-
@ b17fccdf:b7211155
2025-03-25 11:23:36Si vives en España, quizás hayas notado que no puedes acceder a ciertas páginas webs durante los fines de semana o en algunos días entre semana, entre ellas, la guía de MiniBolt.
Esto tiene una razón, por supuesto una solución, además de una conclusión. Sin entrar en demasiados detalles:
La razón
El bloqueo a Cloudflare, implementado desde hace casi dos meses por operadores de Internet (ISPs) en España (como Movistar, O2, DIGI, Pepephone, entre otros), se basa en una orden judicial emitida tras una demanda de LALIGA (Fútbol). Esta medida busca combatir la piratería en España, un problema que afecta directamente a dicha organización.
Aunque la intención original era restringir el acceso a dominios específicos que difundieran dicho contenido, Cloudflare emplea el protocolo ECH (Encrypted Client Hello), que oculta el nombre del dominio, el cual antes se transmitía en texto plano durante el proceso de establecimiento de una conexión TLS. Esta medida dificulta que las operadoras analicen el tráfico para aplicar bloqueos basados en dominios, lo que les obliga a recurrir a bloqueos más amplios por IP o rangos de IP para cumplir con la orden judicial.
Esta práctica tiene consecuencias graves, que han sido completamente ignoradas por quienes la ejecutan. Es bien sabido que una infraestructura de IP puede alojar numerosos dominios, tanto legítimos como no legítimos. La falta de un "ajuste fino" en los bloqueos provoca un perjuicio para terceros, restringiendo el acceso a muchos dominios legítimos que no tiene relación alguna con actividades ilícitas, pero que comparten las mismas IPs de Cloudflare con dominios cuestionables. Este es el caso de la web de MiniBolt y su dominio
minibolt.info
, los cuales utilizan Cloudflare como proxy para aprovechar las medidas de seguridad, privacidad, optimización y servicios adicionales que la plataforma ofrece de forma gratuita.Si bien este bloqueo parece ser temporal (al menos durante la temporada 24/25 de fútbol, hasta finales de mayo), es posible que se reactive con el inicio de la nueva temporada.
La solución
Obviamente, MiniBolt no dejará de usar Cloudflare como proxy por esta razón. Por lo que a continuación se exponen algunas medidas que como usuario puedes tomar para evitar esta restricción y poder acceder:
~> Utiliza una VPN:
Existen varias soluciones de proveedores de VPN, ordenadas según su reputación en privacidad: - IVPN - Mullvad VPN - Proton VPN (gratis) - Obscura VPN (solo para macOS) - Cloudfare WARP (gratis) + permite utilizar el modo proxy local para enrutar solo la navegación, debes utilizar la opción "WARP a través de proxy local" siguiendo estos pasos: 1. Inicia Cloudflare WARP y dentro de la pequeña interfaz haz click en la rueda dentada abajo a la derecha > "Preferencias" > "Avanzado" > "Configurar el modo proxy" 2. Marca la casilla "Habilite el modo proxy en este dispositivo" 3. Elige un "Puerto de escucha de proxy" entre 0-65535. ej: 1080, haz click en "Aceptar" y cierra la ventana de preferencias 4. Accede de nuevo a Cloudflare WARP y pulsa sobre el switch para habilitar el servicio. 3. Ahora debes apuntar el proxy del navegador a Cloudflare WARP, la configuración del navegador es similar a esta para el caso de navegadores basados en Firefox. Una vez hecho, deberías poder acceder a la guía de MiniBolt sin problemas. Si tienes dudas, déjalas en comentarios e intentaré resolverlas. Más info AQUÍ.
~> Proxifica tu navegador para usar la red de Tor, o utiliza el navegador oficial de Tor (recomendado).
La conclusión
Estos hechos ponen en tela de juicio los principios fundamentales de la neutralidad de la red, pilares esenciales de la Declaración de Independencia del Ciberespacio que defiende un internet libre, sin restricciones ni censura. Dichos principios se han visto quebrantados sin precedentes en este país, confirmando que ese futuro distópico que muchos negaban, ya es una realidad.
Es momento de actuar y estar preparados: debemos impulsar el desarrollo y la difusión de las herramientas anticensura que tenemos a nuestro alcance, protegiendo así la libertad digital y asegurando un acceso equitativo a la información para todos
Este compromiso es uno de los pilares fundamentales de MiniBolt, lo que convierte este desafío en una oportunidad para poner a prueba las soluciones anticensura ya disponibles, así como las que están en camino.
¡Censúrame si puedes, legislador! ¡La lucha por la privacidad y la libertad en Internet ya está en marcha!
Fuentes: * https://bandaancha.eu/articulos/movistar-o2-deja-clientes-sin-acceso-11239 * https://bandaancha.eu/articulos/esta-nueva-sentencia-autoriza-bloqueos-11257 * https://bandaancha.eu/articulos/como-saltarse-bloqueo-webs-warp-vpn-9958 * https://bandaancha.eu/articulos/como-activar-ech-chrome-acceder-webs-10689 * https://comunidad.movistar.es/t5/Soporte-Fibra-y-ADSL/Problema-con-web-que-usan-Cloudflare/td-p/5218007
-
@ 16f1a010:31b1074b
2025-02-19 20:57:59In the rapidly evolving world of Bitcoin, running a Bitcoin node has become more accessible than ever. Platforms like Umbrel, Start9, myNode, and Citadel offer user-friendly interfaces to simplify node management. However, for those serious about maintaining a robust and efficient Lightning node ⚡, relying solely on these platforms may not be the optimal choice.
Let’s delve into why embracing Bitcoin Core and mastering the command-line interface (CLI) can provide a more reliable, sovereign, and empowering experience.
Understanding Node Management Platforms
What Are Umbrel, Start9, myNode, and Citadel?
Umbrel, Start9, myNode, and Citadel are platforms designed to streamline the process of running a Bitcoin node. They offer graphical user interfaces (GUIs) that allow users to manage various applications, including Bitcoin Core and Lightning Network nodes, through a web-based dashboard 🖥️.
These platforms often utilize Docker containers 🐳 to encapsulate applications, providing a modular and isolated environment for each service.
The Appeal of Simplified Node Management
The primary allure of these platforms lies in their simplicity. With minimal command-line interaction, users can deploy a full Bitcoin and Lightning node, along with a suite of additional applications.
✅ Easy one-command installation
✅ Web-based GUI for management
✅ Automatic app updates (but with delays, as we’ll discuss)However, while this convenience is attractive, it comes at a cost.
The Hidden Complexities of Using Node Management Platforms
While the user-friendly nature of these platforms is advantageous, it can also introduce several challenges that may hinder advanced users or those seeking greater control over their nodes.
🚨 Dependency on Maintainers for Updates
One significant concern is the reliance on platform maintainers for updates. Since these platforms manage applications through Docker containers, users must wait for the maintainers to update the container images before they can access new features or security patches.
🔴 Delayed Bitcoin Core updates = potential security risks
🔴 Lightning Network updates are not immediate
🔴 Bugs and vulnerabilities may persist longerInstead of waiting on a third party, why not update Bitcoin Core & LND yourself instantly?
⚙️ Challenges in Customization and Advanced Operations
For users aiming to perform advanced operations, such as:
- Custom backups 📂
- Running specific CLI commands 🖥️
- Optimizing node settings ⚡
…the abstraction layers introduced by these platforms become obstacles.
Navigating through nested directories and issuing commands inside Docker containers makes troubleshooting a nightmare. Instead of a simple
bitcoin-cli
command, you must figure out how to execute it inside the container, adding unnecessary complexity.Increased Backend Complexity
To achieve frontend simplicity, these platforms make the backend more complex.
🚫 Extra layers of abstraction
🚫 Hidden logs and settings
🚫 Harder troubleshootingThe use of multiple Docker containers, custom scripts, and unique file structures can make system maintenance and debugging a pain.
This complication defeats the purpose of “making running a node easy.”
✅ Advantages of Using Bitcoin Core and Command-Line Interface (CLI)
By installing Bitcoin Core directly and using the command-line interface (CLI), you gain several key advantages that make managing a Bitcoin and Lightning node more efficient and empowering.
Direct Control and Immediate Updates
One of the biggest downsides of package manager-based platforms is the reliance on third-party maintainers to release updates. Since Bitcoin Core, Lightning implementations (such as LND, Core Lightning, or Eclair), and other related software evolve rapidly, waiting for platform-specific updates can leave you running outdated or vulnerable versions.
By installing Bitcoin Core directly, you remove this dependency. You can update immediately when new versions are released, ensuring your node benefits from the latest features, security patches, and bug fixes. The same applies to Lightning software—being able to install and update it yourself gives you full autonomy over your node’s performance and security.
🛠 Simplified System Architecture
Platforms like Umbrel and myNode introduce extra complexity by running Bitcoin Core and Lightning inside Docker containers. This means:
- The actual files and configurations are stored inside Docker’s filesystem, making it harder to locate and manage them manually.
- If something breaks, troubleshooting is more difficult due to the added layer of abstraction.
- Running commands requires jumping through Docker shell sessions, adding unnecessary friction to what should be a straightforward process.
Instead, a direct installation of Bitcoin Core, Lightning, and Electrum Server (if needed) results in a cleaner, more understandable system. The software runs natively on your machine, without containerized layers making things more convoluted.
Additionally, setting up your own systemd service files for Bitcoin and Lightning is not as complicated as it seems. Once configured, these services will run automatically on boot, offering the same level of convenience as platforms like Umbrel but without the unnecessary complexity.
Better Lightning Node Management
If you’re running a Lightning Network node, using CLI-based tools provides far more flexibility than relying on a GUI like the ones bundled with node management platforms.
🟢 Custom Backup Strategies – Running Lightning through a GUI-based node manager often means backups are handled in a way that is opaque to the user. With CLI tools, you can easily script automatic backups of your channels, wallets, and configurations.
🟢 Advanced Configuration – Platforms like Umbrel force certain configurations by default, limiting how you can customize your Lightning node. With a direct install, you have full control over: * Channel fees 💰 * Routing policies 📡 * Liquidity management 🔄
🟢 Direct Access to LND, Core Lightning, or Eclair – Instead of issuing commands through a GUI (which is often limited in functionality), you can use: *
lncli
(for LND) *lightning-cli
(for Core Lightning) …to interact with your node at a deeper level.Enhanced Learning and Engagement
A crucial aspect of running a Bitcoin and Lightning node is understanding how it works.
Using an abstraction layer like Umbrel may get a node running in a few clicks, but it does little to teach users how Bitcoin actually functions.
By setting up Bitcoin Core, Lightning, and related software manually, you will:
✅ Gain practical knowledge of Bitcoin nodes, networking, and system performance.
✅ Learn how to configure and manage RPC commands.
✅ Become less reliant on third-party developers and more confident in troubleshooting.🎯 Running a Bitcoin node is about sovereignty – learn how to control it yourself.
Become more sovereign TODAY
Many guides make this process straightforward K3tan has a fantastic guide on running Bitcoin Core, Electrs, LND and more.
- Ministry of Nodes Guide 2024
- You can find him on nostr
nostr:npub1txwy7guqkrq6ngvtwft7zp70nekcknudagrvrryy2wxnz8ljk2xqz0yt4xEven with the best of guides, if you are running this software,
📖 READ THE DOCUMENTATIONThis is all just software at the end of the day. Most of it is very well documented. Take a moment to actually read through the documentation for yourself when installing. The documentation has step by step guides on setting up the software. Here is a helpful list: * Bitcoin.org Bitcoin Core Linux install instructions * Bitcoin Core Code Repository * Electrs Installation * LND Documentation * LND Code Repository * CLN Documentation * CLN Code Repository
If you have any more resources or links I should add, please comment them . I want to add as much to this article as I can.
-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Let’s dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computers—and it has nothing to do with what so-called “quantum coaches” teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoin’s security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computing’s Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. It’s a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoin’s Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoin’s blockchain.
- Lamport: Created in 1977, it’s considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoin’s Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the community’s constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoin’s future is not at risk—it is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ fd06f542:8d6d54cd
2025-03-30 02:16:24Warning
unrecommended
: deprecated in favor of NIP-17NIP-04
Encrypted Direct Message
final
unrecommended
optional
A special event with kind
4
, meaning "encrypted direct message". It is supposed to have the following attributes:content
MUST be equal to the base64-encoded, aes-256-cbc encrypted string of anything a user wants to write, encrypted using a shared cipher generated by combining the recipient's public-key with the sender's private-key; this appended by the base64-encoded initialization vector as if it was a querystring parameter named "iv". The format is the following:"content": "<encrypted_text>?iv=<initialization_vector>"
.tags
MUST contain an entry identifying the receiver of the message (such that relays may naturally forward this event to them), in the form["p", "<pubkey, as a hex string>"]
.tags
MAY contain an entry identifying the previous message in a conversation or a message we are explicitly replying to (such that contextual, more organized conversations may happen), in the form["e", "<event_id>"]
.Note: By default in the libsecp256k1 ECDH implementation, the secret is the SHA256 hash of the shared point (both X and Y coordinates). In Nostr, only the X coordinate of the shared point is used as the secret and it is NOT hashed. If using libsecp256k1, a custom function that copies the X coordinate must be passed as the
hashfp
argument insecp256k1_ecdh
. See here.Code sample for generating such an event in JavaScript:
```js import crypto from 'crypto' import * as secp from '@noble/secp256k1'
let sharedPoint = secp.getSharedSecret(ourPrivateKey, '02' + theirPublicKey) let sharedX = sharedPoint.slice(1, 33)
let iv = crypto.randomFillSync(new Uint8Array(16)) var cipher = crypto.createCipheriv( 'aes-256-cbc', Buffer.from(sharedX), iv ) let encryptedMessage = cipher.update(text, 'utf8', 'base64') encryptedMessage += cipher.final('base64') let ivBase64 = Buffer.from(iv.buffer).toString('base64')
let event = { pubkey: ourPubKey, created_at: Math.floor(Date.now() / 1000), kind: 4, tags: [['p', theirPublicKey]], content: encryptedMessage + '?iv=' + ivBase64 } ```
Security Warning
This standard does not go anywhere near what is considered the state-of-the-art in encrypted communication between peers, and it leaks metadata in the events, therefore it must not be used for anything you really need to keep secret, and only with relays that use
AUTH
to restrict who can fetch yourkind:4
events.Client Implementation Warning
Clients should not search and replace public key or note references from the
.content
. If processed like a regular text note (where@npub...
is replaced with#[0]
with a["p", "..."]
tag) the tags are leaked and the mentioned user will receive the message in their inbox. -
@ fd06f542:8d6d54cd
2025-03-30 02:11:00NIP-03
OpenTimestamps Attestations for Events
draft
optional
This NIP defines an event with
kind:1040
that can contain an OpenTimestamps proof for any other event:json { "kind": 1040 "tags": [ ["e", <event-id>, <relay-url>], ["alt", "opentimestamps attestation"] ], "content": <base64-encoded OTS file data> }
- The OpenTimestamps proof MUST prove the referenced
e
event id as its digest. - The
content
MUST be the full content of an.ots
file containing at least one Bitcoin attestation. This file SHOULD contain a single Bitcoin attestation (as not more than one valid attestation is necessary and less bytes is better than more) and no reference to "pending" attestations since they are useless in this context.
Example OpenTimestamps proof verification flow
```bash ~> nak req -i e71c6ea722987debdb60f81f9ea4f604b5ac0664120dd64fb9d23abc4ec7c323 wss://nostr-pub.wellorder.net | jq -r .content | ots verify
using an esplora server at https://blockstream.info/api - sequence ending on block 810391 is valid timestamp validated at block [810391] ```
- The OpenTimestamps proof MUST prove the referenced
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ fd06f542:8d6d54cd
2025-03-30 02:10:24NIP-03
OpenTimestamps Attestations for Events
draft
optional
This NIP defines an event with
kind:1040
that can contain an OpenTimestamps proof for any other event:json { "kind": 1040 "tags": [ ["e", <event-id>, <relay-url>], ["alt", "opentimestamps attestation"] ], "content": <base64-encoded OTS file data> }
- The OpenTimestamps proof MUST prove the referenced
e
event id as its digest. - The
content
MUST be the full content of an.ots
file containing at least one Bitcoin attestation. This file SHOULD contain a single Bitcoin attestation (as not more than one valid attestation is necessary and less bytes is better than more) and no reference to "pending" attestations since they are useless in this context.
Example OpenTimestamps proof verification flow
```bash ~> nak req -i e71c6ea722987debdb60f81f9ea4f604b5ac0664120dd64fb9d23abc4ec7c323 wss://nostr-pub.wellorder.net | jq -r .content | ots verify
using an esplora server at https://blockstream.info/api - sequence ending on block 810391 is valid timestamp validated at block [810391] ```
- The OpenTimestamps proof MUST prove the referenced
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 30ceb64e:7f08bdf5
2025-03-30 00:37:54Hey Freaks,
RUNSTR is a motion tracking app built on top of nostr. The project is built by TheWildHustle and TheNostrDev Team. The project has been tinkered with for about 3 months, but development has picked up and its goals and direction have become much clearer.
In a previous post I mentioned that RUNSTR was looking to become a Nike Run Club or Strava competitor, offering users an open source community and privacy focused alternative to the centralized silos that we've become used to.
I normally ramble incoherently.....even in writing, but this is my attempt to communicate the project's goals and direction as we move forward.
This is where the project is now:
Core Features
- Run Tracker: Uses an algorithm which adjusts to your phone's location permissions and stores the data on your phone locally
- Stats: Stored locally on your phone with a basic profile screen so users can monitor calories burned during runs
- Nostr Feed: Made up of kind1 notes that contain #RUNSTR and other running related hashtags
- Music: Brought to you via a wavlake API, enabling your wavlake playlists and liked songs to be seen and played in the app
Current Roadmap
- Bugs and small improvements: Fixing known issues within the client
- zap.store release: Launching a bug bounty program after release
- Clubs: Enabling running organizations to create territories for events, challenges, rewards and competition
- Testflight: Opening up the app to iOS users (currently Android only)
- Modes: Adding functionality to switch between Running, Walking, or Cycling modes
Future Roadmap
- Requested Features: Implementing features requested by club managers to support virtual events and challenges
- Blossom: Giving power users the ability to upload their data to personal blossom servers
- NIP28: Making clubs interoperable with other group chat clients like 0xchat, Keychat, and Chachi Chat
- DVM's: Creating multiple feeds based on movement mode (e.g., Walking mode shows walkstr feed)
- NIP101e: Allowing users to create run records and store them on nostr relays
- Calories over relays: Using NIP89-like functionality for users to save calorie data on relays for use in other applications
- NIP60: Implementing automatic wallet creation for users to zap and get zapped within the app
In Conclusion
I've just barely begun this thing and it'll be an up and down journey trying to push it into existence. I think RUNSTR has the potential to highlight the other things that nostr has going for it, demonstrating the protocol's interoperability, flexing its permissionless identity piece, and offering an experience that gives users a glimpse into what is possible when shipping into a new paradigm. Although we build into an environment that often offers no solutions, you'd have to be a crazy person not to try.
https://github.com/HealthNoteLabs/Runstr/releases/tag/feed-0.1.0-20250329-210157
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 30b99916:3cc6e3fe
2025-03-29 19:34:31Chef's Notes
With spring in the air, it time to get your garden into shape. We grow our own Raspberries and Strawberries and a large portion of the harvest gets crushed up and frozen for the making of freezer jam through out the year.
We crush the berries up with a potato masher in the quantities listed in the receipt below and place them into the freezer.
The receipt below was adapted from Sure-Jell.
![[Freezer-Jam800.png]]
Details
- ⏲️ Prep time: 20 to 30 minutes
- 🍳 Cook time: 12 minutes or so
- 🍽️ Servings: 6 to 8 8-ounce jars depending on berry choice
Ingredients
Pick your jam
Strawberry Jam
- 2 cups crushed strawberries (buy 1 qt. fully ripe strawberries)
- 4 cups supar measure into a separate bowel
- Need 6 8-ounce jars or fewer with larger jar size with lids
Raspberry/Blackberry Jam
- 3 cups crushed raspberries or blackberry
- 5 1/2 cups supar measure into a separate bowel
- Need 8 8-ounce jars or fewer with larger jar size with lids
Pectin
- 3/4 cups water
- 1 package of Sure-Jell Fruit Pectin
Instructions
Step 1
- Wash 8-ounce glass jars or larger with lids
Step 2
- Add crushed berries into large bowl
- Stir sugar into the crushed berries and let stand for 10 minutes while stirring occasionally.
Step 3
- In a small sauce pan, mix water and pectin and bring to a boil while stirring constantly. Continue boiling and stirring 1 min.
- Add pectin mixture to the fruit mixture; stir 3 min. or until most the sugar is dissolved.
Step 4
- Fill containers immediately to within 1/2 inch of tops. Wipe off top edges of containers; immediately cover with lids. Let stand at room temperature 24 hours. Jam is now ready to use. Store in refrigerator up to 3 weeks or in freezer up to 1 year.
Bon Appétit
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 7d33ba57:1b82db35
2025-03-29 18:47:34Pula, located at the southern tip of Istria, is a city where ancient Roman ruins meet stunning Adriatic beaches. Known for its well-preserved amphitheater, charming old town, and crystal-clear waters, Pula offers a perfect blend of history, culture, and relaxation.
🏛️ Top Things to See & Do in Pula
1️⃣ Pula Arena (Roman Amphitheater) 🏟️
- One of the best-preserved Roman amphitheaters in the world, built in the 1st century.
- Used for gladiator fights, now a venue for concerts & film festivals.
- Climb to the top for stunning sea views.
2️⃣ Explore Pula’s Old Town 🏡
- Wander through cobbled streets, past Venetian, Roman, and Austro-Hungarian architecture.
- Visit the Arch of the Sergii (a 2,000-year-old Roman triumphal arch).
- Enjoy a drink in Forum Square, home to the Temple of Augustus.
3️⃣ Relax at Pula’s Beaches 🏖️
- Hawaiian Beach (Havajska Plaža): Turquoise waters & cliffs for jumping.
- Ambrela Beach: A Blue Flag beach with calm waters, great for families.
- Pješčana Uvala: A sandy beach, rare for Croatia!
4️⃣ Cape Kamenjak Nature Park 🌿
- A wild and rugged coastline with hidden coves and crystal-clear water.
- Great for cliff jumping, kayaking, and biking.
- Located 30 minutes south of Pula.
5️⃣ Visit Brijuni National Park 🏝️
- A group of 14 islands, once Tito’s private retreat.
- Features Roman ruins, a safari park, and cycling trails.
- Accessible via boat from Fazana (15 min from Pula).
6️⃣ Try Istrian Cuisine 🍽️
- Fuži with truffles – Istria is famous for white & black truffles.
- Istrian prosciutto & cheese – Perfect with local Malvazija wine.
- Fresh seafood – Try grilled squid or buzara-style mussels.
🚗 How to Get to Pula
✈️ By Air: Pula Airport (PUY) has flights from major European cities.
🚘 By Car:
- From Zagreb: ~3 hours (270 km)
- From Ljubljana (Slovenia): ~2.5 hours (160 km)
🚌 By Bus: Regular buses connect Pula with Rovinj, Rijeka, Zagreb, and Trieste (Italy).
🚢 By Ferry: Seasonal ferries run from Venice and Zadar.💡 Tips for Visiting Pula
✅ Best time to visit? May–September for warm weather & festivals 🌞
✅ Book Arena event tickets in advance – Summer concerts sell out fast 🎶
✅ Try local wines – Istrian Malvazija (white) and Teran (red) are excellent 🍷
✅ Explore nearby towns – Rovinj & Motovun make great day trips 🏡
✅ Cash is useful – Some small shops & markets prefer cash 💶 -
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ ff517fbf:fde1561b
2025-03-30 04:43:09ビットコインが「最強の担保」と言われる理由
ビットコインは「デジタルゴールド」とも呼ばれることがありますが、実はローンの担保としても最強だと言われています。その理由を、他の資産(株式、不動産、金など)と比較しながら見てみましょう。
-
流動性と即時性:ビットコインは24時間365日世界中で取引されているため、非常に流動性が高い資産です。売買がすぐにできて価格も常に明確なので、担保評価がしやすく、お金を貸す側・借りる側双方に安心感を与えます。一方、株式や不動産は市場が営業時間内しか動かず、現金化にも時間がかかります。不動産は売却に数ヶ月かかることもありますし、金(ゴールド)は現物を保管・輸送する手間があります。ビットコインならネット上で即座に担保設定・解除ができるのです。
-
分割性と柔軟性:ビットコインは小数点以下8桁まで分割可能(1億分の1が最小単位の「サトシ」)なので、必要な額だけ正確に担保に充てることができます。他方、土地や建物を一部だけ担保に入れることは難しいですし、株式も1株未満の細かい調整はできません。ビットコインなら価値の微調整が容易で、担保として柔軟に扱えるのです。
-
管理のしやすさ(マルチシグによる信頼性):HodlHodlのLendでは、ビットコイン担保は2-of-3のマルチシグ契約で管理されます。これは「借り手・貸し手・プラットフォーム」の3者それぞれが鍵を持ち、2つの鍵の同意がないとビットコインを動かせない仕組みです。このため、誰か一人が勝手に担保を持ち逃げすることができず、第三者(HodlHodl)も単独ではコインを移動できません。ビットコインだからこそ実現できる非中央集権で安全な担保管理であり、株式や不動産を担保にする場合のように銀行や証券会社といった仲介業者に頼る必要がありません。
-
国境を越えた利用:ビットコインはインターネットがつながる所なら世界中どこでも送受信できます。このため、日本にいながら海外の相手とでもローン契約が可能です。たとえば日本の方がビットコインを担保にドル建てのステーブルコインを借り、それを日本円に換えて使うこともできます(為替リスクには注意ですが…)。不動産を海外の人と直接やり取りするのは現実的に難しいですが、ビットコインならグローバルに担保が活用できるのです。
-
希少性と価値の上昇期待:ビットコインは発行上限が決まっており(2100万BTCまで)、時間とともに新規供給が減っていきます。過去の長期的な価格推移を見ると、短期的な変動は激しいものの数年〜十年のスパンでは上昇傾向にあります。一方、法定通貨建ての資産(債券や株式など)はインフレの影響で実質価値が目減りすることがあります。ビットコインは長期保有すれば価値が上がりやすい特性があるため、「今手放したくない資産」として担保に向いています。実際、HodlHodlのチームは「ビットコインはスーパーカCollateral(超優秀な担保)だ」と述べています。
こうした理由から、ビットコインは現時点で考えうる中でも最良の担保資産と考えられています。株や不動産のように書類手続きや名義変更をしなくても、ビットコインならブロックチェーン上の契約でシンプルに担保設定ができる――この手軽さと信頼性が大きな魅力です。
匿名&プライバシー重視:KYC不要のP2Pレンディングのメリット
HodlHodlのLend最大の特徴の一つは、本人確認(KYC)が一切不要だという点です。日本の多くの金融サービスでは口座開設時に運転免許証やマイナンバー提出など煩雑な手続きが必要ですが、Lendではメールアドレスでアカウント登録するだけでOK。これは「匿名性・プライバシー」を重視する人にとって非常に相性が良いポイントです。
-
個人情報を晒さなくて良い安心感:日本では昔から「人に迷惑をかけない」「目立たない」ことが美徳とされ、特にお金の話は他人に知られたくないと考える人が多いですよね。Lendは匿名で利用できるため、借金をすることを周囲に知られたくない人でも安心です。銀行からローンを借りるときのように収入証明や保証人を用意する必要もなく、誰にも知られずひっそりと資金調達ができます。
-
ノー・チェック&ノー・ペーパー:貸し借りにあたって信用審査や過去の借入履歴チェックがありません 。極端な話、今まで金融履歴が全く無い人や、銀行に相手にされないような人でも、ビットコインさえ持っていればお金を借りられるのです。書類のやり取りが無いので手続きもスピーディーです。「印鑑証明や収入証明を揃えて…」という面倒とは無縁で、ネット上でクリックして契約が完結します。
-
プライバシーの保護:個人情報を提出しないということは、情報漏洩のリスクも無いということです。近年、日本でも個人情報の流出事件が相次いでおり、不安に感じる方も多いでしょう。Lendではアカウント登録時にメールアドレスとパスワード以外何も求められません。財務情報や身元情報がどこかに蓄積される心配がないのは、大きな安心材料です。
-
国や機関から干渉されにくい:匿名であるということは、極端に言えば誰にも利用を知られないということです。たとえば「ローンを借りると住宅ローンの審査に響くかな…」とか「副業の資金調達を会社に知られたくないな…」といった心配も、匿名のP2Pローンなら不要です。借りたお金の使い道も自由ですし、何より利用自体が自分だけの秘密にできるのは、日本人にとって心理的ハードルを下げてくれるでしょう。
このように、ノーKYC(本人確認なし) のP2Pレンディングは、日本のようにプライバシーや控えめさを重んじる文化圏でも利用しやすいサービスと言えます。実際、HodlHodlのLendは「地理的・規制的な制限がなく、世界中の誰もが利用できる純粋なP2P市場」とされています。日本に居ながらグローバルな貸し借りができ、しかも身元明かさずに済む――これは画期的ですね。
Borrow編:HodlHodlのLendでビットコインを担保にお金を借りる方法
それでは具体的に、HodlHodlのLendでどのようにビットコイン担保のローンを借りるのか、手順を追って説明します。初心者でも迷わないよう、シンプルなステップにまとめました。
1. アカウント登録 (Sign up)
まずはHodlHodlのLendサイトにアクセスし、無料のアカウントを作成します。必要なのはメールアドレスとパスワードだけです。登録後、確認メールが届くのでリンクをクリックして認証すれば準備完了。これでプラットフォーム上でオファー(契約希望)を閲覧・作成できるようになります。
※HodlHodlは日本語には対応していませんが、英語のシンプルなUIです。Google翻訳などを使っても良いでしょう。
2. 借りたい条件のオファーを探す or 作成
ログインしたら、「To Borrow(借りる)」のメニューから現在出ている貸し手のオファー一覧を見てみましょう。オファーには借入希望額(例:$1000相当のUSDT)、期間(例:3ヶ月)、金利(例:5%)やLTV(担保価値比率、例:60%)などの条件が書かれています。自分の希望に合うものがあれば選んで詳細画面へ進みます。条件に合うオファーが見つからない場合は、自分で「○○ USDTを△ヶ月、金利○%で借りたい」という借り手オファーを新規作成することも可能です。
用語補足:LTV(ローン・トゥ・バリュー)とはローン額に対する担保価値の割合です。たとえばLTV50%なら、借りたい額の2倍の価値のビットコインを担保に入れる必要があります。LTVは貸し手が設定しており、一般に30%〜70%程度の範囲でオファーが出ています。低いLTVほど借り手は多くのBTC担保が必要ですが、その分だけ貸し手にとって安全なローンとなります。
3. 契約成立とマルチシグ担保のデポジット
借り手・貸し手双方が条件に合意すると契約成立です。HodlHodlプラットフォーム上で自動的に専用のマルチシグ・エスクロー用ビットコインアドレス(担保保管先アドレス)が生成されます。次に、借り手であるあなたは自分のウォレットからビットコインをそのエスクローアドレスに送金します。
- 📌ポイント:マルチシグで安心 – 上述の通り、このエスクロー用アドレスのコインを動かすには3者中2者の署名が必要です。あなた(借り手)は常にそのうちの1つの鍵を保有しています。つまり、自分が承認しない限り担保BTCが勝手に引き出されることはないのでご安心ください。
ビットコインの入金がブロックチェーン上で所定の承認(通常数ブロック程度)を得ると、担保デポジット完了です。これで契約は有効化され、次のステップへ進みます。
4. 貸し手から資金(ステーブルコイン)を受け取る
担保のロックが確認できると、今度は貸し手がローン金額の送金を行います。Lendで借りられるのは主にステーブルコインです。ステーブルコインとは、米ドルなど法定通貨の価値に連動するよう設計された仮想通貨で、USDTやUSDC、DAIといった種類があります。借り手は契約時に受取用のステーブルコインアドレス(自分のウォレットアドレス)を指定しますので、貸し手はそのアドレス宛に契約どおりの額を送金します。例えばUSDTを借りる契約なら、貸し手からあなたのUSDTウォレットにUSDTが送られてきます。
これで晴れて、あなた(借り手)は希望のステーブルコインを手にすることができました! あなたのビットコインは担保としてロックされていますが、期限までに返済すれば取り戻せますので、しばしのお別れです。借りたステーブルコインは自由に使えますので、後述する活用例を参考に有効活用しましょう。
5. 返済(リペイメント)
契約期間中は基本的に何もする必要はありません(途中で追加担保や一部返済を行うことも可能ですが、初心者向け記事では割愛します)。期間が満了するまでに、借りたステーブルコイン+利息を貸し手に返済します。返済も、貸し手の指定するウォレットアドレスにステーブルコインを送金する形で行われます。
- 利息の計算:利息は契約時に決めた率で発生します。例えば年利10%で6ヶ月間$1000を借りたなら、利息は単純計算で$50(=$1000×10%×0.5年)です。契約によっては「期間全体で○%」と定める場合もありますが、プラットフォーム上で年率(APR)換算が表示されます。
期間内であれば任意のタイミングで早期返済することも可能です。返済期限より早く全額返せば、利息もその日数分だけで済みます(※ただし契約によります。事前に契約条件を確認してください)。HodlHodlでは分割返済にも対応しており、例えば月ごとに少しずつ返して最後に完済することもできます。
6. ビットコイン担保の解除(返却)
貸し手があなたからの返済受領を確認すると、プラットフォーム上で契約終了の手続きを行います。マルチシグの担保アドレスからあなたのビットコインを解放(返却)する署名を貸し手とプラットフォームが行い、あなたの元のウォレットにビットコインが送られます。こうして無事に担保のBTCが戻ってくれば、一連のローン取引は完了です🎉。
もし返済が滞った場合はどうなるのでしょうか?その場合、契約で定められた猶予期間やマージンコール(追加担保のお願い)を経た後、担保のビットコインが強制的に貸し手に渡されて契約終了(清算)となります。担保額が未返済額を上回っていれば、差額は借り手に返ってきます。つまり、返せなかったとしても借り手が担保以上の損をすることはありませんが、大切なビットコインを失ってしまう結果にはなるので注意しましょう。
Borrow(借りる)側のまとめ:ビットコインさえあれば、あとの手続きは非常に簡単です。借入までの流れをもう一度簡潔にまとめると:
- メールアドレスでLendに登録
- 借入オファーを探すor作成してマッチング
- マルチシグ契約が自動生成・BTC担保を自分で入金
- 貸し手からステーブルコインを受領
- 期限までにステーブルコイン+利息を返済
- ビットコイン担保が自分のウォレットに戻る
第三者の仲介なしに、ネット上でこれだけのことが完結するのは驚きですよね。HodlHodlは「あなたの条件、あなたの鍵、あなたのコイン」と銘打っており、自分の望む条件で・自分が鍵を管理し・自分の資産を動かせるプラットフォームであることを強調しています。
Lend編:HodlHodlのプラットフォームでお金を貸してみよう
次は逆に、自分が貸し手(Lender)となってステーブルコインを貸し出し、利息収入を得る方法です。銀行に預けても超低金利のこのご時世、手持ちの資金をうまく運用したい方にとってP2Pレンディングは魅力的な選択肢になりえます。HodlHodlのLendなら、これもまた簡単な手順で始められます。
基本的な流れは先ほどの「Borrow編」と鏡写しになっています。
1. アカウント登録
借り手と同様、まずはHodlHodlに登録します(すでに借り手として登録済みなら同じアカウントで貸し手にもなれます)。メールアドレスだけでOK、もちろん貸し手側もKYC不要です。
2. 貸出オファーの確認 or 作成
ログイン後、「To Lend(貸す)」メニューから現在の借り手募集一覧を見ます。各オファーには希望額・期間・支払い利率・LTVなど条件が表示されています。「この条件なら貸してもいいかな」という案件があれば選択しましょう。もし自分の希望する利回りや期間が合わない場合は、自分で貸し手オファーを作成することも可能です。「○○ USDTまで、最長△ヶ月、最低利息◻◻%で貸せます」といった条件を提示できます。プラットフォーム上ではユーザーがお互いに条件を提示しあってマッチングする仕組みなので、金利や期間もすべてユーザー自身が自由に設定できます。
3. マッチングと契約開始
あなたの提示した条件で借りたい人が現れたら契約成立です(逆に誰かの借入オファーに応じる形なら、その時点で成立)。システムがマルチシグの担保用BTCアドレスを生成し、借り手がそこへビットコインをデポジットします。借り手からのBTC入金が確認できるまで、貸し手であるあなたは資金を送る必要はありません。担保が確保されたのを見届けてから次に進みます。
4. 資金(ステーブルコイン)の送金
借り手の担保ロックが完了したら、契約で定めたステーブルコインを借り手へ送金します。送金先アドレスは契約詳細画面に表示されます(借り手が指定済み)。例えばUSDCを貸す契約なら、相手のUSDCアドレスに約束の額を送ります。ここで送金した金額がローンの principal(元本)となり、後ほど利息とともに返ってくるわけです。
無事に相手に届けば、あとは契約期間終了まで待つだけです。あなたは担保のBTCに対して鍵を1つ持っている状態なので、万一トラブルが起きた場合でも担保を引き出す権利を部分的に持っています(詳しくは次ステップ)。
5. 返済の受領
契約期間が終わると、借り手があなたにステーブルコインを返済してくるはずです。約束どおり元本+利息を受け取ったら、それを確認してプラットフォーム上で「返済完了」を操作します。すると担保のビットコインがマルチシグから解放され、借り手に返却されます。これで貸し手としてのあなたは利息分の収益を獲得できました。お疲れ様です!
もし借り手が返済しなかった場合どうなるでしょうか?その場合、所定の猶予期間やマージンコール通知の後、担保のビットコインがあなた(貸し手)に渡されることになります。具体的には、LTVが90%に達するか返済期日から24時間以上滞納が続くと強制清算となり、担保BTCからあなたの貸付相当額が充当されます。担保が十分であれば元本と利息はカバーされ、余剰があれば借り手に返還されます。つまり貸し手側はかなり手厚く保護されており、返済を受け取れない場合でも担保で穴埋めされる仕組みです。
6. 収益を管理・再投資
受け取ったステーブルコイン(元本+利息)は再度プラットフォームで貸し出しても良いですし、他の用途に使ってもOKです。年利に換算するとだいたい10%前後の利回りになる案件が多く見られます。条件次第では更に高い利率の契約も可能ですが、その分借り手が見つかりにくかったりリスク(担保不足のリスク)が高まる可能性もあります。ご自身のリスク許容度に合わせて運用しましょう。
Lend(貸す)側のまとめ:
- HodlHodlに登録(メールアドレスのみ)
- 貸出オファーを提示 or 借り手募集に応じる
- 契約成立後、借り手がBTC担保を入金
- 貸し手(自分)がステーブルコインを送金
- 期限まで待ち、借り手から元本+利息を受領
- 担保BTCを返却し、利息収入を得る
銀行預金では考えられないような利息収入を得られるのが魅力ですが、その裏でビットコイン価格変動リスクも担っています。大暴落が起きて担保評価額が急落すると、清算時に元本を割るリスクもゼロではありません(LTV設定とマージンコール制度で極力保護されまますが)。リスクとリターンを理解した上で、小額から試すことをおすすめします。
ステーブルコインの活用:お金持ちは借金で生活する?
ここまで、ビットコインを手放さずにステーブルコインを手に入れる方法を見てきました。それでは、借りたステーブルコインは具体的に何に使えるのでしょうか?いくつか例を挙げてみましょう。
-
日常の出費に充当:ビットコイン投資家の中には「生活費はすべて借りたお金で賄い、自分のBTCはガチホ(売らずに長期保有)する」という方針の人もいます。例えば毎月の家賃や食費をステーブルコインのローンで支払い(これについても今後詳しく解説していきます)、ビットコインは一切使わないというイメージです。こうすれば、手持ちのBTCを売らずに済むので将来の値上がり益を逃しません。また日本では仮想通貨を売却すると雑所得として高率の税金がかかりますが、ローンで得たお金は借入金なので課税対象になりません(※将来的な税務計算は自己責任で行ってください)。つまり、ビットコインを売却して現金化する代わりにローンを使うことで、節税と資産温存のメリットが得られる可能性があります。
-
投資・資産運用に回す:借りた資金をさらに別の投資に活用することもできます。例えば有望な株式や不動産に投資したり、あるいは他の仮想通貨を買うこともできます。極端な例では、ビットコインを担保にUSDTを借りて、そのUSDTでまた別の仮想通貨を買い、それを運用益で返済する…といった戦略も理論上は可能です。ただし、借りたお金での投機はハイリスクなので慎重に!手堅い使い道としては、事業資金に充てるのも良いでしょう。例えば小さなオンラインビジネスを始めるための元手にしたり、新しい資格取得のための学費にするなど、自分への投資に使えば将来的なリターンでローンを返しつつ利益を上げることが期待できます。
-
急な支払いへの備え:人生何があるか分かりません。医療費や冠婚葬祭など急に現金が必要になる場面もあります。そんなとき、ビットコインをすぐ売ってしまうのは惜しい…という場合にローンで一時的にしのぐことができます。後で落ち着いてから返済すれば、大事なBTCを手放さずにピンチを乗り切れます。言わばデジタル質屋のような感覚で、ビットコインを預けてお金を工面し、後で買い戻す(返済する)イメージですね。日本でも昔から「質屋」で着物や宝石を預けてお金を借りる文化がありましたが、HodlHodl Lendはビットコイン版の質屋とも言えるでしょう。
-
市場の機会を逃さない:仮想通貨市場は変動が激しく、「今これを買いたいのに現金が無い!」というチャンスもあるでしょう。例えば「ビットコインが急落したから買い増したいが、現金が足りない」という場合、手持ちBTCを担保にしてステーブルコインを借り、その急落で安く買い増しする、といった動きもできます。そして後日価格が戻したところで返済すれば、差益を得つつBTC保有枚数も増やせるかもしれません。このようにローンを戦略的に使えば、市場の好機を掴む資金余力を生み出すことができます。ただしハイリスクな手法でもあるため、上級者向けではあります。
ここで覚えておきたいのは、「お金持ちは借金との付き合い方が上手い」という点です。日本では借金にネガティブな印象を持つ人も多いですが、世界的な資産家や大企業はしばしばあえて借金をして手元資金を他に活用しています。アメリカのベストセラー『金持ち父さん貧乏父さん』で有名なロバート・キヨサキ氏も「富裕層は他人のお金(借金)を利用してさらに富を築く」と強調しています。例えば彼は借金で高級車を買い、不動産投資にも借入を活用したそう (金持ちは貧乏人より借金が多い | 「金持ち父さん 貧乏父さん」日本オフィシャルサイト)❤️。借金を味方につけて資産運用すれば、自分の持ち出し資金を抑えつつ豊かな生活を実現できる可能性があります。
もちろん無計画な借金は禁物ですが、ローンを上手に使うことは決して悪いことではなく、むしろ経済的戦略として有効なのです。ビットコイン担保ローンはその新しい選択肢として、「お金にお金に働いてもらう」感覚を身につけるきっかけになるかもしれません。
高い金利でもローンを利用するのはなぜ?その理由と戦略
Lendのプラットフォームで提示される金利は、年利換算で見ると10〜15%程度が一つの目安 です。中にはそれ以上の利率の契約もあります。日本の銀行ローン(金利数%以下)と比べるとかなり高利に思えますが、それでも多くの人がこのサービスを利用してローンを組んでいます。なぜ高い利息を支払ってまで借りる価値があるのでしょうか?最後に、その理由と利用者の戦略について考えてみましょう。
-
(1) ビットコインの期待リターンが高い:借り手にとって一番の動機は、「ビットコインは将来もっと値上がりするはずだから、多少利息を払っても売りたくない」というものです。例えば年利15%で$1000借りると一年後に$1150返す必要がありますが、もしビットコイン価格がその間に15%以上上昇すれば、利息分を差し引いても得をする計算になります。過去のビットコイン相場は年率ベースで大きく成長した年も多く、強気のホルダーほど利息より値上がり益を優先する傾向があります。「金利よりビットコインの価値上昇のほうが大きい」という自信が、高金利を払ってでも借りる動機になっているのです。
-
(2) 課税や手数料の回避:先ほど述べたように、日本ではビットコインを売却すると高額の税金が発生する可能性があります。仮に30%〜50%の税金がかかるのであれば、年利10%前後のローンで済ませたほうがトクだという判断も成り立ちます。また、取引所で売却するときのスプレッドや出金手数料なども考えると、売却コストを回避する手段としてローンを選ぶ人もいます。要するに「売るくらいなら借りた方がマシ」という考え方ですね。
-
(3) 自由と速さを優先:従来の金融機関からお金を借りるには時間がかかりますし、使途にも制限があることが多いです(事業資金なのか生活費なのか、といった審査があります)。それに対してHodlHodlのP2Pローンは使い道自由・即日資金調達が可能です。利息が高めでも「今すぐ○○がしたい」「明日までに現金が要る」といったニーズには代えられません。特に仮想通貨業界はスピード命ですから、チャンスを逃さないために高コストでも素早く借りるという選択が生まれます。
-
(4) 借金=時間を買うこと:あるユーザーの言葉を借りれば、「借金をすることは未来の時間を先取りすること」でもあります。例えば住宅ローンがあるからこそ若い世代でもマイホームに住めますし、事業ローンがあるからこそ企業は成長の機会を掴めます。ビットコイン担保ローンも同じで、「今はお金が無いけど将来増やすアテはある。だから今借りてしまおう」というケースもあるでしょう。将来の収入や資産増加を見込んで、時間を味方につけるためにあえて借金をするのです。日本語では「借金してでも◯◯する」という表現がありますが、前向きな借金は将来への投資とも言えるでしょう。
-
(5) 非中央集権への支持:もう一つ見逃せないのは、HodlHodlのようなプラットフォームを利用する理由に思想的な支持があります。つまり「銀行や政府に頼らないお金の流れを実現したい」「ビットコインのエコシステムを活性化させたい」というビットコイナーたちです。多少コストが高くても、理念に共感して使っているケースもあります。匿名で自由にお金を借りられる世界を体験することで、金融システムの新たな可能性を感じているのです。
以上のように、高い金利にも関わらずローンを利用するのは明確なメリットや戦略があるからなのです。もちろん全ての人に当てはまるわけではありません。ビットコイン価格が下落局面ではリスクも伴いますし、利息分だけ損になる場合もあります。しかし、それらを理解した上で「自分のお金を働かせる」「資産を手放さずレバレッジを利かせる」手段として活用している人々が増えてきています。
最後に、HodlHodlの公式ブログの一文をご紹介します。
“私たちはビットコインこそがスーパーカ collateral(超優秀な担保)であり、利回りを得るために使うのではなく、それを担保に資金を借りるために使われるべきだと考えています" (The lending is dead, long live the lending | by Hodl Hodl | Hodl Hodl | Medium)。
ビットコイン時代の新しいお金の借り方・貸し方であるP2Pローン。最初は難しく感じるかもしれませんが、仕組みを理解すればとてもシンプルで強力なツールです。日本ではまだ馴染みが薄いかもしれませんが、匿名性を好み、コツコツ資産を増やすのが得意な人にこそフィットするサービスかもしれません。ぜひ少額から試し、自分なりの活用法を見つけてみてください。きっと新たな発見があるはずです。
もしビットコイン担保のP2Pローンなどについてもっと深く知りたい、あるいは個別に相談してみたいと思えば、どうぞお気軽にご連絡ください。1対1のコンサルティングも承っています。
サービスには決まった料金はありませんが、ご相談を通じて「役に立った」と思い、お悩みや疑問を解決できたと感じていただけたら、「3つのT」でのご支援(Value for Value)をぜひご検討ください:
- 時間(Time):この記事をSNSなどでシェアしていただくこと。
- 才能(Talent):コメントや補足情報などを通じて知識を共有していただくこと。
- 宝(Treasure):世界で最も健全なお金、ビットコインの最小単位「sats」でのご支援。
もちろん、支援の有無にかかわらず、お力になれればとても嬉しいです。 では、また次回!
-
-
@ 06830f6c:34da40c5
2025-03-30 03:56:17Once upon a time their lived a young man in a lost village, I'm just kidding with you, I'm testing my blog entries on my domain. SITE
Navigate to Blogs tab and screenshot this. @ me for a chance to get zapped ⚡. I won't say how many sats, so you are not doing it due to the incentive but to help me test the domain functionality.
Love ✌️
-
@ 8671a6e5:f88194d1
2025-03-29 17:58:33A flash of inspiration
Sometimes the mind takes you to strange places. The other day, I stumbled across Madonna’s “Vogue” video, you know “strike a pose” and all that jazz, and it got me thinking. Not about her music (which, let’s be honest, hasn’t aged as gracefully as her PR team might hope), but about Michael Saylor and Bitcoin.
Bear with me here, there’s a connection there. Madonna built an empire and her iconic name on catchy tunes and reinvention, even if her catalog feels a bit thin these days. Saylor? He’s doing something similar—taking an old act, dusting it off, and teaching it a new trick. Only instead of a microphone, he’s wielding Bitcoin, and Wall Street’s playing the role of the music industry, propping up the star despite a shaky back catalog (his initial business software).
Old school meets new moves
Think of Saylor as that veteran artist who’s been around for a few decades and think of bitcoin as a new style of music, a genre or a gimmick that’s popular with the kids. Old music stars sooner or later pick up on that, and even bring people in to do a cross-over song, a mix or god forbid, a duet.
MicroStrategy, his software company, was never a top hit scoring machine. More of a album full of B-sides that faded into obscurity (for those who don’t know, look up what a B-side song was). But then he stumbled onto Bitcoin, the shiny new genre that’s got the attention and attracted people because of the underlying asset (our tunes are here to stay).
It’s not just a pivot; it’s a reinvention. Like an aging pop star learning to rap, Saylor’s taken his old-school business and remixed it into something attracting a decent audience at conferences for example. Like Madonna or the former Prince fulling arenas. He’s voguing alright; with bold moves, big loans, the support of his own music industry and a spotlight for his (sometimes Madonna lyrics like) ramblings.
