-

@ b4403b24:83542d4e
2025-03-31 14:31:53
đ Bitcoin Enthusiasts! Tomorrow the price of #BTCPrague2025 tickets goes up so take advantage of the 10% discount using code from the video - BTCBULGARIA.
â
Network with leaders
â
Learn blockchain strategies
â
Gain crypto insights
Secure your spot NOW!
#Bitcoin #BTC #BTCPrague

originally posted at https://stacker.news/items/930210
-

@ 9dd283b1:cf9b6beb
2025-03-31 13:21:08
Do you still feel anxiety when Bitcoin's price drops significantly, even though you're in fiat profit (100% +) ? Why or why not? And when did you truly stop feeling any emotional attachment to the price fluctuations?
originally posted at https://stacker.news/items/930139
-

@ 39cc53c9:27168656
2025-03-30 05:54:53
> [Read the original blog post](https://blog.kycnot.me/p/kyc-no-thanks)
Know Your Customer is a regulation that requires companies of all sizes to verify the identity, suitability, and risks involved with maintaining a business relationship with a customer. Such procedures fit within the broader scope of anti-money laundering (AML) and counterterrorism financing (CTF) regulations.
Banks, exchanges, online business, mail providers, domain registrars... Everyone wants to know who you are before you can even opt for their service. Your personal information is flowing around the internet in the hands of "god-knows-who" and secured by "trust-me-bro military-grade encryption". Once your account is linked to your personal (and verified) identity, tracking you is just as easy as keeping logs on all these platforms.
## Rights for Illusions
KYC processes aim to combat terrorist financing, money laundering, and other illicit activities. On the surface, KYC seems like a commendable initiative. I mean, who wouldn't want to halt terrorists and criminals in their tracks?
The logic behind KYC is: "If we mandate every financial service provider to identify their users, it becomes easier to pinpoint and apprehend the malicious actors."
However, terrorists and criminals are not precisely lining up to be identified. They're crafty. They may adopt false identities or find alternative strategies to continue their operations. Far from being outwitted, many times they're several steps ahead of regulations. Realistically, KYC might deter a small fraction â let's say about 1% [^1] â of these malefactors. Yet, the cost? All of us are saddled with the inconvenient process of identification just to use a service.
Under the rhetoric of "ensuring our safety", governments and institutions enact regulations that seem more out of a dystopian novel, gradually taking away our right to privacy.
To illustrate, consider a city where the mayor has rolled out facial recognition cameras in every nook and cranny. A band of criminals, intent on robbing a local store, rolls in with a stolen car, their faces obscured by masks and their bodies cloaked in all-black clothes. Once they've committed the crime and exited the city's boundaries, they switch vehicles and clothes out of the cameras' watchful eyes. The high-tech surveillance? It didnât manage to identify or trace them. Yet, for every law-abiding citizen who merely wants to drive through the city or do some shopping, their movements and identities are constantly logged. The irony? This invasive tracking impacts all of us, just to catch the 1% [^1] of less-than-careful criminals.
## KYC? Not you.
> KYC creates barriers to participation in normal economic activity, to supposedly stop criminals. [^2]
KYC puts barriers between many users and businesses. One of these comes from the fact that the process often requires multiple forms of identification, proof of address, and sometimes even financial records. For individuals in areas with poor record-keeping, non-recognized legal documents, or those who are unbanked, homeless or transient, obtaining these documents can be challenging, if not impossible.
For people who are not skilled with technology or just don't have access to it, there's also a barrier since KYC procedures are mostly online, leaving them inadvertently excluded.
Another barrier goes for the casual or one-time user, where they might not see the value in undergoing a rigorous KYC process, and these requirements can deter them from using the service altogether.
It also wipes some businesses out of the equation, since for smaller businesses, the costs associated with complying with KYC normsâfrom the actual process of gathering and submitting documents to potential delays in operationsâcan be prohibitive in economical and/or technical terms.
## You're not welcome
Imagine a swanky new club in town with a strict "members only" sign. You hear the music, you see the lights, and you want in. You step up, ready to join, but suddenly there's a long list of criteria you must meet. After some time, you are finally checking all the boxes. But then the club rejects your membership with no clear reason why. You just weren't accepted. Frustrating, right?
This club scenario isn't too different from the fact that KYC is being used by many businesses as a convenient gatekeeping tool. A perfect excuse based on a "legal" procedure they are obliged to.
Even some exchanges may randomly use this to freeze and block funds from users, claiming these were "flagged" by a cryptic system that inspects the transactions. You are left hostage to their arbitrary decision to let you successfully pass the KYC procedure. If you choose to sidestep their invasive process, they might just hold onto your funds indefinitely.
## Your identity has been stolen
KYC data has been found to be for sale on many dark net markets[^3]. Exchanges may have leaks or hacks, and such leaks contain **very** sensitive data. We're talking about the full monty: passport or ID scans, proof of address, and even those awkward selfies where you're holding up your ID next to your face. All this data is being left to the mercy of the (mostly) "trust-me-bro" security systems of such companies. Quite scary, isn't it?
As cheap as $10 for 100 documents, with discounts applying for those who buy in bulk, the personal identities of innocent users who passed KYC procedures are for sale. [^3]
In short, if you have ever passed the KYC/AML process of a crypto exchange, your privacy is at risk of being compromised, or it might even have already been compromised.
## (they) Know Your Coins
You may already know that **Bitcoin and most cryptocurrencies have a transparent public blockchain**, meaning that all data is shown unencrypted for everyone to see and recorded **forever**. If you link an address you own to your identity through KYC, for example, by sending an amount from a KYC exchange to it, your Bitcoin is no longer pseudonymous and can then be traced.
If, for instance, you send Bitcoin from such an identified address to another KYC'ed address (say, from a friend), everyone having access to that address-identity link information (exchanges, governments, hackers, etc.) will be able to associate that transaction and know who you are transacting with.
## Conclusions
To sum up, **KYC does not protect individuals**; rather, it's a threat to our privacy, freedom, security and integrity. Sensible information flowing through the internet is thrown into chaos by dubious security measures. It puts borders between many potential customers and businesses, and it helps governments and companies track innocent users. That's the chaos KYC has stirred.
The criminals are using stolen identities from companies that gathered them thanks to these very same regulations that were supposed to combat them. Criminals always know how to circumvent such regulations. In the end, normal people are the most affected by these policies.
The threat that KYC poses to individuals in terms of privacy, security and freedom is not to be neglected. And if we donât start challenging these systems and questioning their efficacy, we are just one step closer to the dystopian future that is now foreseeable.
> Edited 20/03/2024
> * Add reference to the 1% statement on [Rights for Illusions](#rights-for-illusions) section to an article where Chainalysis found that only 0.34% of the transaction volume with cryptocurrencies in 2023 was attributable to criminal activity [^1]
[^1]: https://www.chainalysis.com/blog/2024-crypto-crime-report-introduction/
[^2]: https://old.reddit.com/r/BitcoinBeginners/comments/k2bve1/is_kyc_bad_if_so_why/gdtc8kz
[^3]: https://www.ccn.com/hacked-customer-data-from-world-leading-cryptocurrency-exchanges-for-sale-on-the-dark-web/
-

@ 5d4b6c8d:8a1c1ee3
2025-03-31 00:02:14
In my [monthly check-in](https://stacker.news/items/929731/r/Undisciplined), I described my vision for our regularly occurring awards:
- 1 top post for the year, receiving 1/3 of the total prize pool
- 4 top quarter posts, each receiving 1/12 of the total prize pool
- 12 top monthly posts, each receiving 1/36 of the total prize pool
Eventually, I'll want to finance these with some fraction of territory profits. However, when I took over the territory from @jeff, I [pledged](https://stacker.news/items/89179/r/Undisciplined?commentId=826287) to first use any profits to make whole our early donors, in some fashion.
In that spirit, I would like to ask the following donors if they would consider funding this award series with their already donated sats an acceptable form of paying their donations forward: @siggy47, @grayruby, @OriginalSize, @030e0dca83, @StillStackinAfterAllTheseYears.
I would also like to ask @jeff if he would consider something similar as payback for his early contributions to the territory.
Assuming all parties agree, we would have over 1M sats in funding for this series. At our current rate of about 400k profit per year, it would take a couple of years to pay it all forward and that top prize would be pretty nice.
Thanks,
Undisciplined
originally posted at https://stacker.news/items/929828
-

@ 04c915da:3dfbecc9
2025-03-26 20:54:33
Capitalism is the most effective system for scaling innovation. The pursuit of profit is an incredibly powerful human incentive. Most major improvements to human society and quality of life have resulted from this base incentive. Market competition often results in the best outcomes for all.
That said, some projects can never be monetized. They are open in nature and a business model would centralize control. Open protocols like bitcoin and nostr are not owned by anyone and if they were it would destroy the key value propositions they provide. No single entity can or should control their use. Anyone can build on them without permission.
As a result, open protocols must depend on donation based grant funding from the people and organizations that rely on them. This model works but it is slow and uncertain, a grind where sustainability is never fully reached but rather constantly sought. As someone who has been incredibly active in the open source grant funding space, I do not think people truly appreciate how difficult it is to raise charitable money and deploy it efficiently.
Projects that can be monetized should be. Profitability is a super power. When a business can generate revenue, it taps into a self sustaining cycle. Profit fuels growth and development while providing projects independence and agency. This flywheel effect is why companies like Google, Amazon, and Apple have scaled to global dominance. The profit incentive aligns human effort with efficiency. Businesses must innovate, cut waste, and deliver value to survive.
Contrast this with non monetized projects. Without profit, they lean on external support, which can dry up or shift with donor priorities. A profit driven model, on the other hand, is inherently leaner and more adaptable. It is not charity but survival. When survival is tied to delivering what people want, scale follows naturally.
The real magic happens when profitable, sustainable businesses are built on top of open protocols and software. Consider the many startups building on open source software stacks, such as Start9, Mempool, and Primal, offering premium services on top of the open source software they build out and maintain. Think of companies like Block or Strike, which leverage bitcoinâs open protocol to offer their services on top. These businesses amplify the open software and protocols they build on, driving adoption and improvement at a pace donations alone could never match.
When you combine open software and protocols with profit driven business the result are lean, sustainable companies that grow faster and serve more people than either could alone. Bitcoinâs network, for instance, benefits from businesses that profit off its existence, while nostr will expand as developers monetize apps built on the protocol.
Capitalism scales best because competition results in efficiency. Donation funded protocols and software lay the groundwork, while market driven businesses build on top. The profit incentive acts as a filter, ensuring resources flow to what works, while open systems keep the playing field accessible, empowering users and builders. Together, they create a flywheel of innovation, growth, and global benefit.
-

@ b2d670de:907f9d4a
2025-03-25 20:17:57
This guide will walk you through setting up your own Strfry Nostr relay on a Debian/Ubuntu server and making it accessible exclusively as a TOR hidden service. By the end, you'll have a privacy-focused relay that operates entirely within the TOR network, enhancing both your privacy and that of your users.
## Table of Contents
1. Prerequisites
2. Initial Server Setup
3. Installing Strfry Nostr Relay
4. Configuring Your Relay
5. Setting Up TOR
6. Making Your Relay Available on TOR
7. Testing Your Setup]
8. Maintenance and Security
9. Troubleshooting
## Prerequisites
- A Debian or Ubuntu server
- Basic familiarity with command line operations (most steps are explained in detail)
- Root or sudo access to your server
## Initial Server Setup
First, let's make sure your server is properly set up and secured.
### Update Your System
Connect to your server via SSH and update your system:
```bash
sudo apt update
sudo apt upgrade -y
```
### Set Up a Basic Firewall
Install and configure a basic firewall:
```bash
sudo apt install ufw -y
sudo ufw allow ssh
sudo ufw enable
```
This allows SSH connections while blocking other ports for security.
## Installing Strfry Nostr Relay
This guide includes the full range of steps needed to build and set up Strfry. It's simply based on the current version of the `DEPLOYMENT.md` document in the Strfry GitHub repository. If the build/setup process is changed in the repo, this document could get outdated. If so, please report to me that something is outdated and check for updated steps [here](https://github.com/hoytech/strfry/blob/master/docs/DEPLOYMENT.md).
### Install Dependencies
First, let's install the necessary dependencies. Each package serves a specific purpose in building and running Strfry:
```bash
sudo apt install -y git build-essential libyaml-perl libtemplate-perl libregexp-grammars-perl libssl-dev zlib1g-dev liblmdb-dev libflatbuffers-dev libsecp256k1-dev libzstd-dev
```
Here's why each dependency is needed:
**Basic Development Tools:**
- `git`: Version control system used to clone the Strfry repository and manage code updates
- `build-essential`: Meta-package that includes compilers (gcc, g++), make, and other essential build tools
**Perl Dependencies** (used for Strfry's build scripts):
- `libyaml-perl`: Perl interface to parse YAML configuration files
- `libtemplate-perl`: Template processing system used during the build process
- `libregexp-grammars-perl`: Advanced regular expression handling for Perl scripts
**Core Libraries for Strfry:**
- `libssl-dev`: Development files for OpenSSL, used for secure connections and cryptographic operations
- `zlib1g-dev`: Compression library that Strfry uses to reduce data size
- `liblmdb-dev`: Lightning Memory-Mapped Database library, which Strfry uses for its high-performance database backend
- `libflatbuffers-dev`: Memory-efficient serialization library for structured data
- `libsecp256k1-dev`: Optimized C library for EC operations on curve secp256k1, essential for Nostr's cryptographic signatures
- `libzstd-dev`: Fast real-time compression algorithm for efficient data storage and transmission
### Clone and Build Strfry
Clone the Strfry repository:
```bash
git clone https://github.com/hoytech/strfry.git
cd strfry
```
Build Strfry:
```bash
git submodule update --init
make setup-golpe
make -j2 # This uses 2 CPU cores. Adjust based on your server (e.g., -j4 for 4 cores)
```
This build process will take several minutes, especially on servers with limited CPU resources, so go get a coffee and post some great memes on nostr in the meantime.
### Install Strfry
Install the Strfry binary to your system path:
```bash
sudo cp strfry /usr/local/bin
```
This makes the `strfry` command available system-wide, allowing it to be executed from any directory and by any user with the appropriate permissions.
## Configuring Your Relay
### Create Strfry User
Create a dedicated user for running Strfry. This enhances security by isolating the relay process:
```bash
sudo useradd -M -s /usr/sbin/nologin strfry
```
The `-M` flag prevents creating a home directory, and `-s /usr/sbin/nologin` prevents anyone from logging in as this user. This is a security best practice for service accounts.
### Create Data Directory
Create a directory for Strfry's data:
```bash
sudo mkdir /var/lib/strfry
sudo chown strfry:strfry /var/lib/strfry
sudo chmod 755 /var/lib/strfry
```
This creates a dedicated directory for Strfry's database and sets the appropriate permissions so that only the strfry user can write to it.
### Configure Strfry
Copy the sample configuration file:
```bash
sudo cp strfry.conf /etc/strfry.conf
```
Edit the configuration file:
```bash
sudo nano /etc/strfry.conf
```
Modify the database path:
```
# Find this line:
db = "./strfry-db/"
# Change it to:
db = "/var/lib/strfry/"
```
Check your system's hard limit for file descriptors:
```bash
ulimit -Hn
```
Update the `nofiles` setting in your configuration to match this value (or set to 0):
```
# Add or modify this line in the config (example if your limit is 524288):
nofiles = 524288
```
The `nofiles` setting determines how many open files Strfry can have simultaneously. Setting it to your system's hard limit (or 0 to use the system default) helps prevent "too many open files" errors if your relay becomes popular.
You might also want to customize your relay's information in the config file. Look for the `info` section and update it with your relay's name, description, and other details.
Set ownership of the configuration file:
```bash
sudo chown strfry:strfry /etc/strfry.conf
```
### Create Systemd Service
Create a systemd service file for managing Strfry:
```bash
sudo nano /etc/systemd/system/strfry.service
```
Add the following content:
```ini
[Unit]
Description=strfry relay service
[Service]
User=strfry
ExecStart=/usr/local/bin/strfry relay
Restart=on-failure
RestartSec=5
ProtectHome=yes
NoNewPrivileges=yes
ProtectSystem=full
LimitCORE=1000000000
[Install]
WantedBy=multi-user.target
```
This systemd service configuration:
- Runs Strfry as the dedicated strfry user
- Automatically restarts the service if it fails
- Implements security measures like `ProtectHome` and `NoNewPrivileges`
- Sets resource limits appropriate for a relay
Enable and start the service:
```bash
sudo systemctl enable strfry.service
sudo systemctl start strfry
```
Check the service status:
```bash
sudo systemctl status strfry
```
### Verify Relay is Running
Test that your relay is running locally:
```bash
curl localhost:7777
```
You should see a message indicating that the Strfry relay is running. This confirms that Strfry is properly installed and configured before we proceed to set up TOR.
## Setting Up TOR
Now let's make your relay accessible as a TOR hidden service.
### Install TOR
Install TOR from the package repositories:
```bash
sudo apt install -y tor
```
This installs the TOR daemon that will create and manage your hidden service.
### Configure TOR
Edit the TOR configuration file:
```bash
sudo nano /etc/tor/torrc
```
Scroll down to wherever you see a commented out part like this:
```
#HiddenServiceDir /var/lib/tor/hidden_service/
#HiddenServicePort 80 127.0.0.1:80
```
Under those lines, add the following lines to set up a hidden service for your relay:
```
HiddenServiceDir /var/lib/tor/strfry-relay/
HiddenServicePort 80 127.0.0.1:7777
```
This configuration:
- Creates a hidden service directory at `/var/lib/tor/strfry-relay/`
- Maps port 80 on your .onion address to port 7777 on your local machine
- Keeps all traffic encrypted within the TOR network
Create the directory for your hidden service:
```bash
sudo mkdir -p /var/lib/tor/strfry-relay/
sudo chown debian-tor:debian-tor /var/lib/tor/strfry-relay/
sudo chmod 700 /var/lib/tor/strfry-relay/
```
The strict permissions (700) are crucial for security as they ensure only the debian-tor user can access the directory containing your hidden service private keys.
Restart TOR to apply changes:
```bash
sudo systemctl restart tor
```
## Making Your Relay Available on TOR
### Get Your Onion Address
After restarting TOR, you can find your onion address:
```bash
sudo cat /var/lib/tor/strfry-relay/hostname
```
This will output something like `abcdefghijklmnopqrstuvwxyz234567.onion`, which is your relay's unique .onion address. This is what you'll share with others to access your relay.
### Understanding Onion Addresses
The .onion address is a special-format hostname that is automatically generated based on your hidden service's private key.
Your users will need to use this address with the WebSocket protocol prefix to connect: `ws://youronionaddress.onion`
## Testing Your Setup
### Test with a Nostr Client
The best way to test your relay is with an actual Nostr client that supports TOR:
1. Open your TOR browser
2. Go to your favorite client, either on clearnet or an onion service.
- Check out [this list](https://github.com/0xtrr/onion-service-nostr-clients?tab=readme-ov-file#onion-service-nostr-clients) of nostr clients available over TOR.
3. Add your relay URL: `ws://youronionaddress.onion` to your relay list
4. Try posting a note and see if it appears on your relay
- In some nostr clients, you can also click on a relay to get information about it like the relay name and description you set earlier in the stryfry config. If you're able to see the correct values for the name and the description, you were able to connect to the relay.
- Some nostr clients also gives you a status on what relays a note was posted to, this could also give you an indication that your relay works as expected.
Note that not all Nostr clients support TOR connections natively. Some may require additional configuration or use of TOR Browser. E.g. most mobile apps would most likely require a TOR proxy app running in the background (some have TOR support built in too).
## Maintenance and Security
### Regular Updates
Keep your system, TOR, and relay updated:
```bash
# Update system
sudo apt update
sudo apt upgrade -y
# Update Strfry
cd ~/strfry
git pull
git submodule update
make -j2
sudo cp strfry /usr/local/bin
sudo systemctl restart strfry
# Verify TOR is still running properly
sudo systemctl status tor
```
Regular updates are crucial for security, especially for TOR which may have security-critical updates.
### Database Management
Strfry has built-in database management tools. Check the Strfry documentation for specific commands related to database maintenance, such as managing event retention and performing backups.
### Monitoring Logs
To monitor your Strfry logs:
```bash
sudo journalctl -u strfry -f
```
To check TOR logs:
```bash
sudo journalctl -u tor -f
```
Monitoring logs helps you identify potential issues and understand how your relay is being used.
### Backup
This is not a best practices guide on how to do backups. Preferably, backups should be stored either offline or on a different machine than your relay server. This is just a simple way on how to do it on the same server.
```bash
# Stop the relay temporarily
sudo systemctl stop strfry
# Backup the database
sudo cp -r /var/lib/strfry /path/to/backup/location
# Restart the relay
sudo systemctl start strfry
```
Back up your TOR hidden service private key. The private key is particularly sensitive as it defines your .onion address - losing it means losing your address permanently. If you do a backup of this, ensure that is stored in a safe place where no one else has access to it.
```bash
sudo cp /var/lib/tor/strfry-relay/hs_ed25519_secret_key /path/to/secure/backup/location
```
## Troubleshooting
### Relay Not Starting
If your relay doesn't start:
```bash
# Check logs
sudo journalctl -u strfry -e
# Verify configuration
cat /etc/strfry.conf
# Check permissions
ls -la /var/lib/strfry
```
Common issues include:
- Incorrect configuration format
- Permission problems with the data directory
- Port already in use (another service using port 7777)
- Issues with setting the nofiles limit (setting it too big)
### TOR Hidden Service Not Working
If your TOR hidden service is not accessible:
```bash
# Check TOR logs
sudo journalctl -u tor -e
# Verify TOR is running
sudo systemctl status tor
# Check onion address
sudo cat /var/lib/tor/strfry-relay/hostname
# Verify TOR configuration
sudo cat /etc/tor/torrc
```
Common TOR issues include:
- Incorrect directory permissions
- TOR service not running
- Incorrect port mapping in torrc
### Testing Connectivity
If you're having trouble connecting to your service:
```bash
# Verify Strfry is listening locally
sudo ss -tulpn | grep 7777
# Check that TOR is properly running
sudo systemctl status tor
# Test the local connection directly
curl --include --no-buffer localhost:7777
```
---
## Privacy and Security Considerations
Running a Nostr relay as a TOR hidden service provides several important privacy benefits:
1. **Network Privacy**: Traffic to your relay is encrypted and routed through the TOR network, making it difficult to determine who is connecting to your relay.
2. **Server Anonymity**: The physical location and IP address of your server are concealed, providing protection against denial-of-service attacks and other targeting.
3. **Censorship Resistance**: TOR hidden services are more resilient against censorship attempts, as they don't rely on the regular DNS system and can't be easily blocked.
4. **User Privacy**: Users connecting to your relay through TOR enjoy enhanced privacy, as their connections are also encrypted and anonymized.
However, there are some important considerations:
- TOR connections are typically slower than regular internet connections
- Not all Nostr clients support TOR connections natively
- Running a hidden service increases the importance of keeping your server secure
---
Congratulations! You now have a Strfry Nostr relay running as a TOR hidden service. This setup provides a resilient, privacy-focused, and censorship-resistant communication channel that helps strengthen the Nostr network.
For further customization and advanced configuration options, refer to the [Strfry documentation](https://github.com/hoytech/strfry).
Consider sharing your relay's .onion address with the Nostr community to help grow the privacy-focused segment of the network!
If you plan on providing a relay service that the public can use (either for free or paid for), consider adding it to [this list](https://github.com/0xtrr/onion-service-nostr-relays). Only add it if you plan to run a stable and available relay.
-

@ fd06f542:8d6d54cd
2025-03-31 10:00:34
NIP-05
======
Mapping Nostr keys to DNS-based internet identifiers
----------------------------------------------------
`final` `optional`
On events of kind `0` (`user metadata`) one can specify the key `"nip05"` with an [internet identifier](https://datatracker.ietf.org/doc/html/rfc5322#section-3.4.1) (an email-like address) as the value. Although there is a link to a very liberal "internet identifier" specification above, NIP-05 assumes the `<local-part>` part will be restricted to the characters `a-z0-9-_.`, case-insensitive.
Upon seeing that, the client splits the identifier into `<local-part>` and `<domain>` and use these values to make a GET request to `https://<domain>/.well-known/nostr.json?name=<local-part>`.
The result should be a JSON document object with a key `"names"` that should then be a mapping of names to hex formatted public keys. If the public key for the given `<name>` matches the `pubkey` from the `user metadata` event, the client then concludes that the given pubkey can indeed be referenced by its identifier.
### Example
If a client sees an event like this:
```jsonc
{
"pubkey": "b0635d6a9851d3aed0cd6c495b282167acf761729078d975fc341b22650b07b9",
"kind": 0,
"content": "{\"name\": \"bob\", \"nip05\": \"bob@example.com\"}"
// other fields...
}
```
It will make a GET request to `https://example.com/.well-known/nostr.json?name=bob` and get back a response that will look like
```json
{
"names": {
"bob": "b0635d6a9851d3aed0cd6c495b282167acf761729078d975fc341b22650b07b9"
}
}
```
or with the **recommended** `"relays"` attribute:
```json
{
"names": {
"bob": "b0635d6a9851d3aed0cd6c495b282167acf761729078d975fc341b22650b07b9"
},
"relays": {
"b0635d6a9851d3aed0cd6c495b282167acf761729078d975fc341b22650b07b9": [ "wss://relay.example.com", "wss://relay2.example.com" ]
}
}
```
If the pubkey matches the one given in `"names"` (as in the example above) that means the association is right and the `"nip05"` identifier is valid and can be displayed.
The recommended `"relays"` attribute may contain an object with public keys as properties and arrays of relay URLs as values. When present, that can be used to help clients learn in which relays the specific user may be found. Web servers which serve `/.well-known/nostr.json` files dynamically based on the query string SHOULD also serve the relays data for any name they serve in the same reply when that is available.
## Finding users from their NIP-05 identifier
A client may implement support for finding users' public keys from _internet identifiers_, the flow is the same as above, but reversed: first the client fetches the _well-known_ URL and from there it gets the public key of the user, then it tries to fetch the kind `0` event for that user and check if it has a matching `"nip05"`.
## Notes
### Identification, not verification
The NIP-05 is not intended to _verify_ a user, but only to _identify_ them, for the purpose of facilitating the exchange of a contact or their search.
Exceptions are people who own (e.g., a company) or are connected (e.g., a project) to a well-known domain, who can exploit NIP-05 as an attestation of their relationship with it, and thus to the organization behind it, thereby gaining an element of trust.
### User discovery implementation suggestion
A client can use this to allow users to search other profiles. If a client has a search box or something like that, a user may be able to type "bob@example.com" there and the client would recognize that and do the proper queries to obtain a pubkey and suggest that to the user.
### Clients must always follow public keys, not NIP-05 addresses
For example, if after finding that `bob@bob.com` has the public key `abc...def`, the user clicks a button to follow that profile, the client must keep a primary reference to `abc...def`, not `bob@bob.com`. If, for any reason, the address `https://bob.com/.well-known/nostr.json?name=bob` starts returning the public key `1d2...e3f` at any time in the future, the client must not replace `abc...def` in his list of followed profiles for the user (but it should stop displaying "bob@bob.com" for that user, as that will have become an invalid `"nip05"` property).
### Public keys must be in hex format
Keys must be returned in hex format. Keys in NIP-19 `npub` format are only meant to be used for display in client UIs, not in this NIP.
### Showing just the domain as an identifier
Clients may treat the identifier `_@domain` as the "root" identifier, and choose to display it as just the `<domain>`. For example, if Bob owns `bob.com`, he may not want an identifier like `bob@bob.com` as that is redundant. Instead, Bob can use the identifier `_@bob.com` and expect Nostr clients to show and treat that as just `bob.com` for all purposes.
### Reasoning for the `/.well-known/nostr.json?name=<local-part>` format
By adding the `<local-part>` as a query string instead of as part of the path, the protocol can support both dynamic servers that can generate JSON on-demand and static servers with a JSON file in it that may contain multiple names.
### Allowing access from JavaScript apps
JavaScript Nostr apps may be restricted by browser [CORS][] policies that prevent them from accessing `/.well-known/nostr.json` on the user's domain. When CORS prevents JS from loading a resource, the JS program sees it as a network failure identical to the resource not existing, so it is not possible for a pure-JS app to tell the user for certain that the failure was caused by a CORS issue. JS Nostr apps that see network failures requesting `/.well-known/nostr.json` files may want to recommend to users that they check the CORS policy of their servers, e.g.:
```bash
$ curl -sI https://example.com/.well-known/nostr.json?name=bob | grep -i ^Access-Control
Access-Control-Allow-Origin: *
```
Users should ensure that their `/.well-known/nostr.json` is served with the HTTP header `Access-Control-Allow-Origin: *` to ensure it can be validated by pure JS apps running in modern browsers.
[CORS]: https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS
### Security Constraints
The `/.well-known/nostr.json` endpoint MUST NOT return any HTTP redirects.
Fetchers MUST ignore any HTTP redirects given by the `/.well-known/nostr.json` endpoint.
-

@ fd06f542:8d6d54cd
2025-03-31 02:07:43
## ä»äčæŻnostrbookïŒ
-----
nostrbook æŻćșäșnostr 瀟ćșææŻććšćš nostr relay serveräžçéżæ(30023)æç« ă
æ„çæ”è§ïŒéçšçæŻ [docsify](https://docsify.js.org/#/) ææŻă
æŽäžȘçœç«ææŻäžäŒć çšéšçœČæćĄćšć€Șć€çććšç©șéŽ,ćŻä»„ćźç°èœ»éçș§éšçœČă
ä»»äœäșșćŻä»„éšçœČæćĄćšïŒæè
æŹć°éšçœČ æ„çæŹç«ææçäčŠç±ă
## nostrbook ćŻä»„æćĄćȘäșäșșïŒ
-----
* ćŒćè
ïŒćŠæäœ æłäșæŹĄćŒćïŒç[珏äžç« ăćŒćè
æć](/01.md)
* ćäčŠäœè
ïŒç[珏äșç« ăäœżçšæçš](/02.md)
* èŻ»è
äœ ć°±çŽæ„çčćŒçă
## nostrbookæȘæ„ćŠäœćć±ïŒ
-----
* ćŻèœäŒćąć blogćèœïŒæäșæ¶ćäœ ć°±æłéćżćçčæ„ćżïŒéŁäčçšblogćèœäčćŻä»„ă
* çčè”äșćšăçèšćèœă
-

@ aa8de34f:a6ffe696
2025-03-31 21:48:50
In seinem Beitrag vom 30. MĂ€rz 2025 fragt Henning Rosenbusch auf Telegram angesichts zunehmender digitaler Kontrolle und staatlicher Allmacht:
> âWie soll sich gegen eine solche Tyrannei noch ein Widerstand formieren können, selbst im Untergrund? Sehe ich nicht.â\
> ([Quelle: t.me/rosenbusch/25228](https://t.me/rosenbusch/25228))
Er beschreibt damit ein GefĂŒhl der Ohnmacht, das viele teilen: Eine Welt, in der Totalitarismus nicht mehr mit Panzern, sondern mit Algorithmen kommt. Wo Zugriff auf Geld, Meinungsfreiheit und Teilhabe vom Wohlverhalten abhĂ€ngt. Der BĂŒrger als kontrollierbare Variable im Code des Staates.\
Die Frage ist berechtigt. Doch die Antwort darauf liegt nicht in alten Widerstandsbildern â sondern in einer neuen RealitĂ€t.
\-- Denn es braucht keinen Untergrund mehr. --
Der Widerstand der Zukunft trĂ€gt keinen Tarnanzug. Er ist nicht konspirativ, sondern transparent. Nicht bewaffnet, sondern mathematisch beweisbar. Bitcoin steht nicht am Rand dieser Entwicklung â es ist ihr Fundament. Eine Bastion aus physikalischer RealitĂ€t, spieltheoretischem Schutz und ökonomischer Wahrheit. Es ist nicht unfehlbar, aber unbestechlich. Nicht perfekt, aber immun gegen zentrale WillkĂŒr.
Hier entsteht kein âdigitales Gegenreichâ, sondern eine dezentrale Renaissance. Keine Revolte aus Wut, sondern eine stille Abkehr: von Zwang zu Freiwilligkeit, von AbhĂ€ngigkeit zu Selbstverantwortung. Diese Revolution fĂŒhrt keine Kriege. Sie braucht keine FĂŒhrer. Sie ist ein Netzwerk. Jeder Knoten ein Individuum. Jede Entscheidung ein Akt der SelbstermĂ€chtigung.
Weltweit wachsen Freiheits-Zitadellen aus dieser Idee: wirtschaftlich autark, digital souverĂ€n, lokal verankert und global vernetzt. Sie sind keine Utopien im luftleeren Raum, sondern konkrete RealitĂ€ten â angetrieben von Energie, Code und dem menschlichen Wunsch nach WĂŒrde.
Der Globalismus alter PrĂ€gung â zentralistisch, monopolistisch, bevormundend â wird an seiner eigenen Hybris zerbrechen. Seine Werkzeuge der Kontrolle werden ihn nicht retten. Im Gegenteil: Seine Geister werden ihn verfolgen und erlegen.
Und wĂ€hrend die alten MĂ€chte um Erhalt kĂ€mpfen, wĂ€chst eine neue Welt â nicht im Schatten, sondern im Offenen. Nicht auf Gewalt gebaut, sondern auf Mathematik, Physik und Freiheit.
Die Tyrannei sieht keinen Widerstand.\
Weil sie nicht erkennt, dass er lÀngst begonnen hat.\
Unwiderruflich. Leise. Ăberall.
-

@ bc52210b:20bfc6de
2025-03-25 20:17:22
CISA, or Cross-Input Signature Aggregation, is a technique in Bitcoin that allows multiple signatures from different inputs in a transaction to be combined into a single, aggregated signature. This is a big deal because Bitcoin transactions often involve multiple inputs (e.g., spending from different wallet outputs), each requiring its own signature. Normally, these signatures take up space individually, but CISA compresses them into one, making transactions more efficient.
This magic is possible thanks to the linearity property of Schnorr signatures, a type of digital signature introduced to Bitcoin with the Taproot upgrade. Unlike the older ECDSA signatures, Schnorr signatures have mathematical properties that allow multiple signatures to be added together into a single valid signature. Think of it like combining multiple handwritten signatures into one super-signature that still proves everyone signed off!
Fun Fact: CISA was considered for inclusion in Taproot but was left out to keep the upgrade simple and manageable. Adding CISA wouldâve made Taproot more complex, so the developers hit pause on itâfor now.
---
**CISA vs. Key Aggregation (MuSig, FROST): Donât Get Confused!**
Before we go deeper, letâs clear up a common mix-up: CISA is not the same as protocols like MuSig or FROST. Hereâs why:
* Signature Aggregation (CISA): Combines multiple signatures into one, each potentially tied to different public keys and messages (e.g., different transaction inputs).
* Key Aggregation (MuSig, FROST): Combines multiple public keys into a single aggregated public key, then generates one signature for that key.
**Key Differences:**
1. Whatâs Aggregated?
* CISA: Aggregates signatures.
* Key Aggregation: Aggregates public keys.
2. What the Verifier Needs
* CISA: The verifier needs all individual public keys and their corresponding messages to check the aggregated signature.
* Key Aggregation: The verifier only needs the single aggregated public key and one message.
3. When It Happens
* CISA: Used during transaction signing, when inputs are being combined into a transaction.
* MuSig: Used during address creation, setting up a multi-signature (multisig) address that multiple parties control.
So, CISA is about shrinking signature data in a transaction, while MuSig/FROST are about simplifying multisig setups. Different tools, different jobs!
---
**Two Flavors of CISA: Half-Agg and Full-Agg**
CISA comes in two modes:
* Full Aggregation (Full-Agg): Interactive, meaning signers need to collaborate during the signing process. (Weâll skip the details here since the query focuses on Half-Agg.)
* Half Aggregation (Half-Agg): Non-interactive, meaning signers can work independently, and someone else can combine the signatures later.
Since the query includes âCISA Part 2: Half Signature Aggregation,â letâs zoom in on Half-Agg.
---
**Half Signature Aggregation (Half-Agg) Explained**
**How It Works**
Half-Agg is a non-interactive way to aggregate Schnorr signatures. Hereâs the process:
1. Independent Signing: Each signer creates their own Schnorr signature for their input, without needing to talk to the other signers.
2. Aggregation Step: An aggregator (could be anyone, like a wallet or node) takes all these signatures and combines them into one aggregated signature.
A Schnorr signature has two parts:
* R: A random point (32 bytes).
* s: A scalar value (32 bytes).
In Half-Agg:
* The R values from each signature are kept separate (one per input).
* The s values from all signatures are combined into a single s value.
**Why It Saves Space (~50%)**
Letâs break down the size savings with some math:
Before Aggregation:
* Each Schnorr signature = 64 bytes (32 for R + 32 for s).
* For n inputs: n Ă 64 bytes.
After Half-Agg:
* Keep n R values (32 bytes each) = 32 Ă n bytes.
* Combine all s values into one = 32 bytes.
* Total size: 32 Ă n + 32 bytes.
Comparison:
* Original: 64n bytes.
* Half-Agg: 32n + 32 bytes.
* For large n, the â+32â becomes small compared to 32n, so itâs roughly 32n, which is half of 64n. Hence, ~50% savings!
**Real-World Impact:**
Based on recent Bitcoin usage, Half-Agg could save:
* ~19.3% in space (reducing transaction size).
* ~6.9% in fees (since fees depend on transaction size). This assumes no major changes in how people use Bitcoin post-CISA.
---
**Applications of Half-Agg**
Half-Agg isnât just a cool ideaâit has practical uses:
1. Transaction-wide Aggregation
* Combine all signatures within a single transaction.
* Result: Smaller transactions, lower fees.
2. Block-wide Aggregation
* Combine signatures across all transactions in a Bitcoin block.
* Result: Even bigger space savings at the blockchain level.
3. Off-chain Protocols / P2P
* Use Half-Agg in systems like Lightning Network gossip messages.
* Benefit: Efficiency without needing miners or a Bitcoin soft fork.
---
**Challenges with Half-Agg**
While Half-Agg sounds awesome, itâs not without hurdles, especially at the block level:
1. Breaking Adaptor Signatures
* Adaptor signatures are special signatures used in protocols like Discreet Log Contracts (DLCs) or atomic swaps. They tie a signature to revealing a secret, ensuring fair exchanges.
* Aggregating signatures across a block might mess up these protocols, as the individual signatures get blended together, potentially losing the properties adaptor signatures rely on.
2. Impact on Reorg Recovery
* In Bitcoin, a reorganization (reorg) happens when the blockchain switches to a different chain of blocks. Transactions from the old chain need to be rebroadcast or reprocessed.
* If signatures are aggregated at the block level, it could complicate extracting individual transactions and their signatures during a reorg, slowing down recovery.
These challenges mean Half-Agg needs careful design, especially for block-wide use.
---
**Wrapping Up**
CISA is a clever way to make Bitcoin transactions more efficient by aggregating multiple Schnorr signatures into one, thanks to their linearity property. Half-Agg, the non-interactive mode, lets signers work independently, cutting signature size by about 50% (to 32n + 32 bytes from 64n bytes). It could save ~19.3% in space and ~6.9% in fees, with uses ranging from single transactions to entire blocks or off-chain systems like Lightning.
But watch outâblock-wide Half-Agg could trip up adaptor signatures and reorg recovery, so itâs not a slam dunk yet. Still, itâs a promising tool for a leaner, cheaper Bitcoin future!
-

