Với giao diện dễ sử dụng và thiết kế thân thiện, nền tảng này giúp người chơi dễ dàng tham gia vào các trò chơi yêu thích của mình mà không gặp phải bất kỳ khó khăn nào. Các trò chơi tại 97win không chỉ đa dạng về thể loại mà còn được phát triển với đồ họa sắc nét và âm thanh sống động, mang lại những trải nghiệm tương tác đầy thú vị và chân thực. Từ những trò chơi đơn giản đến những thử thách phức tạp, 97win luôn biết cách tạo ra không gian giải trí phong phú, thu hút cả những người mới bắt đầu và các người chơi dày dặn kinh nghiệm.
Ngoài chất lượng trò chơi, 97win còn chú trọng đến yếu tố bảo mật và an toàn của người chơi. Nền tảng này sử dụng công nghệ bảo mật hiện đại để bảo vệ thông tin cá nhân và giao dịch của người tham gia, giúp người chơi yên tâm tuyệt đối khi tham gia. Tất cả các dữ liệu quan trọng đều được mã hóa và bảo vệ chặt chẽ, đảm bảo rằng mọi thông tin sẽ không bị xâm phạm hoặc lộ lọt ra ngoài. Với cam kết mang đến một môi trường an toàn, 97win đã xây dựng được lòng tin vững chắc từ người chơi, giúp họ hoàn toàn tập trung vào việc giải trí mà không phải lo lắng về các vấn đề bảo mật.
Bên cạnh đó, đội ngũ chăm sóc khách hàng của 97win luôn sẵn sàng hỗ trợ người chơi 24/7, giải đáp mọi thắc mắc và giải quyết các vấn đề phát sinh một cách nhanh chóng và hiệu quả. Mỗi vấn đề, dù lớn hay nhỏ, đều được đội ngũ hỗ trợ xử lý một cách tận tâm và chuyên nghiệp, giúp người chơi cảm thấy thoải mái và hài lòng với dịch vụ. Sự kết hợp giữa các trò chơi chất lượng, bảo mật an toàn và dịch vụ khách hàng chu đáo đã giúp 97win trở thành một lựa chọn đáng tin cậy cho những ai tìm kiếm một không gian giải trí trực tuyến tuyệt vời và an toàn.
-
@ 5ffb8e1b:255b6735
2025-03-29 13:57:02As a fellow Nostrich you might have noticed some of my #arlist posts. It is my effort to curate artists that are active on Nostr and make it easier for other users to find content that they are interested in.
By now I have posted six or seven posts mentioning close to fifty artists, the problem so far is that it's only a list of handles and it is up to reader to click on each in order to find out what are the artist behind the names all about. Now I am going to start creating blog posts with a few artists mentioned in each, with short descriptions of their work and an image or to.
I would love to have some more automated mode of curation but I still couldn't figure out what is a good way for it. I've looked at Listr, Primal custom feeds and Yakihonne curations but none seem to enable me to make a list of npubs that is then turned into a feed that I could publicly share for others to views. Any advice on how to achieve this is VERY welcome !
And now lets get to the first batch of artists I want to share with you.
Eugene Gorbachenko
nostr:npub1082uhnrnxu7v0gesfl78uzj3r89a8ds2gj3dvuvjnw5qlz4a7udqwrqdnd Artist from Ukrain creating amazing realistic watercolor paintings. He is very active on Nostr but is very unnoticed for some stange reason. Make sure to repost the painting that you liked the most to help other Nostr users to discover his great art.
Siritravelsketch
nostr:npub14lqzjhfvdc9psgxzznq8xys8pfq8p4fqsvtr6llyzraq90u9m8fqevhssu a a lovely lady from Thailand making architecture from all around the world spring alive in her ink skethes. Dynamic lines gives it a dreamy magical feel, sometimes supported by soft watercolor strokes takes you to a ferytale layer of reality.
BureuGewas
nostr:npub1k78qzy2s9ap4klshnu9tcmmcnr3msvvaeza94epsgptr7jce6p9sa2ggp4 a a master of the clasic oil painting. From traditional still life to modern day subjects his paintings makes you feel the textures and light of the scene more intense then reality itself.
You can see that I'm no art critic, but I am trying my best. If anyone else is interested to join me in this curration adventure feel free to reach out !
With love, Agi Choote
-
@ 6f1a5274:3b3bb9c4
2025-03-28 14:25:11777vin nổi bật với một nền tảng giải trí trực tuyến hiện đại, nơi người chơi có thể tận hưởng những giây phút thư giãn thú vị. Với giao diện dễ sử dụng và thiết kế tối ưu, người chơi có thể nhanh chóng tham gia vào các trò chơi yêu thích của mình mà không gặp phải khó khăn. Những trò chơi tại 777vin được phát triển với đồ họa sắc nét và âm thanh sống động, mang đến một trải nghiệm gần gũi và chân thực. Không chỉ có tính năng hấp dẫn, các trò chơi tại đây còn được tối ưu hóa để người chơi có thể tham gia một cách mượt mà, giúp tăng cường sự thư giãn và giải trí.
Bên cạnh chất lượng trò chơi, 777vin còn chú trọng đến bảo mật và an toàn thông tin người chơi. Nền tảng này sử dụng công nghệ bảo mật tiên tiến nhất để bảo vệ dữ liệu cá nhân và giao dịch của người tham gia. Những biện pháp bảo mật này giúp người chơi cảm thấy an tâm tuyệt đối khi tham gia vào các trò chơi, mà không cần lo ngại về việc thông tin của mình bị lộ lọt hay bị xâm phạm. Điều này là một yếu tố quan trọng, giúp 777vin xây dựng lòng tin vững chắc với cộng đồng người chơi, tạo ra một môi trường giải trí an toàn và đáng tin cậy.
Ngoài việc bảo vệ an toàn thông tin, 777vin còn đặc biệt chú trọng đến chất lượng dịch vụ khách hàng. Đội ngũ hỗ trợ của 777vin luôn sẵn sàng phục vụ người chơi 24/7, giải đáp mọi thắc mắc và hỗ trợ kịp thời mọi vấn đề phát sinh. Sự chuyên nghiệp và tận tâm của đội ngũ này giúp người chơi có thể yên tâm trải nghiệm trò chơi mà không phải lo lắng về bất kỳ vấn đề nào. Với sự kết hợp giữa chất lượng dịch vụ, bảo mật tuyệt đối và trải nghiệm người chơi hoàn hảo, 777vin đã và đang khẳng định vị thế của mình là một trong những nền tảng giải trí trực tuyến hàng đầu.
-
@ 65038d69:1fff8852
2025-03-28 14:20:35What is “the cloud”? And more importantly, who cares? The term has been in use for years and is long past the point of being a buzzword, but it might become relevant again as we enter the next phase of the cycle.
The cloud (as we’ll define it) is any computer system, in part or in full, that runs in someone else’s facility. Facebook is in the cloud. Etsy is in the cloud. Your bank’s internal systems are probably not in the cloud; they run their systems “on-prem” (short for on-premises, or in their own facilities) for regulatory and security reasons.
But if on-prem is more secure, why would we use the cloud at all? Its mostly convenience and scaling. If you want a website its much easier to set up a Squarespace or GoDaddy account and use their building tools than it is to get an enterprise internet connection, buy a server, install and set up all the software needed, and make the website from scratch. Maintenance is also much easier. Ask any QuickBooks user about the convenience of QuickBooks Online vs Desktop. Also if your needs change, cloud providers will happily automatically bill you more for the increased usage, as apposed to needing to buy more or upgrade your equipment to handle the load.
If the cloud is so much easier, why use on-prem at all? And what was that you said about cycles? Accounting and human resources. (Not HR as in the department, but the actual human resources available to you.) In accounting, the cloud is considered a service and falls under OpEx (operating expenses), while on-prem equipment such as servers fall under CapEx (capital expenses). And eeeeeveryone has a different, and often very strong, opinion on which is better. On costs, they’re pretty similar if averaged over 5, 10, or 20+ years, but with on-prem the CapEx is mostly up-front, so that can scare people over to the easy monthly payments of the cloud. On-prem also usually requires access to more technical human resources. If you’re a small organization you probably don’t have dedicated I.T. staff or maybe even the budget to hire contractors. All of this leads to cycles between the cloud and on-prem being more popular.
That all sounds like a sales pitch for cloud, but I have a sales pitch for you for on-prem. And that sales pitch is sovereignty. What happens to your records if QuickBooks closes your account? Your social media presence if Facebook does the same? How will you access your money if your bank freezes your accounts? These types of hazards can be mitigated by using on-prem instead of the cloud. It gives you far more control over your data and services. You can also build your own “private cloud” if you want to, maintaining control but making your systems available away from your office or home.
Want to get ahead of the cycle and move some of your systems on-prem? You can find us at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-28 14:20:35Last week our household acquired a dog. I’ve had and trained dogs before; four in total over the course of about 20 years. But it’s been about 6 years without one, and this one is an inside dog, which is completely new to me. Old habits die hard though and I’m finding nuggets of skills and knowledge slowly returning.
I was lucky enough to get some formal training in dog training in my early teens, and I remember noticing some of the base training methods we used with dogs matched the human learning methods our family talked about. When I later joined the workforce this idea was reinforced during onboardings and later when I was asked to train others on technology platforms. People and dogs learn best with repetition, reward (also known as positive reinforcement), and a combination of learning styles.
You’ve probably heard of the classic learning styles framed one way or another depending on the book, workshop, or TED Talk you experienced that one time. The three core styles of auditory, visual, and kinesthetic overlap in training people and dogs. (I feel the need to pause and reiterate that while I am comparing people to dogs, I’m not conflating the two. You are not a dog. I might be, because on the internet nobody knows you’re a dog, but I’m not calling you one.) For people, auditory may be a professor lecturing or a friend explaining a new board game. For dogs, verbal commands such as “Fido, sit!” fill that role. Visual for people could be a diagram or demonstration, while for dogs a hand signal does the same. Kinesthetic is a bit different; for people we sometimes call it “hands on” or the 4H motto of “learn to do by doing”, while for dogs it might be physically placing them a sitting position while giving the sit command.
Combining the styles is the best way to achieve maximum effect. With people we usually do this for efficiency’s sake (especially in groups); auditory and visual at the same time, followed by some hands-on activity or practice. For dogs, especially for new commands, we’ll say “Fido, sit!” while showing the hand signal, followed by placing or gently pushing if needed.
Repetition is a necessity; I’ve never seen a dog learn a new command after a single exercise, so don’t beat yourself up if you don’t learn that new thing after one try! (I will admit to projecting hard on that one; raise your hand if you’re a former gifted child!)
Lastly, use positive reinforcement. It sticks (pun fully intended) a thousand times better than negative reinforcement with dogs and people. Treats following successes work wonders with dogs. Ours likes these tiny cubes of dehydrated beef liver. A direct analogue may not exist for people though. I can’t see myself having a single raisin every time I write a few words in a post. How do you “treat” yourself for learning?
Want help with training the technology dog in you or your staff? You can find us a scalebright.ca.
-
@ bf95e1a4:ebdcc848
2025-03-28 13:56:06This is a part of the Bitcoin Infinity Academy course on Knut Svanholm's book Bitcoin: Sovereignty Through Mathematics. For more information, check out our Geyser page!
Financial Atheism
“Don’t trust, verify” is a common saying amongst bitcoiners that represents a sound attitude towards not only Bitcoin but all human power structures. In order to understand Bitcoin, one must admit that everything in society is man-made. Every civilization, every religion, every constitution, and every law is a product of human imagination. It wasn’t until as late as the 17th century that the scientific method started to become the dominant practice for describing how the world actually worked. Peer-to-peer review and repeated testing of a hypothesis are still quite recent human practices. Before this, we were basically just guessing and trusting authorities to a large extent. We still do this today, and despite our progress over the last couple of centuries, we still have a long way to go. Our brains are hardwired to follow the leader of the pack. The human brain is born with a plethora of cognitive biases pre-installed, and we have to work very hard to overcome them. We evolved to survive in relatively small groups, and our brains are thus not really made for seeing the bigger picture. Bitcoin’s proof-of-work algorithm is constructed in such a way that it is easy to verify that computational power was sacrificed in order to approve a block of transactions and claim its reward. In this way, no trust in any authority is required as it is relatively trivial to test the validity of a block and the transactions it contains. This is nothing short of a complete reimagining of how human society ought to be governed. The beauty of mathematics governs the Bitcoin system. Everything that ever happens in Bitcoin is open and verifiable to everyone, even to those who are not yet using it.
After the tragic events of 9/11 in 2001, Sam Harris started writing his book The End of Faith, which happened to be released around the same time as Richard Dawkins’ The God Delusion, Daniel Dennett's Breaking the Spell, and Christopher Hitchens’ God Is Not Great: How Religion Poisons Everything. These books kick-started what, in hindsight, has often been referred to as the new atheist movement, even though there has arguably never been anything new about atheism. Atheism must almost certainly have preceded religion since religious ideas require the person holding the idea to believe a certain doctrine or story. Atheism is nothing but the rejection of ways to describe the world that are not verifiable by experimentation. A fly on the wall is probably an atheist by this definition of the word. Atheism is often accused of being just another set of beliefs, but the word itself describes what it is much better — a lack of belief in theistic ideas. It is not a code of conduct or set of rules to live your life by; it is simply the rejection of that which cannot be scientifically verified. Many people, religious people, in particular, have a hard time grasping this. If you believe that a supernatural entity created everything in everyone's life, you might not be too comfortable with a word that describes a complete rejection of what you believe created everything, including the very atheist that the word describes. The amount of different religious worldviews that exist is probably equal to the sum of all religious people on the planet, but all world views that reject these superstitious beliefs require but one word. Atheism is not the opposite of religion but is simply the lack of it.
In 2008, another sub-culture movement of unbelief was born. Let’s call it Financial Atheism — the rejection of unverifiable value claims. With the invention of Bitcoin, a way of rejecting fraudulent expressions of a token’s value was born. Those of us fortunate enough to have been born in secular countries all enjoy not having the ideas of religious demagogues dictating our lives on a daily basis. We can choose which ideas to believe in and which to reject. What we still have very limited means of choosing, however, are the ways in which we express value to each other. We’re told to use a system in which we all have a certain number of value tokens assigned to our name, either as a number on a screen or as digits on paper notes. We all live in the collective hallucination that these numbers are somehow legit and that their authenticity is not to be questioned.
A Bitcoin balance assigned to a certain Bitcoin address might seem just as questionable to a layman, but if you have a basic understanding of the hashing algorithms and game theory behind it, it’s not. At the time of writing, the hash of the latest block on the Bitcoin blockchain begins with eighteen zeros in a row. These zeros represent the Proof of Work that ensures that this block is valid and that every transaction in it actually happened. If you can grasp the concept of a hashing algorithm, and if you have an intuition about mathematics, you realize the gargantuan amount of calculating effort that went into finding this particular hash. It is simply mind-blowing. To forge a false version of a hash beginning with eighteen zeros just wouldn’t be economically viable. Of course, you can never actually know that a 51% attack or some other attempt at corrupting the blockchain hasn’t occurred, but you can know that such an attack would require more than half of the network acting against their own economic interest. Bitcoin is not something to believe in. You don’t need to trust any authority because you can validate the plausibility of its authenticity yourself. It’s the financial equivalent of atheism or unbelief. Satoshi wasn’t Jesus. Satoshi was Brian of Nazareth, telling his followers to think for themselves.
The first law of thermodynamics, also known as the Law of Conservation of Energy, states that energy cannot be created or destroyed in an isolated system. The second law states that the entropy of any isolated system always increases, and the third law states that the entropy of a system approaches a constant value as the temperature approaches absolute zero. In the Bitcoin network, participants known as miners compete for new Bitcoin in a lottery with very fixed rules. The more hashing power (computing power) a miner contributes to the network, the higher his chances of winning the block reward, a specific amount of Bitcoin that is halved every four years. The difficulty of this lottery - in other words, the miner’s chance of winning it — is re-calibrated every 2016th block so that the average time it takes to find the next block is always roughly ten minutes. What this system produces is absolute scarcity; the amount of Bitcoin in existence at any moment in time is always predictable. The more time that passes, the slower the rate of coin issuance and the block reward slowly approaches zero. By the time it does, around the year 2140, the individual miner’s incentive to mine for a reward will, at least theoretically, have been replaced by an incentive to collect transaction fees from the participants of the network. Even now, the sum of all fees make up a non-trivial part of the miners’ revenue. Yet from a user’s point of view the fees are still very low, and as the network scales up using Layer 2 solutions such as the Lightning Network, they’re expected to remain low for quite a long time ahead.