The Saylor trick: a ray of light on bitcoin
Here’s the play: Saylor’s turned MicroStrategy into a Bitcoin hoarding machine. Forget software licenses; his game is borrowing billions—through corporate bonds and stock sales, only to buy and hold Bitcoin. Bitcoin will outshine gold, bonds, even the S&P 500, Saylor says. It’s a gamble, an honorable one if you’re a bitcoiner, but it’s dressed up as a vision, and it’s got a self-fulfilling prophecy in it. Not only that, such a prophecy can only fully come to fruition if he’s not the only buyer of last resort of any significance. A music industry isn’t a real industry if there was only Madonna dancing on stage as the only mainstream artist.
We had Prince, Michael Jackson, Taylor Swift, Bruno Mars or Dua Lipa and hundreds of other artists over time, vying for your money, attention span, and streaming minutes. The more Strategy buys, the more the Bitcoin crowd cheers, the higher the price climbs, and the more attention he gets. Speaking gigs, headlines, cult status—it’s a win-win, at least on paper. Strike the pose, indeed.
The McDonald’s trick: value under the surface
It’s not the first time Michael Saylro remixes a tape from another artist so to speak. Let’s pivot to McDonald’s for a second, because there’s a parallel here. You think Big Macs when you think McDonald’s, but their real value hustle is actually real estate.
They own prime land, lease it to franchisees, and rake in rent—billions of it. The burgers? Just a tasty front for a property empire. Saylor’s pulling a similar move, but instead of buildings, his asset is Bitcoin. MicroStrategy’s software gig is the fries on the side — nice to have, but not the main course. He’s borrowing against the future value of BTC, betting it’ll keep climbing, just like McDonald’s banks on steady foot traffic and picking strategic (pun intended) locations. The difference? McDonald’s has a fallback if real estate tanks. Saylor’s all-in on bitcoin. (So far so good, if there’s one thing to go all-in on, it’s bitcoin anyway). That on itself is not an issue. But it’s important to know that the “location” is the asset for some while bitcoin is the “asset” for Strategy. Mc Donald’s assets are easy to spot: there are restaurants all over the place. Madonna’s concerts are also easy to spot: they sell out arenas left and right. Strategy’s bitcoin asset is less easy to spot, as we can’t see them, neither can we verify them. More on that later.
The hybrid star: Madonna meets McDonald’s
So, picture this: Saylor’s a cross between Madonna and a fast-food landlord. He’s the aging music icon who’s learned a flashy new dance, but underneath the glitter, he’s running a McDonald’s-style value play. It’s brilliant, in a way. Bitcoin’s scarcity fuels the hype, and his borrowing keeps the show on the road. Madonna’s legacy still sells records her name holds value, and McDonald’s can lean on its food business and brand, if the property game stumbles they can easily pivot back to basics and earn like they’ve always done on selling food and franchise income/licensing. Saylor? His software arm’s is rather dismal. If Bitcoin falters, there’s no encore that can him.a flash of inspiration
Sometimes the mind takes you to strange places. The other day, I stumbled across Madonna’s “Vogue” video, you know “strike a pose” and all that jazz, and it got me thinking. Not about her music (which, let’s be honest, hasn’t aged as gracefully as her PR team might hope), but about Michael Saylor and Bitcoin.\ \ Bear with me here, there’s a connection there. Madonna built an empire and her iconic name on catchy tunes and reinvention, even if her catalog feels a bit thin these days.\ Saylor? He’s doing something similar—taking an old act, dusting it off, and teaching it a new trick. Only instead of a microphone, he’s wielding Bitcoin, and Wall Street’s playing the role of the music industry, propping up the star despite a shaky back catalog (his initial business software).
Old school meets new moves
Think of Saylor as that veteran artist who’s been around for a few decades and think of bitcoin as a new style of music, a genre or a gimmick that’s popular with the kids. Old music stars sooner or later pick up on that, and even bring people in to do a cross-over song, a mix or god forbid, a duet.
MicroStrategy, his software company, was never a top hit scoring machine. More of a album full of B-sides that faded into obscurity (for those who don’t know, look up what a B-side song was).\ But then he stumbled onto Bitcoin, the shiny new genre that’s got the attention and attracted people because of the underlying asset (our tunes are here to stay).\ \ It’s not just a pivot; it’s a reinvention. Like an aging pop star learning to rap, Saylor’s taken his old-school business and remixed it into something attracting a decent audience at conferences for example. Like Madonna or the former Prince fulling arenas.\ He’s voguing alright; with bold moves, big loans, the support of his own music industry and a spotlight for his (sometimes Madonna lyrics like) ramblings.
*The Saylor trick: a ray of light on bitcoin* \ Here’s the play: Saylor’s turned MicroStrategy into a Bitcoin hoarding machine. Forget software licenses; his game is borrowing billions—through corporate bonds and stock sales, only to buy and hold Bitcoin. Bitcoin will outshine gold, bonds, even the S&P 500, Saylor says.\ It’s a gamble, an honorable one if you’re a bitcoiner, but it’s dressed up as a vision, and it’s got a self-fulfilling prophecy in it. Not only that, such a prophecy can only fully come to fruition if he’s not the only buyer of last resort of any significance. A music industry isn’t a real industry if there was only Madonna dancing on stage as the only mainstream artist.\ \ We had Prince, Michael Jackson, Taylor Swift, Bruno Mars or Dua Lipa and hundreds of other artists over time, vying for your money, attention span, and streaming minutes.\ The more Strategy buys, the more the Bitcoin crowd cheers, the higher the price climbs, and the more attention he gets. Speaking gigs, headlines, cult status—it’s a win-win, at least on paper. Strike the pose, indeed.
*The McDonald’s trick: value under the surface* \ It’s not the first time Michael Saylro remixes a tape from another artist so to speak.\ Let’s pivot to McDonald’s for a second, because there’s a parallel here. You think Big Macs when you think McDonald’s, but their real value hustle is actually real estate.
They own prime land, lease it to franchisees, and rake in rent—billions of it. The burgers? Just a tasty front for a property empire. Saylor’s pulling a similar move, but instead of buildings, his asset is Bitcoin.\ MicroStrategy’s software gig is the fries on the side — nice to have, but not the main course. He’s borrowing against the future value of BTC, betting it’ll keep climbing, just like McDonald’s banks on steady foot traffic and picking strategic (pun intended) locations.\ The difference? McDonald’s has a fallback if real estate tanks. Saylor’s all-in on bitcoin. (So far so good, if there’s one thing to go all-in on, it’s bitcoin anyway). That on itself is not an issue. But it’s important to know that the “location” is the asset for some while bitcoin is the “asset” for Strategy.\ Mc Donald’s assets are easy to spot: there are restaurants all over the place. Madonna’s concerts are also easy to spot: they sell out arenas left and right.\ Strategy’s bitcoin asset is less easy to spot, as we can’t see them, neither can we verify them. More on that later.
The hybrid star: Madonna meets McDonald’s
So, picture this: Saylor’s a cross between Madonna and a fast-food landlord. He’s the aging music icon who’s learned a flashy new dance, but underneath the glitter, he’s running a McDonald’s-style value play.\ It’s brilliant, in a way. Bitcoin’s scarcity fuels the hype, and his borrowing keeps the show on the road.\ Madonna’s legacy still sells records her name holds value, and McDonald’s can lean on its food business and brand, if the property game stumbles they can easily pivot back to basics and earn like they’ve always done on selling food and franchise income/licensing.\ Saylor? His software arm’s is rather dismal. If Bitcoin falters, there’s no encore that can him.
The music’s made in-house
Michael Saylor’s strategy with Strategy, is a bold, all-in bet on Bitcoin as the ultimate store of value. Essentially combining what Mc Donald’s does with the strong believe in bitcoin’s future (and fueling that believe with the fitting rhetoric).
It works like this: Since August 2020, Saylor’s company has been buying up more and more Bitcoin, making it their main asset instead of traditional cash or investments, and by March 2025, they own 506,137 BTC—worth about $42.8 billion (at $84,000 per Bitcoin). This, after spending $33.7 billion to buy it over time (DCA), including a massive 218887 BTC purchase late 2024 for $20.5 billion, giving them over 2.41% of all Bitcoin ever to exist (way more than companies like Marathon, Coinbase, Tesla or Riot).
To pull this off, they’ve borrowed heavily: owing $7.2 billion, mostly to Wall Street investors through special IOUs1 called convertible notes, which don’t need to be paid back until 2027, through 2029. These can either be settled with cash or swapped for Strategy stock. (there lies one of the main issues in my opinion, as the main asset’s price in USD is directly impacting the stock price of MSTR). A small example of this repeated correlation happened on March 28, 2025 when Strategy’s stock (MSTR) dropped 10.8% from $324.59 to $289.41, which was mirroring Bitcoin’s move down from $85,000 to $82,000 earlier.
This debt they have can be called “risky” by any stretch, with a high leverage rate of 39-40%, meaning they’ve borrowed a big chunk compared to what they own outright, but here’s the genius of it: they don’t have to sell their Bitcoin if its price drops, and they can refinance (borrow more later) to keep the dance going. As long as they find investors willing to bet on the later bitcoin price surge, but more importantly, as long as the song is liked by the new audience. If Michael Saylor is our “Madonna”, then there’s still not Taylor Swift or Rihanna in sight.
The creditors (big players, not banks) win if Bitcoin soars, as Strategy’s huge stash (potentially 2.9%+ of the market) nets them massive profits, or even if it crashes, they’re still in the game with other ways to make profit (not on bitcoin), since they can afford the risk. If someone is willing to bet 4 to 8 billion dollars, they’re probably not spooked by losing it all. More so, these Wall Streat people in the correct entourage, can probably afford such a gamble, and can stomach to lose it all if something goes horribly wrong as well, instead of risking being left out of a growing market. But since they’re probably the same people steering and “owning” the USD market anyway, they’re just conquering positions in a new market. The fact that they’re not real bitcoin-ethos people, but just “suits” in finance, can make the suspicious bitcoiners watching all of this unfold, even more uneasy.
So, Strategy sits on $44 billion in Bitcoin with just $7.2 billion in debt, voguing confidently. And Saylor’s betting the song never gets old, he’ll do the B-sides and re-mastering his old albums if necessary, but if Bitcoin’s value ever fades (for whatever reason), the real question is how long they can keep striking poses before the music stops. Remember: all money (fiat, gold, silver, bitcoin, nicely made papers) is a matter of trust.
As I have trust in bitcoin itself, but not so much in Strategy, I’ve take some precautions. I've started my own sort of "Strategy crash fund", with fiat money that only will come into action when strategy is done. The crash that we'll see after that goes down, will be such a tremendous opportunity, that I'll pour in some more fiat, gladly, and that will be the exact moment I will actually “sell all my chairs” (from Saylor’s well-known quote).
Purchases
Strategy’s Bitcoin purchases, don’t seem to jolt the market much either, no matter the size of the order. They always have the same sound: “it’s OTC, it doesn’t impact the market that much”.
Still, it’s strange to see: no one has ever come forward to tell anyone “I’ve sold 15000 bitcoin from my old stack to Saylor”, neither do we see any clear evidence and on-chain moves.
Take their first buy in August 2020 for example. Totaling 21454 BTC for $250 million at $11,652 per BTC; Bitcoin sat at $11,500 to $11,700 so barely moved, inching to $12,000 weeks later due to broader trends.
Same story in December 2020 with 29646 BTC for $650 million, there, the price hopped from $19,000 to $23,000, but a bull market was already raging. Fast forward to February 2021 (19452 BTC, for $1.026 billion (!)), March 2024 (9245 BTC, $623 million), November 2024 (55500 BTC, $5.4 billion), and March 2025 (6911 BTC, $584.1 million)
Bitcoin wobbled 2-15%, but always in line with existing momentum, not Strategy’s announcements. Their biggest buy, for a total of $5.4 billion (!) is just 0.3% of Bitcoin’s $1.7 trillion market cap, it’s too small to register as a blip even. But compared to the liquidity on the market and the “availability” on the OTC market, it should. More so, OTC bitcoin is announced as “for sale” somehow. A person with +25000 bitcoin is not standing on the side of the street yelling “hey man, wanna buy some bitcoin?”. There are specialized firms doing that for them, and making these available. This date is also used by some insiders and people who know this very small market (there aren’t that many bitcoiners sitting on such an amount after 2024 I guess). Data from Binance OTC, Coinspaid, kraken OTC, is highly private of course, but still, anything being sold over there, to Strategy or anyone else, would take larger amounts off the open market and the OTC market, making a price impact, certainly withing 2 years, as Bitcoin mining companies sit on an average buffer of 6 months depending on market conditions.
Strategy funds all of this by selling shares (diluting the pool big-time) or issuing convertible notes, and while SEC filings make faking these buys near-impossible. And even if Saylor is the Bitcoin version of Bernie Madoff, he could get away with it, if enough people "in the know" are willing to support this way of infesting (and investing in) the bitcoin economy. This would have to be a clear orchestrated attack on bitcoin, purely on the financial level then.
I don't believe this to be the case, but mathematically we have to take it into account as a very slight possibility.
After all, a company like "WorldCom"2 managed to scam their way out of different audits for years, until the scheme got bust and a enormous amount of investors lost their money after their CEO went to jail3 for exchange fraud.
I believe this could be the case with Strategy, but I give it a 3% chance (this might be low, but it's there, we can't outright dismiss the possibility).
Water in the wine
Strategy has also massively diluted its stock to fund Bitcoin buys, jumping from 10 million shares in 2020 to about 285 million by March 2025—a 2,750% increase, this happened after raising $4.25 billion from 2020 onwards and $20 billion of their $42 billion "21/21 Plan" by early 2025.
After the 10-for-1 stock split in August 2024, the number of MSTR shares grew from 16.5 million in 2023 to 284898 by end of 2024, a 1625% rise !!!. Add to that about 275 million more shares added in total (including 120 million in 2024 alone) and 1.975 million extra in March 2025 for $592.6 million.
So more and more tap water is poured in the wine, and it means each share’s ownership slice shrinks as new shares flood in, mostly via "at-the-market" sales and convertible note conversions. This is partly offset by share splits, but still, the rise in the number of stock is significant, and a big factor in evaluating MSTR.
In December 2024, they proposed hiking authorized shares to 10.33 billion (plus 1 billion preferred), approved in January 2025, setting the stage for even more if they keep selling.
The trend is clear: relentless selling. They might say “we never sell bitcoin”, but the same doesn’t count for their shares… which derive their value from bitcoin’s fiat price. So shareholders are betting on Bitcoin’s rise to offset the watering down of the share they hold. The more you think of it, the more ludicrous it sounds. It’s a loop of trust where the stock itself can only thrive if the company itself is an active, useful middleman. And so far, it’s only doing so for other Wall street companies, the biggest holders of MSTR shares:
Vanguard Group Inc, BlackRock, Capital International Investors, Jane Street Group, Susquehanna International Group
This on itself is also “normal” of course. In the flow of things. Like every aspect by itself in the whole Strategy setup is just normal. But combining all the factors makes it look a bit more… suspicious to me.
Supporting bitcoin ?
The real head-scratcher comes next: their secrecy and lack of community involvement. Strategy claims to hold 506137 BTC, likely cold-stored with partners like BitGo or Coinbase Custody, but no public wallet addresses back these claims up. Odd for a firm swearing never to sell.
There’s also the real risk that these partners are partly selling paper bitcoin (bitcoin they don't hold the keys to, or "promised" bitcoin) to Strategy, and that they just assume everything is audited and OK.
We can't estimate that, since we don't have any public MicroStrategy addresses or other ways to look at their holdings. This is for security reasons apparently, which raises another question: If they for example would show 300k+ BTC on-chain as proof, it’d boost trust, yet they don’t, hinting at a bigger play — maybe as a Wall Street-backed buyer of last resort for a new asset class.
Also Strategy’s software business and bitcoin “apps” (like the super simple Lightning email integration, and an on-chain digital ID system) is underwhelming to say the least (I literally know people that code such stuff on a free afternoon while they’re cooking dinner).
Their very minimal software innovation for the Bitcoin space, with basic Lightning features and an on-chain ID system, failing their their valuation as a 'Bitcoin company' in my opinion. More so, their business is ignoring the other innovation that would help bitcoin thrive. This is kind of a red flag for me. Why would a company sitting on +500 k bitcoin be hesitant about supporting the bitcoin eco-system more actively? They sure have the funds to do so, right? And they also have the right insights, info and spirit. Yet, they don’t.
They don’t fund developers for open-source projects, or Bitcoin’s growth in general (not publicly at least). So Saylor shines in talks, hyping Bitcoin’s future and Strategy’s stock, but it’s all the self fulfilling prophecy.
No grants, no real support for the community they lean on. It’s like they’re dancing to Bitcoin’s mixtape, raking in the spotlight, while giving little back. All the while some extremely needed projects lack funding, and most software companies in bitcoin who wish to innovate are begging and scraping funds together, in order to stay afloat. Something’s not ok with that. I can’t understand a company with that much power and money being part of this movement and loving bitcoin, while not actively supporting the development or the maintainers of the bitcoin software. (and yes, to keep their independence it’s best to keep it that way, that’s also an argument, but even then, giving out a grant to anyone that’s crucial in this industry, might help the whole ecosystem).
The show must go on—for now
The whole Strategy setup feels more and more like a performance to me. Saylor’s the star, doing the moves and Wall Street’s the record label, and we’re the audience, captivated by the spectacle and paying to see the show on occasion.
The suits keep funding him (free money, IOUs), just like the music industry props up a fading diva with a limited repertoire or drags a new star from her home studio on YouTube into the spotlights. H Saylor’s 21/21 Plan to the amount of $42 billion to snatch up more Bitcoin can be a grand finale that’s dazzling while the lights stay on.
Prediction: the music stops eventually
Here’s my take: Bitcoin will keep rising over a long period of time, and Saylor’s gambit will look like a genius move, until it doesn’t. All it takes is one big shot in Wall Street to find another shiny toy to play with, or another play to get their money working. The billions they’ve invested, will come back eventually, and if it doesn’t, it will mean the world has changed in their advantage as well in another way. Some people cannot lose, no matter what. Saylor’s now part of that, doing their bidding and doing his part for educating the other businesses.
He’s the only big buyer of last resort in this game so far. No one else is piling in with billions like he is. When the hype cools or the debt catches up, he’s got no real business to fall back on. The software? A relic. The Bitcoin bet can save him if the time is right, we’ll see about that. Time is his enemy not ally, and it always wins in the end. The pose can only hold so long. You can’t keep scoring free fiat, without either die on low valuation and dilution, or without at least 20 other Strategy-grade businesses jumping in to take their piece of the pie. So far, surprisingly, none of these two things happen. He keeps getting free fiat from Wall Street investors, and no other Saylor stands up. This can’t last forever. One of the two will happen by end of 2025.
Curtain call
Saylor’s a fascinating watch, a mix of investor-backed bravado, brains, and borrowed billions. Is it a masterstroke or a bitcoin version of Worldcom? I’m not sure. In any case, I would only invest in MSTR myself if the company has a real added value for bitcoin development and the bitcoin ecosystem. They could be the engine, the spirit, the core of bitcoin. Yet they’re just doing the poses. Let your body move to the rhythm.
AVB
If you like : tip here / other writings
1 https://en.wikipedia.org/wiki/IOU
2 https://sc.edu/about/offices_and_divisions/audit_and_advisory_services/about/news/2021/worldcom_scandal.php
3 https://content.next.westlaw.com/Document/Ic6b4dd91644311dbbe1cf2d29fe2afe6/View/FullText.html?transitionType=Default&contextData=(sc.Default)#:\~:text=Rep.-,6,Criminal%20ChargesThe music’s made in-house
Michael Saylor’s strategy with Strategy, is a bold, all-in bet on Bitcoin as the ultimate store of value. Essentially combining what Mc Donald’s does with the strong believe in bitcoin’s future (and fueling that believe with the fitting rhetoric).\ \ It works like this: Since August 2020, Saylor’s company has been buying up more and more Bitcoin, making it their main asset instead of traditional cash or investments, and by March 2025, they own 506,137 BTC—worth about $42.8 billion (at $84,000 per Bitcoin).\ This, after spending $33.7 billion to buy it over time (DCA), including a massive 218887 BTC purchase late 2024 for $20.5 billion, giving them over 2.41% of all Bitcoin ever to exist (way more than companies like Marathon, Coinbase, Tesla or Riot).\ \ To pull this off, they’ve borrowed heavily: owing $7.2 billion, mostly to Wall Street investors through special IOUs1 called convertible notes, which don’t need to be paid back until 2027, through 2029. These can either be settled with cash or swapped for Strategy stock. (there lies one of the main issues in my opinion, as the main asset’s price in USD is directly impacting the stock price of MSTR).\ A small example of this repeated correlation happened on March 28, 2025 when Strategy’s stock (MSTR) dropped 10.8% from $324.59 to $289.41, which was mirroring Bitcoin’s move down from $85,000 to $82,000 earlier.
This debt they have can be called “risky” by any stretch, with a high leverage rate of 39-40%, meaning they’ve borrowed a big chunk compared to what they own outright, but here’s the genius of it: they don’t have to sell their Bitcoin if its price drops, and they can refinance (borrow more later) to keep the dance going. As long as they find investors willing to bet on the later bitcoin price surge, but more importantly, as long as the song is liked by the new audience. If Michael Saylor is our “Madonna”, then there’s still not Taylor Swift or Rihanna in sight.
The creditors (big players, not banks) win if Bitcoin soars, as Strategy’s huge stash (potentially 2.9%+ of the market) nets them massive profits, or even if it crashes, they’re still in the game with other ways to make profit (not on bitcoin), since they can afford the risk. If someone is willing to bet 4 to 8 billion dollars, they’re probably not spooked by losing it all. More so, these Wall Streat people in the correct entourage, can probably afford such a gamble, and can stomach to lose it all if something goes horribly wrong as well, instead of risking being left out of a growing market. But since they’re probably the same people steering and “owning” the USD market anyway, they’re just conquering positions in a new market. The fact that they’re not real bitcoin-ethos people, but just “suits” in finance, can make the suspicious bitcoiners watching all of this unfold, even more uneasy.\ \ So, Strategy sits on $44 billion in Bitcoin with just $7.2 billion in debt, voguing confidently. And Saylor’s betting the song never gets old, he’ll do the B-sides and re-mastering his old albums if necessary, but if Bitcoin’s value ever fades (for whatever reason), the real question is how long they can keep striking poses before the music stops. Remember: all money (fiat, gold, silver, bitcoin, nicely made papers) is a matter of trust.
As I have trust in bitcoin itself, but not so much in Strategy, I’ve take some precautions.\ I've started my own sort of "Strategy crash fund", with fiat money that only will come into action when strategy is done. The crash that we'll see after that goes down, will be such a tremendous opportunity, that I'll pour in some more fiat, gladly, and that will be the exact moment I will actually “sell all my chairs” (from Saylor’s well-known quote).
Purchases
Strategy’s Bitcoin purchases, don’t seem to jolt the market much either, no matter the size of the order. They always have the same sound: “it’s OTC, it doesn’t impact the market that much”.\ \ Still, it’s strange to see: no one has ever come forward to tell anyone “I’ve sold 15000 bitcoin from my old stack to Saylor”, neither do we see any clear evidence and on-chain moves.\ \ Take their first buy in August 2020 for example. Totaling 21454 BTC for $250 million at $11,652 per BTC; Bitcoin sat at $11,500 to $11,700 so barely moved, inching to $12,000 weeks later due to broader trends.
Same story in December 2020 with 29646 BTC for $650 million, there, the price hopped from $19,000 to $23,000, but a bull market was already raging.\ Fast forward to February 2021 (19452 BTC, for $1.026 billion (!)), March 2024 (9245 BTC, $623 million), November 2024 (55500 BTC, $5.4 billion), and March 2025 (6911 BTC, $584.1 million)\ \ Bitcoin wobbled 2-15%, but always in line with existing momentum, not Strategy’s announcements. Their biggest buy, for a total of $5.4 billion (!) is just 0.3% of Bitcoin’s $1.7 trillion market cap, it’s too small to register as a blip even. But compared to the liquidity on the market and the “availability” on the OTC market, it should.\ More so, OTC bitcoin is announced as “for sale” somehow. A person with +25000 bitcoin is not standing on the side of the street yelling “hey man, wanna buy some bitcoin?”. There are specialized firms doing that for them, and making these available. This date is also used by some insiders and people who know this very small market (there aren’t that many bitcoiners sitting on such an amount after 2024 I guess). Data from Binance OTC, Coinspaid, kraken OTC, is highly private of course, but still, anything being sold over there, to Strategy or anyone else, would take larger amounts off the open market and the OTC market, making a price impact, certainly withing 2 years, as Bitcoin mining companies sit on an average buffer of 6 months depending on market conditions.\ \ Strategy funds all of this by selling shares (diluting the pool big-time) or issuing convertible notes, and while SEC filings make faking these buys near-impossible. And even if Saylor is the Bitcoin version of Bernie Madoff, he could get away with it, if enough people "in the know" are willing to support this way of infesting (and investing in) the bitcoin economy. This would have to be a clear orchestrated attack on bitcoin, purely on the financial level then.
I don't believe this to be the case, but mathematically we have to take it into account as a very slight possibility.
After all, a company like "WorldCom"2 managed to scam their way out of different audits for years, until the scheme got bust and a enormous amount of investors lost their money after their CEO went to jail3 for exchange fraud.
I believe this could be the case with Strategy, but I give it a 3% chance (this might be low, but it's there, we can't outright dismiss the possibility).
Water in the wine
Strategy has also massively diluted its stock to fund Bitcoin buys, jumping from 10 million shares in 2020 to about 285 million by March 2025—a 2,750% increase, this happened after raising $4.25 billion from 2020 onwards and $20 billion of their $42 billion "21/21 Plan" by early 2025.\ \ After the 10-for-1 stock split in August 2024, the number of MSTR shares grew from 16.5 million in 2023 to 284898 by end of 2024, a 1625% rise !!!. Add to that about 275 million more shares added in total (including 120 million in 2024 alone) and 1.975 million extra in March 2025 for $592.6 million.\ \ So more and more tap water is poured in the wine, and it means each share’s ownership slice shrinks as new shares flood in, mostly via "at-the-market" sales and convertible note conversions.\ This is partly offset by share splits, but still, the rise in the number of stock is significant, and a big factor in evaluating MSTR.\ \ In December 2024, they proposed hiking authorized shares to 10.33 billion (plus 1 billion preferred), approved in January 2025, setting the stage for even more if they keep selling.\ \ The trend is clear: relentless selling.\ They might say “we never sell bitcoin”, but the same doesn’t count for their shares… which derive their value from bitcoin’s fiat price.\ So shareholders are betting on Bitcoin’s rise to offset the watering down of the share they hold. The more you think of it, the more ludicrous it sounds. It’s a loop of trust where the stock itself can only thrive if the company itself is an active, useful middleman.\ And so far, it’s only doing so for other Wall street companies, the biggest holders of MSTR shares:
Vanguard Group Inc, BlackRock, Capital International Investors, Jane Street Group, Susquehanna International Group\ \ This on itself is also “normal” of course. In the flow of things.\ Like every aspect by itself in the whole Strategy setup is just normal. But combining all the factors makes it look a bit more… suspicious to me.
Supporting bitcoin ?
The real head-scratcher comes next: their secrecy and lack of community involvement.\ Strategy claims to hold 506137 BTC, likely cold-stored with partners like BitGo or Coinbase Custody, but no public wallet addresses back these claims up. Odd for a firm swearing never to sell.
There’s also the real risk that these partners are partly selling paper bitcoin (bitcoin they don't hold the keys to, or "promised" bitcoin) to Strategy, and that they just assume everything is audited and OK.
We can't estimate that, since we don't have any public MicroStrategy addresses or other ways to look at their holdings. This is for security reasons apparently, which raises another question:\ If they for example would show 300k+ BTC on-chain as proof, it’d boost trust, yet they don’t, hinting at a bigger play — maybe as a Wall Street-backed buyer of last resort for a new asset class.
Also Strategy’s software business and bitcoin “apps” (like the super simple Lightning email integration, and an on-chain digital ID system) is underwhelming to say the least (I literally know people that code such stuff on a free afternoon while they’re cooking dinner).
Their very minimal software innovation for the Bitcoin space, with basic Lightning features and an on-chain ID system, failing their their valuation as a 'Bitcoin company' in my opinion. More so, their business is ignoring the other innovation that would help bitcoin thrive. This is kind of a red flag for me.\ Why would a company sitting on +500 k bitcoin be hesitant about supporting the bitcoin eco-system more actively? They sure have the funds to do so, right? And they also have the right insights, info and spirit.\ Yet, they don’t.\ \ They don’t fund developers for open-source projects, or Bitcoin’s growth in general (not publicly at least). So Saylor shines in talks, hyping Bitcoin’s future and Strategy’s stock, but it’s all the self fulfilling prophecy.\ \ No grants, no real support for the community they lean on.\ It’s like they’re dancing to Bitcoin’s mixtape, raking in the spotlight, while giving little back. All the while some extremely needed projects lack funding, and most software companies in bitcoin who wish to innovate are begging and scraping funds together, in order to stay afloat.\ Something’s not ok with that.\ I can’t understand a company with that much power and money being part of this movement and loving bitcoin, while not actively supporting the development or the maintainers of the bitcoin software. (and yes, to keep their independence it’s best to keep it that way, that’s also an argument, but even then, giving out a grant to anyone that’s crucial in this industry, might help the whole ecosystem).
The show must go on—for now
The whole Strategy setup feels more and more like a performance to me. Saylor’s the star, doing the moves and Wall Street’s the record label, and we’re the audience, captivated by the spectacle and paying to see the show on occasion.\ \ The suits keep funding him (free money, IOUs), just like the music industry props up a fading diva with a limited repertoire or drags a new star from her home studio on YouTube into the spotlights. H\ Saylor’s 21/21 Plan to the amount of $42 billion to snatch up more Bitcoin can be a grand finale that’s dazzling while the lights stay on.
Prediction: the music stops eventually
Here’s my take: Bitcoin will keep rising over a long period of time, and Saylor’s gambit will look like a genius move, until it doesn’t. All it takes is one big shot in Wall Street to find another shiny toy to play with, or another play to get their money working. The billions they’ve invested, will come back eventually, and if it doesn’t, it will mean the world has changed in their advantage as well in another way. Some people cannot lose, no matter what. Saylor’s now part of that, doing their bidding and doing his part for educating the other businesses.\ \ He’s the only big buyer of last resort in this game so far. No one else is piling in with billions like he is. When the hype cools or the debt catches up, he’s got no real business to fall back on. The software? A relic. The Bitcoin bet can save him if the time is right, we’ll see about that.\ Time is his enemy not ally, and it always wins in the end. The pose can only hold so long. You can’t keep scoring free fiat, without either die on low valuation and dilution, or without at least 20 other Strategy-grade businesses jumping in to take their piece of the pie.\ So far, surprisingly, none of these two things happen.\ He keeps getting free fiat from Wall Street investors, and no other Saylor stands up.\ This can’t last forever. One of the two will happen by end of 2025.\ \ Curtain call
Saylor’s a fascinating watch, a mix of investor-backed bravado, brains, and borrowed billions.\ Is it a masterstroke or a bitcoin version of Worldcom?\ I’m not sure. In any case, I would only invest in MSTR myself if the company has a real added value for bitcoin development and the bitcoin ecosystem. They could be the engine, the spirit, the core of bitcoin.\ Yet they’re just doing the poses.\ Let your body move to the rhythm.
AVB
If you like : tip here / other writings
1 https://en.wikipedia.org/wiki/IOU
2 https://sc.edu/about/offices_and_divisions/audit_and_advisory_services/about/news/2021/worldcom_scandal.php
-
@ 30b99916:3cc6e3fe
2025-03-29 17:04:41btcpayserver #lightning #lnd #powershell
BTCpayAPI now supports file upload
I'm continuing to add functionality to BTCpay and BTCpayAPI which is using REST Api(s) to manage my BTCPAY server and LND cloud instance. It is nice to have this just running locally on my home Linux desktop.
Here is the code that implements this functionality.
``` "Uploadfile" {
$apislug = "api/v1/files"
$filepath = Split-Path $options
$filename = Split-Path $options -Leaf
CONST
$CODEPAGE = "iso-8859-1" # alternatives are ASCII, UTF-8
Read file byte-by-byte
$fileBin = [System.IO.File]::ReadAllBytes($options)
Convert byte-array to string
$enc = [System.Text.Encoding]::GetEncoding($CODEPAGE) $fileEnc = $enc.GetString($fileBin)
We need a boundary (something random() will do best)
$boundary = [System.Guid]::NewGuid().ToString() $LF = "
r
n" $bodyLines = ( "--$boundary", "Content-Disposition: form-data; name="file
"; filename="$fileName
"", "Content-Type: application/octet-stream$LF", $fileEnc, "--$boundary--$LF" ) -join $LF$URI = $BTCPayCfg.BTCpayApi.GreenApi.url + $apislug $apiKeyToken = 'token ' + $script:BTCPAY_API $headers = @{'Authorization'=$apiKeyToken}
return Invoke-RestMethod -Uri $uri -Method Post -Headers $headers -ContentType "multipart/form-data; boundary=
"$boundary
"" -Body $bodyLines} ``` Here is the revision history since my last article.
Version Date Whom Notes ======= ========== ======== ===================================================== 0.1.4 03/28/2025 cadayton Added UploadFile method to upload a file to the BTCpay server 0.1.3 03/27/2025 cadayton Added GetFiles returns listing of files uploaded to BTCpay server 0.1.2 03/19/2025 cadayton ForwardingHistory new parameter "total_fees" tallys mfees for events returned 0.1.1 03/18/2025 cadayton ForwardingHistory now support additional parameters 0.1.0 03/15/2025 cadayton initial release.
The inspiration for this logic was adapted from weipah . One wouldn't think uploading a single file wouldn't require this much coding. The Greenfield's REST Api documentation for this end point wasn't very helpful.In my book, good end-user documentation of one's code is just as important as the code itself. I believe documentation is usually lacking on most projects because the effort of doing so is almost equal to the effort of writing the code. It is also the least fun part about writing code.
The job is not done until the paper work has been completed. :)
https://btcpayserver.sytes.net
-
@ 83279ad2:bd49240d
2025-03-29 15:28:45test
-
@ 50de492c:0a8871de
2025-03-30 00:23:36{"title":"test","description":"","imageUrl":"https://i.nostr.build/Xo67.png"}
-
@ 30b99916:3cc6e3fe
2025-03-29 14:12:37Chef's Notes
My mom worked as a waitress for a excellent Chinese restaurant. For years she tried to get this receipt without success and finally after the owner retired he gave her the receipt.
Previously posted this receipt on Zap.Cooking but now wanting to keep all my long-form notes in Obsidian and publish to Nostr using the nostr-writer plug-in.
Details
- ⏲️ Prep time: 20 to 30 minutes
- 🍳 Cook time: 1 to 2 Hours depending on amount of spare ribs
- 🍽️ Servings: 8
Ingredients
- 1 Quart Dole Pineapple Juice
- 1 Pint Dole Crushed Pineapple
- 1 Pint Dole Tidbits Pineapple
- 1 TS Dried Mustard
- 32 Oz Brown sugar or add to taste
- 1 Cup Red Wine
- 2 TS Corn Starch
- 1 or 2 lbs Pork or Beef spare ribs
- Worcestershire sauce
Directions
- Preheat oven to 350 degrees
- Bring water to boil in 8 qt stock pot
- Cut spare ribs and add to boiling water in stock pot
- Boil spare ribs for 20 to 30 minutes to remove excess fat
- Drain spare ribs and place onto cookie sheet
- Base spare ribs with a generous amount of Worcestershire sauce
- Place based spare ribs on cookie sheet and place into oven for 60 minutes.
- Place first 6 ingredients into stock pot and bring to boil while CONTINUOUSLY stirring
- Add corn starch to 2 cups of water and mix to create thickening agent
- Add thickening agent incrementally to Sweet & Sour sauce for desired thickness
- Reduce heat to low while CONTINUOUSLY stirring.
- Remove spare ribs from oven and place into Sweet & Sour sauce.
- Place stock pot into oven and cook until done. 1 to 2 hours.
Bon Appétit
-
@ 30b99916:3cc6e3fe
2025-03-29 14:04:34
Chef's Notes
My mom worked as a waitress for a excellent Chinese restaurant. For years she tried to get this receipt without success and finally after the owner retired he gave her the receipt.
Previously posted this receipt on Zap.Cooking but now wanting to keep all my long-form notes in Obsidian and publish to Nostr using the nostr-writer plug-in.
Details
- ⏲️ Prep time: 20 to 30 minutes
- 🍳 Cook time: 1 to 2 Hours depending on amount of spare ribs
- 🍽️ Servings: 8
Ingredients
- 1 Quart Dole Pineapple Juice
- 1 Pint Dole Crushed Pineapple
- 1 Pint Dole Tidbits Pineapple
- 1 TS Dried Mustard
- 32 Oz Brown sugar or add to taste
- 1 Cup Red Wine
- 2 TS Corn Starch
- 1 or 2 lbs Pork or Beef spare ribs
- Worcestershire sauce
Directions
- Preheat oven to 350 degrees
- Bring water to boil in 8 qt stock pot
- Cut spare ribs and add to boiling water in stock pot
- Boil spare ribs for 20 to 30 minutes to remove excess fat
- Drain spare ribs and place onto cookie sheet
- Base spare ribs with a generous amount of Worcestershire sauce
- Place based spare ribs on cookie sheet and place into oven for 60 minutes.
- Place first 6 ingredients into stock pot and bring to boil while CONTINUOUSLY stirring
- Add corn starch to 2 cups of water and mix to create thickening agent
- Add thickening agent incrementally to Sweet & Sour sauce for desired thickness
- Reduce heat to low while CONTINUOUSLY stirring.
- Remove spare ribs from oven and place into Sweet & Sour sauce.
- Place stock pot into oven and cook until done. 1 to 2 hours.
Bon Appétit
-
@ 30b99916:3cc6e3fe
2025-03-29 13:57:26
Chef's Notes
My mom worked as a waitress for a excellent Chinese restaurant. For years she tried to get this receipt without success and finally after the owner retired he gave her the receipt.
Previously posted this receipt on Zap.Cooking but now wanting to keep all my long-form notes in Obsidian and publish to Nostr using the nostr-writer plug-in.
Details
- ⏲️ Prep time: 20 to 30 minutes
- 🍳 Cook time: 1 to 2 Hours depending on amount of spare ribs
- 🍽️ Servings: 8
Ingredients
- 1 Quart Dole Pineapple Juice
- 1 Pint Dole Crushed Pineapple
- 1 Pint Dole Tidbits Pineapple
- 1 TS Dried Mustard
- 32 Oz Brown sugar or add to taste
- 1 Cup Red Wine
- 2 TS Corn Starch
- 1 or 2 lbs Pork or Beef spare ribs
- Worcestershire sauce
Directions
- Preheat oven to 350 degrees
- Bring water to boil in 8 qt stock pot
- Cut spare ribs and add to boiling water in stock pot
- Boil spare ribs for 20 to 30 minutes to remove excess fat
- Drain spare ribs and place onto cookie sheet
- Base spare ribs with a generous amount of Worcestershire sauce
- Place based spare ribs on cookie sheet and place into oven for 60 minutes.
- Place first 6 ingredients into stock pot and bring to boil while CONTINUOUSLY stirring
- Add corn starch to 2 cups of water and mix to create thickening agent
- Add thickening agent incrementally to Sweet & Sour sauce for desired thickness
- Reduce heat to low while CONTINUOUSLY stirring.
- Remove spare ribs from oven and place into Sweet & Sour sauce.
- Place stock pot into oven and cook until done. 1 to 2 hours.
Bon Appétit
-
@ 592295cf:413a0db9
2025-03-29 10:59:52The journey starts from the links in this article nostr-quick-start-guide
Starting from these links building a simple path should not cover everything, because impossible.
Today I saw that Verbiricha in his workshop on his channel used nstart, but then I distracted And I didn't see how he did it.
Go to nstart.me and read: Each user is identified by a cryptographic keypair Public key, Private key (is a lot of stuff)
You can insert a nickname and go, the nickname is not unique
there is a email backup things interesting, but a little boring, i try to generate an email
doesn't even require a strong password ok.
I received the email, great, it shows me the nsec encrypted in clear,
Send a copy of the file with a password, which contains the password encrypted key I know and I know it's a tongue dump.
Multi signer bunker
That's stuff, let's see what he says.
They live the private key and send it to servers and you can recompose it to login at a site of the protocol nostr. If one of these servers goes offline you have the private key that you downloaded first and then reactivate a bunker. All very complicated. But if one of the servers goes offline, how can I remake the split? Maybe he's still testing.
Nobody tells you where these bunkers are.
Okay I have a string that is my bunker (buker://), I downloaded it, easy no, now will tell me which client accepts the bunker.. .
Follow someone before you start?
Is a cluster of 5 people Snowden, Micheal Dilger, jb55, Fiatjaf, Dianele.
I choice Snowden profile, or you can select multiple profiles, extra wild.
Now select 5 clients
Coracle, Chachi, Olas, Nostur, Jumble
The first is Coracle
Login, ok I try to post a note and signing your note the spin does not end.
Maybe the bunker is diffective.
Let's try Chachi
Simpler than Coracle, it has a type login that says bunker. see if I can post
It worked, cool, I managed to post in a group.
Olas is an app but also a website, but on the website requires an extension, which I do not have with this account.
If I download an app how do I pass the bunker on the phone, is it still a password, a qrcode, a qrcode + password, something like that, but many start from the phone so maybe it's easy for them. I try to download it and see if it allows me to connect with a bunker.
Okay I used private-qrcode and it worked, I couldn't do it directly from Olas because it didn't have permissions and the qrcode was < encrypted, so I went to the same site and had the bunker copied and glued on Olas
Ok then I saw that there was the qrcode image of the bunker for apps lol moment
Ok, I liked it, I can say it's a victory.
Looks like none of Snowden's followers are Olas's lover, maybe the smart pack has to predict a photographer or something like that.
Okay I managed to post on Olas, so it works, Expiration time is broken.
As for Nostur, I don't have an ios device so I'm going to another one.
Login with Jumble, it works is a web app
I took almost an hour to do the whole route.
But this was just one link there are two more
Extensions nostr NIP-07
The true path is nip-07-browser-extensions | nostr.net
There are 19 links, maybe there are too many?
I mention the most famous, or active at the moment
- Aka-profiles: Aka-profiles
Alby I don't know if it's a route to recommend
-
Blockcore Blockcore wallet
-
Nos2x Nos2x
-
Nos2xfox (fork for firefox) Nos2xfox
Nostore is (archived, read-only)
Another half hour to search all sites
Nostrapps
Here you can make paths
Then nstart selects Coracle, Chachi, Olas,Nostur and Jumble
Good apps might be Amethyst, 0xchat, Yakihonne, Primal, Damus
for IOS maybe: Primal, Olas, Damus, Nostur, Nos-Social, Nostrmo
On the site there are some categories, I select some with the respective apps
Let's see the categories
Go to Nostrapps and read:
Microbbloging: Primal
Streaming: Zap stream
Blogging: Yakihonne
Group chat: Chachi
Community: Flotilla
Tools: Form *
Discovery: Zapstore (even if it is not in this catrgory)
Direct Message: 0xchat
-
@ 71550e6c:b64c37a9
2025-03-29 10:55:55Just do the same as this video shows.
Here's the video: https://cdn.azzamo.net/7cdcc2718f1e15eb03e323f62e07582b4001da273aa5c21475d680f02b32f0e9.mp4
One caveat: do not trust the draft will be kept here after you close
nak fs
. Wait, no, it definitely won't stay here, but I'm not even sure it will stay here if you only navigate away and come back later, FUSE is weird and I didn't test.But at least it should work for copy-pasting. Or writing everything in one go.
-
@ 71550e6c:b64c37a9
2025-03-29 10:47:58This is a long-form post on Nostr.
Now Gigi can publish his stuff without complaining about NIP-23 client editors.
-
@ 3514ac1b:cf164691
2025-03-29 22:07:33About Me
-
@ 3514ac1b:cf164691
2025-03-29 21:58:22Hi this is me ,Erna . i am testing this Habla news . i have been trying using this but got no luck . always disconnect and no content .
Hopefully this one will work .
BREAKING NEWS : Vance uses Greenland visit to slam Denmark , as Trump escalates rhetoric .
https://wapo.st/4c6YkhO
-
@ 3514ac1b:cf164691
2025-03-29 18:55:29Cryptographic Identity (CI): An Overview
Definition of Cryptographic Identity
Cryptographic identity refers to a digital identity that is secured and verified using cryptographic techniques. It allows individuals to prove their identity online without relying on centralized authorities.
Background of Cryptographic Identity
Historical Context
- Traditional identity systems rely on centralized authorities (governments, companies)
- Digital identities historically tied to platforms and services
- Rise of public-key cryptography enabled self-sovereign identity concepts
- Blockchain and decentralized systems accelerated development
Technical Foundations
- Based on public-key cryptography (asymmetric encryption)
- Uses key pairs: private keys (secret) and public keys (shareable)
- Digital signatures provide authentication and non-repudiation
- Cryptographic proofs verify identity claims without revealing sensitive data
Importance of Cryptographic Identity
Privacy Benefits
- Users control their personal information
- Selective disclosure of identity attributes
- Reduced vulnerability to mass data breaches
- Protection against surveillance and tracking
Security Advantages
- Not dependent on password security
- Resistant to impersonation attacks
- Verifiable without trusted third parties
- Reduces centralized points of failure
Practical Applications
- Censorship-resistant communication
- Self-sovereign finance and transactions
- Decentralized social networking
- Cross-platform reputation systems
- Digital signatures for legal documents
Building Cryptographic Identity with Nostr
Understanding Nostr Protocol
Core Concepts
- Nostr (Notes and Other Stuff Transmitted by Relays)
- Simple, open protocol for censorship-resistant global networks
- Event-based architecture with relays distributing signed messages
- Uses NIP standards (Nostr Implementation Possibilities)
Key Components
- Public/private keypairs as identity foundation
- Relays for message distribution
- Events (signed JSON objects) as the basic unit of data
- Clients that interface with users and relays
Implementation Steps
Step 1: Generate Keypair
- Use cryptographic libraries to generate secure keypair
- Private key must be kept secure (password managers, hardware wallets)
- Public key becomes your identifier on the network
Step 2: Set Up Client
- Choose from existing Nostr clients or build custom implementation
- Connect to multiple relays for redundancy
- Configure identity preferences and metadata
Step 3: Publish Profile Information
- Create and sign kind 0 event with profile metadata
- Include displayable information (name, picture, description)
- Publish to connected relays
Step 4: Verification and Linking
- Cross-verify identity with other platforms (Twitter, GitHub)
- Use NIP-05 identifier for human-readable identity
- Consider NIP-07 for browser extension integration
Advanced Identity Features
Reputation Building
- Consistent posting builds recognition
- Accumulate follows and reactions
- Establish connections with well-known identities
Multi-device Management
- Secure private key backup strategies
- Consider key sharing across devices
- Explore NIP-26 delegated event signing
Recovery Mechanisms
- Implement social recovery options
- Consider multisig approaches
- Document recovery procedures
Challenges and Considerations
Key Management
- Private key loss means identity loss
- Balance security with convenience
- Consider hardware security modules for high-value identities
Adoption Barriers
- Technical complexity for average users
- Network effects and critical mass
- Integration with existing systems
Future Developments
- Zero-knowledge proofs for enhanced privacy
- Standardization efforts across protocols
- Integration with legal identity frameworks
-
@ 57d1a264:69f1fee1
2025-03-29 18:02:16This UX research has been redacted by @iqra from the Bitcoin.Design community, and shared for review and feedback! Don't be shy, share your thoughts.
1️⃣ Introduction
Project Overview
📌 Product: BlueWallet (Bitcoin Wallet) 📌 Goal: Improve onboarding flow and enhance accessibility for a better user experience. 📌 Role: UX Designer 📌 Tools Used: Figma, Notion
Why This Case Study?
🔹 BlueWallet is a self-custodial Bitcoin wallet, but users struggle with onboarding due to unclear instructions. 🔹 Accessibility issues (low contrast, small fonts) create barriers for visually impaired users. 🔹 Competitors like Trust Wallet and MetaMask offer better-guided onboarding.
This case study presents UX/UI improvements to make BlueWallet more intuitive and inclusive.
2️⃣ Problem Statement: Why BlueWalletʼs Onboarding Needs Improvement
🔹 Current Challenges:
1️⃣ Onboarding Complexity - BlueWallet lacks step-by-step guidance, leaving users confused about wallet creation and security.
2️⃣ No Educational Introduction - Users land directly on the wallet screen with no explanation of private keys, recovery phrases, or transactions. 3️⃣ Transaction Flow Issues - Similar-looking "Send" and "Receive" buttons cause confusion. 4️⃣ Poor Accessibility - Small fonts and low contrast make navigation difficult.
🔍 Impact on Users:
Higher drop-off rates due to frustration during onboarding. Security risks as users skip key wallet setup steps. Limited accessibility for users with visual impairments.
📌 Competitive Gap:
Unlike competitors (Trust Wallet, MetaMask), BlueWallet does not offer: ✅ A guided onboarding process ✅ Security education during setup ✅ Intuitive transaction flow
Somehow, this wallet has much better UI than the BlueWallet Bitcoin wallet.
3️⃣ User Research & Competitive Analysis
User Testing Findings
🔹 Conducted usability testing with 5 users onboarding for the first time. 🔹 Key Findings: ✅ 3 out of 5 users felt lost due to missing explanations. ✅ 60% had trouble distinguishing transaction buttons. ✅ 80% found the text difficult to read due to low contrast.
Competitive Analysis
We compared BlueWallet with top crypto wallets:
| Wallet | Onboarding UX | Security Guidance | Accessibility Features | |---|---|---|---| | BlueWallet | ❌ No guided onboarding | ❌ Minimal explanation | ❌ Low contrast, small fonts | | Trust Wallet | ✅ Step-by-step setup | ✅ Security best practices | ✅ High contrast UI | | MetaMask | ✅ Interactive tutorial | ✅ Private key education | ✅ Clear transaction buttons |
📌 Key Insight: BlueWallet lacks guided setup and accessibility enhancements, making it harder for beginners.
📌 User Persona
To better understand the users facing onboarding challenges, I developed a persona based on research and usability testing.