@ fd06f542:8d6d54cd
2025-03-31 01:55:18
## ä»äčæŻnostrbookïŒ
-----
nostrbook æŻćșäșnostr 瀟ćșææŻććšćš nostr relay serveräžçéżæ(30023)æç« ă
æ„çæ”è§ïŒéçšçæŻ [docsify](https://docsify.js.org/#/) ææŻăæŽäžȘçœç«ææŻæ 饻éšçœČæćĄćšć çšć€Șć€çććšç©șéŽă
ćŻä»„ćźç°èœ»éçș§éšçœČă
-

@ 8d34bd24:414be32b
2025-03-30 23:16:09
When it comes to speaking the truth, obeying God, or living a godly life, the average or the compromise is not necessarily correct, but frequently we do err to one extreme or the other.
## Mercy or Wrath?
One area of controversy is whether we serve a God of love & mercy or a God of holiness & wrath. The truth is that the God of the Bible is both love and holiness and he acts in mercy and in wrath.
If we focus too much on Godâs holiness and wrath, we become solely about robotically obeying laws and about all of the things we canât do. We will fail to show love and mercy as Jesus showed those lost in sin. We will fail to show the mercy and love He showed to us. We become much like the Pharisees, whom Jesus called â*whitewashed tombs*.â
> Instead, speaking the truth in love, we will grow to become in every respect the mature body of him who is the head, that is, Christ. (Ephesians 4:15)
We need to always speak the truth, but in a loving and merciful way.
> Grace, mercy and peace from God the Father and from Jesus Christ, the Fatherâs Son, will be with us in truth and love. (2 John 1:3)
If we focus too much on Godâs love and mercy, we can forget that the God of the Bible is holy and righteous and canât stand to be in the presence of sinfulness. We can begin to soften Godâs holy word to be little more than suggestions. Even worse, we can bend Godâs word to the point that it no longer resembles His clearly communicated commands. Also, if we donât call sin âsinâ and sinners âsinners,â then those same sinners will never understand their need for a Savior and never trust Jesus in repentance. If God isnât holy and we arenât sinners, then why would anyone need a Savior?
> But just as he who called you is holy, so be holy in all you do; (1 Peter 1:15)
We need to treat God and His word as holy, while showing love to His creation.
> If I speak in the tongues of men or of angels, but do not have love, I am only a resounding gong or a clanging cymbal. (1 Corinthians 13:1)
God/Jesus/Holy Spirit are holy and loving. If we leave out either side of His character, then we arenât telling people about the God of the Bible. We have made a God in the image we desire, rather than who He is. If we go to either extreme, we lose who God really is and it will affect both our relationship with God and our relationship with others detrimentally.
## Faith or Works?
Another area of contention is relating to faith and works. What is more important â faith or works? Are they not both important?
Many believers focus on faith. Sola Fide (faith alone).
> For it is by grace you have been saved, through faithâand this is not from yourselves, it is the gift of Godâ not by works, so that no one can boast. (Ephesians 2:8-9)
This is a true statement that Salvation comes solely through faith in what Jesus did for us. We donât get any credit for our own works. All that is good and righteous in us is from the covering of the blood of Jesus and His good works and His power.
But since many people focus on faith alone, they can come to believe that they can live any way that pleases them.
> What shall we say, then? **Shall we go on sinning so that grace may increase? By no means! We are those who have died to sin; how can we live in it any longer**? Or donât you know that all of us who were baptized into Christ Jesus were baptized into his death? We were therefore buried with him through baptism into death in order that, just as Christ was raised from the dead through the glory of the Father, we too may live a new life. (Romans 6:1-4) {emphasis mine}
By focusing solely on faith, we can be tempted to live life however we please instead of living a life in submission to Our God and Savior. Our lives can be worthless instead of us acting as good servants.
> If any manâs work is burned up, he will suffer loss; but he himself will be saved, yet so as through fire. (1 Corinthians 3:15)
At the same time, there are many who are so focused on good works that they leave faith out of it â either a lack of faith themselves or a failure to communicate the need for faith when sharing the gospel. They try to earn their way to heaven. They try to impress those around them by their works.
> But they do all their deeds to be noticed by men; for they broaden their phylacteries and lengthen the tassels of their garments. They love the place of honor at banquets and the chief seats in the synagogues, and respectful greetings in the market places, and being called Rabbi by men. (Matthew 25:5-7)
I think James best communicates the balance between faith and works.
> What use is it, my brethren, **if someone says he has faith but he has no works? Can *that* faith save him**? If a brother or sister is without clothing and in need of daily food, and one of you says to them, âGo in peace, be warmed and be filled,â and yet you do not give them what is necessary for their body, what use is that? **Even so faith, if it has no works, is dead, being *by itself***.
>
> But someone may well say, âYou have faith and I have works; show me your faith without the works, and **I will show you my faith by my works**.â You believe that God is one. You do well; the demons also believe, and shudder. But are you willing to recognize, you foolish fellow, that faith without works is useless? Was not Abraham our father justified by works when he offered up Isaac his son on the altar? You see that faith was working with his works, and as a result of the works, faith was perfected; and the Scripture was fulfilled which says, âAnd Abraham believed God, and it was reckoned to him as righteousness,â and he was called the friend of God. You see that a man is justified by works and not by faith alone. (James 2:14-24) {emphasis mine}
Letâs look at some of the details here to find the truth. â*if someone says he has faith but he has no works? Can **that** faith save him*?â Can the kind of faith that has no works, that has no evidence, save a person? If a person truly has saving faith, there will be evidence in their world view and the way they live their life. â*Even so faith, if it has no works, is dead, being **by itself***.â We are saved by faith alone, but if we are saved we will have works. Faith âby itselfâ is not saving faith, for â*the demons also believe, and shudder*.â I donât think anyone would argue that the demons have saving faith, yet they believe and shudder.
Works are the evidence of true faith leading to salvation, but it is only faith that saves.
## Speak the Truth or Love?
Whether we stand firmly and always loudly speak the truth or whether we show love and mercy is related to how we view God (as loving or as holy), but I thought how we respond was worth its own discussion.
Sometimes people are so worried about love and unity that they compromise the truth. They may actively compromise the truth by claiming the Bible says something other than what it says, i.e.. old earth vs young earth, or marriage is about two people who love each other vs marriage being defined by God as one woman and one man. Sometimes this compromise is just avoiding talking about uncomfortable subjects completely so that no one is made to feel bad. This is a problem because God said what He said and means what He said.
> but speaking the truth in love, we are to grow up in all aspects into Him who is the head, even Christ, (Ephesians 4:15)
Avoiding speaking the whole truth is effectively lying about what Godâs word said (see my previous post on [âThe Truth, The Whole Truth, and Nothing But the Truth](https://trustjesus.substack.com/p/c7cdf433-9e7d-427e-9db0-e7bbd609661b)â). We are not doing anyone a favor making them feel good about their sin. A person has to admit they have a problem before they will act to fix the problem. A person who doesnât understand their sin will never submit to a Savior. It isnât loving to hide the truth from a person just because it makes them uncomfortable or it make the relationship uncomfortable for ourselves.
> Jesus said to him, âI am the way, and the truth, and the life; no one comes to the Father but through Me. (John 14:6)
At the same time, sometimes people seem to beat others over the head with Godâs truth. They share the truth in the most unloving and unmerciful way. They use Godâs truth to try to lift up themselves while putting down others. This is just as bad.
> Now we pray to God that you do no wrong; **not that we ourselves may appear approved, but that you may do what is right**, even though we may appear unapproved. For we can do nothing against the truth, but only for the truth. (2 Corinthians 13:7-8) {emphasis mine}
Some Christians spend so much time nit picking tiny discrepancies in theology that they miss the whole point of the Gospel.
> âWoe to you, scribes and Pharisees, hypocrites! For you tithe mint and dill and cumin, and have neglected the weightier provisions of the law: justice and mercy and faithfulness; but these are the things you should have done without neglecting the others. (Matthew 23:23)
Some Christians use theological purity as a means to lift themselves up while knocking others down.
> âTwo men went up into the temple to pray, one a Pharisee and the other a tax collector. The Pharisee stood and was praying this to himself: âGod, I thank You that I am not like other people: swindlers, unjust, adulterers, or even like this tax collector. I fast twice a week; I pay tithes of all that I get.â 13But the tax collector, standing some distance away, was even unwilling to lift up his eyes to heaven, but was beating his breast, saying, âGod, be merciful to me, the sinner!â I tell you, this man went to his house justified rather than the other; for everyone who exalts himself will be humbled, but he who humbles himself will be exalted.â (Luke 18:10-14)
We need to stand firmly on the truth, but not to be so focused on truth that we fight with fellow believers over the smallest differences, especially when these differences are among the areas that are not spoken of as clearly (like end times eschatology).
## Rejoice or Fear God?
Tonight I read [Psalm 2](https://www.bible.com/bible/100/PSA.2.NASB1995) which brought to mind another seemingly contradictory way we are to interact with God. Do we fear God or do we rejoice in Him?
There are many verses telling us to fear God or fear the Lord. They are given as a command, as a way to knowledge, as a way to life, etc.
> Honor all people, love the brotherhood, **fear God**, honor the king. (1 Peter 2:17) {emphasis mine}
and
> The f**ear of the Lord is the beginning of knowledge**; Fools despise wisdom and instruction. (Proverbs 1:7) {emphasis mine}
and
> The **fear of the Lord leads to life**, So that one may sleep satisfied, untouched by evil. (Proverbs 19:23) {emphasis mine}
At the same time we are told to rejoice in the Lord.
> Rejoice in the Lord always; again I will say, rejoice! (Philippians 4:4)
and
> Then I will go to the altar of God, To God my exceeding joy; And upon the lyre I shall praise You, O God, my God. (Psalm 43:4)
How often do we rejoice in the thing that makes us tremble in fear? Iâd guess, *not very often* or even *never*. A right view of God, however, causes us to â*rejoice with trembling*.â
> Worship the Lord with reverence\
> And **rejoice with trembling**.\
> Do homage to the Son, that He not become angry, and you perish in the way,\
> For His wrath may soon be kindled.\
> How **blessed are all who take refuge in Him**! (Psalm 2:11-12) {emphasis mine}
That phrase, â*rejoice with trembling*â seems to perfectly encapsulate the balance between fear of an awesome, omnipotent, holy God and rejoicing in a loving, merciful God who came to earth, lived the perfect life that we cannot, and died to pay the penalty for our sins.
â*How blessed are all who take refuge in Him*!â
## No Real Contradictions
I think these examples do a good example of demonstrating wisdom regarding Godâs word and the importance of balance in our Christian lives. Even when at first there seems to be contradictions, Godâs word never contradicts itself; it always clarifies itself. Also, when we see a theological or implementation error to one extreme, we need to make sure we are not driven to an error in the other extreme. We also need to make sure, when debating with fellow believers, that we do not argue against one extreme so strongly that we miscommunicate the truth.
May God in heaven guide you as you study His word and seek to submit to His commands. May He help you to see the truth, the whole truth, and nothing but the truth. May He guide the church to unity in His truth.
Trust Jesus
-

@ 5d4b6c8d:8a1c1ee3
2025-03-30 21:31:02
Revenue rebounded in a major way this month. Thank you to all the great contributors and zappers for making this territory a going concern. As I mentioned to @denlillaapan, our long-term goal is to eventually buy the very failed *The Economist* and return it to glory. So, let's keep the success rolling.
# Some stats:
- ~econ was 2nd to ~bitcoin in revenue this month (and they only beat us by a paltry half million sats)
- We were 5th in posts (296) and 4th in comments (1564)
- 132k sats were stacked in ~econ (4th place)
# Some graphs (thanks to @SimpleStacker):

# Posting fee optimization
The next stop on our search for the optimal post fee is 94 sats.
# Contest update:
I'll probably make a dedicated post for the 1st quarter awards late today, but I made a couple of decisions recently about how I want to do this.
Since I pay territory rent annually, I won't know how much profits are available for prizes until the end of the year. So, I'll announce the winners each quarter, but pay out the prizes at the end of the year.
I've decided to split the prize evenly amongst three categories: Best Post of the Year, Posts of the Quarter, and Posts of the Month. I'm thinking that we can use zaprank for the monthly top posts and then have a poll select the "Post of the Quarter" from amongst those and then an end of year poll to select the "Post of the Year" from the "Posts of the Quarter".
originally posted at https://stacker.news/items/929731
-

@ c631e267:c2b78d3e
2025-03-31 07:23:05
*Der Irrsinn ist bei Einzelnen etwas Seltenes â* *\
aber bei Gruppen, Parteien, Völkern, Zeiten die Regel.* *\
Friedrich Nietzsche*  
**Erinnern Sie sich an die Horrorkomödie «Scary Movie»?** Nicht, dass ich diese Art Filme besonders erinnerungswĂŒrdig fĂ€nde, aber einige Szenen daraus sind doch gewissermaĂen Klassiker. Dazu zĂ€hlt eine, die das Verhalten vieler Protagonisten in Horrorfilmen parodiert, wenn sie in Panik flĂŒchten. Welchen Weg nimmt wohl die Frau in der Situation auf diesem Bild?

**Diese Szene kommt mir automatisch in den Sinn,** wenn ich aktuelle Entwicklungen in Europa betrachte. Weitreichende Entscheidungen gehen wider jede Logik in die völlig falsche Richtung. Nur ist das hier alles andere als eine Komödie, sondern bitterernst. Dieser Horror ist leider sehr real.
**Die EuropĂ€ische Union hat sich selbst ĂŒber Jahre** konsequent in eine Sackgasse manövriert. Sie hat es versĂ€umt, sich und ihre Politik selbstbewusst und im Einklang mit ihren Wurzeln auf dem eigenen Kontinent zu positionieren. Stattdessen ist sie in blinder Treue den vermeintlichen «transatlantischen Freunden» auf ihrem Konfrontationskurs gen Osten gefolgt.
**In den USA haben sich die Vorzeichen allerdings mittlerweile geĂ€ndert,** und die einst hoch gelobten «Freunde und Partner» erscheinen den europĂ€ischen «FĂŒhrern» nicht mehr vertrauenswĂŒrdig. Das ist spĂ€testens seit der MĂŒnchner Sicherheitskonferenz, der Rede von VizeprĂ€sident J. D. Vance und den empörten Reaktionen offensichtlich. GroĂe Teile Europas wirken seitdem wie ein aufgescheuchter Haufen kopfloser HĂŒhner. Orientierung und Kontrolle sind völlig abhanden gekommen.
**Statt jedoch umzukehren oder wenigstens zu bremsen** und vielleicht einen Abzweig zu suchen, geben die Crash-Piloten jetzt auf dem Weg durch die Sackgasse erst richtig Gas. Ja sie lösen sogar noch die Sicherheitsgurte und deaktivieren die Airbags. Den vor Angst dauergelĂ€hmten Passagieren fĂ€llt auch nichts Besseres ein und so schlieĂen sie einfach die Augen. Derweil ĂŒbertrumpfen sich die [Kommentatoren](https://transition-news.org/wird-ihr-stahlhelm-schon-gegossen) des Events gegenseitig in sensationslĂŒsterner «Berichterstattung».
**Wie schon die deutsche AuĂenministerin mit höchsten UN-Ambitionen,** Annalena Baerbock, proklamiert auch die EuropĂ€ische Kommission einen «Frieden durch StĂ€rke». Zu dem jetzt vorgelegten, [selbstzerstörerischen](https://transition-news.org/okonomen-eu-rustet-auf-und-schiesst-sich-selbst-ins-knie) Fahrplan zur Ankurbelung der RĂŒstungsindustrie, genannt «WeiĂbuch zur europĂ€ischen Verteidigung â Bereitschaft 2030», [erklĂ€rte](https://ec.europa.eu/commission/presscorner/detail/de/ip_25_793) die KommissionsprĂ€sidentin, die «Ăra der Friedensdividende» sei lĂ€ngst vorbei. Soll das heiĂen, Frieden bringt nichts ein? Eine umfassende Zusammenarbeit an dauerhaften europĂ€ischen Friedenslösungen steht demnach jedenfalls nicht zur Debatte.
**ZusĂ€tzlich brisant ist, dass aktuell «die ganze EU** **[von Deutschen regiert](https://transition-news.org/die-ganze-eu-wird-von-deutschen-regiert)** **wird»,** wie der EU-Parlamentarier und ehemalige UN-Diplomat Michael von der Schulenburg beobachtet hat. TatsĂ€chlich sitzen neben von der Leyen und Strack-Zimmermann noch einige weitere Deutsche in â vor allem auch in Krisenzeiten â wichtigen Spitzenposten der Union. Vor dem Hintergrund der Kriegstreiberei in Deutschland muss eine solche Dominanz mindestens nachdenklich stimmen.
**Ihre ursprĂŒnglichen Grundwerte wie Demokratie, Freiheit, Frieden und VölkerverstĂ€ndigung** hat die EU kontinuierlich in leere WorthĂŒlsen verwandelt. Diese werden dafĂŒr immer lĂ€cherlicher hochgehalten und beschworen.
**Es wird dringend Zeit, dass wir, der SouverÀn,** diesem erbÀrmlichen und gefÀhrlichen Trauerspiel ein Ende setzen und die FÀden selbst in die Hand nehmen. In diesem Sinne fordert uns auch das «European Peace Project» auf, am 9. Mai im Rahmen eines Kunstprojekts [den Frieden auszurufen](https://transition-news.org/ein-zeichen-fur-die-friedliche-zukunft-europas-setzen). Seien wir dabei!
*\[Titelbild:* *[Pixabay](https://pixabay.com/de/illustrations/vertical-abstract-concept-car-8992833/)]*
***
Dieser Beitrag wurde mit dem [Pareto-Client](https://pareto.space/read) geschrieben und ist zuerst auf ***[Transition News](https://transition-news.org/mit-vollgas-in-die-sackgasse)*** erschienen.
-

@ b17fccdf:b7211155
2025-03-25 11:23:36
Si vives en España, quizĂĄs hayas notado que no puedes acceder a ciertas pĂĄginas webs durante los fines de semana o en algunos dĂas entre semana, entre ellas, la [guĂa de MiniBolt](https://minbolt.info/).
Esto tiene una **razĂłn**, por supuesto una **soluciĂłn**, ademĂĄs de una **conclusiĂłn**. Sin entrar en demasiados detalles:
## La razĂłn
El **bloqueo a Cloudflare**, implementado desde hace casi dos meses por operadores de Internet (ISPs) en España (como Movistar, O2, DIGI, Pepephone, entre otros), se basa en una [orden judicial](https://www.poderjudicial.es/search/AN/openDocument/3c85bed480cbb1daa0a8778d75e36f0d/20221004) emitida tras una demanda de LALIGA (FĂștbol). Esta medida busca combatir la piraterĂa en España, un problema que afecta directamente a dicha organizaciĂłn.
Aunque la intenciĂłn original era restringir el acceso a dominios especĂficos que difundieran dicho contenido, Cloudflare emplea el protocolo [ECH](https://developers.cloudflare.com/ssl/edge-certificates/ech) (Encrypted Client Hello), que oculta el nombre del dominio, el cual antes se transmitĂa en texto plano durante el proceso de establecimiento de una conexiĂłn TLS. Esta medida dificulta que las operadoras analicen el trĂĄfico para aplicar **bloqueos basados en dominios**, lo que les obliga a recurrir a **bloqueos mĂĄs amplios por IP o rangos de IP** para cumplir con la orden judicial.
Esta prĂĄctica tiene **consecuencias graves**, que han sido completamente ignoradas por quienes la ejecutan. Es bien sabido que una infraestructura de IP puede alojar numerosos dominios, tanto legĂtimos como no legĂtimos. La falta de un "ajuste fino" en los bloqueos provoca un **perjuicio para terceros**, **restringiendo el acceso a muchos dominios legĂtimos** que no tiene relaciĂłn alguna con actividades ilĂcitas, pero que comparten las mismas IPs de Cloudflare con dominios cuestionables. Este es el caso de la [web de MiniBolt](https://minibolt.minibolt.info) y su dominio `minibolt.info`, los cuales **utilizan Cloudflare como proxy** para aprovechar las medidas de **seguridad, privacidad, optimizaciĂłn y servicios** adicionales que la plataforma ofrece de forma gratuita.
Si bien este bloqueo parece ser temporal (al menos durante la temporada 24/25 de fĂștbol, hasta finales de mayo), es posible que se reactive con el inicio de la nueva temporada.

## La soluciĂłn
Obviamente, **MiniBolt no dejarĂĄ de usar Cloudflare** como proxy por esta razĂłn. Por lo que a continuaciĂłn se exponen algunas medidas que como usuario puedes tomar para **evitar esta restricciĂłn** y poder acceder:
**~>** Utiliza **una VPN**:
Existen varias soluciones de proveedores de VPN, ordenadas segĂșn su reputaciĂłn en privacidad:
- [IVPN](https://www.ivpn.net/es/)
- [Mullvad VPN](https://mullvad.net/es/vpn)
- [Proton VPN](https://protonvpn.com/es-es) (**gratis**)
- [Obscura VPN](https://obscura.net/) (**solo para macOS**)
- [Cloudfare WARP](https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/download-warp/) (**gratis**) + permite utilizar el modo proxy local para enrutar solo la navegación, debes utilizar la opción "WARP a través de proxy local" siguiendo estos pasos:
1. Inicia Cloudflare WARP y dentro de la pequeña interfaz haz click en la rueda dentada abajo a la derecha > "Preferencias" > "Avanzado" > "Configurar el modo proxy"
2. Marca la casilla "Habilite el modo proxy en este dispositivo"
3. Elige un "Puerto de escucha de proxy" entre 0-65535. ej: 1080, haz click en "Aceptar" y cierra la ventana de preferencias
4. Accede de nuevo a Cloudflare WARP y pulsa sobre el switch para habilitar el servicio.
3. Ahora debes apuntar el proxy del navegador a Cloudflare WARP, la configuraciĂłn del navegador es similar a [esta](https://minibolt.minibolt.info/system/system/privacy#example-from-firefox) para el caso de navegadores basados en Firefox. Una vez hecho, deberĂas poder acceder a la [guĂa de MiniBolt](https://minibolt.minibolt.info/) sin problemas. Si tienes dudas, dĂ©jalas en comentarios e intentarĂ© resolverlas. MĂĄs info [AQUĂ](https://bandaancha.eu/articulos/como-saltarse-bloqueo-webs-warp-vpn-9958).

**~>** [**Proxifica tu navegador para usar la red de Tor**](https://minibolt.minibolt.info/system/system/privacy#ssh-remote-access-through-tor), o utiliza el [**navegador oficial de Tor**](https://www.torproject.org/es/download/) (recomendado).

## La conclusiĂłn
Estos hechos ponen en tela de juicio los principios fundamentales de la neutralidad de la red, pilares esenciales de la [DeclaraciĂłn de Independencia del Ciberespacio](https://es.wikisource.org/wiki/Declaraci%C3%B3n_de_independencia_del_ciberespacio) que defiende un internet libre, sin restricciones ni censura. Dichos principios se han visto quebrantados sin precedentes en este paĂs, confirmando que ese futuro distĂłpico que muchos negaban, ya es una realidad.
Es momento de actuar y estar preparados: debemos **impulsar el desarrollo y la difusiĂłn** de las **herramientas anticensura** que tenemos a nuestro alcance, protegiendo asĂ la **libertad digital** y asegurando un acceso equitativo a la informaciĂłn para todos
Este compromiso es uno de los **pilares fundamentales de MiniBolt,** lo que convierte este desafĂo en una oportunidad para poner a prueba las **soluciones anticensura** [ya disponibles](https://minibolt.minibolt.info/bonus-guides/system/tor-services), asĂ como **las que estĂĄn en camino**.
ÂĄCensĂșrame si puedes, legislador! ÂĄLa lucha por la privacidad y la libertad en Internet ya estĂĄ en marcha!

---
Fuentes:
* https://bandaancha.eu/articulos/movistar-o2-deja-clientes-sin-acceso-11239
* https://bandaancha.eu/articulos/esta-nueva-sentencia-autoriza-bloqueos-11257
* https://bandaancha.eu/articulos/como-saltarse-bloqueo-webs-warp-vpn-9958
* https://bandaancha.eu/articulos/como-activar-ech-chrome-acceder-webs-10689
* https://comunidad.movistar.es/t5/Soporte-Fibra-y-ADSL/Problema-con-web-que-usan-Cloudflare/td-p/5218007
-

@ 39cc53c9:27168656
2025-03-30 05:54:55
> [Read the original blog post](https://blog.kycnot.me/p/new-kycnot)
The new website is finally live! I put in a lot of hard work over the past months on it. I'm proud to say that it's out now and it looks pretty cool, at least to me!
## Why rewrite it all?
The old kycnot.me site was built using Python with Flask about two years ago. Since then, I've gained a lot more experience with Golang and coding in general. Trying to update that old codebase, which had a lot
of *design flaws*, would have been a bad idea. It would have been like building on an *unstable foundation*.
That's why I made the decision to rewrite the entire application. Initially, I chose to use SvelteKit with JavaScript. I did manage to create a stable site that looked similar to the new one, but it required Jav
aScript to work. As I kept coding, I started feeling like I was repeating *"the Python mistake"*. I was writing the app in a language I wasn't very familiar with (just like when I was learning Python at that mom
ent), and I wasn't happy with the code. It felt like *spaghetti code* all the time.
So, I made a complete U-turn and started over, this time using Golang. While I'm not as proficient in Golang as I am in Python now, I find it to be a *very enjoyable language* to code with. Most aof my recent pr
ojects have been written in Golang, and I'm getting the hang of it. I tried to make the best decisions I could and *structure the code* as well as possible. Of course, there's still *room for improvement*, which
I'll address in future updates.
Now I have a more *maintainable website* that can *scale* much better. It uses a *real database* instead of a JSON file like the old site, and I can add many more features. Since I chose to go with Golang, I mad
e the "tradeoff" of not using JavaScript at all, so all the rendering load falls on the server. But I believe it's a tradeoff that's worth it.
## What's new
- **UI/UX** - I've designed a new logo and color palette for kycnot.me. I think it looks pretty cool and cypherpunk. I am not a graphic designer, but I think I did a decent work and I put a lot of thinking on it to make it pleasant!
- **Point system** - The new [point system](https://kycnot.me/about#what-is-a-point) provides more detailed information about the listings, and **can** be expanded to cover additional features across all services. Anyone can request a new **point**!
- **ToS Scrapper**: I've implemented a powerful automated terms-of-service scrapper that collects all the ToS pages from the listings. It saves you from the hassle of reading the ToS by listing the lines that are suspiciously related to KYC/AML practices. This is still in development and it will improve for sure, but it works pretty fine right now!
- **Search bar** - The new search bar allows you to easily filter services. It performs a full-text search on the Title, Description, Category, and Tags of all the services. Looking for VPN services? Just search for "vpn"!
- **Transparency** - To be more [transparent](https://beta.kycnot.me/about#transparency), all discussions about services now take place publicly on GitLab. I won't be answering any e-mails (an auto-reply will prompt to write to the corresponding Gitlab issue). This ensures that all service-related matters are publicly accessible and recorded. Additionally, there's a real-time [audits](https://beta.kycnot.me/about#audit) page that displays database changes.
- **Listing Requests** - I have upgraded the request system. The new form allows you to directly request services or points without any extra steps. In the future, I plan to enable requests for specific changes
to parts of the website.
- **Lightweight and fast** - The new site is lighter and faster than its predecessor!
- **Tor and I2P** - At last! kycnot.me is now officially on [Tor and I2P](https://beta.kycnot.me/about#tor-and-i2p)!
## How?
This rewrite has been a labor of love, in the end, I've been working on this for more than 3 months now. I don't have a team, so I work by myself on my free time, but I find great joy in helping people on their private journey with cryptocurrencies. Making it easier for individuals to use cryptocurrencies **without KYC** is a goal I am proud of!
If you appreciate [my work](https://kycnot.me/about#about), you can support me through the methods listed [here](https://kycnot.me/about#support). Alternatively, feel free to send me an email with a kind message!
### Technical details
All the code is written in [Golang](https://go.dev), the website makes use of the [chi](https://go-chi.io) router for the routing part. I also make use of [BigCache](https://github.com/allegro/bigcache) for caching database requests. There is 0 JavaScript, so all the rendering load falls on the server, this means it needed to be efficient enough to not drawn with a few users since the old site was reporting about **2M** requests per month on average (note that this are not unique users).
The database is running with [mariadb](https://mariadb.org/), using [gorm](https://gorm.io) as the ORM. This is more than enough for this project. I started working with an `sqlite` database, but I ended up migrating to **mariadb** since it works better with JSON.
The scraper is using [chromedp](https://github.com/chromedp/chromedp) combined with a series of keywords, regex and other logic. It runs every 24h and scraps all the services. You can find the scraper code [here](https://gitlab.com/kycnot/kycnot.me/-/tree/main/scraper).
The frontend is written using **Golang Templates** for the HTML, and [TailwindCSS](https://tailwindcss.com/) plus [DaisyUI](https://daisyui.com) for the CSS classes framework. I also use some plain CSS, but it's minimal.
The requests forms is the only part of the project that requires JavaScript to be enabled. It is needed for parsing some from fields that are a bit complex and for the *"captcha"*, which is a simple *Proof of Work* that runs on your browser, destinated to avoid spam. For this, I use [mCaptcha](https://mcaptcha.org/).
-

@ fd06f542:8d6d54cd
2025-03-31 01:45:36
{"coverurl":"https://cdn.nostrcheck.me/fd06f542bc6c06a39881810de917e6c5d277dfb51689a568ad7b7a548d6d54cd/232dd9c092e023beecb5410052bd48add702765258dcc66f176a56f02b09cf6a.webp","title":"NostrBookç«çčæ„èź°","author":"nostrbook"}
-

@ 57d1a264:69f1fee1
2025-03-29 18:02:16
> This UX research has been redacted by @iqra from the Bitcoin.Design [community](https://discord.gg/K7aQ5PErht), and shared for review and feedback! Don't be shy, share your thoughts.

- - -
## 1ïžâŁ Introduction
#### Project Overview
đ **Product:** BlueWallet (Bitcoin Wallet)
đ **Goal:** Improve onboarding flow and enhance accessibility for a better user experience.
đ **Role:** UX Designer
đ **Tools Used:** Figma, Notion
#### Why This Case Study?
đč BlueWallet is a self-custodial Bitcoin wallet, but **users struggle with onboarding due to unclear instructions**.
đč **Accessibility issues** (low contrast, small fonts) create **barriers for visually impaired users**.
đč Competitors like **Trust Wallet and MetaMask offer better-guided onboarding**.
This case study presents **UX/UI improvements** to make BlueWallet **more intuitive and inclusive**.
- - -
## 2ïžâŁ Problem Statement: Why BlueWalletÊŒs Onboarding Needs Improvement
#### đč **Current Challenges:**
1ïžâŁ **Onboarding Complexity** - BlueWallet lacks **step-by-step guidance**, leaving users confused about wallet creation and security.
 
2ïžâŁ **No Educational Introduction** - Users land directly on the wallet screen with **no explanation of private keys, recovery phrases, or transactions**.
3ïžâŁ **Transaction Flow Issues** - Similar-looking **"Send" and "Receive" buttons** cause confusion.
4ïžâŁ **Poor Accessibility** - Small fonts and low contrast make navigation difficult.
#### đ **Impact on Users:**
**Higher drop-off rates** due to frustration during onboarding.
**Security risks** as users skip key wallet setup steps.
**Limited accessibility** for users with visual impairments.
#### đ **Competitive Gap:**
Unlike competitors (Trust Wallet, MetaMask), BlueWallet does not offer:
â
A guided onboarding process
â
Security education during setup
â
Intuitive transaction flow
    
Somehow, this wallet has much better UI than the BlueWallet Bitcoin wallet.
- - -
## 3ïžâŁ User Research & Competitive Analysis
#### User Testing Findings
đč Conducted usability testing with **5 users** onboarding for the first time.
đč **Key Findings:**
â
3 out of 5 users **felt lost** due to missing explanations.
â
60% **had trouble distinguishing transaction buttons**.
â
80% **found the text difficult to read** due to low contrast.
#### Competitive Analysis
We compared BlueWallet with top crypto wallets:
| Wallet | Onboarding UX | Security Guidance | Accessibility Features |
|---|---|---|---|
| BlueWallet | â No guided onboarding | â Minimal explanation | â Low contrast, small fonts |
| Trust Wallet | â
Step-by-step setup | â
Security best practices | â
High contrast UI |
| MetaMask | â
Interactive tutorial | â
Private key education | â
Clear transaction buttons |
đ **Key Insight:** BlueWallet lacks **guided setup and accessibility enhancements**, making it harder for beginners.
## đ User Persona
To better understand the users facing onboarding challenges, I developed a **persona** based on research and usability testing.
#### đč Persona 1: Alex Carter (Bitcoin Beginner & Investor)
đ€ **Profile:**
- **Age:** 28
- **Occupation:** Freelance Digital Marketer
- **Tech Knowledge:** Moderate - Familiar with online transactions, new to Bitcoin)
- **Pain Points:**
- Finds **Bitcoin wallets confusing**.
- - DoesnÊŒt understand **seed phrases & security features**.
- - **Worried about losing funds** due to a lack of clarity in transactions.
đ **Needs:**
â
A **simple, guided** wallet setup.
â
**Clear explanations** of security terms (without jargon).
â
Easy-to-locate **Send/Receive buttons**.
đ **Persona Usage in Case Study:**
- Helps define **who we are designing for**.
- Guides **design decisions** by focusing on user needs.
#### đč Persona 2: Sarah Mitchell (Accessibility Advocate & Tech Enthusiast)
đ€ **Profile:**
- **Age:** 35
- **Occupation:** UX Researcher & Accessibility Consultant
- **Tech Knowledge:** High (Uses Bitcoin but struggles with accessibility barriers)
đ **Pain Points:**
â Struggles with small font sizes & low contrast.
â Finds the UI difficult to navigate with a screen reader.
â Confused by identical-looking transaction buttons.
đ **Needs:**
â
A **high-contrast UI** that meets **WCAG accessibility standards**.
â
**Larger fonts & scalable UI elements** for better readability.
â
**Keyboard & screen reader-friendly navigation** for seamless interaction.
đ **Why This Persona Matters:**
- Represents users with visual impairments who rely on accessible design.
- Ensures the design accommodates inclusive UX principles.
- - -
## 4ïžâŁ UX/UI Solutions & Design Improvements
#### đ Before (Current Issues)
â Users land **directly on the wallet screen** with no instructions.
â **"Send" & "Receive" buttons look identical** , causing transaction confusion.
â **Small fonts & low contrast** reduce readability.
#### â
After (Proposed Fixes)
â
**Step-by-step onboarding** explaining wallet creation, security, and transactions.
â
**Visually distinct transaction buttons** (color and icon changes).
â
**WCAG-compliant text contrast & larger fonts** for better readability.
#### 1ïžâŁ Redesigned Onboarding Flow
â
Added a **progress indicator** so users see where they are in setup.
â
Used **plain, non-technical language** to explain wallet creation & security.
â
Introduced a **"Learn More" button** to educate users on security.
#### 2ïžâŁ Accessibility Enhancements
â
Increased **contrast ratio** for better text readability.
â
Used **larger fonts & scalable UI elements**.
â
Ensured **screen reader compatibility** (VoiceOver & TalkBack support).
#### 3ïžâŁ Transaction Flow Optimization
â
Redesigned **"Send" & "Receive" buttons** for clear distinction.
â
Added **clearer icons & tooltips** for transaction steps.
## 5ïžâŁ Wireframes & Design Improvements:
#### đč Welcome Screen (First Screen When User Opens Wallet)
**đ Goal: Give a brief introduction & set user expectations**
â
App logo + **short tagline** (e.g., "Secure, Simple, Self-Custody Bitcoin Wallet")
â
**1-2 line explanation** of what BlueWallet is (e.g., "Your gateway to managing Bitcoin securely.")
â
**"Get Started" button** â Le ads to **next step: Wallet Setup**
â
**"Already have a wallet?"** â Import option
đč **Example UI Elements:**
- BlueWallet Logo
- **Title:** "Welcome to BlueWallet"
- **Subtitle:** "Easily store, send, and receive Bitcoin."
- CTA: "Get Started" (Primary) | "Import Wallet" (Secondary)

#### đč Screen 2: Choose Wallet Type (New or Import)
**đ Goal: Let users decide how to proceed**
â
**Two clear options:**
- **Create a New Wallet** (For first-time users)
- **Import Existing Wallet** (For users with a backup phrase)
â
Brief explanation of each option
đč **Example UI Elements:
- **Title:** "How do you want to start?"
- **Buttons:** "Create New Wallet" | "Import Wallet"

#### đč Screen 3: Security & Seed Phrase Setup (Critical Step)
**đ Goal: Educate users about wallet security & backups**
â
Explain **why seed phrases are important**
â
**Clear step-by-step instructions** on writing down & storing the phrase
â
**Warning:** "If you lose your recovery phrase, you lose access to your wallet."
â
**CTA:** "Generate Seed Phrase" â Next step
đč **Example UI Elements:
- Title:** "Secure Your Wallet"
- **Subtitle:** "Your seed phrase is the key to your Bitcoin. Keep it safe!"
- **Button:** "Generate Seed Phrase"

## đč Screen 4: Seed Phrase Display & Confirmation
**đ Goal: Ensure users write down the phrase correctly**
â
Display **12- or 24-word** seed phrase
â
**âI have written it downËź checkbox** before proceeding
â
Next screen: **Verify seed phrase** (drag & drop, re-enter some words)
đč **Example UI Elements:**
- **Title:** "Write Down Your Seed Phrase"
- List of 12/24 Words (Hidden by Default)
- **Checkbox:** "I have safely stored my phrase"
- **Button:** "Continue"

### đč Screen 5: Wallet Ready! (Final Step)
**đ Goal: Confirm setup & guide users on next actions**
â
**Success message** ("Your wallet is ready!")
â
**Encourage first action:**
- âReceive BitcoinËź â Show wallet address
- âSend BitcoinËź â Walkthrough on making transactions
â
Short explainer: Where to find the Send/Receive buttons
đč **Example UI Elements:**
- **Title:** "You're All Set!"
- **Subtitle:** "Start using BlueWallet now."
- **Buttons:** "Receive Bitcoin" | "View Wallet"

- - -
## 5ïžâŁ Prototype & User Testing Results
đč **Created an interactive prototype in Figma** to test the new experience.
đč **User Testing Results:**
â
**40% faster onboarding completion time.**
â
**90% of users found transaction buttons clearer.**
đč **User Feedback:**
â
âNow I understand the security steps clearly.Ëź
â
âThe buttons are easier to find and use.Ëź
- - -
## 6ïžâŁ Why This Matters: Key Takeaways
đ **Impact of These UX/UI Changes:**
â
**Reduced user frustration** by providing a step-by-step onboarding guide.
â
**Improved accessibility** , making the wallet usable for all.
â
**More intuitive transactions** , reducing errors.
- - -
## 7ïžâŁ Direct link to figma file and Prototype
Figma file: [https://www.figma.com/design/EPb4gVgAMEgF5GBDdtt81Z/Blue-Wallet-UI-
Improvements?node-id=0-1&t=Y2ni1SfvuQQnoB7s-1](https://www.figma.com/design/EPb4gVgAMEgF5GBDdtt81Z/Blue-Wallet-UI-
Improvements?node-id=0-1&t=Y2ni1SfvuQQnoB7s-1)
Prototype: [https://www.figma.com/proto/EPb4gVgAMEgF5GBDdtt81Z/Blue-Wallet-UI-
Improvements?node-id=1-2&p=f&t=FndTJQNCE7nEIa84-1&scaling=scale-
down&content-scaling=fixed&page-id=0%3A1&starting-point-node-
id=1%3A2&show-proto-sidebar=1](https://www.figma.com/proto/EPb4gVgAMEgF5GBDdtt81Z/Blue-Wallet-UI-
Improvements?node-id=1-2&p=f&t=FndTJQNCE7nEIa84-1&scaling=scale-
down&content-scaling=fixed&page-id=0%3A1&starting-point-node-
id=1%3A2&show-proto-sidebar=1)
Original PDF available from [here](https://cdn.discordapp.com/attachments/903126164795699212/1355561527394173243/faf3ee46-b501-459c-ba0e-bf7e38843bc8_UX_Case_Study__1.pdf?ex=67e9608d&is=67e80f0d&hm=d0c386ce2cfd6e0ebe6bde0a904e884229f52bf547adf1f7bc884e17bb4aa59e&)
originally posted at https://stacker.news/items/928822
-

@ c631e267:c2b78d3e
2025-03-21 19:41:50
*Wir werden nicht zulassen, dass technisch manches möglich ist,* *\
aber der Staat es nicht nutzt.* *\
Angela Merkel*  
**Die Modalverben zu erklĂ€ren, ist im Deutschunterricht manchmal nicht ganz einfach.** Nicht alle Fremdsprachen unterscheiden zum Beispiel bei der Frage nach einer Möglichkeit gleichermaĂen zwischen «können» im Sinne von «die Gelegenheit, Kenntnis oder FĂ€higkeit haben» und «dĂŒrfen» als «die Erlaubnis oder Berechtigung haben». Das spanische Wort «poder» etwa steht fĂŒr beides.
**Ebenso ist vielen SchĂŒlern auf den ersten Blick nicht recht klar,** dass das logische Gegenteil von «mĂŒssen» nicht unbedingt «nicht mĂŒssen» ist, sondern vielmehr «nicht dĂŒrfen». An den Verkehrsschildern lĂ€sst sich so etwas meistens recht gut erklĂ€ren: Manchmal muss man abbiegen, aber manchmal darf man eben nicht.