Absolute scarcity is a concept that mankind has never encountered before. Arguably, this makes it the first man-made concept to ever be directly linked to the laws of physics. Everything anyone does requires a certain amount of energy. The very word doing implies that some kind of movement, some type of energy expenditure, needs to occur. As mentioned earlier, how we value things is entirely subjective. Different actions are of different value to different people. How we value different things is also inevitably linked to the supply of those things. Had the trapped-under-ice winter diver mentioned in chapter one been equipped with a scuba tank, he probably wouldn't have thought of his next breath as such a precious thing. The price a person is willing to pay for a good — in other words, the sum of one or more person’s actions — can be derived from two basic variables: The highly subjective demand for the good and the always-constrained-by-time-and-space supply of that same good. Note that if supply is sufficiently limited, there only needs to be a minimal amount of demand for a good for its price to increase.
One could argue that no one needs Bitcoin and that, therefore, Bitcoin would have no intrinsic value. One could also argue that there’s no such thing as intrinsic value since demand is always subjective. In any case, there will always be a cost to mine Bitcoin, and the more mining power in the network, the higher that cost. This cost, ensured by the Bitcoin network’s Proof-Of-Work algorithm, is probably as close to a pure energy cost as the price of a human activity will ever get. Once the mining rig is in place, a simple conversion process follows — energy in, scarce token out. Should the cost of production exceed the current price of the token, the miner can just choose not to sell, thereby limiting the supply of Bitcoin in circulation even more and eventually selling them for other goods whenever he sees fit. In this sense, Bitcoin is a battery. Perhaps the best battery ever invented.
Storing and moving electrical energy around has always been costly and wasteful. Bitcoin offers a way of converting energy into a small part of a specific number. A mathematical battery, if you will. It is important to remember that it does not convert energy into value directly, but rather electricity into digital scarcity — digital scarcity that can be used to express value. Energy cannot be created or destroyed in an isolated system, as the first law of thermodynamics clearly states. Bitcoin can express how much energy was sacrificed in order to acquire a share of the total sum. You can also acquire Bitcoin by buying it rather than mining it, but in doing so, you also spend energy. You somehow acquired the money with which you bought the Bitcoin. You, or someone else, sacrificed time and energy somewhere. Bitcoin lets you express that you see that there’s a connection between value and scarcity by letting you sacrifice effort to claim a part of the total sum.
The excitement we so-called "Bitcoin Maximalists" feel about Bitcoin does not come primarily from the enormous gains that those who hopped early onto the freight train have been blessed with. Nor is it because we’re “in it for the technology,” as can often be heard from opponents. Those of us who preach the near-divinity of this invention do so above all because we see the philosophical impacts of absolute scarcity in a commodity. The idea of a functioning solution to the double-spending problem in computerized money is an achievement that simply can’t be ignored. By solving the double-spending problem, Satoshi also made counterfeiting impossible, which in turn makes artificial inflation impossible. The world-changing potential of this invention cannot be understated. Not in the long run.
The more you think about it, the more the thought won’t give you any peace of mind. If this experiment works, if it’s real, it will take civilization to the next level. What we don’t know is how long this will take. Right now, debates in the Bitcoin space are about Bitcoin’s functionality as a medium of exchange and its potential as a good store of value. We might be missing the point. We cannot possibly know if a type of monetary token for which you’re completely responsible, with no third-party protection, will ever become a preferred medium of exchange for most transactions. Nor can we know if the price of Bitcoin will follow the hype-cycle path that we all want it to follow so that it can become the store of value that most maximalists claim it already is. Maybe we’ve been focused on the wrong things all along. Maybe Bitcoin’s greatest strength is in its functionality as a unit of account. After all, this is all that Bitcoin does. If you own 21 Bitcoin, you own one-millionth of the world's first absolutely scarce commodity. This might not make you rich overnight, but it just might have something to do with the opportunities available to your great-great-grandchildren.
Throughout history, whenever a prehistoric human tribe invented ceremonial burial, that tribe began to expand rapidly. Why? Because as soon as you invent belief in an afterlife, you also introduce the idea of self-sacrifice on a larger scale. People who held these beliefs were much easier for a despot to manipulate and send into battle with neighboring tribes. Religious leaders can use people’s fears and superstitions to have them commit all sorts of atrocities to their fellow man, and they still do so today. Belief in a “greater good” can be the most destructive idea that can pop up in a human mind. The Nazis of World War II Germany believed that exterminating Jews was for the “greater good” of their nation’s gene pool. Belief in noble causes often comes with unintended side effects, which can have disastrous consequences.
Religious leaders, political leaders, and other power-hungry sociopaths are responsible for the greatest crimes against humanity ever committed — namely, wars. Europeans often question the Second Amendment to the United States Constitution, which protects the right to bear arms, whenever a tragic school shooting occurs on the other side of the Atlantic. What everyone seems to forget is that less than a hundred years ago, Europe was at war with itself because its citizens had given too much power to their so-called leaders. The Nazis came to power in a democracy — never forget that. Our individual rights weren’t given to us by our leaders; we were born with them. Our leaders can’t give us anything; they can only force us to behave in certain ways. If we truly want to be in charge of our lives, we need to find the tools necessary to circumvent the bullshit ourselves.
About the Bitcoin Infinity Academy
The Bitcoin Infinity Academy is an educational project built around Knut Svanholm’s books about Bitcoin and Austrian Economics. Each week, a whole chapter from one of the books is released for free on Highlighter, accompanied by a video in which Knut and Luke de Wolf discuss that chapter’s ideas. You can join the discussions by signing up for one of the courses on our Geyser page. Signed books, monthly calls, and lots of other benefits are also available.
-
@ 65038d69:1fff8852
2025-03-28 13:00:00Two weeks ago I posted “Delete the Technology” talking about the idea of removing entire technological elements from your life, such as smartphones or social medias, as a way to simplify. Little did I know one of those elements in my life would soon be deleting me…
Story time! While at my desk last week I saw I had an email from Instagram about the ScaleBright account. It had been suspended due to being connected to my personal Facebook account, which was an admin on a Facebook Page for an old business (closed 5+ years ago), which was currently suspended for “violating community guidelines”. I could of course appeal this decision, which I did, and during the process it was explained that the offending Facebook Page was suspended by one of their automated systems. Also, because the ScaleBright Instagram account was connected to my personal Facebook account, it too had been suspended, as well as my associated personal Instagram account. To reiterate, the causal chain of events was:
- automated suspension of an old, disused Facebook Page, which caused
- automated suspension of the ScaleBright Instagram account, which caused
- automated suspension of my personal Facebook account, which caused
- automated suspension of my personal Instagram account
After appealing the suspension of the ScaleBright Instagram account another automated system released it, saying the suspension was in error. In theory this should have automatically released my personal Facebook and Instagram accounts. As luck would have it, this did not happen. Those accounts are still suspended.
The instructions from Facebook to appeal where to “log into your (scalebrightsolutions) Instagram account to appeal our decision”. This of course does nothing as that account is no longer suspended. After much searching I was able to find an email address that is supposedly for manually appealing suspensions (appeals@fb.com), but Facebook’s own documentation makes no mention of that address or any other. I’ve sent an email anyway.
Given my earlier suggestion of deleting technology, it may behoove me to take my own medicine and let those accounts go. Do I even need them for anything? I did make extensive use of Facebook Messenger and Marketplace, as well as Groups and Pages. Lots of teams and businesses use these tools exclusively for communication too (such as my local farmer’s market), with little chance of them changing platforms because little ol’ me “doesn’t use Facebook anymore”. But what are my options?
I have two options before me, both of which have downsides. If I can’t successfully appeal, I could let the accounts go and live without those platforms. Or I could create new accounts, but that goes directly against Meta’s terms of service, and I’d risk getting automatically suspended all over again. As of today I’m leaning toward shouting a hearty William Wallace “freedooooom!” and abandoning Meta’s platforms permanently. After all, there are other options for chat and social media that are built to be the antithesis of this sort of centralized authoritarianism, some of which I’m already using.
Nostr is a social media protocol I’ve been using for about a year now. This is different than a platform, such as Facebook, as there is no central ownership or authority for Nostr. Nostr uses a combination of servers (called relays) and apps (called clients), of which anyone can create and use. There are no “official” servers or apps, and while a server operator could ban my account from their server, they can’t ban me from the protocol or anyone else’s servers. If I wanted to I could even create my own private server just for me and my friends. One of the downsides to Nostr is that’s there’s no integrated chat or messaging functions.
For chat I’ve been testing Matrix. It’s similar to Nostr in that it’s a protocol and not a platform, and uses a combination of servers and apps. You can connect to the wider Matrix network, or just your own private server.
The biggest problem with both Nostr and Matrix is that to be useful, people need to use them. This loops us back to Facebook; the people I want to communicate with are there, and have no effective reasons to leave and use Nostr and Matrix instead. I guess I’ll need to brush up on my Braveheart speeches. *Ahem* They may suspend our accounts, but they’ll never suspend our freedom!
-
@ 65038d69:1fff8852
2025-03-28 13:00:00There aren’t many things in the technology realm that evoke the same level of disgust as having to deal with passwords. For I.T. staff printers are a close second, but for everyone else, passwords are something most would gladly vote off the island. Unfortunately they play a key role (pun fully intended) in verifying your access to your accounts, the same way a physical key verifies your access to your home. But why are they the way they are? And are there any ways we can make them easier to deal with?
When it comes to access security, there are different ways a system can confirm you have access. These are called “factors”, and there are three of them:
Possession Factor: Something you have. This could be a traditional key, a keycard, a fob, or security key.
Inherence Factor: Something you are. Biometrics such as fingerprints and Apple’s FaceID are examples of this.
Knowledge Factor: Something you know. Passwords and PINs are the most common examples.
For knowledge factor methods we have three general options for managing them:
Memorize: This is fine if you only have a few passwords to memorize, but most of us have more than few things to log into, and even more if we include PINs (which are another form of passwords).
Write them down: Much easier than memorizing, especially if you’re making sure each password is unique. A password book is good for up to a few dozen entries but after that will get cumbersome to search through.
Password manager: This is currently the ultimate in password management solutions (hence the name). A password manager can take care of generating, saving, and typing your passwords, as well as your usernames and other form data!
There is one major con to using a password manager; it’s not quite as humanly intuitive as a password book. It’s another system you’ll have to learn and maintain. But the amount of work that it saves and the improved security make it worth the effort. The ultimate goal of password managers is to maximize security and minimize cognitive load.
Okay, you’ve decided to use a password manager. You’ll need to choose from two categories, depending on your level of trust and how much work you’re willing to do. The first are hosted or cloud systems. With these, someone else (the password manager company) is taking care of most of the technical details for you. Bitwarden, 1Password, Proton Pass, Apple Passwords, and built-in browser systems are popular. Sign up for an account, install the browser extension or app on all your devices, and away you go! The downside: you’re trusting these companies to keep your passwords safe, and they’re less than perfect. Do a search for “LastPass leak” for an example. Also, if you’re like me, you may harbour a general distrust of companies (and governments…and banks…and squirrels…and seed oils...wait, what were we talking about?).
Fear not, for the second option requires far less trust in faceless organizations (or rodents). You can self-host your own password manager! The obvious downside is the extra work to set up and maintain it. But hey, no shadowy supervillains up in your passwords! Woohoo! Vaultwarden and KeePass are popular here. And it’s even easier if you have a server like I mentioned in “A Subscription-Free, Cloud-Free Office”.
A few extra notes and further reading on the subject of passwords and security. Regardless of your choice, it’s a good idea to have a plan for granting someone else access to your passwords in case of emergencies, or if something happens to you. If you have a family lawyer, ask them about “digital legacy planning”. Or at the very least leave access instructions with a trusted family member or friend.
If you decide to use a password manager, MFA is still necessary, especially for high-risk accounts like banking and email. MFA will probably get its own article from me in the future.
Finally, you may see hear about “passwordless” and “passkey” systems. These are relatively new, and despite the name, are not complete replacements for passwords. For now, think of them as fancy passwords. Passwords in formalwear. Passwords on the way to the opera. Passwords on the way to a $10,000/plate fundraiser that definitely isn’t a political money laundering operation held at an art gallery that definitely isn’t also a money laundering operation. Squirrel!
If you or your organization want help with your password management, you can find us at scalebright.ca.
-
@ e97aaffa:2ebd765d
2025-03-28 12:56:17Nos últimos anos, tornei-me num acérrimo crítico do Euro, sobretudo da política monetária altamente expansionista realizada pelo Banco Central Europeu (BCE). Apesar de ser crítico, eu não desejo que Portugal volte a ter moeda própria.
No seguimento gráfico, é a variação do IPC de Portugal nos últimos 60 anos:
No gráfico inclui os momentos históricos, para uma melhor interpretação dos dados.
O Índice de Preços ao Consumidor (IPC) é usado para observar tendências de inflação. É calculado com base no preço médio necessário para comprar um conjunto de bens de consumo e serviços num país, comparando com períodos anteriores.
É uma ferramenta utilizada para calcular a perda de poder de compra, mas é uma métrica que é facilmente manipulada em prol dos interesses dos governos.
Análise histórica
No período marcelista, houve uma crescente inflação, devido a fatores, como os elevados custos da guerra e o fim dos acordos de Bretton Woods contribuíram para isso. Terminando com uma inflação superior a 13%.
Da Revolta dos Cravos (1974) até à adesão da CEE (atual União Europeia, UE), nos primeiros anos foram conturbados a nível político, mesmo após conquistar alguma estabilidade, em termos de política monetária foi um descalabro, com inflação entre 12% a 30% ao ano. Foi o pior momento na era moderna.
Com a entrada da CEE, Portugal ainda manteve a independência monetária, mas devido à entrada de muitos milhões de fundos europeus, essências para construir infraestrutura e desenvolver o país. Isto permitiu crescer e modernizar o país, gastando pouco dinheiro próprio, reduzindo a necessidade da expansão monetária e claro a inflação baixou.
Depois com a adesão ao Tratado de Maastricht, em 1991, onde estabeleceu as bases para a criação da União Económica e Monetária, que culminou na criação da moeda única europeia, o Euro. As bases eram bastante restritivas, os políticos portugueses foram obrigados a manter uma inflação baixa. Portugal perdeu a independência monetária em 1999, com a entrada em vigor da nova moeda, foi estabelecida a taxa de conversão entre escudos e euros, tendo o valor de 1 euro sido fixado em 200,482 escudos. A Euro entrou em vigor em 1999, mas o papel-moeda só entrou em circulação em 2002.
Assim, desde a criação até 2020, a inflação foi sempre abaixo de 5% ao ano, tendo um longo período abaixo dos 3%.
A chegada da pandemia, foi um descalabro no BCE, a expansão monetária foi exponencial, resultando numa forte subida no IPC, quase 8% em 2022, algo que não acontecia há 30 anos.
Conclusão
Apesar dos últimos anos, a política monetária do BCE tem sido péssima, mesmo assim continua a ser muito melhor, se esta fosse efetuada em exclusividade por portugueses, não tenho quaisquer dúvidas disso. O passado demonstra isso, se voltarmos a ser independentes monetariamente, será desastroso, vamos virar rapidamente, a Venezuela da Europa.
Até temos boas reservas de ouro, mas mesmo assim não são suficientes, mesmo que se inclua outros ativos para permitir a criação de uma moeda lastreada, ela apenas duraria até à primeira crise. É inevitável, somos um país demasiado socialista.
A solução não é voltar ao escudo, mas sim o BCE deixar de imprimir dinheiro, como se não houvesse amanhã ou então optar por uma moeda total livre, sem intromissão de políticos.
O BCE vai parar de expandir a moeda?
Claro que não, eles estão encurralados, a expansão monetária é a única solução para elevada dívida soberana dos estados. A única certeza que eu tenho, a expansão do BCE, será sempre inferior ao do Banco de Portugal, se este estivesse o botão da impressão à sua disposição. Por volta dos 5% é muito mau, mas voltar para a casa dos 15% seria péssimo, esse seria o nosso destino.
É muito triste ter esta conclusão, isto é demonstrativo da falta de competência dos políticos e governantes portugueses e o povo também tem uma certa culpa. Por serem poucos exigentes em relação à qualidade dos políticos que elegem e por acreditar que existem almoços grátis.
Bitcoin fixes this
-
@ 65038d69:1fff8852
2025-03-28 12:53:02Does your life feel overly complicated? Do most things feel like 10 steps when they used to be 3? Does simply maintaining your existence feel like a hamster wheel with hopscotch squares on the inside? Do you find yourself yearning for “simpler times”? While there are many things in a complex society outside our control, personal technology choices are still within our purview. Maybe it’s time to consider deleting some of the tech from our lives in an effort to simplify.