🔹 Persona 1: Alex Carter (Bitcoin Beginner & Investor)
👤 Profile: - Age: 28 - Occupation: Freelance Digital Marketer - Tech Knowledge: Moderate - Familiar with online transactions, new to Bitcoin) - Pain Points: - Finds Bitcoin wallets confusing. - - Doesnʼt understand seed phrases & security features. - - Worried about losing funds due to a lack of clarity in transactions.
📌 Needs: ✅ A simple, guided wallet setup. ✅ Clear explanations of security terms (without jargon). ✅ Easy-to-locate Send/Receive buttons.
📌 Persona Usage in Case Study: - Helps define who we are designing for. - Guides design decisions by focusing on user needs.
🔹 Persona 2: Sarah Mitchell (Accessibility Advocate & Tech Enthusiast)
👤 Profile: - Age: 35 - Occupation: UX Researcher & Accessibility Consultant - Tech Knowledge: High (Uses Bitcoin but struggles with accessibility barriers)
📌 Pain Points: ❌ Struggles with small font sizes & low contrast. ❌ Finds the UI difficult to navigate with a screen reader. ❌ Confused by identical-looking transaction buttons.
📌 Needs: ✅ A high-contrast UI that meets WCAG accessibility standards. ✅ Larger fonts & scalable UI elements for better readability. ✅ Keyboard & screen reader-friendly navigation for seamless interaction.
📌 Why This Persona Matters: - Represents users with visual impairments who rely on accessible design. - Ensures the design accommodates inclusive UX principles.
4️⃣ UX/UI Solutions & Design Improvements
📌 Before (Current Issues)
❌ Users land directly on the wallet screen with no instructions. ❌ "Send" & "Receive" buttons look identical , causing transaction confusion. ❌ Small fonts & low contrast reduce readability.
✅ After (Proposed Fixes)
✅ Step-by-step onboarding explaining wallet creation, security, and transactions. ✅ Visually distinct transaction buttons (color and icon changes). ✅ WCAG-compliant text contrast & larger fonts for better readability.
1️⃣ Redesigned Onboarding Flow
✅ Added a progress indicator so users see where they are in setup. ✅ Used plain, non-technical language to explain wallet creation & security. ✅ Introduced a "Learn More" button to educate users on security.
2️⃣ Accessibility Enhancements
✅ Increased contrast ratio for better text readability. ✅ Used larger fonts & scalable UI elements. ✅ Ensured screen reader compatibility (VoiceOver & TalkBack support).
3️⃣ Transaction Flow Optimization
✅ Redesigned "Send" & "Receive" buttons for clear distinction. ✅ Added clearer icons & tooltips for transaction steps.
5️⃣ Wireframes & Design Improvements:
🔹 Welcome Screen (First Screen When User Opens Wallet)
📌 Goal: Give a brief introduction & set user expectations
✅ App logo + short tagline (e.g., "Secure, Simple, Self-Custody Bitcoin Wallet") ✅ 1-2 line explanation of what BlueWallet is (e.g., "Your gateway to managing Bitcoin securely.") ✅ "Get Started" button → Le ads to next step: Wallet Setup ✅ "Already have a wallet?" → Import option
🔹 Example UI Elements: - BlueWallet Logo - Title: "Welcome to BlueWallet" - Subtitle: "Easily store, send, and receive Bitcoin." - CTA: "Get Started" (Primary) | "Import Wallet" (Secondary)
🔹 Screen 2: Choose Wallet Type (New or Import)
📌 Goal: Let users decide how to proceed
✅ Two clear options: - Create a New Wallet (For first-time users) - Import Existing Wallet (For users with a backup phrase) ✅ Brief explanation of each option 🔹 Example UI Elements: - Title: "How do you want to start?" - Buttons:** "Create New Wallet" | "Import Wallet"
🔹 Screen 3: Security & Seed Phrase Setup (Critical Step)
📌 Goal: Educate users about wallet security & backups
✅ Explain why seed phrases are important ✅ Clear step-by-step instructions on writing down & storing the phrase ✅ Warning: "If you lose your recovery phrase, you lose access to your wallet." ✅ CTA: "Generate Seed Phrase" → Next step
🔹 Example UI Elements: - Title: "Secure Your Wallet" - Subtitle: "Your seed phrase is the key to your Bitcoin. Keep it safe!" - Button: "Generate Seed Phrase"
🔹 Screen 4: Seed Phrase Display & Confirmation
📌 Goal: Ensure users write down the phrase correctly
✅ Display 12- or 24-word seed phrase ✅ “I have written it downˮ checkbox before proceeding ✅ Next screen: Verify seed phrase (drag & drop, re-enter some words)
🔹 Example UI Elements: - Title: "Write Down Your Seed Phrase" - List of 12/24 Words (Hidden by Default) - Checkbox: "I have safely stored my phrase" - Button: "Continue"
🔹 Screen 5: Wallet Ready! (Final Step)
📌 Goal: Confirm setup & guide users on next actions
✅ Success message ("Your wallet is ready!") ✅ Encourage first action: - “Receive Bitcoinˮ → Show wallet address - “Send Bitcoinˮ → Walkthrough on making transactions
✅ Short explainer: Where to find the Send/Receive buttons
🔹 Example UI Elements: - Title: "You're All Set!" - Subtitle: "Start using BlueWallet now." - Buttons: "Receive Bitcoin" | "View Wallet"
5️⃣ Prototype & User Testing Results
🔹 Created an interactive prototype in Figma to test the new experience. 🔹 User Testing Results: ✅ 40% faster onboarding completion time. ✅ 90% of users found transaction buttons clearer. 🔹 User Feedback: ✅ “Now I understand the security steps clearly.ˮ ✅ “The buttons are easier to find and use.ˮ
6️⃣ Why This Matters: Key Takeaways
📌 Impact of These UX/UI Changes: ✅ Reduced user frustration by providing a step-by-step onboarding guide. ✅ Improved accessibility , making the wallet usable for all. ✅ More intuitive transactions , reducing errors.
7️⃣ Direct link to figma file and Prototype
Original PDF available from here
originally posted at https://stacker.news/items/928822
-
@ dfbbf851:ba4542b5
2025-03-29 06:51:21ในยุคดิจิทัลที่การสื่อสารมีบทบาทสำคัญต่อชีวิตประจำวัน เทคโนโลยี Cell Broadcast ได้กลายเป็นหนึ่งในเครื่องมือที่ทรงพลังสำหรับการแจ้งเตือนฉุกเฉิน ไม่ว่าจะเป็นภัยพิบัติหรือเหตุการณ์สำคัญที่ต้องแจ้งให้ประชาชนทราบอย่างทันท่วงที ⏳💡
📌 Cell Broadcast คืออะไร ?
Cell Broadcast (CB) เป็นเทคโนโลยีที่ใช้ส่งข้อความกระจายสัญญาณผ่านเครือข่ายโทรศัพท์มือถือ 🏗📶 โดยแตกต่างจาก SMS ตรงที่สามารถส่งข้อความถึงผู้ใช้จำนวนมากได้พร้อมกัน โดยไม่ต้องทราบหมายเลขโทรศัพท์ ของผู้รับ 📲💨
ข้อความ CB สามารถส่งถึงอุปกรณ์ที่รองรับในเครือข่ายมือถือที่เปิดใช้งานอยู่ภายในช่วงเวลาสั้น ๆ ⏱ และ ไม่ทำให้เครือข่ายล่ม
✨ ข้อดีของ Cell Broadcast ✨
✅ ส่งข้อความรวดเร็ว – แจ้งเตือนได้ภายในไม่กี่วินาที แม้ในกรณีฉุกเฉิน ⚡🚀
✅ ไม่ต้องใช้หมายเลขโทรศัพท์ – กระจายสัญญาณไปยังอุปกรณ์ทุกเครื่องที่อยู่ในพื้นที่เป้าหมายได้โดยตรง 📡
✅ รองรับหลายภาษา – สามารถตั้งค่าการแจ้งเตือนให้เหมาะสมกับประชากรในแต่ละพื้นที่ 🌍🗣
✅ ไม่ทำให้เครือข่ายหนาแน่น – ต่างจาก SMS หรือการโทรจำนวนมากที่อาจทำให้เครือข่ายล่ม 📵❌
✅ ทำงานได้แม้ไม่มีอินเทอร์เน็ต – สามารถแจ้งเตือนในกรณีที่โซเชียลมีเดียหรืออินเทอร์เน็ตใช้งานไม่ได้ 🌐🚫
🌍 การใช้งาน Cell Broadcast ทั่วโลก
🔹 สหรัฐอเมริกา – ใช้ระบบ Wireless Emergency Alerts (WEA) เพื่อแจ้งเตือนเหตุการณ์ฉุกเฉิน เช่น พายุเฮอริเคน 🌀🌪
🔹 ญี่ปุ่น – ใช้ระบบ Earthquake Early Warning (EEW) เพื่อแจ้งเตือนแผ่นดินไหวล่วงหน้า ⛩🌏
🔹 สหภาพยุโรป – มีนโยบายให้ประเทศสมาชิกใช้ Public Warning System ผ่าน Cell Broadcast 📢🏛
🤔 ทำไมประเทศที่ยังไม่มีระบบนี้ควรนำมาใช้ ?
หลายประเทศ รวมถึง ประเทศไทย ยังไม่มีการใช้ Cell Broadcast อย่างแพร่หลาย ทั้งที่เป็นเทคโนโลยีที่สามารถช่วยชีวิตผู้คนได้อย่างมหาศาล 🚑 หากเกิดภัยพิบัติ เช่น น้ำท่วม แผ่นดินไหว สึนามิ หรือไฟป่า 🔥🌊 Cell Broadcast สามารถส่งการแจ้งเตือนไปยังทุกคนในพื้นที่เสี่ยงได้ทันที ลดความสูญเสียและเพิ่มโอกาสรอดชีวิตได้มากขึ้น
🔸 ความแม่นยำสูง – สามารถส่งแจ้งเตือนไปยังพื้นที่ที่ได้รับผลกระทบโดยตรง ทำให้ประชาชนสามารถเตรียมตัวรับมือได้ดีกว่า
🔸 ไม่มีปัญหาความล่าช้า – ต่างจากการแจ้งเตือนผ่าน SMS หรือโซเชียลมีเดียที่อาจล่าช้าหรือไม่ได้รับข้อความเลยหากเครือข่ายล่ม
🔸 เป็นมาตรฐานสากล – หลายประเทศพัฒนาแล้วมีระบบนี้ใช้งานอย่างมีประสิทธิภาพ ประเทศที่ยังไม่มีควรนำมาใช้เพื่อให้สามารถจัดการภัยพิบัติได้อย่างมีประสิทธิภาพ
🔸 ประหยัดต้นทุนในระยะยาว – ลดความเสียหายทางเศรษฐกิจจากภัยพิบัติ เพราะประชาชนได้รับการแจ้งเตือนล่วงหน้า ทำให้สามารถอพยพหรือป้องกันความเสียหายได้
🔮 อนาคตของ Cell Broadcast
ในอนาคต Cell Broadcast อาจถูกนำมาใช้ร่วมกับ ปัญญาประดิษฐ์ (AI) 🤖 และ Internet of Things (IoT) 🌐 เพื่อเพิ่มความแม่นยำและปรับแต่งการแจ้งเตือนได้ดียิ่งขึ้น 🎯💡
📌 ปล.
Cell Broadcast เป็นเทคโนโลยีแจ้งเตือนที่ทรงพลังและมีบทบาทสำคัญในการช่วยชีวิตผู้คน 🚑 ด้วยความสามารถในการส่งข้อความได้อย่างรวดเร็ว ครอบคลุมพื้นที่กว้าง และไม่ต้องพึ่งพาอินเทอร์เน็ต จึงเป็นหนึ่งในเครื่องมือสำคัญสำหรับการบริหารจัดการภัยพิบัติในปัจจุบันและอนาคต 🔥
CellBroadcast #แจ้งเตือนภัย #เทคโนโลยีสื่อสาร #ภัยพิบัติ #เครือข่ายมือถือ #การสื่อสารฉุกเฉิน #เตือนภัยล่วงหน้า
-
@ bdf3f01a:d9c40970
2025-03-29 04:52:40Abstract:
This paper presents a rigorous and critical examination of the Winter Vigil of XLII.II at Sapelo, a pivotal rite within the Lowcountry Freehold that serves as both an initiation into communal responsibility and a symbolic enactment of the Compact’s moral tenets. This analysis interrogates the ritual’s structure, emphasizing its role in perpetuating a resilient sociocultural order amid external collapse. Through a multidisciplinary approach combining historiographical analysis, cultural anthropology, and sociocultural theory, this study elucidates the Vigil’s function as a mechanism for moral continuity, thereby situating it within the broader discourse of post-collapse societal stabilization. The implications of this study underscore the profound interconnectedness between ritual practice and the formation of resilient communal identities.
Introduction:
The Winter Vigil of XLII.II at Sapelo occupies a fundamental position in the cultural historiography of the Lowcountry Freehold. As contemporary scholars, it is imperative to approach this tradition not merely as an artifact of ritualistic antiquity but as a dynamic process of cultural preservation. The Freehold’s commitment to integrating tradition with pragmatism, especially through the stewardship of The Veil, constitutes a critical adaptive strategy that sustained sociopolitical coherence through epochs of external fragmentation. This study aims to critically examine the Vigil as both a symbolic and practical reinforcement of the Compact’s ethos, with particular attention to how this ritual facilitated intergenerational continuity of moral and social values, ultimately shaping the robust communal identity that defines contemporary Freehold society.
The Veil as Cultural Custodian:
The Veil, emerging from the post-collapse adaptation of preexisting religious and cultural practices, evolved into a matriarchal order central to maintaining the Freehold’s ethical architecture. This evolution was characterized not by rigid preservation but by adaptive synthesis, wherein ceremonial gravitas was merged with pragmatic domestic guidance. The Veil functioned as a moral custodian, particularly within the familial sphere, where its influence was most profoundly exercised. Veilmother Cordelia’s role during the Winter Vigil exemplifies this dual function of leadership and philosophical stewardship, as her guidance articulated not only the ritual's procedural elements but also the embedded moral philosophy that would shape the initiates' worldview.
Ritual Dynamics and Symbolism:
The Winter Vigil is fundamentally an enactment of moral endurance, wherein the initiate’s voluntary approach to the brazier represents an acceptance of communal responsibility through individual fortitude. The design of the ritual deliberately positions physical endurance as a metaphor for moral resilience, encapsulating the Freehold’s conviction that true strength is inherently silent and steadfast. As the initiate moves toward the brazier, kneeling in proximity to the flame, the act becomes a performative affirmation of the Compact’s call for measured, principled strength rather than ostentatious assertion. The structured progression from the outer circle to the brazier symbolizes a journey from collective dependency to personal sovereignty, reflecting the Compact's ethos that leadership is merited through tested perseverance.
The Copper Plate Rite:
The Copper Plate Rite, integral to the Vigil, embodies the transformative philosophy of the Freehold. The heated copper plate, inscribed with the flame symbol and lifted from ashes, is held aloft despite discomfort, symbolizing the embrace of hardship as an essential component of sovereignty. The fleeting burn, leaving a transient mark, underscores the philosophical assertion that genuine resilience is born of confronting and integrating suffering, rather than circumventing it. This rite functions not merely as a test of physical tolerance but as a pedagogical imprinting of the Freehold’s ethos—an allegory of death and rebirth integral to personal and communal maturation.
Symbolic Implications and Societal Continuity:
The deliberate imposition of discomfort during the Vigil underscores a fundamental tenet of Freehold philosophy: suffering, when purposefully endured, refines the individual and, by extension, fortifies the community. The Copper Plate Rite exemplifies the doctrine that hardship, when faced with deliberate resolve, engenders moral clarity. This paradigm of voluntary suffering as a crucible for leadership remains a cornerstone of the Freehold’s ideological framework, fostering a collective ethos rooted in patient perseverance rather than impulsive dominance. Furthermore, the initiation rite serves as a microcosm of the Freehold's broader sociocultural ethos, where personal sacrifice is inextricably linked to communal stability.
Interpretive Analysis:
Current historiographical interpretations often err by neglecting the interconnectedness of the Vigil with broader sociopolitical dynamics. By isolating the rite as a mere ceremonial endurance, scholars risk overlooking its function as a structured pedagogical tool for inculcating moral resilience. This study posits that the Vigil, far from being a vestigial tradition, actively cultivated a pragmatic ethic of endurance that proved crucial in the Freehold’s sustained sociocultural coherence. This coherence, rooted in ritual reinforcement of moral tenets, enabled the Freehold to navigate existential threats without succumbing to internal decay.
Cultural and Societal Implications:
The enduring significance of the Winter Vigil lies in its dual function as both a rite of passage and a communal reaffirmation of the Freehold’s meritocratic principles. By fostering individual accountability within a collective moral framework, the Vigil reinforced the Compact’s foundational premise that leadership is merited through demonstrated resilience. The integration of personal trial into communal identity formation exemplifies how the Freehold maintained its internal stability despite external societal fragmentation. This ritual, therefore, is not merely commemorative but constitutive of the Freehold's enduring cultural legacy.
Conclusion:
The Winter Vigil of XLII.II at Sapelo remains a paradigmatic example of ritual as a vehicle for social continuity within the Lowcountry Freehold. Its deliberate amalgamation of symbolic endurance with moral instruction illustrates the Freehold’s adaptive strategy of embedding philosophical imperatives within lived tradition. As modern scholars, it is incumbent upon us to engage with these practices not merely as remnants of a bygone era but as foundational elements that cultivated the durable sociocultural ethos underpinning our current stability.
References:
-
Vance, C. (Epoch LII). "The Compact and Cultural Continuity: An Oral History." Archive of Freehold Studies, Emberwell Hall.
-
Harlowe, E. (Epoch LX). "The Flamekeepers: Guardians of Tradition." Journal of Sociocultural Persistence, Vol. 22, pp. 45-72.
-
Morgan, T. (Epoch LXV). "Endurance Through Ritual: The Role of The Veil in Cultural Preservation." Lowcountry Academic Press.
-
Cordelia, V. (Epoch XLII). "Reflections on the Flame: An Instructional Account." Collected Teachings of The Veil.
-
Emberwell Institute (Epoch XC). "The Evolution of Freehold Rites: From Custom to Philosophy." Advanced Studies in Cultural Integration.
## Title: Ritual as Continuity: An Analysis of the Winter Vigil of XLII.II at Sapelo
### Epoch XLII - Circle of Maidens
#### Abstract:
This paper presents a rigorous and critical examination of the Winter Vigil of XLII.II at Sapelo, a pivotal rite within the Lowcountry Freehold that serves as both an initiation into communal responsibility and a symbolic enactment of the Compact’s moral tenets. This analysis interrogates the ritual’s structure, emphasizing its role in perpetuating a resilient sociocultural order amid external collapse. Through a multidisciplinary approach combining historiographical analysis, cultural anthropology, and sociocultural theory, this study elucidates the Vigil’s function as a mechanism for moral continuity, thereby situating it within the broader discourse of post-collapse societal stabilization. The implications of this study underscore the profound interconnectedness between ritual practice and the formation of resilient communal identities.
#### Introduction:
The Winter Vigil of XLII.II at Sapelo occupies a fundamental position in the cultural historiography of the Lowcountry Freehold. As contemporary scholars, it is imperative to approach this tradition not merely as an artifact of ritualistic antiquity but as a dynamic process of cultural preservation. The Freehold’s commitment to integrating tradition with pragmatism, especially through the stewardship of The Veil, constitutes a critical adaptive strategy that sustained sociopolitical coherence through epochs of external fragmentation. This study aims to critically examine the Vigil as both a symbolic and practical reinforcement of the Compact’s ethos, with particular attention to how this ritual facilitated intergenerational continuity of moral and social values, ultimately shaping the robust communal identity that defines contemporary Freehold society.
#### The Veil as Cultural Custodian:
The Veil, emerging from the post-collapse adaptation of preexisting religious and cultural practices, evolved into a matriarchal order central to maintaining the Freehold’s ethical architecture. This evolution was characterized not by rigid preservation but by adaptive synthesis, wherein ceremonial gravitas was merged with pragmatic domestic guidance. The Veil functioned as a moral custodian, particularly within the familial sphere, where its influence was most profoundly exercised. Veilmother Cordelia’s role during the Winter Vigil exemplifies this dual function of leadership and philosophical stewardship, as her guidance articulated not only the ritual's procedural elements but also the embedded moral philosophy that would shape the initiates' worldview.
#### Ritual Dynamics and Symbolism:
The Winter Vigil is fundamentally an enactment of moral endurance, wherein the initiate’s voluntary approach to the brazier represents an acceptance of communal responsibility through individual fortitude. The design of the ritual deliberately positions physical endurance as a metaphor for moral resilience, encapsulating the Freehold’s conviction that true strength is inherently silent and steadfast. As the initiate moves toward the brazier, kneeling in proximity to the flame, the act becomes a performative affirmation of the Compact’s call for measured, principled strength rather than ostentatious assertion. The structured progression from the outer circle to the brazier symbolizes a journey from collective dependency to personal sovereignty, reflecting the Compact's ethos that leadership is merited through tested perseverance.
#### The Copper Plate Rite:
The Copper Plate Rite, integral to the Vigil, embodies the transformative philosophy of the Freehold. The heated copper plate, inscribed with the flame symbol and lifted from ashes, is held aloft despite discomfort, symbolizing the embrace of hardship as an essential component of sovereignty. The fleeting burn, leaving a transient mark, underscores the philosophical assertion that genuine resilience is born of confronting and integrating suffering, rather than circumventing it. This rite functions not merely as a test of physical tolerance but as a pedagogical imprinting of the Freehold’s ethos—an allegory of death and rebirth integral to personal and communal maturation.
#### Symbolic Implications and Societal Continuity:
The deliberate imposition of discomfort during the Vigil underscores a fundamental tenet of Freehold philosophy: suffering, when purposefully endured, refines the individual and, by extension, fortifies the community. The Copper Plate Rite exemplifies the doctrine that hardship, when faced with deliberate resolve, engenders moral clarity. This paradigm of voluntary suffering as a crucible for leadership remains a cornerstone of the Freehold’s ideological framework, fostering a collective ethos rooted in patient perseverance rather than impulsive dominance. Furthermore, the initiation rite serves as a microcosm of the Freehold's broader sociocultural ethos, where personal sacrifice is inextricably linked to communal stability.
#### Interpretive Analysis:
Current historiographical interpretations often err by neglecting the interconnectedness of the Vigil with broader sociopolitical dynamics. By isolating the rite as a mere ceremonial endurance, scholars risk overlooking its function as a structured pedagogical tool for inculcating moral resilience. This study posits that the Vigil, far from being a vestigial tradition, actively cultivated a pragmatic ethic of endurance that proved crucial in the Freehold’s sustained sociocultural coherence. This coherence, rooted in ritual reinforcement of moral tenets, enabled the Freehold to navigate existential threats without succumbing to internal decay.
#### Cultural and Societal Implications:
The enduring significance of the Winter Vigil lies in its dual function as both a rite of passage and a communal reaffirmation of the Freehold’s meritocratic principles. By fostering individual accountability within a collective moral framework, the Vigil reinforced the Compact’s foundational premise that leadership is merited through demonstrated resilience. The integration of personal trial into communal identity formation exemplifies how the Freehold maintained its internal stability despite external societal fragmentation. This ritual, therefore, is not merely commemorative but constitutive of the Freehold's enduring cultural legacy.
#### Conclusion:
The Winter Vigil of XLII.II at Sapelo remains a paradigmatic example of ritual as a vehicle for social continuity within the Lowcountry Freehold. Its deliberate amalgamation of symbolic endurance with moral instruction illustrates the Freehold’s adaptive strategy of embedding philosophical imperatives within lived tradition. As modern scholars, it is incumbent upon us to engage with these practices not merely as remnants of a bygone era but as foundational elements that cultivated the durable sociocultural ethos underpinning our current stability.
#### References:
- Vance, C. (Epoch LII). "The Compact and Cultural Continuity: An Oral History." Archive of Freehold Studies, Emberwell Hall.
- Harlowe, E. (Epoch LX). "The Flamekeepers: Guardians of Tradition." Journal of Sociocultural Persistence, Vol. 22, pp. 45-72.
- Morgan, T. (Epoch LXV). "Endurance Through Ritual: The Role of The Veil in Cultural Preservation." Lowcountry Academic Press.
- Cordelia, V. (Epoch XLII). "Reflections on the Flame: An Instructional Account." Collected Teachings of The Veil.
- Emberwell Institute (Epoch XC). "The Evolution of Freehold Rites: From Custom to Philosophy." Advanced Studies in Cultural Integration.
-
-
@ 2183e947:f497b975
2025-03-29 02:41:34Today I was invited to participate in the private beta of a new social media protocol called Pubky, designed by a bitcoin company called Synonym with the goal of being better than existing social media platforms. As a heavy nostr user, I thought I'd write up a comparison.
I can't tell you how to create your own accounts because it was made very clear that only some of the software is currently open source, and how this will all work is still a bit up in the air. The code that is open source can be found here: https://github.com/pubky -- and the most important repo there seems to be this one: https://github.com/pubky/pubky-core
You can also learn more about Pubky here: https://pubky.org/
That said, I used my invite code to create a pubky account and it seemed very similar to onboarding to nostr. I generated a private key, backed up 12 words, and the onboarding website gave me a public key.
Then I logged into a web-based client and it looked a lot like twitter. I saw a feed for posts by other users and saw options to reply to posts and give reactions, which, I saw, included hearts, thumbs up, and other emojis.
Then I investigated a bit deeper to see how much it was like nostr. I opened up my developer console and navigated to my networking tab, where, if this was nostr, I would expect to see queries to relays for posts. Here, though, I saw one query that seemed to be repeated on a loop, which went to a single server and provided it with my pubkey. That single query (well, a series of identical queries to the same server) seemed to return all posts that showed up on my feed. So I infer that the server "knows" what posts to show me (perhaps it has some sort of algorithm, though the marketing material says it does not use algorithms) and the query was on a loop so that if any new posts came in that the server thinks I might want to see, it can add them to my feed.
Then I checked what happens when I create a post. I did so and looked at what happened in my networking tab. If this was nostr, I would expect to see multiple copies of a signed messaged get sent to a bunch of relays. Here, though, I saw one message get sent to the same server that was populating my feed, and that message was not signed, it was a plaintext copy of my message.
I happened to be in a group chat with John Carvalho at the time, who is associated with pubky. I asked him what was going on, and he said that pubky is based around three types of servers: homeservers, DHT servers, and indexer servers. The homeserver is where you create posts and where you query for posts to show on your feed. DHT servers are used for censorship resistance: each user creates an entry on a DHT server saying what homeserver they use, and these entries are signed by their key.
As for indexers, I think those are supposed to speed up the use of the DHT servers. From what I could tell, indexers query DHT servers to find out what homeservers people use. When you query a homeserver for posts, it is supposed to reach out to indexer servers to find out the homeservers of people whose posts the homeserver decided to show you, and then query those homeservers for those posts. I believe they decided not to look up what homeservers people use directly on DHT servers directly because DHT servers are kind of slow, due to having to store and search through all sorts of non-social-media content, whereas indexers only store a simple db that maps each user's pubkey to their homeserver, so they are faster.
Based on all of this info, it seems like, to populate your feed, this is the series of steps:
- you tell your homeserver your pubkey
- it uses some sort of algorithm to decide whose posts to show you
- then looks up the homeservers used by those people on an indexer server
- then it fetches posts from their homeservers
- then your client displays them to you
To create a post, this is the series of steps:
- you tell your homeserver what you want to say to the world
- it stores that message in plaintext and merely asserts that it came from you (it's not signed)
- other people can find out what you said by querying for your posts on your homeserver
Since posts on homeservers are not signed, I asked John what prevents a homeserver from just making up stuff and claiming I said it. He said nothing stops them from doing that, and if you are using a homeserver that starts acting up in that manner, what you should do is start using a new homeserver and update your DHT record to point at your new homeserver instead of the old one. Then, indexers should update their db to show where your new homeserver is, and the homeservers of people who "follow" you should stop pulling content from your old homeserver and start pulling it from your new one. If their homeserver is misbehaving too, I'm not sure what would happen. Maybe it could refuse to show them the content you've posted on your new homeserver, keeping making up fake content on your behalf that you've never posted, and maybe the people you follow would never learn you're being impersonated or have moved to a new homeserver.
John also clarified that there is not currently any tooling for migrating user content from one homeserver to another. If pubky gets popular and a big homeserver starts misbehaving, users will probably need such a tool. But these are early days, so there aren't that many homeservers, and the ones that exist seem to be pretty trusted.
Anyway, those are my initial thoughts on Pubky. Learn more here: https://pubky.org/
-
@ 0d788b5e:c99ddea5
2025-03-29 02:40:37 -
@ df06d21e:2b23058f
2025-03-29 02:08:31Imagine a Living Civilization—a new way to see our world. It starts with the Universe’s pillars: Matter, the stuff we’re made of; Energy, the flow that drives us; Physics, the rules we play by; and Chemistry, the complexity that builds us. We know these well. But civilization? That’s our creation—and although it has been described in so many different ways over the years I thought it was time for something new. Civilization has its own pillars, systems that I call the pillars of the Metaverse: Capital, Information, Innovation, and Trust.
Capital is how we measure value. Not just money, but everything that matters: skills, we call that Human Capital; ecosystems, that’s Natural Capital; infrastructure, Public Capital; relationships, Social Capital. Picture a farmer swapping Bitcoin sats for seeds—not fiat debt—or tracking soil health alongside his wallet. Capital is a system, a system of measurement.
Information is how we verify truth. Think IPFS, a network holding real data—climate stats, farming fixes—open to all, not locked up by some corporate gatekeeper. Information is a system of verification.
Innovation is about generating solutions. On GitHub, coders worldwide crank out tools—Nostr clients, solar apps—shared freely, not patented for profit. Innovation is our system of generation.
And Trust—it’s coordination. Nostr’s decentralized threads let communities set trade rules, split resources—governance from the ground up, no overlords required. Trust is our system of coordination.
Right now we’re stuck in debt-based systems—and they’re failing us. Take fiat currency—central banks print it, slashing your purchasing power. Our dollar buys less every year; savings erode while the elite stack their gains. It’s a scam, Bitcoiners know it—fiat’s the real Ponzi bleeding us dry. Capital gets twisted—firms hoard Bitcoin for fiat pumps, not real wealth; governments chase GDP while forests die and skills sit idle. Information is buried—our media spits out spin, our corporations lock truth in silos. Innovation is stalled—debt props up corporate patents, not open wins. Trust is gone—our governance systems consist of top-down control that splits us apart, left to right, top to bottom. Debt just measures scarcity—money borrowed, nature trashed, bonds frayed—and it’s crushing the pillars.
Wealth-based systems promise to turn that around. Bitcoin’s sound money is just the start—sats hold value, not inflate it away. Real capital measures what sustains us—sats fund a cooperative's water pump, not a vault; they track skills taught, land healed, ties rebuilt. Real Information opens up—IPFS logs show ‘biochar boosted yield 20%’, verified by us, not suits. Real Innovation flows—GitHub devs build Lightning hubs, wealth spreads. Real Trust binds us together—Nostr chats align us, no central puppeteer. Wealth based systems strengthen the pillars of the Metaverse, it doesn’t erode them.
We needed a new framing. A new vision of what was, what is, and what could be. We have one. This is real. This is the world we are building. Bitcoin is live, Nostr is growing, IPFS and GitHub are humming. We can see Debt teetering; while real wealth is rising. So, hodlers, maxis, plebs—everyone—what does a true wealth-based system look like? How can we measure Capital beyond fiat’s con job? Bitcoin’s the rock, but it’s just the beginning. How do we build on this, expand it, and transform everything as we build something entirely new?
-
@ 0d788b5e:c99ddea5
2025-03-29 01:27:53这是首页内容
-
@ 7d33ba57:1b82db35
2025-03-28 22:14:24Preko is a charming seaside town on Ugljan Island, just a short ferry ride from Zadar. Known for its beautiful beaches, relaxed atmosphere, and stunning views of the Adriatic, it's the perfect place to experience authentic Dalmatian island life.
🌊 Top Things to See & Do in Preko
1️⃣ Swim at Jaz Beach 🏖️
- A Blue Flag beach with clear turquoise waters and soft pebbles.
- Ideal for families thanks to its shallow waters.
- Nearby cafés and restaurants make it a great spot to spend the day.
2️⃣ Visit the Islet of Galevac 🏝️
- A tiny island just 80 meters from Preko, reachable by swimming or a short boat ride.
- Home to a 15th-century Franciscan monastery, surrounded by lush greenery.
- A peaceful retreat, perfect for relaxation.
3️⃣ Hike to St. Michael’s Fortress (Sv. Mihovil) 🏰
- A medieval fortress from the 13th century with breathtaking panoramic views.
- Overlooks Zadar, Kornati Islands, and the Adriatic Sea.
- A 1-hour scenic hike from Preko or accessible by bike or car.
4️⃣ Explore the Local Taverns & Seafood Restaurants 🍽️
- Try fresh seafood, octopus salad, and Dalmatian peka (slow-cooked meat & vegetables).
- Best spots: Konoba Roko (authentic seafood) & Vile Dalmacija (beachfront dining).
5️⃣ Rent a Bike or Scooter 🚲
- Explore Ugljan Island’s olive groves, hidden coves, and coastal paths.
- Visit nearby villages like Kali and Kukljica for more local charm.
6️⃣ Take a Day Trip to Zadar ⛵
- Just 25 minutes by ferry, Zadar offers historic landmarks, the Sea Organ, and Roman ruins.
- Perfect for a cultural excursion before returning to the peaceful island.
🚗 How to Get to Preko
🚢 By Ferry:
- From Zadar: Regular ferries (Jadrolinija) take ~25 minutes.
🚘 By Car:
- If driving, take the ferry from Zadar to Preko and explore the island.
🚴 By Bike:
- Many visitors rent bikes to explore Ugljan Island’s coastal roads.💡 Tips for Visiting Preko
✅ Best time to visit? May–September for warm weather & swimming 🌞
✅ Ferry schedules – Check times in advance, especially in the off-season ⏳
✅ Bring cash – Some smaller taverns and cafés may not accept cards 💰
✅ Stay for sunset – The views over Zadar from Preko’s waterfront are stunning 🌅Would you like hotel recommendations, hidden beaches, or other island activities? 😊
-
@ fe9e99a0:5123e9a8
2025-03-28 21:25:43What’s happening?
-
@ 7d33ba57:1b82db35
2025-03-28 20:59:51Krka National Park, located in central Dalmatia, is one of Croatia’s most breathtaking natural wonders. Famous for its stunning waterfalls, crystal-clear lakes, and lush forests, the park is a must-visit for nature lovers. Unlike Plitvice Lakes, Krka allows swimming in certain areas, making it a perfect summer escape.
🌊 Top Things to See & Do in Krka National Park
1️⃣ Skradinski Buk Waterfall 💦
- The largest and most famous waterfall in the park, with cascading pools and wooden walkways.
- You used to be able to swim here, but since 2021, swimming is no longer allowed.
- Perfect for photography and picnics.
2️⃣ Roški Slap Waterfall 🌿
- A less crowded but equally beautiful series of waterfalls.
- Known for its "necklace" of small cascades leading into the main fall.
- Nearby Mlinica, a restored watermill, shows traditional Croatian life.
3️⃣ Visovac Island & Monastery 🏝️
- A tiny island in the middle of the Krka River, home to a Franciscan monastery from the 15th century.
- Accessible by boat tour from Skradinski Buk or Roški Slap.
- A peaceful, scenic spot with stunning views of the lake.
4️⃣ Krka Monastery 🏛️
- A Serbian Orthodox monastery hidden deep in the park.
- Built on ancient Roman catacombs, which you can explore.
- A quiet, spiritual place, often overlooked by tourists.
5️⃣ Hike & Walk the Nature Trails 🥾
- The park has several well-marked trails through forests, waterfalls, and lakes.
- Wooden walkways allow easy access to the main sights.
- Wildlife spotting: Look out for otters, turtles, and over 200 bird species!
6️⃣ Swim at Skradin Beach 🏖️
- While you can’t swim at Skradinski Buk anymore, Skradin Beach, just outside the park, is a great spot for a dip.
- Kayaking and boat tours available.
🚗 How to Get to Krka National Park
✈️ By Air: The nearest airport is Split (SPU), 1 hour away.
🚘 By Car:
- Split to Krka: ~1 hour (85 km)
- Zadar to Krka: ~1 hour (75 km)
- Dubrovnik to Krka: ~3.5 hours (280 km)
🚌 By Bus: Direct buses from Split, Zadar, and Šibenik to the park’s entrances.
🚢 By Boat: From Skradin, you can take a boat ride into the park.💡 Tips for Visiting Krka National Park
✅ Best time to visit? Spring & early autumn (April–June, September–October) – Fewer crowds & mild weather 🍃
✅ Start early! Arrive before 10 AM to avoid crowds, especially in summer ☀️
✅ Bring water & snacks – Limited food options inside the park 🍎
✅ Wear comfy shoes – Wooden walkways & trails can be slippery 👟
✅ Take a boat tour – The best way to see Visovac Island & hidden spots ⛵
✅ Buy tickets online – Save time at the entrance 🎟️ -
@ 0d6c8388:46488a33
2025-03-28 16:24:00Huge thank you to OpenSats for the grant to work on Hypernote this year! I thought I'd take this opportunity to try and share my thought processes for Hypernote. If this all sounds very dense or irrelevant to you I'm sorry!
===
How can the ideas of "hypermedia" benefit nostr? That's the goal of hypernote. To take the best ideas from "hypertext" and "hypercard" and "hypermedia systems" and apply them to nostr in a specifically nostr-ey way.
1. What do we mean by hypermedia
A hypermedia document embeds the methods of interaction (links, forms, and buttons are the most well-known hypermedia controls) within the document itself. It's including the how with the what.
This is how the old web worked. An HTML page was delivered to the web browser, and it included in it a link or perhaps a form that could be submitted to obtain a new, different HTML page. This is how the whole web worked early on! Forums and GeoCities and eBay and MySpace and Yahoo! and Amazon and Google all emerged inside this paradigm.
A web browser in this paradigm was a "thin" client which rendered the "thick" application defined in the HTML (and, implicitly, was defined by the server that would serve that HTML).
Contrast this with modern app development, where the what is usually delivered in the form of JSON, and then HTML combined with JavaScript (React, Svelte, Angular, Vue, etc.) is devised to render that JSON as a meaningful piece of hypermedia within the actual browser, the how.
The browser remains a "thin" client in this scenario, but now the application is delivered in two stages: a client application of HTML and JavaScript, and then the actual JSON data that will hydrate that "application".
(Aside: it's interesting how much "thicker" the browser has had to become to support this newer paradigm!)
Nostr was obviously built in line with the modern paradigm: nostr "clients" (written in React or Svelte or as mobile apps) define the how of reading and creating nostr events, while nostr events themselves (JSON data) simply describe the what.
And so the goal with Hypernote is to square this circle somehow: nostr currently delivers JSON what, how do we deliver the how with nostr as well. Is that even possible?
2. Hypernote's design assumptions
Hypernote assumes that hypermedia over nostr is a good idea! I'm expecting some joyful renaissance of app expression similar to that of the web once we figure out how to express applications in a truly "nostr" way.
Hypernote was also deeply inspired by HTMX, so it assumes that building web apps in the HTMX style is a good idea. The HTMX insight is that instead of shipping rich scripting along with your app, you could simply make HTML a tiny bit more expressive and get 95% of what most apps need. HTMX's additions to the HTML language are designed to be as minimal and composable as possible, and Hypernote should have the same aims.
Hypernote also assumes that the "design" of nostr will remain fluid and anarchic for years to come. There will be no "canonical" list of "required" NIPs that we'll have "consensus" on in order to build stable UIs on top of. Hypernote will need to be built responsive to nostr's moods and seasons, rather than one holy spec.
Hypernote likes the
nak
command line tool. Hypernote likes markdown. Hypernote likes Tailwind CSS. Hypernote likes SolidJS. Hypernote likes cold brew coffee. Hypernote is, to be perfectly honest, my aesthetic preferences applied to my perception of an opportunity in the nostr ecosystem.3. "What's a hypernote?"
Great question. I'm still figuring this out. Everything right now is subject to change in order to make sure hypernote serves its intended purpose.
But here's where things currently stand:
A hypernote is a flat list of "Hypernote Elements". A Hypernote Element is composed of:
- CONTENT. Static or dynamic content. (the what)
- LOGIC. Filters and events (the how)
- STYLE. Optional, inline style information specific to this element's content.
In the most basic example of a hypernote story, here's a lone "edit me" in the middle of the canvas:
{ "id": "fb4aaed4-bf95-4353-a5e1-0bb64525c08f", "type": "text", "text": "edit me", "x": 540, "y": 960, "size": "md", "color": "black" }
As you can see, it has no logic, but it does have some content (the text "edit me") and style (the position, size, and color).
Here's a "sticker" that displays a note:
{ "id": "2cd1ef51-3356-408d-b10d-2502cbb8014e", "type": "sticker", "stickerType": "note", "filter": { "kinds": [ 1 ], "ids": [ "92de77507a361ab2e20385d98ff00565aaf3f80cf2b6d89c0343e08166fed931" ], "limit": 1 }, "accessors": [ "content", "pubkey", "created_at" ], "x": 540, "y": 960, "associatedData": {} }
As you can see, it's kind of a mess! The content and styling and underdeveloped for this "sticker", but at least it demonstrates some "logic": a nostr filter for getting its data.
Here's another sticker, this one displays a form that the user can interact with to SEND a note. Very hyper of us!
{ "id": "42240d75-e998-4067-b8fa-9ee096365663", "type": "sticker", "stickerType": "prompt", "filter": {}, "accessors": [], "x": 540, "y": 960, "associatedData": { "promptText": "What's your favorite color?" }, "methods": { "comment": { "description": "comment", "eventTemplate": { "kind": 1111, "content": "${content}", "tags": [ [ "E", "${eventId}", "", "${pubkey}" ], [ "K", "${eventKind}" ], [ "P", "${pubkey}" ], [ "e", "${eventId}", "", "${pubkey}" ], [ "k", "${eventKind}" ], [ "p", "${pubkey}" ] ] } } } }
It's also a mess, but it demos the other part of "logic": methods which produce new events.
This is the total surface of hypernote, ideally! Static or dynamic content, simple inline styles, and logic for fetching and producing events.
I'm calling it "logic" but it's purposfully not a whole scripting language. At most we'll have some sort of
jq
-like language for destructing the relevant piece of data we want.My ideal syntax for a hypernote as a developer will look something like
```foo.hypernote Nak-like logic
Markdown-like content
CSS-like styles ```
But with JSON as the compile target, this can just be my own preference, there can be other (likely better!) ways of authoring this content, such as a Hypernote Stories GUI.
The end
I know this is all still vague but I wanted to get some ideas out in the wild so people understand the through line of my different Hypernote experiments. I want to get the right amount of "expressivity" in Hypernote before it gets locked down into one spec. My hunch is it can be VERY expressive while remaining simple and also while not needing a whole scripting language bolted onto it. If I can't pull it off I'll let you know.
-
@ 905365ac:4247f9de
2025-03-28 14:04:02"85% of the KGB ['s strategy to take over a country] is always subversion." Yuri Bezmenov
Ideological subversion is even stronger today, with an even greater reach because of the internet. Unlike during Yuri's time, however, we are being subverted internally.
What is subversion?
Short answer: brainwashing.
Long answer:
Demoralization > Destabilization > Crisis > Normilization
Demoralization: control educational institutions, media, and cultural platforms
Destabilization: control internal and foreign politics, economic, and defense systems.
Crisis: violent change of power, structure, and economy
Normalization: period of stability*
One teacher** believes that the way this is currently being played out is through our culture wars - particularly anti-whiteness. I would add that it is playing out both in anti-whiteness and in anti-masculinity.
Short history lesson:
America embarked on an endeavor to "de-nazi" Germany via demoralization following World War 2. The charge was lead by a Frankfort school that sought refuge in the U.S. during the war. That demoralization was based on mass cultural guilt (interestingly enough, I actually learned the concept of collective guilt as a tool to “heal communities” in a class on Peace and Conflict during college).
According to this teacher, that mass guilt then started being applied by leftists in a range of western civilizations, including America where the root guilt is racism. A secondary guilt Americans suffer from is "the partriarchy," which has led to a whole slew of mass demoralization which can be seen most evidently in this current wave of feminism and in gender ideology.
In such countries, the idea is that fascism (seen as the scapegoat of whatever mass guilt is being applied) must eventually be annihilated. Otherwise, the guilt is too difficult to bear. In the U.S., that’s whiteness. In Germany, it was Nazis and now it’s Germans themselves.
Takeaways:
-
The best way personally advocate for a strong country that stands against ideological subversion is to directly counter demoralization in the spheres of education, media, and in cultural spaces.
-
Invest in countering destabilization by appointing, electing, and being those who fight for peace, unity and freedom on our political, economic, and defensive grounds.
Speak truth. Homeschool (or be involved in your local schools). Join NOSTR. Contribute to local, state and federal politics in a way that will positively impact your grandchildren. Support the soldiers and veterans you know and love. Be pro-human.
https://youtu.be/5gnpCqsXE8g
https://youtu.be/niiF8hCSrYQ
-
-
@ bf95e1a4:ebdcc848
2025-03-28 13:56:06This is a part of the Bitcoin Infinity Academy course on Knut Svanholm's book Bitcoin: Sovereignty Through Mathematics. For more information, check out our Geyser page!
Financial Atheism
“Don’t trust, verify” is a common saying amongst bitcoiners that represents a sound attitude towards not only Bitcoin but all human power structures. In order to understand Bitcoin, one must admit that everything in society is man-made. Every civilization, every religion, every constitution, and every law is a product of human imagination. It wasn’t until as late as the 17th century that the scientific method started to become the dominant practice for describing how the world actually worked. Peer-to-peer review and repeated testing of a hypothesis are still quite recent human practices. Before this, we were basically just guessing and trusting authorities to a large extent. We still do this today, and despite our progress over the last couple of centuries, we still have a long way to go. Our brains are hardwired to follow the leader of the pack. The human brain is born with a plethora of cognitive biases pre-installed, and we have to work very hard to overcome them. We evolved to survive in relatively small groups, and our brains are thus not really made for seeing the bigger picture. Bitcoin’s proof-of-work algorithm is constructed in such a way that it is easy to verify that computational power was sacrificed in order to approve a block of transactions and claim its reward. In this way, no trust in any authority is required as it is relatively trivial to test the validity of a block and the transactions it contains. This is nothing short of a complete reimagining of how human society ought to be governed. The beauty of mathematics governs the Bitcoin system. Everything that ever happens in Bitcoin is open and verifiable to everyone, even to those who are not yet using it.
After the tragic events of 9/11 in 2001, Sam Harris started writing his book The End of Faith, which happened to be released around the same time as Richard Dawkins’ The God Delusion, Daniel Dennett's Breaking the Spell, and Christopher Hitchens’ God Is Not Great: How Religion Poisons Everything. These books kick-started what, in hindsight, has often been referred to as the new atheist movement, even though there has arguably never been anything new about atheism. Atheism must almost certainly have preceded religion since religious ideas require the person holding the idea to believe a certain doctrine or story. Atheism is nothing but the rejection of ways to describe the world that are not verifiable by experimentation. A fly on the wall is probably an atheist by this definition of the word. Atheism is often accused of being just another set of beliefs, but the word itself describes what it is much better — a lack of belief in theistic ideas. It is not a code of conduct or set of rules to live your life by; it is simply the rejection of that which cannot be scientifically verified. Many people, religious people, in particular, have a hard time grasping this. If you believe that a supernatural entity created everything in everyone's life, you might not be too comfortable with a word that describes a complete rejection of what you believe created everything, including the very atheist that the word describes. The amount of different religious worldviews that exist is probably equal to the sum of all religious people on the planet, but all world views that reject these superstitious beliefs require but one word. Atheism is not the opposite of religion but is simply the lack of it.
In 2008, another sub-culture movement of unbelief was born. Let’s call it Financial Atheism — the rejection of unverifiable value claims. With the invention of Bitcoin, a way of rejecting fraudulent expressions of a token’s value was born. Those of us fortunate enough to have been born in secular countries all enjoy not having the ideas of religious demagogues dictating our lives on a daily basis. We can choose which ideas to believe in and which to reject. What we still have very limited means of choosing, however, are the ways in which we express value to each other. We’re told to use a system in which we all have a certain number of value tokens assigned to our name, either as a number on a screen or as digits on paper notes. We all live in the collective hallucination that these numbers are somehow legit and that their authenticity is not to be questioned.
A Bitcoin balance assigned to a certain Bitcoin address might seem just as questionable to a layman, but if you have a basic understanding of the hashing algorithms and game theory behind it, it’s not. At the time of writing, the hash of the latest block on the Bitcoin blockchain begins with eighteen zeros in a row. These zeros represent the Proof of Work that ensures that this block is valid and that every transaction in it actually happened. If you can grasp the concept of a hashing algorithm, and if you have an intuition about mathematics, you realize the gargantuan amount of calculating effort that went into finding this particular hash. It is simply mind-blowing. To forge a false version of a hash beginning with eighteen zeros just wouldn’t be economically viable. Of course, you can never actually know that a 51% attack or some other attempt at corrupting the blockchain hasn’t occurred, but you can know that such an attack would require more than half of the network acting against their own economic interest. Bitcoin is not something to believe in. You don’t need to trust any authority because you can validate the plausibility of its authenticity yourself. It’s the financial equivalent of atheism or unbelief. Satoshi wasn’t Jesus. Satoshi was Brian of Nazareth, telling his followers to think for themselves.
The first law of thermodynamics, also known as the Law of Conservation of Energy, states that energy cannot be created or destroyed in an isolated system. The second law states that the entropy of any isolated system always increases, and the third law states that the entropy of a system approaches a constant value as the temperature approaches absolute zero. In the Bitcoin network, participants known as miners compete for new Bitcoin in a lottery with very fixed rules. The more hashing power (computing power) a miner contributes to the network, the higher his chances of winning the block reward, a specific amount of Bitcoin that is halved every four years. The difficulty of this lottery - in other words, the miner’s chance of winning it — is re-calibrated every 2016th block so that the average time it takes to find the next block is always roughly ten minutes. What this system produces is absolute scarcity; the amount of Bitcoin in existence at any moment in time is always predictable. The more time that passes, the slower the rate of coin issuance and the block reward slowly approaches zero. By the time it does, around the year 2140, the individual miner’s incentive to mine for a reward will, at least theoretically, have been replaced by an incentive to collect transaction fees from the participants of the network. Even now, the sum of all fees make up a non-trivial part of the miners’ revenue. Yet from a user’s point of view the fees are still very low, and as the network scales up using Layer 2 solutions such as the Lightning Network, they’re expected to remain low for quite a long time ahead.