**Dieses Beispiel soll ein wenig die Verwirrungstaktik veranschaulichen,** die in der Politik gerne verwendet wird, um unpopulĂ€re oder restriktive MaĂnahmen StĂŒck fĂŒr StĂŒck einzufĂŒhren. Zuerst ist etwas einfach innovativ und bringt viele Vorteile. Vor allem ist es freiwillig, jeder kann selber entscheiden, niemand muss mitmachen. SpĂ€ter kann man zunehmend weniger Alternativen wĂ€hlen, weil sie verschwinden, und irgendwann verwandelt sich alles andere in «nicht dĂŒrfen» â die MaĂnahme ist obligatorisch.
**Um die Durchsetzung derartiger Initiativen strategisch zu unterstĂŒtzen** und nett zu verpacken, gibt es Lobbyisten, gerne auch NGOs genannt. Dass das «NG» am Anfang dieser AbkĂŒrzung ĂŒbersetzt «Nicht-Regierungs-» bedeutet, ist ein Anachronismus. Das war [vielleicht frĂŒher](https://transition-news.org/der-sumpf-aus-ngos-parteien-und-steuergeld) einmal so, heute ist eher das Gegenteil gemeint.
**In unserer modernen Zeit wird enorm viel Lobbyarbeit fĂŒr die Digitalisierung** praktisch sĂ€mtlicher Lebensbereiche aufgewendet. Was das auf dem Sektor der MobilitĂ€t bedeuten kann, haben wir diese Woche anhand aktueller Entwicklungen in Spanien [beleuchtet](https://transition-news.org/nur-abschied-vom-alleinfahren-monstrose-spanische-uberwachungsprojekte-gemass). BegrĂŒndet teilweise mit Vorgaben der EuropĂ€ischen Union arbeitet man dort fleiĂig an einer «neuen MobilitĂ€t», basierend auf «intelligenter» technologischer Infrastruktur. Derartige Anwandlungen wurden auch schon als [«Technofeudalismus»](https://transition-news.org/yanis-varoufakis-der-europaische-traum-ist-tot-es-lebe-der-neue-traum) angeprangert.
**Nationale** **[Zugangspunkte](https://transport.ec.europa.eu/transport-themes/smart-mobility/road/its-directive-and-action-plan/national-access-points_en)** **fĂŒr MobilitĂ€tsdaten im Sinne der EU** gibt es nicht nur in allen MitgliedslĂ€ndern, sondern auch in der [Schweiz](https://opentransportdata.swiss/de/) und in GroĂbritannien. Das Vereinigte Königreich beteiligt sich darĂŒber hinaus an anderen EU-Projekten fĂŒr digitale Ăberwachungs- und KontrollmaĂnahmen, wie dem biometrischen [Identifizierungssystem](https://transition-news.org/biometrische-gesichtserkennung-in-britischen-hafen) fĂŒr «nachhaltigen Verkehr und Tourismus».
**NatĂŒrlich marschiert auch Deutschland stracks und euphorisch** in Richtung digitaler Zukunft. Ohne [vernetzte MobilitĂ€t](https://mobilithek.info/about) und einen «verlĂ€sslichen Zugang zu Daten, einschlieĂlich Echtzeitdaten» komme man in der Verkehrsplanung und -steuerung nicht aus, erklĂ€rt die Regierung. Der Interessenverband der IT-Dienstleister Bitkom will «die digitale Transformation der deutschen Wirtschaft und Verwaltung vorantreiben». Dazu bewirbt er unter anderem die Konzepte Smart City, Smart Region und Smart Country und behauptet, deutsche GroĂstĂ€dte «setzen bei MobilitĂ€t [voll auf Digitalisierung](https://www.smartcountry.berlin/de/newsblog/smart-city-index-grossstaedte-setzen-bei-mobilitaet-voll-auf-digitalisierung.html)».
**Es steht zu befĂŒrchten, dass das umfassende Sammeln, Verarbeiten und Vernetzen von Daten,** das angeblich die Menschen unterstĂŒtzen soll (und theoretisch ja auch könnte), eher dazu benutzt wird, sie zu kontrollieren und zu manipulieren. Je elektrischer und digitaler unsere Umgebung wird, desto gröĂer sind diese Möglichkeiten. Im Ergebnis könnten solche Prozesse den BĂŒrger nicht nur einschrĂ€nken oder ĂŒberflĂŒssig machen, sondern in mancherlei Hinsicht regelrecht abschalten. Eine gesunde Skepsis ist also geboten.
*\[Titelbild:* *[Pixabay](https://pareto.space/readhttps://pixabay.com/de/illustrations/schaufensterpuppe-platine-gesicht-5254046/)]*
***
Dieser Beitrag wurde mit dem [Pareto-Client](https://pareto.space/read) geschrieben. Er ist zuerst auf ***[Transition News](https://transition-news.org/das-gegenteil-von-mussen-ist-nicht-durfen)*** erschienen.
-

@ fd06f542:8d6d54cd
2025-03-30 02:16:24
> __Warning__ `unrecommended`: deprecated in favor of [NIP-17](17.md)
NIP-04
======
Encrypted Direct Message
------------------------
`final` `unrecommended` `optional`
A special event with kind `4`, meaning "encrypted direct message". It is supposed to have the following attributes:
**`content`** MUST be equal to the base64-encoded, aes-256-cbc encrypted string of anything a user wants to write, encrypted using a shared cipher generated by combining the recipient's public-key with the sender's private-key; this appended by the base64-encoded initialization vector as if it was a querystring parameter named "iv". The format is the following: `"content": "<encrypted_text>?iv=<initialization_vector>"`.
**`tags`** MUST contain an entry identifying the receiver of the message (such that relays may naturally forward this event to them), in the form `["p", "<pubkey, as a hex string>"]`.
**`tags`** MAY contain an entry identifying the previous message in a conversation or a message we are explicitly replying to (such that contextual, more organized conversations may happen), in the form `["e", "<event_id>"]`.
**Note**: By default in the [libsecp256k1](https://github.com/bitcoin-core/secp256k1) ECDH implementation, the secret is the SHA256 hash of the shared point (both X and Y coordinates). In Nostr, only the X coordinate of the shared point is used as the secret and it is NOT hashed. If using libsecp256k1, a custom function that copies the X coordinate must be passed as the `hashfp` argument in `secp256k1_ecdh`. See [here](https://github.com/bitcoin-core/secp256k1/blob/master/src/modules/ecdh/main_impl.h#L29).
Code sample for generating such an event in JavaScript:
```js
import crypto from 'crypto'
import * as secp from '@noble/secp256k1'
let sharedPoint = secp.getSharedSecret(ourPrivateKey, '02' + theirPublicKey)
let sharedX = sharedPoint.slice(1, 33)
let iv = crypto.randomFillSync(new Uint8Array(16))
var cipher = crypto.createCipheriv(
'aes-256-cbc',
Buffer.from(sharedX),
iv
)
let encryptedMessage = cipher.update(text, 'utf8', 'base64')
encryptedMessage += cipher.final('base64')
let ivBase64 = Buffer.from(iv.buffer).toString('base64')
let event = {
pubkey: ourPubKey,
created_at: Math.floor(Date.now() / 1000),
kind: 4,
tags: [['p', theirPublicKey]],
content: encryptedMessage + '?iv=' + ivBase64
}
```
## Security Warning
This standard does not go anywhere near what is considered the state-of-the-art in encrypted communication between peers, and it leaks metadata in the events, therefore it must not be used for anything you really need to keep secret, and only with relays that use `AUTH` to restrict who can fetch your `kind:4` events.
## Client Implementation Warning
Clients *should not* search and replace public key or note references from the `.content`. If processed like a regular text note (where `@npub...` is replaced with `#[0]` with a `["p", "..."]` tag) the tags are leaked and the mentioned user will receive the message in their inbox.
-

@ a95c6243:d345522c
2025-03-20 09:59:20
**Bald werde es verboten, alleine im Auto zu fahren,** konnte man dieser Tage in verschiedenen spanischen Medien lesen. Die nationale Verkehrsbehörde (DirecciĂłn General de TrĂĄfico, kurz DGT) werde Alleinfahrern das Leben schwer machen, wurde gemeldet. Konkret erörtere die Generaldirektion geeignete Sanktionen fĂŒr Personen, die ohne Beifahrer im Privatauto unterwegs seien.
**Das Alleinfahren sei zunehmend verpönt und ein MentalitĂ€tswandel notwendig,** hieĂ es. Dieser «Luxus» stehe im Widerspruch zu den MaĂnahmen gegen Umweltverschmutzung, die in allen europĂ€ischen LĂ€ndern gefördert wĂŒrden. In Frankreich sei es «bereits verboten, in der Hauptstadt allein zu fahren», [behauptete](https://noticiastrabajo.huffingtonpost.es/sociedad/adios-a-conducir-solo-la-dgt-se-lo-pone-crudo-a-los-conductores-que-viajen-sin-acompanante-en-el-coche/) *Noticiastrabajo Huffpost* in einer ZwischenĂŒberschrift. Nur um dann im Text zu konkretisieren, dass die sogenannte «Umweltspur» auf der Pariser Ringautobahn gemeint war, die fĂŒr Busse, Taxis und Fahrgemeinschaften reserviert ist. [Ab Mai](https://www.lefigaro.fr/conso/peripherique-parisien-entree-en-vigueur-de-la-voie-reservee-au-covoiturage-ce-lundi-20250303) werden VerstöĂe dagegen mit einem BuĂgeld geahndet.
**Die DGT jedenfalls wolle bei der Umsetzung derartiger MaĂnahmen** nicht hinterherhinken. Diese Medienberichte, inklusive des angeblich bevorstehenden Verbots, beriefen sich auf Aussagen des Generaldirektors der Behörde, Pere Navarro, beim MobilitĂ€tskongress Global Mobility Call im November letzten Jahres, wo es um «nachhaltige MobilitĂ€t» ging. Aus diesem Kontext stammt auch Navarros Warnung: «Die Zukunft des Verkehrs ist geteilt oder es gibt keine».
**Die «Faktenchecker» kamen der Generaldirektion prompt zu Hilfe.** Die DGT habe derlei Behauptungen [zurĂŒckgewiesen](https://www.newtral.es/dgt-una-persona-coche/20250312/) und klargestellt, dass es keine PlĂ€ne gebe, Fahrten mit nur einer Person im Auto zu verbieten oder zu bestrafen. Bei solchen Meldungen handele es sich um Fake News. Teilweise wurde der Vorsitzende der spanischen «RechtsauĂen»-Partei Vox, Santiago Abascal, der Urheberschaft bezichtigt, weil er einen entsprechenden [Artikel](https://gaceta.es/espana/la-dgt-estudia-formas-de-sancionar-a-quien-circule-solo-en-su-vehiculo-el-futuro-sera-compartido-o-no-sera-20250311-1612/) von *La Gaceta* kommentiert hatte.
**Der Beschwichtigungsversuch der Art «niemand hat die Absicht»** ist dabei erfahrungsgemÀà eher ein Alarmzeichen als eine Beruhigung. Walter Ulbrichts Leugnung einer geplanten Berliner [Mauer](https://www.berlin-mauer.de/videos/walter-ulbricht-zum-mauerbau-530/) vom Juni 1961 ist vielen genauso in Erinnerung wie die Fake News-Warnungen des deutschen Bundesgesundheitsministeriums bezĂŒglich [Lockdowns](https://x.com/BMG_Bund/status/1238780849652465664) im MĂ€rz 2020 oder diverse ĂuĂerungen zu einer [Impfpflicht](https://www.achgut.com/artikel/die_schoensten_politiker_zitate_zur_impfpflicht) ab 2020.
**Aber Aufregung hin, Dementis her:** Die [Pressemitteilung](https://archive.is/xXQWD) der DGT zu dem MobilitĂ€tskongress enthĂ€lt in Wahrheit viel interessantere Informationen als «nur» einen Appell an den «guten» BĂŒrger wegen der BemĂŒhungen um die LebensqualitĂ€t in GroĂstĂ€dten oder einen möglichen obligatorischen Abschied vom Alleinfahren. Allerdings werden diese Details von Medien und sogenannten Faktencheckern geflissentlich ĂŒbersehen, obwohl sie keineswegs versteckt sind. Die AuskĂŒnfte sind sehr aufschlussreich, wenn man genauer hinschaut.
### Digitalisierung ist der SchlĂŒssel fĂŒr Kontrolle
**Auf dem Kongress stellte die Verkehrsbehörde ihre Initiativen zur Förderung der «neuen MobilitĂ€t» vor,** deren PrioritĂ€t Sicherheit und Effizienz sei. Die vier konkreten AnsĂ€tze haben alle mit Digitalisierung, Daten, Ăberwachung und Kontrolle im groĂen Stil zu tun und werden unter dem Euphemismus der «öffentlich-privaten Partnerschaft» angepriesen. Auch lassen sie die transhumanistische Idee vom unzulĂ€nglichen Menschen erkennen, dessen Fehler durch «intelligente» technologische Infrastruktur kompensiert werden mĂŒssten.
**Die Chefin des Bereichs «VerkehrsĂŒberwachung» erklĂ€rte die Funktion** des spanischen National Access Point ([NAP](https://nap.dgt.es/)), wobei sie betonte, wie wichtig Verkehrs- und Infrastrukturinformationen in Echtzeit seien. Der NAP ist «eine essenzielle Web-Applikation, die unter EU-Mandat erstellt wurde», kann man auf der Website der DGT nachlesen.
**Das Mandat meint Regelungen zu einem einheitlichen europĂ€ischen Verkehrsraum,** mit denen die Union mindestens seit 2010 den Aufbau einer digitalen Architektur mit offenen Schnittstellen betreibt. Damit begrĂŒndet man auch «umfassende Datenbereitstellungspflichten im Bereich multimodaler Reiseinformationen». Jeder Mitgliedstaat musste einen NAP, also einen nationalen [Zugangspunkt](https://transport.ec.europa.eu/transport-themes/smart-mobility/road/its-directive-and-action-plan/national-access-points_en) einrichten, der Zugang zu statischen und dynamischen Reise- und Verkehrsdaten verschiedener VerkehrstrĂ€ger ermöglicht.
**Diese Entwicklung ist heute schon weit fortgeschritten,** auch und besonders in Spanien. Auf besagtem Kongress erlÀuterte die Leiterin des Bereichs «Telematik» die Plattform [«DGT 3.0»](https://www.dgt.es/muevete-con-seguridad/tecnologia-e-innovacion-en-carretera/dgt-3.0/). Diese werde als Integrator aller Informationen genutzt, die von den verschiedenen öffentlichen und privaten Systemen, die Teil der MobilitÀt sind, bereitgestellt werden.
**Es handele sich um eine Vermittlungsplattform zwischen Akteuren wie Fahrzeugherstellern,** Anbietern von Navigationsdiensten oder Kommunen und dem Endnutzer, der die Verkehrswege benutzt. Alle seien auf Basis des Internets der Dinge (IOT) anonym verbunden, «um der vernetzten Gemeinschaft wertvolle Informationen zu liefern oder diese zu nutzen».
**So sei DGT 3.0 «ein Zugangspunkt fĂŒr einzigartige, kostenlose und genaue Echtzeitinformationen** ĂŒber das Geschehen auf den StraĂen und in den StĂ€dten». Damit lasse sich der Verkehr nachhaltiger und vernetzter gestalten. Beispielsweise wĂŒrden die Karten des Produktpartners Google dank der DGT-Daten 50 Millionen Mal pro Tag aktualisiert.
**Des Weiteren informiert die Verkehrsbehörde ĂŒber ihr SCADA-Projekt.** Die AbkĂŒrzung steht fĂŒr Supervisory Control and Data Acquisition, zu deutsch etwa: Kontrollierte Steuerung und Datenerfassung. Mit SCADA kombiniert man Software und Hardware, um automatisierte Systeme zur Ăberwachung und Steuerung technischer Prozesse zu schaffen. Das SCADA-Projekt der DGT wird von Indra entwickelt, einem spanischen Beratungskonzern aus den Bereichen Sicherheit & MilitĂ€r, Energie, Transport, Telekommunikation und Gesundheitsinformation.
**Das SCADA-System der Behörde umfasse auch eine Videostreaming- und Videoaufzeichnungsplattform,** die das Hochladen in die Cloud in Echtzeit ermöglicht, wie Indra [erklĂ€rt](https://www.indracompany.com/es/noticia/indra-presenta-global-mobility-call-pionera-plataforma-nube-desplegada-centros-gestion). Dabei gehe es um Bilder, die von Ăberwachungskameras an StraĂen aufgenommen wurden, sowie um Videos aus DGT-Hubschraubern und Drohnen. Ziel sei es, «die sichere Weitergabe von Videos an Dritte sowie die kontinuierliche Aufzeichnung und Speicherung von Bildern zur möglichen Analyse und spĂ€teren Nutzung zu ermöglichen».
**Letzteres klingt sehr nach biometrischer Erkennung** und Auswertung durch kĂŒnstliche Intelligenz. FĂŒr eine bessere DatenĂŒbertragung wird derzeit die [Glasfaserverkabelung](https://www.moncloa.com/2025/03/18/linea-azul-conduccion-dgt-3191554/) entlang der LandstraĂen und Autobahnen ausgebaut. Mit der Cloud sind die Amazon Web Services (AWS) gemeint, die spanischen [Daten gehen](https://norberthaering.de/news/digitalgipfel-wehnes-interview/) somit direkt zu einem US-amerikanischen «Big Data»-Unternehmen.
**Das Thema «autonomes Fahren», also Fahren ohne Zutun des Menschen,** bildet den Abschluss der Betrachtungen der DGT. Zusammen mit dem Interessenverband der Automobilindustrie ANFAC (AsociaciĂłn Española de Fabricantes de AutomĂłviles y Camiones) sprach man auf dem Kongress ĂŒber Strategien und Perspektiven in diesem Bereich. Die Lobbyisten hoffen noch in diesem Jahr 2025 auf einen [normativen Rahmen](https://www.coches.net/noticias/informe-coche-autonomo-conectado-espana-2024) zur erweiterten UnterstĂŒtzung autonomer Technologien.
**Wenn man derartige Informationen im Zusammenhang betrachtet,** bekommt man eine Idee davon, warum zunehmend alles elektrisch und digital werden soll. Umwelt- und MobilitÀtsprobleme in StÀdten, wie Luftverschmutzung, LÀrmbelÀstigung, Platzmangel oder Staus, sind eine Sache. Mit dem Argument «emissionslos» wird jedoch eine Referenz zum CO2 und dem «menschengemachten Klimawandel» hergestellt, die Emotionen triggert. Und damit wird so ziemlich alles verkauft.
**Letztlich aber gilt: Je elektrischer und digitaler unsere Umgebung wird** und je freigiebiger wir mit unseren Daten jeder Art sind, desto besser werden wir kontrollier-, steuer- und sogar abschaltbar. Irgendwann entscheiden KI-basierte Algorithmen, ob, wann, wie, wohin und mit wem wir uns bewegen dĂŒrfen. Ăber einen 15-Minuten-Radius geht dann möglicherweise nichts hinaus. Die Projekte auf diesem Weg sind ernst zu nehmen, real und schon weit fortgeschritten.
*\[Titelbild:* *[Pixabay](https://pixabay.com/de/photos/reisen-wagen-ferien-fahrzeug-1426822/)]*
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/nur-abschied-vom-alleinfahren-monstrose-spanische-uberwachungsprojekte-gemass)*** erschienen.
-

@ 3b7fc823:e194354f
2025-03-23 03:54:16
A quick guide for the less than technical savvy to set up their very own free private tor enabled email using Onionmail. Privacy is for everyone, not just the super cyber nerds.
Onion Mail is an anonymous POP3/SMTP email server program hosted by various people on the internet. You can visit this site and read the details: https://en.onionmail.info/
1. Download Tor Browser
First, if you don't already, go download Tor Browser. You are going to need it. https://www.torproject.org/
2. Sign Up
Using Tor browser go to the directory page (https://onionmail.info/directory.html) choose one of the servers and sign up for an account. I say sign up but it is just choosing a user name you want to go before the @xyz.onion email address and solving a captcha.
3. Account information
Once you are done signing up an Account information page will pop up. **MAKE SURE YOU SAVE THIS!!!** It has your address and passwords (for sending and receiving email) that you will need. If you lose them then you are shit out of luck.
4. Install an Email Client
You can use Claws Mail, Neomutt, or whatever, but for this example, we will be using Thunderbird.
a. Download Thunderbird email client
b. The easy setup popup page that wants your name, email, and password isn't going to like your user@xyz.onion address. Just enter something that looks like a regular email address such as name@example.com and the **Configure Manually**option will appear below. Click that.
5. Configure Incoming (POP3) Server
Under Incoming Server:
Protocol: POP3
Server or Hostname: xyz.onion (whatever your account info says)
Port: 110
Security: STARTTLS
Authentication: Normal password
Username: (your username)
Password: (POP3 password).
6. Configure Outgoing (SMTP) Server
Under Outgoing Server:
Server or Hostname: xyz.onion (whatever your account info says)
Port: 25
Security: STARTTLS
Authentication: Normal password
Username: (your username)
Password: (SMTP password).
7. Click on email at the top and change your address if you had to use a spoof one to get the configure manually to pop up.
8. Configure Proxy
a. Click the **gear icon** on the bottom left for settings. Scroll all the way down to **Network & Disk Space**. Click the **settings button** next to **Connection. Configure how Thunderbird connects to the internet**.
b. Select **Manual Proxy Configuration**. For **SOCKS Host** enter **127.0.0.1** and enter port **9050**. (if you are running this through a VM the port may be different)
c. Now check the box for **SOCKS5** and then **Proxy DNS when using SOCKS5** down at the bottom. Click OK
9. Check Email
For thunderbird to reach the onion mail server it has to be connected to tor. Depending on your local setup, it might be fine as is or you might have to have tor browser open in the background. Click on **inbox** and then the **little cloud icon** with the down arrow to check mail.
10. Security Exception
Thunderbird is not going to like that the onion mail server security certificate is self signed. A popup **Add Security Exception** will appear. Click **Confirm Security Exception**.
You are done. Enjoy your new private email service.
**REMEMBER: The server can read your emails unless they are encrypted. Go into account settings. Look down and click End-toEnd Encryption. Then add your OpenPGP key or open your OpenPGP Key Manager (you might have to download one if you don't already have one) and generate a new key for this account.**
-

@ 57d1a264:69f1fee1
2025-03-29 17:15:17

- Once activated, "Accept From Any Mintâ is the default setting. This is the easiest way to get started, let's the user start acceptance Cashu ecash just out of the box.
- If someone does want to be selective, they can choose âAccept From Trusted Mints,â and that brings up a field where they can add specific mint URLs they trust.
- âFind a Mintâ section on the right with a button links directly to bitcoinmints.com, already filtered for Cashu mints, so users can easily browse options.
- Mint info modal shows mint technical details stuff from the NUT06 spec. Since this is geared towards the more technical users I left the field names and NUT number as-is instead of trying to make it more semantic.
originally posted at https://stacker.news/items/928800
-

@ 5ffb8e1b:255b6735
2025-03-29 13:57:02
As a fellow Nostrich you might have noticed some of my #arlist posts. It is my effort to curate artists that are active on Nostr and make it easier for other users to find content that they are interested in.
By now I have posted six or seven posts mentioning close to fifty artists, the problem so far is that it's only a list of handles and it is up to reader to click on each in order to find out what are the artist behind the names all about. Now I am going to start creating blog posts with a few artists mentioned in each, with short descriptions of their work and an image or to.
I would love to have some more automated mode of curation but I still couldn't figure out what is a good way for it. I've looked at Listr, Primal custom feeds and Yakihonne curations but none seem to enable me to make a list of npubs that is then turned into a feed that I could publicly share for others to views.
Any advice on how to achieve this is VERY welcome !
And now lets get to the first batch of artists I want to share with you.
### Eugene Gorbachenko ###
nostr:npub1082uhnrnxu7v0gesfl78uzj3r89a8ds2gj3dvuvjnw5qlz4a7udqwrqdnd
Artist from Ukrain creating amazing realistic watercolor paintings.
He is very active on Nostr but is very unnoticed for some stange reason. Make sure to repost the painting that you liked the most to help other Nostr users to discover his great art.
![!(image)[https://m.primal.net/PxJc.png]]()
### Siritravelsketch ###
nostr:npub14lqzjhfvdc9psgxzznq8xys8pfq8p4fqsvtr6llyzraq90u9m8fqevhssu
a a lovely lady from Thailand making architecture from all around the world spring alive in her ink skethes. Dynamic lines gives it a dreamy magical feel, sometimes supported by soft watercolor strokes takes you to a ferytale layer of reality.
![!(image)[https://m.primal.net/PxJj.png]]()
### BureuGewas ###
nostr:npub1k78qzy2s9ap4klshnu9tcmmcnr3msvvaeza94epsgptr7jce6p9sa2ggp4
a a master of the clasic oil painting. From traditional still life to modern day subjects his paintings makes you feel the textures and light of the scene more intense then reality itself.
![!(image)[https://m.primal.net/PxKS.png]]()
You can see that I'm no art critic, but I am trying my best. If anyone else is interested to join me in this curration adventure feel free to reach out !
With love, Agi Choote
-

@ fd06f542:8d6d54cd
2025-03-30 02:11:00
NIP-03
======
OpenTimestamps Attestations for Events
--------------------------------------
`draft` `optional`
This NIP defines an event with `kind:1040` that can contain an [OpenTimestamps](https://opentimestamps.org/) proof for any other event:
```json
{
"kind": 1040
"tags": [
["e", <event-id>, <relay-url>],
["alt", "opentimestamps attestation"]
],
"content": <base64-encoded OTS file data>
}
```
- The OpenTimestamps proof MUST prove the referenced `e` event id as its digest.
- The `content` MUST be the full content of an `.ots` file containing at least one Bitcoin attestation. This file SHOULD contain a **single** Bitcoin attestation (as not more than one valid attestation is necessary and less bytes is better than more) and no reference to "pending" attestations since they are useless in this context.
### Example OpenTimestamps proof verification flow
Using [`nak`](https://github.com/fiatjaf/nak), [`jq`](https://jqlang.github.io/jq/) and [`ots`](https://github.com/fiatjaf/ots):
```bash
~> nak req -i e71c6ea722987debdb60f81f9ea4f604b5ac0664120dd64fb9d23abc4ec7c323 wss://nostr-pub.wellorder.net | jq -r .content | ots verify
> using an esplora server at https://blockstream.info/api
- sequence ending on block 810391 is valid
timestamp validated at block [810391]
```
-