I worked at a phone shop for some time, and one of the things that surprised me was how many non-smart phones we sold. We had a lot of customers whose only phone needs were calling and the occasional text. Anything their phone couldn’t do could be taken care of on a computer at home or at work, and a smartphone would have been a whole ‘nother stack of skills to learn and maintain. So why not go without one? For less than $100 you can get a plain flip phone from your local phone shop, or hop on your marketplace of choice and get a used one for half that. They’ll take the same SIM card your smart phone does, so simply power down, swap the card over, and try it out for a while!
Social media is another one that you can probably trim down on. How many platforms are you actively using? I’m most likely going to remove Snapchat from my phone as the notifications from Snapchat themselves are annoying, I hardly ever use it, and I’m connected with those I use it with elsewhere. I helped someone recently who uses Facebook to connect with family but has been struggling with the technical aspects of securely maintaining their account. Switching to group texts or another platform those family members are already using may be easier than fighting with Facebook account compromises and their account recovery processes.
You may even consider abandoning social media completely. “I’m not on social media” has become less the exclusive domain of luddites and is certainly not only spoken by older generations. Any Gen Zers who took part in the “nose cover” trend early this year will understand. Try going on a social media fast for a few weeks (or even a few days) and see if you feel the need to return.
Using myself for another example, I bought a smartwatch about 3 years ago and wear it fairly regularly. But the work to make sure its charged, keep up with the changes, and any manual maintenance items has me thinking I won’t be replacing it when it dies. The nice-to-haves it brings aren’t worth the trouble.
A final hot take: In your workplace, how many staff’s only interaction with technology is time tracking or timesheets? Paper timesheets may be an option. I know, I know, Hell has frozen over and the tech guy is talking about switching something from digital to paper. But my job is supposed to be to guide toward efficiency. If bludgeoning your blue collar staff into the cyberpunk dystopian future of a spreadsheet (or even worse, a geofence-powered time tracking app on their phones) turns out to be more work than entering a handful of numbers off of paper timesheets, maybe paper is the more efficient (and humane) option.
If you like the idea of deleting technology at work or at home and want some help with it, you can find us at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-28 12:53:02Apple held one of their regular events last week and announced the iPhone 16. The inevitable repeating questions ensued. Should you upgrade your phone? Is it time? Is it worth it? What about Android users? Should I switch to an iPhone? Should I switch to an Android? If you’re looking for a short answer: no. If you have an attention span longer than that of a ferret, there is some nuance to be had.
First let’s define “upgrading”. In this context I define it as buying a new phone before your current one has reached the end of its useful life. Your current phone is working just fine, there’s nothing wrong with it, but you buy a new one anyway.
There’s nothing morally or ethically wrong with upgrading, but practically it’s pointless. Phone cameras plateaued 10 years ago (around the time of the iPhone 6 series), and the rest of the hardware a few years after that. Aside from some edge cases, the current lines of phones will do the same things for you as a 10 year old design would. Look up some sample photos from an iPhone 6. Then look at similar photos taken with the iPhone 15 or 16. They’re functionally the same. “No, the new ones are better! You can tell when you zoom in 100x or get a wall-sized poster print!” Those are the edge cases I talked about. You’re posting fur baby updates for grandma on Facebook and low-effort thirst traps on Instagram. You don’t need 48MP.
With the launch of the iPhone X and Samsung S8 in 2017, we saw the removal of the physical home button and entrance into the current epoch of “plain rectangle with a touch screen”. Which is excellent, because you no longer have to spend hours agonizing over which phone to buy. Pick a screen size, pick your budget, and you’re done! You are the proud owner of a functioning plain rectangle that will continue to function until the manufacturer stops supplying security updates (typically 5 to 7 years).
To summarize, don’t bother replacing your phone unless it: a) dies, b) the battery dies and a replacement is 50% or more of the cost a new phone, or c) it’s no longer getting security updates.
Since this conversation was started by the iPhone launch that’s mostly what I’ve talked about, but this applies to mainstream Android phones as well. Samsung and Google promise 7 years of updates for their current gen lines. There’s no need to upgrade, only replace.
Lastly, if you’re on an Android, don’t bother switch to an iPhone. It’s in no way “better”, and the mental load of learning a different system will have you clawing at the walls of your padded cell. Same goes for the iPhone users; don’t bother switching to an Android. Either switch would be like trading in your perfectly good rust-bucket for a Toyota because you think you’d have to fix it less…wait…no…that’s a bad example…
-
@ 65038d69:1fff8852
2025-03-28 12:50:13Have you heard the phrase “death by committee”? The idea being put forward by the phrase is that a project or task is doomed to fail if given to a hierarchically-flat group instead of an individual (see also “death by a thousand cuts”). While an individual decision-maker will almost always be more efficient, most organizations that are not for-profit (and even many that are, such as publicly traded corporations) are run by a governing body. If you find yourself in this situation you may be asking yourself, “how do we even get anything done?” As with many things, the answer is relatively simple, but can be extremely difficult to implement, for the exact reasons we just went over.
First, let’s define roles:
Governing body: This will most commonly be a council, board, or committee. Aside from formal meeting roles (see Robert’s Rules of Order), we’re going to assume the members only have authority as a democratic group.
Operations or staff: Everyone in the organization who is not part of the governing body. This includes contractors, consultants, and volunteers. We’ll use “operations” and “staff” interchangeably as euphony dictates.
Executive leader: This person may have the title of CEO, CAO, Director, or Manager, depending on the scale of your organization. For the purposes of this article, we’re going to include them in “operations”.
Next comes responsibilities. The governing body is responsible for mission, policies, and direction. Operations is responsible for procedures, tasks, and reports.
(A quick note; we’re going to assume all of these things are written. The value of the written word is a common theme here at ScaleBright, and I will most likely die preaching on the subject. See the previous entries under “Writing Things Down Is for Boys Too”, “Paper Copy Please!”, and “One Skill to Rule Them All”
Let’s also define the responsibilities:
Mission: The reason the organization exists, or what it’s trying to accomplish. This may be summarized in a formal mission statement.
Policy: A formal set of guidelines for the actions and behaviour of the governing body and operations. Policy does not usually include specific procedures or tasks, unless governing law requires it (i.e. harassment reporting and investigation sections of HR policies).
Direction: Governing body decisions, requests, and any other instructions passed to operations.
Procedures: A formal set of specific instructions for tasks.
Tasks: Activities that are carried out.
Reports: Information passed from operations to the governing body. Usually take the form of requests for decisions or post-task summaries.
Now that we have definitions for everything, let’s walk through how something would get done in some hypothetical scenarios.
Scenario 1: The volunteers (operations) at a food bank see that they have a need for more refrigerated food storage space. They prepare a report (task) using a decision request template (procedure) outlining the need as well as options for solutions (additional refrigerators or a walk-in cooler). The report is given to the manager (executive leader) for review and presentation to the board (governing body). The manager presents the report, and the board weighs the request based on the food bank’s mission and available resources. The decision is made to purchase additional refrigerators (direction) and the manager and staff follow their purchasing procedure to buy them, install them, and utilize them (procedures and tasks). Once they’re up-and-running, they send a brief report back to the board (via the manager) letting them know the direction was acted on and the tasks were completed.
Scenario 2: The council (governing body) of a municipality wants to build a new multiplex. Municipal law (policy) requires public consultation, so they ask (direction) their CAO (executive leader) to carry it out. The CAO passes the direction onto their staff, who follow their procedures to carry out the public consultation (tasks). Once the public consultation is over, the information is compiled (reports) and made available to the council for assessment.
A final note; both the governing body and operations should be fully aware of the other’s responsibilities. If staff know a potential request goes directly against policy, they can save everyone time by finding an alternative that doesn’t. If the governing body knows how long a particular procedure takes to complete, they won’t need make constant requests for updates.
If you’d like help implementing any of this in your organization, you can find us at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-28 12:38:37PDFs are everywhere, and pretty much everyone has used one at some point. How did we get here? What even are they? And is there anything we can do to make using them easier?
PDFs are both a type of file and a standard. The Portable Document Format was created by Adobe in the 90s, and became an open standard under the ISO (International Organization for Standardization) in 2008. It’s creator’s goals were to create a document format that could be opened on any device, regardless of platform, screen size, etc.
They were mostly successful. PDFs are now one of the best ways to send someone a document without having to worry about them being able to open it. Windows, MacOS, Linux, iOS, Android, e-readers, and even embedded devices like car infotainment systems and fast food menu screens can display them. Most email systems can open them without you having to download the file first.
Making a PDF is usually a straight-forward process. Most document software (Word, Google Docs, Pages, etc.) have a built-in export feature that will save the current document as a PDF. Or if you’re starting with paper, your scanner will spit out a PDF file. Then you can send that file to whoever you like. This is where you might encounter the most common problem I’ve had to help users with.
PDF files are not designed to be edited. Yes, technically they can be, but it’s a rough process that rarely gives us the results we want. Same with attempting to convert a PDF back into whatever format the file was originally created in. Especially if you’re scanning a paper document. Even the fanciest, most expensive OCR (optical character recognition) software can’t turn a printed document back into an exact replica of the original. If someone sends you a PDF and you want to edit it, ask them to send you the original file instead. If they can’t, or won’t, that’s most likely on purpose.
This is an intentional feature of PDFs. If you want to send a document to someone and you don’t want them to be able to easily edit it (i.e. a contract or an invoice), PDF’s finalized nature makes it an excellent choice. The standard even includes options for encryption and passwords if you really want to limit the receiver’s ability to tamper with a secure document.
Speaking of secure documents, signatures and forms are also features of the PDF standard. This lets us do things like fill out and sign legally binding documents without having to travel to do so in person. Electronic signatures are well established in Canadian law and most other jurisdictions.
Last feature: printing. PDFs are an excellent way to make sure the physical attributes of a document remain unchanged when sent to someone. If a document is meant to be printed on a particular size of paper or in a particular orientation, these things are saved when the PDF is created.
If you want to smooth out your office’s processes that involve PDFs or other digital documents, or if you just need a little help with them, you can find us at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-28 12:38:37A common question interviewers ask is variations of, “If you could impart one piece of advice to everyone listening, what would it be?” I would answer that in the context of the workplace, reading comprehension is the base skill that underpins everything else.
Why reading comprehension? Most instructions come in the form of the written word. In the workplace, think of policies, procedures, notices, warning labels, and equipment instructions. Ikea has made an attempt at word-less assembly manuals, but I’m willing to bet most who’ve used them would rather they include at least some written information.
Humanity has been aware of the value of writing things down for most of history (see “Writing Things Down Is For Boys Too” for my arguments for the written word). And if we’re going to write things down, we need to be able to read (and comprehend) as well.
If you’re still not convinced, consider the skills training that are built on top of reading comprehension. Critical thinking, effective communications, leadership development, problem-solving, and most things technology related all depend on a functional level of reading comprehension.
The solutions for this are all underpinned by the same concept: practice. To improve your reading comprehension, practice reading and thinking about what you’ve read. Ideally in multiple forms. Short, medium, and long form are all important and will work different higher-order skills. For example, reading long form will teach patience and more complex analysis. If you’d prefer something more formal, many community libraries have adult literacy programs and most post-secondary institutions have relevant classes as part of their academic upgrading or essential skills programs.
I should point out that I see the irony in the fact that I include audio versions of these articles for those who’d rather listen than read. I’m also an avid audiobook consumer. My excuse is that most of my listening is done while carrying out mentally passive activities, like household chores. So you won’t receive any judgment from me if you continue to listen instead of read.
-
@ 65038d69:1fff8852
2025-03-28 12:38:37This week would have normally been a “People” category post, but with the news of Telegram CEO Pavel Durov’s arrest in France, I thought it would be a good opportunity to talk about secure communications instead.
When we say “secure communications” you probably imagine a stereotypical spy movie scene where a character at a payphone delivers the line “…is this line secure?”. While the days of ubiquitous payphones are mostly past us, many of us still like the idea of having at least private conversations with others.
We’re going to get the most technical and difficult parts of all this out of the way first. The difference between public, private, and secure communications, and the most difficult of all, figuring out what you want.
Public communications: Social media posts, blog posts, news media, and advertisements are public. They’re meant for a broad audience and we typically don’t care who sees them.
Private communications: Traditional telephone calls and physical mail are private. They’re meant for only the sender and receiver to see, but we don’t usually go out of our way to stop others from seeing the contents (i.e. we leave our mail on our car seats and kitchen tables).
Secure communications: Paper cheques, tax filings, and love letters. We’re willing to take extra steps to make sure others don’t see them (i.e. security envelopes and in-person delivery).
Most of the time private will do just fine. Apple’s iMessage and SMS or RCS everywhere else for texting does the job. Facebook Messenger, WhatsApp, and email are also fine. The average ne'er-do-well would need to steal your device to get access, and even then screen locks and passwords will stop most of them.
Platforms like Facebook Messenger and Signal advertise something called “end-to-end encryption” (abbreviated “E2E”). This means that before the message is sent it’s scrambled in such a way that only the receiver can unscramble it to read it. The problem is that we’re required to trust the provider, whether it be Facebook, WhatsApp, or Apple, to not lie and spy on us. In the case of Telegram, France arresting their CEO pushed Telegram over some people’s risk boundary as Mr. Durov may be willing to trade his freedom for government access to everyone’s messages. Who you decide to trust is entirely up to you.
If your answer is “I trust none of them!”, you may be willing to put in the work to set up secure communications. The idea is to host the platform (or at least the security functions) yourself so you don’t have to trust someone else to do it for you. As of the posting of this article, there are 3 systems I can recommend. They all come with tradeoffs and a fair amount of work to set up.
Email with PGP: PGP is an E2E system for email. Most email clients have a built-in way to use it. The hardest part is usually getting your contacts you want to use PGP with set up as well. It can also be difficult to use on mobile devices.
SimpleX: While quite secure, this system is still very much in testing. It’s also difficult to set up and use in a way that doesn’t rely on the creator’s servers (remember the trust issue?).
Matrix: This one takes a bit of work to set up and can be slow depending on your internet connection, but it’s the most full-featured and mobile-friendly of the systems I’ve tested. The biggest tradeoff is that you’ll need your own server.
Want help setting up secure communications for your business or personal group? You can find us at scalebright.ca.
-
@ 5d4b6c8d:8a1c1ee3
2025-03-28 12:30:11I'm short on time this morning, so I'm just plagiarizing @grayruby's notes, with minor revisions.
Territory Things:
- March Madness Points Challenge https://stacker.news/items/924541/r/Undisciplined
- IPL T20k Mania https://stacker.news/items/920125/r/Undisciplined
- CricZap https://stacker.news/items/919957/r/Undisciplined
- USA vs World https://stacker.news/items/923533/r/Undisciplined
- Any changes to NBA Prediction contest for March? (post coming today)
- Stackers voted to delay MLB Survivor
NCAA:
- How many 1 seeds will make final four?
- Cooper Flagg is the consensus number 1 but will he be a great NBA player?
NFL:
- Rule change proposals: Ban the tush push and make dynamic kickoff permanent
NBA;
- Pre playoffs Power Rankings
Blok'd Shots:
- Ovi with 6 to go
MLB:
- opening day finally arrived
- American League is a crap shoot
- Fantasy MLB
Betting:
- predyx markets
- Betplay- didn't work for me but how are you liking it?
And, as we do every week, we'll share an awesome @Aardvark sports fact.
What are we missing?
originally posted at https://stacker.news/items/927714
-
@ 65038d69:1fff8852
2025-03-28 12:24:05Since the dawn of ubiquitous internet, websites have been vying for our attention. The intention behind commercial websites was harmless enough; to inform you of products or services available, like a stereotypical medieval street sign indicating blacksmith, tavern, or baker. But this quickly turned into an arms race with Madison Avenue advertising types employing every dirty trick they could think of to get eyeballs on screens. This led to what we have today, with our websites looking like Times Square or gossip magazine covers. And all this comes at a price; a website design and build for a small to medium sized org from a professional design firm will usually cost between $10,000 and $20,000.
I’m here to rescue you from this, and prove to you that your website can be done for a tiny fraction of that cost. Not only that, but it will be easier to read, require almost no maintenance, be extremely secure, and dirt cheap to host.
Sound too good to be true? You’re right to be skeptical. So I proactively put my words into action and built a version of the ScaleBright website using this framework. You can see it (and easily find your way back to this article) at simple.scalebright.ca.
Are you impressed? Shocked? Disappointed? “But Taylor, how am I supposed to convince my potential customers that I’m a serious business worthy of their patronage with a website like this?!” You probably already know that most of your business comes from happy customers referring others to you. When was the last time someone told you they came because they liked your website? Most likely never. So save yourself the $20,000, or even better, reinvest it into directly improving your services or broadening your product selection. Your customers will appreciate that volumes more.