Absolute scarcity is a concept that mankind has never encountered before. Arguably, this makes it the first man-made concept to ever be directly linked to the laws of physics. Everything anyone does requires a certain amount of energy. The very word doing implies that some kind of movement, some type of energy expenditure, needs to occur. As mentioned earlier, how we value things is entirely subjective. Different actions are of different value to different people. How we value different things is also inevitably linked to the supply of those things. Had the trapped-under-ice winter diver mentioned in chapter one been equipped with a scuba tank, he probably wouldn't have thought of his next breath as such a precious thing. The price a person is willing to pay for a good — in other words, the sum of one or more person’s actions — can be derived from two basic variables: The highly subjective demand for the good and the always-constrained-by-time-and-space supply of that same good. Note that if supply is sufficiently limited, there only needs to be a minimal amount of demand for a good for its price to increase.
One could argue that no one needs Bitcoin and that, therefore, Bitcoin would have no intrinsic value. One could also argue that there’s no such thing as intrinsic value since demand is always subjective. In any case, there will always be a cost to mine Bitcoin, and the more mining power in the network, the higher that cost. This cost, ensured by the Bitcoin network’s Proof-Of-Work algorithm, is probably as close to a pure energy cost as the price of a human activity will ever get. Once the mining rig is in place, a simple conversion process follows — energy in, scarce token out. Should the cost of production exceed the current price of the token, the miner can just choose not to sell, thereby limiting the supply of Bitcoin in circulation even more and eventually selling them for other goods whenever he sees fit. In this sense, Bitcoin is a battery. Perhaps the best battery ever invented.
Storing and moving electrical energy around has always been costly and wasteful. Bitcoin offers a way of converting energy into a small part of a specific number. A mathematical battery, if you will. It is important to remember that it does not convert energy into value directly, but rather electricity into digital scarcity — digital scarcity that can be used to express value. Energy cannot be created or destroyed in an isolated system, as the first law of thermodynamics clearly states. Bitcoin can express how much energy was sacrificed in order to acquire a share of the total sum. You can also acquire Bitcoin by buying it rather than mining it, but in doing so, you also spend energy. You somehow acquired the money with which you bought the Bitcoin. You, or someone else, sacrificed time and energy somewhere. Bitcoin lets you express that you see that there’s a connection between value and scarcity by letting you sacrifice effort to claim a part of the total sum.
The excitement we so-called "Bitcoin Maximalists" feel about Bitcoin does not come primarily from the enormous gains that those who hopped early onto the freight train have been blessed with. Nor is it because we’re “in it for the technology,” as can often be heard from opponents. Those of us who preach the near-divinity of this invention do so above all because we see the philosophical impacts of absolute scarcity in a commodity. The idea of a functioning solution to the double-spending problem in computerized money is an achievement that simply can’t be ignored. By solving the double-spending problem, Satoshi also made counterfeiting impossible, which in turn makes artificial inflation impossible. The world-changing potential of this invention cannot be understated. Not in the long run.
The more you think about it, the more the thought won’t give you any peace of mind. If this experiment works, if it’s real, it will take civilization to the next level. What we don’t know is how long this will take. Right now, debates in the Bitcoin space are about Bitcoin’s functionality as a medium of exchange and its potential as a good store of value. We might be missing the point. We cannot possibly know if a type of monetary token for which you’re completely responsible, with no third-party protection, will ever become a preferred medium of exchange for most transactions. Nor can we know if the price of Bitcoin will follow the hype-cycle path that we all want it to follow so that it can become the store of value that most maximalists claim it already is. Maybe we’ve been focused on the wrong things all along. Maybe Bitcoin’s greatest strength is in its functionality as a unit of account. After all, this is all that Bitcoin does. If you own 21 Bitcoin, you own one-millionth of the world's first absolutely scarce commodity. This might not make you rich overnight, but it just might have something to do with the opportunities available to your great-great-grandchildren.
Throughout history, whenever a prehistoric human tribe invented ceremonial burial, that tribe began to expand rapidly. Why? Because as soon as you invent belief in an afterlife, you also introduce the idea of self-sacrifice on a larger scale. People who held these beliefs were much easier for a despot to manipulate and send into battle with neighboring tribes. Religious leaders can use people’s fears and superstitions to have them commit all sorts of atrocities to their fellow man, and they still do so today. Belief in a “greater good” can be the most destructive idea that can pop up in a human mind. The Nazis of World War II Germany believed that exterminating Jews was for the “greater good” of their nation’s gene pool. Belief in noble causes often comes with unintended side effects, which can have disastrous consequences.
Religious leaders, political leaders, and other power-hungry sociopaths are responsible for the greatest crimes against humanity ever committed — namely, wars. Europeans often question the Second Amendment to the United States Constitution, which protects the right to bear arms, whenever a tragic school shooting occurs on the other side of the Atlantic. What everyone seems to forget is that less than a hundred years ago, Europe was at war with itself because its citizens had given too much power to their so-called leaders. The Nazis came to power in a democracy — never forget that. Our individual rights weren’t given to us by our leaders; we were born with them. Our leaders can’t give us anything; they can only force us to behave in certain ways. If we truly want to be in charge of our lives, we need to find the tools necessary to circumvent the bullshit ourselves.
About the Bitcoin Infinity Academy
The Bitcoin Infinity Academy is an educational project built around Knut Svanholm’s books about Bitcoin and Austrian Economics. Each week, a whole chapter from one of the books is released for free on Highlighter, accompanied by a video in which Knut and Luke de Wolf discuss that chapter’s ideas. You can join the discussions by signing up for one of the courses on our Geyser page. Signed books, monthly calls, and lots of other benefits are also available.
-
@ e97aaffa:2ebd765d
2025-03-28 12:56:17Nos últimos anos, tornei-me num acérrimo crítico do Euro, sobretudo da política monetária altamente expansionista realizada pelo Banco Central Europeu (BCE). Apesar de ser crítico, eu não desejo que Portugal volte a ter moeda própria.
No seguimento gráfico, é a variação do IPC de Portugal nos últimos 60 anos:
No gráfico inclui os momentos históricos, para uma melhor interpretação dos dados.
O Índice de Preços ao Consumidor (IPC) é usado para observar tendências de inflação. É calculado com base no preço médio necessário para comprar um conjunto de bens de consumo e serviços num país, comparando com períodos anteriores.
É uma ferramenta utilizada para calcular a perda de poder de compra, mas é uma métrica que é facilmente manipulada em prol dos interesses dos governos.
Análise histórica
No período marcelista, houve uma crescente inflação, devido a fatores, como os elevados custos da guerra e o fim dos acordos de Bretton Woods contribuíram para isso. Terminando com uma inflação superior a 13%.
Da Revolta dos Cravos (1974) até à adesão da CEE (atual União Europeia, UE), nos primeiros anos foram conturbados a nível político, mesmo após conquistar alguma estabilidade, em termos de política monetária foi um descalabro, com inflação entre 12% a 30% ao ano. Foi o pior momento na era moderna.
Com a entrada da CEE, Portugal ainda manteve a independência monetária, mas devido à entrada de muitos milhões de fundos europeus, essências para construir infraestrutura e desenvolver o país. Isto permitiu crescer e modernizar o país, gastando pouco dinheiro próprio, reduzindo a necessidade da expansão monetária e claro a inflação baixou.
Depois com a adesão ao Tratado de Maastricht, em 1991, onde estabeleceu as bases para a criação da União Económica e Monetária, que culminou na criação da moeda única europeia, o Euro. As bases eram bastante restritivas, os políticos portugueses foram obrigados a manter uma inflação baixa. Portugal perdeu a independência monetária em 1999, com a entrada em vigor da nova moeda, foi estabelecida a taxa de conversão entre escudos e euros, tendo o valor de 1 euro sido fixado em 200,482 escudos. A Euro entrou em vigor em 1999, mas o papel-moeda só entrou em circulação em 2002.
Assim, desde a criação até 2020, a inflação foi sempre abaixo de 5% ao ano, tendo um longo período abaixo dos 3%.
A chegada da pandemia, foi um descalabro no BCE, a expansão monetária foi exponencial, resultando numa forte subida no IPC, quase 8% em 2022, algo que não acontecia há 30 anos.
Conclusão
Apesar dos últimos anos, a política monetária do BCE tem sido péssima, mesmo assim continua a ser muito melhor, se esta fosse efetuada em exclusividade por portugueses, não tenho quaisquer dúvidas disso. O passado demonstra isso, se voltarmos a ser independentes monetariamente, será desastroso, vamos virar rapidamente, a Venezuela da Europa.
Até temos boas reservas de ouro, mas mesmo assim não são suficientes, mesmo que se inclua outros ativos para permitir a criação de uma moeda lastreada, ela apenas duraria até à primeira crise. É inevitável, somos um país demasiado socialista.
A solução não é voltar ao escudo, mas sim o BCE deixar de imprimir dinheiro, como se não houvesse amanhã ou então optar por uma moeda total livre, sem intromissão de políticos.
O BCE vai parar de expandir a moeda?
Claro que não, eles estão encurralados, a expansão monetária é a única solução para elevada dívida soberana dos estados. A única certeza que eu tenho, a expansão do BCE, será sempre inferior ao do Banco de Portugal, se este estivesse o botão da impressão à sua disposição. Por volta dos 5% é muito mau, mas voltar para a casa dos 15% seria péssimo, esse seria o nosso destino.
É muito triste ter esta conclusão, isto é demonstrativo da falta de competência dos políticos e governantes portugueses e o povo também tem uma certa culpa. Por serem poucos exigentes em relação à qualidade dos políticos que elegem e por acreditar que existem almoços grátis.
Bitcoin fixes this
-
@ 7d33ba57:1b82db35
2025-03-28 09:13:56Girona, one of Catalonia’s most charming cities, is a perfect mix of history, culture, and gastronomy. Famous for its well-preserved medieval old town, colorful houses along the Onyar River, and Game of Thrones filming locations, Girona is a must-visit destination in northern Spain.
🏰 Top Things to See & Do in Girona
1️⃣ Girona Cathedral (Catedral de Santa Maria) ⛪
- One of Spain’s most impressive cathedrals, with the widest Gothic nave in the world.
- Famous as the Great Sept of Baelor in Game of Thrones.
- Climb the steps for a breathtaking city view.
2️⃣ Walk the Medieval Walls (Passeig de la Muralla) 🏰
- Offers panoramic views of Girona and the surrounding countryside.
- A great way to see the city from above and explore its medieval history.
3️⃣ The Colorful Houses of the Onyar River 🌉
- Girona’s most iconic view, with brightly colored houses reflecting on the river.
- Best viewed from the Pont de les Peixateries Velles, designed by Gustave Eiffel.
4️⃣ Explore the Jewish Quarter (El Call) 🏡
- One of Europe’s best-preserved Jewish quarters, with narrow, medieval streets.
- Visit the Museum of Jewish History to learn about Girona’s Jewish heritage.
5️⃣ Arab Baths (Banys Àrabs) 🏛️
- A 12th-century Romanesque bathhouse, inspired by Moorish architecture.
- Features a beautiful central dome with columns.
6️⃣ Game of Thrones Filming Locations 🎬
- Walk in the footsteps of Arya Stark through the city’s winding streets.
- Visit the steps of the cathedral, the Jewish Quarter, and Arab Baths, all featured in the series.
7️⃣ Eat at a Michelin-Starred Restaurant 🍽️
- Girona is home to El Celler de Can Roca, a 3-Michelin-star restaurant, ranked among the best in the world.
- Try local Catalan dishes like "suquet de peix" (fish stew) and botifarra (Catalan sausage).
🚗 How to Get to Girona
✈️ By Air: Girona-Costa Brava Airport (GRO) is 20 min away, with budget flights from Europe.
🚆 By Train: High-speed AVE trains connect Barcelona (38 min), Madrid (3.5 hrs), and Paris (5.5 hrs).
🚘 By Car: 1 hr from Barcelona, 40 min from Figueres (Dalí Museum).
🚌 By Bus: Direct buses from Barcelona and the Costa Brava.💡 Tips for Visiting Girona
✅ Best time to visit? Spring & autumn (April–June & September–October) for pleasant weather. 🌤️
✅ Wear comfortable shoes – The old town is hilly with cobblestone streets. 👟
✅ Try xuixo – A delicious cream-filled pastry, unique to Girona. 🥐
✅ Visit early for Game of Thrones spots – They get crowded during the day! 🎥
✅ Take a day trip – Explore nearby Costa Brava beaches or Figueres (Dalí Museum). 🏖️ -
@ a60e79e0:1e0e6813
2025-03-28 08:47:35This is a long form note of a post that lives on my Nostr educational website Hello Nostr.
When most people stumble across Nostr, they see is as a 'decentralized social media alternative' — something akin to Twitter (X), but free from corporate control. But the full name, "Notes and Other Stuff Transmitted by Relays", gives a clue that there’s more to it than just posting short messages. The 'notes' part is easy to grasp because it forms almost everyone's first touch point with the protocol. But the 'other stuff'? That’s where Nostr really gets exciting. The 'other stuff' is all the creative and experimental things people are building on Nostr, beyond simple text based notes.
Every action on Nostr is an event, a like, a post, a profile update, or even a payment. The 'Kind' is what specifies the purpose of each event. Kinds are the building blocks of how information is categorized and processed on the network, and the most popular become part of higher lever specification guidelines known as Nostr Implementation Possibility - NIP. A NIP is a document that defines how something in Nostr should work, including the rules, standards, or features. NIPs define the type of 'other stuff' that be published and displayed by different styles of client to meet different purposes.
Nostr isn’t locked into a single purpose. It’s a foundation for whatever 'other stuff' you can dream up.
Types of Other Stuff
The 'other stuff' name is intentionally vague. Why? Because the possibilities of what can fall under this category are quite literally limitless. In the short time since Nostr's inception, the number of sub-categories that have been built on top of the Nostr's open protocol is mind bending. Here are a few examples:
- Long-Form Content: Think blog posts or articles. NIP-23.
- Private Messaging: Encrypted chats between users. NIP-04.
- Communities: Group chats or forums like Reddit. NIP-72
- Marketplaces: People listing stuff for sale, payable with zaps. NIP-15
- Zaps: Value transfer over the Lightning Network. NIP57
Popular 'Other Stuff' Clients
Here's a short list of some of the most recent and popular apps and clients that branch outside of the traditional micro-blogging use case and leverage the openness, and interoperability that Nostr can provide.
Blogging (Long Form Content)
- Habla - Web app for Nostr based blogs
- Highlighter - Web app that enables users to highlight, store and share content
Group Chats
- Chachi Chat - Relay-based (NIP-29) group chat client
- 0xchat - Mobile based secure chat
- Flotilla - Web based chat app built for self-hosted communities
- Nostr Nests - Web app for audio chats
- White Noise - Mobile based secure chat
Marketplaces
- Shopstr - Permissionless marketplace for web
- Plebeian Market - Permissionless marketplace for web
- LNBits Market - Permissionless marketplace for your node
- Mostro - Nostr based Bitcoin P2P Marketplace
Photo/Video
Music
- Fountain - Podcast app with Nostr features
- Wavlake - A music app supporting the value-for-value ecosystem
Livestreaming
- Zap.stream - Nostr native live streams
Misc
- Wikifreedia - Nostr based Wikipedia alternative
- Wikistr - Nostr based Wikipedia alternative
- Pollerama - Nostr based polls
- Zap Store - The app store powered by your social graph
The 'other stuff' in Nostr is what makes it special. It’s not just about replacing Twitter or Facebook, it’s about building a decentralized ecosystem where anything from private chats to marketplaces can thrive. The beauty of Nostr is that it’s a flexible foundation. Developers can dream up new ideas and build them into clients, and the relays just keep humming along, passing the data around. It’s still early days, so expect the 'other stuff' to grow wilder and weirder over time!
You can explore the evergrowing 'other stuff' ecosystem at NostrApps.com, Nostr.net and Awesome Nostr.
-
@ 05cdefcd:550cc264
2025-03-28 08:00:15The crypto world is full of buzzwords. One that I keep on hearing: “Bitcoin is its own asset class”.
While I have always been sympathetic to that view, I’ve always failed to understand the true meaning behind that statement.
Although I consider Bitcoin to be the prime innovation within the digital asset sector, my primary response has always been: How can bitcoin (BTC), a single asset, represent an entire asset class? Isn’t it Bitcoin and other digital assets that make up an asset class called crypto?
Well, I increasingly believe that most of crypto is just noise. Sure, it’s volatile noise that is predominately interesting for very sophisticated hedge funds, market makers or prop traders that are sophisticated enough to extract alpha – but it’s noise nonetheless and has no part to play in a long-term only portfolio of private retail investors (of which most of us are).
Over multiple market cycles, nearly all altcoins underperform Bitcoin when measured in BTC terms. Source: Tradingview
Aha-Moment: Bitcoin keeps on giving
Still, how can Bitcoin, as a standalone asset, make up an entire asset class? The “aha-moment” to answer this question recently came to me in a Less Noise More Signal interview I did with James Van Straten, senior analyst at Coindesk.
Let me paraphrase him here: “You can’t simply recreate the same ETF as BlackRock. To succeed in the Bitcoin space, new and innovative approaches are needed. This is where understanding Bitcoin not just as a single asset, but as an entire asset class, becomes essential. There are countless ways to build upon Bitcoin’s foundation—varied iterations that go beyond just holding the asset. This is precisely where the emergence of the Bitcoin-linked stock market is taking shape—and it's already underway.”
And this is actually coming to fruition as we speak. Just in the last few days, we saw several products launch in that regard.
Obviously, MicroStrategy (now Strategy) is the pioneer of this. The company now owns 506,137 BTC, and while they’ll keep on buying more, they have also inspired many other companies to follow suit.
In fact, there are now already over 70 companies that have adopted Strategy’s Bitcoin playbook. One of the latest companies to buy Bitcoin for their corporate treasury is Rumble. The YouTube competitor just announced their first Bitcoin purchase for $17 million.
Also, the gaming zombie company GameStop just announced to raise money to buy BTC for their corporate treasury.
Gamestop to make BTC their hurdle rate. Source: X
ETF on Bitcoin companies
Given this proliferation of Bitcoin Treasury companies, it was only a matter of time before a financial product tracking these would emerge.
The popular crypto index fund provider Bitwise Investments has just launched this very product called the Bitwise Bitcoin Standard Corporations ETF (OWNB).
The ETF tracks Bitcoin Treasury companies with over 1,000 BTC on their balance sheet. These companies invest in Bitcoin as a strategic reserve asset to protect the $5 trillion in low-yield cash that companies in the US commonly sit on.
These are the top 10 holdings of OWNB. Source: Ownbetf
ETF on Bitcoin companies’ convertible bonds
Another instrument that fits seamlessly into the range of Bitcoin-linked stock market products is the REX Bitcoin Corporate Treasury Convertible Bond ETF (BMAX). The ETF provides exposure to the many different convertible bonds issued by companies that are actively moving onto a Bitcoin standard.
Convertible bonds are a valuable financing tool for companies looking to raise capital for Bitcoin purchases. Their strong demand is driven by the unique combination of equity-like upside and debt-like downside protection they offer.
For example, MicroStrategy's convertible bonds, in particular, have shown exceptional performance. For instance, MicroStrategy's 2031 bonds has shown a price rise of 101% over a one-year period, vastly outperforming MicroStrategy share (at 53%), Bitcoin (at 25%) and the ICE BofA U.S. Convertible Index (at 10%). The latter is the benchmark index for convertible bond funds, tracking the performance of U.S. dollar-denominated convertible securities in the U.S. market.
The chart shows a comparison of ICE BofA U.S. Convertible Index, the Bloomberg Bitcoin index (BTC price), MicroStrategy share (MSTR), and MicroStrategy bond (0.875%, March 15 203). The convertible bond has been outperforming massively. Source: Bloomberg
While the BMAX ETF faces challenges such as double taxation, which significantly reduces investor returns (explained in more detail here), it is likely that future products will emerge that address and improve upon these issues.
Bitcoin yield products
The demand for a yield on Bitcoin has increased tremendously. Consequently, respective products have emerged.
Bitcoin yield products aim to generate alpha by capitalizing on volatility, market inefficiencies, and fragmentation within cryptocurrency markets. The objective is to achieve uncorrelated returns denominated in Bitcoin (BTC), with attractive risk-adjusted performance. Returns are derived exclusively from asset selection and trading strategies, eliminating reliance on directional market moves.
Key strategies employed by these funds include:
- Statistical Arbitrage: Exploits short-term pricing discrepancies between closely related financial instruments—for instance, between Bitcoin and traditional assets, or Bitcoin and other digital assets. Traders utilize statistical models and historical price relationships to identify temporary inefficiencies.
- Futures Basis Arbitrage: Captures profits from differences between the spot price of Bitcoin and its futures contracts. Traders simultaneously buy or sell Bitcoin on spot markets and enter opposite positions in futures markets, benefiting as the prices converge.
- Funding Arbitrage: Generates returns by taking advantage of variations in Bitcoin funding rates across different markets or exchanges. Funding rates are periodic payments exchanged between long and short positions in perpetual futures contracts, allowing traders to profit from discrepancies without significant directional exposure.
- Volatility/Option Arbitrage: Seeks profits from differences between implied volatility (reflected in Bitcoin options prices) and expected realized volatility. Traders identify mispriced volatility in options related to Bitcoin or Bitcoin-linked equities, such as MSTR, and position accordingly to benefit from volatility normalization.
- Market Making: Involves continuously providing liquidity by simultaneously quoting bid (buy) and ask (sell) prices for Bitcoin. Market makers profit primarily through capturing the spread between these prices, thereby enhancing market efficiency and earning consistent returns.
- Liquidity Provision in DeFi Markets: Consists of depositing Bitcoin (usually as Wrapped BTC) into decentralized finance (DeFi) liquidity pools such as those on Uniswap, Curve, or Balancer. Liquidity providers earn fees paid by traders who execute swaps within these decentralized exchanges, creating steady yield opportunities.
Notable products currently available in this segment include the Syz Capital BTC Alpha Fund offered by Syz Capital and the Forteus Crypto Alpha Fund by Forteus.
BTC-denominated share class
A Bitcoin-denominated share class refers to a specialized investment fund category in which share values, subscriptions (fund deposits), redemptions (fund withdrawals), and performance metrics are expressed entirely in Bitcoin (BTC), rather than in traditional fiat currencies such as USD or EUR.
Increasingly, both individual investors and institutions are adopting Bitcoin as their preferred benchmark—or "Bitcoin hurdle rate"—meaning that investment performance is evaluated directly against Bitcoin’s own price movements.
These Bitcoin-denominated share classes are designed specifically for investors seeking to preserve and grow their wealth in Bitcoin terms, rather than conventional fiat currencies. As a result, investors reduce their exposure to fiat-related risks. Furthermore, if Bitcoin outperforms fiat currencies, investors holding BTC-denominated shares will experience enhanced returns relative to traditional fiat-denominated investment classes.
X: https://x.com/pahueg
Podcast: https://www.youtube.com/@lessnoisemoresignalpodcast
Book: https://academy.saifedean.com/product/the-bitcoin-enlightenment-hardcover/
-
@ a3bb06f6:19ac1b11
2025-03-28 02:36:38“Until you make the unconscious conscious, it will continue to direct your life, and you will call it fate.” — Carl Jung
Most people don’t realize they’ve been robbed. Not in the dramatic, wallet-snatching sense, but in a quiet, systemic way that’s gone unnoticed for generations. If you’re feeling like no matter how hard you work, you can’t get ahead… you’re not imagining it.
It didn’t start as a scheme—but one compromise after another, it became one. Now, the system exploits you by design. This isn’t fate. It’s fiat.
The Unconscious Script: How Fiat Becomes Invisible From the moment you're born, you're placed into an economic system based on government-issued fiat currency. It becomes the air you breathe. You work for dollars. You save in dollars. You price your time, your future, and even your dreams in dollars.
But few stop to ask: What actually is a dollar? Who creates it? Why does it lose value?
This lack of questioning is the unconscious state. Fiat money is the background process running your life. You feel the effects—rising prices, shrinking savings, mounting debt—but you never see the root cause. So you blame yourself. Or “the economy.” Or call it fate.
The Lie of Neutral Money: Most believe money is just a neutral tool. But fiat is not neutral—it’s political power encoded into paper.
Governments can print more of it at will. Central banks can manipulate its supply, distort interest rates, and quietly tax you through inflation. Every time more money is created, your purchasing power shrinks.
But it happens slowly, like a leak in a tire. You don’t notice at first. You just feel like you’re working harder for less. The house is further out of reach. The groceries cost more. Retirement feels impossible.
And you accept it. Because no one told you it's designed this way.
Inflation Is the Invisible Thief, Inflation isn’t just a “cost of living increase.” It’s a state-sponsored form of theft.
When new money is created, it enters the system unevenly. Those closest to the money printer—banks, governments, large corporations—get the new dollars first. By the time it reaches you, prices have already risen. You’re buying the same goods with weaker money.
And yet, most people still save in fiat. They’re taught that hoarding cash is “safe.” They’re taught that 2% inflation is “normal.” But it’s not normal to work 40 hours a week and fall behind. That’s the product of unconscious acceptance.
The fiat system survives on one thing: your ignorance. It didn’t begin with malicious intent, but over time, it adapted to protect its own power—at your expense. As long as you don’t understand how money works, you won’t resist. You’ll blame yourself, or capitalism, or bad luck. But never the system itself.
This is why financial education is never prioritized in schools. This is why questioning monetary policy is left to economists and suits on CNBC. You were never taught how it works. And now the system depends on you staying confused—grinding, borrowing, complying, without ever asking why.
Making the Unconscious Conscious: Enter Bitcoin, Bitcoin breaks this spell.
It forces you to confront the nature of money—what it is, how it’s created, and why fiat fails. It teaches you that money doesn’t need to be printed, inflated, or controlled. That money can be fixed, finite, and fair.
Bitcoin is not just a new currency. It’s a tool of consciousness. It exposes the scam of fiat and offers a lifeboat to anyone ready to wake up.
Once you understand Bitcoin, you can’t unsee the problem. You begin to ask:
Why should I trust a system that steals my time? Why is saving discouraged, but debt rewarded? Why do I need permission to use my own money? These aren’t technical questions. They’re moral ones.
Consciousness Is Sovereignty: When you understand what fiat is, you stop calling your financial struggles “fate.” You start calling them what they are, outcomes of a broken system.
And once you see the system for what it is, you can choose to exit.
Saving in Bitcoin is not speculation. It’s self-defense. It’s rejecting unconscious servitude. It’s reclaiming your time, your labor, your future.
In a fiat world, they own the money—so they own the rules. In a Bitcoin world, you own yourself.
That’s the power of making the unconscious conscious.
And that’s how you stop calling it fate.
-
@ fd06f542:8d6d54cd
2025-03-28 02:24:00NIP-01
Basic protocol flow description
draft
mandatory
This NIP defines the basic protocol that should be implemented by everybody. New NIPs may add new optional (or mandatory) fields and messages and features to the structures and flows described here.
Events and signatures
Each user has a keypair. Signatures, public key, and encodings are done according to the Schnorr signatures standard for the curve
secp256k1
.The only object type that exists is the
event
, which has the following format on the wire:jsonc { "id": <32-bytes lowercase hex-encoded sha256 of the serialized event data>, "pubkey": <32-bytes lowercase hex-encoded public key of the event creator>, "created_at": <unix timestamp in seconds>, "kind": <integer between 0 and 65535>, "tags": [ [<arbitrary string>...], // ... ], "content": <arbitrary string>, "sig": <64-bytes lowercase hex of the signature of the sha256 hash of the serialized event data, which is the same as the "id" field> }
To obtain the
event.id
, wesha256
the serialized event. The serialization is done over the UTF-8 JSON-serialized string (which is described below) of the following structure:[ 0, <pubkey, as a lowercase hex string>, <created_at, as a number>, <kind, as a number>, <tags, as an array of arrays of non-null strings>, <content, as a string> ]
To prevent implementation differences from creating a different event ID for the same event, the following rules MUST be followed while serializing: - UTF-8 should be used for encoding. - Whitespace, line breaks or other unnecessary formatting should not be included in the output JSON. - The following characters in the content field must be escaped as shown, and all other characters must be included verbatim: - A line break (
0x0A
), use\n
- A double quote (0x22
), use\"
- A backslash (0x5C
), use\\
- A carriage return (0x0D
), use\r
- A tab character (0x09
), use\t
- A backspace, (0x08
), use\b
- A form feed, (0x0C
), use\f
Tags
Each tag is an array of one or more strings, with some conventions around them. Take a look at the example below:
jsonc { "tags": [ ["e", "5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36", "wss://nostr.example.com"], ["p", "f7234bd4c1394dda46d09f35bd384dd30cc552ad5541990f98844fb06676e9ca"], ["a", "30023:f7234bd4c1394dda46d09f35bd384dd30cc552ad5541990f98844fb06676e9ca:abcd", "wss://nostr.example.com"], ["alt", "reply"], // ... ], // ... }
The first element of the tag array is referred to as the tag name or key and the second as the tag value. So we can safely say that the event above has an
e
tag set to"5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36"
, analt
tag set to"reply"
and so on. All elements after the second do not have a conventional name.This NIP defines 3 standard tags that can be used across all event kinds with the same meaning. They are as follows:
- The
e
tag, used to refer to an event:["e", <32-bytes lowercase hex of the id of another event>, <recommended relay URL, optional>, <32-bytes lowercase hex of the author's pubkey, optional>]
- The
p
tag, used to refer to another user:["p", <32-bytes lowercase hex of a pubkey>, <recommended relay URL, optional>]
- The
a
tag, used to refer to an addressable or replaceable event- for an addressable event:
["a", "<kind integer>:<32-bytes lowercase hex of a pubkey>:<d tag value>", <recommended relay URL, optional>]
- for a normal replaceable event:
["a", "<kind integer>:<32-bytes lowercase hex of a pubkey>:", <recommended relay URL, optional>]
(note: include the trailing colon)
- for an addressable event:
As a convention, all single-letter (only english alphabet letters: a-z, A-Z) key tags are expected to be indexed by relays, such that it is possible, for example, to query or subscribe to events that reference the event
"5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36"
by using the{"#e": ["5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36"]}
filter. Only the first value in any given tag is indexed.Kinds
Kinds specify how clients should interpret the meaning of each event and the other fields of each event (e.g. an
"r"
tag may have a meaning in an event of kind 1 and an entirely different meaning in an event of kind 10002). Each NIP may define the meaning of a set of kinds that weren't defined elsewhere. NIP-10, for instance, especifies thekind:1
text note for social media applications.This NIP defines one basic kind:
0
: user metadata: thecontent
is set to a stringified JSON object{name: <nickname or full name>, about: <short bio>, picture: <url of the image>}
describing the user who created the event. Extra metadata fields may be set. A relay may delete older events once it gets a new one for the same pubkey.
And also a convention for kind ranges that allow for easier experimentation and flexibility of relay implementation:
- for kind
n
such that1000 <= n < 10000 || 4 <= n < 45 || n == 1 || n == 2
, events are regular, which means they're all expected to be stored by relays. - for kind
n
such that10000 <= n < 20000 || n == 0 || n == 3
, events are replaceable, which means that, for each combination ofpubkey
andkind
, only the latest event MUST be stored by relays, older versions MAY be discarded. - for kind
n
such that20000 <= n < 30000
, events are ephemeral, which means they are not expected to be stored by relays. - for kind
n
such that30000 <= n < 40000
, events are addressable by theirkind
,pubkey
andd
tag value -- which means that, for each combination ofkind
,pubkey
and thed
tag value, only the latest event MUST be stored by relays, older versions MAY be discarded.
In case of replaceable events with the same timestamp, the event with the lowest id (first in lexical order) should be retained, and the other discarded.
When answering to
REQ
messages for replaceable events such as{"kinds":[0],"authors":[<hex-key>]}
, even if the relay has more than one version stored, it SHOULD return just the latest one.These are just conventions and relay implementations may differ.
Communication between clients and relays
Relays expose a websocket endpoint to which clients can connect. Clients SHOULD open a single websocket connection to each relay and use it for all their subscriptions. Relays MAY limit number of connections from specific IP/client/etc.
From client to relay: sending events and creating subscriptions
Clients can send 3 types of messages, which must be JSON arrays, according to the following patterns:
["EVENT", <event JSON as defined above>]
, used to publish events.["REQ", <subscription_id>, <filters1>, <filters2>, ...]
, used to request events and subscribe to new updates.["CLOSE", <subscription_id>]
, used to stop previous subscriptions.
<subscription_id>
is an arbitrary, non-empty string of max length 64 chars. It represents a subscription per connection. Relays MUST manage<subscription_id>
s independently for each WebSocket connection.<subscription_id>
s are not guaranteed to be globally unique.<filtersX>
is a JSON object that determines what events will be sent in that subscription, it can have the following attributes:json { "ids": <a list of event ids>, "authors": <a list of lowercase pubkeys, the pubkey of an event must be one of these>, "kinds": <a list of a kind numbers>, "#<single-letter (a-zA-Z)>": <a list of tag values, for #e — a list of event ids, for #p — a list of pubkeys, etc.>, "since": <an integer unix timestamp in seconds. Events must have a created_at >= to this to pass>, "until": <an integer unix timestamp in seconds. Events must have a created_at <= to this to pass>, "limit": <maximum number of events relays SHOULD return in the initial query> }
Upon receiving a
REQ
message, the relay SHOULD return events that match the filter. Any new events it receives SHOULD be sent to that same websocket until the connection is closed, aCLOSE
event is received with the same<subscription_id>
, or a newREQ
is sent using the same<subscription_id>
(in which case a new subscription is created, replacing the old one).Filter attributes containing lists (
ids
,authors
,kinds
and tag filters like#e
) are JSON arrays with one or more values. At least one of the arrays' values must match the relevant field in an event for the condition to be considered a match. For scalar event attributes such asauthors
andkind
, the attribute from the event must be contained in the filter list. In the case of tag attributes such as#e
, for which an event may have multiple values, the event and filter condition values must have at least one item in common.The
ids
,authors
,#e
and#p
filter lists MUST contain exact 64-character lowercase hex values.The
since
anduntil
properties can be used to specify the time range of events returned in the subscription. If a filter includes thesince
property, events withcreated_at
greater than or equal tosince
are considered to match the filter. Theuntil
property is similar except thatcreated_at
must be less than or equal tountil
. In short, an event matches a filter ifsince <= created_at <= until
holds.All conditions of a filter that are specified must match for an event for it to pass the filter, i.e., multiple conditions are interpreted as
&&
conditions.A
REQ
message may contain multiple filters. In this case, events that match any of the filters are to be returned, i.e., multiple filters are to be interpreted as||
conditions.The
limit
property of a filter is only valid for the initial query and MUST be ignored afterwards. Whenlimit: n
is present it is assumed that the events returned in the initial query will be the lastn
events ordered by thecreated_at
. Newer events should appear first, and in the case of ties the event with the lowest id (first in lexical order) should be first. It is safe to return less events thanlimit
specifies, but it is expected that relays do not return (much) more events than requested so clients don't get unnecessarily overwhelmed by data.From relay to client: sending events and notices
Relays can send 5 types of messages, which must also be JSON arrays, according to the following patterns:
["EVENT", <subscription_id>, <event JSON as defined above>]
, used to send events requested by clients.["OK", <event_id>, <true|false>, <message>]
, used to indicate acceptance or denial of anEVENT
message.["EOSE", <subscription_id>]
, used to indicate the end of stored events and the beginning of events newly received in real-time.["CLOSED", <subscription_id>, <message>]
, used to indicate that a subscription was ended on the server side.["NOTICE", <message>]
, used to send human-readable error messages or other things to clients.
This NIP defines no rules for how
NOTICE
messages should be sent or treated.EVENT
messages MUST be sent only with a subscription ID related to a subscription previously initiated by the client (using theREQ
message above).OK
messages MUST be sent in response toEVENT
messages received from clients, they must have the 3rd parameter set totrue
when an event has been accepted by the relay,false
otherwise. The 4th parameter MUST always be present, but MAY be an empty string when the 3rd istrue
, otherwise it MUST be a string formed by a machine-readable single-word prefix followed by a:
and then a human-readable message. Some examples:["OK", "b1a649ebe8...", true, ""]
["OK", "b1a649ebe8...", true, "pow: difficulty 25>=24"]
["OK", "b1a649ebe8...", true, "duplicate: already have this event"]
["OK", "b1a649ebe8...", false, "blocked: you are banned from posting here"]
["OK", "b1a649ebe8...", false, "blocked: please register your pubkey at https://my-expensive-relay.example.com"]
["OK", "b1a649ebe8...", false, "rate-limited: slow down there chief"]
["OK", "b1a649ebe8...", false, "invalid: event creation date is too far off from the current time"]
["OK", "b1a649ebe8...", false, "pow: difficulty 26 is less than 30"]
["OK", "b1a649ebe8...", false, "restricted: not allowed to write."]
["OK", "b1a649ebe8...", false, "error: could not connect to the database"]
CLOSED
messages MUST be sent in response to aREQ
when the relay refuses to fulfill it. It can also be sent when a relay decides to kill a subscription on its side before a client has disconnected or sent aCLOSE
. This message uses the same pattern ofOK
messages with the machine-readable prefix and human-readable message. Some examples:["CLOSED", "sub1", "unsupported: filter contains unknown elements"]
["CLOSED", "sub1", "error: could not connect to the database"]
["CLOSED", "sub1", "error: shutting down idle subscription"]
- The standardized machine-readable prefixes for
OK
andCLOSED
are:duplicate
,pow
,blocked
,rate-limited
,invalid
,restricted
, anderror
for when none of that fits.
- The
-
@ 57d1a264:69f1fee1
2025-03-29 17:15:17- Once activated, "Accept From Any Mint” is the default setting. This is the easiest way to get started, let's the user start acceptance Cashu ecash just out of the box.
- If someone does want to be selective, they can choose “Accept From Trusted Mints,” and that brings up a field where they can add specific mint URLs they trust.
- “Find a Mint” section on the right with a button links directly to bitcoinmints.com, already filtered for Cashu mints, so users can easily browse options.
- Mint info modal shows mint technical details stuff from the NUT06 spec. Since this is geared towards the more technical users I left the field names and NUT number as-is instead of trying to make it more semantic.
originally posted at https://stacker.news/items/928800
-
@ fd06f542:8d6d54cd
2025-03-28 02:21:20NIPs
NIPs stand for Nostr Implementation Possibilities.
They exist to document what may be implemented by Nostr-compatible relay and client software.
- List
- Event Kinds
- Message Types
- Client to Relay
- Relay to Client
- Standardized Tags
- Criteria for acceptance of NIPs
- Is this repository a centralizing factor?
- How this repository works
- Breaking Changes
- License
List
- NIP-01: Basic protocol flow description
- NIP-02: Follow List
- NIP-03: OpenTimestamps Attestations for Events
- NIP-04: Encrypted Direct Message --- unrecommended: deprecated in favor of NIP-17
- NIP-05: Mapping Nostr keys to DNS-based internet identifiers
- NIP-06: Basic key derivation from mnemonic seed phrase
- NIP-07:
window.nostr
capability for web browsers - NIP-08: Handling Mentions --- unrecommended: deprecated in favor of NIP-27
- NIP-09: Event Deletion Request
- NIP-10: Text Notes and Threads
- NIP-11: Relay Information Document
- NIP-13: Proof of Work
- NIP-14: Subject tag in text events
- NIP-15: Nostr Marketplace (for resilient marketplaces)
- NIP-17: Private Direct Messages
- NIP-18: Reposts
- NIP-19: bech32-encoded entities
- NIP-21:
nostr:
URI scheme - NIP-22: Comment
- NIP-23: Long-form Content
- NIP-24: Extra metadata fields and tags
- NIP-25: Reactions
- NIP-26: Delegated Event Signing
- NIP-27: Text Note References
- NIP-28: Public Chat
- NIP-29: Relay-based Groups
- NIP-30: Custom Emoji
- NIP-31: Dealing with Unknown Events
- NIP-32: Labeling
- NIP-34:
git
stuff - NIP-35: Torrents
- NIP-36: Sensitive Content
- NIP-37: Draft Events
- NIP-38: User Statuses
- NIP-39: External Identities in Profiles
- NIP-40: Expiration Timestamp
- NIP-42: Authentication of clients to relays
- NIP-44: Encrypted Payloads (Versioned)
- NIP-45: Counting results
- NIP-46: Nostr Remote Signing
- NIP-47: Nostr Wallet Connect
- NIP-48: Proxy Tags
- NIP-49: Private Key Encryption
- NIP-50: Search Capability
- NIP-51: Lists
- NIP-52: Calendar Events
- NIP-53: Live Activities
- NIP-54: Wiki
- NIP-55: Android Signer Application
- NIP-56: Reporting
- NIP-57: Lightning Zaps
- NIP-58: Badges
- NIP-59: Gift Wrap
- NIP-60: Cashu Wallet
- NIP-61: Nutzaps
- NIP-62: Request to Vanish
- NIP-64: Chess (PGN)
- NIP-65: Relay List Metadata
- NIP-66: Relay Discovery and Liveness Monitoring
- NIP-68: Picture-first feeds
- NIP-69: Peer-to-peer Order events
- NIP-70: Protected Events
- NIP-71: Video Events
- NIP-72: Moderated Communities
- NIP-73: External Content IDs
- NIP-75: Zap Goals
- NIP-78: Application-specific data
- NIP-84: Highlights
- NIP-86: Relay Management API
- NIP-88: Polls
- NIP-89: Recommended Application Handlers
- NIP-90: Data Vending Machines
- NIP-92: Media Attachments
- NIP-94: File Metadata
- NIP-96: HTTP File Storage Integration
- NIP-98: HTTP Auth
- NIP-99: Classified Listings
- NIP-7D: Threads
- NIP-C7: Chats
Event Kinds
| kind | description | NIP | | ------------- | ------------------------------- | -------------------------------------- | |
0
| User Metadata | 01 | |1
| Short Text Note | 10 | |2
| Recommend Relay | 01 (deprecated) | |3
| Follows | 02 | |4
| Encrypted Direct Messages | 04 | |5
| Event Deletion Request | 09 | |6
| Repost | 18 | |7
| Reaction | 25 | |8
| Badge Award | 58 | |9
| Chat Message | C7 | |10
| Group Chat Threaded Reply | 29 (deprecated) | |11
| Thread | 7D | |12
| Group Thread Reply | 29 (deprecated) | |13
| Seal | 59 | |14
| Direct Message | 17 | |15
| File Message | 17 | |16
| Generic Repost | 18 | |17
| Reaction to a website | 25 | |20
| Picture | 68 | |21
| Video Event | 71 | |22
| Short-form Portrait Video Event | 71 | |30
| internal reference | NKBIP-03 | |31
| external web reference | NKBIP-03 | |32
| hardcopy reference | NKBIP-03 | |33
| prompt reference | NKBIP-03 | |40
| Channel Creation | 28 | |41
| Channel Metadata | 28 | |42
| Channel Message | 28 | |43
| Channel Hide Message | 28 | |44
| Channel Mute User | 28 | |62
| Request to Vanish | 62 | |64
| Chess (PGN) | 64 | |818
| Merge Requests | 54 | |1018
| Poll Response | 88 | |1021
| Bid | 15 | |1022
| Bid confirmation | 15 | |1040
| OpenTimestamps | 03 | |1059
| Gift Wrap | 59 | |1063
| File Metadata | 94 | |1068
| Poll | 88 | |1111
| Comment | 22 | |1311
| Live Chat Message | 53 | |1617
| Patches | 34 | |1621
| Issues | 34 | |1622
| Git Replies (deprecated) | 34 | |1630
-1633
| Status | 34 | |1971
| Problem Tracker | nostrocket | |1984
| Reporting | 56 | |1985
| Label | 32 | |1986
| Relay reviews | | |1987
| AI Embeddings / Vector lists | NKBIP-02 | |2003
| Torrent | 35 | |2004
| Torrent Comment | 35 | |2022
| Coinjoin Pool | joinstr | |4550
| Community Post Approval | 72 | |5000
-5999
| Job Request | 90 | |6000
-6999
| Job Result | 90 | |7000
| Job Feedback | 90 | |7374
| Reserved Cashu Wallet Tokens | 60 | |7375
| Cashu Wallet Tokens | 60 | |7376
| Cashu Wallet History | 60 | |9000
-9030
| Group Control Events | 29 | |9041
| Zap Goal | 75 | |9321
| Nutzap | 61 | |9467
| Tidal login | Tidal-nostr | |9734
| Zap Request | 57 | |9735
| Zap | 57 | |9802
| Highlights | 84 | |10000
| Mute list | 51 | |10001
| Pin list | 51 | |10002
| Relay List Metadata | 65, 51 | |10003
| Bookmark list | 51 | |10004
| Communities list | 51 | |10005
| Public chats list | 51 | |10006
| Blocked relays list | 51 | |10007
| Search relays list | 51 | |10009
| User groups | 51, 29 | |10013
| Private event relay list | 37 | |10015
| Interests list | 51 | |10019
| Nutzap Mint Recommendation | 61 | |10030
| User emoji list | 51 | |10050
| Relay list to receive DMs | 51, 17 | |10063
| User server list | Blossom | |10096
| File storage server list | 96 | |10166
| Relay Monitor Announcement | 66 | |13194
| Wallet Info | 47 | |17375
| Cashu Wallet Event | 60 | |21000
| Lightning Pub RPC | Lightning.Pub | |22242
| Client Authentication | 42 | |23194
| Wallet Request | 47 | |23195
| Wallet Response | 47 | |24133
| Nostr Connect | 46 | |24242
| Blobs stored on mediaservers | Blossom | |27235
| HTTP Auth | 98 | |30000
| Follow sets | 51 | |30001
| Generic lists | 51 (deprecated) | |30002
| Relay sets | 51 | |30003
| Bookmark sets | 51 | |30004
| Curation sets | 51 | |30005
| Video sets | 51 | |30007
| Kind mute sets | 51 | |30008
| Profile Badges | 58 | |30009
| Badge Definition | 58 | |30015
| Interest sets | 51 | |30017
| Create or update a stall | 15 | |30018
| Create or update a product | 15 | |30019
| Marketplace UI/UX | 15 | |30020
| Product sold as an auction | 15 | |30023
| Long-form Content | 23 | |30024
| Draft Long-form Content | 23 | |30030
| Emoji sets | 51 | |30040
| Curated Publication Index | NKBIP-01 | |30041
| Curated Publication Content | NKBIP-01 | |30063
| Release artifact sets | 51 | |30078
| Application-specific Data | 78 | |30166
| Relay Discovery | 66 | |30267
| App curation sets | 51 | |30311
| Live Event | 53 | |30315
| User Statuses | 38 | |30388
| Slide Set | Corny Chat | |30402
| Classified Listing | 99 | |30403
| Draft Classified Listing | 99 | |30617
| Repository announcements | 34 | |30618
| Repository state announcements | 34 | |30818
| Wiki article | 54 | |30819
| Redirects | 54 | |31234
| Draft Event | 37 | |31388
| Link Set | Corny Chat | |31890
| Feed | NUD: Custom Feeds | |31922
| Date-Based Calendar Event | 52 | |31923
| Time-Based Calendar Event | 52 | |31924
| Calendar | 52 | |31925
| Calendar Event RSVP | 52 | |31989
| Handler recommendation | 89 | |31990
| Handler information | 89 | | |32267
| Software Application | | | |34550
| Community Definition | 72 | |38383
| Peer-to-peer Order events | 69 | |39000-9
| Group metadata events | 29 |Message types
Client to Relay
| type | description | NIP | | ------- | --------------------------------------------------- | ----------- | |
EVENT
| used to publish events | 01 | |REQ
| used to request events and subscribe to new updates | 01 | |CLOSE
| used to stop previous subscriptions | 01 | |AUTH
| used to send authentication events | 42 | |COUNT
| used to request event counts | 45 |Relay to Client
| type | description | NIP | | -------- | ------------------------------------------------------- | ----------- | |
EOSE
| used to notify clients all stored events have been sent | 01 | |EVENT
| used to send events requested to clients | 01 | |NOTICE
| used to send human-readable messages to clients | 01 | |OK
| used to notify clients if an EVENT was successful | 01 | |CLOSED
| used to notify clients that a REQ was ended and why | 01 | |AUTH
| used to send authentication challenges | 42 | |COUNT
| used to send requested event counts to clients | 45 |Standardized Tags
| name | value | other parameters | NIP | | ----------------- | ------------------------------------ | ------------------------------- | -------------------------------------------------- | |
a
| coordinates to an event | relay URL | 01 | |A
| root address | relay URL | 22 | |d
| identifier | -- | 01 | |e
| event id (hex) | relay URL, marker, pubkey (hex) | 01, 10 | |E
| root event id | relay URL | 22 | |f
| currency code | -- | 69 | |g
| geohash | -- | 52 | |h
| group id | -- | 29 | |i
| external identity | proof, url hint | 35, 39, 73 | |I
| root external identity | -- | 22 | |k
| kind | -- | 18, 25, 72, 73 | |K
| root scope | -- | 22 | |l
| label, label namespace | -- | 32 | |L
| label namespace | -- | 32 | |m
| MIME type | -- | 94 | |p
| pubkey (hex) | relay URL, petname | 01, 02, 22 | |P
| pubkey (hex) | -- | 22, 57 | |q
| event id (hex) | relay URL, pubkey (hex) | 18 | |r
| a reference (URL, etc) | -- | 24, 25 | |r
| relay url | marker | 65 | |s
| status | -- | 69 | |t
| hashtag | -- | 24, 34, 35 | |u
| url | -- | 61, 98 | |x
| hash | -- | 35, 56 | |y
| platform | -- | 69 | |z
| order number | -- | 69 | |-
| -- | -- | 70 | |alt
| summary | -- | 31 | |amount
| millisatoshis, stringified | -- | 57 | |bolt11
|bolt11
invoice | -- | 57 | |challenge
| challenge string | -- | 42 | |client
| name, address | relay URL | 89 | |clone
| git clone URL | -- | 34 | |content-warning
| reason | -- | 36 | |delegation
| pubkey, conditions, delegation token | -- | 26 | |description
| description | -- | 34, 57, 58 | |emoji
| shortcode, image URL | -- | 30 | |encrypted
| -- | -- | 90 | |expiration
| unix timestamp (string) | -- | 40 | |file
| full path (string) | -- | 35 | |goal
| event id (hex) | relay URL | 75 | |image
| image URL | dimensions in pixels | 23, 52, 58 | |imeta
| inline metadata | -- | 92 | |lnurl
|bech32
encodedlnurl
| -- | 57 | |location
| location string | -- | 52, 99 | |name
| name | -- | 34, 58, 72 | |nonce
| random | difficulty | 13 | |preimage
| hash ofbolt11
invoice | -- | 57 | |price
| price | currency, frequency | 99 | |proxy
| external ID | protocol | 48 | |published_at
| unix timestamp (string) | -- | 23 | |relay
| relay url | -- | 42, 17 | |relays
| relay list | -- | 57 | |server
| file storage server url | -- | 96 | |subject
| subject | -- | 14, 17, 34 | |summary
| summary | -- | 23, 52 | |thumb
| badge thumbnail | dimensions in pixels | 58 | |title
| article title | -- | 23 | |tracker
| torrent tracker URL | -- | 35 | |web
| webpage URL | -- | 34 | |zap
| pubkey (hex), relay URL | weight | 57 |Please update these lists when proposing new NIPs.