@ 21335073:a244b1ad
2025-03-18 20:47:50
**Warning: This piece contains a conversation about difficult topics. Please proceed with caution.**
TL;DR please educate your children about online safety.
Julian Assange wrote in his 2012 book *Cypherpunks*, âThis book is not a manifesto. There isnât time for that. This book is a warning.â I read it a few times over the past summer. Those opening lines definitely stood out to me. I wish we had listened back then. He saw something about the internet that few had the ability to see. There are some individuals who are so close to a topic that when they speak, itâs difficult for others who arenât steeped in it to visualize what theyâre talking about. I didnât read the book until more recently. If I had read it when it came out, it probably would have sounded like an unknown foreign language to me. Today it makes more sense.
This isnât a manifesto. This isnât a book. There is no time for that. Itâs a warning and a possible solution from a desperate and determined survivor advocate who has been pulling and unraveling a thread for a few years. At times, I feel too close to this topic to make any sense trying to convey my pathway to my conclusions or thoughts to the general public. My hope is that if nothing else, I can convey my sense of urgency while writing this. This piece is a watchmanâs warning.
When a child steps online, they are walking into a new world. A new reality. When you hand a child the internet, you are handing them possibilitiesâgood, bad, and ugly. This is a conversation about lowering the potential of negative outcomes of stepping into that new world and how I came to these conclusions. I constantly compare the internet to the road. You wouldnât let a young child run out into the road with no guidance or safety precautions. When you hand a child the internet without any type of guidance or safety measures, you are allowing them to play in rush hour, oncoming traffic. âLook left, look right for cars before crossing.â We almost all have been taught that as children. What are we taught as humans about safety before stepping into a completely different reality like the internet? Very little.
I could never really figure out why many folks in tech, privacy rights activists, and hackers seemed so cold to me while talking about online child sexual exploitation. I always figured that as a survivor advocate for those affected by these crimes, that specific, skilled group of individuals would be very welcoming and easy to talk to about such serious topics. I actually had one hacker laugh in my face when I brought it up while I was looking for answers. I thought maybe this individual thought I was accusing them of something I wasnât, so I felt bad for asking. I was constantly extremely disappointed and would ask myself, âWhy donât they care? What could I say to make them care more? What could I say to make them understand the crisis and the level of suffering that happens as a result of the problem?â
I have been serving minor survivors of online child sexual exploitation for years. My first case serving a survivor of this specific crime was in 2018âa 13-year-old girl sexually exploited by a serial predator on Snapchat. That was my first glimpse into this side of the internet. I won a national award for serving the minor survivors of Twitter in 2023, but I had been working on that specific project for a few years. I was nominated by a lawyer representing two survivors in a legal battle against the platform. Iâve never really spoken about this before, but at the time it was a choice for me between fighting Snapchat or Twitter. I chose Twitterâor rather, Twitter chose me. I heard about the story of John Doe #1 and John Doe #2, and I was so unbelievably broken over it that I went to war for multiple years. I was and still am royally pissed about that case. As far as I was concerned, the John Doe #1 case proved that whatever was going on with corporate tech social media was so out of control that I didnât have time to wait, so I got to work. It was reading the messages that John Doe #1 sent to Twitter begging them to remove his sexual exploitation that broke me. He was a child begging adults to do something. A passion for justice and protecting kids makes you do wild things. I was desperate to find answers about what happened and searched for solutions. In the end, the platform Twitter was purchased. During the acquisition, I just asked Mr. Musk nicely to prioritize the issue of detection and removal of child sexual exploitation without violating digital privacy rights or eroding end-to-end encryption. Elon thanked me multiple times during the acquisition, made some changes, and I was thanked by others on the survivorsâ side as well.
I still feel that even with the progress made, I really just scratched the surface with Twitter, now X. I left that passion project when I did for a few reasons. I wanted to give new leadership time to tackle the issue. Elon Musk made big promises that I knew would take a while to fulfill, but mostly I had been watching global legislation transpire around the issue, and frankly, the governments are willing to go much further with X and the rest of corporate tech than I ever would. My work begging Twitter to make changes with easier reporting of content, detection, and removal of child sexual exploitation materialâwithout violating privacy rights or eroding end-to-end encryptionâand advocating for the minor survivors of the platform went as far as my principles would have allowed. Iâm grateful for that experience. I was still left with a nagging question: âHow did things get so bad with Twitter where the John Doe #1 and John Doe #2 case was able to happen in the first place?â I decided to keep looking for answers. I decided to keep pulling the thread.
I never worked for Twitter. This is often confusing for folks. I will say that despite being disappointed in the platformâs leadership at times, I loved Twitter. I saw and still see its value. I definitely love the survivors of the platform, but I also loved the platform. I was a champion of the platformâs ability to give folks from virtually around the globe an opportunity to speak and be heard.
I want to be clear that John Doe #1 really is my why. He is the inspiration. I am writing this because of him. He represents so many globally, and Iâm still inspired by his bravery. One childâs voice begging adults to do somethingâIâm an adult, I heard him. Iâd go to war a thousand more lifetimes for that young man, and I donât even know his name. Fighting has been personally dark at times; Iâm not even going to try to sugarcoat it, but it has been worth it.
The data surrounding the very real crime of online child sexual exploitation is available to the public online at any time for anyone to see. Iâd encourage you to go look at the data for yourself. I believe in encouraging folks to check multiple sources so that you understand the full picture. If you are uncomfortable just searching around the internet for information about this topic, use the terms âCSAM,â âCSEM,â âSG-CSEM,â or âAI Generated CSAM.â The numbers donât lieâitâs a nightmare thatâs out of control. Itâs a big business. The demand is high, and unfortunately, business is booming. Organizations collect the data, tech companies often post their data, governments report frequently, and the corporate press has covered a decent portion of the conversation, so Iâm sure you can find a source that you trust.
Technology is changing rapidly, which is great for innovation as a whole but horrible for the crime of online child sexual exploitation. Those wishing to exploit the vulnerable seem to be adapting to each technological change with ease. The governments are so far behind with tackling these issues that as Iâm typing this, itâs borderline irrelevant to even include them while speaking about the crime or potential solutions. Technology is changing too rapidly, and their old, broken systems canât even dare to keep up. Think of it like the governmentsâ âWar on Drugs.â Drugs won. In this case as well, the governments are not winning. The governments are talking about maybe having a meeting on potentially maybe having legislation around the crimes. The time to have that meeting would have been many years ago. Iâm not advocating for governments to legislate our way out of this. Iâm on the side of educating and innovating our way out of this.
I have been clear while advocating for the minor survivors of corporate tech platforms that I would not advocate for any solution to the crime that would violate digital privacy rights or erode end-to-end encryption. That has been a personal moral position that I was unwilling to budge on. This is an extremely unpopular and borderline nonexistent position in the anti-human trafficking movement and online child protection space. Iâm often fearful that Iâm wrong about this. I have always thought that a better pathway forward would have been to incentivize innovation for detection and removal of content. I had no previous exposure to privacy rights activists or Cypherpunksâactually, I came to that conclusion by listening to the voices of MENA region political dissidents and human rights activists. After developing relationships with human rights activists from around the globe, I realized how important privacy rights and encryption are for those who need it most globally. I was simply unwilling to give more power, control, and opportunities for mass surveillance to big abusers like governments wishing to enslave entire nations and untrustworthy corporate tech companies to potentially end some portion of abuses online. On top of all of it, it has been clear to me for years that all potential solutions outside of violating digital privacy rights to detect and remove child sexual exploitation online have not yet been explored aggressively. Iâve been disappointed that there hasnât been more of a conversation around preventing the crime from happening in the first place.
What has been tried is mass surveillance. In China, they are currently under mass surveillance both online and offline, and their behaviors are attached to a social credit score. Unfortunately, even on state-run and controlled social media platforms, they still have child sexual exploitation and abuse imagery pop up along with other crimes and human rights violations. They also have a thriving black market online due to the oppression from the state. In other words, even an entire loss of freedom and privacy cannot end the sexual exploitation of children online. Itâs been tried. There is no reason to repeat this method.
It took me an embarrassingly long time to figure out why I always felt a slight coldness from those in tech and privacy-minded individuals about the topic of child sexual exploitation online. I didnât have any clue about the âFour Horsemen of the Infocalypse.â This is a term coined by Timothy C. May in 1988. I would have been a child myself when he first said it. I actually laughed at myself when I heard the phrase for the first time. I finally got it. The Cypherpunks werenât wrong about that topic. They were so spot on that it is borderline uncomfortable. I was mad at first that they knew that early during the birth of the internet that this issue would arise and didnât address it. Then I got over it because I realized that it wasnât their job. Their job wasâisâto write code. Their job wasnât to be involved and loving parents or survivor advocates. Their job wasnât to educate children on internet safety or raise awareness; their job was to write code.
They knew that child sexual abuse material would be shared on the internet. They said what would happenânot in a gleeful way, but a prediction. Then it happened.
I equate it now to a concrete company laying down a road. As youâre pouring the concrete, you can say to yourself, âA terrorist might travel down this road to go kill many, and on the flip side, a beautiful child can be born in an ambulance on this road.â Who or what travels down the road is not their responsibilityâthey are just supposed to lay the concrete. Iâd never go to a concrete pourer and ask them to solve terrorism that travels down roads. Under the current system, law enforcement should stop terrorists before they even make it to the road. The solution to this specific problem is not to treat everyone on the road like a terrorist or to not build the road.
So I understand the perceived coldness from those in tech. Not only was it not their job, but bringing up the topic was seen as the equivalent of asking a free person if they wanted to discuss one of the four topicsâchild abusers, terrorists, drug dealers, intellectual property pirates, etc.âthat would usher in digital authoritarianism for all who are online globally.
Privacy rights advocates and groups have put up a good fight. They stood by their principles. Unfortunately, when it comes to corporate tech, I believe that the issue of privacy is almost a complete lost cause at this point. Itâs still worth pushing back, but ultimately, it is a losing battleâa ticking time bomb.
I do think that corporate tech providers could have slowed down the inevitable loss of privacy at the hands of the state by prioritizing the detection and removal of CSAM when they all started online. I believe it would have bought some time, fewer would have been traumatized by that specific crime, and I do believe that it could have slowed down the demand for content. If I think too much about that, Iâll go insane, so I try to push the âif maybesâ aside, but never knowing if it could have been handled differently will forever haunt me. At night when itâs quiet, I wonder what I would have done differently if given the opportunity. Iâll probably never know how much corporate tech knew and ignored in the hopes that it would go away while the problem continued to get worse. They had different priorities. The most voiceless and vulnerable exploited on corporate tech never had much of a voice, so corporate tech providers didnât receive very much pushback.
Now Iâm about to say something really wild, and you can call me whatever you want to call me, but Iâm going to say what I believe to be true. I believe that the governments are either so incompetent that they allowed the proliferation of CSAM online, or they knowingly allowed the problem to fester long enough to have an excuse to violate privacy rights and erode end-to-end encryption. The US government could have seized the corporate tech providers over CSAM, but I believe that they were so useful as a propaganda arm for the regimes that they allowed them to continue virtually unscathed.
That season is done now, and the governments are making the issue a priority. It will come at a high cost. Privacy on corporate tech providers is virtually done as Iâm typing this. It feels like a death rattle. Iâm not particularly sure that we had much digital privacy to begin with, but the illusion of a veil of privacy feels gone.
To make matters slightly more complex, it would be hard to convince me that once AI really gets going, digital privacy will exist at all.
I believe that there should be a conversation shift to preserving freedoms and human rights in a post-privacy society.
I donât want to get locked up because AI predicted a nasty post online from me about the government. Iâm not a doomer about AIâIâm just going to roll with it personally. Iâm looking forward to the positive changes that will be brought forth by AI. I see it as inevitable. A bit of privacy was helpful while it lasted. Please keep fighting to preserve what is left of privacy either way because I could be wrong about all of this.
On the topic of AI, the addition of AI to the horrific crime of child sexual abuse material and child sexual exploitation in multiple ways so far has been devastating. Itâs currently out of control. The genie is out of the bottle. I am hopeful that innovation will get us humans out of this, but Iâm not sure how or how long it will take. We must be extremely cautious around AI legislation. It should not be illegal to innovate even if some bad comes with the good. I donât trust that the governments are equipped to decide the best pathway forward for AI. Source: the entire history of the government.
I have been personally negatively impacted by AI-generated content. Every few days, I get another alert that Iâm featured again in whatâs called âdeep fake pornographyâ without my consent. Iâm not happy about it, but what pains me the most is the thought that for a period of time down the road, many globally will experience what myself and others are experiencing now by being digitally sexually abused in this way. If you have ever had your picture taken and posted online, you are also at risk of being exploited in this way. Your childâs image can be used as well, unfortunately, and this is just the beginning of this particular nightmare. It will move to more realistic interpretations of sexual behaviors as technology improves. I have no brave words of wisdom about how to deal with that emotionally. I do have hope that innovation will save the day around this specific issue. Iâm nervous that everyone online will have to ID verify due to this issue. I see that as one possible outcome that could help to prevent one problem but inadvertently cause more problems, especially for those living under authoritarian regimes or anyone who needs to remain anonymous online. A zero-knowledge proof (ZKP) would probably be the best solution to these issues. There are some survivors of violence and/or sexual trauma who need to remain anonymous online for various reasons. There are survivor stories available online of those who have been abused in this way. Iâd encourage you seek out and listen to their stories.
There have been periods of time recently where I hesitate to say anything at all because more than likely AI will cover most of my concerns about education, awareness, prevention, detection, and removal of child sexual exploitation online, etc.
Unfortunately, some of the most pressing issues weâve seen online over the last few years come in the form of âsextortion.â Self-generated child sexual exploitation (SG-CSEM) numbers are continuing to be terrifying. Iâd strongly encourage that you look into sextortion data. AI + sextortion is also a huge concern. The perpetrators are using the non-sexually explicit images of children and putting their likeness on AI-generated child sexual exploitation content and extorting money, more imagery, or both from minors online. Itâs like a million nightmares wrapped into one. The wild part is that these issues will only get more pervasive because technology is harnessed to perpetuate horror at a scale unimaginable to a human mind.
Even if you banned phones and the internet or tried to prevent children from accessing the internet, it wouldnât solve it. Child sexual exploitation will still be with us until as a society we start to prevent the crime before it happens. That is the only human way out right now.
There is no reset button on the internet, but if I could go back, Iâd tell survivor advocates to heed the warnings of the early internet builders and to start education and awareness campaigns designed to prevent as much online child sexual exploitation as possible. The internet and technology moved quickly, and I donât believe that society ever really caught up. We live in a world where a child can be groomed by a predator in their own home while sitting on a couch next to their parents watching TV. We werenât ready as a species to tackle the fast-paced algorithms and dangers online. It happened too quickly for parents to catch up. How can you parent for the ever-changing digital world unless you are constantly aware of the dangers?
I donât think that the internet is inherently bad. I believe that it can be a powerful tool for freedom and resistance. Iâve spoken a lot about the bad online, but there is beauty as well. We often discuss how victims and survivors are abused online; we rarely discuss the fact that countless survivors around the globe have been able to share their experiences, strength, hope, as well as provide resources to the vulnerable. I do question if giving any government or tech company access to censorship, surveillance, etc., online in the name of serving survivors might not actually impact a portion of survivors negatively. There are a fair amount of survivors with powerful abusers protected by governments and the corporate press. If a survivor cannot speak to the press about their abuse, the only place they can go is online, directly or indirectly through an independent journalist who also risks being censored. This scenario isnât hard to imagineâit already happened in China. During #MeToo, a survivor in China wanted to post their story. The government censored the post, so the survivor put their story on the blockchain. Iâm excited that the survivor was creative and brave, but itâs terrifying to think that we live in a world where that situation is a necessity.
I believe that the future for many survivors sharing their stories globally will be on completely censorship-resistant and decentralized protocols. This thought in particular gives me hope. When we listen to the experiences of a diverse group of survivors, we can start to understand potential solutions to preventing the crimes from happening in the first place.
My heart is broken over the gut-wrenching stories of survivors sexually exploited online. Every time I hear the story of a survivor, I do think to myself quietly, âWhat could have prevented this from happening in the first place?â My heart is with survivors.
My head, on the other hand, is full of the understanding that the internet should remain free. The free flow of information should not be stopped. My mind is with the innocent citizens around the globe that deserve freedom both online and offline.
The problem is that governments donât only want to censor illegal content that violates human rightsâthey create legislation that is so broad that it can impact speech and privacy of all. âDonât you care about the kids?â Yes, I do. I do so much that Iâm invested in finding solutions. I also care about all citizens around the globe that deserve an opportunity to live free from a mass surveillance society. If terrorism happens online, I should not be punished by losing my freedom. If drugs are sold online, I should not be punished. Iâm not an abuser, Iâm not a terrorist, and I donât engage in illegal behaviors. I refuse to lose freedom because of othersâ bad behaviors online.
I want to be clear that on a long enough timeline, the governments will decide that they can be better parents/caregivers than you can if something isnât done to stop minors from being sexually exploited online. The price will be a complete loss of anonymity, privacy, free speech, and freedom of religion online. I find it rather insulting that governments think theyâre better equipped to raise children than parents and caretakers.
So we canât go backwardsâall that we can do is go forward. Those who want to have freedom will find technology to facilitate their liberation. This will lead many over time to decentralized and open protocols. So as far as Iâm concerned, this does solve a few of my worriesâthose who need, want, and deserve to speak freely online will have the opportunity in most countriesâbut what about online child sexual exploitation?
When I popped up around the decentralized space, I was met with the fear of censorship. Iâm not here to censor you. I donât write code. I couldnât censor anyone or any piece of content even if I wanted to across the internet, no matter how depraved. I donât have the skills to do that.
Iâm here to start a conversation. Freedom comes at a cost. You must always fight for and protect your freedom. I canât speak about protecting yourself from all of the Four Horsemen because I simply donât know the topics well enough, but I can speak about this one topic.
If there was a shortcut to ending online child sexual exploitation, I would have found it by now. There isnât one right now. I believe that education is the only pathway forward to preventing the crime of online child sexual exploitation for future generations.
I propose a yearly education course for every child of all school ages, taught as a standard part of the curriculum. Ideally, parents/caregivers would be involved in the education/learning process.
**Course:**
- The creation of the internet and computers
- The fight for cryptography
- The tech supply chain from the ground up (example: human rights violations in the supply chain)
- Corporate tech
- Freedom tech
- Data privacy
- Digital privacy rights
- AI (history-current)
- Online safety (predators, scams, catfishing, extortion)
- Bitcoin
- Laws
- How to deal with online hate and harassment
- Information on who to contact if you are being abused online or offline
- Algorithms
- How to seek out the truth about news, etc., online
The parents/caregivers, homeschoolers, unschoolers, and those working to create decentralized parallel societies have been an inspiration while writing this, but my hope is that all children would learn this course, even in government ran schools. Ideally, parents would teach this to their own children.
The decentralized space doesnât want child sexual exploitation to thrive. Hereâs the deal: there has to be a strong prevention effort in order to protect the next generation. The internet isnât going anywhere, predators arenât going anywhere, and Iâm not down to let anyone have the opportunity to prove that there is a need for more government. I donât believe that the government should act as parents. The governments have had a chance to attempt to stop online child sexual exploitation, and they didnât do it. Can we try a different pathway forward?
Iâd like to put myself out of a job. I donât want to ever hear another story like John Doe #1 ever again. This will require work. Iâve often called online child sexual exploitation the lynchpin for the internet. Itâs time to arm generations of children with knowledge and tools. I canât do this alone.
Individuals have fought so that I could have freedom online. I want to fight to protect it. I donât want child predators to give the government any opportunity to take away freedom. Decentralized spaces are as close to a reset as weâll get with the opportunity to do it right from the start. Start the youth off correctly by preventing potential hazards to the best of your ability.
The good news is anyone can work on this! Iâd encourage you to take it and run with it. I added the additional education about the history of the internet to make the course more educational and fun. Instead of cleaning up generations of destroyed lives due to online sexual exploitation, perhaps this could inspire generations of those who will build our futures. Perhaps if the youth is armed with knowledge, they can create more tools to prevent the crime.
This one solution that Iâm suggesting can be done on an individual level or on a larger scale. It should be adjusted depending on age, learning style, etc. It should be fun and playful.
This solution does not address abuse in the home or some of the root causes of offline child sexual exploitation. My hope is that it could lead to some survivors experiencing abuse in the home an opportunity to disclose with a trusted adult. The purpose for this solution is to prevent the crime of online child sexual exploitation before it occurs and to arm the youth with the tools to contact safe adults if and when it happens.
In closing, I went to hell a few times so that you didnât have to. I spoke to the mothers of survivors of minors sexually exploited onlineâtheir tears could fill rivers. Iâve spoken with political dissidents who yearned to be free from authoritarian surveillance states. The only balance that Iâve found is freedom online for citizens around the globe and prevention from the dangers of that for the youth. Donât slow down innovation and freedom. Educate, prepare, adapt, and look for solutions.
Iâm not perfect and Iâm sure that there are errors in this piece. I hope that you find them and it starts a conversation.
-

@ fd06f542:8d6d54cd
2025-03-30 02:10:24
NIP-03
======
OpenTimestamps Attestations for Events
--------------------------------------
`draft` `optional`
This NIP defines an event with `kind:1040` that can contain an [OpenTimestamps](https://opentimestamps.org/) proof for any other event:
```json
{
"kind": 1040
"tags": [
["e", <event-id>, <relay-url>],
["alt", "opentimestamps attestation"]
],
"content": <base64-encoded OTS file data>
}
```
- The OpenTimestamps proof MUST prove the referenced `e` event id as its digest.
- The `content` MUST be the full content of an `.ots` file containing at least one Bitcoin attestation. This file SHOULD contain a **single** Bitcoin attestation (as not more than one valid attestation is necessary and less bytes is better than more) and no reference to "pending" attestations since they are useless in this context.
### Example OpenTimestamps proof verification flow
Using [`nak`](https://github.com/fiatjaf/nak), [`jq`](https://jqlang.github.io/jq/) and [`ots`](https://github.com/fiatjaf/ots):
```bash
~> nak req -i e71c6ea722987debdb60f81f9ea4f604b5ac0664120dd64fb9d23abc4ec7c323 wss://nostr-pub.wellorder.net | jq -r .content | ots verify
> using an esplora server at https://blockstream.info/api
- sequence ending on block 810391 is valid
timestamp validated at block [810391]
```
-

@ 6be5cc06:5259daf0
2025-03-31 03:39:07
## Introdução
Uma sociedade nĂŁo deve ser construĂda sobre coerção, mas sim sobre associaçÔes voluntĂĄrias e interaçÔes espontĂąneas entre indivĂduos. A sociedade de condomĂnios privados surge como uma alternativa natural ao modelo atual de centros urbanos, substituindo a imposição centralizada por estruturas baseadas em contratos e livre associação. Cada condomĂnio Ă© uma unidade autĂŽnoma, gerida por aqueles que ali residem, onde os critĂ©rios de entrada, as regras internas e o comĂ©rcio sĂŁo definidos pelos prĂłprios participantes. Essa estrutura permite que indivĂduos se agrupem com base em valores compartilhados, eliminando os conflitos artificiais impostos por estados e legislaçÔes homogĂȘneas que nĂŁo respeitam a diversidade de preferĂȘncias e estilos de vida.
O objetivo dessa sociedade Ă© simples: permitir que as pessoas vivam de acordo com seus princĂpios sem interferĂȘncia externa. Em um mundo onde a coerção estatal distorce incentivos, os condomĂnios privados oferecem uma alternativa onde a ordem surge do livre mercado e da cooperação voluntĂĄria. Os moradores escolhem seus vizinhos, definem suas prĂłprias normas e interagem economicamente conforme suas necessidades e interesses. O modelo elimina a necessidade de um controle central, pois os incentivos derivados do livre mercado levam ao desenvolvimento de comunidades prĂłsperas, onde a reputação e a confiança mĂștua sĂŁo mais eficazes do que qualquer imposição estatal. Assim, essa sociedade representa a evolução lĂłgica do conceito de liberdade individual e propriedade privada como pilares fundamentais da ordem social.
## PĂșblico-Alvo e Identidade
Os condomĂnios privados refletem o princĂpio da livre associação, permitindo que indivĂduos escolham viver em comunidades alinhadas com seus valores e necessidades sem interferĂȘncia estatal. Cada condomĂnio possui uma identidade prĂłpria, moldada pelos moradores e seus interesses, criando ambientes onde afinidades culturais, filosĂłficas ou profissionais sĂŁo preservadas e incentivadas. Enquanto alguns podem ser voltados para famĂlias numerosas, oferecendo amplos espaços e infraestrutura adequada, outros podem priorizar solteiros e jovens profissionais, com ĂĄreas de coworking e espaços de lazer voltados para networking e socialização. Da mesma forma, comunidades religiosas podem estabelecer seus prĂłprios espaços de culto e eventos, enquanto condomĂnios para idosos podem ser projetados com acessibilidade e serviços mĂ©dicos especializados.
CrĂticos podem afirmar que essa forma de organização resulta em pouca diversidade de habilidades e perspectivas, mas esse argumento ignora a dinĂąmica das interaçÔes humanas e o carĂĄter evolutivo dos intercĂąmbios entre comunidades. Nenhum condomĂnio existe isolado; a troca entre diferentes comunidades ocorre naturalmente pelo mercado, incentivando o intercĂąmbio de conhecimento e serviços entre especialistas de diferentes ĂĄreas. AlĂ©m disso, a ideia de que todos os grupos devem conter uma variedade aleatĂłria de indivĂduos desconsidera que a verdadeira diversidade nasce da liberdade de escolha, e nĂŁo da imposição estatal de convivĂȘncias forçadas.
Outra crĂtica possĂvel Ă© que a existĂȘncia de critĂ©rios de entrada pode levar Ă segregação social. No entanto, essa preocupação deriva da concepção errĂŽnea de que todas as comunidades devem ser abertas e incluir qualquer pessoa indiscriminadamente. PorĂ©m, a liberdade de associação implica, necessariamente, a liberdade de exclusĂŁo. Se um grupo deseja manter determinada identidade cultural, religiosa ou profissional, isso nĂŁo impede que outros grupos criem suas prĂłprias comunidades conforme seus valores e recursos. AlĂ©m disso, essa especialização leva a uma concorrĂȘncia saudĂĄvel entre condomĂnios, forçando-os a oferecer melhores condiçÔes para atrair moradores. Em vez de uma sociedade homogĂȘnea moldada por burocratas, temos um mosaico de comunidades autĂŽnomas, onde cada indivĂduo pode encontrar ou criar o ambiente que melhor lhe convĂ©m.
## AutossuficiĂȘncia e Especialização
A força dos condomĂnios privados reside na capacidade de seus moradores de contribuĂrem ativamente para a comunidade, tornando-a funcional e autossuficiente sem a necessidade de intervençÔes estatais. Diferentes condomĂnios podem se especializar em ĂĄreas especĂficas ou ter diversos profissionais de diferentes setores, refletindo as competĂȘncias e interesses de seus residentes. Essa descentralização do conhecimento e da produção permite que cada comunidade desenvolva soluçÔes internas para suas demandas, reduzindo dependĂȘncias externas e estimulando a prosperidade local.
Os moradores atuam como agentes econĂŽmicos, trocando bens e serviços dentro do prĂłprio condomĂnio e entre diferentes comunidades. Um condomĂnio voltado para a saĂșde, por exemplo, pode contar com mĂ©dicos, enfermeiros e terapeutas que oferecem consultas, aulas e assistĂȘncia mĂ©dica particular, remunerados diretamente por seus clientes, sem a intermediação de burocracias. Da mesma forma, um condomĂnio agrĂcola pode abrigar agricultores que cultivam alimentos orgĂąnicos, compartilham tĂ©cnicas de cultivo e comercializam excedentes com outros condomĂnios, garantindo um fluxo contĂnuo de suprimentos. Em um condomĂnio tecnolĂłgico, programadores, engenheiros e empreendedores desenvolvem soluçÔes de TI, segurança digital e energia renovĂĄvel, promovendo a inovação e ampliando as possibilidades de intercĂąmbio econĂŽmico.
A economia interna de cada condomĂnio se fortalece atravĂ©s de serviços oferecidos pelos prĂłprios moradores. Professores podem ministrar aulas, tĂ©cnicos podem prestar serviços de manutenção, artesĂŁos podem vender seus produtos diretamente para os vizinhos. O mercado livre e voluntĂĄrio Ă© o principal regulador dessas interaçÔes, garantindo que a especialização surja naturalmente conforme a demanda e a oferta se ajustam. Essa estrutura elimina desperdĂcios comuns em sistemas centralizados, onde a alocação de recursos se dĂĄ por decisĂ”es polĂticas e nĂŁo pelas necessidades reais da população.
Alguns argumentam que a especialização pode criar bolhas de conhecimento, tornando os condomĂnios excessivamente dependentes de trocas externas. Contudo, essa preocupação desconsidera a natureza espontĂąnea do mercado, que incentiva a cooperação e o comĂ©rcio entre comunidades distintas. Nenhum condomĂnio precisa produzir tudo internamente; ao contrĂĄrio, a divisĂŁo do trabalho e a liberdade de escolha promovem interdependĂȘncias saudĂĄveis e vantajosas para todos. Assim, cada morador se insere em um ecossistema dinĂąmico, onde suas habilidades sĂŁo valorizadas e sua autonomia preservada, sem coerçÔes estatais ou distorçÔes artificiais impostas por planejadores centrais.
## **Infraestrutura e Sustentabilidade**
A solidez de uma sociedade baseada em condomĂnios privados depende de uma infraestrutura eficiente e sustentĂĄvel, projetada para reduzir a dependĂȘncia externa e garantir o mĂĄximo de autonomia. Sem um aparato estatal centralizador, cada comunidade deve estruturar seus prĂłprios meios de obtenção de energia, ĂĄgua, alimentação e demais bens essenciais, garantindo que suas operaçÔes sejam viĂĄveis a longo prazo. Essa abordagem, longe de ser um entrave, representa a verdadeira inovação descentralizada: um ambiente onde as soluçÔes emergem da necessidade real e da engenhosidade humana, e nĂŁo de diretrizes burocrĂĄticas e regulamentos ineficazes.
Cada condomĂnio pode investir em tecnologias sustentĂĄveis e autĂŽnomas, como energia solar e eĂłlica, reduzindo custos e minimizando a vulnerabilidade Ă s flutuaçÔes do mercado energĂ©tico tradicional. Sistemas de captação e filtragem de ĂĄgua da chuva, bem como a reutilização eficiente dos recursos hĂdricos, garantem independĂȘncia em relação a empresas monopolistas e governos que frequentemente administram esse bem de forma ineficaz. Hortas comunitĂĄrias e fazendas verticais podem suprir grande parte da demanda alimentar, permitindo que cada condomĂnio mantenha sua prĂłpria reserva de alimentos, aumentando a resiliĂȘncia contra crises externas e instabilidades de mercado.
AlĂ©m dos recursos naturais, os espaços compartilhados desempenham um papel fundamental na integração e no fortalecimento dessas comunidades. Bibliotecas, ginĂĄsios, creches e salas de aula permitem que o conhecimento e os serviços circulem internamente, criando um ambiente onde a colaboração ocorre de maneira orgĂąnica. A descentralização tambĂ©m se aplica ao uso da tecnologia, plataformas digitais privadas podem ser utilizadas para conectar moradores, facilitar a troca de serviços e produtos, alĂ©m de coordenar agendamentos e eventos dentro dos condomĂnios e entre diferentes comunidades.
O Bitcoin surge como uma ferramenta indispensĂĄvel nesse ecossistema, eliminando a necessidade de bancos estatais ou sistemas financeiros controlados. Ao permitir transaçÔes diretas, transparentes e resistentes Ă censura, o Bitcoin se torna o meio de troca ideal entre os condomĂnios, garantindo a preservação do valor e possibilitando um comĂ©rcio ĂĄgil e eficiente. AlĂ©m disso, contratos inteligentes e protocolos descentralizados podem ser integrados para administrar serviços comuns, fortalecer a segurança e reduzir a burocracia, tornando a governança desses condomĂnios cada vez mais autĂŽnoma e imune a intervençÔes externas.
Alguns podem argumentar que a falta de um aparato estatal para regulamentar a infraestrutura pode resultar em desigualdade no acesso a recursos essenciais, ou que a descentralização completa pode gerar caos e ineficiĂȘncia. No entanto, essa visĂŁo ignora o fato de que a concorrĂȘncia e a inovação no livre mercado sĂŁo os maiores motores de desenvolvimento sustentĂĄvel. Sem monopĂłlios ou subsĂdios distorcendo a alocação de recursos, a busca por eficiĂȘncia leva naturalmente Ă adoção de soluçÔes melhores e mais acessĂveis. CondomĂnios que oferecem infraestrutura de qualidade tendem a atrair mais moradores e investimentos, o que impulsiona a melhoria contĂnua e a diversificação dos serviços. Em vez de depender de um sistema centralizado falho, as comunidades se tornam responsĂĄveis por sua prĂłpria prosperidade, criando uma estrutura sustentĂĄvel, escalĂĄvel e adaptĂĄvel Ă s mudanças do futuro.
## Governança e Administração
Em uma sociedade descentralizada, nĂŁo se deve depender de uma estrutura estatal ou centralizada para regular e tomar decisĂ”es em nome dos indivĂduos. Cada condomĂnio, portanto, deve ser gerido de maneira autĂŽnoma, com processos claros de tomada de decisĂŁo, resolução de conflitos e administração das questĂ”es cotidianas. A gestĂŁo pode ser organizada por conselhos de moradores, associaçÔes ou sistemas de governança direta, conforme as necessidades locais.
#### Conselhos de Moradores e Processos de Tomada de DecisĂŁo
Em muitos casos, a administração interna de um condomĂnio privado pode ser realizada por um conselho de moradores, composto por representantes eleitos ou indicados pela prĂłpria comunidade. A ideia Ă© garantir que as decisĂ”es importantes, como planejamento urbano, orçamento, manutenção e serviços, sejam feitas de forma transparente e que os interesses de todos os envolvidos sejam considerados. Isso nĂŁo significa que a gestĂŁo precise ser completamente democrĂĄtica, mas sim que as decisĂ”es devem ser tomadas de forma legĂtima, transparente e acordadas pela maior parte dos membros.
Em vez de um processo burocrĂĄtico e centralizado, onde uma liderança impĂ”e suas vontades sobre todos a muitas vezes suas decisĂ”es ruins nĂŁo o afetam diretamente, a gestĂŁo de um condomĂnio privado deve ser orientada pela busca de consenso, onde os prĂłprios gestores sofrerĂŁo as consequĂȘncias de suas mĂĄs escolhas. O processo de tomada de decisĂŁo pode ser dinĂąmico e direto, com os moradores discutindo e acordando soluçÔes baseadas no mercado e nas necessidades locais, em vez de depender de um sistema impessoal de regulamentação. AlĂ©m disso, a utilização de tecnologias descentralizadas, como plataformas de blockchain, pode proporcionar maior transparĂȘncia nas decisĂ”es e maior confiança na gestĂŁo.
#### Resolução de Conflitos
A resolução de disputas dentro dos condomĂnios pode ocorrer de forma voluntĂĄria, atravĂ©s de negociação direta ou com o auxĂlio de mediadores escolhidos pelos prĂłprios moradores por meio de um sistema de reputação. Em alguns casos, podem ser criados mecanismos para resolução de disputas mais formais, com ĂĄrbitros ou juĂzes independentes que atuam sem vĂnculos com o condomĂnio. Esses ĂĄrbitros podem ser escolhidos com base em sua experiĂȘncia ou especialização em ĂĄreas como direito, mediação e resolução de conflitos, com uma reputação para zelar. Ao contrĂĄrio de um sistema judicial centralizado, onde a parte envolvida depende do Estado para resolver disputas, os moradores possuem a autonomia para buscar soluçÔes que atendam aos seus prĂłprios interesses e necessidades. A diversidade de abordagens em um sistema de governança descentralizado cria oportunidades para inovaçÔes que atendem diferentes cenĂĄrios, sem a interferĂȘncia de burocratas distantes dos prĂłprios problemas que estĂŁo "tentando resolver".
#### Planejamento Urbano e Arquitetura
A questĂŁo do design dos condomĂnios envolve nĂŁo apenas a estĂ©tica das construçÔes, mas tambĂ©m a funcionalidade e a sustentabilidade a longo prazo. O planejamento urbano deve refletir as necessidades especĂficas da comunidade, onde ela decide por si mesma como construir e organizar seu ambiente.\
Arquitetos e urbanistas, muitas vezes moradores especializados, serĂŁo responsĂĄveis pela concepção de espaços que atendam a esses critĂ©rios, criando ambientes agradĂĄveis, com ĂĄreas para lazer, trabalho e convivĂȘncia que atendam Ă s diversas necessidades de cada grupo.\
AlĂ©m disso, condomĂnios com nessecidades semelhantes poderĂŁo adotar ideias que deram certo em outros e certamente tambĂ©m darĂĄ no seu.
#### Segurança e Vigilùncia
Em relação Ă segurança, cada condomĂnio pode adotar sistemas de vigilĂąncia e proteção que atendam Ă sua realidade especĂfica. Algumas comunidades podem optar por sistemas de cĂąmeras de segurança, armamento pleno de seus moradores, patrulhamento privado ou atĂ© mesmo formas alternativas de garantir a proteção, como vigilĂąncia por meio de criptografia e monitoramento descentralizado. A chave para a segurança serĂĄ a confiança mĂștua e a colaboração voluntĂĄria entre os moradores, que terĂŁo a liberdade de definir suas prĂłprias medidas.
## ComĂ©rcio entre CondomĂnios
A troca de bens e serviços entre as diferentes comunidades Ă© essencial para o funcionamento da rede. Como cada condomĂnio possui um grau de especialização ou uma mistura de profissionais em diversas ĂĄreas, a interdependĂȘncia entre eles se torna crucial para suprir necessidades e promover a colaboração.
Embora alguns condomĂnios sejam especializados em ĂĄreas como saĂșde, agricultura ou tecnologia, outros podem ter um perfil mais diversificado, com moradores que atuam em diferentes campos de conhecimento. Por exemplo, um condomĂnio agrĂcola pode produzir alimentos orgĂąnicos frescos, enquanto um condomĂnio de saĂșde oferece consultas mĂ©dicas, terapias e cuidados especializados. JĂĄ um condomĂnio tecnolĂłgico pode fornecer inovaçÔes em software ou equipamentos de energia. Podem haver condomĂnios universitĂĄrios que oferecem todo tipo de solução no campo de ensino. Ao mesmo tempo, um condomĂnio misto, com moradores de diversas ĂĄreas, pode oferecer uma variedade de serviços e produtos, tornando-se um centro de intercĂąmbio de diferentes tipos de expertise.
Essa divisĂŁo de trabalho, seja especializada ou diversificada, permite que os condomĂnios ofereçam o melhor de suas ĂĄreas de atuação, ao mesmo tempo em que atendem Ă s demandas de outros. Um condomĂnio que nĂŁo se especializa pode, por exemplo, buscar um acordo de troca com um condomĂnio agrĂcola para obter alimentos frescos ou com um condomĂnio tecnolĂłgico para adquirir soluçÔes inovadoras.
Embora os condomĂnios busquem a autossuficiĂȘncia, alguns recursos essenciais nĂŁo podem ser produzidos internamente. Itens como minĂ©rios para construção, combustĂveis ou atĂ© mesmo ĂĄgua, em regiĂ”es secas, nĂŁo estĂŁo disponĂveis em todas as ĂĄreas. A natureza nĂŁo distribui os recursos de maneira uniforme, e a capacidade de produção local pode ser insuficiente para suprir todas as necessidades dos moradores. Isso implica que, para garantir a qualidade de vida e a continuidade das operaçÔes, os condomĂnios precisarĂŁo estabelecer relaçÔes comerciais e de fornecimento com fontes externas, seja atravĂ©s de mercados, importaçÔes ou parcerias com outras comunidades ou fornecedores fora do sistema de condomĂnios. O comĂ©rcio intercondomĂnios e com o exterior serĂĄ vital para a complementaridade das necessidades, assegurando que os moradores tenham acesso a tudo o que nĂŁo pode ser produzido localmente.
O sistema econĂŽmico entre os condomĂnios pode ser flexĂvel, permitindo o uso de uma moeda comum (como o Bitcoin) ou atĂ© mesmo um sistema de troca direta. Por exemplo, um morador de um condomĂnio misto pode oferecer serviços de design grĂĄfico em troca de alimentos ou cuidados mĂ©dicos. Esse tipo de colaboração estimula a produtividade e cria incentivos para que cada condomĂnio ofereça o melhor de seus recursos e habilidades, garantindo acesso aos bens e serviços necessĂĄrios.
#### RelaçÔes Externas e Diplomacia
O isolamento excessivo pode limitar o acesso a inovaçÔes, avanços culturais e tecnolĂłgicos, e atĂ© mesmo dificultar o acesso a mercados externos. Por isso, Ă© importante que haja canais de comunicação e mĂ©todos de diplomacia para interagir com outras comunidades. Os condomĂnios podem, por exemplo, estabelecer parcerias com outras regiĂ”es, seja para troca de produtos, serviços ou atĂ© para inovação. Isso garante que a rede de condomĂnios nĂŁo se torne autossuficiente ao ponto de se desconectar do resto do mundo, o que pode resultar em estagnação.
Feiras, mercados intercondomĂnios e atĂ© eventos culturais e educacionais podem ser organizados para promover essas interaçÔes. A colaboração entre as comunidades e o exterior nĂŁo precisa ser baseada em uma troca de dependĂȘncia, mas sim numa rede de oportunidades que cria benefĂcios para todas as partes envolvidas. Uma boa reputação atrai novos moradores, pode valorizar propriedades e facilitar parcerias. A diplomacia entre as comunidades tambĂ©m pode ser exercida para resolver disputas ou desafios externos.
A manutenção de boas relaçÔes entre condomĂnios Ă© essencial para garantir uma rede de apoio mĂștuo eficiente. Essas relaçÔes incentivam a troca de bens e serviços, como alimentos, assistĂȘncia mĂ©dica ou soluçÔes tecnolĂłgicas, alĂ©m de fortalecer a autossuficiĂȘncia regional. Ao colaborar em segurança, infraestrutura compartilhada, eventos culturais e atĂ© mesmo na resolução de conflitos, os condomĂnios se tornam mais resilientes e eficientes, reduzindo a dependĂȘncia externa e melhorando a qualidade de vida dos moradores. A cooperação contĂnua cria um ambiente mais seguro e harmonioso.
## Educação e Desenvolvimento Humano
Cada comunidade pode criar escolas internas com currĂculos adaptados Ă s especializaçÔes de seus moradores. Por exemplo, em um condomĂnio agrĂcola, podem ser ensinadas prĂĄticas agrĂcolas sustentĂĄveis, e em um condomĂnio tecnolĂłgico, cursos de programação e inovação. Isso permite que crianças e jovens cresçam em ambientes que reforçam as competĂȘncias valorizadas pela comunidade.
AlĂ©m das escolas internas, o conceito de homeschooling pode ser incentivado, permitindo que os pais eduquem seus filhos conforme seus prĂłprios valores e necessidades, com o apoio da comunidade. Esse modelo oferece uma educação mais flexĂvel e personalizada, ao contrĂĄrio do currĂculo tradicional oferecido pelo sistema pĂșblico atual.
Os condomĂnios universitĂĄrios tambĂ©m podem surgir, criando ambientes dedicados ao desenvolvimento acadĂȘmico, cientĂfico e profissional, onde estudantes vivem e aprendem. AlĂ©m disso, programas de capacitação contĂnua sĂŁo essenciais, com oficinas e cursos oferecidos dentro do condomĂnio para garantir que os moradores se atualizem com novas tecnologias e prĂĄticas.
Para ampliar os horizontes educacionais, os intercĂąmbios estudantis entre diferentes condomĂnios podem ser incentivados. Esses intercĂąmbios nĂŁo se limitam apenas ao ambiente educacional, mas tambĂ©m se estendem ao aprendizado de prĂĄticas de vida e habilidades tĂ©cnicas. Os jovens de diferentes condomĂnios podem viajar para outras comunidades para estudar, trabalhar ou simplesmente trocar ideias. Isso pode ocorrer de diversas formas, como programas de curto e longo prazo, atravĂ©s de acordos entre os prĂłprios condomĂnios, permitindo que os estudantes se conectem com outras comunidades, aprendam sobre diferentes especializaçÔes e desenvolvam uma compreensĂŁo mais ampla.
Essa abordagem descentralizada permite que cada comunidade desenvolva as competĂȘncias essenciais sem depender de estruturas limitantes do estado ou sistemas educacionais centralizados. Ao proporcionar liberdade de escolha e personalização, os condomĂnios criam ambientes propĂcios ao crescimento humano, alinhados Ă s necessidades e interesses de seus moradores.
---
A sociedade dos condomĂnios privados propĂ”e uma estrutura alternativa de convivĂȘncia onde as pessoas podem viver de acordo com seus prĂłprios valores e necessidades. Esses condomĂnios oferecem um modelo de organização que desafia a centralização estatal, buscando criar comunidades adaptĂĄveis e inovadoras. A liberdade garante que as habilidades necessĂĄrias para o sustento e crescimento das comunidades sejam mantidas ao longo do tempo.
A troca de bens, serviços e conhecimentos entre os condomĂnios, sem a imposição de forças externas, cria uma rede de boas relaçÔes, onde o comĂ©rcio e a colaboração substituem a intervenção estatal. Em vez de depender de sistemas coercitivos, cada condomĂnio funciona como um microcosmo autĂŽnomo que, juntos, formam um ecossistema dinĂąmico e prĂłspero. Este modelo propĂ”e que, por meio de trocas voluntĂĄrias, possamos construir uma sociedade mais saudĂĄvel. Lembre-se: Ideias e somente ideias podem iluminar a escuridĂŁo.
-

@ db11b320:05c5f7af
2025-03-29 19:04:19
magnet:?xt=urn:btih:9BAC9A3F98803AEA1EB28A0B60A562D7E3779710
-

@ 592295cf:413a0db9
2025-03-29 10:59:52
The journey starts from the links in this article
[nostr-quick-start-guide](https://spatianostra.com/nostr-quick-start-guide/)
Starting from these links building a simple path should not cover everything, because impossible.
Today I saw that Verbiricha in his workshop on his channel used nstart, but then I distracted
And I didn't see how he did it.
-----
Go to [nstart.me](https://nstart.me/) and read:
Each user is identified by a cryptographic keypair
Public key, Private key (is a lot of stuff)
You can insert a nickname and go, the nickname is not unique
there is a email backup things interesting, but a little boring, i try to generate an email
doesn't even require a strong password ok.
I received the email, great, it shows me the nsec encrypted in clear,
Send a copy of the file with a password, which contains the password encrypted key
I know and I know it's a tongue dump.
## Multi signer bunker
That's stuff, let's see what he says.
They live the private key and send it to servers and you can recompose it to login at a site
of the protocol nostr. If one of these servers goes offline you have the private key
that you downloaded first and then reactivate a bunker.
All very complicated.
But if one of the servers goes offline, how can I remake the split? Maybe he's still testing.
Nobody tells you where these bunkers are.
Okay I have a string that is my bunker (buker://), I downloaded it, easy no, now will tell me which client accepts the bunker.. .
## Follow someone before you start?
Is a cluster of 5 people Snowden, Micheal Dilger, jb55, Fiatjaf, Dianele.
I choice Snowden profile, or you can select multiple profiles, extra wild.
## Now select 5 clients
### *Coracle, Chachi, Olas, Nostur, Jumble*
### The first is *Coracle*
Login, ok I try to post a note and signing your note the spin does not end.
Maybe the bunker is diffective.
### Let's try *Chachi*
Simpler than Coracle, it has a type login that says bunker.
see if I can post
It worked, cool, I managed to post in a group.
## Olas is an app but also a website, but on the website requires an extension, which I do not have with this account.
> If I download an app how do I pass the bunker on the phone, is it still a password, a qrcode, a qrcode + password, something
> like that, but many start from the phone so maybe it's easy for them.
> I try to download it and see if it allows me to connect with a bunker.
> Okay I used private-qrcode and it worked, I couldn't do it directly from Olas because it didn't have permissions and the qrcode was < encrypted, so I went to the same site and had the bunker copied and glued on Olas
**Ok then I saw that there was the qrcode image of the bunker for apps** lol moment
Ok, I liked it, I can say it's a victory.
Looks like none of Snowden's followers are *Olas*'s lover, maybe the smart pack has to predict a photographer or something like that.
Okay I managed to post on *Olas*, so it works, Expiration time is broken.
### As for *Nostur*, I don't have an ios device so I'm going to another one.
### Login with *Jumble*, it works is a web app
I took almost an hour to do the whole route.
But this was just one link there are two more
# Extensions nostr NIP-07
### The true path is [nip-07-browser-extensions | nostr.net](https://nostr.net/#nip-07-browser-extensions)
There are 19 links, maybe there are too many?
I mention the most famous, or active at the moment
1. **Aka-profiles**: [Aka-profiles](https://github.com/neilck/aka-extension)
Alby I don't know if it's a route to recommend
2. **Blockcore** [Blockcore wallet](https://chromewebstore.google.com/detail/blockcore-wallet/peigonhbenoefaeplkpalmafieegnapj)
3. **Nos2x** [Nos2x](https://github.com/fiatjaf/nos2x?tab=readme-ov-file)
4. **Nos2xfox** (fork for firefox) [Nos2xfox](https://diegogurpegui.com/nos2x-fox/)
Nostore is (archived, read-only)
5. **Nostrame** [Nostrame](https://github.com/Anderson-Juhasc/nostrame)
6. **Nowser** per IOS [Nowser](https://github.com/haorendashu/nowser)
7. **One key** (was tricky) [One key](https://chromewebstore.google.com/detail/onekey/jnmbobjmhlngoefaiojfljckilhhlhcj)
Another half hour to search all sites
# Nostrapps
Here you can make paths
### Then nstart selects Coracle, Chachi, Olas,Nostur and Jumble
Good apps might be Amethyst, 0xchat, Yakihonne, Primal, Damus
for IOS maybe: Primal, Olas, Damus, Nostur, Nos-Social, Nostrmo
On the site there are some categories, I select some with the respective apps
Let's see the categories
Go to [Nostrapps](https://nostrapps.com/) and read:
## Microbbloging: Primal
## Streaming: **Zap stream**
## Blogging: **Yakihonne**
## Group chat: **Chachi**
## Community: **Flotilla**
## Tools: **Form** *
## Discovery: **Zapstore** (even if it is not in this catrgory)
## Direct Message: **0xchat**
-