Interested in a website like this? You can find our contact information at scalebright.ca, or if you prefer, simple.scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-28 12:19:56On a Twitter thread about a fairly technical product a customer asked if the creator would consider making a paper version of the documentation. Their discussion got me thinking; is there a market for paper manuals for digital systems in our digital age?
Paper manuals for digital things isn’t a new idea, but it isn’t old either. 1950’s IBM mainframes had paper manuals, and books on Microsoft 365(https://www.amazon.ca/Teach-Yourself-VISUALLY-Microsoft-365/dp/1119893518) have been a big hit in offices I’ve worked with. They have a number of advantages: - They’re far less prone to failure or inaccessibility (power outages, etc). - They can be easier to find. A small shelf of manuals is simpler to look through than computer folders full of files. - For some, they can be easier to read and absorb. - It can be easier to follow along with instructions visible alongside your computer screen.
There are some disadvantages though:
- They’re slow or potentially impossible to update.
- They’re expensive to create and distribute.
- They aren’t searchable.
- You can include screenshots and photos, but not video.
Even while writing those out I was able to think of ways to work around or assist with those cons: - If in binder format, individual pages or sections could be replaced. - While not as fast as search, a back matter index could help. - QR codes linking to videos would be quick and easy to use.
The manuals I’m imagining wouldn’t be generic (i.e. the Microsoft 365 one linked above); they would be for processes specific to your org. For example, “how to fill out and submit a timesheet” or “how to troubleshoot our internet”. It might make sense to create a demo for people to check out in person…let me know if this is something you’d like to see.
The final question is financial viability. How much would you pay for a manual (or set of manuals)? How much would you pay for updates? Do you have staff capable and willing who you could pay to do this, or would you need hire someone external?
If any of this sounds interesting to you, if you have questions, or if you think I’m crazy and want to tell me so, you can find contact details on our website at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-28 12:10:35Even if you don’t consider yourself a “technology person” you’ve probably experienced “cloud” outages. We’ve had some large ones in the news recently; CDK Global last month (that was the car dealership one), Crowdstrike last week, and AWS seemingly always (they have so many they’ve become genericized and a meme).
Maybe you’re tired of dealing with these sorts of outages, or maybe you don’t like the idea of AI in everything. (I wrote a bit about this in “Is It Time for Linux on the Desktop?”.) There are options for your office, most of which are free, though they do come with some trade-offs.
The biggest is that you’ll be trading some of your OpEx for CapEx. Larger organizations probably won’t care as much as they’ll have plenty of both already, but if your technology budget is only a few thousand dollars a year it might be a large shift to go from spending a predictable, smaller amount monthly to larger amounts every few years.
The other is that you’ll need dedicated I.T. support and training. Again, if you’re a larger org you probably already have this. Not all of the software and systems I’m about to show you are as simple to set up as M365 or Google Workspace, and most of them don’t come with any automated maintenance.
Let’s start with a productivity suite (or office suite), since we’re already using one! The slides for this video were made in Impress, which is part of the LibreOffice suite. LibreOffice is open source and free, which means no subscription fees! Yay!
LibreOffice also includes Writer, a word processor, and Calc, a spreadsheet editor. As you can see, they’re quite similar to their Microsoft counterparts, but there are enough differences that your office will experience some productivity loss while your staff learn the differences.
You may have noticed that the task bar along the bottom doesn’t look like Windows. That’s because it isn’t! This computer is running Linux Mint, an operating system that, like LibreOffice, is open source and free. It also has the advantage of being very light; this demo is running on the equivalent of a 15 year old computer, so no need to buy $1000+ laptops just for office tasks. Using it is very similar to using Windows; there’s a bar along the bottom with a clock and icons on the right, running programs and shortcuts on the left, and a menu with power, settings, and installed programs. There’s also a file browser with all the usual folders.
Speaking of files, you may find yourself missing something like OneDrive or Google Drive. There are several open source and free alternatives for that too! This demo is using Nextcloud, and I use it for my business as well. It works very similar to OneDrive; I have my folders on this computer synced as well as access to shared folders.
Central file storage will be one of the new sources of CapEx. You’ll need a server of some kind for things like Nextcloud, as well as external backups. It doesn’t need to be a giant $20,000 rackmount unit; for most small offices something like a Start9 server or Intel NUC mini-computer with some USB drives will do great for $1,000 to $2,000 every 5 years or so. These servers can also do lots of other things we won’t cover today.
Next up is email. I recommend Thunderbird; it’s open source and free, and made by the same people as the Firefox web browser. It does email, contacts, calendar, and tasks, and can do chat, but I have a different recommendation for chat. Email service is one of the things we have to compromise on in our “cloud-free” plan and use a third party service for. Business-grade email service will cost anywhere from $15-$150/year/user depending on usage volume, features, and security threat models.
Last is chat and conferencing. This is another item we’ll make some compromises on. You’ll still be joining meetings on Zoom, Teams, WebEx, etc that others invite you to, but you can set up your own internal communications system without using any of those. Signal and Telegram are reasonably trusted third parties outside the “giant evil corporation” spheres, or if you have a server, SimpleX and Matrix are options. For demo purposes I have a Matrix system set up. You can do direct messaging, groups, and audio and video calls. Sending media and files are also supported.
This wasn’t meant to be an exhaustive list, so I’ve skipped over a few items (document signing, bookkeeping, and payment systems got cut from this demo), but the idea was to show you some of what an alternative office setup could look like. If any of this sounds interesting to you, reach out for a consultation. You can find us at scalebright.ca.
-
@ 65038d69:1fff8852
2025-03-28 11:11:36A gallerist I follow on social media posted some advice for artists working on their artist statements (something like a professional bio but targeted at potential collectors instead of fellow art professionals). One of their key points was to make it more entertaining and less like a dry, just-the-facts-only resume. And so I present to you a sci-fi version of my professional background!
Taylor Perron: IT Consultant and Sci-Fi Enthusiast In a universe where technology meets the extraordinary, Taylor N. Perron is the captain of the starship ScaleBright Solutions, navigating the cosmos of IT consulting with unparalleled expertise. As the owner of this cutting-edge company, Taylor brings a wealth of experience and a dash of sci-fi flair to the digital frontier.
The Journey Begins Taylor’s odyssey into the realm of technology started at the age of 5, mastering the ancient operating system known as Windows 3.11. This early encounter ignited a lifelong passion for computers and technology. Taylor's talents soon led to enrollment in an experimental online school, where he collaborated with the IT department on troubleshooting and high-level design changes. This foundation paved the way for a career that would see Taylor traversing various IT landscapes.
A Stellar Career After cutting his teeth with a local government, a school, and the oil & gas sector, Taylor launched his own IT contracting company. This venture marked the beginning of a career characterized by innovation and leadership. A decade-plus and an inter-provincial move later, Taylor took a brief hiatus from the I.T. space, returning in 2020. In 2024, Taylor embarked on a new mission with ScaleBright Solutions, returning to his IT consulting roots with renewed laser-powered vision.
ScaleBright Solutions specializes in a range of services, including network infrastructure, cybersecurity, financial systems, and management. Each project is approached with the precision of a seasoned astronaut navigating an asteroid field, ensuring clients receive stellar service tailored to their unique needs.
Credentials in the Space Age Taylor's credentials are as impressive as a starship's logbook. He is a Certified Bitcoin Professional and holds an Advanced Certification as an Amateur Radio Operator. His expertise in the Bitcoin realm was showcased when he served as a panel speaker at the 2023 Bitcoin Rodeo in Calgary, AB.
The Human Element Outside the digital domain, Taylor channels his entrepreneurial spirit into a side business, Standing Spoon, where he crafts and sells cold brew coffee at the local farmer’s market. This venture not only satisfies his love for coffee but also connects him with the local community in a tangible way.
A Sci-Fi Odyssey As you explore the vast universe of IT solutions, Taylor stands as a beacon of expertise and creativity. With ScaleBright Solutions, he offers a unique blend of technical prowess and visionary thinking, ensuring your journey through the digital cosmos is nothing short of extraordinary.
-
@ 57d1a264:69f1fee1
2025-03-28 10:32:15Bitcoin.design community is organizing another Designathon, from May 4-18. Let's get creative with bitcoin together. More to come very soon.
The first edition was a bursting success! the website still there https://events.bitcoin.design, and here their previous announcement.
Look forward for this to happen!
Spread the voice:
N: https://njump.me/nevent1qqsv9w8p93tadlnyx0rkhexj5l48l... X: https://x.com/bitcoin_design/status/1905547407405768927
originally posted at https://stacker.news/items/927650
-
@ 2b24a1fa:17750f64
2025-03-28 10:07:04Der Deutsche Bundestag wurde neu gewählt. Für einige Abgeordnete und Regierungsmitglieder heißt es Time to Say Goodbye. Abschied ist ein scharfes Schwert.
https://soundcloud.com/radiomuenchen/nachruf-2-olaf-der-zeitenwender
Auch bei Radio München werden Trennungs- und Verlassenheitsgefühle getriggert. Umso mehr, wenn es sich nicht nur um duselige Allerweltsliebe handelt, sondern um den Abgang großer Helden. Sie bezahlten ihren todesmutigen und fast ehrenamtlichen Einsatz nicht mit dem Leben, jedoch mit der einen oder anderen Falte in Hemd oder Bluse, manchmal sogar im Gesicht. Was bleibt? Eine bescheidene Pension? Ein lausig bezahlter Manager-Job in einem Konzern? Wir wollen jedenfalls nicht, dass diese Volkshelden vom Zahn der Zeit abgenagt, vergessen werden und setzen ihnen deshalb ein bescheidenes akustisches, aber nachhaltiges Denkmal. Hören Sie die kleine satirische Reihe „Nachrufe“ von unserem Autor Jonny Rieder.\ Folge 2: Olaf der Zeitenwender
Sprecher: Karsten Troyke
Bild: Markus Mitterer für Radio München
Radio München\ www.radiomuenchen.net/\ @radiomuenchen\ www.facebook.com/radiomuenchen\ www.instagram.com/radio_muenchen/\ twitter.com/RadioMuenchen
Radio München ist eine gemeinnützige Unternehmung.\ Wir freuen uns, wenn Sie unsere Arbeit unterstützen.
GLS-Bank\ IBAN: DE65 4306 0967 8217 9867 00\ BIC: GENODEM1GLS
-
@ 2b24a1fa:17750f64
2025-03-28 10:03:58Zwischen Überzeugungsarbeit und Propaganda verläuft ein schmaler Grad. Aber so oder so: Wer die subtileren Werkzeuge hat und vor allem die Mittel um Menschen zu kaufen, die diese dann anwenden, hat eindeutig die besseren Karten.
Dass die Bevölkerung nun wissen will, mit welchen Mitteln sie auf welche Weise beeinflusst werden soll, ist selbstverständlich. Wie nuanciert diese Beeinflussung stattfinden kann, darauf haben uns unsere Hörer beim letzten Beitrag von Milosz Matuschek: „Die ersten Köpfe rollen“ gestoßen. Es ging um die staatliche amerikanische Behörde für internationale Entwicklungshilfe USAID. Matuschek schrieb: „Man liest was von AID im Namen und denkt, was man denken soll: klingt nach Bob Geldof, barmherzigen Schwestern und “Brot für die Welt”.“ Man hatte das nicht nur optisch wahrgenommen, nein, diese Behörde wurde hierzulande, in allen Medien US AID genannt, was unsere Sprecherin Sabrina Khalil übernahm. Dass die United States Agency for International Development in USA so nicht gesprochen wird, schrieben uns gleich mehrere aufmerksame Hörer. Es ist sicherlich keine Paranoia darüber nachzudenken, ob die Bedeutung unserer Sprache, unserer Wörter bis hin zur Aussprache im Fokus der Manipulation steht. Dafür wird sehr viel Geld locker gemacht und unter anderem in die Medien gepumpt.
Hören Sie heute den zweiten Teil der Reihe „Die Corona-Connection“ mit dem Titel: „Der mediale Deep State wankt“. Sprecherin: Sabrina Khalil.
Das freie Medienprojekt Pareto kann übrigens Unterstützung gebrauchen, dafür wurde ein Crowdfunding auf Geyser gestartet, wo man mit Bitcoin/Lightning-Spenden helfen kann. Und für Spenden auf dem klassischen Weg finden Sie die entsprechende Bankverbindung auf der Homepage pareto.space/de.
Nachzulesen unter: www.freischwebende-intelligenz.org/p/unter…mediale
Foto: Gleichschaltung - sie melden exakt den gleichen Wortlaut.
-
@ a012dc82:6458a70d
2025-03-28 16:15:06In an audacious display of confidence, Bitcoin traders have recently committed $20 million to a $200K call option, a move that has reignited discussions about the cryptocurrency's potential and the broader market's appetite for risk. This development is set against a backdrop of increasing activity within the cryptocurrency options market, particularly on platforms like Deribit, where total open interest in Bitcoin options has reached unprecedented levels. This article explores the nuances of this strategic wager, examines the resurgence of investor enthusiasm, and contemplates the future implications for Bitcoin and the cryptocurrency market at large.
Table of Contents
-
A Surge in Market Activity
-
The Bold Bet on Bitcoin's Future
-
Implications of the $200K Call Option
-
Increased Market Volatility
-
Renewed Investor Confidence
-
Speculative Interest and Market Dynamics
-
-
Looking Ahead: Bitcoin's Market Prospects
-
Conclusion
-
FAQs
A Surge in Market Activity
The cryptocurrency options market has experienced a significant uptick in activity, with Bitcoin and Ethereum options achieving record-breaking open interest figures. On Deribit, Bitcoin options open interest has soared to a staggering $20.4 billion, eclipsing the previous high of $14.36 billion seen in October 2021. Concurrently, Ethereum options open interest has also reached a historic peak of $11.66 billion. This pronounced increase in market activity is indicative of a growing interest among traders to either hedge their positions against potential price fluctuations or to speculate on the future price movements of these leading cryptocurrencies. The surge in options trading volume reflects a broader trend of maturation within the cryptocurrency market, as sophisticated financial instruments become increasingly utilized by a diverse array of market participants, from individual investors to large institutional players.
The Bold Bet on Bitcoin's Future
The decision by traders to allocate $20 million to a $200K call option for Bitcoin represents a significant vote of confidence in the cryptocurrency's future price trajectory. This high-stakes gamble suggests that a segment of the market is not only optimistic about Bitcoin's potential to breach the $200,000 threshold but is also willing to back this belief with substantial financial commitment. Such a move is emblematic of the "animal spirits" returning to the cryptocurrency market—a term coined by economist John Maynard Keynes to describe the instinctive human emotion that drives consumer confidence and investment decisions. This resurgence of speculative fervor and risk-taking behavior is a testament to the enduring allure of Bitcoin as an asset class that continues to captivate the imagination of investors, despite its history of volatility and regulatory challenges.
Implications of the $200K Call Option
The substantial investment in the $200K call option carries several implications for the Bitcoin market and the broader cryptocurrency ecosystem:
Increased Market Volatility
The focus on high strike price options could introduce heightened volatility into the Bitcoin market. As traders position themselves to capitalize on potential price movements, the market may witness more pronounced fluctuations. This environment of increased volatility underscores the speculative nature of cryptocurrency trading and the high-risk, high-reward strategies employed by some market participants. It also highlights the need for investors to approach the market with caution, armed with a thorough understanding of the underlying risks and a clear investment strategy.
Renewed Investor Confidence
The bold wager on the $200K call option reflects a significant resurgence in investor confidence in Bitcoin's long-term prospects. Following periods of market downturns and regulatory uncertainty, this move signals a renewed conviction in the fundamental value proposition of Bitcoin as a pioneering digital asset. It represents a collective belief in the cryptocurrency's ability to not only recover from past setbacks but to chart new territories in terms of price and market capitalization. This renewed investor confidence may serve as a catalyst for further investment in Bitcoin and other cryptocurrencies, potentially driving up prices and encouraging more widespread adoption.
Speculative Interest and Market Dynamics
The commitment to the $200K call option highlights the continued influence of speculative interest on the cryptocurrency market's dynamics. It illustrates how speculation, driven by the prospect of outsized returns, remains a central force shaping market trends and price trajectories. This speculative interest, while contributing to market liquidity and price discovery, also introduces an element of unpredictability. It underscores the complex interplay between market sentiment, investor behavior, and external economic factors that collectively determine the direction of the cryptocurrency market.
Looking Ahead: Bitcoin's Market Prospects
The strategic bet on the $200K call option, amidst a backdrop of increasing options market activity, paints a complex picture of Bitcoin's future. While the move signals optimism and a willingness among investors to engage in high-risk speculation, it also raises questions about the sustainability of such bullish sentiment. As Bitcoin continues to navigate the evolving landscape of digital finance, the interplay between speculative interest, regulatory developments, and technological advancements will be critical in shaping its future trajectory. The cryptocurrency market's inherent volatility and unpredictability necessitate a cautious approach from investors, emphasizing the importance of risk management and long-term strategic planning.