Criteria for acceptance of NIPs
- They should be fully implemented in at least two clients and one relay -- when applicable.
- They should make sense.
- They should be optional and backwards-compatible: care must be taken such that clients and relays that choose to not implement them do not stop working when interacting with the ones that choose to.
- There should be no more than one way of doing the same thing.
- Other rules will be made up when necessary.
Is this repository a centralizing factor?
To promote interoperability, we need standards that everybody can follow, and we need them to define a single way of doing each thing without ever hurting backwards-compatibility, and for that purpose there is no way around getting everybody to agree on the same thing and keep a centralized index of these standards. However the fact that such an index exists doesn't hurt the decentralization of Nostr. At any point the central index can be challenged if it is failing to fulfill the needs of the protocol and it can migrate to other places and be maintained by other people.
It can even fork into multiple versions, and then some clients would go one way, others would go another way, and some clients would adhere to both competing standards. This would hurt the simplicity, openness and interoperability of Nostr a little, but everything would still work in the short term.
There is a list of notable Nostr software developers who have commit access to this repository, but that exists mostly for practical reasons, as by the nature of the thing we're dealing with the repository owner can revoke membership and rewrite history as they want -- and if these actions are unjustified or perceived as bad or evil the community must react.
How this repository works
Standards may emerge in two ways: the first way is that someone starts doing something, then others copy it; the second way is that someone has an idea of a new standard that could benefit multiple clients and the protocol in general without breaking backwards-compatibility and the principle of having a single way of doing things, then they write that idea and submit it to this repository, other interested parties read it and give their feedback, then once most people reasonably agree we codify that in a NIP which client and relay developers that are interested in the feature can proceed to implement.
These two ways of standardizing things are supported by this repository. Although the second is preferred, an effort will be made to codify standards emerged outside this repository into NIPs that can be later referenced and easily understood and implemented by others -- but obviously as in any human system discretion may be applied when standards are considered harmful.
Breaking Changes
License
All NIPs are public domain.
Contributors
-
@ 42c85a20:14afbc38
2025-03-29 15:40:00Back when Twitter was censoring free speech nostr looked like the only alternative where people would migrate and grow the network; however, now that X is open to free thinking, the perfect storm to enable nostr to grow has been quelled.
How will the nostr universe ever expand unless people in the main stream "centralized" social medias see the light? The illusion of free speech on X is dangerous as people blindly give their trust that the rug will not be pulled; and willingly remain under a tyrannical system.
Perhaps there is some other utility which nostr would be useful for vs just another version of twillter; like exit polls for elections which could fail safe the integrity of voting; or community BBS (bulletin boards) where the people can connect with their neighbours without giving up their real address or identity.
When the main stream social medias' fail again; the next time they break the trust of the people, we must be ready to replace them; we must think outside the box now and build those decentralized utilities now.
-
@ ff517fbf:fde1561b
2025-03-29 15:37:34はじめに:なぜKYCなしP2P取引か
ビットコインは元々、ピア・ツー・ピア(P2P)の電子通貨システムとして設計されました。サトシ・ナカモトのビットコイン白書でも、「信頼ではなく暗号学的証明に基づく電子決済システム」によって、第三者を介さずに当事者同士が直接取引できることが必要だと述べられています。つまり、本来ビットコインは銀行などの仲介者なしで個人同士が直接送金・売買できる社会的意義を持っているのです。
しかし現在、多くの暗号資産取引所では規制上の理由からKYC(本人確認)手続きが求められ、個人情報の提出が必要です。KYCはユーザーのプライバシー喪失やデータ漏洩リスクにつながりかねず、また口座凍結や資金没収といった中央集権的管理のリスクもあります。経済的にも、第三者を介することで手数料が高くなったり、地域によっては銀行や政府の制限でビットコインの購入が困難になる場合もあります。
こうした背景からノンKYCのP2P取引プラットフォームを利用するメリットは大きいです。例えば HodlHodl(@npub1yul83qxn35u607er3m7039t6rddj06qezfagfqlfw4qk5z5slrfqu8ncdu) は、匿名で世界中のユーザーと直接ビットコインを売買できるグローバルなP2Pマーケットプレイスです。HodlHodlではユーザー同士が直接取引し、サイト運営側はビットコインを一切預かりません。取引はマルチシグエスクロー(2-of-3の多重署名契約)で安全に管理され、取引手数料も最大0.5%と低く抑えられています。プライバシーとセキュリティを確保しながら、銀行口座や身分証なしでビットコインを売買できるため、社会的にも経済的にも大きな意義があります。
本チュートリアルでは、HodlHodlを使ってビットコインを購入・販売する具体的な手順を分かりやすく解説します。また、HodlHodlの安全性(マルチシグエスクローによる非中央集権型の管理)や、他のプラットフォームにはない特徴(本人確認不要、ユーザー自身による鍵の管理、APIやレンディングサービスの活用など)についても説明します。P2P取引に不慣れで不安を感じている方にも安心してご利用いただけるよう、丁寧で親しみやすい言葉で案内していきます。
HodlHodlの基本準備
アカウント登録: HodlHodlの利用を開始するには、まず無料のアカウント登録を行います。必要なのはメールアドレスとパスワードだけで、ユーザー名や身分証の提出は不要です。登録後に届く確認メール内のリンクをクリックすれば、すぐに取引を始められます。
ビットコインウォレットの用意: HodlHodlは取引の際にユーザー自身のビットコインウォレットを使用するノンカストディアル方式です。プラットフォーム上にウォレットは用意されていないため、事前に自分のビットコインウォレットを準備してください。例えばモバイルウォレットやハードウェアウォレットなど、自分だけが秘密鍵を管理できるウォレットを用意しましょう。買い手の場合は購入したビットコインを受け取るウォレットが必要になり、売り手の場合は売却するビットコインを自身のウォレットからエスクローに送金する必要があります。
ビットコインを購入する方法(Buy BTC)
それでは、HodlHodlでビットコインを購入(Buy) する手順を見ていきましょう。以下では、日本円(JPY)を銀行振込で支払ってビットコインを買う例を想定して説明しますが、基本的な流れは他の通貨や支払い方法でも同じです。
-
「Buy BTC」をクリックする: HodlHodlにログインし、画面上部のヘッダー左側にある「Buy BTC」ボタンをクリックします。これにより、現在出ているビットコイン売り注文(オファー)の一覧ページに移動します。
-
検索フィルターの設定: オファー一覧ページでは、自分の希望条件でオファーを絞り込むことができます。国、法定通貨、取引タイプ、支払い方法、金額などのフィルター項目があります。例えば日本で銀行振込により購入したい場合、「Country(国)」をJapan、「Currency(通貨)」をJPY、「Payment method(支払い方法)」を Bank Transfer 銀行振込に設定します(他の項目は必要に応じて指定します)。フィルターは任意ですが、自分に合った支払い方法や金額範囲のオファーを探すのに役立ちます。
-
オファーを選ぶ: フィルターを適用すると、条件に合致する売り手のオファー一覧が表示されます。各オファーにはレート(価格)、取引可能額範囲、支払い方法、売り手の評価などが記載されています。希望に合うオファーが見つかったら、そのオファーの詳細をクリックします。例えば「1 BTC = 〇〇JPY」のようなレートで、自分が購入したい額に対応できるオファーを選びましょう。初めて取引する場合は、評価の高い売り手や少額からの取引を選ぶと安心です。
-
購入量と受取アドレスの入力: オファーをクリックすると、取引の詳細入力画面になります。ここで購入したいビットコインの量を入力します(ビットコイン量あるいは法定通貨換算額のどちらでも入力可能です)。多くの場合、最低・最大取引額が決まっているので、その範囲内で入力してください。また、ビットコインの受取先アドレスを求められます。これは購入後にビットコインを受け取る自分のウォレットアドレスです。アカウントの設定で事前に登録したアドレスがあれば自動で表示されますが、都度指定することも可能です。さらに、支払い方法が複数指定されているオファーでは希望の支払い方法を選択します(例:銀行振込の中でも特定の銀行を指定できる場合があります)。最後に、取引相手(売り手)への伝達メッセージ欄があれば、必要に応じてコメントを記入します。入力が完了したら内容を確認し、「Create contract(契約作成)」 的なボタンを押して取引を開始します。
-
エスクローアドレスの生成: 契約が作成されると、取引画面上にエスクロー(第三者保管用マルチシグアドレス)を生成するための手順が表示されます。ここで 「Generate escrow(エスクロー生成)」 ボタンをクリックし、プラットフォームに登録したペイメントパスワード(支払い用パスワード)を入力します。ペイメントパスワードはHodlHodlで取引の署名に使われる特別なパスワードで、初回取引時に設定しておく必要があります。正しく入力すると、この取引専用のビットコインエスクローアドレスが自動生成されます。あとは売り手がそのエスクローアドレスにビットコインを入金するのを待ちます。画面上に「waiting for deposit(入金待ち)」等のステータスが表示されるので、しばらく待機してください。売り手が約束のビットコイン額をエスクローに送金し、一定のブロック承認(Confirmations)が得られると、取引ステータスが自動で更新されます。
-
エスクロー入金の確認: ビットコインがマルチシグエスクローにロックされ、取引ステータスが「In progress(進行中)」や「Deposited(入金済み)」といった表示に変わったことを必ず確認します。ステータス表示とブロックチェーン上の確認回数が条件を満たしたら、支払いを実行しても安全な状態であることを意味します(エスクローにロックされたビットコインは売り手単独では動かせません。取引ページには売り手が指定した支払い詳細(銀行口座情報など)が記載されていますので、その指示に従って売り手へ法定通貨の支払い(振込)を行います。例えば銀行振込の場合、指定された口座にJPYを送金します。この段階では、必ず取引ページを開いたままにしておきましょう。 支払いが完了したら、取引ページ上の「I’ve sent the payment(送金完了)」ボタンをクリックして、売り手に支払い実行済みであることを通知します。併せて、チャット機能で支払い完了の旨を伝えると良いでしょう。
-
売り手によるビットコインのリリース: 買い手からの支払いが完了すると、売り手は自分の銀行口座等を確認して入金を検証します。売り手が入金を確認したら、取引ページ上で 「Release Bitcoin(ビットコインをリリース)」 ボタンを押し、ペイメントパスワードを入力してエスクローからビットコインを開放します。これにより、エスクロー上のビットコインが買い手の指定アドレス(先ほど入力した受取用ウォレットアドレス)に送信されます。売り手がビットコインをリリースすると取引ステータスが「Released(解放済み)」に変わり、まもなくブロックチェーン上で買い手のウォレットにビットコイン着金が確認できるでしょう。
-
取引完了: ビットコインが無事自分のウォレットに届けば取引完了です。取引ページには「Completed(完了)」などのステータスが表示され、双方がお互いを評価できるようになります。初めてのP2P購入、お疲れさまでした! 🎉
💡 重要な注意事項(買い手向け): エスクローにビットコインがロックされる前に代金を支払ってはいけません。必ず取引ステータスが「Deposited」や「In progress」になるのを確認してから支払いを実行してください。また、取引には売り手が入金を確認してからビットコインをリリースするまでの制限時間(Payment window)が設定されています。時間内に支払いが完了しないと取引が自動キャンセルされる場合がありますのでご注意ください。困ったことがあれば、取引ページのチャットで相手に連絡することもできます。万一、支払いを送ったのに売り手がビットコインをリリースしない場合は、支払い期限が過ぎてからディスピュート(紛争解決手続き) を開始することも可能です。
ビットコインを販売する方法(Sell BTC)
次に、HodlHodlでビットコインを販売(Sell) する手順を説明します。基本的な流れは購入時と似ていますが、立場が逆になる点(自分がビットコインをエスクローに預け、買い手からの支払いを待つ点)に注意してください。以下では、日本で銀行振込によりJPYを受け取ってビットコインを売る場合を例に解説します。
-
「Sell BTC」をクリックする: HodlHodlにログイン後、画面上部左側の「Sell BTC」ボタンをクリックします。これで現在出ているビットコイン買い注文(買い手のオファー)一覧ページに移動します。
-
検索フィルターの設定: 買い手オファー一覧から、自分が対応可能な条件のオファーを探します。フィルター項目はBuyの場合と同様で、国、通貨、支払いタイプ、支払い方法、金額などを指定できます。日本円での銀行振込を希望する買い手を探す場合、国をJapan、通貨をJPY、支払い方法をBank Transferに設定して検索します。
-
オファーを選ぶ: 条件に合致する買い手のオファーが一覧表示されるので、希望に合うものをクリックします。各オファーには買い手が希望するレートや取引限度額、支払い方法、買い手の評価などが記載されています。有利なレートかつ信頼できそうな相手を選びましょう。初取引で不安な場合は、小額で高評価の買い手から始めるとよいです。
-
売却量と受取情報の入力: オファー詳細画面で、売却したいビットコイン量を入力します(または必要な法定通貨額)。オファーごとに最低・最大額が設定されているので範囲内で入力してください。続いてビットコインの受取アドレス欄がありますが、これは取引完了時に買い手がビットコインを受け取るアドレスです。売り手である自分が入力する必要は基本的になく、買い手側が受取先を指定するか、既に買い手のダッシュボード設定で決まっています。次に、受け取りたい支払い方法が複数記載されている場合は希望の方法を選択します(例えば「Bank Transfer」の中でも特定の銀行名など)。コメント欄があれば取引相手(買い手)へのメッセージを任意で入力します。内容を確認し問題なければ 「Create contract(契約作成)」 ボタンを押して取引を開始します。
-
エスクローアドレスの生成: 契約が作成されると、エスクロー用のビットコインアドレスを生成する段階に進みます。ここで 「Generate escrow」 ボタンをクリックし、ペイメントパスワードを入力します(買い手の手順と同様)。これにより、この取引専用のマルチシグエスクローアドレスが発行されます。次に 自分(売り手)が売却予定のビットコインをエスクローアドレスに送金 します。取引画面上に正確なBTC額と対応するQRコードが表示されるので、自分のウォレットからそのアドレスへ送金してください。送金したら 「I’ve sent the funds(送金完了)」 ボタンを押してビットコインをエスクローに預けたことを通知します。
-
エスクローへのビットコインロック: ビットコインを送金するとブロックチェーン上で一定回数の承認(Confirmations)を経て、エスクローにロックされます。取引ステータスが「In progress(進行中)」や「Deposited」に変わり、買い手は安心して支払いを行える状態になります。あとは買い手からの法定通貨支払いを待ちます。取引画面で支払い期限(Payment window)内に買い手が支払いを完了し、「支払い送信済み」のボタンを押すとステータスが「Paid(支払い済み)」に変わります。
-
支払いの受領確認: ステータスが「Paid」になったら、買い手が送金を完了したことを意味します。すぐに自分の銀行口座など該当の支払い方法で入金を確認しましょう。金額が全額正しく受け取れたことを確認できたら、取引ページ上で 「Release deposit(デポジットを解放)」 ボタンをクリックし、ペイメントパスワードを入力してエスクローのビットコインを開放します。これにより、エスクローにロックされていたビットコインが買い手に送付されます。
-
取引完了: ビットコインをリリースすれば取引完了。ステータスが「Completed」に変わり、買い手は間もなく自分のウォレットでビットコインを受け取るでしょう。最後にお互いを評価して取引終了となります。初めてのP2P売却、お疲れさまでした! 🎉
💡 重要な注意事項(売り手向け): 支払いを受け取る前にビットコインをエスクローから**絶対にリリースしないでください。買い手からの入金を自分の銀行口座等で確実に確認できてから、ビットコインを解放するようにしましょう。また、もしビットコインをエスクローに送金した後で買い手から支払いが行われず期限切れ(Payment window経過)になった場合、取引をキャンセルしてエスクローのビットコインを自分に返還することができます。取引中は常に取引相手とのチャットで連絡を取り合い、不明点を確認するよう心がけましょう。
HodlHodlの安全性:マルチシグと非カストディアル設計
● マルチシグエスクローによる資金保護: HodlHodl最大の特徴は、2-of-3のマルチシグエスクロー(multisignature escrow)によって取引資金を保護している点です。取引が成立すると、自動的に3つの秘密鍵が関与するビットコインアドレスが生成されます。この3つの鍵のうち2つの署名があれば資金を動かせる仕組みになっており、鍵の配分は「売り手」「買い手」「HodlHodl運営」の三者にそれぞれ1つです。取引中、ビットコインはブロックチェーン上のエスクローアドレスにロックされ、双方の合意なしには動かせまん。つまり、売り手は買い手の同意なしにビットコインを引き出すことはできず、逆に買い手も売り手の協力なしにビットコインを入手することはできません。両者が取引を完了すれば売り手+買い手の2署名でリリースが可能となり、万一トラブルが起きた場合にはHodlHodl運営が仲裁役として(買い手または売り手の一方と協力し)2署名目を提供することで不正を防ぎます。このようにマルチシグ契約によって、詐欺や持ち逃げのリスクを最小限に抑え、安全かつ公平な取引が実現されています。
● 非カストディアル(ユーザー主導の資金管理): HodlHodlは取引プラットフォームでありながら、ユーザー資金を一切預からないという非カストディアル設計を貫いています。取引中のビットコインは常にマルチシグエスクローにあり、HodlHodl運営が単独で動かすことはできません。これはつまり、中央集権的な取引所とは異なり、HodlHodlがハッキング被害に遭ってもユーザーのビットコインが盗まれる心配がないことを意味します。またプラットフォームが万一ダウンしたりサービス提供を停止した場合でも、当事者間で2つの鍵さえあればエスクローのビットコインを取り戻すことが可能です(※この場合やや技術的な手順が必要になりますが、HodlHodlが完全に消失するケースでも資金はブロックチェーン上に安全に存在し続けます)。HodlHodl運営は3つの鍵のうち1つを保有するのみで、しかもそれは紛争時の仲裁に使うためのものです。通常の取引では運営が介在することなく、ユーザー同士で完結します。以上のように、HodlHodlはカストディアルな第三者を排除し、利用者自身が資金と取引の主導権を握るというビットコイン本来の精神に沿った安全設計となっています。
● 評判システムと取引履歴: HodlHodlでは、各ユーザーに公開の評価(Rating)と取引履歴が紐づいています。取引を完了するごとに互いにレビューを残せるため、他ユーザーの信頼度を事前に知ることができます。初めて取引する相手がどんな評価を受けているか、過去の取引回数や成功率などの情報を確認することで、怪しい相手を避けることが可能です。特に初心者のうちは評価の高い相手を選ぶ、もしくは身近に信頼できるユーザーがいればトラスト機能(他のP2Pプラットフォームでの実績を証明する仕組みや信用できるユーザーをお気に入り登録する機能)を活用すると良いでしょう。
● 二要素認証(2FA)と信頼できる端末: アカウントの不正アクセス対策として、HodlHodlは二段階認証(2FA)のオプションを提供しています。AuthyやGoogle Authenticatorと連携し、一度設定すればログイン時にパスワードに加え6桁のコード入力が求められるようになります。これにより、万一パスワードが漏洩しても本人のデバイスがなければログインできず、アカウントを保護できます。またTrusted Devices(信頼できる端末)機能を有効にすると、新しいデバイスからログインしようとした際にメール確認が必要となり、ユーザーの許可なく不審な端末からアクセスされるのを防ぎます。初心者の方でも、アカウント登録後は設定画面から2FAや信頼できる端末機能を有効化しておくことを強くおすすめします。
● ディスピュート(紛争解決)機能: 万が一取引相手との間でトラブルが発生した場合(例:買い手は支払ったと主張しているが売り手が確認できない等)、HodlHodlのプラットフォーム上でディスピュート(紛争)を開始することができます。ディスピュートが発生すると、HodlHodlのサポートチームが両者から事情を聞き、中立的な立場で問題解決に当たります。必要に応じて前述の運営のマルチシグ鍵を用いて適切な側にビットコインをリリースするなど、公平な裁定が行われます。ディスピュートは最終手段ではありますが、万一の場合の安心材料として覚えておいてください。
以上のように、HodlHodlは技術的・制度的な多層防御によってユーザーの資金と取引の安全を確保しています。他のユーザーの評価を確認する、取引手順を順守する(エスクロー未成立での送禁止等、アカウントのセキュリティ設定を有効にするといったユーザー自身の注意もあわせて心掛ければ、P2P取引でも安心してビットコインを利用できるでしょう。
HodlHodlの特徴:他プラットフォームとの違い
最後に、HodlHodlが他のビットコイン取引サービスと比べて優れている点、特徴的な点を整理します。初めて利用する際の不安解消にもつながるポイントです。
-
🌐 KYC不要の匿名取引: HodlHodl最大の特徴は、本人確認(KYC)なしでビットコイン取引ができる点です。メールアドレスさえあれば世界中誰でも利用開始でき、パスポートや身分証の提出は一切求められません。これはプライバシー保護の面で大きな利点ですし、取引履歴が本人名義に紐付かないため将来的な資産没収や口座凍結のリスクも低減します。規制が厳しい地域のユーザーや銀行口座を持てない人々でも、HodlHodlならビットコイン経済に参加しやすくなっています。
-
🔐 ユーザーが鍵を管理する非中央集権型取引: 前述の通り、HodlHodlはノンカストディアルなP2P取引所であり、ユーザー自身が資産の鍵を管理します。取引ごとにマルチシグのエスクローが生成され、利用者はその一方の鍵を保持します。そのため「取引所にビットコインを預けっぱなしにしていたらハッキングで失った」といった事態が起こりません。常に自身のウォレットから直接取引を行うため、ビットコインの自主管理の原則**が守られています。中央集権的な管理者がいない分、自分で秘密鍵を安全に保管する責任は伴いますが、その分だけ第三者リスクが排除された公平な環境と言えます。
-
💱 世界中の通貨と多様な決済方法に対応: HodlHodlはグローバルなプラットフォームであり、世界中のあらゆる法定通貨 で取引できます。現在100を超える国の通貨と地域が利用されており、取引に使える決済方法も100種類以上と非常に豊富です。銀行振込やオンライン決済サービスはもちろん、現金の対面受け渡しやギフトカード、電子マネー、モバイル送金、さらには商品と交換などユニークな方法までユーザーが自由にオファーを作成できます。これにより、自分の利用しやすい手段で取引相手を見つけられる柔軟性があります。他のプラットフォームだと対応通貨や決済手段が限定されがちですが、HodlHodlでは*「自分の条件でオファーを作成できる」 の強みです。
-
💰 低い手数料と透明な料金体系: HodlHodlの取引手数料は一律0.5%(買い手と売り手で折半で各0.25%ずつ負担)と比較的低コストです。しかも手数料は取引成立時にビットコイン額から自動控除される仕組みで、隠れたコストがありません。さらに紹介プログラムを利用すると0.45%に割引されるなどの優遇もあります。入出金に伴う手数料も基本的に存在せず、各自が使うウォレットの送金手数料以外に余計な負担はありません。他の取引所でありがちな「出金手数料が高額」「スプレッドが不透明」といった心配もなく、明朗会計でユーザーに優しい料金体系です。
-
🤝 初心者に優しいインターフェース: P2P取引というと難しそうな印象を持たれるかもしれませんが、HodlHodlのサイトはシンプルで直感的なインターフェースになっています。必要な操作は「Buy BTC / Sell BTC」ボタンから進んでフォームに入力していくだけで、画面の指示に沿って進めれば迷うことは少ないでしょう。サイトは現在ウェブブラウザ経由で利用しますが、スマートフォンのブラウザからでも見やすく設計されています。専用アプリはありませんが、その分アップデート時にもすぐ全員が最新機能を利用できます(ダウンロード不要で常に最新版が提供されるメリットです。また、取引画面にはリアルタイムのチャット機能があり、相手ユーザーと直接コミュニケーションを取れるため安心です。困ったときは相手に質問したり状況を確認できるので、言葉の壁がある場合でも定型文や翻訳を活用して意思疎通できます。
-
🛠 API提供による拡張性: HodlHodlは上級ユーザーや開発者向けに**公式APIを提供しています。APIを利用すると、自分のプログラムからHodlHodl上のオファー取得や契約作成、ステータス更新などを自動化することが可能です。例えば、マーケットメーカーとしてレートを自動調整したり、他のサービスと連携して複数のP2P取引所のオファーを比較表示する、といった応用ができます。APIキーはプロフィール設定から発行でき、ドキュメントも公開されているため高度な取引戦略を実装したいユーザーには魅力的な機能です。PaxfulやLocalBitcoinsなど一部他サービスでもAPIは提供されていますが、HodlHodlのAPIはエスクロー操作まで含め包括的にサポートしている点で強力です。
-
💳 ビットコインレンディングサービス: HodlHodlは現物取引だけでなく、ビットコイン担保のレンディング(貸借)プラットフォームも運営しています。サイト上部の「P2P Lending(レンディング)」からアクセスでき、ビットコインを担保にUSDTなど他の暗号資産を借りたり、あるいは逆に他の人に貸し出して利息収入を得ることができます。技術的には取引プラットフォームと同じマルチシグエスクロー方式を用いており、借り手がビットコインを担保としてエスクローにロックし、貸し手が安定通貨を送金することでローン契約が成立します。期間満了時に借り手が返済すればビットコイン担保が戻り、返済不能(延滞や価格変動での清算)の場合は貸し手に担保が渡る仕組みです。驚くべきことに、このレンディングサービスでも一切KYCは要求されません。短期のビットコイン活用や利息収入を得たいニーズに応えるユニークなサービスであり、HodlHodlを使いこなせば「ビットコインを売買するだけでなく、借りたり貸したりする」といった金融活用も可能になります。P2P Lendingについては、今後別のチュートリアルで詳しく説明します。
-
🧪 テストネットで練習可能: 「いきなり本番は不安…」という方向けに、HodlHodlはテストネット版サイトも提供しています。TESTNETでは、本物のビットコインではなくテスト用のビットコイン(signet**ネットワークのBTC)を使って、実際の取引手順を練習できます。架空の資金でHodlHodlの操作感を試せるため、初心者はまずテストネットで売買の流れをシミュレーションしてみると良いでしょう。十分に慣れてから本番取引に移行すれば、落ち着いて対処できます。テストネットBTCは各種ファウンセット(蛇口サイト hhtestnet.com)から無料でもらうことができ、HodlHodlのテスト環境で練習するのに役立ちます。
以上がHodlHodlの主な特徴と利点です。匿名性・安全性・使いやすさを兼ね備えたHodlHodlは、まさに「ビットコインをネイティブにP2P利用する」ための理想的なプラットフォームと言えるでしょう。初めは不安もあるかもしれませんが、本チュートリアルで説明した手順に沿って取引を行えば、きっとその手軽さと利便性に驚くはずです。ぜひHodlHodlでのP2P取引に挑戦してみてください。自分自身でビットコインを扱う経験を通じて、ビットコインの真の価値である「個人が金融の主導権を握ること」を実感できるでしょう🚀
もしビットコインのP2P取引やHodlHodlなどについてもっと深く知りたい、あるいは個別に相談してみたいと思えば、どうぞお気軽にご連絡ください。1対1のコンサルも承っています。
サービスには決まった料金はありませんが、ご相談を通じて「役に立った」と思い、お悩みや疑問を解決できたと感じていただけたら、「3つのT」でのご支援(Value for Value)をぜひご検討ください:
- 時間(Time):この記事をSNSなどでシェアしていただくこと。
- 才能(Talent):コメントや補足情報などを通じて知識を共有していただくこと。
- 宝(Treasure):世界で最も健全なお金、ビットコインの最小単位「sats」でのご支援。
もちろん、支援の有無にかかわらず、お力になれればとても嬉しいです。 では、また次回!
参考資料
- Bitcoin Whitepaper - Bitcoin: A Peer-to-Peer Electronic
- HodlHodl公式サイト - Welcome to Hodl ([P2P BITCOIN TRADING platform]
- HodlHodlヘルプセンター - How to buy Bitcoin / How to sell Bitcoin
- HodlHodlヘルプセンター - Why is trading on Hodl Hodl secure
- HodlHodl FAQ - Why should I use HodlHodl、How secure is trading on HodlHodl
- HodlHodl Medium - Hodl Hodl’s API release
- HodlHodl Lend FAQ - What is Lend a ([Earn Highest Returns on Your Crypto Investment - Lend at Hodl Hodl]
- ZoneBitcoin - Hodl Hodl: Tutorial on the anonymous and KYC-free P2P platform
- など
-
-
@ fd06f542:8d6d54cd
2025-03-28 02:14:43{"coverurl":"https://cdn.nostrcheck.me/fd06f542bc6c06a39881810de917e6c5d277dfb51689a568ad7b7a548d6d54cd/5ad7189d30c9b49aa61652d98ac7853217b7e445f863be09f9745c49df9f514c.webp","title":"Nostr protocol","author":"fiatjaf"}
-
@ e4950c93:1b99eccd
2025-03-29 14:49:11 -
@ 7d33ba57:1b82db35
2025-03-27 20:54:55Andorra la Vella, the capital of Andorra, is a charming mix of mountain landscapes, duty-free shopping, and rich history. Nestled in the Pyrenees, it’s a great destination for skiing, hiking, and relaxing in thermal spas. Whether you’re here for outdoor adventures, tax-free shopping, or cultural experiences, Andorra la Vella has something for everyone.
🏔️ Top Things to See & Do in Andorra la Vella
1️⃣ Shop in Avinguda Meritxell 🛍️
- One of Europe’s best duty-free shopping streets, filled with electronics, fashion, perfumes, and luxury goods.
- Find brands at lower prices than in Spain or France.
2️⃣ Relax at Caldea Spa ♨️
- The largest thermal spa in Southern Europe, with hot springs, saunas, and lagoon pools.
- A perfect place to unwind after skiing or hiking.
3️⃣ Visit the Church of Sant Esteve ⛪
- A beautiful Romanesque church dating back to the 12th century.
- Features stone carvings and medieval frescoes.
4️⃣ Explore the Historic Quarter (Barri Antic) 🏡
- Walk through narrow cobbled streets filled with traditional Andorran houses and charming cafés.
- Visit Casa de la Vall, a historic parliament building from the 16th century.
5️⃣ Go Skiing or Snowboarding 🎿
- Andorra is famous for its world-class ski resorts, Grandvalira and Vallnord, just 15-30 minutes away.
- Ideal for beginners and experienced skiers alike.
6️⃣ Hiking in the Pyrenees 🥾
- Summer & autumn offer incredible hiking trails with mountain lakes and scenic views.
- Rec del Solà Trail – A beautiful, easy path with panoramic views of the valley.
- L’Estany Blau – A moderate hike leading to a stunning blue lake.
7️⃣ Enjoy Andorran Cuisine 🍽️
- Escudella – A hearty Andorran stew with meat, beans, and vegetables 🍲
- Trinxat – A mountain dish made of potatoes, cabbage, and bacon 🥓🥔
- Embotits – Local cured meats and sausages, perfect as tapas 🍖
- Crema Andorrana – A creamy, local dessert similar to Catalan crema 🍮
🚗 How to Get to Andorra la Vella
✈️ By Air: The nearest airports are Barcelona-El Prat (Spain, 2.5 hrs) and Toulouse-Blagnac (France, 2.5 hrs).
🚘 By Car: 2.5 hrs from Barcelona, 2.5 hrs from Toulouse, 3 hrs from Perpignan.
🚌 By Bus: Direct buses from Barcelona, Toulouse, and Lleida.
🚆 By Train: No direct train, but you can take a train to L'Hospitalet-près-l'Andorre (France) and continue by bus.💡 Tips for Visiting Andorra la Vella
✅ Best time to visit? Winter for skiing, summer for hiking & shopping ❄️🌞
✅ Bring a passport – Even though Andorra isn’t in the EU, border checks happen 🇦🇩
✅ Try duty-free shopping – Electronics, perfumes, and alcohol are cheaper 🛍️
✅ Book ski passes in advance – Resorts get busy in peak season 🎿
✅ Wear comfy shoes – The city has steep streets and cobblestone paths 👟 -
@ 7d33ba57:1b82db35
2025-03-27 20:23:58Peñíscola, known as the “Gibraltar of Valencia”, is a stunning coastal town on Spain’s Costa del Azahar. Famous for its medieval castle, beautiful beaches, and charming old town, Peñíscola is a perfect mix of history, culture, and seaside relaxation. It’s also known as a filming location for Game of Thrones!
🏖️ Top Things to See & Do in Peñíscola
1️⃣ Peñíscola Castle (Castillo del Papa Luna) 🏰
- A magnificent 13th-century castle sitting on a rocky peninsula.
- Built by the Knights Templar and later home to Pope Benedict XIII (Papa Luna).
- Offers breathtaking views of the Mediterranean and surrounding coastline.
2️⃣ Explore the Old Town 🏡
- Wander through narrow cobblestone streets, lined with whitewashed houses and flower-filled balconies.
- Discover hidden courtyards, charming shops, and seafood restaurants.
- Enjoy the picturesque sunset views over the sea.
3️⃣ Relax on Playa Norte & Playa Sur 🏖️
- Playa Norte: The main beach, known for its golden sand and clear waters.
- Playa Sur: Smaller and quieter, great for relaxing away from the crowds.
- Both beaches offer water sports, sunbeds, and beach bars.
4️⃣ Serra d’Irta Natural Park 🌿
- A stunning coastal nature reserve with hiking and biking trails.
- Offers hidden coves, rugged cliffs, and breathtaking sea views.
- Ideal for nature lovers and photographers.
5️⃣ Game of Thrones Filming Locations 🎬
- Peñíscola was featured in Game of Thrones (Season 6) as Meereen.
- Visit the castle walls, old town alleys, and city gates where key scenes were filmed.
6️⃣ Boat Trip Around the Castle ⛵
- Take a boat tour for unique views of the fortress from the sea.
- Sunset cruises offer magical golden-hour scenery.
🍽️ What to Eat in Peñíscola
- Arroz a Banda – A delicious seafood rice dish, typical of Valencia 🍚🐟
- Suquet de Peix – A traditional fish stew with potatoes and saffron 🍲
- Langostinos de Vinaròs – Famous local prawns, incredibly fresh 🍤
- Caragols Punxents – A local specialty of small spicy snails 🐌🌶️
- Coca de llanda – A sweet sponge cake, perfect with coffee 🍰
🚗 How to Get to Peñíscola
✈️ By Air: The nearest airport is Castellón Airport (40 min), Valencia (1.5 hrs), or Barcelona (2 hrs).
🚆 By Train: The nearest station is Benicarló-Peñíscola, just 7 km away.
🚘 By Car: 1.5 hrs from Valencia, 2 hrs from Barcelona, 45 min from Castellón.
🚌 By Bus: Direct buses from Barcelona, Valencia, and Castellón.💡 Tips for Visiting Peñíscola
✅ Best time to visit? Spring & summer (April–September) for the best weather ☀️
✅ Visit the castle early – Mornings are less crowded and cooler 🏰
✅ Take a sunset walk along the beach – The views are stunning 🌅
✅ Try a boat trip – The castle looks incredible from the water ⛵
✅ Wear comfortable shoes – The old town streets are steep and cobbled 👟 -
@ 5ffb8e1b:255b6735
2025-03-29 13:57:02As a fellow Nostrich you might have noticed some of my #arlist posts. It is my effort to curate artists that are active on Nostr and make it easier for other users to find content that they are interested in.
By now I have posted six or seven posts mentioning close to fifty artists, the problem so far is that it's only a list of handles and it is up to reader to click on each in order to find out what are the artist behind the names all about. Now I am going to start creating blog posts with a few artists mentioned in each, with short descriptions of their work and an image or to.
I would love to have some more automated mode of curation but I still couldn't figure out what is a good way for it. I've looked at Listr, Primal custom feeds and Yakihonne curations but none seem to enable me to make a list of npubs that is then turned into a feed that I could publicly share for others to views. Any advice on how to achieve this is VERY welcome !
And now lets get to the first batch of artists I want to share with you.
Eugene Gorbachenko
nostr:npub1082uhnrnxu7v0gesfl78uzj3r89a8ds2gj3dvuvjnw5qlz4a7udqwrqdnd Artist from Ukrain creating amazing realistic watercolor paintings. He is very active on Nostr but is very unnoticed for some stange reason. Make sure to repost the painting that you liked the most to help other Nostr users to discover his great art.
Siritravelsketch
nostr:npub14lqzjhfvdc9psgxzznq8xys8pfq8p4fqsvtr6llyzraq90u9m8fqevhssu a a lovely lady from Thailand making architecture from all around the world spring alive in her ink skethes. Dynamic lines gives it a dreamy magical feel, sometimes supported by soft watercolor strokes takes you to a ferytale layer of reality.
BureuGewas
nostr:npub1k78qzy2s9ap4klshnu9tcmmcnr3msvvaeza94epsgptr7jce6p9sa2ggp4 a a master of the clasic oil painting. From traditional still life to modern day subjects his paintings makes you feel the textures and light of the scene more intense then reality itself.
You can see that I'm no art critic, but I am trying my best. If anyone else is interested to join me in this curration adventure feel free to reach out !
With love, Agi Choote
-
@ 7d33ba57:1b82db35
2025-03-27 19:48:38Tarifa, located at the southernmost tip of Spain, is a paradise for beach lovers, adventure seekers, and nature enthusiasts. Known for its strong winds, golden beaches, and laid-back atmosphere, it’s a top destination for kite surfing, whale watching, and exploring Andalusian history. Plus, it’s the perfect gateway to Morocco, just a short ferry ride away.
🏖️ Top Things to See & Do in Tarifa
1️⃣ Playa de Los Lances 🏄♂️
- A long, sandy beach famous for kite surfing and windsurfing.
- One of the best spots in Europe for water sports enthusiasts.
- Lined with chiringuitos (beach bars) where you can relax and enjoy the views.
2️⃣ Punta de Tarifa – The Southernmost Point of Europe 🌍
- A unique spot where the Atlantic Ocean meets the Mediterranean Sea.
- Walk to Isla de las Palomas, a historic military zone (guided tours available).
- Incredible views of Morocco, just 14 km away.
3️⃣ Whale & Dolphin Watching Tours 🐬
- Join a boat trip to see orcas, dolphins, and sperm whales in the Strait of Gibraltar.
- Best time: April to October for whale migrations.
4️⃣ Explore the Historic Old Town 🏰
- Wander through narrow, whitewashed streets full of charm.
- Visit Guzmán el Bueno Castle, a 10th-century fortress with panoramic views.
- Enjoy lively tapas bars, boutique shops, and hidden courtyards.
5️⃣ Playa de Bolonia & Baelo Claudia Ruins 🏛️
- One of Spain’s most unspoiled beaches, with dunes and turquoise waters.
- Explore the Roman ruins of Baelo Claudia, an ancient fishing village from 2,000 years ago.
- Climb the Duna de Bolonia, a massive sand dune with breathtaking views.
6️⃣ Day Trip to Morocco 🇲🇦
- Take a 35-minute ferry to Tangier for a quick taste of North African culture.
- Explore medinas, souks, and local cuisine with a guided tour.
- Don’t forget your passport!
🍽️ What to Eat in Tarifa
- Atún Rojo (Red Tuna) – Tarifa is famous for its fresh bluefin tuna 🍣
- Tortillitas de Camarones – Crispy shrimp fritters, a local delicacy 🍤
- Choco Frito – Fried cuttlefish, a must-try for seafood lovers 🦑
- Andalusian Gazpacho – A refreshing cold tomato soup, perfect for hot days 🍅
- Mojama – Salt-cured tuna, often eaten as a tapa with almonds 🐟
🚗 How to Get to Tarifa
✈️ By Air: The nearest airports are Gibraltar (45 min), Málaga (2 hrs), and Seville (2.5 hrs).
🚆 By Train: No direct train, but you can take one to Algeciras (30 min drive from Tarifa).
🚘 By Car: 1.5 hrs from Málaga, 1 hr from Cádiz, 30 min from Gibraltar.
🚌 By Bus: Regular buses from Seville, Málaga, Cádiz, and Algeciras.
⛴️ To Morocco: Ferries run daily to Tangier, Morocco (35 min ride).💡 Tips for Visiting Tarifa
✅ Best time to visit? Spring to early autumn (April–October) for great weather ☀️
✅ Book water sports lessons early – It’s a popular spot for kite surfing! 🏄♂️
✅ Bring layers – Tarifa can be windy, even in summer 🌬️
✅ Visit early for whale watching – Mornings usually have calmer seas 🐋
✅ Take a day trip to Bolonia – One of Spain’s most stunning hidden beaches 🏝️ -
@ fe9e99a0:5123e9a8
2025-03-27 18:37:28Can’t seem to update anything
-
@ 000002de:c05780a7
2025-03-27 17:51:16Regardless of what you have heard Capitalism isn't to blame for all the ills in modern life. Capitalism is simply free trade without centralize control. Of course there are many details I'm glossing over and degrees of freedom. Critics of capitalism rarely explain how it works. They complain about people buying too much stuff. People being over-weight. They complain about waste. People buying stuff they don't need. They complain that teachers aren't paid enough. They complain that professional athletes make too much money.
All of this boils down to two things.
- People don't like what others choose to do
- The products we see and world we live in is a result of the desires and values of the people
I agree with many of the critics of capitalism. There is a ton of crap. There's a ton of waste. There are professions I wish were more profitable and others I wish were less profitable. I'm going to ignore the state for once here. Obviously the state puts its thumb on the scales and distorts the market. But this isn't the main factor IMO. The main factor in the world we live in is us. The people. Our desires. Our values. The things we value are reflected in the market. People don't like to admit this because it is uncomfortable. We are spoiled, self-centered, brats that are desire machines. Yeah, you can blame advertising. You can blame "capitalism" but the alternative is starvation and death (socialism).
Its time for us to stop blaming freedom for all the ills in our society and take ownership for our actions. Its us. Thing is, I can't change you. But, I can change my actions. Adjust my values. Adjust my frame of view. I'd love to start hearing people take responsibility and self ownership. Start living out your values. Don't be a part of things that you view as problems. Be a part of solutions. I can't tell you what that looks like but if you think about it for a while you can come up with some things. Its easy to blame others. Its hard to take responsibility for yourself and own your flaws and mistakes.
What do you think?
Inspired by @k00b's post
originally posted at https://stacker.news/items/927021
-
@ a296b972:e5a7a2e8
2025-03-27 17:05:57Wehrpflicht, Wehr-Pflicht… Da soll die allgemeine Wehrpflicht wieder eingeführt werden. Eine Frage taucht auf: Ist sie denn jemals abgeschafft worden? Ist die Wehrpflicht nicht untrennbar mit der Demokratie verbunden? Ist es nicht die Pflicht eines jeden Demokraten, sich zu wehren, wenn er sieht, wie die Demokratie vor die Hunde geht? Muss er sich nicht wehren, wenn er feststellt, dass die Freiheit scheibchenweise immer weniger wird?
In Absurd-Germanistan reizt ein wild gewordener Haufen Irrer in Berlin die Grenzen der Legalität bis zum Äußersten aus. Unterstützt von Erfüllungsgehilfen in der Rechtsprechung und den Medien. Neuester Coup: Zur größtmöglichen Intransparenz soll das Informationsfreiheitsgesetz abgeschafft werden. Unterstützt von einer eigenen Bundestagspolizei, geschützt von einem Wassergraben um den Reichstag. Die dunkle Seite der Macht baut eine Beton-Mauer auf, um größtmöglichen Abstand zum übelriechenden Volk, dass sie gewählt hat, zu gewährleisten. Und mit ekelhafter Regelmäßigkeit werden Knochen mit Fleischresten über die Mauer geworfen, die dann das dumme Volk zu verdauen hat. Das funktioniert derzeit noch, weil das Volk nicht in der Lage ist, eine Leiter an die Mauer zu stellen, um die Irren über die Mauer in den Wassergraben zu werfen und sich das saftige Hühnchen zu holen, das ihm, dem Volk sowieso gehört.
Unterdessen sinniert die entrückte Blase darüber, wie man dem Volk nachhaltig langfristigen Schaden zufügen kann. Aus rechtlichen Winkelzügen, falschen Versprechungen, Selbstbeweihräucherungen, ideologisch vergifteten Reden quillt die Verachtung gegenüber dem Volk und der Demokratie aus allen Poren. Und die wird dann durch Unseredemokratie verhöhnt, in der Schulden durch eine Wortneuschöpfung als Sondervermögen ausgegeben werden. Dreister und offensichtlicher kann man nicht lügen. Und das mit einer nie gekannten Chuzpe, dass einem nur noch der Atem stockt.
Jahrzehnte wurde den Deutschen abgewöhnt, stolz auf ihr Land zu sein. Die deutsche Fahne zeigen, hatte damals schon den Charme von „reeechts“. Wer von Vaterland und Heimat sprach, der bekam automatisch einen dunklen, schmalen Schatten zwischen Nasenmitte und Mund. Doch dann, als es mal wieder Spiele für’s Volk gab, durfte man auf einmal mit kleinen Wink-Elementen zeigen, dass man stolz auf elf Leute war, die hinter einem Ball herrennen und wenn sie ihn hatten, ihn dann wieder wegschossen. Damit nicht genug, es gab hochalberne Gamaschen für Außenspiegel und Diplomatenfähnchen in schwarz-rot-gold für des Deutschen liebstes Kind, das Auto.
Und jüngst kam einer daher, der wie von der Tarantel gestochen behauptete, dass der böse Russ hinter uns her ist, und man deshalb kriegstüchtig werden müsse, obwohl weit und breit nichts von ihm zu sehen war und er immer wieder wiederholte, dass er überhaupt gar keine Lust dazu hat, Deutschland auf unschöne Weise bereisen zu wollen.
Im Fieberwahn stimmten weitere Kriegstreiber in den Chor ein und ein deutscher Häuptling der Bleichgesichter, der ehedem Streubomben geächtet hatte, zuckte auf einmal nur verbal mit den Schultern. Das soll einer verstehen.
Und weil Deutschland von nichts und niemandem bedroht wird, muss deshalb dringend aufgerüstet werden, Kriegswirtschaft ist angesagt, die Wehrpflicht muss wieder her!
Eine Kriegsmaschinerie muss von Grund auf neu aufgebaut werden: Von der langen Feinripp-Unterhose mit Eingriff bis zum Panzer. Die ehemaligen Hermann-Göring-Werke müssen die Fließbänder zum Glühen bringen. Wir brauchen „Woffen, Woffen, Woffen“!
Das Ganze dauert 10 bis 20 Jahre. Hoffentlich reicht der im Samowar zubereitete Tee so lange, bis alles zertifiziert und DIN-Norm gerecht fertiggestellt ist. Man kann nur auf die christlich demokratische Unterstützung der nach einer europäischen Zentralregierung strebenden, deutschen Ex-Verteidigungsministerin mit Ambitionen zur Kaiserin von Europa hoffen. Ihre Expertise konnte sie ja dank ihres mit Bravour gemeisterten ehemaligen Amtes bereits unter Beweis stellen. Überhaupt, überall, wo das Militär im Hintergrund seine Finger im Spiel hat, ist die Wahl-Brüsselerin an vorderster Front. Zuletzt im Beschaffungswesen der 1. Pandemie-Spiele in Echtzeit unter realen Bedingungen.
Aber was nutzt das ganze schöne Zeug, die noch nicht bekleckerten jungfräulichen Gulasch-Kanonen, wenn sie keiner bedient und keiner seinen Henkelmann mit Feinkost füllen will.
Ja genau, es fehlen ja noch Menschen, in dem Metier Soldaten genannt.
Ein paar Natur-Wahnsinnige gibt es ja immer. Aber was ist mit denen, die vielleicht gar keinen Bock haben? Gerade frisch verliebt, von Papi das erste Auto vor die Tür gestellt bekommen, wegen Laktose-Intoleranz bitte nur einen Kriegs-Latte mit Hafermilch, und für mich bitte glutenfreie Marschverpflegung.
Was ist mit denen, die vielleicht checken, dass wir von einer Polit-Klicke regiert werden, die Deutschland an die Wand fährt und sich redlich Mühe gibt, eine positive Zukunft für die nächsten Generationen zu verunmöglichen?
Was ist mit denen, die von Anfang an gerafft haben, dass man mit einer Gen-Behandlung die Wehrkraft zersetzt?
Was ist mit denen, die die Pflicht, sich bestmöglich gesund zu halten, ernst genommen haben?
Was ist mit denen, die aus Sachzwängen oder Unwissenheit die Injektionen über sich haben ergehen lassen und heute feststellen, dass man sie verarscht hat?
Was ist mit denen, die sich an ihrem durchtrainierten Six-Pack nur noch durch Bilder erinnern können, weil sie seit der Verabreichung eines „nebenwirkungsfreien Elixiers“ nicht mehr auf die Beine kommen?
Man fragt sich, woher soll die Motivation kommen, sein gesundes oder herabgemindertes Immunsystem für ein Vaterland auf’s Spiel zu setzen, bei dem sich herausgestellt hat, dass der Vater ein Stiefvater der übelsten Sorte ist?