@ df06d21e:2b23058f
2025-03-29 02:08:31
Imagine a Living Civilizationâa new way to see our world. It starts with the Universeâs pillars: Matter, the stuff weâre made of; Energy, the flow that drives us; Physics, the rules we play by; and Chemistry, the complexity that builds us. We know these well. But civilization? Thatâs our creationâand although it has been described in so many different ways over the years I thought it was time for something new. Civilization has its own pillars, systems that I call the pillars of the Metaverse: Capital, Information, Innovation, and Trust.
Capital is how we measure value. Not just money, but everything that matters: skills, we call that Human Capital; ecosystems, thatâs Natural Capital; infrastructure, Public Capital; relationships, Social Capital. Picture a farmer swapping Bitcoin sats for seedsânot fiat debtâor tracking soil health alongside his wallet. Capital is a system, a system of measurement.
Information is how we verify truth. Think IPFS, a network holding real dataâclimate stats, farming fixesâopen to all, not locked up by some corporate gatekeeper. Information is a system of verification.
Innovation is about generating solutions. On GitHub, coders worldwide crank out toolsâNostr clients, solar appsâshared freely, not patented for profit. Innovation is our system of generation.
And Trustâitâs coordination. Nostrâs decentralized threads let communities set trade rules, split resourcesâgovernance from the ground up, no overlords required. Trust is our system of coordination.
Right now weâre stuck in debt-based systemsâand theyâre failing us. Take fiat currencyâcentral banks print it, slashing your purchasing power. Our dollar buys less every year; savings erode while the elite stack their gains. Itâs a scam, Bitcoiners know itâfiatâs the real Ponzi bleeding us dry. Capital gets twistedâfirms hoard Bitcoin for fiat pumps, not real wealth; governments chase GDP while forests die and skills sit idle. Information is buriedâour media spits out spin, our corporations lock truth in silos. Innovation is stalledâdebt props up corporate patents, not open wins. Trust is goneâour governance systems consist of top-down control that splits us apart, left to right, top to bottom. Debt just measures scarcityâmoney borrowed, nature trashed, bonds frayedâand itâs crushing the pillars.
Wealth-based systems promise to turn that around. Bitcoinâs sound money is just the startâsats hold value, not inflate it away. Real capital measures what sustains usâsats fund a cooperative's water pump, not a vault; they track skills taught, land healed, ties rebuilt. Real Information opens upâIPFS logs show âbiochar boosted yield 20%â, verified by us, not suits. Real Innovation flowsâGitHub devs build Lightning hubs, wealth spreads. Real Trust binds us togetherâNostr chats align us, no central puppeteer. Wealth based systems strengthen the pillars of the Metaverse, it doesnât erode them.
We needed a new framing. A new vision of what was, what is, and what could be. We have one. This is real. This is the world we are building. Bitcoin is live, Nostr is growing, IPFS and GitHub are humming. We can see Debt teetering; while real wealth is rising. So, hodlers, maxis, plebsâeveryoneâwhat does a true wealth-based system look like? How can we measure Capital beyond fiatâs con job? Bitcoinâs the rock, but itâs just the beginning. How do we build on this, expand it, and transform everything as we build something entirely new?
-

@ 57d1a264:69f1fee1
2025-03-29 09:31:13
> "THE NATURE OF BITCOIN IS SUCH THAT ONCE VERSION 0.1 WAS RELEASED, THE CORE DESIGN WAS SET IN STONE FOR THE REST OF ITS LIFETIME."
<sub>- SATOSHI NAKAMOTO</sub>



"Reborn" is inspired by my Bitcoin journey and the many other people whose lives have been changed by Bitcoin. Iâve carved the hand in the âGyan Mudraâ or the âMudra of Wisdom or Knowledge,â with an Opendime grasped between thumb and index finger alluding to the pursuit of Bitcoin knowledge. The hand emerges from rough, choppy water, and I've set the hand against an archway, through which, the copper leaf hints at the bright orange future made possible by Bitcoin.
Materials: Carrara Marble, Copper leaf, Opendime
Dimensions: 6" x 9" x 13"
Price: $30,000 or BTC equivalent
Enquire: https://www.vonbitcoin.com/available-works
X: https://x.com/BVBTC/status/1894463357316419960/photo/1
originally posted at https://stacker.news/items/928510
-

@ 0d788b5e:c99ddea5
2025-03-29 02:40:37
- [éŠéĄ”](/readme.md)
- [珏äžç« ă 珏äžç« æ éą](/chapter1.md)
- [珏äșç« ă 珏äșç« æ éą](/chapter2.md)
-

@ 21335073:a244b1ad
2025-03-18 14:43:08
**Warning: This piece contains a conversation about difficult topics. Please proceed with caution.**
TL;DR please educate your children about online safety.
Julian Assange wrote in his 2012 book *Cypherpunks*, âThis book is not a manifesto. There isnât time for that. This book is a warning.â I read it a few times over the past summer. Those opening lines definitely stood out to me. I wish we had listened back then. He saw something about the internet that few had the ability to see. There are some individuals who are so close to a topic that when they speak, itâs difficult for others who arenât steeped in it to visualize what theyâre talking about. I didnât read the book until more recently. If I had read it when it came out, it probably would have sounded like an unknown foreign language to me. Today it makes more sense.
This isnât a manifesto. This isnât a book. There is no time for that. Itâs a warning and a possible solution from a desperate and determined survivor advocate who has been pulling and unraveling a thread for a few years. At times, I feel too close to this topic to make any sense trying to convey my pathway to my conclusions or thoughts to the general public. My hope is that if nothing else, I can convey my sense of urgency while writing this. This piece is a watchmanâs warning.
When a child steps online, they are walking into a new world. A new reality. When you hand a child the internet, you are handing them possibilitiesâgood, bad, and ugly. This is a conversation about lowering the potential of negative outcomes of stepping into that new world and how I came to these conclusions. I constantly compare the internet to the road. You wouldnât let a young child run out into the road with no guidance or safety precautions. When you hand a child the internet without any type of guidance or safety measures, you are allowing them to play in rush hour, oncoming traffic. âLook left, look right for cars before crossing.â We almost all have been taught that as children. What are we taught as humans about safety before stepping into a completely different reality like the internet? Very little.
I could never really figure out why many folks in tech, privacy rights activists, and hackers seemed so cold to me while talking about online child sexual exploitation. I always figured that as a survivor advocate for those affected by these crimes, that specific, skilled group of individuals would be very welcoming and easy to talk to about such serious topics. I actually had one hacker laugh in my face when I brought it up while I was looking for answers. I thought maybe this individual thought I was accusing them of something I wasnât, so I felt bad for asking. I was constantly extremely disappointed and would ask myself, âWhy donât they care? What could I say to make them care more? What could I say to make them understand the crisis and the level of suffering that happens as a result of the problem?â
I have been serving minor survivors of online child sexual exploitation for years. My first case serving a survivor of this specific crime was in 2018âa 13-year-old girl sexually exploited by a serial predator on Snapchat. That was my first glimpse into this side of the internet. I won a national award for serving the minor survivors of Twitter in 2023, but I had been working on that specific project for a few years. I was nominated by a lawyer representing two survivors in a legal battle against the platform. Iâve never really spoken about this before, but at the time it was a choice for me between fighting Snapchat or Twitter. I chose Twitterâor rather, Twitter chose me. I heard about the story of John Doe #1 and John Doe #2, and I was so unbelievably broken over it that I went to war for multiple years. I was and still am royally pissed about that case. As far as I was concerned, the John Doe #1 case proved that whatever was going on with corporate tech social media was so out of control that I didnât have time to wait, so I got to work. It was reading the messages that John Doe #1 sent to Twitter begging them to remove his sexual exploitation that broke me. He was a child begging adults to do something. A passion for justice and protecting kids makes you do wild things. I was desperate to find answers about what happened and searched for solutions. In the end, the platform Twitter was purchased. During the acquisition, I just asked Mr. Musk nicely to prioritize the issue of detection and removal of child sexual exploitation without violating digital privacy rights or eroding end-to-end encryption. Elon thanked me multiple times during the acquisition, made some changes, and I was thanked by others on the survivorsâ side as well.
I still feel that even with the progress made, I really just scratched the surface with Twitter, now X. I left that passion project when I did for a few reasons. I wanted to give new leadership time to tackle the issue. Elon Musk made big promises that I knew would take a while to fulfill, but mostly I had been watching global legislation transpire around the issue, and frankly, the governments are willing to go much further with X and the rest of corporate tech than I ever would. My work begging Twitter to make changes with easier reporting of content, detection, and removal of child sexual exploitation materialâwithout violating privacy rights or eroding end-to-end encryptionâand advocating for the minor survivors of the platform went as far as my principles would have allowed. Iâm grateful for that experience. I was still left with a nagging question: âHow did things get so bad with Twitter where the John Doe #1 and John Doe #2 case was able to happen in the first place?â I decided to keep looking for answers. I decided to keep pulling the thread.
I never worked for Twitter. This is often confusing for folks. I will say that despite being disappointed in the platformâs leadership at times, I loved Twitter. I saw and still see its value. I definitely love the survivors of the platform, but I also loved the platform. I was a champion of the platformâs ability to give folks from virtually around the globe an opportunity to speak and be heard.
I want to be clear that John Doe #1 really is my why. He is the inspiration. I am writing this because of him. He represents so many globally, and Iâm still inspired by his bravery. One childâs voice begging adults to do somethingâIâm an adult, I heard him. Iâd go to war a thousand more lifetimes for that young man, and I donât even know his name. Fighting has been personally dark at times; Iâm not even going to try to sugarcoat it, but it has been worth it.
The data surrounding the very real crime of online child sexual exploitation is available to the public online at any time for anyone to see. Iâd encourage you to go look at the data for yourself. I believe in encouraging folks to check multiple sources so that you understand the full picture. If you are uncomfortable just searching around the internet for information about this topic, use the terms âCSAM,â âCSEM,â âSG-CSEM,â or âAI Generated CSAM.â The numbers donât lieâitâs a nightmare thatâs out of control. Itâs a big business. The demand is high, and unfortunately, business is booming. Organizations collect the data, tech companies often post their data, governments report frequently, and the corporate press has covered a decent portion of the conversation, so Iâm sure you can find a source that you trust.
Technology is changing rapidly, which is great for innovation as a whole but horrible for the crime of online child sexual exploitation. Those wishing to exploit the vulnerable seem to be adapting to each technological change with ease. The governments are so far behind with tackling these issues that as Iâm typing this, itâs borderline irrelevant to even include them while speaking about the crime or potential solutions. Technology is changing too rapidly, and their old, broken systems canât even dare to keep up. Think of it like the governmentsâ âWar on Drugs.â Drugs won. In this case as well, the governments are not winning. The governments are talking about maybe having a meeting on potentially maybe having legislation around the crimes. The time to have that meeting would have been many years ago. Iâm not advocating for governments to legislate our way out of this. Iâm on the side of educating and innovating our way out of this.
I have been clear while advocating for the minor survivors of corporate tech platforms that I would not advocate for any solution to the crime that would violate digital privacy rights or erode end-to-end encryption. That has been a personal moral position that I was unwilling to budge on. This is an extremely unpopular and borderline nonexistent position in the anti-human trafficking movement and online child protection space. Iâm often fearful that Iâm wrong about this. I have always thought that a better pathway forward would have been to incentivize innovation for detection and removal of content. I had no previous exposure to privacy rights activists or Cypherpunksâactually, I came to that conclusion by listening to the voices of MENA region political dissidents and human rights activists. After developing relationships with human rights activists from around the globe, I realized how important privacy rights and encryption are for those who need it most globally. I was simply unwilling to give more power, control, and opportunities for mass surveillance to big abusers like governments wishing to enslave entire nations and untrustworthy corporate tech companies to potentially end some portion of abuses online. On top of all of it, it has been clear to me for years that all potential solutions outside of violating digital privacy rights to detect and remove child sexual exploitation online have not yet been explored aggressively. Iâve been disappointed that there hasnât been more of a conversation around preventing the crime from happening in the first place.
What has been tried is mass surveillance. In China, they are currently under mass surveillance both online and offline, and their behaviors are attached to a social credit score. Unfortunately, even on state-run and controlled social media platforms, they still have child sexual exploitation and abuse imagery pop up along with other crimes and human rights violations. They also have a thriving black market online due to the oppression from the state. In other words, even an entire loss of freedom and privacy cannot end the sexual exploitation of children online. Itâs been tried. There is no reason to repeat this method.
It took me an embarrassingly long time to figure out why I always felt a slight coldness from those in tech and privacy-minded individuals about the topic of child sexual exploitation online. I didnât have any clue about the âFour Horsemen of the Infocalypse.â This is a term coined by Timothy C. May in 1988. I would have been a child myself when he first said it. I actually laughed at myself when I heard the phrase for the first time. I finally got it. The Cypherpunks werenât wrong about that topic. They were so spot on that it is borderline uncomfortable. I was mad at first that they knew that early during the birth of the internet that this issue would arise and didnât address it. Then I got over it because I realized that it wasnât their job. Their job wasâisâto write code. Their job wasnât to be involved and loving parents or survivor advocates. Their job wasnât to educate children on internet safety or raise awareness; their job was to write code.
They knew that child sexual abuse material would be shared on the internet. They said what would happenânot in a gleeful way, but a prediction. Then it happened.
I equate it now to a concrete company laying down a road. As youâre pouring the concrete, you can say to yourself, âA terrorist might travel down this road to go kill many, and on the flip side, a beautiful child can be born in an ambulance on this road.â Who or what travels down the road is not their responsibilityâthey are just supposed to lay the concrete. Iâd never go to a concrete pourer and ask them to solve terrorism that travels down roads. Under the current system, law enforcement should stop terrorists before they even make it to the road. The solution to this specific problem is not to treat everyone on the road like a terrorist or to not build the road.
So I understand the perceived coldness from those in tech. Not only was it not their job, but bringing up the topic was seen as the equivalent of asking a free person if they wanted to discuss one of the four topicsâchild abusers, terrorists, drug dealers, intellectual property pirates, etc.âthat would usher in digital authoritarianism for all who are online globally.
Privacy rights advocates and groups have put up a good fight. They stood by their principles. Unfortunately, when it comes to corporate tech, I believe that the issue of privacy is almost a complete lost cause at this point. Itâs still worth pushing back, but ultimately, it is a losing battleâa ticking time bomb.
I do think that corporate tech providers could have slowed down the inevitable loss of privacy at the hands of the state by prioritizing the detection and removal of CSAM when they all started online. I believe it would have bought some time, fewer would have been traumatized by that specific crime, and I do believe that it could have slowed down the demand for content. If I think too much about that, Iâll go insane, so I try to push the âif maybesâ aside, but never knowing if it could have been handled differently will forever haunt me. At night when itâs quiet, I wonder what I would have done differently if given the opportunity. Iâll probably never know how much corporate tech knew and ignored in the hopes that it would go away while the problem continued to get worse. They had different priorities. The most voiceless and vulnerable exploited on corporate tech never had much of a voice, so corporate tech providers didnât receive very much pushback.
Now Iâm about to say something really wild, and you can call me whatever you want to call me, but Iâm going to say what I believe to be true. I believe that the governments are either so incompetent that they allowed the proliferation of CSAM online, or they knowingly allowed the problem to fester long enough to have an excuse to violate privacy rights and erode end-to-end encryption. The US government could have seized the corporate tech providers over CSAM, but I believe that they were so useful as a propaganda arm for the regimes that they allowed them to continue virtually unscathed.
That season is done now, and the governments are making the issue a priority. It will come at a high cost. Privacy on corporate tech providers is virtually done as Iâm typing this. It feels like a death rattle. Iâm not particularly sure that we had much digital privacy to begin with, but the illusion of a veil of privacy feels gone.
To make matters slightly more complex, it would be hard to convince me that once AI really gets going, digital privacy will exist at all.
I believe that there should be a conversation shift to preserving freedoms and human rights in a post-privacy society.
I donât want to get locked up because AI predicted a nasty post online from me about the government. Iâm not a doomer about AIâIâm just going to roll with it personally. Iâm looking forward to the positive changes that will be brought forth by AI. I see it as inevitable. A bit of privacy was helpful while it lasted. Please keep fighting to preserve what is left of privacy either way because I could be wrong about all of this.
On the topic of AI, the addition of AI to the horrific crime of child sexual abuse material and child sexual exploitation in multiple ways so far has been devastating. Itâs currently out of control. The genie is out of the bottle. I am hopeful that innovation will get us humans out of this, but Iâm not sure how or how long it will take. We must be extremely cautious around AI legislation. It should not be illegal to innovate even if some bad comes with the good. I donât trust that the governments are equipped to decide the best pathway forward for AI. Source: the entire history of the government.
I have been personally negatively impacted by AI-generated content. Every few days, I get another alert that Iâm featured again in whatâs called âdeep fake pornographyâ without my consent. Iâm not happy about it, but what pains me the most is the thought that for a period of time down the road, many globally will experience what myself and others are experiencing now by being digitally sexually abused in this way. If you have ever had your picture taken and posted online, you are also at risk of being exploited in this way. Your childâs image can be used as well, unfortunately, and this is just the beginning of this particular nightmare. It will move to more realistic interpretations of sexual behaviors as technology improves. I have no brave words of wisdom about how to deal with that emotionally. I do have hope that innovation will save the day around this specific issue. Iâm nervous that everyone online will have to ID verify due to this issue. I see that as one possible outcome that could help to prevent one problem but inadvertently cause more problems, especially for those living under authoritarian regimes or anyone who needs to remain anonymous online. A zero-knowledge proof (ZKP) would probably be the best solution to these issues. There are some survivors of violence and/or sexual trauma who need to remain anonymous online for various reasons. There are survivor stories available online of those who have been abused in this way. Iâd encourage you seek out and listen to their stories.
There have been periods of time recently where I hesitate to say anything at all because more than likely AI will cover most of my concerns about education, awareness, prevention, detection, and removal of child sexual exploitation online, etc.
Unfortunately, some of the most pressing issues weâve seen online over the last few years come in the form of âsextortion.â Self-generated child sexual exploitation (SG-CSEM) numbers are continuing to be terrifying. Iâd strongly encourage that you look into sextortion data. AI + sextortion is also a huge concern. The perpetrators are using the non-sexually explicit images of children and putting their likeness on AI-generated child sexual exploitation content and extorting money, more imagery, or both from minors online. Itâs like a million nightmares wrapped into one. The wild part is that these issues will only get more pervasive because technology is harnessed to perpetuate horror at a scale unimaginable to a human mind.
Even if you banned phones and the internet or tried to prevent children from accessing the internet, it wouldnât solve it. Child sexual exploitation will still be with us until as a society we start to prevent the crime before it happens. That is the only human way out right now.
There is no reset button on the internet, but if I could go back, Iâd tell survivor advocates to heed the warnings of the early internet builders and to start education and awareness campaigns designed to prevent as much online child sexual exploitation as possible. The internet and technology moved quickly, and I donât believe that society ever really caught up. We live in a world where a child can be groomed by a predator in their own home while sitting on a couch next to their parents watching TV. We werenât ready as a species to tackle the fast-paced algorithms and dangers online. It happened too quickly for parents to catch up. How can you parent for the ever-changing digital world unless you are constantly aware of the dangers?
I donât think that the internet is inherently bad. I believe that it can be a powerful tool for freedom and resistance. Iâve spoken a lot about the bad online, but there is beauty as well. We often discuss how victims and survivors are abused online; we rarely discuss the fact that countless survivors around the globe have been able to share their experiences, strength, hope, as well as provide resources to the vulnerable. I do question if giving any government or tech company access to censorship, surveillance, etc., online in the name of serving survivors might not actually impact a portion of survivors negatively. There are a fair amount of survivors with powerful abusers protected by governments and the corporate press. If a survivor cannot speak to the press about their abuse, the only place they can go is online, directly or indirectly through an independent journalist who also risks being censored. This scenario isnât hard to imagineâit already happened in China. During #MeToo, a survivor in China wanted to post their story. The government censored the post, so the survivor put their story on the blockchain. Iâm excited that the survivor was creative and brave, but itâs terrifying to think that we live in a world where that situation is a necessity.
I believe that the future for many survivors sharing their stories globally will be on completely censorship-resistant and decentralized protocols. This thought in particular gives me hope. When we listen to the experiences of a diverse group of survivors, we can start to understand potential solutions to preventing the crimes from happening in the first place.
My heart is broken over the gut-wrenching stories of survivors sexually exploited online. Every time I hear the story of a survivor, I do think to myself quietly, âWhat could have prevented this from happening in the first place?â My heart is with survivors.
My head, on the other hand, is full of the understanding that the internet should remain free. The free flow of information should not be stopped. My mind is with the innocent citizens around the globe that deserve freedom both online and offline.
The problem is that governments donât only want to censor illegal content that violates human rightsâthey create legislation that is so broad that it can impact speech and privacy of all. âDonât you care about the kids?â Yes, I do. I do so much that Iâm invested in finding solutions. I also care about all citizens around the globe that deserve an opportunity to live free from a mass surveillance society. If terrorism happens online, I should not be punished by losing my freedom. If drugs are sold online, I should not be punished. Iâm not an abuser, Iâm not a terrorist, and I donât engage in illegal behaviors. I refuse to lose freedom because of othersâ bad behaviors online.
I want to be clear that on a long enough timeline, the governments will decide that they can be better parents/caregivers than you can if something isnât done to stop minors from being sexually exploited online. The price will be a complete loss of anonymity, privacy, free speech, and freedom of religion online. I find it rather insulting that governments think theyâre better equipped to raise children than parents and caretakers.
So we canât go backwardsâall that we can do is go forward. Those who want to have freedom will find technology to facilitate their liberation. This will lead many over time to decentralized and open protocols. So as far as Iâm concerned, this does solve a few of my worriesâthose who need, want, and deserve to speak freely online will have the opportunity in most countriesâbut what about online child sexual exploitation?
When I popped up around the decentralized space, I was met with the fear of censorship. Iâm not here to censor you. I donât write code. I couldnât censor anyone or any piece of content even if I wanted to across the internet, no matter how depraved. I donât have the skills to do that.
Iâm here to start a conversation. Freedom comes at a cost. You must always fight for and protect your freedom. I canât speak about protecting yourself from all of the Four Horsemen because I simply donât know the topics well enough, but I can speak about this one topic.
If there was a shortcut to ending online child sexual exploitation, I would have found it by now. There isnât one right now. I believe that education is the only pathway forward to preventing the crime of online child sexual exploitation for future generations.
I propose a yearly education course for every child of all school ages, taught as a standard part of the curriculum. Ideally, parents/caregivers would be involved in the education/learning process.
**Course:**
- The creation of the internet and computers
- The fight for cryptography
- The tech supply chain from the ground up (example: human rights violations in the supply chain)
- Corporate tech
- Freedom tech
- Data privacy
- Digital privacy rights
- AI (history-current)
- Online safety (predators, scams, catfishing, extortion)
- Bitcoin
- Laws
- How to deal with online hate and harassment
- Information on who to contact if you are being abused online or offline
- Algorithms
- How to seek out the truth about news, etc., online
The parents/caregivers, homeschoolers, unschoolers, and those working to create decentralized parallel societies have been an inspiration while writing this, but my hope is that all children would learn this course, even in government ran schools. Ideally, parents would teach this to their own children.
The decentralized space doesnât want child sexual exploitation to thrive. Hereâs the deal: there has to be a strong prevention effort in order to protect the next generation. The internet isnât going anywhere, predators arenât going anywhere, and Iâm not down to let anyone have the opportunity to prove that there is a need for more government. I donât believe that the government should act as parents. The governments have had a chance to attempt to stop online child sexual exploitation, and they didnât do it. Can we try a different pathway forward?
Iâd like to put myself out of a job. I donât want to ever hear another story like John Doe #1 ever again. This will require work. Iâve often called online child sexual exploitation the lynchpin for the internet. Itâs time to arm generations of children with knowledge and tools. I canât do this alone.
Individuals have fought so that I could have freedom online. I want to fight to protect it. I donât want child predators to give the government any opportunity to take away freedom. Decentralized spaces are as close to a reset as weâll get with the opportunity to do it right from the start. Start the youth off correctly by preventing potential hazards to the best of your ability.
The good news is anyone can work on this! Iâd encourage you to take it and run with it. I added the additional education about the history of the internet to make the course more educational and fun. Instead of cleaning up generations of destroyed lives due to online sexual exploitation, perhaps this could inspire generations of those who will build our futures. Perhaps if the youth is armed with knowledge, they can create more tools to prevent the crime.
This one solution that Iâm suggesting can be done on an individual level or on a larger scale. It should be adjusted depending on age, learning style, etc. It should be fun and playful.
This solution does not address abuse in the home or some of the root causes of offline child sexual exploitation. My hope is that it could lead to some survivors experiencing abuse in the home an opportunity to disclose with a trusted adult. The purpose for this solution is to prevent the crime of online child sexual exploitation before it occurs and to arm the youth with the tools to contact safe adults if and when it happens.
In closing, I went to hell a few times so that you didnât have to. I spoke to the mothers of survivors of minors sexually exploited onlineâtheir tears could fill rivers. Iâve spoken with political dissidents who yearned to be free from authoritarian surveillance states. The only balance that Iâve found is freedom online for citizens around the globe and prevention from the dangers of that for the youth. Donât slow down innovation and freedom. Educate, prepare, adapt, and look for solutions.
Iâm not perfect and Iâm sure that there are errors in this piece. I hope that you find them and it starts a conversation.
-

@ fe9e99a0:5123e9a8
2025-03-28 21:25:43
Whatâs happening?
-

@ 0d788b5e:c99ddea5
2025-03-29 01:27:53
èżæŻéŠéĄ”ć
ćźč
-

@ a95c6243:d345522c
2025-03-15 10:56:08
*Was nĂŒtzt die schönste Schuldenbremse, wenn der Russe vor der TĂŒr steht?* *\
Wir können uns verteidigen lernen oder alle Russisch lernen.* *\
Jens Spahn*  
**In der Politik ist buchstĂ€blich keine Idee zu riskant, kein Mittel zu schĂ€big und keine LĂŒge zu dreist,** als dass sie nicht benutzt wĂŒrden. Aber der Clou ist, dass diese Masche immer noch funktioniert, wenn nicht sogar immer besser. Ist das alles wirklich so schwer zu durchschauen? Mir fehlen langsam die Worte.
**Aktuell werden sowohl in der EuropĂ€ischen Union als auch in Deutschland** riesige Milliardenpakete fĂŒr die [AufrĂŒstung](https://transition-news.org/eu-halt-weiter-kurs-auf-krieg-hunderte-milliarden-fur-aufrustung-beschlossen) â also fĂŒr die RĂŒstungsindustrie â geschnĂŒrt. Die EU will 800 Milliarden Euro locker machen, in Deutschland sollen es 500 Milliarden «Sondervermögen» sein. Verteidigung nennen das unsere «FĂŒhrer», innerhalb der Union und auch an «unserer Ostflanke», der Ukraine.
**Das nötige Feindbild konnte inzwischen signifikant erweitert werden.** Schuld an allem und zudem gefĂ€hrlich ist nicht mehr nur Putin, sondern jetzt auch Trump. Europa mĂŒsse sich sowohl gegen Russland als auch gegen die USA schĂŒtzen und rĂŒsten, wird uns eingetrichtert.
**Und wĂ€hrend durch Diplomatie genau dieser beiden Staaten** gerade endlich mal Bewegung in die BemĂŒhungen um einen Frieden oder wenigstens einen Waffenstillstand in der Ukraine kommt, rasselt man im moralisch ĂŒberlegenen Zeigefinger-Europa so richtig mit dem SĂ€bel.
**Begleitet und gestĂŒtzt wird der ganze Prozess** â wie sollte es anders sein â von den «QualitĂ€tsmedien». Dass Russland einen Angriff auf «Europa» plant, weiĂ nicht nur der deutsche Verteidigungsminister (und mit Abstand beliebteste Politiker) Pistorius, sondern dank ihnen auch jedes Kind. Uns bleiben nur noch wenige Jahre. Zum GlĂŒck bereitet sich die Bundeswehr schon sehr konkret [auf einen Krieg](https://archive.is/VE8ZM) vor.
**Die** ***FAZ*** **und Corona-Gesundheitsminister Spahn markieren einen traurigen Höhepunkt.** Hier haben sich «politische und publizistische Verantwortungslosigkeit propagandistisch gegenseitig befruchtet», wie es bei den *NachDenkSeiten* [heiĂt](https://www.nachdenkseiten.de/?p=130064). Die Aussage Spahns in dem Interview, «der Russe steht vor der TĂŒr», ist das eine. Die Zeitung verschĂ€rfte die Sache jedoch, indem sie das Zitat explizit in den [Titel](https://archive.is/QJdID) ĂŒbernahm, der in einer [ersten Version](https://archive.is/fNuGA) scheinbar zu harmlos war.
**Eine groĂe Mehrheit der deutschen Bevölkerung findet AufrĂŒstung und mehr Schulden toll,** wie *[ARD](https://archive.is/M3DSk)* und *[ZDF](https://archive.is/ggvJB)* sehr passend ermittelt haben wollen. Ăhnliches gelte fĂŒr eine noch stĂ€rkere militĂ€rische UnterstĂŒtzung der Ukraine. Etwas skeptischer seien die Befragten bezĂŒglich der Entsendung von Bundeswehrsoldaten dorthin, aber immerhin etwa fifty-fifty.
**Eigentlich ist jedoch die Meinung der Menschen in «unseren Demokratien» irrelevant.** Sowohl in der EuropĂ€ischen Union als auch in Deutschland sind die «Eliten» offenbar der Ansicht, der SouverĂ€n habe in Fragen von Krieg und Frieden sowie von aberwitzigen astronomischen Schulden kein Wörtchen mitzureden. Frau von der Leyen möchte ĂŒber 150 Milliarden aus dem Gesamtpaket unter Verwendung von Artikel 122 des EU-Vertrags ohne das EuropĂ€ische Parlament entscheiden â wenn auch nicht völlig [kritiklos](https://www.berliner-zeitung.de/politik-gesellschaft/geopolitik/aufruestung-widerstand-gegen-eu-plaene-waechst-kommission-uebertreibt-russische-gefahr-li.2306863).
**In Deutschland wollen CDU/CSU und SPD zur Aufweichung der «Schuldenbremse»** mehrere Ănderungen des Grundgesetzes durch das abgewĂ€hlte Parlament peitschen. Dieser Versuch, mit dem alten [Bundestag](https://www.bundestag.de/dokumente/textarchiv/2025/kw11-de-sondersitzung-1056228) eine Zweidrittelmehrheit zu erzielen, die im neuen nicht mehr gegeben wĂ€re, ist mindestens verfassungsrechtlich umstritten.
**Das Manöver scheint aber zu funktionieren.** Heute haben die GrĂŒnen [zugestimmt](https://www.reuters.com/world/europe/germany-faces-debt-deal-cliffhanger-merz-strives-greens-backing-2025-03-14/), nachdem Kanzlerkandidat Merz lĂ€ppische 100 Milliarden fĂŒr «irgendwas mit Klima» zugesichert hatte. Die Abstimmung im Plenum soll am kommenden Dienstag erfolgen â nur eine Woche, bevor sich der neu gewĂ€hlte Bundestag konstituieren wird.
**Interessant sind die Argumente, die BlackRocker Merz fĂŒr seine Attacke** auf Grundgesetz und Demokratie ins Feld fĂŒhrt. Abgesehen von der angeblichen Eile, «unsere VerteidigungsfĂ€higkeit deutlich zu erhöhen» (ausgelöst unter anderem durch «die MĂŒnchner Sicherheitskonferenz und die Ereignisse im WeiĂen Haus»), lieĂ uns der CDU-Chef wissen, dass Deutschland einfach auf die internationale BĂŒhne zurĂŒck mĂŒsse. Merz [schwadronierte](https://x.com/CDU/status/1900168761686044894) gefĂ€hrlich mehrdeutig:
> «Die ganze Welt schaut in diesen Tagen und Wochen auf Deutschland. Wir haben in der EuropĂ€ischen Union und auf der Welt eine Aufgabe, die weit ĂŒber die Grenzen unseres eigenen Landes hinausgeht.»
 
  
*\[Titelbild:* *[Tag des Sieges](https://pixabay.com/de/photos/parade-tag-des-sieges-samara-182508/)]*
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/propaganda-wahnsinn-und-demokratur)*** erschienen.
-

@ fe9e99a0:5123e9a8
2025-03-27 18:37:28
Canât seem to update anything
-

@ 5d4b6c8d:8a1c1ee3
2025-03-29 15:31:31
This is a big one for many of us. Probably the most beneficial perception shift you can have is to stop perceiving junk food as food at all.
There are two big components to this:
1. "Cheap"/"affordable" foods are neither cheap nor affordable if they are bad for your health. They are pure waste. Whatever you're currently spending on foods you don't think you should be eating can be reallocated to foods you do think you should be eating and it's wiser expenditure regardless of how expensive the new foods are.
2. When you're looking for something convenient, it's better to eat nothing than to eat something bad. Again, junk food isn't food. Eating it because you're hungry isn't helping anything. You didn't satisfy any nutritional requirements, so you still need to eat the same amount later. On the other hand, fasting is good for you, so just do that until you find something that is food. Also, the first point applies here: instead of eating a lot of garbage, it would be better to spend the same amount on a small portion of food.
I was inspired to write this because I was proud of myself for putting back a package of discounted double chocolate chip muffins this morning and just getting a dark chocolate bar instead.
originally posted at https://stacker.news/items/928684
-

@ a07fae46:7d83df92
2025-03-18 12:31:40
if the JFK documents come out and are nothing but old hat, it will be disappointing. but if they contain revelations, then they are an unalloyed good. unprecedented and extraordinary; worthy of praise and admiration. they murdered the president in broad daylight and kept 80,000 related documents secret for 60 years. the apparatus that did that and got away with it, is 100+ years in the making. the magic bullet was just the starting pistol of a new *era*; a *level up* in an [old game](https://archive.org/details/TragedyAndHope_501/page/n5/mode/2up?q=feudalist+fashion). it won't be dismantled and your republic delivered back with a bow in *2 months*. have a little humility and a little gratitude. cynicism is easy. it's peak mid-wittery. yeah no shit everything is corrupt and everyone's likely captured by [AIPAC](https://books.google.com/books/publisher/content?id=gKVKDwAAQBAJ&pg=PT68&img=1&zoom=3&hl=en&bul=1&sig=ACfU3U2pagVXTYdJOKxkAwmmFQpuSnoS5g&w=1280) or something beyond. YOU THINK AIPAC is the [ALL SEEING EYE](https://archive.org/details/the-all-seeing-eye-vol-1-5-manly-p.-hall-may-1923-sept-1931)?
you can keep going, if you want to, but have some awareness and appreciation for where we are and what it took to get here. the first 'you are fake news' was also a shot heard 'round the world and you are riding high on it's [Infrasound](https://en.wikipedia.org/wiki/Infrasound) wave, still reverberating; unappreciative of the profound delta in public awareness and understanding, and rate of change, that has occurred since that moment, in [2017](https://www.youtube.com/watch?v=Vqpzk-qGxMU). think about where we were back then, especially with corporate capture of the narrative. trump's bullheaded behavior, if only ego-driven, *is* what broke the spell. an *actual* moment of savage bravery is what allows for your current jaded affectation. black pilled is boring. it's intellectually lazy. it is low-resolution-thinking, no better than progressives who explain the myriad ills of the world through 'racism'. normalcy bias works both ways. i'm not grading you on a curve that includes NPCs. i'm grading you against those of us with a mind, on up. do better.
the best Webb-style doomer argument is essentially 'the mouse trap needs a piece of cheese in order to work'. ok, but it doesn't need 3 pieces of cheese, or 5. was FreeRoss the piece of cheese? was the SBR the cheese? real bitcoiners know how dumb the 'sbr is an attempt to takeover btc' narrative is, so extrapolate from that. what about withdrawal from the WHO? freeze and review of USAID et al? how many pieces of cheese before we realize it's not a trap? it's just a messy endeavor.
Good morning.
#jfkFiles #nostrOnly
-

@ fd06f542:8d6d54cd
2025-03-28 02:27:52
NIP-02
======
Follow List
-----------
`final` `optional`
A special event with kind `3`, meaning "follow list" is defined as having a list of `p` tags, one for each of the followed/known profiles one is following.
Each tag entry should contain the key for the profile, a relay URL where events from that key can be found (can be set to an empty string if not needed), and a local name (or "petname") for that profile (can also be set to an empty string or not provided), i.e., `["p", <32-bytes hex key>, <main relay URL>, <petname>]`.
The `.content` is not used.
For example:
```jsonc
{
"kind": 3,
"tags": [
["p", "91cf9..4e5ca", "wss://alicerelay.com/", "alice"],
["p", "14aeb..8dad4", "wss://bobrelay.com/nostr", "bob"],
["p", "612ae..e610f", "ws://carolrelay.com/ws", "carol"]
],
"content": "",
// other fields...
}
```
Every new following list that gets published overwrites the past ones, so it should contain all entries. Relays and clients SHOULD delete past following lists as soon as they receive a new one.
Whenever new follows are added to an existing list, clients SHOULD append them to the end of the list, so they are stored in chronological order.
## Uses
### Follow list backup
If one believes a relay will store their events for sufficient time, they can use this kind-3 event to backup their following list and recover on a different device.
### Profile discovery and context augmentation
A client may rely on the kind-3 event to display a list of followed people by profiles one is browsing; make lists of suggestions on who to follow based on the follow lists of other people one might be following or browsing; or show the data in other contexts.
### Relay sharing
A client may publish a follow list with good relays for each of their follows so other clients may use these to update their internal relay lists if needed, increasing censorship-resistance.
### Petname scheme
The data from these follow lists can be used by clients to construct local ["petname"](http://www.skyhunter.com/marcs/petnames/IntroPetNames.html) tables derived from other people's follow lists. This alleviates the need for global human-readable names. For example:
A user has an internal follow list that says
```json
[
["p", "21df6d143fb96c2ec9d63726bf9edc71", "", "erin"]
]
```
And receives two follow lists, one from `21df6d143fb96c2ec9d63726bf9edc71` that says
```json
[
["p", "a8bb3d884d5d90b413d9891fe4c4e46d", "", "david"]
]
```
and another from `a8bb3d884d5d90b413d9891fe4c4e46d` that says
```json
[
["p", "f57f54057d2a7af0efecc8b0b66f5708", "", "frank"]
]
```
When the user sees `21df6d143fb96c2ec9d63726bf9edc71` the client can show _erin_ instead;
When the user sees `a8bb3d884d5d90b413d9891fe4c4e46d` the client can show _david.erin_ instead;
When the user sees `f57f54057d2a7af0efecc8b0b66f5708` the client can show _frank.david.erin_ instead.
-