Conclusion
Bitcoin's latest foray into high-stakes speculation, marked by the $20 million lock on the $200K call option, is a vivid illustration of the cryptocurrency's enduring appeal and the market's appetite for risk. This development not only reflects a bullish outlook on Bitcoin's price potential but also signals a broader resurgence of investor enthusiasm and speculative activity within the cryptocurrency market. As we look to the future, the outcomes of such bold moves will undoubtedly influence the trajectory of Bitcoin and the digital asset landscape at large. Whether Bitcoin will reach the lofty heights of $200,000 remains to be seen, but its journey there will be closely watched by traders, investors, and regulators alike, offering valuable insights into the dynamics of speculative markets and the evolving role of cryptocurrencies in the global financial ecosystem.
FAQs
What does locking $20 million in a $200K call option mean for Bitcoin? Locking $20 million in a $200K call option indicates that traders are betting a significant amount of money on Bitcoin reaching or surpassing $200,000. It reflects a bullish outlook on Bitcoin's future price and a resurgence of speculative interest in the cryptocurrency market.
How does the surge in Bitcoin options market activity affect the cryptocurrency? The surge in Bitcoin options market activity, with record open interest, increases market liquidity and can lead to heightened volatility. It also signifies growing interest and participation in the cryptocurrency market, potentially influencing Bitcoin's price dynamics.
What are the implications of increased market volatility for Bitcoin investors? Increased market volatility can lead to larger price swings, presenting both opportunities and risks for investors. While it may offer the potential for higher returns, it also increases the risk of losses. Investors should approach the market with caution and consider their risk tolerance and investment strategy.
Why are investors optimistic about Bitcoin reaching $200,000? Investors' optimism about Bitcoin reaching $200,000 stems from factors such as the cryptocurrency's past performance, the upcoming Bitcoin halving event, increasing institutional adoption, and favorable macroeconomic conditions. These factors contribute to a bullish sentiment in the market.
What role do institutional investors play in the current Bitcoin market trend? Institutional investors play a significant role in the current Bitcoin market trend by bringing in substantial capital, lending credibility to the market, and influencing price movements. Their participation is seen as a sign of maturity and stability in the cryptocurrency market.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 7d33ba57:1b82db35
2025-03-28 09:13:56Girona, one of Catalonia’s most charming cities, is a perfect mix of history, culture, and gastronomy. Famous for its well-preserved medieval old town, colorful houses along the Onyar River, and Game of Thrones filming locations, Girona is a must-visit destination in northern Spain.
🏰 Top Things to See & Do in Girona
1️⃣ Girona Cathedral (Catedral de Santa Maria) ⛪
- One of Spain’s most impressive cathedrals, with the widest Gothic nave in the world.
- Famous as the Great Sept of Baelor in Game of Thrones.
- Climb the steps for a breathtaking city view.
2️⃣ Walk the Medieval Walls (Passeig de la Muralla) 🏰
- Offers panoramic views of Girona and the surrounding countryside.
- A great way to see the city from above and explore its medieval history.
3️⃣ The Colorful Houses of the Onyar River 🌉
- Girona’s most iconic view, with brightly colored houses reflecting on the river.
- Best viewed from the Pont de les Peixateries Velles, designed by Gustave Eiffel.
4️⃣ Explore the Jewish Quarter (El Call) 🏡
- One of Europe’s best-preserved Jewish quarters, with narrow, medieval streets.
- Visit the Museum of Jewish History to learn about Girona’s Jewish heritage.
5️⃣ Arab Baths (Banys Àrabs) 🏛️
- A 12th-century Romanesque bathhouse, inspired by Moorish architecture.
- Features a beautiful central dome with columns.
6️⃣ Game of Thrones Filming Locations 🎬
- Walk in the footsteps of Arya Stark through the city’s winding streets.
- Visit the steps of the cathedral, the Jewish Quarter, and Arab Baths, all featured in the series.
7️⃣ Eat at a Michelin-Starred Restaurant 🍽️
- Girona is home to El Celler de Can Roca, a 3-Michelin-star restaurant, ranked among the best in the world.
- Try local Catalan dishes like "suquet de peix" (fish stew) and botifarra (Catalan sausage).
🚗 How to Get to Girona
✈️ By Air: Girona-Costa Brava Airport (GRO) is 20 min away, with budget flights from Europe.
🚆 By Train: High-speed AVE trains connect Barcelona (38 min), Madrid (3.5 hrs), and Paris (5.5 hrs).
🚘 By Car: 1 hr from Barcelona, 40 min from Figueres (Dalí Museum).
🚌 By Bus: Direct buses from Barcelona and the Costa Brava.💡 Tips for Visiting Girona
✅ Best time to visit? Spring & autumn (April–June & September–October) for pleasant weather. 🌤️
✅ Wear comfortable shoes – The old town is hilly with cobblestone streets. 👟
✅ Try xuixo – A delicious cream-filled pastry, unique to Girona. 🥐
✅ Visit early for Game of Thrones spots – They get crowded during the day! 🎥
✅ Take a day trip – Explore nearby Costa Brava beaches or Figueres (Dalí Museum). 🏖️ -
@ a60e79e0:1e0e6813
2025-03-28 08:47:35This is a long form note of a post that lives on my Nostr educational website Hello Nostr.
When most people stumble across Nostr, they see is as a 'decentralized social media alternative' — something akin to Twitter (X), but free from corporate control. But the full name, "Notes and Other Stuff Transmitted by Relays", gives a clue that there’s more to it than just posting short messages. The 'notes' part is easy to grasp because it forms almost everyone's first touch point with the protocol. But the 'other stuff'? That’s where Nostr really gets exciting. The 'other stuff' is all the creative and experimental things people are building on Nostr, beyond simple text based notes.
Every action on Nostr is an event, a like, a post, a profile update, or even a payment. The 'Kind' is what specifies the purpose of each event. Kinds are the building blocks of how information is categorized and processed on the network, and the most popular become part of higher lever specification guidelines known as Nostr Implementation Possibility - NIP. A NIP is a document that defines how something in Nostr should work, including the rules, standards, or features. NIPs define the type of 'other stuff' that be published and displayed by different styles of client to meet different purposes.
Nostr isn’t locked into a single purpose. It’s a foundation for whatever 'other stuff' you can dream up.
Types of Other Stuff
The 'other stuff' name is intentionally vague. Why? Because the possibilities of what can fall under this category are quite literally limitless. In the short time since Nostr's inception, the number of sub-categories that have been built on top of the Nostr's open protocol is mind bending. Here are a few examples:
- Long-Form Content: Think blog posts or articles. NIP-23.
- Private Messaging: Encrypted chats between users. NIP-04.
- Communities: Group chats or forums like Reddit. NIP-72
- Marketplaces: People listing stuff for sale, payable with zaps. NIP-15
- Zaps: Value transfer over the Lightning Network. NIP57
Popular 'Other Stuff' Clients
Here's a short list of some of the most recent and popular apps and clients that branch outside of the traditional micro-blogging use case and leverage the openness, and interoperability that Nostr can provide.
Blogging (Long Form Content)
- Habla - Web app for Nostr based blogs
- Highlighter - Web app that enables users to highlight, store and share content
Group Chats
- Chachi Chat - Relay-based (NIP-29) group chat client
- 0xchat - Mobile based secure chat
- Flotilla - Web based chat app built for self-hosted communities
- Nostr Nests - Web app for audio chats
- White Noise - Mobile based secure chat
Marketplaces
- Shopstr - Permissionless marketplace for web
- Plebeian Market - Permissionless marketplace for web
- LNBits Market - Permissionless marketplace for your node
- Mostro - Nostr based Bitcoin P2P Marketplace
Photo/Video
Music
- Fountain - Podcast app with Nostr features
- Wavlake - A music app supporting the value-for-value ecosystem
Livestreaming
- Zap.stream - Nostr native live streams
Misc
- Wikifreedia - Nostr based Wikipedia alternative
- Wikistr - Nostr based Wikipedia alternative
- Pollerama - Nostr based polls
- Zap Store - The app store powered by your social graph
The 'other stuff' in Nostr is what makes it special. It’s not just about replacing Twitter or Facebook, it’s about building a decentralized ecosystem where anything from private chats to marketplaces can thrive. The beauty of Nostr is that it’s a flexible foundation. Developers can dream up new ideas and build them into clients, and the relays just keep humming along, passing the data around. It’s still early days, so expect the 'other stuff' to grow wilder and weirder over time!
You can explore the evergrowing 'other stuff' ecosystem at NostrApps.com, Nostr.net and Awesome Nostr.
-
@ 45c41f21:c5446b7a
2025-03-28 08:02:16“区块链行业究竟是在做什么?”——这个问题我到现在还没有想得很清楚。谈论起来可以说很多东西,“确权”、“让每一个比特都有了稀缺性”、“数字黄金”、“点对点支付”,但是具体到了行业落地,又容易陷入“赌场”这个有点乌烟瘴气的现实。
但我想有一点是比较明确的,那就是区块链行业肯定是一个围绕资产的行业。这些资产又跟传统的资产很不一样,最简单的特征是它们都是一个个的代币,通过自动化和可验证的代码铸造、控制,我们可以统称为链上资产。从比特币、以太坊到现在,这中间不管过去了多少不同的周期和浪潮,核心不变的都是出现新一轮受追捧的资产。
既然区块链是关于链上资产的行业,那么最重要的是未来会出现什么新的资产,有什么样的新资产会上链。要回答这个问题,又要我们回过头去看看,从行业诞生至今,区块链留下了哪些有意义的、没意义的,有价值的、没价值的资产。
因此,有必要讨论一下链上资产的分类。
链上资产的种类很多,但总体上我觉得可以按满足需求的不同,做一些功能性的划分。同时,抛开去中心化、抗审查等等大词,链上资产与传统资产最重要的区别可以认为是安全性的来源。传统资产在传统的社会系统和金融系统中产生,而链上资产是通过可验证代码控制的,所以它的安全性的依赖很清晰,要比现实世界简单很多。
在不同的区块链系统中,使用不同的技术(比如POW/POS),设置不同的规则,拥有不同的治理机制,都会影响安全性。“安全性”和“满足什么样的需求”之间既不是正交的,也不是完全耦合的。在不同层级的安全性之下,可能都会出现满足某一类相同需求的产品,用户使用哪种产品,只取决于自己的风险偏好。另一方面,有些需求只可能在某些特定的安全性保障下才能得到满足,比如跨国际的全球化的抗通胀价值存储。
这篇文章只讨论一些比较简单的分类,可以假设在不同的安全性保障下,每个分类都有可能出现对应的产品。有些安全性是产品内生功能的一部分,有些则完全不影响。同时,这些分类也完全是主观的看法,不一定正确,我所希望的是引发更多对资产进行讨论。
核心资产(高安全性、强需求支撑)
- 比特币(BTC)
- 核心价值:全球化抗通胀、抗审查的“数字黄金”。
- 长期逻辑:全球法币超发背景下,BTC作为去中心化硬通货的需求不可替代。
这是整个行业最重要的资产。也是整个行业最核心的东西。在这个定位下,只会有一个赢者通吃。其他试图竞争的都很难生存下来。它对安全性的要求也是最高的。
经过验证的资产分类
这部分的资产可以认为是行业诞生至今,已经经过验证的、满足某真实需求、会长期存在的资产。
- 代表优质项目的资产(股票/ICO代币/治理代币等)
- 核心价值:类似于传统金融世界里的一级市场和二级市场。所谓的“优质”也不一定需要真实落地,可能是叙事/故事驱动,也可能有真实的现金流,但重要的是它能在市场上吸引人买卖。
- 关键指标:团队是否持续营销和建设?生态是否增长?项目是否解决实际问题?
- DeFi 资产
- 核心价值:链上金融系统的“基础设施工具”。
- 需求来源:对套利、链上资产理财的需求会永远存在。
- Meme币
- 核心价值:营销驱动+投机需求的结合体。
- 长期存在性:人性对暴富故事的追逐不会消失(如Pump.fun、SHIB)。
- 稳定币
- 核心价值:加密货币世界的“支付货币”。
- 需求刚性:交易媒介、避险工具、跨境支付(如USDT、USDC)。
在不同的安全性保障下,上面这些资产大部分都会有对应的产品。
比如稳定币在安全性上可以有中心化的 USDT ,也有去中心化的算法稳定币。理论上,安全性对稳定币是非常重要的。但现实中,“流动性”可能才是给用户传达“这东西到底安不安全“的产品特点,也是比较主要的竞争点。
Meme 则完全不需要安全性,所以对创业者来说在哪里做都差不多。哪里用户更多就适合去哪里。有时,安全性反而是它的阻碍。DeFi 的话,因人而异。安全性高低是否影响用户使用,完全取决于用户自己的风险偏好。
还未经过验证的资产(需求可能存在)
- NFT(收藏品)? 艺术、身份标识、游戏道具的数字化载体,但流动性差、炒作属性也不见得有 Meme 这么强。会长期存在吗?打个问号。
- DAO(准入/治理代币)? 去中心化组织的准入权/管理权通证,依赖 DAO 本身的价值和实际治理参与度决定的价值。DeFi DAO 可能是唯一一个有点发展的方向,其他还非常不成熟,有待验证。
- RWA(真实世界资产代币化)? 房产、债券等上链,需要解决法律合规与链下资产映射问题。不确定。
- 社交/游戏/内容资产 用户数据所有权货币化,还没有像样的有一些用户的产品,就更不用提形成规模经济了。
- AI 相关的资产? 是一个变数。如果未来会有成千上万的 AI 智能体与人类共存,链上是承载他们经济系统最合适的基础设施,这里会产生什么新的资产类型?值得期待。
这里面的资产类型,很多还没有找到真实的需求,至少没有经过验证。所以长期来看它们会是区块链行业的方向吗,需要打很多问号。既然需求本身没有得到验证,那么谈安全性对它们的影响,就更加无从谈起了。
当然,这里其实还有一个更有意思的部分,可以多聊一些。也就是共同知识(法律/合同/规则/代码)这一类资产。
在应用层,共同知识尚未有代币化的尝试,也难以对其具体价值做定量分析。但如果要说有的实践,以太坊通过交易收取 gas 费和 CKB 通过 Cell 存储状态收取“押金”算是一种在底层的 generalize 的尝试。这种尝试是定量的,可验证的。
以太坊的问题是经济模型不 make sense 导致状态爆炸,ckb 相比是更简单、更明确的。但这里的问题变成了,公链需要通过区块空间的竞争来展示这一种需求是否真的成立。区块空间越紧张,需求就越大。同时安全性越高,对共同知识的保障就越强,也会体现区块空间的价值。
但另一方面,是否有开发者在上面开发应用,会更大的影响这一点。因此开发工具、开发者生态在现阶段可能更重要。
最后
写到这里,发现很多资产似乎又是老生常谈。但从满足需求和安全性两个角度来思考,算是追本溯源的尝试。现在我们面临的处境是,问题还是老的问题,答案是否有新的答案,期待更多讨论。
- 比特币(BTC)
-
@ 05cdefcd:550cc264
2025-03-28 08:00:15The crypto world is full of buzzwords. One that I keep on hearing: “Bitcoin is its own asset class”.
While I have always been sympathetic to that view, I’ve always failed to understand the true meaning behind that statement.
Although I consider Bitcoin to be the prime innovation within the digital asset sector, my primary response has always been: How can bitcoin (BTC), a single asset, represent an entire asset class? Isn’t it Bitcoin and other digital assets that make up an asset class called crypto?
Well, I increasingly believe that most of crypto is just noise. Sure, it’s volatile noise that is predominately interesting for very sophisticated hedge funds, market makers or prop traders that are sophisticated enough to extract alpha – but it’s noise nonetheless and has no part to play in a long-term only portfolio of private retail investors (of which most of us are).
Over multiple market cycles, nearly all altcoins underperform Bitcoin when measured in BTC terms. Source: Tradingview
Aha-Moment: Bitcoin keeps on giving
Still, how can Bitcoin, as a standalone asset, make up an entire asset class? The “aha-moment” to answer this question recently came to me in a Less Noise More Signal interview I did with James Van Straten, senior analyst at Coindesk.
Let me paraphrase him here: “You can’t simply recreate the same ETF as BlackRock. To succeed in the Bitcoin space, new and innovative approaches are needed. This is where understanding Bitcoin not just as a single asset, but as an entire asset class, becomes essential. There are countless ways to build upon Bitcoin’s foundation—varied iterations that go beyond just holding the asset. This is precisely where the emergence of the Bitcoin-linked stock market is taking shape—and it's already underway.”