Da in Europa offensichtlich die Diplomatie zunächst abgeschafft ist, und demnächst vielleicht sogar unter Strafe gestellt wird, und man sich auf Uncle Sam auch nicht mehr verlassen kann, weil er so völlig das Gegenteil von dem unternimmt, was man von ihm erwartet hätte, wäre es überlegenswert, ob diejenigen jungen Männer im fortpflanzungsfähigen und -willigen Alter eventuell eine längere Reise ins Ausland antreten sollten. Ist nur so ein Gedanke.
Man kann ja immer noch mal wieder vorbeischauen, wenn es an den ungeschützten Außengrenzen wieder von Deutschland aus nach Vernunft duftet.
Aber vielleicht findet sich auch unter den Messerfachkräften der eine oder andere, der seine Künste und sein Leben für ein Land und Bürgergeld hergeben möchte. Schließlich können es die Allermeisten kaum abwarten, die deutschen Gepflogenheiten ungefiltert einzusaugen und dafür ihre kulturelle Herkunft und Religion wie einen alten Lumpen abzuwerfen. Was Besseres, als die Kultur der Denker und Dichter hat die Welt ohnehin noch nicht gesehen. Wer kann dem schon widerstehen?
Großer Dank gilt auch der deutschen Bevölkerung, die einem wildgewordenen andalusischen Stier gleich, in Scharen von einigen Tausenden von über 80 Millionen auf die Straße rennen, um ihrem Unbill Ausdruck zu verleihen. So eine Friedensmüdigkeit ist ansteckend und kann richtig mobilisieren. Man kann natürlich auch was von Zuhause aus tun: Sich laut empören und für durchziehende Truppen Kaffee kochen, oder dem Heimatschutz beim Stiefel putzen helfen. Im Ernst: So eine bräsige, behäbige, langweilige, unmotivierte, unkritische, informationsvergiftete, geduldige Herde von Faultieren hat es eigentlich nicht anders verdient, als dass man sie während ihres andauernden Langzeit-Wachkomas in einen Käfig sperrt und mit Bananen füttert.
Keiner, niemand kommt auf die Idee, dass es immer noch besser wäre, obwohl es keinerlei Anlass dazu gibt, russisch zu lernen, als sich als Kanonenfutter für einen Staat, der sein Volk verachtet, in die Gefahr zu begeben, im Ernstfall verstümmelt oder abgeschlachtet zu werden.
Man kann jetzt schon die heulenden Bubis sehen, wie sie sich unter Mutterns Rockschürze verkriechen, wenn sie merken würden, dass es in den Ballerspielen am Computer aber immer ganz anders war.
Der ganze inszenierte Spuk wäre sofort vorbei, wenn die Menschen ihr Gehirn einschalten würden. Dann würden sie feststellen, dass es unzählige Gründe dafür gibt NEIN zu sagen und ICH MACH DA NICHT MIT.
Wie machtlos wären die Kriegspfeifen in Berlin, wenn sie zu spüren bekämen, dass das deutsche Volk nicht mit Russland oder sonst wem im Krieg ist und nicht das geringste Interesse verspürt, daran etwas zu ändern. Deutschland besteht aus einem erbärmlichen Haufen Ja-Sagern in allen Lagern, die offensichtlich erst dann wach werden, wenn es nichts mehr zu Essen gibt und der Strom fürs externe Gehirn weg ist. Oh Gott, mein Leben hat keinen Sinn mehr! Was sind wir doch ein elender Haufen von Jammerlappen, die glauben, dass man gelebte Demokratie und Freiheit jederzeit im Online-Shop kaufen kann. Lieferung innerhalb 24 Stunden.
Frieden – Mir – Pace – Peace
Dieser Beitrag wurde mit dem Pareto-Client geschrieben.
-
@ f1989a96:bcaaf2c1
2025-03-27 13:53:14Good morning, readers!
Turkey’s currency plunged to a record low after the arrest of Istanbul Mayor Ekrem Imamoglu, one of President Recep Tayyip Erdogan’s main political rivals. This follows a pattern of escalating repression of opposition figures, which have been described as an effort to suppress competition ahead of primary elections. As economic conditions deteriorate, Erdogan is resorting to desperate measures — blocking social media, arresting dissenters, and tear-gassing protests — to maintain power over an increasingly restless populace.
In the Caribbean, we shed light on Cubans' struggles accessing remittances sent from family members abroad. This is a symptom of the regime's strict monetary controls over foreign currency. Cubans face long delays or can’t withdraw cash due to bank liquidity shortages. And when they can, remittances are converted into pesos at the overvalued official Cuban exchange rate. This effectively allows the Communist Party of Cuba (PCC) to loot the value from Cuban remittances.
In freedom tech news, we highlight Demand Pool, the first-ever Stratum V2 mining pool. Stratum V2 is a mining protocol designed to decentralize Bitcoin mining by letting individual miners create their own block templates rather than relying on centralized pools to do so for them. This improves censorship resistance and promotes a more decentralized and resilient Bitcoin network — critical features for human rights defenders and nonprofits using Bitcoin to protect against financial repression from authoritarian regimes.
We end by featuring Vijay Selvam's new book, “Principles of Bitcoin.” It offers a clear, first-principles guide to understanding how Bitcoin’s technology interacts with economics, politics, philosophy, and human rights. Whether you’re new to Bitcoin or looking to deepen your understanding, this book provides a solid foundation, and it even features a foreword by HRF Chief Strategy Officer Alex Gladstein.
Now, let’s dive right in!
Subscribe Here
GLOBAL NEWS
Turkey | Lira in Free Fall as Erdogan Arrests Political Rival
Turkey’s lira plunged to a record low after officials arrested Istanbul Mayor Ekrem Imamoglu, President Recep Tayyip Erdogan’s main political rival. Imamoglu’s arrest comes ahead of primary elections and follows the increasing repression of opposition figures in recent months, including the suspension of political opposition accounts on X. Officials also arrested Buğra Gökçe, head of the Istanbul Planning Agency, for publishing data exposing the country’s deepening poverty. The currency’s fallout and political repression have sparked protests in Istanbul despite a four-day ban. The regime is responding with tear gas and rubber bullets. Meanwhile, Turks dissenting online risk joining over a dozen other citizens recently arrested for “provocative” social media posts. Netblocks reports that the Turkish regime imposed restrictions on social media and messaging to quell the uprising of Turks struggling with financial conditions and deepening repression.
Cuba | Banks “Hijack” Citizen Remittances
Cubans are struggling to access remittances sent from their families abroad. This is because the regime completely controls all incoming foreign currency transfers. When remittances arrive, communist banking authorities force their conversion into collapsing Cuban pesos or “Moneda Libremente Convertible” (MLC), Cuba’s digital currency with limited use. On top of this, Cubans receive pesos in their accounts based on the official Cuban exchange rate, which is far below the informal market rate. This allows the regime to opaquely siphon off much of the remittances’ real value. Even when the money clears, Cubans face long delays or can’t withdraw the cash due to banks’ liquidity shortages. Many Cubans are accusing these banks of “hijacking” their remittances. As inflation, electrical blackouts, and food shortages continue, remittances are more critical than ever for Cuban families. Yet, they’re blocked at every turn by a system designed to impoverish them.
Pakistan | Announces Plans to Regulate Digital Assets
Pakistan announced plans to create a regulatory framework for Bitcoin and digital assets to attract foreign investment and domestic economic activity. It’s a peculiar shift for a regime that regularly suspends the Internet, censors social media, represses opposition, and burdens its people with the highest cost of living in Asia. We suspect the plans indicate efforts to control the industry rather than empower individuals. The military-backed regime is also exploring a Central Bank Digital Currency (CBDC) and tightening controls on VPN use, which are hardly the hallmarks of leadership committed to permissionless financial systems. But perhaps it matters little. Grassroots Bitcoin adoption in Pakistan already ranks among the highest in the world, with an estimated 15 to 20 million users turning to digital assets to preserve their savings, circumvent financial controls, and escape the failures of a collapsing fiat system. HRF supported Bitcoin Pakistan with a grant to help translate resources into Urdu, a language spoken by 60 million people trapped in this repressive scenario.
Russia | Piloting CBDC in Tatarstan to Test Smart Contract Functionality
Russia’s central bank plans to pilot its CBDC, the digital ruble, in Tatarstan to test smart contract functionality. Specifically, the central bank will experiment with conditional spending, using smart contracts to restrict where and what users can spend money on. If these features are implemented, it will empower the Kremlin with micro-controls over Russians’ spending activity. Officials could program funds to expire, restrict purchases to regime-approved goods, or block transactions at certain locations — leaving users with no financial autonomy or privacy. Those who oppose the Russian dictatorship, such as activists, nonprofits, and dissenters, could be debanked with more ease, their assets frozen or confiscated without recourse.
Nicaragua | Government Mandates Public Employees Declare All Assets
In Nicaragua, dictator Daniel Ortega intensified state financial surveillance by mandating all public servants to disclose information on all personal and family assets. The mandate requires all public employees to declare everything from personal bank accounts, loans, vehicles, and other assets — as well as the assets and accounts of immediate family members. Those who do not comply face the threat of termination. Ironically, despite the law requiring such disclosure, Ortega himself has not declared his assets since 2006. Under the guise of regulatory compliance, this policy is yet another link in the chain tightening state surveillance over Nicaraguan society. Bitcoin adoption continues to grow in this repressed Central American nation.
BITCOIN AND FREEDOM TECH NEWS
Demand Pool | First Stratum V2 Mining Pool Launches
Bitcoin mining could become more decentralized and censorship-resistant with the launch of Demand Pool, the first mining pool to ever implement Stratum V2. Stratum V2 is open-source software that allows miners to build their own block templates, enabling more individual mining and less dependence on large and centralized mining pools. This helps maintain Bitcoin’s key features: its decentralized, permissionless, and uncensorable nature. All of which are crucial for human rights defenders and nonprofits bypassing the financial repression and surveillance of authoritarian regimes. Learn more here.
Bitcoin Mining | Three Solo Blocks Found
Three separate solo miners mined Bitcoin blocks in the past seven days. This marks the second, third, and fourth solo blocks mined in the past two weeks alone, hinting at a surge in home mining. This promotes greater decentralization within the Bitcoin network because solo miners have little functional ability to censor. In contrast, large mining pools are points of failure that centralized interests can more easily pressure — to the detriment of activists and human rights defenders. The first block was mined on March 21 by a miner using a self-hosted FutureBit Apollo machine that earned 3.125 BTC plus fees for processing block 888,737. Just days later, a solo miner with under 1 TH/s of self-hosted hash rate found block 888,989, which became just the third block ever to be mined using an open-source Bitaxe device. Most recently, on March 24, a solo miner using a $300 setup successfully mined block 889,240.
Krux | Adds Taproot and Miniscript Support
Krux, open-source software for building your own Bitcoin signing devices (hardware for Bitcoin self-custody), released an update that enhances privacy and flexibility. The update introduces support for Taproot, a past Bitcoin upgrade that improves privacy and security, and Miniscript, a simplified way to create more complex Bitcoin transaction rules. This allows users to manage multi-signature wallets (where more than one private key is required to interact with your Bitcoin) in a more private and flexible way. It also enables spending conditions that are harder to censor and easier to verify. Krux continues to support the struggle for financial freedom and human rights by breaking down barriers to Bitcoin self-custody. HRF has recognized this impact and awarded grants to open-source developers working on Krux to advance this mission.
Cashu | Developing Tap-to-Pay Ecash
Calle, the creator of Cashu, an open-source Chaumian ecash protocol for Bitcoin integrated with the Lightning Network, is developing a new tap-to-pay feature that enables instant, offline ecash payments via NFC. Ecash functions as a bearer asset, meaning the funds are stored directly on the user’s device. With tap-to-pay, it can be transferred with a single tap (similar to tapping your credit card). More generally, ecash offers fast, private transactions resistant to surveillance and censorship. But for activists and dissenters, this particular advancement makes private and permissionless payments more accessible and user-friendly. This development will be worth following closely. Watch a demo here.
OpenSats | Announces 10th Wave of Bitcoin Grants
OpenSats, a public nonprofit that supports open-source software and projects, announced its 10th wave of grants supporting Bitcoin initiatives. This round includes funding for Stable Channels, which enable stabilized Bitcoin-backed balances on the Lightning Network (allowing users to peg Bitcoin to fiat currencies in a self-custodial way) that provide stable, censorship-resistant payments. OpenSats also renewed its support for Floresta, a lightweight Bitcoin node (a computer that runs the Bitcoin software). It lowers entry barriers to running Bitcoin, helping make the network more decentralized and censorship-resistant.
Bitcoin Policy Institute | Launches Bitcoin Summer Research Program
The Bitcoin Student Network (BSN) and the Bitcoin Policy Institute (BPI) are teaming up to offer students an eight-week research internship this summer. The program is part of BPI’s Research Experiences for Undergraduates (REU) initiative and invites students passionate about the future of money, financial inclusion, and Bitcoin’s civil liberties impacts to conduct hands-on research. Participants will also receive mentorship from BPI researchers. The program runs from June 9 to Aug. 8, 2025, and includes an in-person colloquium in Washington, DC. It is an incredible opportunity for students worldwide, especially those living in oppressive regimes, to get involved with Bitcoin. Applications are open until April 7. Apply here.
RECOMMENDED CONTENT
Principles of Bitcoin by Vijay Selvam
“Principles of Bitcoin” by Vijay Selvam is a new book offering a first-principles guide to understanding Bitcoin’s technology, economics, politics, and philosophy. With a foreword by HRF Chief Strategy Officer Alex Gladstein, the book cuts through the noise to explain why Bitcoin stands alone as a tool for individual empowerment and financial freedom. Selvam’s work makes the case for Bitcoin as a once-in-history invention shaping a more decentralized and equitable future. Read it here.
Rule Breakers — The True Story of Roya Mahboob
“Rule Breakers” is a new film that tells the true story of Roya Mahboob, Afghanistan’s first female tech CEO, who empowered young girls in Afghanistan with financial literacy, robotics, and financial freedom through Bitcoin. The film recounts Mahboob’s courageous work educating these girls despite huge personal risks under a regime that bans their education. It follows the story of Afghan Dreamers, the country’s first all-girls robotics team, and the obstacles they overcome to compete on the world stage. “Rule Breakers” is a testament to the power of education, innovation, and resilience in the face of oppression. It’s now in theaters, and you can watch the trailer here.
If this article was forwarded to you and you enjoyed reading it, please consider subscribing to the Financial Freedom Report here.
Support the newsletter by donating bitcoin to HRF’s Financial Freedom program via BTCPay.\ Want to contribute to the newsletter? Submit tips, stories, news, and ideas by emailing us at ffreport @ hrf.org
The Bitcoin Development Fund (BDF) is accepting grant proposals on an ongoing basis. The Bitcoin Development Fund is looking to support Bitcoin developers, community builders, and educators. Submit proposals here.
-
@ 0b65f96a:7fda4c8f
2025-03-29 10:39:17Es gibt Bibliotheken voll Literatur zur „Kunst“ der Kriegsführung. Dies hier ist ein Beitrag zu den Bibliotheken der Kunst Frieden zu führen. Denn Frieden ist nicht die Abwesenheit von Krieg. Sondern eine mindestens ebenso intensive Aktivität. Worin genau besteht sie aber? Ich glaube darin, weder nach der einen noch nach der anderen Seite vom Hochseil zu fallen. Denn vom Hochseil kann man immer nach zwei Seiten fallen. Das ist dann auch schon die Kernherausforderung: Gleichgewichthalten!
Es scheint zunächst ein ganz äußerlicher Auftrag. Es gibt immer und wird immer widerstreitende Interessen geben. Allerdings ist das nur die äußerste Zwiebelschale. Denn wenn wir die Sache etwas mit Abstand von uns selbst betrachten, werden wir in uns hinein verwiesen: Frieden kann nur von innen nach außen gestiftet werden. Wenn wir das Hochseil in uns suchen, was finden wir dann? – Zweifels ohne, wissen wir von uns, dass wir nicht jeden Tag unser bestes Selbst sind. Würde es sich nicht lohnen etwas genauer über die Möglichkeit nach zwei Seiten vom Hochseil zu fallen nachzudenken, zugunsten der eigenen Balancierfähigkeit?
Wir sind daran gewöhnt zu denken dem Guten steht das Böse gegenüber. Daraus ziehen ja alle Western und Martial Arts Streifen ihren Plot: Der Gute bringt den Bösen um die Ecke und damit hat wieder mal das Gute gesiegt. Wir bewerten das „um die Ecke bringen“ unterschiedlich, je nach dem, von wem es kommt.
Ich möchte einen neuen Gedanken vorschlagen über unser Inneres, über Gut und Böse nachzudenken. Denn, wie gesagt, vom Hochseil kann man nach zwei Seiten fallen. Und es hat immer drastische Wirkung. Wo kommen wir also hin, wenn wir sagen: Frieden ist immer ein Gleichgewichtszustand, ergo eine Zeit der Mitte?
Sagen wir Toleranz ist ein erstrebenswertes Ideal. Dann würden wir sicher sagen Engstirnigkeit ist das Gegenteil davon und alles andere als Wünschenswert. Ja, so ist es gewiss. Und es bleibt hinzuzufügen, auch Beliebigkeit ist das Gegenteil von Toleranz. Denn es gibt eine Grenze, wo Toleranz nicht mehr Toleranz ist, sondern Beliebigkeit, ein „alles ist möglich“. Ähnlich können wir es für Großzügigkeit denken: Großzügigkeit ist ein erstrebenswertes Ideal. Ihr Gegenteil ist Geiz. Ihr anderes Gegenteil die Verschwendung. Oder Mut. Mut ist ein erstrebenswertes Ideal. Feigheit sein Gegenteil. Sein anderes Gegenteil ist Leichtsinn. Mit andern Worten: Das Ideal wird immer zum Hochseil. Und wir können immer nach zwei Seiten von ihm fallen. Wenn wir diesem Gedanken folgen, kommen wir weg von der Gut-Böse-Dualität. Und stattdessen zur Frage nach dem Gleichgewicht. Zur Frage nach der Mittezeit.
Natürlich steht es uns frei all das zu denken. Oder auch nicht zu denken. Denn selbstverständlich ist es möglich es nicht zu denken und bei einer Dualitätsvorstellung festhängen zu bleiben. Es wird uns nur nicht helfen Frieden zu denken und in Frieden zu handeln. Wenn wir wollen können wir durch das Aufspannen einer Trinität einen neuen Raum eröffnen und betreten. In ihm wird Frieden aktiv führbar, denn er wird eine Gleichgewichtssituation in uns selbst! – Nicht eine, sich einander gegenüberstehender äußerer Mächte!
Gehen wir noch einen Schritt weiter in unserer Betrachtung, können wir feststellen, dass es durchaus einen Unterschied macht nach welcher Seite wir runter fallen. Denn auf der einen Seite ist es immer eine Verengung: Engstirnigkeit, Geiz, Feigheit in unseren Beispielen. Auf der anderen ist es immer eine Zersplitterung oder Versprühung. In unseren Beispielen Beliebigkeit, Verschwendung und Leichtsinn. Und das erstrebenswerte ist eben immer die Mitte, das von uns ständig aktualisierte Gleichgewicht.
Das interessante ist, wo diese Mitte liegt, lässt sich niemals statisch festlegen. Sie ist immer dynamisch. Denn sie kann zu unterschiedlichen Momenten an unterschiedlicher Stelle liegen. Es ist immer ein Ich, das sich in Geistesgegenwart neu ausbalanciert. Und darum ist Frieden so schwer. Wir werden ihn niemals „haben“, sondern ihm immer entgegen gehen.
Der Kriegsruf ist nichts anderes, als ein Versuch von denen, die vom Hochseil gefallen sind, uns auch herunter zu kicken.
Netter Versuch. Wird aber nichts!
In der Nussschale: Die Dualität auflösen in die Trinität der balancierenden Mitte zwischen der Geste der Versteinerung und der Geste des Zerstäubens oder Zersplitterns. Die dynamische Qualität der Mitte bemerken. Oder, tun wir es nicht, ist das gleich der erste Anstoß, der uns wieder zum Wackeln bringt. Und des Ich´s gewahr werden, das balanciert. Frieden führen ist eine Kunst.
Patric I. Vogt, geb. 1968 in Mainz. Autor von „Zukunft beginnt im Kopf Ein Debattenbeitrag zur Kernsanierung von Rechtsstaat und Demokratie“. Lebt als freischaffender Künstler, Lehrer und Unternehmer. Über drei Jahrzehnte Beschäftigung mit dem Ideenfeld soziale #Dreigliederung und Anthroposophie. Moderation und Mediation von sozialen Prozessen und Organisationsentwicklung. Staatlich ungeprüft, abgesehen von den Fahrerlaubnissen zu Land und zu Wasser. Motto: Gedanken werden Worte, werden Taten! www.perspektivenwechsel.social
-
@ 401014b3:59d5476b
2025-03-27 13:48:10Alright, baseball junkies, it’s March 27, 2025, and we’re diving into the crystal ball to predict the 2025 MLB season—straight through to the World Series champ! Spring Training’s wrapping up, Opening Day’s here, and the league’s loaded with talent, drama, and some sneaky contenders ready to shake things up. I’m breaking down each playoff team’s path, their strengths, weaknesses, and who’s got the juice to hoist the trophy in October. This ain’t some cookie-cutter chalk pick—let’s get gritty, let’s get bold, and let’s see who’s got the stones to win it all. Strap in, fam—here we go!
American League Playoff Teams: The AL Beast Mode
New York Yankees\ The Yankees are back, and they’re pissed after last year’s World Series loss to the Dodgers. Aaron Judge is coming off another MVP-caliber season (let’s say .310, 55 HRs, 130 RBIs), and Juan Soto’s bat (projected .290, 40 HRs) gives them a lethal 1-2 punch. Gerrit Cole anchors a rotation that’s top-5 in ERA (around 3.40), but the bullpen’s a question mark—closer Clay Holmes blew 13 saves in 2024, and they haven’t fixed that yet. They’ll win the AL East (95-67), but their postseason hinges on late-inning reliability.\ Prediction: ALCS run, but they fall short if the pen implodes.
Houston Astros\ The Astros are perennial AL West champs (projected 92-70), even with a slightly aging core. Jose Altuve (.300, 20 HRs) and Yordan Alvarez (.295, 35 HRs) keep the offense humming, and a rotation led by Framber Valdez (3.20 ERA) and Hunter Brown (3.50 ERA) is solid. Their bullpen, with Josh Hader (1.28 ERA in 2024), is lights-out. But injuries to key arms like Justin Verlander (aging at 42) could bite them.\ Prediction: ALDS exit—they’re good, but not great this year.
Cleveland Guardians\ The Guardians sneak into the playoffs as the AL Central champs (88-74). Jose Ramirez (.280, 35 HRs, 110 RBIs) is a one-man wrecking crew, and their rotation—Shane Bieber (3.00 ERA, if healthy) and Triston McKenzie (3.60 ERA)—keeps them in games. But their offense outside Ramirez is thin (team OPS around .720), and the bullpen’s inconsistent (4.00 ERA).\ Prediction: Wild Card exit—they’re scrappy but lack firepower.
Tampa Bay Rays (Wild Card)\ The Rays grab a Wild Card spot (90-72) with their usual mix of grit and analytics. Yandy Diaz (.290, 15 HRs) and Randy Arozarena (.270, 25 HRs) lead a balanced offense, while Shane McClanahan (3.10 ERA) and Zach Eflin (3.40 ERA) anchor the rotation. Their bullpen (top-10 in ERA at 3.50) is a strength, but depth issues (injuries to key prospects) could hurt.\ Prediction: ALDS run—they’re sneaky dangerous.
Seattle Mariners (Wild Card)\ The Mariners finally break through as a Wild Card (89-73), as predicted by some fans on X. Julio Rodriguez (.285, 30 HRs) and Cal Raleigh (.250, 35 HRs) power the offense, and a rotation of Luis Castillo (3.20 ERA), Logan Gilbert (3.30 ERA), and George Kirby (3.40 ERA) is the best in the AL (team ERA around 3.20). Their offense (bottom-10 in runs scored) is the Achilles’ heel.\ Prediction: ALCS run—they’re a pitcher’s dream, but the bats hold ‘em back.
Baltimore Orioles (Wild Card)\ The Orioles snag a Wild Card (87-75), but some fans on X call them a “surprise disappointment.” Gunnar Henderson (.280, 35 HRs) and Adley Rutschman (.270, 20 HRs) lead a young core, but the rotation—Corbin Burnes (3.00 ERA) and Grayson Rodriguez (3.70 ERA)—lacks depth after losing Kyle Bradish to injury. The bullpen (4.20 ERA) is shaky.\ Prediction: Wild Card exit—too many holes this year.
National League Playoff Teams: The NL Wild West
Los Angeles Dodgers\ The Dodgers are the NL West juggernaut (98-64), and some fans on X are already calling them World Series champs. Shohei Ohtani (.300, 50 HRs, 120 RBIs) is the NL MVP favorite, Mookie Betts (.290, 30 HRs) is elite, and Freddie Freeman (.310, 25 HRs) is steady. The rotation—Tyler Glasnow (3.10 ERA), Yoshinobu Yamamoto (3.30 ERA), and Walker Buehler (3.50 ERA)—is deep, and the bullpen (3.40 ERA) is solid. No weaknesses here.\ Prediction: World Series bound—they’re a machine.
Philadelphia Phillies\ The Phillies win the NL East (94-68) with a balanced attack. Bryce Harper (.290, 30 HRs) and Kyle Schwarber (.250, 40 HRs) mash, while Trea Turner (.300, 20 HRs) adds speed. The rotation—Zack Wheeler (3.00 ERA), Aaron Nola (3.40 ERA), and Ranger Suarez (3.60 ERA)—is top-tier, and the bullpen (3.50 ERA) is reliable. They’re built for October.\ Prediction: NLCS run—they’re legit contenders.
Milwaukee Brewers\ The Brewers take the NL Central (90-72) with a scrappy squad. Willy Adames (.270, 30 HRs) and William Contreras (.280, 20 HRs) lead the offense, while Freddy Peralta (3.30 ERA) and Brandon Woodruff (3.50 ERA, if healthy) anchor the rotation. Their bullpen (top-5 in ERA at 3.30) is a strength, but the offense (middle-of-the-pack in runs) can stall.\ Prediction: NLDS exit—not enough firepower.
Atlanta Braves (Wild Card)\ The Braves grab a Wild Card (91-71) despite injuries. Ronald Acuna Jr. (.290, 35 HRs) and Matt Olson (.270, 40 HRs) power the lineup, but the rotation—Chris Sale (3.20 ERA) and Max Fried (3.40 ERA)—is thin after Spencer Strider’s injury. The bullpen (3.60 ERA) is solid, but depth is a concern.\ Prediction: NLDS run—they’re talented but banged up.
San Diego Padres (Wild Card)\ The Padres snag a Wild Card (89-73) with a balanced attack. Fernando Tatis Jr. (.280, 35 HRs) and Manny Machado (.270, 30 HRs) lead the offense, while Dylan Cease (3.30 ERA) and Yu Darvish (3.50 ERA) anchor the rotation. The bullpen (3.70 ERA) is decent, but they lack a true closer.\ Prediction: Wild Card exit—not enough late-game juice.
New York Mets (Wild Card)\ The Mets sneak in as a Wild Card (88-74) with a breakout year. Francisco Lindor (.280, 30 HRs) and Pete Alonso (.260, 35 HRs) mash, while Kodai Senga (3.20 ERA) and Luis Severino (3.60 ERA) lead the rotation. The bullpen (4.00 ERA) is a weak spot, but their offense (top-10 in runs) keeps ‘em alive.\ Prediction: NLDS run—they’re scrappy but flawed.
Playoff Breakdown: The Road to the World Series
AL Wild Card:
- Rays over Guardians
- Mariners over Orioles
- Yankees over Rays
- Mariners over Astros
- Yankees vs. Mariners → Yankees (4-2)\ Judge and Soto go off, and the Mariners’ bats can’t keep up with New York’s firepower. Cole’s ace stuff seals it.
NL Wild Card:
- Braves over Padres
- Mets over Brewers
- Dodgers over Mets
- Phillies over Braves
- Dodgers vs. Phillies → Dodgers (4-3)\ Ohtani’s heroics (think a 3-HR game) and the Dodgers’ depth outlast Philly’s grit in a seven-game classic.
World Series: Yankees vs. Dodgers
Here we go—a rematch of last year’s epic clash! The Yankees are hungry for revenge, with Judge and Soto swinging for the fences (combined 5 HRs in the series). Cole (Game 1 gem, 7 IP, 2 ER) and Rodon (Game 5 win) keep it close, but the Dodgers’ lineup is relentless—Ohtani (.350, 2 HRs), Betts (.320, 3 doubles), and Freeman (.300, 8 RBIs) overwhelm New York’s shaky bullpen. Glasnow and Yamamoto each win a start, and the Dodgers’ pen (2.50 ERA in the series) slams the door. Dodgers win in 6—Ohtani’s walk-off in Game 6 seals it.
The Final Buzzer
The Dodgers are my 2025 World Series champs—they’ve got the star power, depth, and clutch factor to repeat. The Yankees make a valiant run, but their bullpen woes bite ‘em again. Hit me on X if you disagree, but this is my October gospel—let’s see who’s standing when the dust settles! Play ball, degenerates!
-
@ dfbbf851:ba4542b5
2025-03-27 13:45:12Bitcoin (BTC) เป็นสกุลเงินดิจิทัลที่ได้รับความนิยมและถูกพูดถึงมากที่สุดในโลก นับตั้งแต่เปิดตัวในปี 2009 โดยบุคคลหรือกลุ่มที่ใช้นามแฝงว่า Satoshi Nakamoto 🎭
แต่คำถามสำคัญก็คือ... Bitcoin เป็นอนาคตของการเงินโลกหรือว่าเป็นฟองสบู่ที่รอวันแตกกันแน่? 🤔
🔹 Bitcoin คืออะไร ?
Bitcoin เป็นเงินดิจิทัลที่ทำงานบน เทคโนโลยีบล็อกเชน (Blockchain) ซึ่งช่วยให้การทำธุรกรรมมีความปลอดภัยและโปร่งใส 💡
🔸 ไม่มีธนาคารกลางควบคุม 🔸 จำนวนจำกัดเพียง 21 ล้านเหรียญ 🔸 ใช้ระบบ "การขุด" (Mining) เพื่อยืนยันธุรกรรม
✅ ทำไม Bitcoin ได้รับความนิยม ?
✨ ไร้พรมแดน – โอนเงินข้ามประเทศได้รวดเร็วและถูกกว่าธนาคาร ✨ ความปลอดภัยสูง – ใช้ระบบเข้ารหัสที่แข็งแกร่ง 🔐 ✨ สินทรัพย์ป้องกันเงินเฟ้อ – มีจำนวนจำกัด จึงถูกมองว่าเป็น "ทองคำดิจิทัล" 🌎🏆 ✨ การยอมรับที่เพิ่มขึ้น – บริษัทใหญ่ เช่น Tesla และ PayPal เริ่มเปิดรับ BTC
❌ ความเสี่ยงของ Bitcoin
⚠️ ราคาผันผวนสูง – อาจขึ้นหรือลงหลายพันดอลลาร์ภายในวันเดียว 📉📈 ⚠️ ยังไม่ถูกยอมรับทั่วโลก – บางประเทศออกกฎหมายห้ามใช้ เช่น จีน 🚫 ⚠️ อาจถูกใช้ในทางผิดกฎหมาย – เช่น การฟอกเงินในตลาดมืด 🕵️♂️ ⚠️ สิ้นเปลืองพลังงาน – กระบวนการขุดใช้ไฟฟ้าปริมาณมาก ⚡🌱
🔮 อนาคตของ Bitcoin จะเป็นอย่างไร ?
นักลงทุนบางคนเชื่อว่า Bitcoin จะเป็นอนาคตของระบบการเงินโลก 💵🌍 ในขณะที่บางคนมองว่า มันเป็นเพียงฟองสบู่ที่อาจแตกเมื่อไหร่ก็ได้ 💥
💡 ปัจจัยสำคัญที่อาจกำหนดอนาคตของ BTC ได้แก่: ✔️ การยอมรับจากรัฐบาลและองค์กรใหญ่ ✔️ กฎหมายและกฎระเบียบ – หากรัฐบาลทั่วโลกออกกฎหมายสนับสนุน BTC อาจทำให้ราคาพุ่งสูง 🚀 ✔️ เทคโนโลยีใหม่ๆ – เช่น Lightning Network ที่ช่วยให้การทำธุรกรรมเร็วขึ้นและถูกลง ⚡
🎯 ปล.
Bitcoin เป็น นวัตกรรมการเงินที่เปลี่ยนโลก 🌎 และอาจกลายเป็นสินทรัพย์สำคัญในอนาคต แต่ก็มีความเสี่ยงสูง นักลงทุนต้องศึกษาให้รอบคอบก่อนตัดสินใจลงทุน 📊💡
แล้วท่านผู้อ่านล่ะครับ คิดว่า Bitcoin คืออนาคตของเงิน หรือเป็นเพียงกระแสชั่วคราวกันแน่ ? 🤔
Bitcoin #Crypto #Blockchain #BTC #ลงทุน #การเงิน #อนาคตการเงิน
-
@ 866e0139:6a9334e5
2025-03-29 09:31:35
Autor: Thomas Eisinger. Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier.**
Und genau dafür wirst auch du gedrillt werden: Menschen zu jagen und töten. Unbekannte, die auch nicht wissen, was sie hier tun. Oder Unschuldige, die nicht rechtzeitig fliehen konnten. Einfach töten. Alle. Ohne zu fragen. Denn das ist deine Aufgabe, Soldat: Töte Menschen!
Egal, was du vorher warst, Heizungsmonteur, KFZ-Mechaniker, Veganer, Marketingmanager, Friseur, Verkäufer, Kindergärtner: Es ist egal. Jetzt musst du töten. Denn du hast mitgemacht. Entweder, weil du es nicht ernst genommen hast, weil du dich nie für Politik interessiert hast. Oder weil du gedacht hast, das alles betrifft dich nicht. Weil du gedacht hast, Wahlen könnten etwas verändern. Oder weil du immer das Maul gehalten hast, damit dich keiner als «Rechter» bezeichnet. Egal. Jetzt musst du töten. Das ist das Spiel.
Ja, es ist ein Spiel. Grausam, abartig, menschenverachtend. Dennoch hat es Regeln: Diejenigen, die das Spiel beginnen, müssen niemals selbst auf das Schlachtfeld. Das ist die erste Regel. Ihre Söhne auch nicht, nicht die Söhne der anderen Politiker, nicht die der EU-Abgeordneten, nicht die der Parteibonzen. Auch nicht die der Banker, der Vorstandsvorsitzenden, der Chefredakteure. Denn alle wissen, wie man das Spiel spielt. Nur du nicht.
Du bist einfach eine Figur auf dem Spielfeld, die es verpasst hat, NEIN zu sagen, als noch Gelegenheit war. Jetzt bist du verwandelt worden in eine menschliche Drohne. Wenn sie sagen: töte!, dann tötest du. Denken kannst du, wenn alles vorbei ist. Falls du je wieder nach Hause kommst. Vielleicht sogar mit beiden Beinen und beiden Armen. Vielleicht auch nicht. Egal. Wer hätte Mitleid mit einer Spielfigur?
Nein, du musst töten. Das ist deine Aufgabe. Sie sagen es nun schon seit Monaten, warum glaubst du es nicht? Sie meinen es ernst. Wenn du den Brief in Händen hältst ist es zu spät. Es gilt dann das Notstandsrecht und keiner kann mehr verweigern. Da hättest du dich vorher drum kümmern müssen. Oder auf eine Demo gehen. Oder laut und mit klarer Stimme in jedem Gespräch den Wahnsinn anprangern. Hast du aber nicht.
Jetzt musst du töten oder du wirst getötet. Das ist das Spiel. Du hättest selbst denken können. Hast du aber nicht. Hast deine Zeit mit sinnlosen Videos vertan, Netflix geguckt und hast Influencerinnen geliked. Die müssen nicht an die Front. Aber du. Morgen, wenn du aufstehst, die Uniform anziehst und rausgehst, dann wirst du Befehle ausführen oder erschossen werden. Also wirst du Menschen töten. Dein Leben wird nie wieder so sein, wie zuvor. Dein Schmerz, deine Schuld, dein Leid: sie gehen ein in die unendliche Reihe der Soldaten, die seit Jahrhunderten dasselbe Schicksal erlitten. Deren Schreie noch immer durch den ewigen Raum hallen. Deren Opfer von den Herren des Spiels mit einem Lächeln entgegengenommen wurde. Deren Gliedmaßen auf den Schlachtfeldern liegen geblieben waren. Zum Dank erhielten sie eine Medaille. Ein Stück Blech für den rechten Arm, einen Grabstein für den Vater, den Bruder, den Sohn. Für das Vaterland. Für Europa. Für die Demokratie. Der Hohn tropft aus jedem Politikerwort, doch die Menschen glauben noch immer die uralte Geschichte von Freund und Feind, von Gut und Böse.
\ Wer nicht aufwachen will, muss töten. Du. Nicht am Bildschirm. In der echten Welt. Wo man nicht auf Replay drücken kann. Wo man den Gegner nicht nach links oder rechts swipen kann, denn er ist echt, real, lebendig. Noch. Entweder er oder du. Jetzt ist es zu spät für Entscheidungen. Kannst du es spüren? Die Work-Life-Balance wird zur Kill-or-be-killed-Balance. Es gibt kein Entrinnen. Denn du hast mitgemacht. Schweigen ist Zustimmung. Sich-nicht-drumkümmern ist Zustimmung. Kriegsparteien zu wählen ist noch mehr Zustimmung.
Heute.
Heute lässt sich noch etwas ändern.
Es hat nichts zu tun mit rechts oder links. Nur mit Menschlichkeit versus Hass, Macht und dem ganz großen Geld. Das sind die Gründe, für die du töten oder sterben musst.
Wie entscheidest du dich?
Thomas Eisinger ist Schriftsteller. Zuletzt erschien der Roman "Hinter der Zukunft". Mehr zum Autor hier.
DIE FRIEDENSTAUBE FLIEGT AUCH IN IHR POSTFACH:
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt, vorerst für alle kostenfrei, wir starten gänzlich ohne Paywall. (Die Bezahlabos fangen erst zu laufen an, wenn ein Monetarisierungskonzept für die Inhalte steht).
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Bildschirmfoto 2025-03-27 um 09.53.46
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: milosz@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ dfbbf851:ba4542b5
2025-03-27 13:43:45🌟 บทนำ
ในยุคดิจิทัลที่ทุกอย่างขับเคลื่อนด้วยเทคโนโลยี Blockchain เป็นหนึ่งในนวัตกรรมที่สร้างแรงสั่นสะเทือนมากที่สุด 🌍 หลายคนอาจรู้จัก Blockchain ผ่าน Bitcoin หรือ Ethereum แต่จริงๆ แล้ว มันสามารถนำไปใช้ได้หลากหลายกว่าที่คุณคิด !
💡 ลองจินตนาการถึงโลกที่ไม่มีตัวกลาง ไม่มีการโกงข้อมูล และทุกธุรกรรมสามารถตรวจสอบได้แบบ 100%... นี่แหละคือ พลังของ Blockchain !
🔎 Blockchain คืออะไร ?
Blockchain เป็นเทคโนโลยีที่ทำให้ข้อมูลมีความ ปลอดภัย โปร่งใส และแก้ไขไม่ได้ ✅ ทุกธุรกรรมที่เกิดขึ้นจะถูกบันทึกลงใน "บล็อก" และเชื่อมต่อกันเป็นโซ่ (Chain) ซึ่งทำให้:
✅ ไม่มีตัวกลาง (Decentralization) – ไม่ต้องพึ่งธนาคารหรือบริษัทใดๆ ✅ ปลอมแปลงยาก (Security) – ใช้การเข้ารหัสระดับสูง 🔐 ✅ โปร่งใสตรวจสอบได้ (Transparency) – ทุกคนสามารถเข้าดูข้อมูลได้แบบเรียลไทม์
⚙️ Blockchain ทำงานอย่างไร ?
1️⃣ ธุรกรรมถูกสร้างขึ้น เช่น การโอนเงิน 💸 2️⃣ เครือข่ายตรวจสอบความถูกต้อง ผ่านกลไกอย่าง Proof of Work (PoW) หรือ Proof of Stake (PoS) 3️⃣ ธุรกรรมถูกบันทึกลงบล็อก และเชื่อมโยงกับบล็อกก่อนหน้า 🔗 4️⃣ ข้อมูลถูกกระจายไปยังทุกโหนด ทำให้ไม่สามารถถูกแก้ไขย้อนหลังได้
✨ ง่ายๆ คือ Blockchain ทำให้ข้อมูลมีความน่าเชื่อถือ และไม่มีใครสามารถควบคุมได้เพียงลำพัง !
💡 การประยุกต์ใช้ Blockchain ในโลกธุรกิจ
🔥 การเงินและธนาคาร – ลดค่าธรรมเนียมการโอนเงินระหว่างประเทศ 🏦 🔥 Supply Chain – ติดตามสินค้าแบบเรียลไทม์ ป้องกันของปลอม 📦 🔥 การดูแลสุขภาพ – จัดเก็บข้อมูลผู้ป่วยแบบปลอดภัย 🏥 🔥 อสังหาริมทรัพย์ – ซื้อขายบ้านโดยไม่ต้องพึ่งนายหน้า 🏡 🔥 การเลือกตั้ง – ป้องกันการโกงเสียงเลือกตั้งผ่านระบบดิจิทัล 🗳️
🚀 อนาคตของ Blockchain
Blockchain กำลังพัฒนาไปสู่เทคโนโลยีที่มีความ เร็วขึ้น ปลอดภัยขึ้น และใช้พลังงานน้อยลง ♻️ เทรนด์ที่น่าจับตามอง ได้แก่:
🔹 CBDC (เงินดิจิทัลของธนาคารกลาง) – กำลังมาแรง! 🔹 DeFi (การเงินแบบไร้ตัวกลาง) – พลิกโฉมการลงทุน 🔹 NFT (สินทรัพย์ดิจิทัลไม่ซ้ำกัน) – ปฏิวัติวงการศิลปะ 🎨
แม้ว่าจะยังมีข้อท้าทาย เช่น ค่าธรรมเนียมสูง หรือการใช้พลังงานมากในบางระบบ แต่ Blockchain กำลังมุ่งสู่อนาคตที่ยั่งยืนและเป็นมิตรกับสิ่งแวดล้อมมากขึ้น 🌱
🎯 ปล.
Blockchain ไม่ใช่แค่เรื่องของ Bitcoin ! แต่เป็นเทคโนโลยีที่สามารถเปลี่ยนโลกในหลายด้าน 🌎 หากคุณเป็นนักธุรกิจ นักลงทุน หรือเพียงแค่คนที่อยากเข้าใจโลกดิจิทัลมากขึ้น นี่คือเทคโนโลยีที่คุณไม่ควรมองข้าม !
📢 แล้วคุณล่ะ คิดว่า Blockchain จะเปลี่ยนโลกไปอย่างไรบ้าง? มาพูดคุยกันในคอมเมนต์ได้เลย! 👇💬
Blockchain #Crypto #DeFi #NFT #Web3 #Bitcoin #Innovation
-
@ 57d1a264:69f1fee1
2025-03-29 09:31:13"THE NATURE OF BITCOIN IS SUCH THAT ONCE VERSION 0.1 WAS RELEASED, THE CORE DESIGN WAS SET IN STONE FOR THE REST OF ITS LIFETIME." - SATOSHI NAKAMOTO
"Reborn" is inspired by my Bitcoin journey and the many other people whose lives have been changed by Bitcoin. I’ve carved the hand in the “Gyan Mudra” or the “Mudra of Wisdom or Knowledge,” with an Opendime grasped between thumb and index finger alluding to the pursuit of Bitcoin knowledge. The hand emerges from rough, choppy water, and I've set the hand against an archway, through which, the copper leaf hints at the bright orange future made possible by Bitcoin.
Materials: Carrara Marble, Copper leaf, Opendime
Dimensions: 6" x 9" x 13"
Price: $30,000 or BTC equivalent
Enquire: https://www.vonbitcoin.com/available-works
X: https://x.com/BVBTC/status/1894463357316419960/photo/1
originally posted at https://stacker.news/items/928510
-
@ 9dd283b1:cf9b6beb
2025-03-27 12:22:58Can someone please explain to me how this new STRF thing works? Cause I'm getting FTX / BlockFI vibes here. 18% Yield, no risk investment, bond killer, etc... Look at this post for example - https://x.com/AdamBLiv/status/1905106498398621846
originally posted at https://stacker.news/items/926635
-
@ 7d33ba57:1b82db35
2025-03-27 10:53:58Sitges is known for its golden beaches, vibrant nightlife, and artistic charm. With a beautiful seafront promenade, historic old town, and a welcoming atmosphere, it’s a top destination for relaxation, culture, and fun on the **Costa Dorada.
🏖️ Top Things to See & Do in Sitges
1️⃣ Stroll Along the Passeig Marítim 🌊
- A scenic seaside promenade lined with palm trees, beaches, and restaurants.
- Perfect for walking, cycling, or enjoying a sunset cocktail.
2️⃣ Relax on the Beaches 🏖️
- Playa de la Fragata – A central beach near the old town, great for families.
- Playa de San Sebastián – A smaller, quieter beach with local charm.
- Playa del Balmins – A well-known nudist and LGBTQ+ friendly beach.
- Playa de l'Home Mort – A hidden cove, popular for naturists.
3️⃣ Visit the Church of Sant Bartomeu i Santa Tecla ⛪
- The iconic church overlooking the sea, a must-visit landmark.
- Amazing spot for photos, especially at sunset.
4️⃣ Explore the Old Town & Museums 🏛️
- Wander through charming whitewashed streets filled with boutique shops and cafés.
- Visit Museu Cau Ferrat, home to art by Santiago Rusiñol and Picasso.
- Discover Museu Maricel, featuring Romanesque and modernist art.
5️⃣ Enjoy Sitges' Lively Nightlife & Festivals 🎭
- Sitges is famous for its bars, beach clubs, and LGBTQ+ friendly nightlife.
- Visit in February for Sitges Carnival, one of Spain’s best! 🎉
- Experience the Sitges Film Festival (October), known for horror & fantasy films.
6️⃣ Wine Tasting in Penedès 🍷
- Take a short trip to Penedès, one of Spain’s best Cava (sparkling wine) regions.
- Tour local wineries and enjoy wine tastings just 30 minutes away.
🍽️ What to Eat in Sitges
- Xató – A local salad with cod, anchovies, and romesco sauce 🥗
- Suquet de Peix – A Catalan seafood stew with potatoes 🍲🐟
- Fideuà – Similar to paella, but made with short noodles instead of rice 🍤
- Crema Catalana – A delicious caramelized custard dessert 🍮
- Cava – The famous Catalan sparkling wine from nearby Penedès 🍾
🚗 How to Get to Sitges
🚆 By Train: 35 min from Barcelona (Sants or Passeig de Gràcia stations).
🚘 By Car: 40 min from Barcelona via the C-32 highway.
🚌 By Bus: Direct buses from Barcelona Airport (El Prat) and Tarragona.
✈️ By Air: The nearest airport is Barcelona-El Prat (BCN, 25 km away).💡 Tips for Visiting Sitges
✅ Best time to visit? Spring to early autumn (April–October) for beach weather ☀️
✅ Avoid summer weekends – It gets very busy with visitors from Barcelona 🏖️
✅ Visit during Carnival or the Film Festival for an unforgettable experience 🎭🎬
✅ Explore beyond the beaches – The old town and vineyards are worth it! 🍷
✅ Try beachfront dining – Enjoy fresh seafood with a sea view 🍽️🌊 -
@ 866e0139:6a9334e5
2025-03-29 08:51:57
Autor: Dr. Daniele Ganser. Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier.**
Der Frieden ist mir eine Herzensangelegenheit. Daher halte ich seit über 20 Jahren Vorträge zu den Themen Krieg und Frieden. Bisher sind es schon mehr als 1000 Vorträge. Manchmal gibt es Widerstand oder schlechte Presse, aber ich mache einfach weiter. Zudem schreibe ich Bücher, gebe Interviews und habe eine Online-Community, wo ich über Zoom Fragen der Mitglieder beantworte. Mein Ziel ist immer dasselbe: Die Friedensbewegung zu stärken.
https://www.youtube.com/watch?v=4rlSE4CYR_U
Auszug aus der Einleitung "Imperium USA":
"In meiner Forschung orientiere ich mich an folgenden drei Prinzipien: UNO- Gewaltverbot, Achtsamkeit und Menschheitsfamilie. Das UNO-Gewaltverbot wurde 1945 erlassen und verbietet die Androhung oder Anwendung von Gewalt in der internationalen Politik. Es ist leider in Vergessenheit geraten, und viele Menschen haben noch nie davon gehört. Daher erwähne ich es oft in meinen Büchern und Vorträgen, weil es ein ganz wichtiges Instrument der Friedensbewegung ist. Auch das Prinzip Achtsamkeit ist für die Friedensbewegung ein Juwel.
Denn zu oft schon wurden wir Menschen durch Kriegspropaganda getäuscht und verwirrt. Doch das wäre nicht nötig. Wenn wir durch Achtsamkeit lernen, unsere eigenen Gedanken und Gefühle aus einer ruhigen Distanz zu beobachten, stärken wir unsere Klarheit. Wir müssen nicht alles glauben, was uns von den Medien erzählt wird. Durch Achtsamkeit erkennen wir, dass wir nicht unsere Gedanken und Gefühle sind, sondern das klare Bewusstsein, in dem sie aufsteigen und wie Wolken auch wieder vergehen.
Besonders wichtig ist mir auch das Prinzip Menschheitsfamilie. Denn leider ist es in der Geschichte immer wieder vorgekommen, dass wir als Menschheitsfamilie einzelne Mitglieder ausgeschlossen und getötet haben. Wir haben uns entlang von Nationalität, Religion, Hautfarbe, Geschlecht und Einkommen gespalten und abgewertet. Bei der Hexenverfolgung wurden Frauen der »Zauberei« beschuldigt, aus der Menschheitsfamilie ausgeschlossen und verbrannt. Bei den Indianerkriegen wurden Indianer als »Wilde« aus der Menschheitsfamilie ausgeschlossen, vertrieben und getötet. Beim Sklavenhandel wurden Afrikaner als »Tiere« aus der Menschheitsfamilie ausgeschlossen, diffamiert und ausgebeutet. Im Zweiten Weltkrieg wurden Juden als »lebensunwert« aus der Menschheitsfamilie ausgeschlossen und in Konzentrationslagern vergast.