@ 5d4b6c8d:8a1c1ee3
2025-03-29 02:18:49
Only one more month to make adjustments and a couple of my guys haven't played enough games to be eligible for the awards.
- Jokic needs to play two more
- Giannis needs to play five more
Other notable players who haven't yet played 65 games:
- Luka is not even close
- Brunson needs to play four more (and probably needs to be replaced regardless)
- Wemby is not even close
Here's the current state of the competition with your max possible score next to your nym:
| Contestant | MVP | Champ | All NBA | | | | |
|--------------|------|---------|----------|-|-|-|-|
| @Undisciplined 47| SGA| OKC | Jokic | KAT |Giannis |Tatum | SGA |
| @grayruby 46| SGA| Cavs| Jokic | Giannis | SGA| Mitchell| Brunson|
| @gnilma 55| SGA| OKC| Jokic | KAT | Giannis | Tatum| SGA |
| @BitcoinAbhi 70 | Luka| Denver| Jokic | Giannis | Luka | Ant| SGA|
| @Bell_curve 63| SGA| Celtics| Jokic | Giannis | Luka | Ant| SGA|
| @0xbitcoiner 70 | Jokic| Pacers| Jokic | Giannis | Luka | Ant| Brunson|
| @Coinsreporter 49| Giannis| Pacers| Jokic | Giannis | Luka | Ant| Brunson|
| @TheMorningStar 49| Luka| Celtics| Jokic | Giannis | Luka | Ant| SGA|
| @onthedeklein 49| Luka| T-Wolves| Jokic | Giannis | Luka | Wemby| SGA|
| @Carresan 34| SGA| Memphis| Jokic | KAT | Giannis | Ant| SGA|
| @BTC_Bellzer 34| SGA| Celtics| Jokic| Giannis | Tatum| SGA| Brunson |
| @realBitcoinDog 39| Lebron| Lakers| Jokic | Giannis | Ant | Brunson | SGA|
| @SimpleStacker 42| SGA| Celtics| Jokic| Tatum| Luka | Brunson| SGA|
| @BlokchainB 38| SGA| Knicks| KAT| Giannis | Ant| Brunson| SGA|
| @LibertasBR 14| SGA| Celtics| Jokic| Giannis | Tatum | Curry| SGA|
| @Meani123 7| SGA| OKC| Jokic | KAT | Tatum | Mitchell | SGA|
**Prize**
At least 6k (I'll keep adding zaps to the pot).
If you want to join this contest, just leave your predictions for MVP, Champion, and All-NBA 1st team in the comments. See the [June post](https://stacker.news/items/585231/r/Undisciplined) for more details.
originally posted at https://stacker.news/items/928370
-

@ bc52210b:20bfc6de
2025-03-14 20:39:20
When writing safety critical code, every arithmetic operation carries the potential for catastrophic failureâwhether thatâs a plane crash in aerospace engineering or a massive financial loss in a smart contract.
The stakes are incredibly high, and errors are not just bugs; theyâre disasters waiting to happen. Smart contract developers need to shift their mindset: less like web developers, who might prioritize speed and iteration, and more like aerospace engineers, where precision, caution, and meticulous attention to detail are non-negotiable.
In practice, this means treating every line of code as a critical component, adopting rigorous testing, and anticipating worst-case scenariosâjust as an aerospace engineer would ensure a system can withstand extreme conditions.
Safety critical code demands aerospace-level precision, and smart contract developers must rise to that standard to protect against the severe consequences of failure.
-

@ 5d4b6c8d:8a1c1ee3
2025-03-28 12:30:11
I'm short on time this morning, so I'm just plagiarizing @grayruby's notes, with minor revisions.
# Territory Things:
- March Madness Points Challenge https://stacker.news/items/924541/r/Undisciplined
- IPL T20k Mania https://stacker.news/items/920125/r/Undisciplined
- CricZap https://stacker.news/items/919957/r/Undisciplined
- USA vs World https://stacker.news/items/923533/r/Undisciplined
- Any changes to NBA Prediction contest for March? (post coming today)
- Stackers voted to delay MLB Survivor
# NCAA:
- How many 1 seeds will make final four?
- Cooper Flagg is the consensus number 1 but will he be a great NBA player?
# NFL:
- Rule change proposals: Ban the tush push and make dynamic kickoff permanent
# NBA;
- Pre playoffs Power Rankings
# Blok'd Shots:
- Ovi with 6 to go
# MLB:
- opening day finally arrived
- American League is a crap shoot
- Fantasy MLB
# Betting:
- predyx markets
- Betplay- didn't work for me but how are you liking it?
And, as we do every week, we'll share an awesome @Aardvark sports fact.
What are we missing?
originally posted at https://stacker.news/items/927714
-

@ 2183e947:f497b975
2025-03-29 02:41:34
Today I was invited to participate in the private beta of a new social media protocol called Pubky, designed by a bitcoin company called Synonym with the goal of being better than existing social media platforms. As a heavy nostr user, I thought I'd write up a comparison.
I can't tell you how to create your own accounts because it was made very clear that only *some* of the software is currently open source, and how this will all work is still a bit up in the air. The code that *is* open source can be found here: https://github.com/pubky -- and the most important repo there seems to be this one: https://github.com/pubky/pubky-core
You can also learn more about Pubky here: https://pubky.org/
That said, I used my invite code to create a pubky account and it seemed very similar to onboarding to nostr. I generated a private key, backed up 12 words, and the onboarding website gave me a public key.
Then I logged into a web-based client and it looked a lot like twitter. I saw a feed for posts by other users and saw options to reply to posts and give reactions, which, I saw, included hearts, thumbs up, and other emojis.
Then I investigated a bit deeper to see how much it was like nostr. I opened up my developer console and navigated to my networking tab, where, if this was nostr, I would expect to see queries to relays for posts. Here, though, I saw one query that seemed to be repeated on a loop, which went to a single server and provided it with my pubkey. That single query (well, a series of identical queries to the same server) seemed to return all posts that showed up on my feed. So I infer that the server "knows" what posts to show me (perhaps it has some sort of algorithm, though the marketing material says it does not use algorithms) and the query was on a loop so that if any new posts came in that the server thinks I might want to see, it can add them to my feed.
Then I checked what happens when I create a post. I did so and looked at what happened in my networking tab. If this was nostr, I would expect to see multiple copies of a signed messaged get sent to a bunch of relays. Here, though, I saw one message get sent to the same server that was populating my feed, and that message was not signed, it was a plaintext copy of my message.
I happened to be in a group chat with John Carvalho at the time, who is associated with pubky. I asked him what was going on, and he said that pubky is based around three types of servers: homeservers, DHT servers, and indexer servers. The homeserver is where you create posts and where you query for posts to show on your feed. DHT servers are used for censorship resistance: each user creates an entry on a DHT server saying what homeserver they use, and these entries are signed by their key.
As for indexers, I think those are supposed to speed up the use of the DHT servers. From what I could tell, indexers query DHT servers to find out what homeservers people use. When you query a homeserver for posts, it is supposed to reach out to indexer servers to find out the homeservers of people whose posts the homeserver decided to show you, and then query those homeservers for those posts. I believe they decided not to look up what homeservers people use directly on DHT servers directly because DHT servers are kind of slow, due to having to store and search through all sorts of non-social-media content, whereas indexers only store a simple db that maps each user's pubkey to their homeserver, so they are faster.
Based on all of this info, it seems like, to populate your feed, this is the series of steps:
- you tell your homeserver your pubkey
- it uses some sort of algorithm to decide whose posts to show you
- then looks up the homeservers used by those people on an indexer server
- then it fetches posts from their homeservers
- then your client displays them to you
To create a post, this is the series of steps:
- you tell your homeserver what you want to say to the world
- it stores that message in plaintext and merely asserts that it came from you (it's not signed)
- other people can find out what you said by querying for your posts on your homeserver
Since posts on homeservers are not signed, I asked John what prevents a homeserver from just making up stuff and claiming I said it. He said nothing stops them from doing that, and if you are using a homeserver that starts acting up in that manner, what you should do is start using a new homeserver and update your DHT record to point at your new homeserver instead of the old one. Then, indexers should update their db to show where your new homeserver is, and the homeservers of people who "follow" you should stop pulling content from your old homeserver and start pulling it from your new one. If their homeserver is misbehaving too, I'm not sure what would happen. Maybe it could refuse to show them the content you've posted on your new homeserver, keeping making up fake content on your behalf that you've never posted, and maybe the people you follow would never learn you're being impersonated or have moved to a new homeserver.
John also clarified that there is not currently any tooling for migrating user content from one homeserver to another. If pubky gets popular and a big homeserver starts misbehaving, users will probably need such a tool. But these are early days, so there aren't that many homeservers, and the ones that exist seem to be pretty trusted.
Anyway, those are my initial thoughts on Pubky. Learn more here: https://pubky.org/
-

@ 57d1a264:69f1fee1
2025-03-28 10:32:15
Bitcoin.design community is organizing another Designathon, from May 4-18. Let's get creative with bitcoin together. More to come very soon.

The first edition was a bursting success! the website still there https://events.bitcoin.design, and here their previous [announcement](https://bitcoindesign.substack.com/p/the-bitcoin-designathon-2022).
Look forward for this to happen!
Spread the voice:
N: [https://njump.me/nevent1qqsv9w8p93tadlnyx0rkhexj5l48l...](https://njump.me/nevent1qqsv9w8p93tadlnyx0rkhexj5l48lmw9jc7nhhauyq5w3cm4nfsm3mstqtk6m)
X: https://x.com/bitcoin_design/status/1905547407405768927
originally posted at https://stacker.news/items/927650
-

@ df173277:4ec96708
2025-02-07 00:41:34
## **Building Our Confidential Backend on Secure Enclaves**
With our newly released [private and confidential **Maple AI**](https://trymaple.ai/?ref=blog.opensecret.cloud) and the open sourcing of our [**OpenSecret** platform](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud) code, I'm excited to present this technical primer on how we built our confidential compute platform leveraging **secure enclaves**. By combining AWS Nitro enclaves with end-to-end encryption and reproducible builds, our platform gives developers and end users the confidence that user data is protected, even at runtime, and that the code operating on their data has not been tampered with.
## **Auth and Databases Today**
As developers, we live in an era where protecting user data means "encryption at rest," plus some access policies and procedures. Developers typically run servers that:
1. Need to register users (authentication).
2. Collect and process user data in business-specific ways, often on the backend.
Even if data is encrypted at rest, it's commonly unlocked with a single master key or credentials the server holds. This means that data is visible during runtime to the application, system administrators, and potentially to the hosting providers. This scenario makes it difficult (or impossible) to guarantee that sensitive data isn't snooped on, memory-dumped, or used in unauthorized ways (for instance, training AI models behind the scenes).
## **"Just Trust Us" Isn't Good Enough**
In a traditional server architecture, users have to take it on faith that the code handling their data is the same code the operator claims to be running. Behind the scenes, applications can be modified or augmented to forward private information elsewhere, and there is no transparent way for users to verify otherwise. This lack of proof is unsettling, especially for services that process or store highly confidential data.
Administrators, developers, or cloud providers with privileged access can inspect memory in plaintext, attach debuggers, or gain complete visibility into stored information. Hackers who compromise these privileged levels can directly access sensitive data. Even with strict policies or promises of good conduct, the reality is that technical capabilities and misconfigurations can override words on paper. If a server master key can decrypt your data or can be accessed by an insider with root permissions, then "just trust us" loses much of its credibility.
The rise of AI platforms amplifies this dilemma. User data, often full of personal details, gets funneled into large-scale models that might be training or fine-tuning behind the scenes. Relying on vague assurances that "we don't look at your data" is no longer enough to prevent legitimate concerns about privacy and misuse. Now more than ever, providing a **strong, verifiable** guarantee that data remains off-limits, even when actively processed, has become a non-negotiable requirement for trustworthy services.
## **Current Attempts at Securing Data**
Current User Experience of E2EE Apps
While properly securing data is not easy, it isn't to say that no one is trying. Some solutions use **end-to-end encryption** (E2EE), where user data is encrypted client-side with a password or passphrase, so not even the server operator can decrypt it. That approach can be quite secure, but it also has its **limitations**:
1. **Key Management Nightmares**: If a user forgets their passphrase, the data is effectively lost, and there's no way to recover it from the developer's side.
2. **Feature Limitations**: Complex server-side operations (like offline/background tasks, AI queries, real-time collaboration, or heavy computation) can't easily happen if the server is never capable of processing decrypted data.
3. **Platform Silos**: Some solutions rely on iCloud, Google Drive, or local device storage. That can hamper multi-device usage or multi-OS compatibility.
Other approaches include self-hosting. However, these either burden users with dev ops overhead or revert to the "trust me" model for the server if you "self-host" on a cloud provider.
## **Secure Enclaves**
### **The Hybrid Approach**
Secure enclaves offer a compelling middle ground. They combine the privacy benefits of keeping data secure from prying admins while still allowing meaningful server-side computation. In a nutshell, an enclave is a protected environment within a machine, isolated at the hardware level, so that even if the OS or server is compromised, the data and code inside the enclave remain hidden.
App Service Running Inside Secure Enclave
### **High-Level Goal of Enclaves**
Enclaves, also known under the broader umbrella of **confidential computing**, aim to:\
âąÂ **Lock down data** so that only authorized code within the enclave can process the original plaintext data.\
âąÂ **Deny external inspection** by memory dumping, attaching a debugger, or intercepting plaintext network traffic.\
âąÂ **Prove** to external users or services that an enclave is running unmodified, approved code (this is where **remote attestation** comes in).
### **Different Secure Enclave Solutions**
[**AMD SEV**](https://www.amd.com/en/developer/sev.html?ref=blog.opensecret.cloud)Â **(Secure Encrypted Virtualization)**Â encrypts an entire virtual machine's memory so that even a compromised hypervisor cannot inspect or modify guest data. Its core concept is "lift-and-shift" security. No application refactoring is required because hardware-based encryption automatically protects the OS and all VM applications. Later enhancements (SEV-ES and SEV-SNP) added encryption of CPU register states and memory integrity protections, further limiting hypervisor tampering. This broad coverage means the guest OS is included in the trusted boundary. AMD SEV has matured into a robust solution for confidential VMs in multi-tenant clouds.
[**Intel TDX**](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html?ref=blog.opensecret.cloud)Â **(Trust Domain Extensions)**Â shifts from process-level enclaves to full VM encryption, allowing an entire guest operating system and its applications to run in an isolated "trust domain." Like AMD SEV, Intel TDX encrypts and protects all memory the VM uses from hypervisors or other privileged software, so developers do not need to refactor their code to benefit from hardware-based confidentiality. This broader scope addresses many SGX limitations, such as strict memory bounds and the need to split out enclave-specific logic, and offers a more straightforward "lift-and-shift" path for running existing workloads privately. While SGX is now deprecated, TDX carries forward the core confidential computing principles but applies them at the virtual machine level for more substantial isolation, easier deployment, and the ability to scale up to large, memory-intensive applications.
[**Apple Secure Enclave and Private Compute**](https://security.apple.com/blog/private-cloud-compute/?ref=blog.opensecret.cloud)Â is a dedicated security coprocessor embedded in most Apple devices (iPhones, iPads, Macs) and now extended to Apple's server-side AI infrastructure. It runs its own microkernel, has hardware-protected memory, and securely manages operations such as biometric authentication, key storage, and cryptographic tasks. Apple's "Private Compute" approach in the cloud brings similar enclave capabilities to server-based AI, enabling on-device-grade privacy even when requests are processed in Apple's data centers.
[**AWS Nitro Enclaves**](https://docs.aws.amazon.com/enclaves/latest/user/nitro-enclave.html?ref=blog.opensecret.cloud)Â carve out a tightly isolated "mini-VM" from a parent EC2 instance, with its own vCPUs and memory guarded by dedicated Nitro cards. The enclave has no persistent storage and no external network access, significantly reducing the attack surface. Communication with the parent instance occurs over a secure local channel (vsock), and AWS offers hardware-based attestation so that secrets (e.g., encryption keys from AWS KMS) can be accessed only to the correct enclave. This design helps developers protect sensitive data or code even if the main EC2 instance's OS is compromised.
[**NVIDIA GPU TEEs**](https://www.nvidia.com/en-us/data-center/solutions/confidential-computing/?ref=blog.opensecret.cloud)Â **(Hopper H100 and Blackwell)**Â extend confidential computing to accelerated workloads by encrypting data in GPU memory and ensuring that even a privileged host cannot view or tamper with it. Data moving between CPU and GPU is encrypted in transit, so sensitive model weights or inputs remain protected during AI training or inference. NVIDIA's hardware and drivers handle secure data paths under the hood, allowing confidential large language model (LLM) workloads and other GPU-accelerated computations to run with minimal performance overhead and strong security guarantees.
### **Key Benefits**
One major advantage of enclaves is their ability to **keep memory completely off-limits** to outside prying eyes. Even administrators who can normally inspect processes at will are blocked from peeking into the enclave's protected memory space. The enclave model is a huge shift in the security model: it prevents casual inspection and defends against sophisticated memory dumping techniques that might otherwise leak secrets or sensitive data.
Another key benefit centers on cryptographic keys that are **never exposed outside the enclave**. Only verified code running inside the enclave environment can run decryption or signing operations, and it can only do so while that specific code is running. This ensures that compromised hosts or rogue processes, even those with high-level privileges, are unable to intercept or misuse the keys because the keys remain strictly within the trusted boundary of the hardware.
Enclaves can also offer the power of **remote attestation**, allowing external clients or systems to confirm that they're speaking to an authentic, untampered enclave. By validating the hardware's integrity measurements and enclave-specific proofs, the remote party can be confident in the underlying security properties, an important guarantee in multi-tenant environments or whenever trust boundaries extend across different organizations and networks.
Beyond that, **reproducible builds** can create a verifiable fingerprint proving which binary runs in the enclave. This is a step above a simple "trust us" approach. Anyone can independently recreate the enclave image and verify the resulting cryptographic hash by using a reproducible build system (for example, [our NixOS-based solution](https://github.com/OpenSecretCloud/opensecret/blob/master/flake.nix?ref=blog.opensecret.cloud)). If it matches, then users and developers know precisely how code handles their data, boosting confidence that no hidden changes exist.
It's worth noting that although enclaves shield you from software devs, cloud providers, and insider threats, you do have to trust the **hardware vendor** (Intel, AMD, Apple, AWS, or NVIDIA) to implement their microcode and firmware securely. The entire enclave model could be theoretically undermined if a CPU maker's root keys or manufacturing process were compromised. Fortunately, these companies undergo extensive audits and firmware validations (often with third-party researchers), and their remote attestation mechanisms allow you to confirm specific firmware versions before trusting an enclave. While this adds a layer of "vendor trust," it's still a far more contained risk than trusting an entire operating system or cloud stack, so enclaves remain a strong step forward in practical, confidential computing.
## **How We Use Secure Enclaves**
Now that we've covered the general idea of enclaves let's look at how we specifically implement them in OpenSecret, our developer platform for handling user auth, private keys, data encryption, and AI workloads.
### **Our Stack: AWS Nitro + Nvidia TEE**
âąÂ **AWS Nitro Enclaves for the backend**: All critical logic, authentication, private key management, and data encryption/decryption run inside an AWS Nitro Enclave.
âąÂ **Nvidia Trusted Execution for AI**: For large AI inference (such as the Llama 3.3 70B model), we utilize Nvidia's GPU-based TEEs to protect even GPU memory. This means users can feed sensitive data to the AI model **without** exposing it in plaintext to the GPU providers or us as the operator. [Edgeless Systems](https://www.edgeless.systems/?ref=blog.opensecret.cloud) is our Nvidia TEE provider, and due to the power of enclave verification, we don't need to worry about who runs the GPUs. We know requests can't be inspected or tampered with.
### **End-to-End Encryption from Client to Enclave**
Client-side Enclave Attestation from Maple AI
Before login or data upload, the user/client verifies the **enclave attestation** from our platform. This process proves that the specific Nitro Enclave is genuine and runs the exact code we've published. You can check this out live on [Maple AI's attestation page](https://trymaple.ai/proof?ref=blog.opensecret.cloud).
Based on the attestation, the client establishes a secure ephemeral communication channel that only that enclave can decrypt. While we take advantage of SSL, it is typically not terminated inside the enclave itself. To ensure there's full encrypted data transfer all the way through to the enclave, we establish this additional handshake based on the attestation document that is used for all API requests during the client session.
From there, the user's credentials, private keys, and data pass through this secure channel directly into the enclave, where they are decrypted and processed according to the user's request.
### **In-Enclave Operations**
At the core of OpenSecret's approach is the conviction that security-critical tasks must happen inside the enclave, where even administrative privileges or hypervisor-level compromise cannot expose plaintext data. This encompasses everything from when a user logs in to creating and managing sensitive cryptographic keys. By confining these operations to a protected hardware boundary, developers can focus on building their applications without worrying about accidental data leaks, insider threats, or malicious attempts to harvest credentials. The enclave becomes the ultimate gatekeeper: it controls how data flows and ensures that nothing escapes in plain form.
User Auth Methods running inside Enclave
A primary example is **user authentication**. All sign-in workflows, including email/password, OAuth, and upcoming passkey-based methods, are handled entirely within the enclave. As soon as a user's credentials enter our platform through the encrypted channel, they are routed straight into the protected environment, bypassing the host's operating system or any potential snooping channels. From there, authentication and session details remain in the enclave, ensuring that privileged outsiders cannot intercept or modify them. By centralizing these identity flows within a sealed environment, developers can assure their users that no one outside the enclave (including the cloud provider or the app's own sysadmins) can peek at, tamper with, or access sensitive login information.
Main Enclave Operations in OpenSecret
The same principle applies to **private key management**. Whether keys are created fresh in the enclave or securely transferred into it, they remain sealed away from the rest of the system. Operations like digital signing or content decryption happen only within the hardware boundary, so raw keys never appear in any log, file system, or memory space outside the enclave. Developers retain the functionality they need, such as verifying user actions, encrypting data, or enabling secure transactions without ever exposing keys to a broader (and more vulnerable) attack surface. User backup options exist as well, where the keys can be securely passed to the end user.
Realtime Encrypted Data Sync on Multiple Devices
Another crucial aspect is **data encryption at rest**. While user data ultimately needs to be stored somewhere outside the enclave, the unencrypted form of that data only exists transiently inside the protected environment. Encryption and decryption routines run within the enclave, which holds the encryption keys strictly in memory under hardware guards. If a user uploads data, it is promptly secured before it leaves the enclave. When data is retrieved, it remains encrypted until it reenters the protected region and is passed back to the user through the secured communication channel. This ensures that even if someone gains access to the underlying storage or intercepts data in transit, they will see only meaningless ciphertext.
Confidential AI Workloads
Finally, **confidential AI workloads** build upon this same pattern: the Nitro enclave re-encrypts data so it can be processed inside a GPU-based trusted execution environment (TEE) for inference or other advanced computations. Sensitive data, like user-generated text or private documents, never appears in the clear on the host or within GPU memory outside the TEE boundary. When an AI process finishes, only the results are returned to the enclave, which can then relay them securely to the requesting user. By seamlessly chaining enclaves together, from CPU-based Nitro Enclaves to GPU-accelerated TEEs, we can deliver robust, hardware-enforced privacy for virtually any type of server-side or AI-driven operation.
### **Reproducible Builds + Verification**
Client verifies enclave attestation document
We build our enclaves on **NixOS** with reproducible builds, ensuring that anyone can verify that the binary we publish is indeed the binary running in the enclave. This build process is essential for proving we haven't snuck in malicious code to exfiltrate data or collect sensitive logs.
Our code is fully open source ([GitHub: OpenSecret](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud)), so you can audit or run it yourself. You can also verify that the cryptographic measurement the build process outputs matches the measurement reported by the enclave during attestation.
## **Putting It All Together**
OpenSecret Offering: Private Key Management, Encrypted Sync, Private AI, and Confidential Compute
By weaving secure enclaves into every step, from authentication to data handling to AI inference, we shift the burden of trust away from human policies and onto provable, hardware-based protections. For app developers, you can offer your users robust privacy guarantees without rewriting all your business logic or building an entire security stack from scratch. Whether you're storing user credentials or running complex operations on sensitive data, the enclave approach ensures plaintext remains inaccessible to even the most privileged parties outside the enclave boundary. Developers can focus on building great apps, while OpenSecret handles the cryptographic "lock and key" behind the scenes.
This model provides a secure-by-design environment for industries that demand strict data confidentiality, such as healthcare, fintech, cryptocurrency apps for secure key management, or decentralized identity platforms. Instead of worrying about memory dumps or backend tampering, you can trust that once data enters the enclave, it's sealed off from unauthorized eyes, including from the app developers themselves. And these safeguards don't just apply to niche use cases. Even general-purpose applications that handle login flows and user-generated content stand to benefit, especially as regulatory scrutiny grows around data privacy and insider threats.
Imagine a telehealth startup using OpenSecret enclaves to protect patient information for remote consultations. Not only would patient data remain encrypted at rest, but any AI-driven analytics to assist with diagnoses could be run privately within the enclave, ensuring no one outside the hardware boundary can peek at sensitive health records. A fintech company could similarly isolate confidential financial transactions, preventing even privileged insiders from viewing or tampering with raw transaction details. These real-world implementations give developers a clear path to adopting enclaves for serious privacy and compliance needs without overhauling their infrastructure.
OpenSecret aims to be a **full developer platform** with end-to-end security from day one. By incorporating user authentication, data storage, and GPU-based confidential AI into a single service, we eliminate many of the traditional hurdles in adopting enclaves. No more juggling separate tools for cryptographic key management, compliance controls, and runtime privacy. Instead, you get a unified stack that keeps data encrypted in transit, at rest, and in use.
Our solution also caters to the exploding demand for AI applications: with TEE-enabled GPU workloads, you can securely process sensitive data for text inference without ever exposing raw plaintext or sensitive documents to the host system.
The result is a new generation of apps that deliver advanced functionality, like real-time encrypted data sync or AI-driven insights, while preserving user privacy and meeting strict regulatory requirements. You don't have to rely on empty "trust us" promises because hardware enclaves, remote attestation, and reproducible builds collectively guarantee the code is running untampered. In short, OpenSecret offers the building blocks needed to create truly confidential services and experiences, allowing you to innovate while ensuring data protection remains ironclad.
## **Things to Come**
We're excited to build on our enclaved approach. Here's what's on our roadmap:
âąÂ **Production Launch**: We're using this in production now with [Maple AI](https://trymaple.ai/?ref=blog.opensecret.cloud) and have a developer preview playground up and running. We'll have the developer environment ready for production in a few months.\
âąÂ **Multi-Tenant Support**: Our platform currently works for single tenants, but we're opening this up so developers can onboard without needing a dedicated instance.\
âąÂ **Self-Serve Frontend**: A dev-friendly portal for provisioning apps, connecting OAuth or email providers, and managing users.\
âąÂ **External Key Signing Options**: Integrations with custom hardware security modules (HSMs) or customer-ran key managers that can only process data upon verifying the enclave attestation.\
âąÂ **Confidential Computing as a Service**: We'll expand our platform so that other developers can quickly create enclaves for specialized workloads without dealing with the complexities of Nitro or GPU TEEs.\
âąÂ **Additional SDKs**: In addition to our [JavaScript client-side SDK](https://github.com/OpenSecretCloud/OpenSecret-SDK?ref=blog.opensecret.cloud), we plan to launch official support for Rust, Python, Swift, Java, Go, and more.\
âąÂ **AI API Proxy with Attestation/Encryption**: We already provide an easy way to [access a Private AI through Maple AI](https://trymaple.ai/?ref=blog.opensecret.cloud), but we'd like to open this up more for existing tools and developers. We'll provide a proxy server that users can run on their local machines or servers that properly handle encryption to our OpenAI-compatible API.
## **Getting Started**
Ready to see enclaves in action? Here's how to dive in:\
1. **Run OpenSecret**: Check out our open-source repository at [OpenSecret on GitHub](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud). You can run your own enclaved environment or try it out locally with Docker.\
2. **Review Our SDK**: Our [JavaScript client SDK](https://github.com/OpenSecretCloud/OpenSecret-SDK?ref=blog.opensecret.cloud) makes it easy to handle sign-ins, put/get encrypted data, sign with user private keys, etc. It handles attestation verification and encryption under the hood, making the API integration seamless.\
3. **Play with Maple AI**: Try out [Maple AI](https://blog.opensecret.cloud/maple-ai-private-encrypted-chat/) as an example of an AI app built directly on OpenSecret. Your queries are encrypted end to end, and the Llama model sees them only inside the TEE.\
4. **Developer Preview**: Contact us if you want an invite to our early dev platform. We'll guide you through our SDK and give you access to the preview server. We'd love to build with you and incorporate your feedback as we develop this further.
## **Conclusion**
By merging secure enclaves (AWS Nitro and Nvidia GPU TEEs), user authentication, private key management, and an end-to-end verifiable encrypted approach, **OpenSecret** provides a powerful platform where we protect user data during collection, storage, and processing. Whether it's for standard user management, handling private cryptographic keys, or powering AI inference, the technology ensures that **no one**, not even us or the cloud provider, can snoop on data in use.
**We believe** this is the future of trustworthy computing in the cloud. And it's **all open source**, so you don't have to just take our word for it: you can see and verify everything yourself.
Do you have questions, feedback, or a use case you'd like to test out? Come join us on [GitHub](https://github.com/OpenSecretCloud?ref=blog.opensecret.cloud), [Discord](https://discord.gg/ch2gjZAMGy?ref=blog.opensecret.cloud), or email us for a developer preview. We can't wait to see what you build!
*Thank you for reading, and welcome to the era of enclaved computing.*
-

@ 57d1a264:69f1fee1
2025-03-27 10:42:05
What we have been missing in [SN Press kit](https://stacker.news/items/872925/r/Design_r)? Most important, who the press kit is for? It's for us? It's for them? Them, who?
The first few editions of the press kit, I agree are mostly made by us, for us. A way to try to homogenize how we _speek_ out SN into the wild web. A way to have SN voice sync, loud and clear, to send out our message. In this case, I squeezed my mouse, creating a template for us [^1], stackers, to share when talking sales with possible businesses and merchants willing to invest some sats and engage with SN community. Here's the message and the sales pitch, v0.1:
## Reach Bitcoinâs Most Engaged Community â Zero Noise, Pure Signal.













- - -
Contributions to improve would be much appreciated. You can also help by simply commenting on each slide or leaving your feedback below, especially if you are a sale person or someone that has seen similar documents before.
This is the first interaction. Already noticed some issues, for example with the emojis and the fonts, especially when exporting, probably related to a penpot issue. The slides maybe render differently depending on the browser you're using.
- [â¶ïž Play](https://design.penpot.app/#/view?file-id=cec80257-5021-8137-8005-ef90a160b2c9&page-id=cec80257-5021-8137-8005-ef90a160b2ca§ion=interactions&index=0&interactions-mode=hide&zoom=fit) the file in your browser
- âŹïž Save the [PDF file](https://mega.nz/file/TsBgkRoI#20HEb_zscozgJYlRGha0XiZvcXCJfLQONx2fc65WHKY)
@k00b it will be nice to have some real data, how we can get some basic audience insights? Even some inputs from Plausible, if still active, will be much useful.
[^1]: Territory founders. FYI: @Aardvark, @AGORA, @anna, @antic, @AtlantisPleb, @av, @Bell_curve, @benwehrman, @bitcoinplebdev, @Bitter, @BlokchainB, @ch0k1, @davidw, @ek, @elvismercury, @frostdragon, @grayruby, @HODLR, @inverselarp, @Jon_Hodl, @MaxAWebster, @mega_dreamer, @mrtali, @niftynei, @nout, @OneOneSeven, @PlebLab, @Public_N_M_E, @RDClark, @realBitcoinDog, @roytheholographicuniverse, @siggy47, @softsimon, @south_korea_ln, @theschoolofbitcoin, @TNStacker. @UCantDoThatDotNet, @Undisciplined
originally posted at https://stacker.news/items/926557
-

@ fd06f542:8d6d54cd
2025-03-28 02:24:00
NIP-01
======
Basic protocol flow description
-------------------------------
`draft` `mandatory`
This NIP defines the basic protocol that should be implemented by everybody. New NIPs may add new optional (or mandatory) fields and messages and features to the structures and flows described here.
## Events and signatures
Each user has a keypair. Signatures, public key, and encodings are done according to the [Schnorr signatures standard for the curve `secp256k1`](https://bips.xyz/340).
The only object type that exists is the `event`, which has the following format on the wire:
```jsonc
{
"id": <32-bytes lowercase hex-encoded sha256 of the serialized event data>,
"pubkey": <32-bytes lowercase hex-encoded public key of the event creator>,
"created_at": <unix timestamp in seconds>,
"kind": <integer between 0 and 65535>,
"tags": [
[<arbitrary string>...],
// ...
],
"content": <arbitrary string>,
"sig": <64-bytes lowercase hex of the signature of the sha256 hash of the serialized event data, which is the same as the "id" field>
}
```
To obtain the `event.id`, we `sha256` the serialized event. The serialization is done over the UTF-8 JSON-serialized string (which is described below) of the following structure:
```
[
0,
<pubkey, as a lowercase hex string>,
<created_at, as a number>,
<kind, as a number>,
<tags, as an array of arrays of non-null strings>,
<content, as a string>
]
```
To prevent implementation differences from creating a different event ID for the same event, the following rules MUST be followed while serializing:
- UTF-8 should be used for encoding.
- Whitespace, line breaks or other unnecessary formatting should not be included in the output JSON.
- The following characters in the content field must be escaped as shown, and all other characters must be included verbatim:
- A line break (`0x0A`), use `\n`
- A double quote (`0x22`), use `\"`
- A backslash (`0x5C`), use `\\`
- A carriage return (`0x0D`), use `\r`
- A tab character (`0x09`), use `\t`
- A backspace, (`0x08`), use `\b`
- A form feed, (`0x0C`), use `\f`
### Tags
Each tag is an array of one or more strings, with some conventions around them. Take a look at the example below:
```jsonc
{
"tags": [
["e", "5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36", "wss://nostr.example.com"],
["p", "f7234bd4c1394dda46d09f35bd384dd30cc552ad5541990f98844fb06676e9ca"],
["a", "30023:f7234bd4c1394dda46d09f35bd384dd30cc552ad5541990f98844fb06676e9ca:abcd", "wss://nostr.example.com"],
["alt", "reply"],
// ...
],
// ...
}
```
The first element of the tag array is referred to as the tag _name_ or _key_ and the second as the tag _value_. So we can safely say that the event above has an `e` tag set to `"5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36"`, an `alt` tag set to `"reply"` and so on. All elements after the second do not have a conventional name.
This NIP defines 3 standard tags that can be used across all event kinds with the same meaning. They are as follows:
- The `e` tag, used to refer to an event: `["e", <32-bytes lowercase hex of the id of another event>, <recommended relay URL, optional>, <32-bytes lowercase hex of the author's pubkey, optional>]`
- The `p` tag, used to refer to another user: `["p", <32-bytes lowercase hex of a pubkey>, <recommended relay URL, optional>]`
- The `a` tag, used to refer to an addressable or replaceable event
- for an addressable event: `["a", "<kind integer>:<32-bytes lowercase hex of a pubkey>:<d tag value>", <recommended relay URL, optional>]`
- for a normal replaceable event: `["a", "<kind integer>:<32-bytes lowercase hex of a pubkey>:", <recommended relay URL, optional>]` (note: include the trailing colon)
As a convention, all single-letter (only english alphabet letters: a-z, A-Z) key tags are expected to be indexed by relays, such that it is possible, for example, to query or subscribe to events that reference the event `"5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36"` by using the `{"#e": ["5c83da77af1dec6d7289834998ad7aafbd9e2191396d75ec3cc27f5a77226f36"]}` filter. Only the first value in any given tag is indexed.
### Kinds
Kinds specify how clients should interpret the meaning of each event and the other fields of each event (e.g. an `"r"` tag may have a meaning in an event of kind 1 and an entirely different meaning in an event of kind 10002). Each NIP may define the meaning of a set of kinds that weren't defined elsewhere. [NIP-10](10.md), for instance, especifies the `kind:1` text note for social media applications.
This NIP defines one basic kind:
- `0`: **user metadata**: the `content` is set to a stringified JSON object `{name: <nickname or full name>, about: <short bio>, picture: <url of the image>}` describing the user who created the event. [Extra metadata fields](24.md#kind-0) may be set. A relay may delete older events once it gets a new one for the same pubkey.
And also a convention for kind ranges that allow for easier experimentation and flexibility of relay implementation:
- for kind `n` such that `1000 <= n < 10000 || 4 <= n < 45 || n == 1 || n == 2`, events are **regular**, which means they're all expected to be stored by relays.
- for kind `n` such that `10000 <= n < 20000 || n == 0 || n == 3`, events are **replaceable**, which means that, for each combination of `pubkey` and `kind`, only the latest event MUST be stored by relays, older versions MAY be discarded.
- for kind `n` such that `20000 <= n < 30000`, events are **ephemeral**, which means they are not expected to be stored by relays.
- for kind `n` such that `30000 <= n < 40000`, events are **addressable** by their `kind`, `pubkey` and `d` tag value -- which means that, for each combination of `kind`, `pubkey` and the `d` tag value, only the latest event MUST be stored by relays, older versions MAY be discarded.
In case of replaceable events with the same timestamp, the event with the lowest id (first in lexical order) should be retained, and the other discarded.
When answering to `REQ` messages for replaceable events such as `{"kinds":[0],"authors":[<hex-key>]}`, even if the relay has more than one version stored, it SHOULD return just the latest one.
These are just conventions and relay implementations may differ.
## Communication between clients and relays
Relays expose a websocket endpoint to which clients can connect. Clients SHOULD open a single websocket connection to each relay and use it for all their subscriptions. Relays MAY limit number of connections from specific IP/client/etc.
### From client to relay: sending events and creating subscriptions
Clients can send 3 types of messages, which must be JSON arrays, according to the following patterns:
* `["EVENT", <event JSON as defined above>]`, used to publish events.
* `["REQ", <subscription_id>, <filters1>, <filters2>, ...]`, used to request events and subscribe to new updates.
* `["CLOSE", <subscription_id>]`, used to stop previous subscriptions.
`<subscription_id>` is an arbitrary, non-empty string of max length 64 chars. It represents a subscription per connection. Relays MUST manage `<subscription_id>`s independently for each WebSocket connection. `<subscription_id>`s are not guaranteed to be globally unique.
`<filtersX>` is a JSON object that determines what events will be sent in that subscription, it can have the following attributes:
```json
{
"ids": <a list of event ids>,
"authors": <a list of lowercase pubkeys, the pubkey of an event must be one of these>,
"kinds": <a list of a kind numbers>,
"#<single-letter (a-zA-Z)>": <a list of tag values, for #e â a list of event ids, for #p â a list of pubkeys, etc.>,
"since": <an integer unix timestamp in seconds. Events must have a created_at >= to this to pass>,
"until": <an integer unix timestamp in seconds. Events must have a created_at <= to this to pass>,
"limit": <maximum number of events relays SHOULD return in the initial query>
}
```
Upon receiving a `REQ` message, the relay SHOULD return events that match the filter. Any new events it receives SHOULD be sent to that same websocket until the connection is closed, a `CLOSE` event is received with the same `<subscription_id>`, or a new `REQ` is sent using the same `<subscription_id>` (in which case a new subscription is created, replacing the old one).
Filter attributes containing lists (`ids`, `authors`, `kinds` and tag filters like `#e`) are JSON arrays with one or more values. At least one of the arrays' values must match the relevant field in an event for the condition to be considered a match. For scalar event attributes such as `authors` and `kind`, the attribute from the event must be contained in the filter list. In the case of tag attributes such as `#e`, for which an event may have multiple values, the event and filter condition values must have at least one item in common.
The `ids`, `authors`, `#e` and `#p` filter lists MUST contain exact 64-character lowercase hex values.
The `since` and `until` properties can be used to specify the time range of events returned in the subscription. If a filter includes the `since` property, events with `created_at` greater than or equal to `since` are considered to match the filter. The `until` property is similar except that `created_at` must be less than or equal to `until`. In short, an event matches a filter if `since <= created_at <= until` holds.
All conditions of a filter that are specified must match for an event for it to pass the filter, i.e., multiple conditions are interpreted as `&&` conditions.
A `REQ` message may contain multiple filters. In this case, events that match any of the filters are to be returned, i.e., multiple filters are to be interpreted as `||` conditions.
The `limit` property of a filter is only valid for the initial query and MUST be ignored afterwards. When `limit: n` is present it is assumed that the events returned in the initial query will be the last `n` events ordered by the `created_at`. Newer events should appear first, and in the case of ties the event with the lowest id (first in lexical order) should be first. It is safe to return less events than `limit` specifies, but it is expected that relays do not return (much) more events than requested so clients don't get unnecessarily overwhelmed by data.
### From relay to client: sending events and notices
Relays can send 5 types of messages, which must also be JSON arrays, according to the following patterns:
* `["EVENT", <subscription_id>, <event JSON as defined above>]`, used to send events requested by clients.
* `["OK", <event_id>, <true|false>, <message>]`, used to indicate acceptance or denial of an `EVENT` message.
* `["EOSE", <subscription_id>]`, used to indicate the _end of stored events_ and the beginning of events newly received in real-time.
* `["CLOSED", <subscription_id>, <message>]`, used to indicate that a subscription was ended on the server side.
* `["NOTICE", <message>]`, used to send human-readable error messages or other things to clients.
This NIP defines no rules for how `NOTICE` messages should be sent or treated.
- `EVENT` messages MUST be sent only with a subscription ID related to a subscription previously initiated by the client (using the `REQ` message above).
- `OK` messages MUST be sent in response to `EVENT` messages received from clients, they must have the 3rd parameter set to `true` when an event has been accepted by the relay, `false` otherwise. The 4th parameter MUST always be present, but MAY be an empty string when the 3rd is `true`, otherwise it MUST be a string formed by a machine-readable single-word prefix followed by a `:` and then a human-readable message. Some examples:
* `["OK", "b1a649ebe8...", true, ""]`
* `["OK", "b1a649ebe8...", true, "pow: difficulty 25>=24"]`
* `["OK", "b1a649ebe8...", true, "duplicate: already have this event"]`
* `["OK", "b1a649ebe8...", false, "blocked: you are banned from posting here"]`
* `["OK", "b1a649ebe8...", false, "blocked: please register your pubkey at https://my-expensive-relay.example.com"]`
* `["OK", "b1a649ebe8...", false, "rate-limited: slow down there chief"]`
* `["OK", "b1a649ebe8...", false, "invalid: event creation date is too far off from the current time"]`
* `["OK", "b1a649ebe8...", false, "pow: difficulty 26 is less than 30"]`
* `["OK", "b1a649ebe8...", false, "restricted: not allowed to write."]`
* `["OK", "b1a649ebe8...", false, "error: could not connect to the database"]`
- `CLOSED` messages MUST be sent in response to a `REQ` when the relay refuses to fulfill it. It can also be sent when a relay decides to kill a subscription on its side before a client has disconnected or sent a `CLOSE`. This message uses the same pattern of `OK` messages with the machine-readable prefix and human-readable message. Some examples:
* `["CLOSED", "sub1", "unsupported: filter contains unknown elements"]`
* `["CLOSED", "sub1", "error: could not connect to the database"]`
* `["CLOSED", "sub1", "error: shutting down idle subscription"]`
- The standardized machine-readable prefixes for `OK` and `CLOSED` are: `duplicate`, `pow`, `blocked`, `rate-limited`, `invalid`, `restricted`, and `error` for when none of that fits.
-