And this is actually coming to fruition as we speak. Just in the last few days, we saw several products launch in that regard.
Obviously, MicroStrategy (now Strategy) is the pioneer of this. The company now owns 506,137 BTC, and while they’ll keep on buying more, they have also inspired many other companies to follow suit.
In fact, there are now already over 70 companies that have adopted Strategy’s Bitcoin playbook. One of the latest companies to buy Bitcoin for their corporate treasury is Rumble. The YouTube competitor just announced their first Bitcoin purchase for $17 million.
Also, the gaming zombie company GameStop just announced to raise money to buy BTC for their corporate treasury.
Gamestop to make BTC their hurdle rate. Source: X
ETF on Bitcoin companies
Given this proliferation of Bitcoin Treasury companies, it was only a matter of time before a financial product tracking these would emerge.
The popular crypto index fund provider Bitwise Investments has just launched this very product called the Bitwise Bitcoin Standard Corporations ETF (OWNB).
The ETF tracks Bitcoin Treasury companies with over 1,000 BTC on their balance sheet. These companies invest in Bitcoin as a strategic reserve asset to protect the $5 trillion in low-yield cash that companies in the US commonly sit on.
These are the top 10 holdings of OWNB. Source: Ownbetf
ETF on Bitcoin companies’ convertible bonds
Another instrument that fits seamlessly into the range of Bitcoin-linked stock market products is the REX Bitcoin Corporate Treasury Convertible Bond ETF (BMAX). The ETF provides exposure to the many different convertible bonds issued by companies that are actively moving onto a Bitcoin standard.
Convertible bonds are a valuable financing tool for companies looking to raise capital for Bitcoin purchases. Their strong demand is driven by the unique combination of equity-like upside and debt-like downside protection they offer.
For example, MicroStrategy's convertible bonds, in particular, have shown exceptional performance. For instance, MicroStrategy's 2031 bonds has shown a price rise of 101% over a one-year period, vastly outperforming MicroStrategy share (at 53%), Bitcoin (at 25%) and the ICE BofA U.S. Convertible Index (at 10%). The latter is the benchmark index for convertible bond funds, tracking the performance of U.S. dollar-denominated convertible securities in the U.S. market.
The chart shows a comparison of ICE BofA U.S. Convertible Index, the Bloomberg Bitcoin index (BTC price), MicroStrategy share (MSTR), and MicroStrategy bond (0.875%, March 15 203). The convertible bond has been outperforming massively. Source: Bloomberg
While the BMAX ETF faces challenges such as double taxation, which significantly reduces investor returns (explained in more detail here), it is likely that future products will emerge that address and improve upon these issues.
Bitcoin yield products
The demand for a yield on Bitcoin has increased tremendously. Consequently, respective products have emerged.
Bitcoin yield products aim to generate alpha by capitalizing on volatility, market inefficiencies, and fragmentation within cryptocurrency markets. The objective is to achieve uncorrelated returns denominated in Bitcoin (BTC), with attractive risk-adjusted performance. Returns are derived exclusively from asset selection and trading strategies, eliminating reliance on directional market moves.
Key strategies employed by these funds include:
- Statistical Arbitrage: Exploits short-term pricing discrepancies between closely related financial instruments—for instance, between Bitcoin and traditional assets, or Bitcoin and other digital assets. Traders utilize statistical models and historical price relationships to identify temporary inefficiencies.
- Futures Basis Arbitrage: Captures profits from differences between the spot price of Bitcoin and its futures contracts. Traders simultaneously buy or sell Bitcoin on spot markets and enter opposite positions in futures markets, benefiting as the prices converge.
- Funding Arbitrage: Generates returns by taking advantage of variations in Bitcoin funding rates across different markets or exchanges. Funding rates are periodic payments exchanged between long and short positions in perpetual futures contracts, allowing traders to profit from discrepancies without significant directional exposure.
- Volatility/Option Arbitrage: Seeks profits from differences between implied volatility (reflected in Bitcoin options prices) and expected realized volatility. Traders identify mispriced volatility in options related to Bitcoin or Bitcoin-linked equities, such as MSTR, and position accordingly to benefit from volatility normalization.
- Market Making: Involves continuously providing liquidity by simultaneously quoting bid (buy) and ask (sell) prices for Bitcoin. Market makers profit primarily through capturing the spread between these prices, thereby enhancing market efficiency and earning consistent returns.
- Liquidity Provision in DeFi Markets: Consists of depositing Bitcoin (usually as Wrapped BTC) into decentralized finance (DeFi) liquidity pools such as those on Uniswap, Curve, or Balancer. Liquidity providers earn fees paid by traders who execute swaps within these decentralized exchanges, creating steady yield opportunities.
Notable products currently available in this segment include the Syz Capital BTC Alpha Fund offered by Syz Capital and the Forteus Crypto Alpha Fund by Forteus.
BTC-denominated share class
A Bitcoin-denominated share class refers to a specialized investment fund category in which share values, subscriptions (fund deposits), redemptions (fund withdrawals), and performance metrics are expressed entirely in Bitcoin (BTC), rather than in traditional fiat currencies such as USD or EUR.
Increasingly, both individual investors and institutions are adopting Bitcoin as their preferred benchmark—or "Bitcoin hurdle rate"—meaning that investment performance is evaluated directly against Bitcoin’s own price movements.
These Bitcoin-denominated share classes are designed specifically for investors seeking to preserve and grow their wealth in Bitcoin terms, rather than conventional fiat currencies. As a result, investors reduce their exposure to fiat-related risks. Furthermore, if Bitcoin outperforms fiat currencies, investors holding BTC-denominated shares will experience enhanced returns relative to traditional fiat-denominated investment classes.
X: https://x.com/pahueg
Podcast: https://www.youtube.com/@lessnoisemoresignalpodcast
Book: https://academy.saifedean.com/product/the-bitcoin-enlightenment-hardcover/
-
@ da0b9bc3:4e30a4a9
2025-03-28 07:27:06Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/927569
-
@ 502ab02a:a2860397
2025-03-28 04:57:18จริงหรือ ว่าโอเมก้า3 ต้องมาจากปลาทะเลเท่านั้น
มีเรื่องที่น่าสนใจเรื่องนึงครับ ถ้าพูดถึงโอเมก้า-3 หลายคนอาจนึกถึงปลาทะเลน้ำลึก เช่น แซลมอน แมคเคอเรล หรือซาร์ดีน ซึ่งเป็นแหล่งโอเมก้า-3 ที่ร่างกายใช้ได้ดี แต่ในขณะเดียวกัน ก็มีกลุ่มคนที่พยายามบริโภคโอเมก้า-3 จากพืชแทน เช่น น้ำมันเมล็ดแฟลกซ์ น้ำมันเมล็ดเจีย หรือวอลนัท โดยหวังว่าจะได้รับประโยชน์เช่นเดียวกับการกินปลา แต่ที่เราเรียนรู้กันมาว่า โอเมก้า-3 จากพืชนั้น ร่างกายมนุษย์นำไปใช้ได้น้อยมาก หรือแทบไม่ได้เลย
สาเหตุหลักมาจากรูปแบบของโอเมก้า-3 ที่พบในแหล่งต่างๆ โอเมก้า-3 มีอยู่ 3 ชนิดหลัก ได้แก่ ALA (Alpha-Linolenic Acid) – พบในพืช EPA (Eicosapentaenoic Acid) – พบในปลาทะเล DHA (Docosahexaenoic Acid) – พบในปลาทะเล
ร่างกายสามารถใช้ EPA และ DHA ได้โดยตรง แต่สำหรับ ALA นั้น ร่างกายต้องผ่านกระบวนการเปลี่ยนแปลงทางชีวเคมีก่อน ซึ่งกระบวนการนี้ไม่มีประสิทธิภาพนัก โดยทั่วไปแล้ว ALA แปลงเป็น EPA ได้เพียง 5-10% ALA แปลงเป็น DHA ได้เพียง 0.5-5% แปลว่า หากคุณกินเมล็ดแฟลกซ์หรือน้ำมันเมล็ดเจีย แม้ว่าจะมีปริมาณ ALA สูง แต่ร่างกายก็แทบไม่ได้รับ EPA และ DHA ในปริมาณที่เพียงพอเพื่อใช้ประโยชน์อย่างเต็มที่
ทำไมร่างกายแปลง ALA เป็น EPA/DHA ได้น้อย? อันแรกเลยคือ เอนไซม์จำกัด กระบวนการเปลี่ยน ALA เป็น EPA และ DHA จะใช้เอนไซม์เดียวกับการแปลงโอเมก้า-6 ซึ่งมักถูกใช้ไปกับโอเมก้า-6 ที่มากเกินไปในอาหารปัจจุบันซะแล้วนั่นเอง ต่อมาคือ กระบวนการหลายขั้นตอน การเปลี่ยน ALA เป็น DHA ต้องผ่านหลายขั้นตอนทางชีวเคมี ทำให้มีการสูญเสียพลังงานและวัตถุดิบไปมาก และสุดท้าย ปัจจัยทางพันธุกรรมและเพศ บางคน โดยเฉพาะผู้หญิง อาจมีอัตราการเปลี่ยนที่สูงกว่าผู้ชายเล็กน้อย แต่ก็ยังต่ำเมื่อเทียบกับการได้รับ EPA/DHA จากปลาหรือสาหร่ายโดยตรง
โอเมก้า-6 ตัวการขัดขวางโอเมก้า-3 จากพืช โอเมก้า-6 เป็นกรดไขมันจำเป็นที่พบมากในน้ำมันพืช เช่น น้ำมันถั่วเหลือง น้ำมันข้าวโพด และน้ำมันดอกทานตะวัน ซึ่งเป็นส่วนประกอบหลักของอาหารแปรรูปในปัจจุบัน ปัญหาคือ เอนไซม์ที่ใช้แปลง ALA ไปเป็น EPA/DHA เป็นตัวเดียวกับที่ใช้แปลงโอเมก้า-6 ไปเป็น AA (Arachidonic Acid) ซึ่งมีบทบาทในการอักเสบ หากเราบริโภคโอเมก้า-6 มากเกินไป (ซึ่งคนส่วนใหญ่ทำ5555) เอนไซม์เหล่านี้จะถูกใช้ไปกับโอเมก้า-6 มากกว่า ทำให้ ALA มีโอกาสแปลงเป็น EPA/DHA น้อยลงไปอีก
แล้วคนที่ไม่กินปลาหรือชาววีแกนควรทำอย่างไร? สำหรับคนที่ไม่สามารถหรือไม่ต้องการกินปลา ก็จะมีการบริโภคน้ำมันสาหร่ายที่มี DHA โดยตรงเป็นทางเลือกที่ดีกว่าการหวังพึ่ง ALA จากพืช เพราะ DHA จากสาหร่ายสามารถดูดซึมและใช้ได้ทันทีเหมือน DHA จากปลา
ได้ด้วยเหรอ ????? ผมเล่ากำเนิดของ DHA ในปลาให้ประมาณนี้ครับ จริง ๆ แล้ว DHA ซึ่งเป็นโอเมก้า-3 ที่ร่างกายใช้ได้โดยตรง มาจาก Docosahexaenoic Acid ที่เกิดจากกระบวนการสังเคราะห์ตามธรรมชาติ ซึ่งสาหร่ายบางสายพันธุ์ เช่น Schizochytrium และ Crypthecodinium cohnii มีเอนไซม์ที่สามารถเปลี่ยนกรดไขมันพื้นฐานให้กลายเป็น DHA ได้เองซึ่งเป็นส่วนประกอบหลักในระบบนิเวศทะเล(พืชกักเก็บไขมันได้อย่างไร ผมเคยโพสไปแล้ว) โดยเฉพาะ สาหร่ายขนาดเล็ก (microalgae) สาหร่ายจึงเป็นสิ่งมีชีวิตในทะเลพัฒนาให้มี DHA สูงเพราะ DHA เป็นส่วนประกอบสำคัญที่ช่วยรักษาความยืดหยุ่นและความสมบูรณ์ของเยื่อหุ้มเซลล์ในสาหร่าย ทำให้พวกมันสามารถดำรงชีวิตในสภาพแวดล้อมที่มีอุณหภูมิต่ำในทะเลได้
จากนั้นก็เป็นไปตามห่วงโซ่อาหารครับ ปลาและสัตว์ทะเลอื่น ๆ ได้รับ DHA จากการบริโภคสาหร่ายหรือสัตว์เล็ก ๆ ที่กินสาหร่ายมาอีกที ดังนั้น DHA ในปลาเป็นผลมาจากการสะสมจากสาหร่ายโดยตรง นี่เป็นเหตุผลว่าทำไมปลาทะเลน้ำลึก เช่น แซลมอน แมคเคอเรล และซาร์ดีน ถึงมี DHA สูงนั่นเอง งว่ออออออ
ดังนั้น เมื่อคุณกิน DHA จากสาหร่าย ก็เท่ากับว่าคุณได้รับ DHA จากต้นกำเนิดแท้จริงในระบบนิเวศทะเลครับ DHA ที่ได้มาจากสาหร่ายสามารถนำไปใช้ในร่างกายได้ทันทีโดยไม่ต้องผ่านกระบวนการเปลี่ยนแปลง เพราะมันอยู่ในรูป Triglyceride หรือ Phospholipid ซึ่งเป็นรูปแบบที่ร่างกายมนุษย์สามารถดูดซึมและนำไปใช้ได้ทันที ปลาไม่ได้แปลงโครงสร้าง DHA แต่เพียงสะสม DHA ไว้ในตัวจากการกินสาหร่าย ดังนั้นการรับประทาน DHA จากสาหร่ายก็ให้ผลเทียบเท่ากับการรับประทาน DHA จากปลา งานวิจัยหลายฉบับยืนยันว่า DHA จากสาหร่ายมีค่าการดูดซึม (Bioavailability) ใกล้เคียงกับ DHA จากน้ำมันปลา แต่หาเอาเองนะถ้าอยากอ่านฉบับเต็ม
การผลิตน้ำมันสาหร่ายนั้น เมื่อสาหร่ายเจริญเติบโตเต็มที่แล้ว เขาจะทำการเก็บเกี่ยวและสกัดน้ำมันโดยใช้เทคโนโลยีการแยกที่ทันสมัย ซึ่งช่วยรักษาให้ DHA ที่มีอยู่ในเซลล์สาหร่ายถูกเก็บรักษาไว้ในรูปแบบที่สามารถนำไปใช้ได้โดยตรง จากนั้นจะเข้าสู่การกรองหรือการปั่นแยก (centrifugation) เพื่อให้ได้มวลสาหร่ายที่เข้มข้น จากนั้นจึงทำให้แห้งเพื่อเตรียมเข้าสู่กระบวนการสกัด ซึ่งมีหลายวิธีอาทิเช่น
1 การสกัดด้วยตัวทำละลาย
ใช้ตัวทำละลาย เช่น เฮกเซน (Hexane) หรือ เอทานอล (Ethanol) เพื่อสกัดน้ำมันออกจากเซลล์สาหร่าย จากนั้นน้ำมันจะถูกนำไปกลั่นเพื่อแยกตัวทำละลายออก ทำให้ได้น้ำมันที่มีความบริสุทธิ์สูง 2. การสกัดด้วย CO₂ เหลว ใช้ คาร์บอนไดออกไซด์ในสถานะวิกฤติ (Supercritical CO₂) ซึ่งเป็นวิธีที่ทันสมัย ก๊าซ CO₂ จะถูกทำให้มีความดันสูงและอุณหภูมิที่เหมาะสมเพื่อกลายเป็นของเหลว แล้วใช้แยกน้ำมันออกจากเซลล์สาหร่าย วิธีนี้ช่วยให้ได้น้ำมันที่ ปราศจากตัวทำละลายเคมีและมีความบริสุทธิ์สูง 3. การสกัดด้วยการกดอัด หรือ Cold Pressed
เป็นวิธีที่ใช้แรงดันทางกลกดเซลล์สาหร่ายเพื่อให้ได้น้ำมันออกมา อันนี้เป็นการผลิตน้ำมันแบบออร์แกนิกเลยครับ แต่ให้ผลผลิตน้อยกว่าวิธีอื่น ๆน้ำมันที่ได้จากการสกัดจะผ่านการกลั่นด้วยกระบวนการต่าง ๆ เช่น Winterization กำจัดไขมันที่ไม่จำเป็น Molecular Distillation แยกสารตกค้าง เช่น โลหะหนักและสารปนเปื้อน Deodorization กำจัดกลิ่นคาวของสาหร่าย จากนั้นก็บรรจุใส่ซอฟท์เจล พร้อมจำหน่ายนั่นเองครับ
ก็ถือว่าเป็นอีกทางเลือกของชาววีแกน ที่ไม่สามารถกินปลาหรือสัตว์ทะเลได้ ก็น่าจะเฮกันดังๆได้เลยครับ จะได้มีตัวช่วยในการลดการอักเสบได้
ส่วนชาว food matrix ก็ต้องเรียนรู้ระบบครับ การกินจากปลาหรือสัตว์ทะเล ก็จะได้โปรตีน แร่ธาตุ วิตามินอื่นๆควบมากับตัวสัตว์ตามที่ธรรมชาติแพคมาให้ ถ้าจะเสริมเป็นน้ำมันสาหร่าย ก็สุดแล้วแต่ความต้องการครับ ไม่ใช่เรื่องแย่อะไร เว้นแต่ไปเทียบราคาเอาเองนะ 55555
#pirateketo #ฉลาก3รู้ #กูต้องรู้มั๊ย #ม้วนหางสิลูก #siamstr
-
@ a3bb06f6:19ac1b11
2025-03-28 02:36:38“Until you make the unconscious conscious, it will continue to direct your life, and you will call it fate.” — Carl Jung
Most people don’t realize they’ve been robbed. Not in the dramatic, wallet-snatching sense, but in a quiet, systemic way that’s gone unnoticed for generations. If you’re feeling like no matter how hard you work, you can’t get ahead… you’re not imagining it.