Im Vietnamkrieg wurden Vietnamesen von US-Soldaten als »Termiten« bezeichnet, aus der Menschheitsfamilie ausgeschlossen und mit Napalm bombardiert. Im sogenannten »Krieg gegen den Terror« wurden Afghanen als »Terroristen« bezeichnet, aus der Menschheitsfamilie ausgeschlossen und getötet. Das sich wiederholende Muster ist deutlich: Das Prinzip Menschheitsfamilie wird verletzt, indem eine Gruppe aus der Menschheitsfamilie ausgeschlossen, abgewertet und dann getötet wird. Natürlich sehen wir alleganz unterschiedlich aus. Auch bezüglich Glaube, Nationalität, Ausbildung, Sprache und Einkommen sind wir nicht gleich und werden es nie sein.
Doch das ist noch kein Grund, Gewalt einzusetzen. »Wir haben in der Welt ganz sicher ein Problem mit Feindseligkeiten, die außer Kontrolle geraten. Der Mensch ist geradezu ein Spezialist darin, andere auszugrenzen«, erklärt der holländische Zoologe Frans de Waal. »Der Mensch dämonisiert Menschen anderer Nationalität oder Religion, erzeugt Ängste und Wut. Diese Gruppen nennen wir dann schnell Unmenschen oder Tiere. Schon ist es leicht, die Unmenschen zu eliminieren, weil man kein Mitgefühl mehr mit ihnen haben muss.«
Im April 2004 wurde publik, dass US- Soldaten im irakischen Abu-Ghraib- Gefängnis Iraker gefoltert hatten. Die US- Kriegspropaganda hatte den US- Soldaten eingetrichtert, die Iraker seien schlechte Menschen, dadurch wurden sie aus der Menschheitsfamilie ausgeschlossen. Das hatte konkrete Folgen. Die US- Soldatin Lynndie England führte in Abu-Ghraib einen nackten irakischen Gefangenen an einer Hundeleine durchs Gefängnis. Ein anderer irakischer Gefangener musste mit schwarzer Kapuze auf einer Kiste balancieren, während an seinem Körper Drähte befestigt waren.
Ihm wurde von den US- Soldaten angedroht, dass ihm tödliche Stromschläge zugefügt würden, wenn er von der Kiste fiele. »Für Europa waren die Horrorbilder aus Sex, Folter und Erniedrigung schlichtweg ein Schock«, kommentierte Die Welt. Der Abu- Ghraib- Skandal zeigte drastisch, was passieren kann, wenn die Menschen einer ganzen Nation, in diesem Falle die Iraker, aus der Menschheitsfamilie ausgeschlossen werden.
DIE FRIEDENSTAUBE FLIEGT AUCH IN IHR POSTFACH!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt, vorerst für alle kostenfrei, wir starten gänzlich ohne Paywall. (Die Bezahlabos fangen erst zu laufen an, wenn ein Monetarisierungskonzept für die Inhalte steht). Sie wollen der Genossenschaft beitreten oder uns unterstützen? Mehr Infos hier oder am Ende des Textes.
Man darf angesichts dieser Gewalt und Brutalität nicht zu dem Schluss kommen, dass wir Menschen nicht fähig sind, friedlich zusammenzuleben. Wir können es sehr wohl und tun es jeden Tag, an Millionen verschiedenen Orten. »Lassen sie uns zunächst unsere Haltung gegenüber dem Frieden selbst überprüfen. Zu viele von uns halten ihn für unmöglich", erklärte US-Präsident John F. Kennedy in einer seiner Reden.
»Zu viele von uns halten ihn für nicht zu verwirklichen. Aber das ist ein gefährlicher, defätistischer Glaube. Er führt zu der Schlussfolgerung, dass der Krieg unvermeidlich ist, dass die Menschheit zum Untergang verurteilt ist, dass wir uns in der Gewalt von Kräften befinden, die wir nicht kontrollieren können.«
Doch dies stimmt nicht, das wusste auch Kennedy. »Unsere Probleme sind von Menschen geschaffen, deshalb können sie auch von Menschen gelöst werden. Die Größe, die der menschliche Geist erreichen kann, bestimmt der Mensch selbst.«
Auch außerhalb der USA haben inspirierende Persönlichkeiten die Friedensbewegung geprägt. In Indien hat der Rechtsanwalt und Pazifist Mahatma Gandhi, der für mich ein großes Vorbild ist, immer wieder das Prinzip Menschheitsfamilie betont. »Die ganze Menschheit ist eine Familie«, sagte Gandhi. Er setzte bei seinem Protest stets auf einen gelassenen und freundlichen Ton, frei von Wut und Hass. Trotz ihres brutalen Vorgehens bezeichnete Gandhi weder die indische Polizei noch die indische Regierung oder die britische Kolonialmacht als Feinde. »Ich betrachte niemanden als meinen Feind«, erklärte Gandhi. »Alle sind meine Freunde. Ich möchte aufklären und die Herzen verändern.«
Ich bin fest davon überzeugt, dass die Friedensbewegung im 21. Jahrhundert stärker wird, wenn sie sich an den Prinzipen Menschheitsfamilie, Achtsamkeit und UNO- Gewaltverbot orientiert. Die Spaltung nach Nation, Partei, Religion, Hautfarbe, Geschlecht, Schulabschluss oder Einkommen sollte im 21. Jahrhundert durch die Einsicht ersetzt werden, dass alle Menschen zur Menschheitsfamilie gehören. Sie als Leserin und Leser gehören zur Menschheitsfamilie, egal wo Sie diesen Text lesen und unabhängig davon, was Ihre Geschichte ist. Und ich als Autor gehöreauch zur Menschheitsfamilie, ebenso wie alle Personen, die in der Menschheitsgeschichte auftauchen, Opfer wie Täter. Zusammen sollten wir lernen, uns nicht zu töten, weil alles Leben heilig ist und weil wir auf einer sehr tiefen Ebene alle miteinander verbunden sind."
Dr. Daniele Ganser, geboren 1972, ist Schweizer Historiker und Friedensforscher. Er leitet das unabhängige Swiss Institute for Peace and Energy Research (SIPER) in Münchenstein bei Basel in der Schweiz. Die aktuellen Vorträge von Dr. Daniele Ganser finden Sie hier. Am 12. April halten Daniele Ganser und Dirk Pohlmann bei Basel einen Vortrag über den Fall Herrhausen (nur 200 Tickets). Bestellen können Sie hier.
Das Buch können Sie hier bestellen.
LASSEN SIE DER FRIEDENSTAUBE FLÜGEL WACHSEN!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt.
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: milosz@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ da0b9bc3:4e30a4a9
2025-03-29 06:49:22Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/928470
-
@ 7d33ba57:1b82db35
2025-03-27 10:35:25Nerja is known for its stunning beaches, famous caves, and breathtaking sea views. With a charming old town, whitewashed houses, and a lively atmosphere, Nerja offers a perfect mix of relaxation, nature, and culture.
🏖️ Top Things to See & Do in Nerja
1️⃣ Balcón de Europa 🌅
- A stunning viewpoint with panoramic views of the Mediterranean.
- Lined with palm trees, street musicians, and cafés.
- A great spot for sunset photos and people-watching.
2️⃣ Nerja Caves (Cuevas de Nerja) 🏰
- A famous cave system with impressive stalactites and stalagmites.
- Home to prehistoric cave paintings, estimated to be over 40,000 years old.
- One of Spain’s most important archaeological sites.
3️⃣ Playa de Burriana 🏖️
- The best beach in Nerja, with golden sand and clear waters.
- Offers water sports, including kayaking and paddleboarding.
- Many chiringuitos (beach bars) serving delicious seafood paella.
4️⃣ Kayaking to Maro Cliffs 🚣♂️
- Paddle along the coastline to discover hidden coves and waterfalls.
- A unique way to explore the Maro-Cerro Gordo Cliffs Natural Park.
5️⃣ Frigiliana – The Most Beautiful White Village 🏡
- Just 10 minutes from Nerja, this charming Andalusian village is full of whitewashed houses, cobbled streets, and colorful flowers.
- Wander through narrow alleyways and enjoy stunning mountain views.
6️⃣ El Salón & Calahonda Beaches 🏝️
- Small, quiet beaches just below the Balcón de Europa.
- Perfect for a relaxing swim away from the crowds.
🍽️ What to Eat in Nerja
- Espetos de Sardinas – Grilled sardines on skewers, a classic Andalusian dish 🐟
- Ajoblanco – A cold almond and garlic soup, refreshing on hot days 🍲
- Fried Fish (Pescaito Frito) – A mix of freshly caught seafood 🦑🐠
- Tarta de Almendra – A traditional almond cake, perfect with coffee 🍰
- Paella at Playa Burriana – One of the best places to enjoy authentic seafood paella 🍤🍚
🚗 How to Get to Nerja
✈️ By Air: The nearest airport is Málaga Airport (AGP, 70 km, 50 min drive).
🚘 By Car: 50 min from Málaga, 1.5 hrs from Granada.
🚌 By Bus: Direct buses from Málaga, Granada, and other Costa del Sol towns.
🚆 By Train: No direct train, but you can take a train to Málaga and then a bus.💡 Tips for Visiting Nerja
✅ Best time to visit? Spring & summer (April–September) for the best weather ☀️
✅ Book Nerja Cave tickets in advance – It’s one of the most visited sites in Andalusia 🏰
✅ Try kayaking or boat tours – The coastline is stunning from the water 🚣♂️
✅ Visit Frigiliana early – To avoid crowds and enjoy the peaceful morning atmosphere 🌅
✅ Wear comfortable shoes – The old town has steep, cobbled streets 👟
-
@ 7d33ba57:1b82db35
2025-03-27 09:25:04Los Narejos is a laid-back beach town on the Costa Cálida, located in the Murcia region of Spain. Known for its calm, warm waters, family-friendly beaches, and proximity to the Mar Menor lagoon, it’s an excellent destination for relaxation, water sports, and enjoying the Mediterranean lifestyle**.
🏖️ Top Things to See & Do in Los Narejos
1️⃣ Playa de Los Narejos 🏖️
- A wide, sandy beach with shallow and warm waters, perfect for families.
- Palm-lined promenade for walking, cycling, or enjoying seaside cafés.
- Excellent for swimming, sunbathing, and beach sports.
2️⃣ Mar Menor Lagoon 🌊
- A unique saltwater lagoon, separated from the Mediterranean by La Manga.
- Warmer and calmer waters than the open sea, ideal for safe swimming.
- Known for its healing mud baths with minerals beneficial for the skin.
3️⃣ Watersports Paradise 🚤
- A top spot for kite surfing, windsurfing, sailing, and stand-up paddleboarding.
- Several local schools offer lessons for beginners and equipment rentals.
- Great conditions for kayaking along the Mar Menor coastline.
4️⃣ Promenade Walk to Los Alcázares 🚶♂️
- A scenic coastal walk from Los Narejos to Los Alcázares.
- Pass by chiringuitos (beach bars) serving fresh seafood and cocktails.
5️⃣ Local Markets & Shopping 🛍️
- Visit the Los Alcázares Market (Tuesdays & Saturdays) for local produce, clothes, and crafts.
- Small boutique shops sell Murcian souvenirs, ceramics, and wines.
🍽️ What to Eat in Los Narejos
- Caldero Murciano – A traditional seafood rice dish, full of flavor 🍚🐟
- Dorada a la Sal – Fresh sea bream baked in salt, a Mediterranean specialty 🐠
- Tapas & Mariscos – Try local seafood tapas like grilled prawns, octopus, and clams 🍤
- Pastel de Carne – A Murcian meat pie, perfect for a quick bite 🥧
- Paparajotes – A sweet treat made from lemon leaves coated in batter and fried 🍋🍩
🚗 How to Get to Los Narejos
✈️ By Air: The nearest airport is Región de Murcia Airport (RMU, 30 min drive).
🚆 By Train: Nearest station is in Balsicas (20 min drive), with connections to Murcia and Cartagena.
🚘 By Car: 30 min from Murcia, 1 hr from Alicante, 20 min from Cartagena.
🚌 By Bus: Direct buses from Murcia, Cartagena, and Alicante.💡 Tips for Visiting Los Narejos
✅ Best time to visit? Spring to early autumn (April–October) for great weather ☀️
✅ Try water sports – Mar Menor is one of the safest places for beginners 🏄♂️
✅ Bring a bike – The flat terrain and coastal paths are great for cycling 🚴
✅ Enjoy the sunset – The Mar Menor has some of the most stunning sunset views 🌅 -
@ fd78c37f:a0ec0833
2025-03-29 04:33:01YakiHonne: I'm excited to be joined by our guest Piccolo—thank you very much for being here. Before we dive in, I'd like to briefly introduce YakiHonne. YakiHonne is a decentralized media client built on the Nostr protocol, leveraging technology to enable freedom of speech. It empowers creators to fully own their voice and assets while offering innovative tools such as Smart widget , Verified Notes, and support for long-form content. Today, we’re not just discussing YakiHonne, but also diving into your community. Piccolo, could you start by telling us a bit about yourself and your community?
Piccolo:Hi, I'm Piccolo. I run BO฿ Space in Bangkok, and we also have a satellite location called the BO฿ Space corner in Chiang Mai, thanks to the Bitcoin Learning Center. Piccolo:Regarding my background,I originally came from corporate finance and investment banking. I was in that field for about 20 years, with the last 15 spent running my own firm in corporate finance advisory alongside a couple of partners. We eventually sold the advisory business in 2015, took a short break, and in 2016, I ended up launching a fintech company, which is still operational today. The company specializes in equity crowdfunding and is licensed by the SEC in Thailand. Piccolo:I first bought Bitcoin a few years before truly understanding it, initially thinking it was a scam that would eventually collapse. However, in 2017, the block size wars demonstrated the protocol’s strong resistance to attacks on decentralization, which deeply impacted me. By late 2018 or early 2019, I started to really grasp Bitcoin and kept learning. Then, in mid-2022, after having fully fallen down the Bitcoin rabbit hole, I founded BO฿ Space. It was right after COVID, and since the fintech had scaled down, there was extra space. We started by hosting meetups and technical workshops for people who were interested. Piccolo:In the early years, we had various groups come by—like the team from BDK (Bitcoin Development Kit), who held workshops. The people behind the Bitcoin Beach Wallet, which later became Blink, also visited. So, BO฿ Space initially functioned as a meetup and technical workshop space. Eventually, we launched the BOB Builders Residency program, which was a lot of fun. We secured grant funding for developers under different cohort themes, so that they can collaborate and co-work for a few months. So far, we have completed three cohorts.
YakiHonne:How did your community get started, and what did you do to attract new members in the beginning?
Piccolo:The initial members came through word of mouth and invitations that I sent out. I reached out to an initial group of Bitcoiners here in the city who I believed were strong maximalists or Bitcoin-only supporters, back when that was still a thing. I sent out 21 invitations and had our first meetup with 21 people, most of whom I had interacted with online, though some in person during the COVID years. From there, it spread by word of mouth, and of course, through Twitter and meetup.com. So, I would say that word of mouth remains the main method of growth. Additionally, when people come through Bangkok and are looking for a Bitcoin-only meetup, there really isn't one available. I believe there are a couple now—maybe two or three—but when we started, there weren’t any, especially not a dedicated Bitcoin-only space. I think we may still be the only one in Bangkok. So yeah, word of mouth was definitely the main way we grew. Bitcoiners tend to share their finds when they meet like-minded people.
YakiHonne:Didn’t you have people in your community who initially thought Bitcoin was a scam, like you did, or face similar issues?
Piccolo:Yes, it still happens, especially when the price of Bitcoin rises. Newcomers still join, and some of them believe Bitcoin might be a scam. However, this has become less frequent. The main reason is that when people come to BO฿ Space, they know it’s a Bitcoin-only meetup. We generally don’t discuss the price; instead, we focus on other aspects of Bitcoin, as there are many interesting developments in the space.
YakiHonne:What advice would you give to someone looking to start or grow a Bitcoin-focused community in today’s world? Considering the current landscape, much like your own experience, what guidance would you offer?
Piccolo:It sounds simple, but just do it. When it comes to community building, you don’t necessarily need a physical space. Community is about people coming together, right? Two people can start a community, then three, four, and so on. Meetups can happen anywhere—your favorite bar, a restaurant, a friend’s garage, or wherever. So, just do it, but make sure you have more than one person, otherwise, how can you build a community? Once you have more than one person, word of mouth will spread. And as you develop a core group—let’s say more than five people—that’s when I think the community can truly sustain itself.
YakiHonne:I know you’ve mentioned the technical side of your community, but I’ll ask anyway—does your community engage with the technical or non-technical aspects of Bitcoin? Or perhaps, is there a blend of both?
Piccolo:I would say both. It really depends on the monthly themes of our meetups. For example, February was focused on Asian communities in Bitcoin. During that month, community leaders came in to give presentations and discuss their work in places like Indonesia, India, and more recently, someone from HRF (Human Rights Foundation) talked about Bitcoin’s use case in Myanmar. Then, in December, we had a very technical month—Mining Month. It was led by our Cohort 3 residents, where we discussed Stratum V2 and had a demo on it. We also examined the Loki board hardware, and Zack took apart the S19, looking at different ways to repurpose the power supply unit, among other things. So, it’s a mix of both, depending on the theme for that month. Some months are very technical, while others are more community-focused and less technical.
YakiHonne:What advice would you give to a technically inclined individual or organization looking to contribute meaningfully to the Bitcoin ecosystem?
Piccolo:For technically inclined individuals, I would suggest identifying your favorite open-source project in the Bitcoin ecosystem. Start from Bitcoin Core and explore different layers, such as Lightning or e-cash, and other open-source projects. As for technically inclined organizations, if you're integrating Bitcoin into your business, I would say, first, make sure you have people within your organization who truly understand Bitcoin. Build a capable team first, and then, depending on the part of the Bitcoin ecosystem you’re involved in—whether it’s custody services, Lightning payments, layer 2, or something like Cashu or Ark—find your niche. From there, your team will work with you to discover ways to contribute. But until you build that capability, organizations are a bit different from individuals in this space.
YakiHonne:How do you see the world of Bitcoin communities evolving as technology matures, particularly in areas like scalability, privacy, and adaptability with other systems?
Piccolo:That's an interesting question. If we think about the future of Bitcoin communities, I believe they may eventually disappear as technology matures. Once Bitcoin scales to a point where it integrates seamlessly with other payment systems, becoming part of the everyday norm, the need for dedicated communities will diminish. It’s similar to how we no longer have meetups about refrigerators or iPhones, even though they are technologies we use every day. As Bitcoin matures, it will likely reach that level of ubiquity. There might still be occasional meetups or forums, but they will be more about specific knowledge, use cases, and tools, rather than a community dedicated to introducing others to the technology itself. However, this is a long way off. Bitcoin is still relatively small compared to the global fiat financial system, despite the growth we want to see. So, it will take a long time before we reach that stage.
YakiHonne:It’s something I hadn’t considered before, and it’s quite insightful. Moving to our last question actually which I find very interesting is the government around you for or against bitcoin and how has That affected the community.
Piccolo:In my opinion, on a general level, the government is more supportive than opposed to Bitcoin. The Thai government classifies Bitcoin as a digital asset, almost like digital gold. In that sense, they want to tax capital gains and regulate it. They also have a regulatory framework for it, known as the Digital Asset Regulatory Sandbox, where you can test various things, mainly coins and tokens. It's unfortunate, but that’s how it is. However, our government, especially the regulatory bodies, are open to innovation. They recognize that Bitcoin is different, but they still view blockchain and tokens as useful technologies, which is somewhat misguided. So, in that sense, it’s more support than opposition. A couple of years ago, there was a circular discouraging the use of Bitcoin as a payment currency, mainly because they can't control its monetary policy. And they’re right—Bitcoin can’t be controlled by anyone; there’re the protocol and the rules, and everyone follows them, unless there’s a hard fork, which is a different matter. So, in that regard, Bitcoin is definitely categorized as a digital asset by the government, and that’s where it stands. Piccolo:People who come to BO฿ Space to learn about Bitcoin are often influenced by the government from the point of price movements; especially when government support moves the price up. But they usually only visit once or twice, especially if they’re not deep into the Bitcoin rabbit hole. They often get disappointed because, at BO฿ Space, we rarely discuss the price—maybe once a year, and that’s just after the meetup when people are having drinks. So, in that sense, I’d say the government currently doesn’t really hurt or help the community either way. People will go down the rabbit hole at their own pace. And if you're not a Bitcoiner and you come to a BO฿ Space meetup with a crypto focus, you might be surprised by the approach we take.
YakiHonne:Thank you, Piccolo, for your time and insights. It’s been a pleasure speaking with you. Your perspective on the evolution of Bitcoin communities was eye-opening. It's clear that your deep understanding of Bitcoin is invaluable. I'm sure our readers will appreciate your insights. Once again, thank you, Piccolo. I look forward to seeing the continued growth of BO฿ Space and Bitcoin adoption.
-
@ 7d33ba57:1b82db35
2025-03-27 08:55:21L'Estartit is famous for its stunning beaches, the Medes Islands, and incredible diving opportunities. Once a small fishing village, it’s now a paradise for nature lovers, water sports enthusiasts, and those seeking a relaxing Mediterranean escape.
🏖️ Top Things to See & Do in L'Estartit
1️⃣ Medes Islands (Illes Medes) 🏝️
- A protected marine reserve, perfect for snorkeling and scuba diving.
- Explore sea caves, coral reefs, and diverse marine life.
- Take a glass-bottom boat tour to admire the underwater world without getting wet.
2️⃣ L'Estartit Beach 🏖️
- A long sandy beach with shallow waters, ideal for families.
- Great for swimming, sunbathing, and water sports like windsurfing and kayaking.
- Offers fantastic views of the Medes Islands.
3️⃣ Montgrí Massif & Castle 🏰
- Hike up to the Montgrí Castle for panoramic views of the Costa Brava.
- Trails through rocky landscapes and Mediterranean forests.
- A perfect spot for hiking, mountain biking, and photography.
4️⃣ Coastal Walking Route (Camí de Ronda) 🌊
- A breathtaking hiking trail along the cliffs, connecting L'Estartit with nearby beaches and coves.
- Discover hidden spots like Cala Pedrosa and Cala Ferriol.
5️⃣ Explore the Old Town & Port ⚓
- Wander through narrow streets with local shops and seafood restaurants.
- Visit the Sant Genís Church, a historic landmark in the town center.
- Enjoy a drink with a view at the marina.
6️⃣ Kayaking & Stand-Up Paddleboarding 🚣♂️
- Paddle along the coastline to explore caves, cliffs, and hidden coves.
- A great way to experience the natural beauty of the area.
🍽️ What to Eat in L'Estartit
- Suquet de Peix – Traditional Catalan fish stew 🐟
- Arroz a la Cassola – A savory rice dish with seafood 🍤
- Fideuà – Like paella, but made with short noodles instead of rice 🍜
- Calamars a la Planxa – Grilled squid with olive oil and garlic 🦑
- Crema Catalana – A classic Catalan dessert similar to crème brûlée 🍮
🚗 How to Get to L'Estartit
🚆 By Train: The nearest train station is Flaçà (30 min by car/taxi) with connections from Barcelona and Girona.
🚘 By Car: 1.5 hrs from Barcelona, 45 min from Girona, 1 hr from Figueres.
🚌 By Bus: Direct buses from Barcelona, Girona, and other Costa Brava towns.
✈️ By Air: The nearest airport is Girona-Costa Brava (GRO, 55 km).💡 Tips for Visiting L'Estartit
✅ Best time to visit? Late spring to early autumn (May–September) for warm weather 🌞
✅ Book diving tours in advance – Medes Islands are a top diving destination 🤿
✅ Hike early in the morning to avoid the heat & get the best views 🥾
✅ Visit in June for the Havaneres Festival, celebrating Catalan maritime music 🎶 -
@ 872982aa:8fb54cfe
2025-03-27 01:16:09NIP-02
Follow List
final
optional
A special event with kind
3
, meaning "follow list" is defined as having a list ofp
tags, one for each of the followed/known profiles one is following.Each tag entry should contain the key for the profile, a relay URL where events from that key can be found (can be set to an empty string if not needed), and a local name (or "petname") for that profile (can also be set to an empty string or not provided), i.e.,
["p", <32-bytes hex key>, <main relay URL>, <petname>]
.The
.content
is not used.For example:
jsonc { "kind": 3, "tags": [ ["p", "91cf9..4e5ca", "wss://alicerelay.com/", "alice"], ["p", "14aeb..8dad4", "wss://bobrelay.com/nostr", "bob"], ["p", "612ae..e610f", "ws://carolrelay.com/ws", "carol"] ], "content": "", // other fields... }
Every new following list that gets published overwrites the past ones, so it should contain all entries. Relays and clients SHOULD delete past following lists as soon as they receive a new one.
Whenever new follows are added to an existing list, clients SHOULD append them to the end of the list, so they are stored in chronological order.
Uses
Follow list backup
If one believes a relay will store their events for sufficient time, they can use this kind-3 event to backup their following list and recover on a different device.
Profile discovery and context augmentation
A client may rely on the kind-3 event to display a list of followed people by profiles one is browsing; make lists of suggestions on who to follow based on the follow lists of other people one might be following or browsing; or show the data in other contexts.
Relay sharing
A client may publish a follow list with good relays for each of their follows so other clients may use these to update their internal relay lists if needed, increasing censorship-resistance.
Petname scheme
The data from these follow lists can be used by clients to construct local "petname" tables derived from other people's follow lists. This alleviates the need for global human-readable names. For example:
A user has an internal follow list that says
json [ ["p", "21df6d143fb96c2ec9d63726bf9edc71", "", "erin"] ]
And receives two follow lists, one from
21df6d143fb96c2ec9d63726bf9edc71
that saysjson [ ["p", "a8bb3d884d5d90b413d9891fe4c4e46d", "", "david"] ]
and another from
a8bb3d884d5d90b413d9891fe4c4e46d
that saysjson [ ["p", "f57f54057d2a7af0efecc8b0b66f5708", "", "frank"] ]
When the user sees
21df6d143fb96c2ec9d63726bf9edc71
the client can show erin instead; When the user seesa8bb3d884d5d90b413d9891fe4c4e46d
the client can show david.erin instead; When the user seesf57f54057d2a7af0efecc8b0b66f5708
the client can show frank.david.erin instead. -
@ 3e6e0735:9e95c8a2
2025-03-28 23:58:02https://i.nostr.build/lanoHI3p2aCKRZlV.png
I’ve been thinking a lot lately about why Bitcoin still feels so misunderstood. Not just by the media or the IMF — that part’s predictable. But even inside our own circles, something's missing.
We say it’s money. We say it’s freedom. We say it’s code. And it is. But when you really zoom out, past the price and the politics, it’s something more radical than we usually admit.
Bitcoin is a shift in how power moves. And what we do with that power now actually matters.
The noise outside
Let’s start with the obvious: the media still doesn’t get it. Every other headline is either a death knell or a celebration depending on the price that day. No context. No nuance. No understanding of what we’re building.
You’ve seen the headlines: - “Bitcoin is crashing again.” - “Crypto bros are killing the planet.” - “The IMF warns: Bitcoin adoption is dangerous.”
Yeah? Dangerous to what?
The system they control. The levers they pull. The old game where the house always wins.
That’s why they’re afraid. Not because Bitcoin is volatile, but because it doesn’t ask permission.
This isn’t about panic — it’s about patterns
I’m not saying there’s a conspiracy. But there is inertia. Institutions protect themselves. Systems reinforce themselves. They were never going to roll out the red carpet for an open, borderless network that replaces their function.
So the IMF calls it a threat. Central banks scramble to launch CBDCs. And journalists keep writing the same shallow takes while ignoring the real story.
Meanwhile, we’re still here. Still building. Still holding. Still running nodes.
Bitcoin isn’t perfect. But it’s honest. It doesn’t bend to popularity or political pressure. It enforces rules with math, not people. And that’s exactly why it works.
Even we miss it sometimes
Here’s the part that really hit me recently: even within Bitcoin, we often undersell what this is.
We talk about savings. Inflation. Fiat debasement. All real, all important.
But what about the broader layer? What about governance? Energy? Communication? Defense?
Jason Lowery’s book Softwar lit that fuse for me again. Not because it’s flawless — it’s not. But because he reframed the game.
Bitcoin isn’t a new weapon. It’s the end of weapons-as-power.
Proof-of-work, in Lowery’s view, is a form of peaceful negotiation. A deterrent against coercion. A way to shift from kinetic violence to computational resolution.
Most people — even many Bitcoiners — haven’t fully absorbed that.
It’s not about militarizing the network. It’s about demilitarizing the world through energy expenditure that replaces human conflict.
Let’s be clear: this doesn’t mean Bitcoin will be used this way. It means it can. And that opens up a few possible futures:
- Scenario A: Smaller nations adopt Bitcoin infrastructure as a shield — a deterrent and neutral layer to build sovereignty
- Scenario B: Superpowers attack mining and self-custody, escalating regulatory capture and fragmenting the open protocol into corporate silos
- Scenario C: Bitcoin becomes the boring backend of legacy finance, its edge neutered by ETFs and custody-as-a-service
Which one wins depends on what we build — and who steps up.
Then I found Maya
I came across Maya Parbhoe’s campaign by accident. One of those late-night rabbit holes where Bitcoin Twitter turns into a global map.
She’s running for president of Suriname. She’s a Bitcoiner. And she’s not just tweeting about it — she’s building an entire political platform around it.
No central bank. Bitcoin as legal tender. Full fiscal transparency. Open-source government.
Yeah. You read that right. Not just open-source software — open-source statehood.
Her father was murdered after exposing corruption. That’s not a talking point. That’s real-life consequence. And instead of running away from systems, she’s choosing to redesign one.
That’s maximalism. Not in ideology. In action.
The El Salvador experiment — and evolution
When El Salvador made Bitcoin legal tender in 2021, it lit up our feeds. It was bold. Unprecedented. A true first.
But not without flaws.
The rollout was fast. Chivo wallet was centralized. Adoption stalled in rural areas. Transparency was thin. And despite the brave move, the state’s underlying structure remained top-down.
Bukele played offense, but the protocol was wrapped in traditional power.
Maya is doing it differently. Her approach is grassroots-forward. Open-source by design. Focused on education, transparency, and modular state-building — not just mandates.
She’s not using Bitcoin to prop up state power. She’s using it to distribute it.
Maximalism is evolving
Look, I get it. The memes are fun. The laser eyes. The beefsteak meetups. The HODL culture.
But there’s something else growing here. Something a little quieter, a little deeper: - People running nodes to protect civil liberties - Communities using Lightning for real commerce - Builders forging tools for self-sovereign identity - Leaders like Maya testing what Bitcoin can look like as public infrastructure
This is happening. In real time. It’s messy and fragile and still small. But it’s happening.
Let’s also stay honest:
Maximalism has its risks. Dogma can blind us. Toxicity can push people away. And if we’re not careful, we’ll replace one centralization with another — just wearing different memes.
We need less purity, more principles. Less hype, more clarity. That’s the kind of maximalism Maya embodies.
What now?
Maya doesn’t have a VC fund or an ad agency. She has a message, a mission, and the courage to put Bitcoin on the ballot.
If that resonates, help her. Not just by donating — though here’s the link:
https://geyser.fund/project/maya2025
But by sharing. Writing. Talking. Translating. Connecting.
Bitcoin is still early. But it’s not abstract anymore.
This isn’t just theory.
It’s a protocol, sure. But now, maybe it’s a presidency too.
https://i.nostr.build/0luYy8ojK7gkxsuL.png
-
@ 872982aa:8fb54cfe
2025-03-27 00:47:46NIP-01
Basic protocol flow description
draft
mandatory
This NIP defines the basic protocol that should be implemented by everybody. New NIPs may add new optional (or mandatory) fields and messages and features to the structures and flows described here.
Events and signatures
Each user has a keypair. Signatures, public key, and encodings are done according to the Schnorr signatures standard for the curve
secp256k1
.The only object type that exists is the
event
, which has the following format on the wire:jsonc { "id": <32-bytes lowercase hex-encoded sha256 of the serialized event data>, "pubkey": <32-bytes lowercase hex-encoded public key of the event creator>, "created_at": <unix timestamp in seconds>, "kind": <integer between 0 and 65535>, "tags": [ [<arbitrary string>...], // ... ], "content": <arbitrary string>, "sig": <64-bytes lowercase hex of the signature of the sha256 hash of the serialized event data, which is the same as the "id" field> }
To obtain the
event.id
, wesha256
the serialized event. The serialization is done over the UTF-8 JSON-serialized string (which is described below) of the following structure:[ 0, <pubkey, as a lowercase hex string>, <created_at, as a number>, <kind, as a number>, <tags, as an array of arrays of non-null strings>, <content, as a string> ]
To prevent implementation differences from creating a different event ID for the same event, the following rules MUST be followed while serializing: - UTF-8 should be used for encoding. - Whitespace, line breaks or other unnecessary formatting should not be included in the output JSON. - The following characters in the content field must be escaped as shown, and all other characters must be included verbatim: - A line break (
0x0A
), use\n
- A double quote (0x22
), use\"
- A backslash (0x5C
), use\\
- A carriage return (0x0D
), use\r
- A tab character (0x09
), use\t
- A backspace, (0x08
), use\b
- A form feed, (0x0C
), use\f
Tags
Each tag is an array of one or more strings, with some conventions around them. Take a look at the example below:
jsonc { "tags": [ ["e", "5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36", "wss://nostr.example.com"], ["p", "f7234bd4c1394dda46d09f35bd384dd30cc552ad5541990f98844fb06676e9ca"], ["a", "30023:f7234bd4c1394dda46d09f35bd384dd30cc552ad5541990f98844fb06676e9ca:abcd", "wss://nostr.example.com"], ["alt", "reply"], // ... ], // ... }
The first element of the tag array is referred to as the tag name or key and the second as the tag value. So we can safely say that the event above has an
e
tag set to"5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36"
, analt
tag set to"reply"
and so on. All elements after the second do not have a conventional name.This NIP defines 3 standard tags that can be used across all event kinds with the same meaning. They are as follows:
- The
e
tag, used to refer to an event:["e", <32-bytes lowercase hex of the id of another event>, <recommended relay URL, optional>, <32-bytes lowercase hex of the author's pubkey, optional>]
- The
p
tag, used to refer to another user:["p", <32-bytes lowercase hex of a pubkey>, <recommended relay URL, optional>]
- The
a
tag, used to refer to an addressable or replaceable event- for an addressable event:
["a", "<kind integer>:<32-bytes lowercase hex of a pubkey>:<d tag value>", <recommended relay URL, optional>]
- for a normal replaceable event:
["a", "<kind integer>:<32-bytes lowercase hex of a pubkey>:", <recommended relay URL, optional>]
(note: include the trailing colon)
- for an addressable event:
As a convention, all single-letter (only english alphabet letters: a-z, A-Z) key tags are expected to be indexed by relays, such that it is possible, for example, to query or subscribe to events that reference the event
"5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36"
by using the{"#e": ["5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36"]}
filter. Only the first value in any given tag is indexed.Kinds
Kinds specify how clients should interpret the meaning of each event and the other fields of each event (e.g. an
"r"
tag may have a meaning in an event of kind 1 and an entirely different meaning in an event of kind 10002). Each NIP may define the meaning of a set of kinds that weren't defined elsewhere. NIP-10, for instance, especifies thekind:1
text note for social media applications.This NIP defines one basic kind:
0
: user metadata: thecontent
is set to a stringified JSON object{name: <nickname or full name>, about: <short bio>, picture: <url of the image>}
describing the user who created the event. Extra metadata fields may be set. A relay may delete older events once it gets a new one for the same pubkey.
And also a convention for kind ranges that allow for easier experimentation and flexibility of relay implementation:
- for kind
n
such that1000 <= n < 10000 || 4 <= n < 45 || n == 1 || n == 2
, events are regular, which means they're all expected to be stored by relays. - for kind
n
such that10000 <= n < 20000 || n == 0 || n == 3
, events are replaceable, which means that, for each combination ofpubkey
andkind
, only the latest event MUST be stored by relays, older versions MAY be discarded. - for kind
n
such that20000 <= n < 30000
, events are ephemeral, which means they are not expected to be stored by relays. - for kind
n
such that30000 <= n < 40000
, events are addressable by theirkind
,pubkey
andd
tag value -- which means that, for each combination ofkind
,pubkey
and thed
tag value, only the latest event MUST be stored by relays, older versions MAY be discarded.
In case of replaceable events with the same timestamp, the event with the lowest id (first in lexical order) should be retained, and the other discarded.
When answering to
REQ
messages for replaceable events such as{"kinds":[0],"authors":[<hex-key>]}
, even if the relay has more than one version stored, it SHOULD return just the latest one.These are just conventions and relay implementations may differ.
Communication between clients and relays
Relays expose a websocket endpoint to which clients can connect. Clients SHOULD open a single websocket connection to each relay and use it for all their subscriptions. Relays MAY limit number of connections from specific IP/client/etc.
From client to relay: sending events and creating subscriptions
Clients can send 3 types of messages, which must be JSON arrays, according to the following patterns:
["EVENT", <event JSON as defined above>]
, used to publish events.["REQ", <subscription_id>, <filters1>, <filters2>, ...]
, used to request events and subscribe to new updates.["CLOSE", <subscription_id>]
, used to stop previous subscriptions.
<subscription_id>
is an arbitrary, non-empty string of max length 64 chars. It represents a subscription per connection. Relays MUST manage<subscription_id>
s independently for each WebSocket connection.<subscription_id>
s are not guaranteed to be globally unique.<filtersX>
is a JSON object that determines what events will be sent in that subscription, it can have the following attributes:json { "ids": <a list of event ids>, "authors": <a list of lowercase pubkeys, the pubkey of an event must be one of these>, "kinds": <a list of a kind numbers>, "#<single-letter (a-zA-Z)>": <a list of tag values, for #e — a list of event ids, for #p — a list of pubkeys, etc.>, "since": <an integer unix timestamp in seconds. Events must have a created_at >= to this to pass>, "until": <an integer unix timestamp in seconds. Events must have a created_at <= to this to pass>, "limit": <maximum number of events relays SHOULD return in the initial query> }
Upon receiving a
REQ
message, the relay SHOULD return events that match the filter. Any new events it receives SHOULD be sent to that same websocket until the connection is closed, aCLOSE
event is received with the same<subscription_id>
, or a newREQ
is sent using the same<subscription_id>
(in which case a new subscription is created, replacing the old one).Filter attributes containing lists (
ids
,authors
,kinds
and tag filters like#e
) are JSON arrays with one or more values. At least one of the arrays' values must match the relevant field in an event for the condition to be considered a match. For scalar event attributes such asauthors
andkind
, the attribute from the event must be contained in the filter list. In the case of tag attributes such as#e
, for which an event may have multiple values, the event and filter condition values must have at least one item in common.The
ids
,authors
,#e
and#p
filter lists MUST contain exact 64-character lowercase hex values.The
since
anduntil
properties can be used to specify the time range of events returned in the subscription. If a filter includes thesince
property, events withcreated_at
greater than or equal tosince
are considered to match the filter. Theuntil
property is similar except thatcreated_at
must be less than or equal tountil
. In short, an event matches a filter ifsince <= created_at <= until
holds.All conditions of a filter that are specified must match for an event for it to pass the filter, i.e., multiple conditions are interpreted as
&&
conditions.A
REQ
message may contain multiple filters. In this case, events that match any of the filters are to be returned, i.e., multiple filters are to be interpreted as||
conditions.The
limit
property of a filter is only valid for the initial query and MUST be ignored afterwards. Whenlimit: n
is present it is assumed that the events returned in the initial query will be the lastn
events ordered by thecreated_at
. Newer events should appear first, and in the case of ties the event with the lowest id (first in lexical order) should be first. It is safe to return less events thanlimit
specifies, but it is expected that relays do not return (much) more events than requested so clients don't get unnecessarily overwhelmed by data.From relay to client: sending events and notices
Relays can send 5 types of messages, which must also be JSON arrays, according to the following patterns:
["EVENT", <subscription_id>, <event JSON as defined above>]
, used to send events requested by clients.["OK", <event_id>, <true|false>, <message>]
, used to indicate acceptance or denial of anEVENT
message.["EOSE", <subscription_id>]
, used to indicate the end of stored events and the beginning of events newly received in real-time.["CLOSED", <subscription_id>, <message>]
, used to indicate that a subscription was ended on the server side.["NOTICE", <message>]
, used to send human-readable error messages or other things to clients.
This NIP defines no rules for how
NOTICE
messages should be sent or treated.EVENT
messages MUST be sent only with a subscription ID related to a subscription previously initiated by the client (using theREQ
message above).OK
messages MUST be sent in response toEVENT
messages received from clients, they must have the 3rd parameter set totrue
when an event has been accepted by the relay,false
otherwise. The 4th parameter MUST always be present, but MAY be an empty string when the 3rd istrue
, otherwise it MUST be a string formed by a machine-readable single-word prefix followed by a:
and then a human-readable message. Some examples:["OK", "b1a649ebe8...", true, ""]
["OK", "b1a649ebe8...", true, "pow: difficulty 25>=24"]
["OK", "b1a649ebe8...", true, "duplicate: already have this event"]
["OK", "b1a649ebe8...", false, "blocked: you are banned from posting here"]
["OK", "b1a649ebe8...", false, "blocked: please register your pubkey at https://my-expensive-relay.example.com"]
["OK", "b1a649ebe8...", false, "rate-limited: slow down there chief"]
["OK", "b1a649ebe8...", false, "invalid: event creation date is too far off from the current time"]
["OK", "b1a649ebe8...", false, "pow: difficulty 26 is less than 30"]
["OK", "b1a649ebe8...", false, "restricted: not allowed to write."]
["OK", "b1a649ebe8...", false, "error: could not connect to the database"]
CLOSED
messages MUST be sent in response to aREQ
when the relay refuses to fulfill it. It can also be sent when a relay decides to kill a subscription on its side before a client has disconnected or sent aCLOSE
. This message uses the same pattern ofOK
messages with the machine-readable prefix and human-readable message. Some examples:["CLOSED", "sub1", "unsupported: filter contains unknown elements"]
["CLOSED", "sub1", "error: could not connect to the database"]
["CLOSED", "sub1", "error: shutting down idle subscription"]
- The standardized machine-readable prefixes for
OK
andCLOSED
are:duplicate
,pow
,blocked
,rate-limited
,invalid
,restricted
, anderror
for when none of that fits.
- The
-
@ 872982aa:8fb54cfe
2025-03-27 00:47:09 -
@ 872982aa:8fb54cfe
2025-03-27 00:45:24NIPs
NIPs stand for Nostr Implementation Possibilities.
They exist to document what may be implemented by Nostr-compatible relay and client software.
- List
- Event Kinds
- Message Types
- Client to Relay
- Relay to Client
- Standardized Tags
- Criteria for acceptance of NIPs
- Is this repository a centralizing factor?
- How this repository works
- Breaking Changes
- License
List
- NIP-01: Basic protocol flow description
- NIP-02: Follow List
- NIP-03: OpenTimestamps Attestations for Events
- NIP-04: Encrypted Direct Message --- unrecommended: deprecated in favor of NIP-17
- NIP-05: Mapping Nostr keys to DNS-based internet identifiers
- NIP-06: Basic key derivation from mnemonic seed phrase
- NIP-07:
window.nostr
capability for web browsers - NIP-08: Handling Mentions --- unrecommended: deprecated in favor of NIP-27
- NIP-09: Event Deletion Request
- NIP-10: Text Notes and Threads
- NIP-11: Relay Information Document
- NIP-13: Proof of Work
- NIP-14: Subject tag in text events
- NIP-15: Nostr Marketplace (for resilient marketplaces)
- NIP-17: Private Direct Messages
- NIP-18: Reposts
- NIP-19: bech32-encoded entities
- NIP-21:
nostr:
URI scheme - NIP-22: Comment
- NIP-23: Long-form Content
- NIP-24: Extra metadata fields and tags
- NIP-25: Reactions
- NIP-26: Delegated Event Signing
- NIP-27: Text Note References
- NIP-28: Public Chat
- NIP-29: Relay-based Groups
- NIP-30: Custom Emoji
- NIP-31: Dealing with Unknown Events
- NIP-32: Labeling
- NIP-34:
git
stuff - NIP-35: Torrents
- NIP-36: Sensitive Content
- NIP-37: Draft Events
- NIP-38: User Statuses
- NIP-39: External Identities in Profiles
- NIP-40: Expiration Timestamp
- NIP-42: Authentication of clients to relays
- NIP-44: Encrypted Payloads (Versioned)
- NIP-45: Counting results
- NIP-46: Nostr Remote Signing
- NIP-47: Nostr Wallet Connect
- NIP-48: Proxy Tags
- NIP-49: Private Key Encryption
- NIP-50: Search Capability
- NIP-51: Lists
- NIP-52: Calendar Events
- NIP-53: Live Activities
- NIP-54: Wiki
- NIP-55: Android Signer Application
- NIP-56: Reporting
- NIP-57: Lightning Zaps
- NIP-58: Badges
- NIP-59: Gift Wrap
- NIP-60: Cashu Wallet
- NIP-61: Nutzaps
- NIP-62: Request to Vanish
- NIP-64: Chess (PGN)
- NIP-65: Relay List Metadata
- NIP-66: Relay Discovery and Liveness Monitoring
- NIP-68: Picture-first feeds
- NIP-69: Peer-to-peer Order events
- NIP-70: Protected Events
- NIP-71: Video Events
- NIP-72: Moderated Communities
- NIP-73: External Content IDs
- NIP-75: Zap Goals
- NIP-78: Application-specific data
- NIP-84: Highlights
- NIP-86: Relay Management API
- NIP-88: Polls
- NIP-89: Recommended Application Handlers
- NIP-90: Data Vending Machines
- NIP-92: Media Attachments
- NIP-94: File Metadata
- NIP-96: HTTP File Storage Integration
- NIP-98: HTTP Auth
- NIP-99: Classified Listings
- NIP-7D: Threads
- NIP-C7: Chats
Event Kinds
| kind | description | NIP | | ------------- | ------------------------------- | -------------------------------------- | |
0
| User Metadata | 01 | |1
| Short Text Note | 10 | |2
| Recommend Relay | 01 (deprecated) | |3
| Follows | 02 | |4
| Encrypted Direct Messages | 04 | |5
| Event Deletion Request | 09 | |6
| Repost | 18 | |7
| Reaction | 25 | |8
| Badge Award | 58 | |9
| Chat Message | C7 | |10
| Group Chat Threaded Reply | 29 (deprecated) | |11
| Thread | 7D | |12
| Group Thread Reply | 29 (deprecated) | |13
| Seal | 59 | |14
| Direct Message | 17 | |15
| File Message | 17 | |16
| Generic Repost | 18 | |17
| Reaction to a website | 25 | |20
| Picture | 68 | |21
| Video Event | 71 | |22
| Short-form Portrait Video Event | 71 | |30
| internal reference | NKBIP-03 | |31
| external web reference | NKBIP-03 | |32
| hardcopy reference | NKBIP-03 | |33
| prompt reference | NKBIP-03 | |40
| Channel Creation | 28 | |41
| Channel Metadata | 28 | |42
| Channel Message | 28 | |43
| Channel Hide Message | 28 | |44
| Channel Mute User | 28 | |62
| Request to Vanish | 62 | |64
| Chess (PGN) | 64 | |818
| Merge Requests | 54 | |1018
| Poll Response | 88 | |1021
| Bid | 15 | |1022
| Bid confirmation | 15 | |1040
| OpenTimestamps | 03 | |1059
| Gift Wrap | 59 | |1063
| File Metadata | 94 | |1068
| Poll | 88 | |1111
| Comment | 22 | |1311
| Live Chat Message | 53 | |1617
| Patches | 34 | |1621
| Issues | 34 | |1622
| Git Replies (deprecated) | 34 | |1630
-1633
| Status | 34 | |1971
| Problem Tracker | nostrocket | |1984
| Reporting | 56 | |1985
| Label | 32 | |1986
| Relay reviews | | |1987
| AI Embeddings / Vector lists | NKBIP-02 | |2003
| Torrent | 35 | |2004
| Torrent Comment | 35 | |2022
| Coinjoin Pool | joinstr | |4550
| Community Post Approval | 72 | |5000
-5999
| Job Request | 90 | |6000
-6999
| Job Result | 90 | |7000
| Job Feedback | 90 | |7374
| Reserved Cashu Wallet Tokens | 60 | |7375
| Cashu Wallet Tokens | 60 | |7376
| Cashu Wallet History | 60 | |9000
-9030
| Group Control Events | 29 | |9041
| Zap Goal | 75 | |9321
| Nutzap | 61 | |9467
| Tidal login | Tidal-nostr | |9734
| Zap Request | 57 | |9735
| Zap | 57 | |9802
| Highlights | 84 | |10000
| Mute list | 51 | |10001
| Pin list | 51 | |10002
| Relay List Metadata | 65, 51 | |10003
| Bookmark list | 51 | |10004
| Communities list | 51 | |10005
| Public chats list | 51 | |10006
| Blocked relays list | 51 | |10007
| Search relays list | 51 | |10009
| User groups | 51, 29 | |10013
| Private event relay list | 37 | |10015
| Interests list | 51 | |10019
| Nutzap Mint Recommendation | 61 | |10030
| User emoji list | 51 | |10050
| Relay list to receive DMs | 51, 17 | |10063
| User server list | Blossom | |10096
| File storage server list | 96 | |10166
| Relay Monitor Announcement | 66 | |13194
| Wallet Info | 47 | |17375
| Cashu Wallet Event | 60 | |21000
| Lightning Pub RPC | Lightning.Pub | |22242
| Client Authentication | 42 | |23194
| Wallet Request | 47 | |23195
| Wallet Response | 47 | |24133
| Nostr Connect | 46 | |24242
| Blobs stored on mediaservers | Blossom | |27235
| HTTP Auth | 98 | |30000
| Follow sets | 51 | |30001
| Generic lists | 51 (deprecated) | |30002
| Relay sets | 51 | |30003
| Bookmark sets | 51 | |30004
| Curation sets | 51 | |30005
| Video sets | 51 | |30007
| Kind mute sets | 51 | |30008
| Profile Badges | 58 | |30009
| Badge Definition | 58 | |30015
| Interest sets | 51 | |30017
| Create or update a stall | 15 | |30018
| Create or update a product | 15 | |30019
| Marketplace UI/UX | 15 | |30020
| Product sold as an auction | 15 | |30023
| Long-form Content | 23 | |30024
| Draft Long-form Content | 23 | |30030
| Emoji sets | 51 | |30040
| Curated Publication Index | NKBIP-01 | |30041
| Curated Publication Content | NKBIP-01 | |30063
| Release artifact sets | 51 | |30078
| Application-specific Data | 78 | |30166
| Relay Discovery | 66 | |30267
| App curation sets | 51 | |30311
| Live Event | 53 | |30315
| User Statuses | 38 | |30388
| Slide Set | Corny Chat | |30402
| Classified Listing | 99 | |30403
| Draft Classified Listing | 99 | |30617
| Repository announcements | 34 | |30618
| Repository state announcements | 34 | |30818
| Wiki article | 54 | |30819
| Redirects | 54 | |31234
| Draft Event | 37 | |31388
| Link Set | Corny Chat | |31890
| Feed | NUD: Custom Feeds | |31922
| Date-Based Calendar Event | 52 | |31923
| Time-Based Calendar Event | 52 | |31924
| Calendar | 52 | |31925
| Calendar Event RSVP | 52 | |31989
| Handler recommendation | 89 | |31990
| Handler information | 89 | | |32267
| Software Application | | | |34550
| Community Definition | 72 | |38383
| Peer-to-peer Order events | 69 | |39000-9
| Group metadata events | 29 |Message types
Client to Relay
| type | description | NIP | | ------- | --------------------------------------------------- | ----------- | |
EVENT
| used to publish events | 01 | |REQ
| used to request events and subscribe to new updates | 01 | |CLOSE
| used to stop previous subscriptions | 01 | |AUTH
| used to send authentication events | 42 | |COUNT
| used to request event counts | 45 |Relay to Client
| type | description | NIP | | -------- | ------------------------------------------------------- | ----------- | |
EOSE
| used to notify clients all stored events have been sent | 01 | |EVENT
| used to send events requested to clients | 01 | |NOTICE
| used to send human-readable messages to clients | 01 | |OK
| used to notify clients if an EVENT was successful | 01 | |CLOSED
| used to notify clients that a REQ was ended and why | 01 | |AUTH
| used to send authentication challenges | 42 | |COUNT
| used to send requested event counts to clients | 45 |Standardized Tags
| name | value | other parameters | NIP | | ----------------- | ------------------------------------ | ------------------------------- | -------------------------------------------------- | |
a
| coordinates to an event | relay URL | 01 | |A
| root address | relay URL | 22 | |d
| identifier | -- | 01 | |e
| event id (hex) | relay URL, marker, pubkey (hex) | 01, 10 | |E
| root event id | relay URL | 22 | |f
| currency code | -- | 69 | |g
| geohash | -- | 52 | |h
| group id | -- | 29 | |i
| external identity | proof, url hint | 35, 39, 73 | |I
| root external identity | -- | 22 | |k
| kind | -- | 18, 25, 72, 73 | |K
| root scope | -- | 22 | |l
| label, label namespace | -- | 32 | |L
| label namespace | -- | 32 | |m
| MIME type | -- | 94 | |p
| pubkey (hex) | relay URL, petname | 01, 02, 22 | |P
| pubkey (hex) | -- | 22, 57 | |q
| event id (hex) | relay URL, pubkey (hex) | 18 | |r
| a reference (URL, etc) | -- | 24, 25 | |r
| relay url | marker | 65 | |s
| status | -- | 69 | |t
| hashtag | -- | 24, 34, 35 | |u
| url | -- | 61, 98 | |x
| hash | -- | 35, 56 | |y
| platform | -- | 69 | |z
| order number | -- | 69 | |-
| -- | -- | 70 | |alt
| summary | -- | 31 | |amount
| millisatoshis, stringified | -- | 57 | |bolt11
|bolt11
invoice | -- | 57 | |challenge
| challenge string | -- | 42 | |client
| name, address | relay URL | 89 | |clone
| git clone URL | -- | 34 | |content-warning
| reason | -- | 36 | |delegation
| pubkey, conditions, delegation token | -- | 26 | |description
| description | -- | 34, 57, 58 | |emoji
| shortcode, image URL | -- | 30 | |encrypted
| -- | -- | 90 | |expiration
| unix timestamp (string) | -- | 40 | |file
| full path (string) | -- | 35 | |goal
| event id (hex) | relay URL | 75 | |image
| image URL | dimensions in pixels | 23, 52, 58 | |imeta
| inline metadata | -- | 92 | |lnurl
|bech32
encodedlnurl
| -- | 57 | |location
| location string | -- | 52, 99 | |name
| name | -- | 34, 58, 72 | |nonce
| random | difficulty | 13 | |preimage
| hash ofbolt11
invoice | -- | 57 | |price
| price | currency, frequency | 99 | |proxy
| external ID | protocol | 48 | |published_at
| unix timestamp (string) | -- | 23 | |relay
| relay url | -- | 42, 17 | |relays
| relay list | -- | 57 | |server
| file storage server url | -- | 96 | |subject
| subject | -- | 14, 17, 34 | |summary
| summary | -- | 23, 52 | |thumb
| badge thumbnail | dimensions in pixels | 58 | |title
| article title | -- | 23 | |tracker
| torrent tracker URL | -- | 35 | |web
| webpage URL | -- | 34 | |zap
| pubkey (hex), relay URL | weight | 57 |Please update these lists when proposing new NIPs.