@ a95c6243:d345522c
2025-03-11 10:22:36
**«Wir brauchen eine digitale Brandmauer gegen den Faschismus»,** [schreibt](https://www.ccc.de/de/updates/2025/ccc-fordert-digitale-brandmauer) der Chaos Computer Club (CCC) auf seiner Website. Unter diesem Motto prĂ€sentierte er letzte Woche einen Forderungskatalog, mit dem sich 24 Organisationen an die kommende Bundesregierung wenden. Der Koalitionsvertrag mĂŒsse sich daran messen lassen, verlangen sie.
**In den drei Kategorien «Bekenntnis gegen Ăberwachung»,** «Schutz und Sicherheit fĂŒr alle» sowie «Demokratie im digitalen Raum» stellen die [Unterzeichner](https://d-64.org/digitale-brandmauer/), zu denen auch Amnesty International und Das NETTZ gehören, unter anderem die folgenden «Mindestanforderungen»:
* Verbot biometrischer MassenĂŒberwachung des öffentlichen Raums sowie der ungezielten biometrischen Auswertung des Internets.
* Anlasslose und massenhafte Vorratsdatenspeicherung wird abgelehnt.
* Automatisierte Datenanalysen der InformationsbestÀnde der Strafverfolgungsbehörden sowie jede Form von Predictive Policing oder automatisiertes Profiling von Menschen werden abgelehnt.
* EinfĂŒhrung eines Rechts auf VerschlĂŒsselung. Die Bundesregierung soll sich dafĂŒr einsetzen, die Chatkontrolle auf europĂ€ischer Ebene zu verhindern.
* Anonyme und pseudonyme Nutzung des Internets soll geschĂŒtzt und ermöglicht werden.
* BekÀmpfung «privaten Machtmissbrauchs von Big-Tech-Unternehmen» durch durchsetzungsstarke, unabhÀngige und grundsÀtzlich föderale Aufsichtsstrukturen.
* EinfĂŒhrung eines digitalen Gewaltschutzgesetzes, unter BerĂŒcksichtigung «gruppenbezogener digitaler Gewalt» und die Förderung von Beratungsangeboten.
* Ein umfassendes Förderprogramm fĂŒr digitale öffentliche RĂ€ume, die dezentral organisiert und quelloffen programmiert sind, soll aufgelegt werden.
**Es sei ein Irrglaube, dass zunehmende Ăberwachung einen Zugewinn an Sicherheit darstelle,** ist eines der Argumente der Initiatoren. Sicherheit erfordere auch, dass Menschen anonym und vertraulich kommunizieren können und ihre PrivatsphĂ€re geschĂŒtzt wird.
**Gesunde digitale RĂ€ume lebten auch von einem demokratischen Diskurs,** lesen wir in dem Papier. Es sei Aufgabe des Staates, Grundrechte zu schĂŒtzen. Dazu gehöre auch, Menschenrechte und demokratische Werte, insbesondere Freiheit, Gleichheit und SolidaritĂ€t zu fördern sowie den Missbrauch von MaĂnahmen, Befugnissen und Infrastrukturen durch «die Feinde der Demokratie» zu verhindern.
**Man ist geneigt zu fragen, wo denn die Autoren «den Faschismus» sehen,** den es zu bekĂ€mpfen gelte. Die meisten der vorgetragenen Forderungen und Argumente finden sicher breite UnterstĂŒtzung, denn sie beschreiben offenkundig gĂ€ngige, kritikwĂŒrdige Praxis. Die Aushebelung der PrivatsphĂ€re, der Redefreiheit und anderer Grundrechte im Namen der Sicherheit wird bereits jetzt massiv durch die aktuellen «demokratischen Institutionen» und ihre «durchsetzungsstarken Aufsichtsstrukturen» betrieben.
**Ist «der Faschismus» also die EU und ihre Mitgliedsstaaten?** Nein, die «faschistische Gefahr», gegen die man eine digitale Brandmauer will, kommt nach Ansicht des CCC und seiner Partner aus den Vereinigten Staaten. Private Ăberwachung und Machtkonzentration sind dabei weltweit schon lange RealitĂ€t, jetzt endlich mĂŒssen sie jedoch bekĂ€mpft werden. In dem Papier heiĂt es:
> «Die willkĂŒrliche und antidemokratische MachtausĂŒbung der Tech-Oligarchen um PrĂ€sident Trump erfordert einen Paradigmenwechsel in der deutschen Digitalpolitik. (...) Die aktuellen Geschehnisse in den USA zeigen auf, wie Datensammlungen und -analyse genutzt werden können, um einen Staat handstreichartig zu ĂŒbernehmen, seine Strukturen nachhaltig zu beschĂ€digen, Widerstand zu unterbinden und marginalisierte Gruppen zu verfolgen.»
**Wer auf der anderen Seite dieser Brandmauer stehen soll, ist also klar.** Es sind die gleichen «Feinde unserer Demokratie», die seit Jahren in diese Ecke gedrĂ€ngt werden. Es sind die gleichen Andersdenkenden, Regierungskritiker und Friedensforderer, die unter dem groĂzĂŒgigen Dach des Bundesprogramms «Demokratie leben» einem «kontinuierlichen Echt- und Langzeitmonitoring» wegen der Etikettierung [«digitaler Hass»](https://bag-gegen-hass.net/) unterzogen werden.
**Dass die 24 Organisationen praktisch auch die BekĂ€mpfung von Google,** Microsoft, Apple, Amazon und anderen fordern, entbehrt nicht der Komik. Diese fallen aber sicher unter das Stichwort «Machtmissbrauch von Big-Tech-Unternehmen». Gleichzeitig verlangen die Lobbyisten implizit zum Beispiel die Förderung des [Nostr](https://reason.com/video/2024/09/17/is-nostr-an-antidote-to-social-media-censorship/)-Netzwerks, denn hier finden wir dezentral organisierte und quelloffen programmierte digitale RĂ€ume par excellence, obendrein zensurresistent. Das wiederum dĂŒrfte in der Politik weniger gut ankommen.
*\[Titelbild:* *[Pixabay](https://pixabay.com/de/illustrations/uns-ihnen-stammes-wettbewerb-1767691/)]*
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/digitale-brandmauer-gegen-den-faschismus-von-der-kunftigen-bundesregierung)*** erschienen.
-

@ a95c6243:d345522c
2025-03-04 09:40:50
**Die «Eliten» fĂŒhren bereits groĂ angelegte Pilotprojekte fĂŒr eine Zukunft durch,** die sie wollen und wir nicht. Das [schreibt](https://off-guardian.org/2025/02/26/coming-soon-the-european-digital-identity-wallet/) der *OffGuardian* in einem Update zum Thema «EU-Brieftasche fĂŒr die digitale IdentitĂ€t». Das Portal weist darauf hin, dass die Akteure dabei nicht gerade zimperlich vorgehen und auch keinen Hehl aus ihren Absichten machen. *Transition News* hat mehrfach darĂŒber berichtet, zuletzt [hier](https://transition-news.org/eudi-wallet-der-weg-fur-ein-vollstandig-digitalisiertes-europa-ist-frei) und [hier](https://transition-news.org/iata-biometrische-daten-und-digitale-id-machen-das-vollstandig-digitale).
**Mit der EU Digital Identity Wallet (EUDI-Brieftasche) sei eine einzige von der Regierung herausgegebene App geplant,** die Ihre medizinischen Daten, BeschĂ€ftigungsdaten, Reisedaten, Bildungsdaten, Impfdaten, Steuerdaten, Finanzdaten sowie (potenziell) Kopien Ihrer Unterschrift, FingerabdrĂŒcke, Gesichtsscans, Stimmproben und DNA enthĂ€lt. So fasst der *OffGuardian* die eindrucksvolle Liste möglicher Einsatzbereiche zusammen.
**Auch Dokumente wie der Personalausweis oder der** **[FĂŒhrerschein](https://transition-news.org/eu-weite-einfuhrung-von-digitalen-fuhrerscheinen-fur-digitale-geldborsen)** können dort in elektronischer Form gespeichert werden. Bis 2026 sind alle EU-Mitgliedstaaten dazu verpflichtet, Ihren BĂŒrgern funktionierende und frei verfĂŒgbare digitale «Brieftaschen» bereitzustellen.
**Die Menschen wĂŒrden diese App nutzen,** so das Portal, um Zahlungen vorzunehmen, Kredite zu beantragen, ihre Steuern zu zahlen, ihre Rezepte abzuholen, internationale Grenzen zu ĂŒberschreiten, Unternehmen zu grĂŒnden, Arzttermine zu buchen, sich um Stellen zu bewerben und sogar digitale VertrĂ€ge online zu unterzeichnen.
**All diese Daten wĂŒrden auf ihrem Mobiltelefon gespeichert und mit den Regierungen** von neunzehn LĂ€ndern (plus der Ukraine) sowie ĂŒber 140 anderen öffentlichen und privaten Partnern ausgetauscht. Von der Deutschen Bank ĂŒber das ukrainische Ministerium fĂŒr digitalen Fortschritt bis hin zu Samsung Europe. Unternehmen und Behörden wĂŒrden auf diese Daten im Backend zugreifen, um «automatisierte HintergrundprĂŒfungen» durchzufĂŒhren.
**Der Bundesverband der Verbraucherzentralen und VerbraucherverbĂ€nde** (VZBV) habe Bedenken geĂ€uĂert, dass eine solche App «Risiken fĂŒr den Schutz der PrivatsphĂ€re und der Daten» berge, berichtet das Portal. Die einzige Antwort darauf laute: «Richtig, genau dafĂŒr ist sie ja da!»
**Das alles sei keine Hypothese, betont der** ***OffGuardian***. Es sei vielmehr [«Potential»](https://www.digital-identity-wallet.eu/about-us/140-public-and-private-partners/). Damit ist ein EU-Projekt gemeint, in dessen Rahmen Dutzende öffentliche und private Einrichtungen zusammenarbeiten, «um eine einheitliche Vision der digitalen IdentitĂ€t fĂŒr die BĂŒrger der europĂ€ischen LĂ€nder zu definieren». Dies ist nur eines der groĂ angelegten [Pilotprojekte](https://ec.europa.eu/digital-building-blocks/sites/display/EUDIGITALIDENTITYWALLET/What+are+the+Large+Scale+Pilot+Projects), mit denen Prototypen und AnwendungsfĂ€lle fĂŒr die EUDI-Wallet getestet werden. Es gibt noch mindestens drei weitere.
**Den Ball der digitalen ID-Systeme habe die Covid-«Pandemie»** ĂŒber die «ImpfpĂ€sse» ins Rollen gebracht. Seitdem habe das Thema an Schwung verloren. Je nĂ€her wir aber der vollstĂ€ndigen EinfĂŒhrung der EUid kĂ€men, desto mehr Propaganda der Art «Warum wir eine digitale Brieftasche brauchen» könnten wir in den Mainstream-Medien erwarten, prognostiziert der *OffGuardian*. Vielleicht mĂŒssten wir schon nach dem nĂ€chsten groĂen «Grund», dem nĂ€chsten «katastrophalen katalytischen Ereignis» Ausschau halten. Vermutlich gebe es bereits PlĂ€ne, warum die Menschen plötzlich eine digitale ID-Brieftasche brauchen wĂŒrden.
**Die Entwicklung geht jedenfalls stetig weiter in genau diese Richtung.** Beispielsweise hat Jordanien angekĂŒndigt, die digitale biometrische ID bei den nĂ€chsten [Wahlen](https://www.biometricupdate.com/202502/jordan-plans-digital-id-for-voter-verification-in-next-election) zur Verifizierung der WĂ€hler einzufĂŒhren. Man wolle «den Papierkrieg beenden und sicherstellen, dass die gesamte Kette bis zu den nĂ€chsten Parlamentswahlen digitalisiert wird», heiĂt es. Absehbar ist, dass dabei einige Wahlberechtigte «auf der Strecke bleiben» werden, wie im Fall von [Albanien](https://transition-news.org/albanien-schliesst-120-000-burger-ohne-biometrische-ausweise-von-wahlen-aus) geschehen.
**Derweil wĂŒrden die Briten gerne ihre PrivatsphĂ€re gegen Effizienz eintauschen,** [behauptet](https://www.lbc.co.uk/news/tony-blair-id-cards/) Tony Blair. Der Ex-Premier drĂ€ngte kĂŒrzlich erneut auf digitale IdentitĂ€ten und Gesichtserkennung. Blair ist GrĂŒnder einer [Denkfabrik](https://transition-news.org/blair-institute-durch-vermarktung-von-patientendaten-zu-ki-gestutztem) fĂŒr globalen Wandel, AnhĂ€nger globalistischer Technokratie und [«moderner Infrastruktur»](https://transition-news.org/tony-blair-digitale-id-fur-moderne-infrastruktur-unerlasslich-erfordert-aber).
**AbschlieĂend warnt der** ***OffGuardian*** **vor der Illusion, Trump und Musk wĂŒrden** den US-BĂŒrgern «diesen Schlamassel ersparen». Das Department of Government Efficiency werde sich auf die digitale IdentitĂ€t stĂŒrzen. Was könne schlieĂlich «effizienter» sein als eine einzige App, die fĂŒr alles verwendet wird? Der Unterschied bestehe nur darin, dass die US-Version vielleicht eher privat als öffentlich sei â sofern es da ĂŒberhaupt noch einen wirklichen Unterschied gebe.
*\[Titelbild: Screenshot* *[OffGuardian](https://off-guardian.org/2025/02/26/coming-soon-the-european-digital-identity-wallet/)]*
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/demnachst-verfugbar-die-europaische-brieftasche-fur-digitale-identitaten)*** erschienen.
-

@ 04c915da:3dfbecc9
2025-03-25 17:43:44
One of the most common criticisms leveled against nostr is the perceived lack of assurance when it comes to data storage. Critics argue that without a centralized authority guaranteeing that all data is preserved, important information will be lost. They also claim that running a relay will become prohibitively expensive. While there is truth to these concerns, they miss the mark. The genius of nostr lies in its flexibility, resilience, and the way it harnesses human incentives to ensure data availability in practice.
A nostr relay is simply a server that holds cryptographically verifiable signed data and makes it available to others. Relays are simple, flexible, open, and require no permission to run. Critics are right that operating a relay attempting to store all nostr data will be costly. What they miss is that most will not run all encompassing archive relays. Nostr does not rely on massive archive relays. Instead, anyone can run a relay and choose to store whatever subset of data they want. This keeps costs low and operations flexible, making relay operation accessible to all sorts of individuals and entities with varying use cases.
Critics are correct that there is no ironclad guarantee that every piece of data will always be available. Unlike bitcoin where data permanence is baked into the system at a steep cost, nostr does not promise that every random note or meme will be preserved forever. That said, in practice, any data perceived as valuable by someone will likely be stored and distributed by multiple entities. If something matters to someone, they will keep a signed copy.
Nostr is the Streisand Effect in protocol form. The Streisand effect is when an attempt to suppress information backfires, causing it to spread even further. With nostr, anyone can broadcast signed data, anyone can store it, and anyone can distribute it. Try to censor something important? Good luck. The moment it catches attention, it will be stored on relays across the globe, copied, and shared by those who find it worth keeping. Data deemed important will be replicated across servers by individuals acting in their own interest.
Nostrâs distributed nature ensures that the system does not rely on a single point of failure or a corporate overlord. Instead, it leans on the collective will of its users. The result is a network where costs stay manageable, participation is open to all, and valuable verifiable data is stored and distributed forever.
-

@ df173277:4ec96708
2025-01-28 17:49:54
> Maple is an AI chat tool that allows you to have private conversations with a general-purpose AI assistant. Chats are synced automatically between devices so you can pick up where you left off.\
> [Start chatting for free.](https://trymaple.ai/)
We are excited to announce that [Maple AI](https://trymaple.ai/), our groundbreaking end-to-end encrypted AI chat app built on OpenSecret, is now publicly available. After months of beta testing, we are thrilled to bring this innovative technology to the world.
Maple is an AI chat tool that allows you to have private conversations with a general-purpose AI assistant. It can boost your productivity on work tasks such as writing documentation, creating presentations, and drafting emails. You can also use it for personal items like brainstorming ideas, sorting out life's challenges, and tutoring you on difficult coursework. All your chats are synced automatically in a secure way, so you can start on one device and pick up where you left off on another.
#### Why Secure and Private AI?
In today's digital landscape, it is increasingly evident that security and privacy are essential for individuals and organizations alike. Unfortunately, the current state of AI tools falls short. A staggering 48% of organizations enter non-public company information into AI apps, according to a [recent report by Cisco](https://www.cisco.com/c/en/us/about/trust-center/data-privacy-benchmark-study.html#~key-findings). This practice poses significant risks to company security and intellectual property.
Another concern is for journalists, who often work with sensitive information in hostile environments. Journalists need verification that their information remains confidential and protected when researching topics and communicating with sources in various languages. They are left to use underpowered local AI or input their data into potentially compromised cloud services.
At OpenSecret, we believe it is possible to have both the benefits of AI and the assurance of security and privacy. That's why we created Maple, an app that combines AI productivity with the protection of end-to-end encryption. Our platform ensures that your conversations with AI remain confidential, even from us. The power of the cloud meets the privacy of local.
#### How Does It Work?
Our server code is [open source](https://github.com/OpenSecretCloud/opensecret), and we use confidential computing to provide cryptographic proof that the code running on our servers is the same as the open-source code available for review. This process allows you to verify that your conversations are handled securely and privately without relying on trust. We live by the principle of "Don't trust, verify," and we believe this approach is essential for building in the digital age. You can read a more in-depth write-up on our technology later this week on this site.
#### How Much Does It Cost?
We are committed to making Maple AI accessible to everyone, so we offer a range of pricing plans to suit different needs and budgets. [Our Free plan allows for 10 chats per week, while our Starter plan ($5.99/month) and Pro plan ($20/month)](https://trymaple.ai/pricing) offer more comprehensive solutions for individuals and organizations with heavier workloads. We accept credit cards and Bitcoin (10% discount), allowing you to choose your preferred payment method.
- Free: $0
- Starter: $5.99/month
- Pro: $20/month
Our goal with Maple AI is to create a product that is secure through transparency. By combining open-source code, cryptography, and confidential computing, we can create a new standard for AI conversations - one that prioritizes your security and privacy.
Maple has quickly become a daily tool of productivity for our own work and those of our beta testers. We believe it will bring value to you as well. [Sign up now and start chatting privately with AI for free.](https://trymaple.ai/) Your secrets are safe in the open.
#### Are You An App Developer?
You can build an app like Maple. [OpenSecret provides secure auth, private key management, encrypted data sync, private AI, and more.](https://blog.opensecret.cloud/introducing-opensecret/) Our straightforward API behaves like other backends but automatically adds security and privacy. Use it to secure existing apps or brand-new projects. Protect yourself and your users from the liability of hosting personal data by checking out [OpenSecret](https://opensecret.cloud/).
<img src="https://blossom.primal.net/feb746d5e164e89f0d015646286b88237dce4158f8985e3caaf7e427cebde608.png">
Enjoy private AI Chat đ€
<img src="https://blossom.primal.net/0594ec56e249de2754ea7dfc225a7ebd46bc298b5af168279ce71f17c2afada0.jpg">
-

@ f7d424b5:618c51e8
2025-03-23 18:53:39
A few days ago, on March 20th 2025 one of the most important releases of the year in video games has taken place - Xenoblade Chronicles X! A few other games came out too and we'll talk about those this time while @Dielan@shitposter.world has time to get through the new Xenoblade.
Some links to stuff we talked about:
- [EA Open Source & GPL'd C&C](https://github.com/electronicarts/)
- [Lying VAs called out by SC](https://x.com/SoundCadence/status/1899850086999588877)
- [PC gamer said something reasonable for once re: asscreed](https://www.pcgamer.com/games/assassins-creed/assassins-creed-shadows-has-convinced-me-that-ubisoft-will-never-make-a-good-rpg/)
Obligatory:
- [Listen to the new episode here!](https://melonmancy.net/listen)
- [Discuss this episode on OUR NEW FORUM](https://melonmancy.cafe/d/105-mp103-final-earnings-call)
- [Get the RSS and Subscribe](https://feeds.rssblue.com/melonmancy-podcast) (this is a new feed URL, but the old one redirects here too!)
- Get a modern podcast app to use that RSS feed on at [newpodcastapps.com](http://newpodcastapps.com/)
- Or listen to the show on [the forum](https://melonmancy.cafe) using the embedded [Podverse](https://podverse.fm) player!
- [Send your complaints here](https://melonmancy.net/contact-us)
Reminder that this is a [Value4Value](https://value4value.info/) podcast so any support you can give us via a modern podcasting app is greatly appreciated and we will never bow to corporate sponsors!
-

@ fd06f542:8d6d54cd
2025-03-28 02:21:20
# NIPs
NIPs stand for **Nostr Implementation Possibilities**.
They exist to document what may be implemented by [Nostr](https://github.com/nostr-protocol/nostr)-compatible _relay_ and _client_ software.
---
- [List](#list)
- [Event Kinds](#event-kinds)
- [Message Types](#message-types)
- [Client to Relay](#client-to-relay)
- [Relay to Client](#relay-to-client)
- [Standardized Tags](#standardized-tags)
- [Criteria for acceptance of NIPs](#criteria-for-acceptance-of-nips)
- [Is this repository a centralizing factor?](#is-this-repository-a-centralizing-factor)
- [How this repository works](#how-this-repository-works)
- [Breaking Changes](#breaking-changes)
- [License](#license)
---
## List
- [NIP-01: Basic protocol flow description](01.md)
- [NIP-02: Follow List](02.md)
- [NIP-03: OpenTimestamps Attestations for Events](03.md)
- [NIP-04: Encrypted Direct Message](04.md) --- **unrecommended**: deprecated in favor of [NIP-17](17.md)
- [NIP-05: Mapping Nostr keys to DNS-based internet identifiers](05.md)
- [NIP-06: Basic key derivation from mnemonic seed phrase](06.md)
- [NIP-07: `window.nostr` capability for web browsers](07.md)
- [NIP-08: Handling Mentions](08.md) --- **unrecommended**: deprecated in favor of [NIP-27](27.md)
- [NIP-09: Event Deletion Request](09.md)
- [NIP-10: Text Notes and Threads](10.md)
- [NIP-11: Relay Information Document](11.md)
- [NIP-13: Proof of Work](13.md)
- [NIP-14: Subject tag in text events](14.md)
- [NIP-15: Nostr Marketplace (for resilient marketplaces)](15.md)
- [NIP-17: Private Direct Messages](17.md)
- [NIP-18: Reposts](18.md)
- [NIP-19: bech32-encoded entities](19.md)
- [NIP-21: `nostr:` URI scheme](21.md)
- [NIP-22: Comment](22.md)
- [NIP-23: Long-form Content](23.md)
- [NIP-24: Extra metadata fields and tags](24.md)
- [NIP-25: Reactions](25.md)
- [NIP-26: Delegated Event Signing](26.md)
- [NIP-27: Text Note References](27.md)
- [NIP-28: Public Chat](28.md)
- [NIP-29: Relay-based Groups](29.md)
- [NIP-30: Custom Emoji](30.md)
- [NIP-31: Dealing with Unknown Events](31.md)
- [NIP-32: Labeling](32.md)
- [NIP-34: `git` stuff](34.md)
- [NIP-35: Torrents](35.md)
- [NIP-36: Sensitive Content](36.md)
- [NIP-37: Draft Events](37.md)
- [NIP-38: User Statuses](38.md)
- [NIP-39: External Identities in Profiles](39.md)
- [NIP-40: Expiration Timestamp](40.md)
- [NIP-42: Authentication of clients to relays](42.md)
- [NIP-44: Encrypted Payloads (Versioned)](44.md)
- [NIP-45: Counting results](45.md)
- [NIP-46: Nostr Remote Signing](46.md)
- [NIP-47: Nostr Wallet Connect](47.md)
- [NIP-48: Proxy Tags](48.md)
- [NIP-49: Private Key Encryption](49.md)
- [NIP-50: Search Capability](50.md)
- [NIP-51: Lists](51.md)
- [NIP-52: Calendar Events](52.md)
- [NIP-53: Live Activities](53.md)
- [NIP-54: Wiki](54.md)
- [NIP-55: Android Signer Application](55.md)
- [NIP-56: Reporting](56.md)
- [NIP-57: Lightning Zaps](57.md)
- [NIP-58: Badges](58.md)
- [NIP-59: Gift Wrap](59.md)
- [NIP-60: Cashu Wallet](60.md)
- [NIP-61: Nutzaps](61.md)
- [NIP-62: Request to Vanish](62.md)
- [NIP-64: Chess (PGN)](64.md)
- [NIP-65: Relay List Metadata](65.md)
- [NIP-66: Relay Discovery and Liveness Monitoring](66.md)
- [NIP-68: Picture-first feeds](68.md)
- [NIP-69: Peer-to-peer Order events](69.md)
- [NIP-70: Protected Events](70.md)
- [NIP-71: Video Events](71.md)
- [NIP-72: Moderated Communities](72.md)
- [NIP-73: External Content IDs](73.md)
- [NIP-75: Zap Goals](75.md)
- [NIP-78: Application-specific data](78.md)
- [NIP-84: Highlights](84.md)
- [NIP-86: Relay Management API](86.md)
- [NIP-88: Polls](88.md)
- [NIP-89: Recommended Application Handlers](89.md)
- [NIP-90: Data Vending Machines](90.md)
- [NIP-92: Media Attachments](92.md)
- [NIP-94: File Metadata](94.md)
- [NIP-96: HTTP File Storage Integration](96.md)
- [NIP-98: HTTP Auth](98.md)
- [NIP-99: Classified Listings](99.md)
- [NIP-7D: Threads](7D.md)
- [NIP-C7: Chats](C7.md)
## Event Kinds
| kind | description | NIP |
| ------------- | ------------------------------- | -------------------------------------- |
| `0` | User Metadata | [01](01.md) |
| `1` | Short Text Note | [10](10.md) |
| `2` | Recommend Relay | 01 (deprecated) |
| `3` | Follows | [02](02.md) |
| `4` | Encrypted Direct Messages | [04](04.md) |
| `5` | Event Deletion Request | [09](09.md) |
| `6` | Repost | [18](18.md) |
| `7` | Reaction | [25](25.md) |
| `8` | Badge Award | [58](58.md) |
| `9` | Chat Message | [C7](C7.md) |
| `10` | Group Chat Threaded Reply | 29 (deprecated) |
| `11` | Thread | [7D](7D.md) |
| `12` | Group Thread Reply | 29 (deprecated) |
| `13` | Seal | [59](59.md) |
| `14` | Direct Message | [17](17.md) |
| `15` | File Message | [17](17.md) |
| `16` | Generic Repost | [18](18.md) |
| `17` | Reaction to a website | [25](25.md) |
| `20` | Picture | [68](68.md) |
| `21` | Video Event | [71](71.md) |
| `22` | Short-form Portrait Video Event | [71](71.md) |
| `30` | internal reference | [NKBIP-03] |
| `31` | external web reference | [NKBIP-03] |
| `32` | hardcopy reference | [NKBIP-03] |
| `33` | prompt reference | [NKBIP-03] |
| `40` | Channel Creation | [28](28.md) |
| `41` | Channel Metadata | [28](28.md) |
| `42` | Channel Message | [28](28.md) |
| `43` | Channel Hide Message | [28](28.md) |
| `44` | Channel Mute User | [28](28.md) |
| `62` | Request to Vanish | [62](62.md) |
| `64` | Chess (PGN) | [64](64.md) |
| `818` | Merge Requests | [54](54.md) |
| `1018` | Poll Response | [88](88.md) |
| `1021` | Bid | [15](15.md) |
| `1022` | Bid confirmation | [15](15.md) |
| `1040` | OpenTimestamps | [03](03.md) |
| `1059` | Gift Wrap | [59](59.md) |
| `1063` | File Metadata | [94](94.md) |
| `1068` | Poll | [88](88.md) |
| `1111` | Comment | [22](22.md) |
| `1311` | Live Chat Message | [53](53.md) |
| `1617` | Patches | [34](34.md) |
| `1621` | Issues | [34](34.md) |
| `1622` | Git Replies (deprecated) | [34](34.md) |
| `1630`-`1633` | Status | [34](34.md) |
| `1971` | Problem Tracker | [nostrocket][nostrocket] |
| `1984` | Reporting | [56](56.md) |
| `1985` | Label | [32](32.md) |
| `1986` | Relay reviews | |
| `1987` | AI Embeddings / Vector lists | [NKBIP-02] |
| `2003` | Torrent | [35](35.md) |
| `2004` | Torrent Comment | [35](35.md) |
| `2022` | Coinjoin Pool | [joinstr][joinstr] |
| `4550` | Community Post Approval | [72](72.md) |
| `5000`-`5999` | Job Request | [90](90.md) |
| `6000`-`6999` | Job Result | [90](90.md) |
| `7000` | Job Feedback | [90](90.md) |
| `7374` | Reserved Cashu Wallet Tokens | [60](60.md) |
| `7375` | Cashu Wallet Tokens | [60](60.md) |
| `7376` | Cashu Wallet History | [60](60.md) |
| `9000`-`9030` | Group Control Events | [29](29.md) |
| `9041` | Zap Goal | [75](75.md) |
| `9321` | Nutzap | [61](61.md) |
| `9467` | Tidal login | [Tidal-nostr] |
| `9734` | Zap Request | [57](57.md) |
| `9735` | Zap | [57](57.md) |
| `9802` | Highlights | [84](84.md) |
| `10000` | Mute list | [51](51.md) |
| `10001` | Pin list | [51](51.md) |
| `10002` | Relay List Metadata | [65](65.md), [51](51.md) |
| `10003` | Bookmark list | [51](51.md) |
| `10004` | Communities list | [51](51.md) |
| `10005` | Public chats list | [51](51.md) |
| `10006` | Blocked relays list | [51](51.md) |
| `10007` | Search relays list | [51](51.md) |
| `10009` | User groups | [51](51.md), [29](29.md) |
| `10013` | Private event relay list | [37](37.md) |
| `10015` | Interests list | [51](51.md) |
| `10019` | Nutzap Mint Recommendation | [61](61.md) |
| `10030` | User emoji list | [51](51.md) |
| `10050` | Relay list to receive DMs | [51](51.md), [17](17.md) |
| `10063` | User server list | [Blossom][blossom] |
| `10096` | File storage server list | [96](96.md) |
| `10166` | Relay Monitor Announcement | [66](66.md) |
| `13194` | Wallet Info | [47](47.md) |
| `17375` | Cashu Wallet Event | [60](60.md) |
| `21000` | Lightning Pub RPC | [Lightning.Pub][lnpub] |
| `22242` | Client Authentication | [42](42.md) |
| `23194` | Wallet Request | [47](47.md) |
| `23195` | Wallet Response | [47](47.md) |
| `24133` | Nostr Connect | [46](46.md) |
| `24242` | Blobs stored on mediaservers | [Blossom][blossom] |
| `27235` | HTTP Auth | [98](98.md) |
| `30000` | Follow sets | [51](51.md) |
| `30001` | Generic lists | 51 (deprecated) |
| `30002` | Relay sets | [51](51.md) |
| `30003` | Bookmark sets | [51](51.md) |
| `30004` | Curation sets | [51](51.md) |
| `30005` | Video sets | [51](51.md) |
| `30007` | Kind mute sets | [51](51.md) |
| `30008` | Profile Badges | [58](58.md) |
| `30009` | Badge Definition | [58](58.md) |
| `30015` | Interest sets | [51](51.md) |
| `30017` | Create or update a stall | [15](15.md) |
| `30018` | Create or update a product | [15](15.md) |
| `30019` | Marketplace UI/UX | [15](15.md) |
| `30020` | Product sold as an auction | [15](15.md) |
| `30023` | Long-form Content | [23](23.md) |
| `30024` | Draft Long-form Content | [23](23.md) |
| `30030` | Emoji sets | [51](51.md) |
| `30040` | Curated Publication Index | [NKBIP-01] |
| `30041` | Curated Publication Content | [NKBIP-01] |
| `30063` | Release artifact sets | [51](51.md) |
| `30078` | Application-specific Data | [78](78.md) |
| `30166` | Relay Discovery | [66](66.md) |
| `30267` | App curation sets | [51](51.md) |
| `30311` | Live Event | [53](53.md) |
| `30315` | User Statuses | [38](38.md) |
| `30388` | Slide Set | [Corny Chat][cornychat-slideset] |
| `30402` | Classified Listing | [99](99.md) |
| `30403` | Draft Classified Listing | [99](99.md) |
| `30617` | Repository announcements | [34](34.md) |
| `30618` | Repository state announcements | [34](34.md) |
| `30818` | Wiki article | [54](54.md) |
| `30819` | Redirects | [54](54.md) |
| `31234` | Draft Event | [37](37.md) |
| `31388` | Link Set | [Corny Chat][cornychat-linkset] |
| `31890` | Feed | [NUD: Custom Feeds][NUD: Custom Feeds] |
| `31922` | Date-Based Calendar Event | [52](52.md) |
| `31923` | Time-Based Calendar Event | [52](52.md) |
| `31924` | Calendar | [52](52.md) |
| `31925` | Calendar Event RSVP | [52](52.md) |
| `31989` | Handler recommendation | [89](89.md) |
| `31990` | Handler information | [89](89.md) | |
| `32267` | Software Application | | |
| `34550` | Community Definition | [72](72.md) |
| `38383` | Peer-to-peer Order events | [69](69.md) |
| `39000-9` | Group metadata events | [29](29.md) |
[NUD: Custom Feeds]: https://wikifreedia.xyz/cip-01/
[nostrocket]: https://github.com/nostrocket/NIPS/blob/main/Problems.md
[lnpub]: https://github.com/shocknet/Lightning.Pub/blob/master/proto/autogenerated/client.md
[cornychat-slideset]: https://cornychat.com/datatypes#kind30388slideset
[cornychat-linkset]: https://cornychat.com/datatypes#kind31388linkset
[joinstr]: https://gitlab.com/1440000bytes/joinstr/-/blob/main/NIP.md
[NKBIP-01]: https://wikistr.com/nkbip-01*fd208ee8c8f283780a9552896e4823cc9dc6bfd442063889577106940fd927c1
[NKBIP-02]: https://wikistr.com/nkbip-02*fd208ee8c8f283780a9552896e4823cc9dc6bfd442063889577106940fd927c1
[NKBIP-03]: https://wikistr.com/nkbip-03*fd208ee8c8f283780a9552896e4823cc9dc6bfd442063889577106940fd927c1
[blossom]: https://github.com/hzrd149/blossom
[Tidal-nostr]: https://wikistr.com/tidal-nostr
## Message types
### Client to Relay
| type | description | NIP |
| ------- | --------------------------------------------------- | ----------- |
| `EVENT` | used to publish events | [01](01.md) |
| `REQ` | used to request events and subscribe to new updates | [01](01.md) |
| `CLOSE` | used to stop previous subscriptions | [01](01.md) |
| `AUTH` | used to send authentication events | [42](42.md) |
| `COUNT` | used to request event counts | [45](45.md) |
### Relay to Client
| type | description | NIP |
| -------- | ------------------------------------------------------- | ----------- |
| `EOSE` | used to notify clients all stored events have been sent | [01](01.md) |
| `EVENT` | used to send events requested to clients | [01](01.md) |
| `NOTICE` | used to send human-readable messages to clients | [01](01.md) |
| `OK` | used to notify clients if an EVENT was successful | [01](01.md) |
| `CLOSED` | used to notify clients that a REQ was ended and why | [01](01.md) |
| `AUTH` | used to send authentication challenges | [42](42.md) |
| `COUNT` | used to send requested event counts to clients | [45](45.md) |
## Standardized Tags
| name | value | other parameters | NIP |
| ----------------- | ------------------------------------ | ------------------------------- | -------------------------------------------------- |
| `a` | coordinates to an event | relay URL | [01](01.md) |
| `A` | root address | relay URL | [22](22.md) |
| `d` | identifier | -- | [01](01.md) |
| `e` | event id (hex) | relay URL, marker, pubkey (hex) | [01](01.md), [10](10.md) |
| `E` | root event id | relay URL | [22](22.md) |
| `f` | currency code | -- | [69](69.md) |
| `g` | geohash | -- | [52](52.md) |
| `h` | group id | -- | [29](29.md) |
| `i` | external identity | proof, url hint | [35](35.md), [39](39.md), [73](73.md) |
| `I` | root external identity | -- | [22](22.md) |
| `k` | kind | -- | [18](18.md), [25](25.md), [72](72.md), [73](73.md) |
| `K` | root scope | -- | [22](22.md) |
| `l` | label, label namespace | -- | [32](32.md) |
| `L` | label namespace | -- | [32](32.md) |
| `m` | MIME type | -- | [94](94.md) |
| `p` | pubkey (hex) | relay URL, petname | [01](01.md), [02](02.md), [22](22.md) |
| `P` | pubkey (hex) | -- | [22](22.md), [57](57.md) |
| `q` | event id (hex) | relay URL, pubkey (hex) | [18](18.md) |
| `r` | a reference (URL, etc) | -- | [24](24.md), [25](25.md) |
| `r` | relay url | marker | [65](65.md) |
| `s` | status | -- | [69](69.md) |
| `t` | hashtag | -- | [24](24.md), [34](34.md), [35](35.md) |
| `u` | url | -- | [61](61.md), [98](98.md) |
| `x` | hash | -- | [35](35.md), [56](56.md) |
| `y` | platform | -- | [69](69.md) |
| `z` | order number | -- | [69](69.md) |
| `-` | -- | -- | [70](70.md) |
| `alt` | summary | -- | [31](31.md) |
| `amount` | millisatoshis, stringified | -- | [57](57.md) |
| `bolt11` | `bolt11` invoice | -- | [57](57.md) |
| `challenge` | challenge string | -- | [42](42.md) |
| `client` | name, address | relay URL | [89](89.md) |
| `clone` | git clone URL | -- | [34](34.md) |
| `content-warning` | reason | -- | [36](36.md) |
| `delegation` | pubkey, conditions, delegation token | -- | [26](26.md) |
| `description` | description | -- | [34](34.md), [57](57.md), [58](58.md) |
| `emoji` | shortcode, image URL | -- | [30](30.md) |
| `encrypted` | -- | -- | [90](90.md) |
| `expiration` | unix timestamp (string) | -- | [40](40.md) |
| `file` | full path (string) | -- | [35](35.md) |
| `goal` | event id (hex) | relay URL | [75](75.md) |
| `image` | image URL | dimensions in pixels | [23](23.md), [52](52.md), [58](58.md) |
| `imeta` | inline metadata | -- | [92](92.md) |
| `lnurl` | `bech32` encoded `lnurl` | -- | [57](57.md) |
| `location` | location string | -- | [52](52.md), [99](99.md) |
| `name` | name | -- | [34](34.md), [58](58.md), [72](72.md) |
| `nonce` | random | difficulty | [13](13.md) |
| `preimage` | hash of `bolt11` invoice | -- | [57](57.md) |
| `price` | price | currency, frequency | [99](99.md) |
| `proxy` | external ID | protocol | [48](48.md) |
| `published_at` | unix timestamp (string) | -- | [23](23.md) |
| `relay` | relay url | -- | [42](42.md), [17](17.md) |
| `relays` | relay list | -- | [57](57.md) |
| `server` | file storage server url | -- | [96](96.md) |
| `subject` | subject | -- | [14](14.md), [17](17.md), [34](34.md) |
| `summary` | summary | -- | [23](23.md), [52](52.md) |
| `thumb` | badge thumbnail | dimensions in pixels | [58](58.md) |
| `title` | article title | -- | [23](23.md) |
| `tracker` | torrent tracker URL | -- | [35](35.md) |
| `web` | webpage URL | -- | [34](34.md) |
| `zap` | pubkey (hex), relay URL | weight | [57](57.md) |
Please update these lists when proposing new NIPs.
## Criteria for acceptance of NIPs
1. They should be fully implemented in at least two clients and one relay -- when applicable.
2. They should make sense.
3. They should be optional and backwards-compatible: care must be taken such that clients and relays that choose to not implement them do not stop working when interacting with the ones that choose to.
4. There should be no more than one way of doing the same thing.
5. Other rules will be made up when necessary.
## Is this repository a centralizing factor?
To promote interoperability, we need standards that everybody can follow, and we need them to define a **single way of doing each thing** without ever hurting **backwards-compatibility**, and for that purpose there is no way around getting everybody to agree on the same thing and keep a centralized index of these standards. However the fact that such an index exists doesn't hurt the decentralization of Nostr. _At any point the central index can be challenged if it is failing to fulfill the needs of the protocol_ and it can migrate to other places and be maintained by other people.
It can even fork into multiple versions, and then some clients would go one way, others would go another way, and some clients would adhere to both competing standards. This would hurt the simplicity, openness and interoperability of Nostr a little, but everything would still work in the short term.
There is a list of notable Nostr software developers who have commit access to this repository, but that exists mostly for practical reasons, as by the nature of the thing we're dealing with the repository owner can revoke membership and rewrite history as they want -- and if these actions are unjustified or perceived as bad or evil the community must react.
## How this repository works
Standards may emerge in two ways: the first way is that someone starts doing something, then others copy it; the second way is that someone has an idea of a new standard that could benefit multiple clients and the protocol in general without breaking **backwards-compatibility** and the principle of having **a single way of doing things**, then they write that idea and submit it to this repository, other interested parties read it and give their feedback, then once most people reasonably agree we codify that in a NIP which client and relay developers that are interested in the feature can proceed to implement.
These two ways of standardizing things are supported by this repository. Although the second is preferred, an effort will be made to codify standards emerged outside this repository into NIPs that can be later referenced and easily understood and implemented by others -- but obviously as in any human system discretion may be applied when standards are considered harmful.
## Breaking Changes
[Breaking Changes](BREAKING.md)
## License
All NIPs are public domain.
## Contributors
<a align="center" href="https://github.com/nostr-protocol/nips/graphs/contributors">
<img src="https://contrib.rocks/image?repo=nostr-protocol/nips" />
</a>
-