It didn’t start as a scheme—but one compromise after another, it became one. Now, the system exploits you by design. This isn’t fate. It’s fiat.
The Unconscious Script: How Fiat Becomes Invisible From the moment you're born, you're placed into an economic system based on government-issued fiat currency. It becomes the air you breathe. You work for dollars. You save in dollars. You price your time, your future, and even your dreams in dollars.
But few stop to ask: What actually is a dollar? Who creates it? Why does it lose value?
This lack of questioning is the unconscious state. Fiat money is the background process running your life. You feel the effects—rising prices, shrinking savings, mounting debt—but you never see the root cause. So you blame yourself. Or “the economy.” Or call it fate.
The Lie of Neutral Money: Most believe money is just a neutral tool. But fiat is not neutral—it’s political power encoded into paper.
Governments can print more of it at will. Central banks can manipulate its supply, distort interest rates, and quietly tax you through inflation. Every time more money is created, your purchasing power shrinks.
But it happens slowly, like a leak in a tire. You don’t notice at first. You just feel like you’re working harder for less. The house is further out of reach. The groceries cost more. Retirement feels impossible.
And you accept it. Because no one told you it's designed this way.
Inflation Is the Invisible Thief, Inflation isn’t just a “cost of living increase.” It’s a state-sponsored form of theft.
When new money is created, it enters the system unevenly. Those closest to the money printer—banks, governments, large corporations—get the new dollars first. By the time it reaches you, prices have already risen. You’re buying the same goods with weaker money.
And yet, most people still save in fiat. They’re taught that hoarding cash is “safe.” They’re taught that 2% inflation is “normal.” But it’s not normal to work 40 hours a week and fall behind. That’s the product of unconscious acceptance.
The fiat system survives on one thing: your ignorance. It didn’t begin with malicious intent, but over time, it adapted to protect its own power—at your expense. As long as you don’t understand how money works, you won’t resist. You’ll blame yourself, or capitalism, or bad luck. But never the system itself.
This is why financial education is never prioritized in schools. This is why questioning monetary policy is left to economists and suits on CNBC. You were never taught how it works. And now the system depends on you staying confused—grinding, borrowing, complying, without ever asking why.
Making the Unconscious Conscious: Enter Bitcoin, Bitcoin breaks this spell.
It forces you to confront the nature of money—what it is, how it’s created, and why fiat fails. It teaches you that money doesn’t need to be printed, inflated, or controlled. That money can be fixed, finite, and fair.
Bitcoin is not just a new currency. It’s a tool of consciousness. It exposes the scam of fiat and offers a lifeboat to anyone ready to wake up.
Once you understand Bitcoin, you can’t unsee the problem. You begin to ask:
Why should I trust a system that steals my time? Why is saving discouraged, but debt rewarded? Why do I need permission to use my own money? These aren’t technical questions. They’re moral ones.
Consciousness Is Sovereignty: When you understand what fiat is, you stop calling your financial struggles “fate.” You start calling them what they are, outcomes of a broken system.
And once you see the system for what it is, you can choose to exit.
Saving in Bitcoin is not speculation. It’s self-defense. It’s rejecting unconscious servitude. It’s reclaiming your time, your labor, your future.
In a fiat world, they own the money—so they own the rules. In a Bitcoin world, you own yourself.
That’s the power of making the unconscious conscious.
And that’s how you stop calling it fate.
-
@ fd06f542:8d6d54cd
2025-03-28 02:27:52NIP-02
Follow List
final
optional
A special event with kind
3
, meaning "follow list" is defined as having a list ofp
tags, one for each of the followed/known profiles one is following.Each tag entry should contain the key for the profile, a relay URL where events from that key can be found (can be set to an empty string if not needed), and a local name (or "petname") for that profile (can also be set to an empty string or not provided), i.e.,
["p", <32-bytes hex key>, <main relay URL>, <petname>]
.The
.content
is not used.For example:
jsonc { "kind": 3, "tags": [ ["p", "91cf9..4e5ca", "wss://alicerelay.com/", "alice"], ["p", "14aeb..8dad4", "wss://bobrelay.com/nostr", "bob"], ["p", "612ae..e610f", "ws://carolrelay.com/ws", "carol"] ], "content": "", // other fields... }
Every new following list that gets published overwrites the past ones, so it should contain all entries. Relays and clients SHOULD delete past following lists as soon as they receive a new one.
Whenever new follows are added to an existing list, clients SHOULD append them to the end of the list, so they are stored in chronological order.
Uses
Follow list backup
If one believes a relay will store their events for sufficient time, they can use this kind-3 event to backup their following list and recover on a different device.
Profile discovery and context augmentation
A client may rely on the kind-3 event to display a list of followed people by profiles one is browsing; make lists of suggestions on who to follow based on the follow lists of other people one might be following or browsing; or show the data in other contexts.
Relay sharing
A client may publish a follow list with good relays for each of their follows so other clients may use these to update their internal relay lists if needed, increasing censorship-resistance.
Petname scheme
The data from these follow lists can be used by clients to construct local "petname" tables derived from other people's follow lists. This alleviates the need for global human-readable names. For example:
A user has an internal follow list that says
json [ ["p", "21df6d143fb96c2ec9d63726bf9edc71", "", "erin"] ]
And receives two follow lists, one from
21df6d143fb96c2ec9d63726bf9edc71
that saysjson [ ["p", "a8bb3d884d5d90b413d9891fe4c4e46d", "", "david"] ]
and another from
a8bb3d884d5d90b413d9891fe4c4e46d
that saysjson [ ["p", "f57f54057d2a7af0efecc8b0b66f5708", "", "frank"] ]
When the user sees
21df6d143fb96c2ec9d63726bf9edc71
the client can show erin instead; When the user seesa8bb3d884d5d90b413d9891fe4c4e46d
the client can show david.erin instead; When the user seesf57f54057d2a7af0efecc8b0b66f5708
the client can show frank.david.erin instead. -
@ fd06f542:8d6d54cd
2025-03-28 02:24:00NIP-01
Basic protocol flow description
draft
mandatory
This NIP defines the basic protocol that should be implemented by everybody. New NIPs may add new optional (or mandatory) fields and messages and features to the structures and flows described here.
Events and signatures
Each user has a keypair. Signatures, public key, and encodings are done according to the Schnorr signatures standard for the curve
secp256k1
.The only object type that exists is the
event
, which has the following format on the wire:jsonc { "id": <32-bytes lowercase hex-encoded sha256 of the serialized event data>, "pubkey": <32-bytes lowercase hex-encoded public key of the event creator>, "created_at": <unix timestamp in seconds>, "kind": <integer between 0 and 65535>, "tags": [ [<arbitrary string>...], // ... ], "content": <arbitrary string>, "sig": <64-bytes lowercase hex of the signature of the sha256 hash of the serialized event data, which is the same as the "id" field> }
To obtain the
event.id
, wesha256
the serialized event. The serialization is done over the UTF-8 JSON-serialized string (which is described below) of the following structure:[ 0, <pubkey, as a lowercase hex string>, <created_at, as a number>, <kind, as a number>, <tags, as an array of arrays of non-null strings>, <content, as a string> ]
To prevent implementation differences from creating a different event ID for the same event, the following rules MUST be followed while serializing: - UTF-8 should be used for encoding. - Whitespace, line breaks or other unnecessary formatting should not be included in the output JSON. - The following characters in the content field must be escaped as shown, and all other characters must be included verbatim: - A line break (
0x0A
), use\n
- A double quote (0x22
), use\"
- A backslash (0x5C
), use\\
- A carriage return (0x0D
), use\r
- A tab character (0x09
), use\t
- A backspace, (0x08
), use\b
- A form feed, (0x0C
), use\f
Tags
Each tag is an array of one or more strings, with some conventions around them. Take a look at the example below:
jsonc { "tags": [ ["e", "5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36", "wss://nostr.example.com"], ["p", "f7234bd4c1394dda46d09f35bd384dd30cc552ad5541990f98844fb06676e9ca"], ["a", "30023:f7234bd4c1394dda46d09f35bd384dd30cc552ad5541990f98844fb06676e9ca:abcd", "wss://nostr.example.com"], ["alt", "reply"], // ... ], // ... }
The first element of the tag array is referred to as the tag name or key and the second as the tag value. So we can safely say that the event above has an
e
tag set to"5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36"
, analt
tag set to"reply"
and so on. All elements after the second do not have a conventional name.This NIP defines 3 standard tags that can be used across all event kinds with the same meaning. They are as follows:
- The
e
tag, used to refer to an event:["e", <32-bytes lowercase hex of the id of another event>, <recommended relay URL, optional>, <32-bytes lowercase hex of the author's pubkey, optional>]
- The
p
tag, used to refer to another user:["p", <32-bytes lowercase hex of a pubkey>, <recommended relay URL, optional>]
- The
a
tag, used to refer to an addressable or replaceable event- for an addressable event:
["a", "<kind integer>:<32-bytes lowercase hex of a pubkey>:<d tag value>", <recommended relay URL, optional>]
- for a normal replaceable event:
["a", "<kind integer>:<32-bytes lowercase hex of a pubkey>:", <recommended relay URL, optional>]
(note: include the trailing colon)
- for an addressable event:
As a convention, all single-letter (only english alphabet letters: a-z, A-Z) key tags are expected to be indexed by relays, such that it is possible, for example, to query or subscribe to events that reference the event
"5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36"
by using the{"#e": ["5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36"]}
filter. Only the first value in any given tag is indexed.Kinds
Kinds specify how clients should interpret the meaning of each event and the other fields of each event (e.g. an
"r"
tag may have a meaning in an event of kind 1 and an entirely different meaning in an event of kind 10002). Each NIP may define the meaning of a set of kinds that weren't defined elsewhere. NIP-10, for instance, especifies thekind:1
text note for social media applications.This NIP defines one basic kind:
0
: user metadata: thecontent
is set to a stringified JSON object{name: <nickname or full name>, about: <short bio>, picture: <url of the image>}
describing the user who created the event. Extra metadata fields may be set. A relay may delete older events once it gets a new one for the same pubkey.
And also a convention for kind ranges that allow for easier experimentation and flexibility of relay implementation:
- for kind
n
such that1000 <= n < 10000 || 4 <= n < 45 || n == 1 || n == 2
, events are regular, which means they're all expected to be stored by relays. - for kind
n
such that10000 <= n < 20000 || n == 0 || n == 3
, events are replaceable, which means that, for each combination ofpubkey
andkind
, only the latest event MUST be stored by relays, older versions MAY be discarded. - for kind
n
such that20000 <= n < 30000
, events are ephemeral, which means they are not expected to be stored by relays. - for kind
n
such that30000 <= n < 40000
, events are addressable by theirkind
,pubkey
andd
tag value -- which means that, for each combination ofkind
,pubkey
and thed
tag value, only the latest event MUST be stored by relays, older versions MAY be discarded.
In case of replaceable events with the same timestamp, the event with the lowest id (first in lexical order) should be retained, and the other discarded.
When answering to
REQ
messages for replaceable events such as{"kinds":[0],"authors":[<hex-key>]}
, even if the relay has more than one version stored, it SHOULD return just the latest one.These are just conventions and relay implementations may differ.
Communication between clients and relays
Relays expose a websocket endpoint to which clients can connect. Clients SHOULD open a single websocket connection to each relay and use it for all their subscriptions. Relays MAY limit number of connections from specific IP/client/etc.
From client to relay: sending events and creating subscriptions
Clients can send 3 types of messages, which must be JSON arrays, according to the following patterns:
["EVENT", <event JSON as defined above>]
, used to publish events.["REQ", <subscription_id>, <filters1>, <filters2>, ...]
, used to request events and subscribe to new updates.["CLOSE", <subscription_id>]
, used to stop previous subscriptions.
<subscription_id>
is an arbitrary, non-empty string of max length 64 chars. It represents a subscription per connection. Relays MUST manage<subscription_id>
s independently for each WebSocket connection.<subscription_id>
s are not guaranteed to be globally unique.<filtersX>
is a JSON object that determines what events will be sent in that subscription, it can have the following attributes:json { "ids": <a list of event ids>, "authors": <a list of lowercase pubkeys, the pubkey of an event must be one of these>, "kinds": <a list of a kind numbers>, "#<single-letter (a-zA-Z)>": <a list of tag values, for #e — a list of event ids, for #p — a list of pubkeys, etc.>, "since": <an integer unix timestamp in seconds. Events must have a created_at >= to this to pass>, "until": <an integer unix timestamp in seconds. Events must have a created_at <= to this to pass>, "limit": <maximum number of events relays SHOULD return in the initial query> }
Upon receiving a
REQ
message, the relay SHOULD return events that match the filter. Any new events it receives SHOULD be sent to that same websocket until the connection is closed, aCLOSE
event is received with the same<subscription_id>
, or a newREQ
is sent using the same<subscription_id>
(in which case a new subscription is created, replacing the old one).Filter attributes containing lists (
ids
,authors
,kinds
and tag filters like#e
) are JSON arrays with one or more values. At least one of the arrays' values must match the relevant field in an event for the condition to be considered a match. For scalar event attributes such asauthors
andkind
, the attribute from the event must be contained in the filter list. In the case of tag attributes such as#e
, for which an event may have multiple values, the event and filter condition values must have at least one item in common.The
ids
,authors
,#e
and#p
filter lists MUST contain exact 64-character lowercase hex values.The
since
anduntil
properties can be used to specify the time range of events returned in the subscription. If a filter includes thesince
property, events withcreated_at
greater than or equal tosince
are considered to match the filter. Theuntil
property is similar except thatcreated_at
must be less than or equal tountil
. In short, an event matches a filter ifsince <= created_at <= until
holds.All conditions of a filter that are specified must match for an event for it to pass the filter, i.e., multiple conditions are interpreted as
&&
conditions.A
REQ
message may contain multiple filters. In this case, events that match any of the filters are to be returned, i.e., multiple filters are to be interpreted as||
conditions.The
limit
property of a filter is only valid for the initial query and MUST be ignored afterwards. Whenlimit: n
is present it is assumed that the events returned in the initial query will be the lastn
events ordered by thecreated_at
. Newer events should appear first, and in the case of ties the event with the lowest id (first in lexical order) should be first. It is safe to return less events thanlimit
specifies, but it is expected that relays do not return (much) more events than requested so clients don't get unnecessarily overwhelmed by data.From relay to client: sending events and notices
Relays can send 5 types of messages, which must also be JSON arrays, according to the following patterns:
["EVENT", <subscription_id>, <event JSON as defined above>]
, used to send events requested by clients.["OK", <event_id>, <true|false>, <message>]
, used to indicate acceptance or denial of anEVENT
message.["EOSE", <subscription_id>]
, used to indicate the end of stored events and the beginning of events newly received in real-time.["CLOSED", <subscription_id>, <message>]
, used to indicate that a subscription was ended on the server side.["NOTICE", <message>]
, used to send human-readable error messages or other things to clients.