Criteria for acceptance of NIPs
- They should be fully implemented in at least two clients and one relay -- when applicable.
- They should make sense.
- They should be optional and backwards-compatible: care must be taken such that clients and relays that choose to not implement them do not stop working when interacting with the ones that choose to.
- There should be no more than one way of doing the same thing.
- Other rules will be made up when necessary.
Is this repository a centralizing factor?
To promote interoperability, we need standards that everybody can follow, and we need them to define a single way of doing each thing without ever hurting backwards-compatibility, and for that purpose there is no way around getting everybody to agree on the same thing and keep a centralized index of these standards. However the fact that such an index exists doesn't hurt the decentralization of Nostr. At any point the central index can be challenged if it is failing to fulfill the needs of the protocol and it can migrate to other places and be maintained by other people.
It can even fork into multiple versions, and then some clients would go one way, others would go another way, and some clients would adhere to both competing standards. This would hurt the simplicity, openness and interoperability of Nostr a little, but everything would still work in the short term.
There is a list of notable Nostr software developers who have commit access to this repository, but that exists mostly for practical reasons, as by the nature of the thing we're dealing with the repository owner can revoke membership and rewrite history as they want -- and if these actions are unjustified or perceived as bad or evil the community must react.
How this repository works
Standards may emerge in two ways: the first way is that someone starts doing something, then others copy it; the second way is that someone has an idea of a new standard that could benefit multiple clients and the protocol in general without breaking backwards-compatibility and the principle of having a single way of doing things, then they write that idea and submit it to this repository, other interested parties read it and give their feedback, then once most people reasonably agree we codify that in a NIP which client and relay developers that are interested in the feature can proceed to implement.
These two ways of standardizing things are supported by this repository. Although the second is preferred, an effort will be made to codify standards emerged outside this repository into NIPs that can be later referenced and easily understood and implemented by others -- but obviously as in any human system discretion may be applied when standards are considered harmful.
Breaking Changes
License
All NIPs are public domain.
Contributors
-
@ 04c915da:3dfbecc9
2025-03-26 20:54:33Capitalism is the most effective system for scaling innovation. The pursuit of profit is an incredibly powerful human incentive. Most major improvements to human society and quality of life have resulted from this base incentive. Market competition often results in the best outcomes for all.
That said, some projects can never be monetized. They are open in nature and a business model would centralize control. Open protocols like bitcoin and nostr are not owned by anyone and if they were it would destroy the key value propositions they provide. No single entity can or should control their use. Anyone can build on them without permission.
As a result, open protocols must depend on donation based grant funding from the people and organizations that rely on them. This model works but it is slow and uncertain, a grind where sustainability is never fully reached but rather constantly sought. As someone who has been incredibly active in the open source grant funding space, I do not think people truly appreciate how difficult it is to raise charitable money and deploy it efficiently.
Projects that can be monetized should be. Profitability is a super power. When a business can generate revenue, it taps into a self sustaining cycle. Profit fuels growth and development while providing projects independence and agency. This flywheel effect is why companies like Google, Amazon, and Apple have scaled to global dominance. The profit incentive aligns human effort with efficiency. Businesses must innovate, cut waste, and deliver value to survive.
Contrast this with non monetized projects. Without profit, they lean on external support, which can dry up or shift with donor priorities. A profit driven model, on the other hand, is inherently leaner and more adaptable. It is not charity but survival. When survival is tied to delivering what people want, scale follows naturally.
The real magic happens when profitable, sustainable businesses are built on top of open protocols and software. Consider the many startups building on open source software stacks, such as Start9, Mempool, and Primal, offering premium services on top of the open source software they build out and maintain. Think of companies like Block or Strike, which leverage bitcoin’s open protocol to offer their services on top. These businesses amplify the open software and protocols they build on, driving adoption and improvement at a pace donations alone could never match.
When you combine open software and protocols with profit driven business the result are lean, sustainable companies that grow faster and serve more people than either could alone. Bitcoin’s network, for instance, benefits from businesses that profit off its existence, while nostr will expand as developers monetize apps built on the protocol.
Capitalism scales best because competition results in efficiency. Donation funded protocols and software lay the groundwork, while market driven businesses build on top. The profit incentive acts as a filter, ensuring resources flow to what works, while open systems keep the playing field accessible, empowering users and builders. Together, they create a flywheel of innovation, growth, and global benefit.
-
@ da0b9bc3:4e30a4a9
2025-03-28 19:14:52It's Finally here Stackers!
It's Friday!
We're about to kick off our weekends with some feel good tracks.
Let's get the party started. Bring me those Feel Good tracks.
Let's get it!
https://youtu.be/r1ATFedwjnk?si=tPtLac6ExYZCx3Ez
originally posted at https://stacker.news/items/928119
-
@ 000002de:c05780a7
2025-03-26 20:41:36I sadly do not recall where I heard this but I'm amazed sometimes that I can have heard something like "An eye for an eye and a tooth for a tooth" so many times and a thought never occur to me. For some background, I was raised in the church and have read the Bible many times over my life. I usually read it each year so I'm very familiar with the text.
When we read "An eye for an eye and a tooth for a tooth" in Exodus we often think of how terrible this sounds. But, in reality the principle here is that a just penalty should be in equal measure to the damage caused. In practice what we often see is escalation, not equality in response. Its incredibly destructive.
Jesus in the sermon on the mount said,
“You have heard that it was said, ‘An eye for an eye and a tooth for a tooth.’ 39 But I say to you, Do not resist the one who is evil. But if anyone slaps you on the right cheek, turn to him the other also. 40 And if anyone would sue you and take your tunic, let him have your cloak as well. 41 And if anyone forces you to go one mile, go with him two miles. 42 Give to the one who begs from you, and do not refuse the one who would borrow from you.
43 “You have heard that it was said, ‘You shall love your neighbor and hate your enemy.’ 44 But I say to you, Love your enemies and pray for those who persecute you, 45 so that you may be sons of your Father who is in heaven. For he makes his sun rise on the evil and on the good, and sends rain on the just and on the unjust. 46 For if you love those who love you, what reward do you have? Do not even the tax collectors do the same? 47 And if you greet only your brothers, what more are you doing than others? Do not even the Gentiles do the same? 48 You therefore must be perfect, as your heavenly Father is perfect.
~ Matthew 5:38-48
There is something powerful in understanding the original intent and what Jesus adds. These days it seems many Christians have forgotten this teaching and the results. The results were that Europe was converted to Christianity. There is incredible power in loving your enemies. And not returning evil with evil. @k00b's post prompted me to write this.
Edit:
The other thing that prompted this is watching how people in the church are allowing politics to fuel their behavior in destructive ways. As Christians we should realize that politics is not the answer. Its Jesus.
originally posted at https://stacker.news/items/926101
-
@ 3c389c8f:7a2eff7f
2025-03-28 17:10:17There is a new web being built on Nostr. At it's core, is a social experience paralleled by no other decentralized protocol. Nostr not only solves the problems of siloed relationships, third-party identity ownership, and algorithmic content control; it makes possible a ubiquitous social network across almost anything imaginable. User controlled identity, open data, and verifiable social graphs allow us to redefine trust on the web. We can interact with each other and online content in ways that have previously only been pipedreams. Nostr is not just social media, it is the web made social.
Interoperability
The client/relay relationship on Nostr allows for almost endless data exchange between various apps, clients, relays, and users. If any two things are willing to speak the same sub-protocol(s) within Nostr, they can exchange data. Making a friend list enables that list to be used in any other place that chooses to make it available. Creating a relay to serve an algorithmic social feed makes that feed viewable in any client that displays social feeds. Health data held by a patient can be shared with any care provider, verified by their system, and vice versa. This is the point where I have to acknowledge my own tech-deaf limitations and direct you towards nostr.com for more information.
Data Resiliency
I prefer to use the term resiliency here, because its really a mix of data redundancy and self-managed data that creates broad availability. Relays may host 10, 20, 30+ copies of your notes in different locations, but you also have no assurance that those relays will hosts those notes forever. An individual operating their own relay, while also connecting to the wider network, ensures resiliency in events such that wide swaths of the network should disappear or collude against an individual. The simplicity of relay management makes it possible for nearly anyone to make sure that they have a way to convey their messages to their individual network, whether that be close contacts, an audience, or one individual. This resiliency doesn't just apply to typical speech, it applies to any data intended to be shared amongst humans and machines alike.
Pseudonymity and Anonymity
With privacy encroachment from corporations, advertisers, and governments reaching all time highs, the need for identity protecting tools is also on the rise. Nostr utilizes public key encryption for its identity system. As there is no central entity to "verify" you, there is no need to expose any personal identifiable information to any Nostr app, client, or relay. You can protect your personal identity by simply choosing not to expose it. Your reputation will build as you interact with others on the Nostr network. Your social capital can speak for itself. (As with everything else, utilizing a VPN is recommended.)
Identity and Provability
No one can stop an impersonator from trying to hijack an identity. With Nostr, you CAN prove that you are you, though, which is basically the same as saying "that person is not me" Every note you write, every action you take, is cryptographically signed by your private key. As long as you maintain control of that key, you can prove what you did or did not do.
Censorship Resistance
If you have read our Relay Rundown then you probably get the idea. If not here's the tl;dr: Many small, lightweight relays make up Nostr's distribution system. They are simple enough that anyone can run one. They are redundant enough that you can be almost certain your content exists somewhere. If that is not peace of mind enough, you can run your own with ease. Censorship resistance isn't counting on one company, man, or server to protect what you say. It is taking control of your speech. Nostr makes it easy.
Freedom of Mind and Association
Nostr eliminates the need for company run algorithms that high-jack your attention to feed the advertising industry. You are free to choose your social media experience. Nostr's DVMs, curations, and conversation-centered relays offer discovery mechanisms run by any number of providers. That could be an individual, a company, a group, or you. Many clients incorporate different ways of engaging with these corporate algorithm alternatives. You can also choose to keep a purely chronological feed of the the things and people you follow. Exploring Nostr through its many apps opens up a the freedom to choose what and how you feed your mind.
When we are able to explore, we end up surrounding ourselves with people who share our interests & hobbies. We find friends. This creates distance between ideologies and stark beliefs that often are used as the basis for the term "being in a bubble". Instead of bubbling off, an infinitely open space of thoughts and ideas allows for groups to gather naturally. In this way, we can choose not to block ourselves off from opposing views but to simply distance ourselves from them.
Nostr's relay system also allows for the opposite. Tight-knit communities can create a space for its members to socialize and exchange information with minimal interference from any outside influence. By setting up their own relays with strict rules, the members can utilize one identity to interact within a community or across the broader social network.
-
@ a012dc82:6458a70d
2025-03-28 16:15:06In an audacious display of confidence, Bitcoin traders have recently committed $20 million to a $200K call option, a move that has reignited discussions about the cryptocurrency's potential and the broader market's appetite for risk. This development is set against a backdrop of increasing activity within the cryptocurrency options market, particularly on platforms like Deribit, where total open interest in Bitcoin options has reached unprecedented levels. This article explores the nuances of this strategic wager, examines the resurgence of investor enthusiasm, and contemplates the future implications for Bitcoin and the cryptocurrency market at large.
Table of Contents
-
A Surge in Market Activity
-
The Bold Bet on Bitcoin's Future
-
Implications of the $200K Call Option
-
Increased Market Volatility
-
Renewed Investor Confidence
-
Speculative Interest and Market Dynamics
-
-
Looking Ahead: Bitcoin's Market Prospects
-
Conclusion
-
FAQs
A Surge in Market Activity
The cryptocurrency options market has experienced a significant uptick in activity, with Bitcoin and Ethereum options achieving record-breaking open interest figures. On Deribit, Bitcoin options open interest has soared to a staggering $20.4 billion, eclipsing the previous high of $14.36 billion seen in October 2021. Concurrently, Ethereum options open interest has also reached a historic peak of $11.66 billion. This pronounced increase in market activity is indicative of a growing interest among traders to either hedge their positions against potential price fluctuations or to speculate on the future price movements of these leading cryptocurrencies. The surge in options trading volume reflects a broader trend of maturation within the cryptocurrency market, as sophisticated financial instruments become increasingly utilized by a diverse array of market participants, from individual investors to large institutional players.
The Bold Bet on Bitcoin's Future
The decision by traders to allocate $20 million to a $200K call option for Bitcoin represents a significant vote of confidence in the cryptocurrency's future price trajectory. This high-stakes gamble suggests that a segment of the market is not only optimistic about Bitcoin's potential to breach the $200,000 threshold but is also willing to back this belief with substantial financial commitment. Such a move is emblematic of the "animal spirits" returning to the cryptocurrency market—a term coined by economist John Maynard Keynes to describe the instinctive human emotion that drives consumer confidence and investment decisions. This resurgence of speculative fervor and risk-taking behavior is a testament to the enduring allure of Bitcoin as an asset class that continues to captivate the imagination of investors, despite its history of volatility and regulatory challenges.
Implications of the $200K Call Option
The substantial investment in the $200K call option carries several implications for the Bitcoin market and the broader cryptocurrency ecosystem:
Increased Market Volatility
The focus on high strike price options could introduce heightened volatility into the Bitcoin market. As traders position themselves to capitalize on potential price movements, the market may witness more pronounced fluctuations. This environment of increased volatility underscores the speculative nature of cryptocurrency trading and the high-risk, high-reward strategies employed by some market participants. It also highlights the need for investors to approach the market with caution, armed with a thorough understanding of the underlying risks and a clear investment strategy.
Renewed Investor Confidence
The bold wager on the $200K call option reflects a significant resurgence in investor confidence in Bitcoin's long-term prospects. Following periods of market downturns and regulatory uncertainty, this move signals a renewed conviction in the fundamental value proposition of Bitcoin as a pioneering digital asset. It represents a collective belief in the cryptocurrency's ability to not only recover from past setbacks but to chart new territories in terms of price and market capitalization. This renewed investor confidence may serve as a catalyst for further investment in Bitcoin and other cryptocurrencies, potentially driving up prices and encouraging more widespread adoption.
Speculative Interest and Market Dynamics
The commitment to the $200K call option highlights the continued influence of speculative interest on the cryptocurrency market's dynamics. It illustrates how speculation, driven by the prospect of outsized returns, remains a central force shaping market trends and price trajectories. This speculative interest, while contributing to market liquidity and price discovery, also introduces an element of unpredictability. It underscores the complex interplay between market sentiment, investor behavior, and external economic factors that collectively determine the direction of the cryptocurrency market.
Looking Ahead: Bitcoin's Market Prospects
The strategic bet on the $200K call option, amidst a backdrop of increasing options market activity, paints a complex picture of Bitcoin's future. While the move signals optimism and a willingness among investors to engage in high-risk speculation, it also raises questions about the sustainability of such bullish sentiment. As Bitcoin continues to navigate the evolving landscape of digital finance, the interplay between speculative interest, regulatory developments, and technological advancements will be critical in shaping its future trajectory. The cryptocurrency market's inherent volatility and unpredictability necessitate a cautious approach from investors, emphasizing the importance of risk management and long-term strategic planning.
Conclusion
Bitcoin's latest foray into high-stakes speculation, marked by the $20 million lock on the $200K call option, is a vivid illustration of the cryptocurrency's enduring appeal and the market's appetite for risk. This development not only reflects a bullish outlook on Bitcoin's price potential but also signals a broader resurgence of investor enthusiasm and speculative activity within the cryptocurrency market. As we look to the future, the outcomes of such bold moves will undoubtedly influence the trajectory of Bitcoin and the digital asset landscape at large. Whether Bitcoin will reach the lofty heights of $200,000 remains to be seen, but its journey there will be closely watched by traders, investors, and regulators alike, offering valuable insights into the dynamics of speculative markets and the evolving role of cryptocurrencies in the global financial ecosystem.
FAQs
What does locking $20 million in a $200K call option mean for Bitcoin? Locking $20 million in a $200K call option indicates that traders are betting a significant amount of money on Bitcoin reaching or surpassing $200,000. It reflects a bullish outlook on Bitcoin's future price and a resurgence of speculative interest in the cryptocurrency market.
How does the surge in Bitcoin options market activity affect the cryptocurrency? The surge in Bitcoin options market activity, with record open interest, increases market liquidity and can lead to heightened volatility. It also signifies growing interest and participation in the cryptocurrency market, potentially influencing Bitcoin's price dynamics.
What are the implications of increased market volatility for Bitcoin investors? Increased market volatility can lead to larger price swings, presenting both opportunities and risks for investors. While it may offer the potential for higher returns, it also increases the risk of losses. Investors should approach the market with caution and consider their risk tolerance and investment strategy.
Why are investors optimistic about Bitcoin reaching $200,000? Investors' optimism about Bitcoin reaching $200,000 stems from factors such as the cryptocurrency's past performance, the upcoming Bitcoin halving event, increasing institutional adoption, and favorable macroeconomic conditions. These factors contribute to a bullish sentiment in the market.
What role do institutional investors play in the current Bitcoin market trend? Institutional investors play a significant role in the current Bitcoin market trend by bringing in substantial capital, lending credibility to the market, and influencing price movements. Their participation is seen as a sign of maturity and stability in the cryptocurrency market.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co/
Youtube: @thebitcoinlibertarian
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
Get Orange Pill App And Connect With Bitcoiners In Your Area. Stack Friends Who Stack Sats link: https://signup.theorangepillapp.com/opa/croxroad
Buy Bitcoin Books At Konsensus Network Store. 10% Discount With Code “21croxroad” link: https://bitcoinbook.shop?ref=21croxroad
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 7d33ba57:1b82db35
2025-03-26 20:26:11L'Ampolla is a charming fishing village on the Costa Dorada, known for its pristine beaches, fresh seafood, and proximity to the Ebro Delta Natural Park. With a relaxed Mediterranean atmosphere, it’s an ideal destination for nature lovers, foodies, and beachgoers.
🏖️ Top Things to See & Do in L'Ampolla
1️⃣ Beaches of L'Ampolla 🏝️
- Platja de l'Arenal – A long, shallow sandy beach, perfect for families.
- Platja Cap-Roig – A stunning cove with reddish cliffs and crystal-clear waters.
- Platja dels Capellans – A quiet beach, ideal for relaxation.
2️⃣ Ebro Delta Natural Park 🌿
- A UNESCO Biosphere Reserve home to wetlands, rice fields, and flamingos.
- Go birdwatching, cycling, or take a boat tour along the Ebro River.
- Try kayaking through the peaceful waterways.
3️⃣ Coastal Hiking & Biking 🚶♂️🚴
- Follow the GR-92 coastal trail for breathtaking sea views.
- Enjoy the Camí de Ronda, a scenic path linking L'Ampolla with nearby beaches.
4️⃣ Fishing & Seafood Gastronomy 🎣🍽️
- Visit the port to see traditional fishing boats bring in the daily catch.
- Enjoy fresh oysters, mussels, and paella in seaside restaurants.
5️⃣ Mirador de Bassa de les Olles 🌅
- A beautiful viewpoint with fantastic views of the Ebro Delta lagoons.
- Best visited at sunset for a magical experience.
🍽️ What to Eat in L'Ampolla
- Arròs negre – Black rice with squid ink 🍚🦑
- Fideuà – A seafood noodle dish, similar to paella 🍤
- Oysters & mussels from the Ebro Delta 🦪
- Anguila en suquet – Eel stew, a local specialty 🐟
- Crema Catalana – A delicious caramelized custard dessert 🍮
🚗 How to Get to L'Ampolla
🚆 By Train: Direct trains from Barcelona (2 hrs), Tarragona (1 hr), and Valencia (2.5 hrs)
🚘 By Car: ~1.5 hrs from Barcelona, 45 min from Tarragona
🚌 By Bus: Regional buses connect L'Ampolla with Tarragona and Tortosa
✈️ By Air: Closest airports – Reus (REU, 70 km) and Barcelona-El Prat (BCN, 150 km)💡 Tips for Visiting L'Ampolla
✅ Best time to visit? Spring and summer for the best weather ☀️
✅ Try local seafood – Some of the best in Catalonia 🍽️
✅ Visit the Ebro Delta early – Fewer crowds and better wildlife spotting 🦩
✅ Rent a bike – The best way to explore the coastal and natural areas 🚲 -
@ 6b3780ef:221416c8
2025-03-26 18:42:00This workshop will guide you through exploring the concepts behind MCP servers and how to deploy them as DVMs in Nostr using DVMCP. By the end, you'll understand how these systems work together and be able to create your own deployments.
Understanding MCP Systems
MCP (Model Context Protocol) systems consist of two main components that work together:
- MCP Server: The heart of the system that exposes tools, which you can access via the
.listTools()
method. - MCP Client: The interface that connects to the MCP server and lets you use the tools it offers.
These servers and clients can communicate using different transport methods:
- Standard I/O (stdio): A simple local connection method when your server and client are on the same machine.
- Server-Sent Events (SSE): Uses HTTP to create a communication channel.
For this workshop, we'll use stdio to deploy our server. DVMCP will act as a bridge, connecting to your MCP server as an MCP client, and exposing its tools as a DVM that anyone can call from Nostr.
Creating (or Finding) an MCP Server
Building an MCP server is simpler than you might think:
- Create software in any programming language you're comfortable with.
- Add an MCP library to expose your server's MCP interface.
- Create an API that wraps around your software's functionality.
Once your server is ready, an MCP client can connect, for example, with
bun index.js
, and then call.listTools()
to discover what your server can do. This pattern, known as reflection, makes Nostr DVMs and MCP a perfect match since both use JSON, and DVMs can announce and call tools, effectively becoming an MCP proxy.Alternatively, you can use one of the many existing MCP servers available in various repositories.
For more information about mcp and how to build mcp servers you can visit https://modelcontextprotocol.io/
Setting Up the Workshop
Let's get hands-on:
First, to follow this workshop you will need Bun. Install it from https://bun.sh/. For Linux and macOS, you can use the installation script:
curl -fsSL https://bun.sh/install | bash
-
Choose your MCP server: You can either create one or use an existing one.
-
Inspect your server using the MCP inspector tool:
bash npx @modelcontextprotocol/inspector build/index.js arg1 arg2
This will: - Launch a client UI (default: http://localhost:5173)
- Start an MCP proxy server (default: port 3000)
-
Pass any additional arguments directly to your server
-
Use the inspector: Open the client UI in your browser to connect with your server, list available tools, and test its functionality.
Deploying with DVMCP
Now for the exciting part – making your MCP server available to everyone on Nostr:
-
Navigate to your MCP server directory.
-
Run without installing (quickest way):
npx @dvmcp/bridge
-
Or install globally for regular use:
npm install -g @dvmcp/bridge # or bun install -g @dvmcp/bridge
Then run using:bash dvmcp-bridge
This will guide you through creating the necessary configuration.
Watch the console logs to confirm successful setup – you'll see your public key and process information, or any issues that need addressing.
For the configuration, you can set the relay as
wss://relay.dvmcp.fun
, or use any other of your preferenceTesting and Integration
- Visit dvmcp.fun to see your DVM announcement.
- Call your tools and watch the responses come back.
For production use, consider running dvmcp-bridge as a system service or creating a container for greater reliability and uptime.
Integrating with LLM Clients
You can also integrate your DVMCP deployment with LLM clients using the discovery package:
-
Install and use the
@dvmcp/discovery
package:bash npx @dvmcp/discovery
-
This package acts as an MCP server for your LLM system by:
- Connecting to configured Nostr relays
- Discovering tools from DVMCP servers
-
Making them available to your LLM applications
-
Connect to specific servers or providers using these flags: ```bash # Connect to all DVMCP servers from a provider npx @dvmcp/discovery --provider npub1...
# Connect to a specific DVMCP server npx @dvmcp/discovery --server naddr1... ```
Using these flags, you wouldn't need a configuration file. You can find these commands and Claude desktop configuration already prepared for copy and paste at dvmcp.fun.
This feature lets you connect to any DVMCP server using Nostr and integrate it into your client, either as a DVM or in LLM-powered applications.
Final thoughts
If you've followed this workshop, you now have an MCP server deployed as a Nostr DVM. This means that local resources from the system where the MCP server is running can be accessed through Nostr in a decentralized manner. This capability is powerful and opens up numerous possibilities and opportunities for fun.
You can use this setup for various use cases, including in a controlled/local environment. For instance, you can deploy a relay in your local network that's only accessible within it, exposing all your local MCP servers to anyone connected to the network. This setup can act as a hub for communication between different systems, which could be particularly interesting for applications in home automation or other fields. The potential applications are limitless.
However, it's important to keep in mind that there are security concerns when exposing local resources publicly. You should be mindful of these risks and prioritize security when creating and deploying your MCP servers on Nostr.
Finally, these are new ideas, and the software is still under development. If you have any feedback, please refer to the GitHub repository to report issues or collaborate. DVMCP also has a Signal group you can join. Additionally, you can engage with the community on Nostr using the #dvmcp hashtag.
Useful Resources
- Official Documentation:
- Model Context Protocol: modelcontextprotocol.org
-
DVMCP.fun: dvmcp.fun
-
Source Code and Development:
- DVMCP: github.com/gzuuus/dvmcp
-
DVMCP.fun: github.com/gzuuus/dvmcpfun
-
MCP Servers and Clients:
- Smithery AI: smithery.ai
- MCP.so: mcp.so
-
Glama AI MCP Servers: glama.ai/mcp/servers
Happy building!
- MCP Server: The heart of the system that exposes tools, which you can access via the
-
@ 000002de:c05780a7
2025-03-26 18:00:41Over the past few years I've noticed more people using the political compass to compare where different movements and people fall in comparison to each other.
For many years I have found the left / right evaluation of politics less and less useful. Mostly because it really doesn't account for authoritarianism and other factors such as economics. I'm not sure the political compass is great but it seems better to me.
Have you looked into it? Any issues you've found? Mostly curious what others think about it.
originally posted at https://stacker.news/items/925938
-
@ 8d34bd24:414be32b
2025-03-26 15:58:59I’ll admit that God’s truth is something I am passionate about. I love God’s word and I trust every word in the Bible as absolute truth. I hate when people compromise God’s word. I can’t understand Christians that don’t want to know God better through His word (maybe partially because I read a stack of books to solve any and every problem or to fulfill any interest).
Lately, the vow made in court to tell the truth, the whole truth, and nothing but the truth has been going through my mind. It comes up regarding almost everything, so I figured maybe God was telling me to write a post on the subject, so here we go.
The Truth
When we are searching for the truth about anything, we need to start with the Bible. Yes, there are many subjects about which the Bible doesn’t speak or doesn’t speak in detail, but the principles on which everything is built start with the Bible.
All Scripture is God-breathed and is useful for teaching, rebuking, correcting and training in righteousness, so that the servant of God may be thoroughly equipped for every good work. (2 Timothy 3:16-17)
Especially when we are trying to learn what God wants from us and our lives, we need to search the Scriptures. We need to study the Scriptures. We need to memorize the Scriptures.
I have hidden your word in my heart that I might not sin against you. (Psalm 119:11)
It is much more useful to have read the Bible many times and to know its contents cover to cover, so we have it available to us during that debate with a fellow believer, or the discussion with a proud atheist, or when put into a situation of temptation. Having God’s word “hidden in our heart” enables us to deal with every situation, just as Jesus did when tempted by the Devil in the wilderness. Jesus’s most common response to every challenge was “As it is written …”
Sanctify them by the truth; your word is truth. (John 17:17)
If we want to know the truth and be ready for whatever life throws at us, we need to be like Ezra:
He had begun his journey from Babylon on the first day of the first month, and he arrived in Jerusalem on the first day of the fifth month, for the gracious hand of his God was on him. For Ezra had devoted himself to the study and observance of the Law of the Lord, and to teaching its decrees and laws in Israel. (Ezra 7:9-10) {emphasis mine}
Are you known for devoting yourself to the study and observance of the Law of the Lord, and to teaching its decrees and laws?
The Whole Truth
Obviously there are God hating atheists who will lie about God’s word and totally contradict His word. As believers, we are more likely to bend God’s truth. (Satan does this, too, because it is frequently more effective than an outright lie). There are two primary ways to bend God’s truth. We either leave out some parts or we add to it. In this section we will focus on telling the whole truth and not leaving out part of the truth.
The error of lying by omission is rampant today. We see it in news reports by the media. We see it in the history taught to our children. We see it in many churches. There are some very uncomfortable truths in the Bible. People don’t like to hear that some people will be punished in Hell for all eternity. They don’t want to hear that they are sinners and their desires are sinful. They don’t like to hear that there is one and only one way to Jesus.
Jesus said to him, “I am the way, and the truth, and the life; no one comes to the Father but through Me. (John 14:6)
Many believers don’t like any conflict. They are afraid that speaking the truth is being judgmental and will hurt relationships and feelings, so they hold back and don’t speak the whole truth.
Deal bountifully with Your servant,\ That I may live and keep Your word.\ *Open my eyes, that I may behold\ Wonderful things from Your law.*\ I am a stranger in the earth;\ Do not hide Your commandments from me.\ My soul is crushed with longing\ After Your ordinances at all times.\ You rebuke the arrogant, the cursed,\ Who wander from Your commandments.\ Take away reproach and contempt from me,\ For I observe Your testimonies.\ Even though princes sit and talk against me,\ Your servant meditates on Your statutes.\ Your testimonies also are my delight;\ They are my counselors. (Psalm 119:17-24) {emphasis mine}
The psalmist begs God not to “hide Your commandments from me.” Should we hide God’s commandments from ourselves or others because they are uncomfortable?
He said, “What is the word that He spoke to you? Please do not hide it from me. May God do so to you, and more also, if you hide anything from me of all the words that He spoke to you.” (1 Samuel 3:17)
Eli put the harshest curse on Samuel if he didn’t speak the full truth communicated by God. We need to truly know and believe God’s word, so we communicate it fully with others and do not hide it from those whose very heart and soul need God’s truth.
Many of us may feel like we are not lying because we didn’t not explicitly speak an untruth, but withholding part of the truth, so that another is misled, is as much of a lie as speaking an untruth. Both are intended to mislead the other person, usually for our benefit or comfort and to the long-term harm of the other person.
Finally, brothers and sisters, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable—if anything is excellent or praiseworthy—think about such things. Whatever you have learned or received or heard from me, or seen in me—put it into practice. And the God of peace will be with you. (Philippians 4:8-9) {emphasis mine}
We need to think on, speak, and put into practice all of God’s word. Picking and choosing which parts of God’s word we want to believe, speak, and put into practice is akin to the original sin, “You will be like gods, knowing good and evil.” Only God gets to decide what is true or false and what is good or evil. When we choose to pick which parts of the Bible to obey and to share, we are taking the role that belongs solely to God.
Nothing But the Truth
The other error regarding truth is to add to God’s word.
The Pharisees and the scribes asked Him, “Why do Your disciples not walk according to the tradition of the elders, but eat their bread with impure hands?” And He said to them, “Rightly did Isaiah prophesy of you hypocrites, as it is written:
‘This people honors Me with their lips,\ But their heart is far away from Me.\ But in vain do they worship Me,\ **Teaching as doctrines the precepts of men.’\ Neglecting the commandment of God, you hold to the tradition of men.” (Mark 7:5-8) {emphasis mine}
So often we let tradition, culture, or “science” guide us instead of the Bible. Whenever there is a contradiction between any source and the Bible, we need to put the authority of God’s word as the highest authority. Although it is possible for us to be mistaken by the meaning of God’s word and the truth to be more in line with culture or “science,” it is so much more likely that tradition, culture, or “science” are wrong. We need to use the Bible to interpret things like science rather than to use “science” to interpret the Bible. The Bible is always the higher authority.
Sometimes we add to God’s word intentionally. Sometimes we are just influenced by the people around us, especially supposed authority figures, and are led astray unintentionally.
Do your best to present yourself to God as one approved, a worker who does not need to be ashamed and who correctly handles the word of truth. (2 Timothy 2:15) {emphasis mine}
We need to truly study the whole Bible and test every one of our beliefs against God’s word.
I am astonished that you are so quickly deserting the one who called you to live in the grace of Christ and are turning to a different gospel— which is really no gospel at all. Evidently some people are throwing you into confusion and are trying to pervert the gospel of Christ. But even if we or an angel from heaven should preach a gospel other than the one we preached to you, let them be under God’s curse! As we have already said, so now I say again: If anybody is preaching to you a gospel other than what you accepted, let them be under God’s curse! (Galatians 1:6-9) {emphasis mine}
We need to use God’s word to test every idea.
Do not treat prophecies with contempt but test them all; hold on to what is good, reject every kind of evil. (1 Thessalonians 5:20-22)
and
Dear friends, do not believe every spirit, but test the spirits to see whether they are from God, because many false prophets have gone out into the world. This is how you can recognize the Spirit of God: Every spirit that acknowledges that Jesus Christ has come in the flesh is from God, but every spirit that does not acknowledge Jesus is not from God. This is the spirit of the antichrist, which you have heard is coming and even now is already in the world. (1 John 4:1-3) {emphasis mine}
God’s word is truth. It never changes. It doesn’t change with the times, the culture, or new scientific discoveries. The truth is the truth whether anyone believes it or not.
There are many who will lead you astray and sound like they know what they are talking about. Make sure you do not follow these false teachers in their error (whether the error is intentional or accidental), but even more, make sure you don’t spread the error and lead others astray.
See to it that no one takes you captive through philosophy and empty deception, according to the tradition of men, according to the elementary principles of the world, rather than according to Christ. (Colossians 2:8) {emphasis mine}
I think this phrase perfectly describes how error effects us, “See to it that no one takes you captive through …” Error can be subtle, but can take us captive, lead us astray, and cause us to lead others astray. Only through detailed knowledge of the Scriptures can we defend against it.
Don’t be deceived, my dear brothers and sisters. Every good and perfect gift is from above, coming down from the Father of the heavenly lights, who does not change like shifting shadows. He chose to give us birth through the word of truth, that we might be a kind of firstfruits of all he created. (James 1:16-18) {emphasis mine}
May the Lord of heaven guide us to know the truth, the whole truth, and nothing but the truth and to obey His word in all things to His glory, forever.
Trust Jesus
-
@ 57d1a264:69f1fee1
2025-03-28 10:32:15Bitcoin.design community is organizing another Designathon, from May 4-18. Let's get creative with bitcoin together. More to come very soon.
The first edition was a bursting success! the website still there https://events.bitcoin.design, and here their previous announcement.
Look forward for this to happen!
Spread the voice:
N: https://njump.me/nevent1qqsv9w8p93tadlnyx0rkhexj5l48l... X: https://x.com/bitcoin_design/status/1905547407405768927
originally posted at https://stacker.news/items/927650
-
@ 2b24a1fa:17750f64
2025-03-28 10:07:04Der Deutsche Bundestag wurde neu gewählt. Für einige Abgeordnete und Regierungsmitglieder heißt es Time to Say Goodbye. Abschied ist ein scharfes Schwert.
https://soundcloud.com/radiomuenchen/nachruf-2-olaf-der-zeitenwender
Auch bei Radio München werden Trennungs- und Verlassenheitsgefühle getriggert. Umso mehr, wenn es sich nicht nur um duselige Allerweltsliebe handelt, sondern um den Abgang großer Helden. Sie bezahlten ihren todesmutigen und fast ehrenamtlichen Einsatz nicht mit dem Leben, jedoch mit der einen oder anderen Falte in Hemd oder Bluse, manchmal sogar im Gesicht. Was bleibt? Eine bescheidene Pension? Ein lausig bezahlter Manager-Job in einem Konzern? Wir wollen jedenfalls nicht, dass diese Volkshelden vom Zahn der Zeit abgenagt, vergessen werden und setzen ihnen deshalb ein bescheidenes akustisches, aber nachhaltiges Denkmal. Hören Sie die kleine satirische Reihe „Nachrufe“ von unserem Autor Jonny Rieder.\ Folge 2: Olaf der Zeitenwender
Sprecher: Karsten Troyke
Bild: Markus Mitterer für Radio München
Radio München\ www.radiomuenchen.net/\ @radiomuenchen\ www.facebook.com/radiomuenchen\ www.instagram.com/radio_muenchen/\ twitter.com/RadioMuenchen
Radio München ist eine gemeinnützige Unternehmung.\ Wir freuen uns, wenn Sie unsere Arbeit unterstützen.
GLS-Bank\ IBAN: DE65 4306 0967 8217 9867 00\ BIC: GENODEM1GLS
-
@ 1b30d27a:3cf04146
2025-03-26 14:48:26In recent years, Artificial Intelligence (AI) has become a significant force in transforming various industries, and the music world is no exception. Machine learning algorithms and AI tools are reshaping how music is created, produced, and consumed, offering musicians and producers new ways to enhance creativity and productivity. As AI continues to evolve, it is poised to become a valuable co-creator in the music industry, making the possibilities for sound creation nearly limitless.
Redefining Music Composition with AI
Traditionally, music composition has been a human-driven process, where creativity and emotional depth played key roles. However, AI is now being used to generate original compositions, offering a new dimension to music creation. AI tools like Amper Music, Jukedeck, and Aiva can generate complex musical pieces in various genres, allowing musicians to collaborate with AI to create compositions that would have been impossible or time-consuming by traditional means.
"AI allows artists to explore new sounds, experiment with complex structures, and push boundaries in ways they never could before."
Musicians can feed AI programs with their preferences, and the system can generate melodies, chord progressions, and rhythms based on their input. These AI-generated pieces can be used as the foundation for new music or as inspiration for artists to develop and refine their work further.
AI in Music Production: Enhancing Creativity
While AI has made significant advancements in composition, its role in music production is equally groundbreaking. The production process involves a variety of technical tasks, such as mixing, mastering, and sound design. With the help of AI, producers can now streamline these tasks, allowing more time for creative decision-making.
Benefits of AI in Music Production:
- Faster Workflow: AI tools can automate time-consuming tasks, such as adjusting levels and applying effects, which accelerates the production process.
- Precision and Consistency: AI algorithms can ensure that every element of a track is perfectly balanced, leading to high-quality productions.
- Personalized Sound Design: AI can learn an artist’s unique sound and help shape mixes to match the artist’s vision, whether they’re working with digital synthesizers or traditional instruments.
Tools like LANDR for mastering and iZotope’s Ozone for mixing are examples of AI-powered software that can automatically adjust audio tracks, ensuring optimal sound quality and consistency.
AI as a Collaborative Tool in Music Creation
The most exciting aspect of AI in music production is its potential as a collaborative tool. Instead of replacing musicians and producers, AI is offering new avenues for collaboration. AI’s ability to generate fresh musical ideas, suggest unconventional sound combinations, and recommend harmonies can spark innovation in ways that were previously unimaginable.
"AI acts as a partner, not a replacement. It listens, learns, and collaborates with musicians to create something greater than what either could do alone."
This partnership allows musicians to break free from creative blocks, explore new genres, and experiment with sounds that might not have been considered otherwise. By training AI to understand a musician’s style, AI can tailor suggestions and act as an idea generator, constantly offering new directions for creative exploration.
AI and the Music Listening Experience
AI doesn’t just transform the creation and production process; it’s also changing the way we experience music. Recommendation algorithms are already helping millions of listeners discover new artists, songs, and genres on platforms like Spotify, YouTube, and Apple Music. AI analyzes user behavior, such as listening history and preferences, to suggest music that fits an individual’s taste.
Additionally, AI-powered live performances are emerging, where virtual concerts and interactive music experiences adapt to real-time audience feedback. Through the use of augmented reality (AR) and virtual reality (VR), AI is enhancing how fans engage with music, creating immersive environments that allow for a completely new type of live experience.
The Future of AI in Music
As AI continues to evolve, its role in the music industry will only expand. We can expect AI to become even more integrated into the creative process, offering musicians tools to generate new compositions, automate production tasks, and enhance their overall workflow. As AI learns and adapts to the needs of individual artists, it will continue to act
-
@ 1b30d27a:3cf04146
2025-03-26 14:16:23Artificial Intelligence (AI) is revolutionizing the music industry. What was once a tool used only for automation is now evolving into a creative partner that artists can collaborate with. AI's machine learning algorithms are transforming the way music is composed, produced, and consumed, providing endless opportunities for innovation and creativity.
AI in Music Composition
AI is helping musicians create compositions faster and more efficiently than ever before. Algorithms trained on a variety of musical genres can now generate complex melodies and harmonies, mimicking the style of famous composers or creating something entirely new. AI tools like OpenAI's MuseNet can generate entire musical pieces, and musicians are using these compositions as inspiration, or in some cases, as finished works.
"AI is a co-creator—bringing fresh perspectives and ideas, transforming the music composition process."
These AI tools don’t just replicate existing music—they offer new possibilities for experimentation, allowing artists to explore creative directions they might not have thought of on their own.
Streamlining Music Production
In music production, AI is changing the game. By analyzing audio tracks, AI can help with tasks like mixing, mastering, and sound enhancement. Tools like LANDR and iZotope Ozone automate the mastering process, giving producers professional-level results in a fraction of the time it would take manually.
Key Benefits of AI in Music Production:
- Time Efficiency: Automated processes speed up repetitive tasks like mixing and mastering.
- Enhanced Sound Quality: AI can fine-tune audio, ensuring clarity and balance.
- Personalization: AI can learn an artist’s style, offering tailored suggestions and improvements.
AI tools provide a more efficient workflow, freeing up time for artists to focus on creativity rather than the technical details of production.
AI as a Collaborative Partner
AI is no longer just a tool for producers; it’s a creative partner. It helps musicians explore new ideas, generate sound variations, and fine-tune compositions. AI can generate unusual sound combinations, suggest new chord progressions, or even help artists push past creative blocks.
"AI offers endless possibilities—it's a partner in the creative process, not just a tool."
By collaborating with AI, artists can expand their creative horizons, unlocking new ideas that might not have been possible without this technological partnership.
AI’s Influence on Music Consumption
AI also plays a huge role in how we experience music. Music platforms like Spotify and YouTube use AI to personalize recommendations based on listening habits. This allows users to discover new artists, genres, and tracks that align with their preferences, enhancing the overall music experience.
Moreover, AI-driven virtual concerts and augmented reality performances are on the rise, creating immersive and interactive experiences that bring music to life in a new way.
The Future of AI in Music
The future of AI in music is bright. As AI continues to advance, it will play an even more integral role in music composition, production, and distribution. Artists will continue to use AI as a creative collaborator, and audiences will benefit from even more personalized music experiences.
The journey of AI in music production is just beginning. As technology evolves, so too will the possibilities for musicians and listeners alike. AI is helping us unlock new creative potential, and it’s exciting to think about where this collaboration will take us next. 🚀
-
@ 2b24a1fa:17750f64
2025-03-28 10:03:58Zwischen Überzeugungsarbeit und Propaganda verläuft ein schmaler Grad. Aber so oder so: Wer die subtileren Werkzeuge hat und vor allem die Mittel um Menschen zu kaufen, die diese dann anwenden, hat eindeutig die besseren Karten.
Dass die Bevölkerung nun wissen will, mit welchen Mitteln sie auf welche Weise beeinflusst werden soll, ist selbstverständlich. Wie nuanciert diese Beeinflussung stattfinden kann, darauf haben uns unsere Hörer beim letzten Beitrag von Milosz Matuschek: „Die ersten Köpfe rollen“ gestoßen. Es ging um die staatliche amerikanische Behörde für internationale Entwicklungshilfe USAID. Matuschek schrieb: „Man liest was von AID im Namen und denkt, was man denken soll: klingt nach Bob Geldof, barmherzigen Schwestern und “Brot für die Welt”.“ Man hatte das nicht nur optisch wahrgenommen, nein, diese Behörde wurde hierzulande, in allen Medien US AID genannt, was unsere Sprecherin Sabrina Khalil übernahm. Dass die United States Agency for International Development in USA so nicht gesprochen wird, schrieben uns gleich mehrere aufmerksame Hörer. Es ist sicherlich keine Paranoia darüber nachzudenken, ob die Bedeutung unserer Sprache, unserer Wörter bis hin zur Aussprache im Fokus der Manipulation steht. Dafür wird sehr viel Geld locker gemacht und unter anderem in die Medien gepumpt.
Hören Sie heute den zweiten Teil der Reihe „Die Corona-Connection“ mit dem Titel: „Der mediale Deep State wankt“. Sprecherin: Sabrina Khalil.
Das freie Medienprojekt Pareto kann übrigens Unterstützung gebrauchen, dafür wurde ein Crowdfunding auf Geyser gestartet, wo man mit Bitcoin/Lightning-Spenden helfen kann. Und für Spenden auf dem klassischen Weg finden Sie die entsprechende Bankverbindung auf der Homepage pareto.space/de.
Nachzulesen unter: www.freischwebende-intelligenz.org/p/unter…mediale
Foto: Gleichschaltung - sie melden exakt den gleichen Wortlaut.