This NIP defines no rules for how
NOTICE
messages should be sent or treated.EVENT
messages MUST be sent only with a subscription ID related to a subscription previously initiated by the client (using theREQ
message above).OK
messages MUST be sent in response toEVENT
messages received from clients, they must have the 3rd parameter set totrue
when an event has been accepted by the relay,false
otherwise. The 4th parameter MUST always be present, but MAY be an empty string when the 3rd istrue
, otherwise it MUST be a string formed by a machine-readable single-word prefix followed by a:
and then a human-readable message. Some examples:["OK", "b1a649ebe8...", true, ""]
["OK", "b1a649ebe8...", true, "pow: difficulty 25>=24"]
["OK", "b1a649ebe8...", true, "duplicate: already have this event"]
["OK", "b1a649ebe8...", false, "blocked: you are banned from posting here"]
["OK", "b1a649ebe8...", false, "blocked: please register your pubkey at https://my-expensive-relay.example.com"]
["OK", "b1a649ebe8...", false, "rate-limited: slow down there chief"]
["OK", "b1a649ebe8...", false, "invalid: event creation date is too far off from the current time"]
["OK", "b1a649ebe8...", false, "pow: difficulty 26 is less than 30"]
["OK", "b1a649ebe8...", false, "restricted: not allowed to write."]
["OK", "b1a649ebe8...", false, "error: could not connect to the database"]
CLOSED
messages MUST be sent in response to aREQ
when the relay refuses to fulfill it. It can also be sent when a relay decides to kill a subscription on its side before a client has disconnected or sent aCLOSE
. This message uses the same pattern ofOK
messages with the machine-readable prefix and human-readable message. Some examples:["CLOSED", "sub1", "unsupported: filter contains unknown elements"]
["CLOSED", "sub1", "error: could not connect to the database"]
["CLOSED", "sub1", "error: shutting down idle subscription"]
- The standardized machine-readable prefixes for
OK
andCLOSED
are:duplicate
,pow
,blocked
,rate-limited
,invalid
,restricted
, anderror
for when none of that fits.
- The
-
@ fd06f542:8d6d54cd
2025-03-28 02:21:20NIPs
NIPs stand for Nostr Implementation Possibilities.
They exist to document what may be implemented by Nostr-compatible relay and client software.
- List
- Event Kinds
- Message Types
- Client to Relay
- Relay to Client
- Standardized Tags
- Criteria for acceptance of NIPs
- Is this repository a centralizing factor?
- How this repository works
- Breaking Changes
- License
List
- NIP-01: Basic protocol flow description
- NIP-02: Follow List
- NIP-03: OpenTimestamps Attestations for Events
- NIP-04: Encrypted Direct Message --- unrecommended: deprecated in favor of NIP-17
- NIP-05: Mapping Nostr keys to DNS-based internet identifiers
- NIP-06: Basic key derivation from mnemonic seed phrase
- NIP-07:
window.nostr
capability for web browsers - NIP-08: Handling Mentions --- unrecommended: deprecated in favor of NIP-27
- NIP-09: Event Deletion Request
- NIP-10: Text Notes and Threads
- NIP-11: Relay Information Document
- NIP-13: Proof of Work
- NIP-14: Subject tag in text events
- NIP-15: Nostr Marketplace (for resilient marketplaces)
- NIP-17: Private Direct Messages
- NIP-18: Reposts
- NIP-19: bech32-encoded entities
- NIP-21:
nostr:
URI scheme - NIP-22: Comment
- NIP-23: Long-form Content
- NIP-24: Extra metadata fields and tags
- NIP-25: Reactions
- NIP-26: Delegated Event Signing
- NIP-27: Text Note References
- NIP-28: Public Chat
- NIP-29: Relay-based Groups
- NIP-30: Custom Emoji
- NIP-31: Dealing with Unknown Events
- NIP-32: Labeling
- NIP-34:
git
stuff - NIP-35: Torrents
- NIP-36: Sensitive Content
- NIP-37: Draft Events
- NIP-38: User Statuses
- NIP-39: External Identities in Profiles
- NIP-40: Expiration Timestamp
- NIP-42: Authentication of clients to relays
- NIP-44: Encrypted Payloads (Versioned)
- NIP-45: Counting results
- NIP-46: Nostr Remote Signing
- NIP-47: Nostr Wallet Connect
- NIP-48: Proxy Tags
- NIP-49: Private Key Encryption
- NIP-50: Search Capability
- NIP-51: Lists
- NIP-52: Calendar Events
- NIP-53: Live Activities
- NIP-54: Wiki
- NIP-55: Android Signer Application
- NIP-56: Reporting
- NIP-57: Lightning Zaps
- NIP-58: Badges
- NIP-59: Gift Wrap
- NIP-60: Cashu Wallet
- NIP-61: Nutzaps
- NIP-62: Request to Vanish
- NIP-64: Chess (PGN)
- NIP-65: Relay List Metadata
- NIP-66: Relay Discovery and Liveness Monitoring
- NIP-68: Picture-first feeds
- NIP-69: Peer-to-peer Order events
- NIP-70: Protected Events
- NIP-71: Video Events
- NIP-72: Moderated Communities
- NIP-73: External Content IDs
- NIP-75: Zap Goals
- NIP-78: Application-specific data
- NIP-84: Highlights
- NIP-86: Relay Management API
- NIP-88: Polls
- NIP-89: Recommended Application Handlers
- NIP-90: Data Vending Machines
- NIP-92: Media Attachments
- NIP-94: File Metadata
- NIP-96: HTTP File Storage Integration
- NIP-98: HTTP Auth
- NIP-99: Classified Listings
- NIP-7D: Threads
- NIP-C7: Chats
Event Kinds
| kind | description | NIP | | ------------- | ------------------------------- | -------------------------------------- | |
0
| User Metadata | 01 | |1
| Short Text Note | 10 | |2
| Recommend Relay | 01 (deprecated) | |3
| Follows | 02 | |4
| Encrypted Direct Messages | 04 | |5
| Event Deletion Request | 09 | |6
| Repost | 18 | |7
| Reaction | 25 | |8
| Badge Award | 58 | |9
| Chat Message | C7 | |10
| Group Chat Threaded Reply | 29 (deprecated) | |11
| Thread | 7D | |12
| Group Thread Reply | 29 (deprecated) | |13
| Seal | 59 | |14
| Direct Message | 17 | |15
| File Message | 17 | |16
| Generic Repost | 18 | |17
| Reaction to a website | 25 | |20
| Picture | 68 | |21
| Video Event | 71 | |22
| Short-form Portrait Video Event | 71 | |30
| internal reference | NKBIP-03 | |31
| external web reference | NKBIP-03 | |32
| hardcopy reference | NKBIP-03 | |33
| prompt reference | NKBIP-03 | |40
| Channel Creation | 28 | |41
| Channel Metadata | 28 | |42
| Channel Message | 28 | |43
| Channel Hide Message | 28 | |44
| Channel Mute User | 28 | |62
| Request to Vanish | 62 | |64
| Chess (PGN) | 64 | |818
| Merge Requests | 54 | |1018
| Poll Response | 88 | |1021
| Bid | 15 | |1022
| Bid confirmation | 15 | |1040
| OpenTimestamps | 03 | |1059
| Gift Wrap | 59 | |1063
| File Metadata | 94 | |1068
| Poll | 88 | |1111
| Comment | 22 | |1311
| Live Chat Message | 53 | |1617
| Patches | 34 | |1621
| Issues | 34 | |1622
| Git Replies (deprecated) | 34 | |1630
-1633
| Status | 34 | |1971
| Problem Tracker | nostrocket | |1984
| Reporting | 56 | |1985
| Label | 32 | |1986
| Relay reviews | | |1987
| AI Embeddings / Vector lists | NKBIP-02 | |2003
| Torrent | 35 | |2004
| Torrent Comment | 35 | |2022
| Coinjoin Pool | joinstr | |4550
| Community Post Approval | 72 | |5000
-5999
| Job Request | 90 | |6000
-6999
| Job Result | 90 | |7000
| Job Feedback | 90 | |7374
| Reserved Cashu Wallet Tokens | 60 | |7375
| Cashu Wallet Tokens | 60 | |7376
| Cashu Wallet History | 60 | |9000
-9030
| Group Control Events | 29 | |9041
| Zap Goal | 75 | |9321
| Nutzap | 61 | |9467
| Tidal login | Tidal-nostr | |9734
| Zap Request | 57 | |9735
| Zap | 57 | |9802
| Highlights | 84 | |10000
| Mute list | 51 | |10001
| Pin list | 51 | |10002
| Relay List Metadata | 65, 51 | |10003
| Bookmark list | 51 | |10004
| Communities list | 51 | |10005
| Public chats list | 51 | |10006
| Blocked relays list | 51 | |10007
| Search relays list | 51 | |10009
| User groups | 51, 29 | |10013
| Private event relay list | 37 | |10015
| Interests list | 51 | |10019
| Nutzap Mint Recommendation | 61 | |10030
| User emoji list | 51 | |10050
| Relay list to receive DMs | 51, 17 | |10063
| User server list | Blossom | |10096
| File storage server list | 96 | |10166
| Relay Monitor Announcement | 66 | |13194
| Wallet Info | 47 | |17375
| Cashu Wallet Event | 60 | |21000
| Lightning Pub RPC | Lightning.Pub | |22242
| Client Authentication | 42 | |23194
| Wallet Request | 47 | |23195
| Wallet Response | 47 | |24133
| Nostr Connect | 46 | |24242
| Blobs stored on mediaservers | Blossom | |27235
| HTTP Auth | 98 | |30000
| Follow sets | 51 | |30001
| Generic lists | 51 (deprecated) | |30002
| Relay sets | 51 | |30003
| Bookmark sets | 51 | |30004
| Curation sets | 51 | |30005
| Video sets | 51 | |30007
| Kind mute sets | 51 | |30008
| Profile Badges | 58 | |30009
| Badge Definition | 58 | |30015
| Interest sets | 51 | |30017
| Create or update a stall | 15 | |30018
| Create or update a product | 15 | |30019
| Marketplace UI/UX | 15 | |30020
| Product sold as an auction | 15 | |30023
| Long-form Content | 23 | |30024
| Draft Long-form Content | 23 | |30030
| Emoji sets | 51 | |30040
| Curated Publication Index | NKBIP-01 | |30041
| Curated Publication Content | NKBIP-01 | |30063
| Release artifact sets | 51 | |30078
| Application-specific Data | 78 | |30166
| Relay Discovery | 66 | |30267
| App curation sets | 51 | |30311
| Live Event | 53 | |30315
| User Statuses | 38 | |30388
| Slide Set | Corny Chat | |30402
| Classified Listing | 99 | |30403
| Draft Classified Listing | 99 | |30617
| Repository announcements | 34 | |30618
| Repository state announcements | 34 | |30818
| Wiki article | 54 | |30819
| Redirects | 54 | |31234
| Draft Event | 37 | |31388
| Link Set | Corny Chat | |31890
| Feed | NUD: Custom Feeds | |31922
| Date-Based Calendar Event | 52 | |31923
| Time-Based Calendar Event | 52 | |31924
| Calendar | 52 | |31925
| Calendar Event RSVP | 52 | |31989
| Handler recommendation | 89 | |31990
| Handler information | 89 | | |32267
| Software Application | | | |34550
| Community Definition | 72 | |38383
| Peer-to-peer Order events | 69 | |39000-9
| Group metadata events | 29 |Message types
Client to Relay
| type | description | NIP | | ------- | --------------------------------------------------- | ----------- | |
EVENT
| used to publish events | 01 | |REQ
| used to request events and subscribe to new updates | 01 | |CLOSE
| used to stop previous subscriptions | 01 | |AUTH
| used to send authentication events | 42 | |COUNT
| used to request event counts | 45 |Relay to Client
| type | description | NIP | | -------- | ------------------------------------------------------- | ----------- | |
EOSE
| used to notify clients all stored events have been sent | 01 | |EVENT
| used to send events requested to clients | 01 | |NOTICE
| used to send human-readable messages to clients | 01 | |OK
| used to notify clients if an EVENT was successful | 01 | |CLOSED
| used to notify clients that a REQ was ended and why | 01 | |AUTH
| used to send authentication challenges | 42 | |COUNT
| used to send requested event counts to clients | 45 |Standardized Tags
| name | value | other parameters | NIP | | ----------------- | ------------------------------------ | ------------------------------- | -------------------------------------------------- | |
a
| coordinates to an event | relay URL | 01 | |A
| root address | relay URL | 22 | |d
| identifier | -- | 01 | |e
| event id (hex) | relay URL, marker, pubkey (hex) | 01, 10 | |E
| root event id | relay URL | 22 | |f
| currency code | -- | 69 | |g
| geohash | -- | 52 | |h
| group id | -- | 29 | |i
| external identity | proof, url hint | 35, 39, 73 | |I
| root external identity | -- | 22 | |k
| kind | -- | 18, 25, 72, 73 | |K
| root scope | -- | 22 | |l
| label, label namespace | -- | 32 | |L
| label namespace | -- | 32 | |m
| MIME type | -- | 94 | |p
| pubkey (hex) | relay URL, petname | 01, 02, 22 | |P
| pubkey (hex) | -- | 22, 57 | |q
| event id (hex) | relay URL, pubkey (hex) | 18 | |r
| a reference (URL, etc) | -- | 24, 25 | |r
| relay url | marker | 65 | |s
| status | -- | 69 | |t
| hashtag | -- | 24, 34, 35 | |u
| url | -- | 61, 98 | |x
| hash | -- | 35, 56 | |y
| platform | -- | 69 | |z
| order number | -- | 69 | |-
| -- | -- | 70 | |alt
| summary | -- | 31 | |amount
| millisatoshis, stringified | -- | 57 | |bolt11
|bolt11
invoice | -- | 57 | |challenge
| challenge string | -- | 42 | |client
| name, address | relay URL | 89 | |clone
| git clone URL | -- | 34 | |content-warning
| reason | -- | 36 | |delegation
| pubkey, conditions, delegation token | -- | 26 | |description
| description | -- | 34, 57, 58 | |emoji
| shortcode, image URL | -- | 30 | |encrypted
| -- | -- | 90 | |expiration
| unix timestamp (string) | -- | 40 | |file
| full path (string) | -- | 35 | |goal
| event id (hex) | relay URL | 75 | |image
| image URL | dimensions in pixels | 23, 52, 58 | |imeta
| inline metadata | -- | 92 | |lnurl
|bech32
encodedlnurl
| -- | 57 | |location
| location string | -- | 52, 99 | |name
| name | -- | 34, 58, 72 | |nonce
| random | difficulty | 13 | |preimage
| hash ofbolt11
invoice | -- | 57 | |price
| price | currency, frequency | 99 | |proxy
| external ID | protocol | 48 | |published_at
| unix timestamp (string) | -- | 23 | |relay
| relay url | -- | 42, 17 | |relays
| relay list | -- | 57 | |server
| file storage server url | -- | 96 | |subject
| subject | -- | 14, 17, 34 | |summary
| summary | -- | 23, 52 | |thumb
| badge thumbnail | dimensions in pixels | 58 | |title
| article title | -- | 23 | |tracker
| torrent tracker URL | -- | 35 | |web
| webpage URL | -- | 34 | |zap
| pubkey (hex), relay URL | weight | 57 |Please update these lists when proposing new NIPs.
Criteria for acceptance of NIPs
- They should be fully implemented in at least two clients and one relay -- when applicable.
- They should make sense.
- They should be optional and backwards-compatible: care must be taken such that clients and relays that choose to not implement them do not stop working when interacting with the ones that choose to.
- There should be no more than one way of doing the same thing.
- Other rules will be made up when necessary.
Is this repository a centralizing factor?
To promote interoperability, we need standards that everybody can follow, and we need them to define a single way of doing each thing without ever hurting backwards-compatibility, and for that purpose there is no way around getting everybody to agree on the same thing and keep a centralized index of these standards. However the fact that such an index exists doesn't hurt the decentralization of Nostr. At any point the central index can be challenged if it is failing to fulfill the needs of the protocol and it can migrate to other places and be maintained by other people.
It can even fork into multiple versions, and then some clients would go one way, others would go another way, and some clients would adhere to both competing standards. This would hurt the simplicity, openness and interoperability of Nostr a little, but everything would still work in the short term.
There is a list of notable Nostr software developers who have commit access to this repository, but that exists mostly for practical reasons, as by the nature of the thing we're dealing with the repository owner can revoke membership and rewrite history as they want -- and if these actions are unjustified or perceived as bad or evil the community must react.
How this repository works
Standards may emerge in two ways: the first way is that someone starts doing something, then others copy it; the second way is that someone has an idea of a new standard that could benefit multiple clients and the protocol in general without breaking backwards-compatibility and the principle of having a single way of doing things, then they write that idea and submit it to this repository, other interested parties read it and give their feedback, then once most people reasonably agree we codify that in a NIP which client and relay developers that are interested in the feature can proceed to implement.
These two ways of standardizing things are supported by this repository. Although the second is preferred, an effort will be made to codify standards emerged outside this repository into NIPs that can be later referenced and easily understood and implemented by others -- but obviously as in any human system discretion may be applied when standards are considered harmful.
Breaking Changes
License
All NIPs are public domain.
Contributors