@ 57d1a264:69f1fee1
2025-03-27 08:27:44
> The tech industry and its press have treated the rise of billion-scale social networks and ubiquitous smartphone apps as an unadulterated win for regular people, a triumph of usability and empowerment. They seldom talk about what weâve lost along the way in this transition, and I find that younger folks may not even know how the web used to be.
`â Anil Dash, The Web We Lost, 13 Dec 2012`
https://www.youtube.com/watch?v=9KKMnoTTHJk&t=156s
So hereâs a few glimpses of a web thatâs mostly faded away: https://www.anildash.com/2012/12/13/the_web_we_lost/
The first step to disabusing them of this notion is for the people creating the next generation of social applications to learn a little bit of history, to know your shit, whether thatâs about [Twitterâs business model](http://web.archive.org/web/20180120013123/http://anildash.com/2010/04/ten-years-of-twitter-ads.html) or [Googleâs social features](http://web.archive.org/web/20170518203228/http://anildash.com/2012/04/why-you-cant-trust-tech-press-to-teach-you-about-the-tech-industry.html) or anything else. We have to know whatâs been tried and failed, what good ideas were simply ahead of their time, and what opportunities have been lost in the current generation of dominant social networks.
originally posted at https://stacker.news/items/926499
-

@ df173277:4ec96708
2025-01-09 17:12:08
> Maple AI combines the best of both worlds â encryption and personal AI â to create a truly private AI experience. Discuss personal and company items with Maple, we can't read them even if we wanted to.\
> [Join the waitlist to get early access.](https://trymaple.ai)
We are a culture of app users. Every day, we give our personal information to websites and apps, hoping they are safe. Location data, eating habits, financial details, and health information are just a few examples of what we entrust to third parties. People are now entering a new era of computing that promises next-level benefits when given even more personal data: AI.
Should we sacrifice our privacy to unlock the productivity gains of AI? Should we hope our information won't be used in ways we disagree? We believe we can have the best of both worlds â privacy and personal AI â and have built a new project called Maple AI. Chat between you and an AI with full end-to-end encryption. We believe it's a game-changer for individuals seeking private and secure conversations.
#### Building a Private Foundation
Maple is built on our flagship product, [OpenSecret](https://opensecret.cloud), a backend platform for app developers that turns private encryption on by default. [The announcement post for OpenSecret explains our vision for an encrypted world and what the platform can do.](nostr:naddr1qvzqqqr4gupzphchxfm3ste32hfhkvczzxapme9gz5qvqtget6tylyd7wa8vjecgqqe5jmn5wfhkgatrd9hxwt20wpjku5m9vdex2apdw35x2tt9de3hy7tsw3jkgttzv93kketwvskhgur5w9nx5h52tpj) We think both users and developers benefit when sensitive personal information is encrypted in a private vault; it's a win-win.
#### The Power of Encrypted AI Chat
AI chat is a personal and intimate experience. It's a place to share your thoughts, feelings, and desires without fear of judgment. The more you share with an AI chatbot, the more powerful it becomes. It can offer personalized insights, suggestions, and guidance tailored to your unique needs and perspectives. However, this intimacy requires trust, and that's where traditional AI chatbots often fall short.
Traditional AI chats are designed to collect and analyze your data, often without your explicit consent. This data is used to improve the AI's performance, but it also creates a treasure trove of sensitive information that can be mined, sold, or even exploited by malicious actors. Maple AI takes a different approach. By using end-to-end encryption, we ensure that your conversations remain private and secure, even from us.
#### Technical Overview
So, how does Maple AI achieve this level of privacy and security? Here are some key technical aspects:
- **Private Key:** Each user has a unique private key that is automatically managed for them. This key encrypts and decrypts conversations, ensuring that only the user can access their data.
- **Secure Servers:** Our servers are designed with security in mind. We use secure enclaves to protect sensitive data and ensure that even our own team can't access your conversations.
- **Encrypted Sync:** One of Maple's most significant benefits is its encrypted sync feature. Unlike traditional AI chatbots, which store conversations in local storage or on standard cloud servers, Maple syncs your chats across all your devices. The private key managed by our secure servers means you can pick up where you left off on any device without worrying about your data being compromised.
- **Attestation and Open Code:** We publish our enclave code publicly. Using a process called attestation, users can verify that the code running on the enclave is the same as the code audited by the public.
- **Open Source LLM:** Maple uses major open-source models to maximize the openness of responses. The chat box does not filter what you can talk about. This transparency ensures that our AI is trustworthy and unbiased.
#### Personal and Work Use
Maple is secure enough to handle your personal questions and work tasks. Because we can't see what you chat about, you are free to use AI as an assistant on sensitive company items. Use it for small tasks like writing an important email or large tasks like developing your organization's strategy. Feed it sensitive information; it's just you and AI in the room. Attestation provides cryptographic proof that your corporate secrets are safe.
#### Local v Cloud
Today's AI tools provide different levels of privacy. The main options are to trust a third party with your unencrypted data, hoping they don't do anything with it, or run your own AI locally on an underpowered machine. We created a third option. Maple gives you the power of cloud computing combined with the privacy and security of a machine running on your desk. It's the best of both worlds.
#### Why the Maple name?
Privacy isn't just a human value - it's a natural one exemplified by the Maple tree. These organisms communicate with each other through a network of underground fungal hyphae, sending messages and sharing resources in a way that's completely invisible to organisms above ground. This discreet communication system allows Maple trees to thrive in even the most challenging environments. Our goal is to provide a way for everyone to communicate with AI securely so they can thrive in any environment.
#### Join the Waitlist
Maple AI will launch in early 2025 with free and paid plans. We can't wait to share it with the world. [Join our waitlist today to be among the first to experience the power of private AI chat.](https://trymaple.ai)
[](https://trymaple.ai/waitlist)
-

@ a95c6243:d345522c
2025-03-01 10:39:35
*StĂ€ndige LĂŒgen und Unterstellungen, permanent falsche FĂŒrsorge* *\
können Bausteine von emotionaler Manipulation sein. Mit dem Zweck,* *\
Macht und Kontrolle ĂŒber eine andere Person auszuĂŒben.* *\
Apotheken Umschau*  
**Irgendetwas muss passiert sein: «Gaslighting» ist gerade Thema** in vielen Medien. Heute bin ich nach lĂ€ngerer Zeit mal wieder ĂŒber dieses Stichwort gestolpert. Das war in einem [Artikel](https://norberthaering.de/propaganda-zensur/dwd-referenzperiode/) von Norbert HĂ€ring ĂŒber Manipulationen des Deutschen Wetterdienstes (DWD). In diesem Fall ging es um eine Pressemitteilung vom Donnerstag zum «viel zu warmen» Winter 2024/25.
**HĂ€ring wirft der Behörde vor, dreist zu lĂŒgen und Dinge auszulassen,** um die Klimaangst wach zu halten. Was der Leser beim DWD nicht erfahre, sei, dass dieser Winter kĂ€lter als die drei vorangegangenen und kĂ€lter als der Durchschnitt der letzten zehn Jahre gewesen sei. Stattdessen werde der falsche Eindruck vermittelt, es wĂŒrde ungebremst immer wĂ€rmer.
**Wem also der zu Ende gehende Winter eher kalt vorgekommen sein sollte,** mit dessen Empfinden stimme wohl etwas nicht. Das jedenfalls wolle der DWD uns einreden, so der Wirtschaftsjournalist. Und damit sind wir beim Thema Gaslighting.
**Als** **[Gaslighting](https://bayern-gegen-gewalt.de/gewalt-infos-und-einblicke/formen-von-gewalt/psychische-gewalt/gaslighting/)** **wird eine Form psychischer Manipulation bezeichnet,** mit der die Opfer desorientiert und zutiefst verunsichert werden, indem ihre eigene Wahrnehmung als falsch bezeichnet wird. Der Prozess fĂŒhrt zu Angst und RealitĂ€tsverzerrung sowie zur Zerstörung des Selbstbewusstseins. Die Bezeichnung kommt von dem britischen TheaterstĂŒck «Gas Light» aus dem Jahr 1938, in dem ein Mann mit grausamen Psychotricks seine Frau in den Wahnsinn treibt.
**Damit Gaslighting funktioniert, muss das Opfer dem TĂ€ter vertrauen.** Oft wird solcher Psychoterror daher im privaten oder familiĂ€ren Umfeld beschrieben, ebenso wie am Arbeitsplatz. Jedoch eignen sich die Prinzipien auch perfekt zur Manipulation der Massen. Vermeintliche AutoritĂ€ten wie Ărzte und Wissenschaftler, oder «der fĂŒrsorgliche Staat» und Institutionen wie die UNO oder die WHO wollen uns doch nichts Böses. Auch Staatsmedien, Faktenchecker und diverse NGOs wurden zu «vertrauenswĂŒrdigen Quellen» erklĂ€rt. Das hat seine Wirkung.
**Warum das Thema Gaslighting derzeit scheinbar so populĂ€r ist,** vermag ich nicht zu sagen. Es sind aber gerade in den letzten Tagen und Wochen auffĂ€llig viele Artikel dazu erschienen, und zwar nicht nur von Psychologen. Die *Frankfurter Rundschau* hat gleich mehrere publiziert, und [AnwĂ€lte](https://www.anwalt.de/rechtstipps/gaslighting-beispiele-anzeichen-strafbarkeit-212449.html) interessieren sich dafĂŒr offenbar genauso wie Apotheker.
**Die** ***Apotheken Umschau*** **machte sogar auf** **[«Medical Gaslighting»](https://archive.is/Wx5YM)** **aufmerksam.** Davon spreche man, wenn Mediziner Symptome nicht ernst nĂ€hmen oder wenn ein gesundheitliches Problem vom behandelnden Arzt «schnöde heruntergespielt» oder abgetan wĂŒrde. Kommt Ihnen das auch irgendwie bekannt vor? Der Begriff sei allerdings irrefĂŒhrend, da er eine manipulierende Absicht unterstellt, die «nicht gewĂ€hrleistet» sei.
**Apropos Gaslighting: Die noch amtierende deutsche Bundesregierung** [meldete](https://www.bundesregierung.de/breg-de/service/newsletter-und-abos/bundesregierung-aktuell/ausgabe-08-2025-februar-28-2336254?view=renderNewsletterHtml) heute, es gelte, «weiter \[sic!] gemeinsam daran zu arbeiten, einen gerechten und dauerhaften Frieden fĂŒr die Ukraine zu erreichen». Die Ukraine, wo sich am Montag «der völkerrechtswidrige Angriffskrieg zum dritten Mal jĂ€hrte», [verteidige](https://transition-news.org/wikileaks-der-westen-wusste-dass-ein-nato-beitritt-der-ukraine-riskant-war) ihr Land und «unsere gemeinsamen Werte».
**Merken Sie etwas? Das DemokratieverstĂ€ndnis mag ja tatsĂ€chlich** inzwischen in beiden LĂ€ndern Ă€hnlich traurig sein. BezĂŒglich FriedensbemĂŒhungen ist meine Wahrnehmung jedoch eine andere. Das muss an meinem GedĂ€chtnis liegen.
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/bitte-nicht-von-gaslichtern-irritieren-lassen)*** erschienen.
-

@ dd664d5e:5633d319
2025-03-21 12:22:36
Men tend to find women attractive, that remind them of the average women they already know, but with more-averaged features. The mid of mids is kween.đž
But, in contradiction to that, they won't consider her highly attractive, unless she has some spectacular, unusual feature. They'll sacrifice some averageness to acquire that novelty. This is why wealthy men (who tend to be highly intelligent -- and therefore particularly inclined to crave novelty because they are easily bored) -- are more likely to have striking-looking wives and girlfriends, rather than conventionally-attractive ones. They are also more-likely to cross ethnic and racial lines, when dating.
Men also seem to each be particularly attracted to specific facial expressions or mimics, which might be an intelligence-similarity test, as persons with higher intelligence tend to have a more-expressive mimic. So, people with similar expressions tend to be on the same wavelength. Facial expessions also give men some sense of perception into womens' inner life, which they otherwise find inscrutable.
Hair color is a big deal (logic says: always go blonde), as is breast-size (bigger is better), and WHR (smaller is better).

-

@ 57d1a264:69f1fee1
2025-03-27 08:11:33
Explore and reimagine programming interfaces beyond text (visual, tactile, spatial).
> _"The most dangerous thought you can have as a creative person is to think you know what you're doing."_
`â Richard Hamming` [^1]
https://www.youtube.com/watch?v=8pTEmbeENF4
For his recent DBX Conference talk, Victor took attendees back to the year 1973, donning the uniform of an IBM systems engineer of the times, delivering his presentation on an overhead projector. The '60s and early '70s were a fertile time for CS ideas, reminds Victor, but even more importantly, it was a time of unfettered thinking, unconstrained by programming dogma, authority, and tradition.

_'The most dangerous thought that you can have as a creative person is to think that you know what you're doing,'_ explains Victor. 'Because once you think you know what you're doing you stop looking around for other ways of doing things and you stop being able to see other ways of doing things. You become blind.' He concludes, 'I think you have to say: _"We don't know what programming is. We don't know what computing is. We don't even know what a computer is."_ And once you truly understand that, and once you truly believe that, then you're free, and you can think anything.'
More details at https://worrydream.com/dbx/
[^1]: Richard Hamming -- [The Art of Doing Science and Engineering, p5](http://worrydream.com/refs/Hamming_1997_-_The_Art_of_Doing_Science_and_Engineering.pdf) (pdf ebook)
originally posted at https://stacker.news/items/926493
-

@ fd06f542:8d6d54cd
2025-03-28 02:14:43
{"coverurl":"https://cdn.nostrcheck.me/fd06f542bc6c06a39881810de917e6c5d277dfb51689a568ad7b7a548d6d54cd/5ad7189d30c9b49aa61652d98ac7853217b7e445f863be09f9745c49df9f514c.webp","title":"Nostr protocol","author":"fiatjaf"}
-

@ 1eb5d2c9:ee9e8d5f
2025-03-31 18:51:27
The majority of bitcoin podcasts are statist propaganda. #40HPW is a wretched meme
nostr:nevent1qqs0ze49sladguehyf4jwhrdmkc2ehdg92587lcf6u6ywqlewlw80tsprdmhxue69uhhg6r9vehhyetnwshxummnw3erztnrdakj7q3qq33jywkl8r0e5g48lvrenxnr3lw59kzrw4e7p0cecslqzwc56eesxpqqqqqqz8ds2ek
-

@ df478ecd:495107a7
2025-03-30 14:54:36
{"pubkey":"50d94fc2d8580c682b071a542f8b1e31a200b0508bab95a33bef0855df281d63","tags":[["r","https:\/\/audit.8333.space\/"],["r","https:\/\/nostr.download\/fa2a38216f7d31b53d8ba47d044e6d0fb42a82d52c8e9bcd87fac49908223b28.mp4"],["imeta","url https:\/\/nostr.download\/fa2a38216f7d31b53d8ba47d044e6d0fb42a82d52c8e9bcd87fac49908223b28.mp4","x fa2a38216f7d31b53d8ba47d044e6d0fb42a82d52c8e9bcd87fac49908223b28","size 24171180","m video\/mp4","dim 672x1504","blurhash [26a-V~qDkIUV?9YD%xu05sDX2Rj9axut6M{^uR%Vyoy?YRjs;t79Pn+%Lof9Lxu%LV[RLNFnnkB","ox fa2a38216f7d31b53d8ba47d044e6d0fb42a82d52c8e9bcd87fac49908223b28","alt "]],"sig":"474b46624cbe9fd45c0f23d56a29c48684be0f88c419ed7c0c95046c36afe40165c04a63863fa5de8d176cb700348dd6e4b837e2b9ad61dd9a13a72a9889dcac","kind":1,"content":"The Cashu Round Robin Auditor is close to reaching 20k transactions to monitor the health of Cashu mints out there.\n\nDonate Ecash from any Cashu mint so it can be audited perpetually. This app sends random Lightning payments between mints. Forever. The sats go in a circle until all is lost to fees or rugs. If a mint fails to pay an invoice, it is marked with a scary red label.\n\nCheck it out: https:\/\/audit.8333.space\/\n\nhttps:\/\/nostr.download\/fa2a38216f7d31b53d8ba47d044e6d0fb42a82d52c8e9bcd87fac49908223b28.mp4","id":"844d79410fe01d0baf095df5fdf16c28945d3d12c1f68abd6fc465d85eb8a9cb","created_at":1743344841}
-

@ 872982aa:8fb54cfe
2025-03-27 05:50:35
NIP-03
======
OpenTimestamps Attestations for Events
--------------------------------------
`draft` `optional`
This NIP defines an event with `kind:1040` that can contain an [OpenTimestamps](https://opentimestamps.org/) proof for any other event:
```json
{
"kind": 1040
"tags": [
["e", <event-id>, <relay-url>],
["alt", "opentimestamps attestation"]
],
"content": <base64-encoded OTS file data>
}
```
- The OpenTimestamps proof MUST prove the referenced `e` event id as its digest.
- The `content` MUST be the full content of an `.ots` file containing at least one Bitcoin attestation. This file SHOULD contain a **single** Bitcoin attestation (as not more than one valid attestation is necessary and less bytes is better than more) and no reference to "pending" attestations since they are useless in this context.
### Example OpenTimestamps proof verification flow
Using [`nak`](https://github.com/fiatjaf/nak), [`jq`](https://jqlang.github.io/jq/) and [`ots`](https://github.com/fiatjaf/ots):
```bash
~> nak req -i e71c6ea722987debdb60f81f9ea4f604b5ac0664120dd64fb9d23abc4ec7c323 wss://nostr-pub.wellorder.net | jq -r .content | ots verify
> using an esplora server at https://blockstream.info/api
- sequence ending on block 810391 is valid
timestamp validated at block [810391]
```
-

@ 6b3780ef:221416c8
2025-03-26 18:42:00
This workshop will guide you through exploring the concepts behind MCP servers and how to deploy them as DVMs in Nostr using DVMCP. By the end, you'll understand how these systems work together and be able to create your own deployments.
## Understanding MCP Systems
MCP (Model Context Protocol) systems consist of two main components that work together:
1. **MCP Server**: The heart of the system that exposes tools, which you can access via the `.listTools()` method.
2. **MCP Client**: The interface that connects to the MCP server and lets you use the tools it offers.
These servers and clients can communicate using different transport methods:
- **Standard I/O (stdio)**: A simple local connection method when your server and client are on the same machine.
- **Server-Sent Events (SSE)**: Uses HTTP to create a communication channel.
For this workshop, we'll use stdio to deploy our server. DVMCP will act as a bridge, connecting to your MCP server as an MCP client, and exposing its tools as a DVM that anyone can call from Nostr.
## Creating (or Finding) an MCP Server
Building an MCP server is simpler than you might think:
1. Create software in any programming language you're comfortable with.
2. Add an MCP library to expose your server's MCP interface.
3. Create an API that wraps around your software's functionality.
Once your server is ready, an MCP client can connect, for example, with `bun index.js`, and then call `.listTools()` to discover what your server can do. This pattern, known as reflection, makes Nostr DVMs and MCP a perfect match since both use JSON, and DVMs can announce and call tools, effectively becoming an MCP proxy.
Alternatively, you can use one of the many existing MCP servers available in various repositories.
For more information about mcp and how to build mcp servers you can visit https://modelcontextprotocol.io/
## Setting Up the Workshop
Let's get hands-on:
First, to follow this workshop you will need Bun. Install it from https://bun.sh/. For Linux and macOS, you can use the installation script:
```
curl -fsSL https://bun.sh/install | bash
```
1. **Choose your MCP server**: You can either create one or use an existing one.
2. **Inspect your server** using the MCP inspector tool:
```bash
npx @modelcontextprotocol/inspector build/index.js arg1 arg2
```
This will:
- Launch a client UI (default: http://localhost:5173)
- Start an MCP proxy server (default: port 3000)
- Pass any additional arguments directly to your server
3. **Use the inspector**: Open the client UI in your browser to connect with your server, list available tools, and test its functionality.
## Deploying with DVMCP
Now for the exciting part â making your MCP server available to everyone on Nostr:
1. Navigate to your MCP server directory.
2. Run without installing (quickest way):
```
npx @dvmcp/bridge
```
3. Or install globally for regular use:
```
npm install -g @dvmcp/bridge
# or
bun install -g @dvmcp/bridge
```
Then run using:
```bash
dvmcp-bridge
```
This will guide you through creating the necessary configuration.
Watch the console logs to confirm successful setup â you'll see your public key and process information, or any issues that need addressing.
For the configuration, you can set the relay as `wss://relay.dvmcp.fun` , or use any other of your preference
## Testing and Integration
1. **Visit [dvmcp.fun](https://dvmcp.fun)** to see your DVM announcement.
2. Call your tools and watch the responses come back.
For production use, consider running dvmcp-bridge as a system service or creating a container for greater reliability and uptime.
## Integrating with LLM Clients
You can also integrate your DVMCP deployment with LLM clients using the discovery package:
1. Install and use the `@dvmcp/discovery` package:
```bash
npx @dvmcp/discovery
```
2. This package acts as an MCP server for your LLM system by:
- Connecting to configured Nostr relays
- Discovering tools from DVMCP servers
- Making them available to your LLM applications
3. Connect to specific servers or providers using these flags:
```bash
# Connect to all DVMCP servers from a provider
npx @dvmcp/discovery --provider npub1...
# Connect to a specific DVMCP server
npx @dvmcp/discovery --server naddr1...
```
Using these flags, you wouldn't need a configuration file. You can find these commands and Claude desktop configuration already prepared for copy and paste at [dvmcp.fun](https://dvmcp.fun).
This feature lets you connect to any DVMCP server using Nostr and integrate it into your client, either as a DVM or in LLM-powered applications.
## Final thoughts
If you've followed this workshop, you now have an MCP server deployed as a Nostr DVM. This means that local resources from the system where the MCP server is running can be accessed through Nostr in a decentralized manner. This capability is powerful and opens up numerous possibilities and opportunities for fun.
You can use this setup for various use cases, including in a controlled/local environment. For instance, you can deploy a relay in your local network that's only accessible within it, exposing all your local MCP servers to anyone connected to the network. This setup can act as a hub for communication between different systems, which could be particularly interesting for applications in home automation or other fields. The potential applications are limitless.
However, it's important to keep in mind that there are security concerns when exposing local resources publicly. You should be mindful of these risks and prioritize security when creating and deploying your MCP servers on Nostr.
Finally, these are new ideas, and the software is still under development. If you have any feedback, please refer to the GitHub repository to report issues or collaborate. DVMCP also has a Signal group you can join. Additionally, you can engage with the community on Nostr using the #dvmcp hashtag.
## Useful Resources
- **Official Documentation**:
- Model Context Protocol: [modelcontextprotocol.org](https://modelcontextprotocol.org)
- DVMCP.fun: [dvmcp.fun](https://dvmcp.fun)
- **Source Code and Development**:
- DVMCP: [github.com/gzuuus/dvmcp](https://github.com/gzuuus/dvmcp)
- DVMCP.fun: [github.com/gzuuus/dvmcpfun](https://github.com/gzuuus/dvmcpfun)
- **MCP Servers and Clients**:
- Smithery AI: [smithery.ai](https://smithery.ai)
- MCP.so: [mcp.so](https://mcp.so)
- Glama AI MCP Servers: [glama.ai/mcp/servers](https://glama.ai/mcp/servers)
- [Signal group](https://signal.group/#CjQKIOgvfFJf8ZFZ1SsMx7teFqNF73sZ9Elaj_v5i6RSjDHmEhA5v69L4_l2dhQfwAm2SFGD)
Happy building!
-

@ df173277:4ec96708
2025-01-09 17:02:52
> OpenSecret is a backend for app developers that turns private encryption on by default. When sensitive data is readable only by the user, it protects both the user and the developer, creating a more free and open internet. We'll be launching in 2025. [Join our waitlist to get early access.](https://opensecret.cloud)
In today's digital age, personal data is both an asset and a liability. With the rise of data breaches and cyber attacks, individuals and companies struggle to protect sensitive information. The consequences of a data breach can be devastating, resulting in financial losses, reputational damage, and compromised user trust. In 2023, the average data breach cost was $5 million, with some resulting in losses of over $1 billion.
Meanwhile, individuals face problems related to identity theft, personal safety, and public embarrassment. Think about the apps on your phone, even the one you're using to read this. How much data have you trusted to other people, and how would it feel if that data were leaked online?
Thankfully, some incredibly talented cypherpunks years ago gave the world cryptography. We can encrypt data, rendering it a secret between two people. So why then do we have data breaches?
> Cryptography at scale is hard.
#### The Cloud
The cloud has revolutionized how we store and process data, but it has limitations. While cloud providers offer encryption, it mainly protects data in transit. Once data is stored in the cloud, it's often encrypted with a shared key, which can be accessed by employees, third-party vendors, or compromised by hackers.
The solution is to generate a personal encryption password for each user, make sure they write it down, and, most importantly, hope they don't lose it. If the password is lost, the data is forever unreadable. That can be overwhelming, leading to low app usage.
> Private key encryption needs a UX upgrade.
## Enter OpenSecret
OpenSecret is a developer platform that enables encryption by default. Our platform provides a suite of security tools for app developers, including private key management, encrypted sync, private AI, and confidential compute.
Every user has a private vault for their data, which means only they can read it. Developers are free to store less sensitive data in a shared manner because there is still a need to aggregate data across the system.

### Private Key Management
Private key management is the superpower that enables personal encryption per user. When each user has a unique private key, their data can be truly private. Typically, using a private key is a challenging experience for the user because they must write down a long autogenerated number or phrase of 12-24 words. If they lose it, their data is gone.
OpenSecret uses secure enclaves to make private keys as easy as an everyday login experience that users are familiar with. Instead of managing a complicated key, the user logs in with an email address or a social media account.
The developer doesn't have to manage private keys and can focus on the app's user experience. The user doesn't have to worry about losing a private key and can jump into using your app.

### Encrypted Sync
With user keys safely managed, we can synchronize user data to every device while maintaining privacy. The user does not need to do complicated things like scanning QR codes from one device to the next. Just log in and go.
The user wins because the data is available on all their devices. The developer wins because only the user can read the data, so it isn't a liability to them.
### Private AI
Artificial intelligence is here and making its way into everything. The true power of AI is unleashed when it can act on personal and company data. The current options are to run your own AI locally on an underpowered machine or to trust a third party with your data, hoping they don't read it or use it for anything.
OpenSecret combines the power of cloud computing with the privacy and security of a machine running on your desk.
**Check out Maple AI**\
Try private AI for yourself! We built an app built with this service called [Maple AI](https://trymaple.ai). It is an AI chat that is 100% private in a verifiable manner. Give it your innermost thoughts or embarrassing ideas; we can't judge you. We built Maple using OpenSecret, which means you have a private key that is automatically managed for you, and your chat history is synchronized to all your devices. [Learn more about Maple AI - Private chat in the announcement post.](https://blog.opensecret.cloud/maple-ai-private-encrypted-chat/)

### Confidential Compute
Confidential computing is a game-changer for data security. It's like the secure hardware that powers Apple Pay and Google Pay on your phone but in the cloud. Users can verify through a process called attestation that their data is handled appropriately. OpenSecret can help you run your own custom app backend code that would benefit from the security of an enclave.
It's the new version of that lock on your web browser. When you see it, you know you're secure.

#### **But do we want our secrets to be open?**
OpenSecret renders a data breach practically useless. If hackers get into the backend, they enter a virtual hallway of locked private vaults. The leaked data would be gibberish, a secret in the open that is unreadable.
On the topic of openness, OpenSecret uses the power of open source to enable trust in the service. We publish our code in the open, and, using attestation, anyone can verify that private data is being handled as expected. This openness also provides developers with a backup option to safely and securely export their data.
> Don't trust, verify.
### **Join the Movement**
We're currently building out OpenSecret, and we invite you to join us on the journey. Our platform can work with your existing stack, and you can pick and choose the features you need. If you want to build apps with encryption enabled, [send us a message to get early access.](https://opensecret.cloud)
Users and companies deserve better encryption and privacy.\
Together, let's make that a reality.
[](https://opensecret.cloud)
-

@ df06d21e:2b23058f
2025-03-20 01:12:40
I'm well on my way into the Bitcoin rabbit hole. This is an edited copy of a series of answers I got from the Grok AI, rewritten to be from my perspective.
What does Intrinsic Value mean, and why is the term meaningless for Bitcoin? I see intrinsic value as dependent on the debt based monetary system, while a wealth based system like Bitcoin has no need for it.
Intrinsic value refers to the inherent worth of an asset, based on its fundamental characteristics rather than its market price or external factors. For traditional assets like stocks or commodities, intrinsic value might be tied to tangible factors â cash flows, utility, or physical properties (e.g., goldâs use in jewelry or industry). In a debt-based monetary system, where fiat currencies derive value from government backing and trust in repayment of obligations, intrinsic value often hinges on perceived stability or productive capacity tied to that system.
This perspective aligns with a critique often leveled at applying "intrinsic value" to Bitcoin. Bitcoin doesnât fit the traditional mold because itâs not a claim on anything tangible (like a bond or stock) nor does it rely on a debt-based framework. Its value isnât rooted in some underlying asset or promise â it emerges directly from scarcity (capped supply of 21 million), decentralization, and network consensus. Critics argue it lacks intrinsic value since it doesnât produce cash flow or have inherent utility beyond what its users assign to it. Supporters, however, flip this: they say its "intrinsic" worth lies in its designâimmutability, censorship resistance, and freedom from central controlâwhich a debt-based system canât replicate.
In a wealth-based system, as I describe Bitcoin, value isnât about backing or intrinsic utility in the classical sense but about trust in the protocol and its adoption. The term "intrinsic value" becomes meaningless here because itâs a relic of frameworks that donât apply â Bitcoinâs worth is extrinsic, network-driven, and speculative in this early stage of adoption, not tied to debt or physicality. Itâs a complete paradigm shift: traditionalists see no "there" there, while proponents see the "there" as the system itself. Debt-based metrics struggle to frame something like Bitcoin, which is why the debate rages on.
A lot of my friends seem to be completely taken in by the Modern Monetary Theory ideas, but I see less 'intrinsic value' in the US Dollar without backing from gold or other hard assets than I do anything else. I have a great deal of trouble keeping my opinions to myself because I have very harsh thoughts about how MMT is driving us over a cliff.
Itâs easy to feel like youâre watching a train wreck in slow motion when you see something like Modern Monetary Theory (MMT) gaining traction, especially if youâre skeptical of fiat systems untethered from hard assets. MMT flips the script on how we used to think about money. It says a government that issues its own currency â like the US with the dollar â canât go broke in the traditional sense because it can always print more to cover its debts. Taxes and borrowing arenât about funding spending; theyâre tools to manage inflation and resource allocation. Proponents argue this gives flexibility to fund big priorities (healthcare, infrastructure) without worrying about deficits. The catch? It leans hard on the idea that the dollarâs value holds because people trust it and use it, not because itâs backed by gold or anything physical.
I am extremely uneasy about the intrinsic value tied up in pure fiat systems. Without a hard anchor like gold, the dollarâs worth feels like itâs floating on faith â faith in the government, the economy, and the global demand for USD as a reserve currency. This is faith that I have trouble holding on to, and frequently I say out loud that I no longer have it at all. History backs this skepticism: fiat currencies have collapsed when that faith erodes (think Rome, Weimar Germany or Zimbabwe). Gold gave a tangible limit when it was supposed to be backing currency; now, itâs just vibes and printer ink. MMT doubles down on this, saying those limits donât matter at all as long as inflation is in check. But I squint at that as well, because I donât see it as being in check. Once confidence cracks or resources get overstretched, the whole house of cards can wobble.
We can step back from the ledge somewhat: the US dollar still has muscle because of its unique position â global trade, oil markets, and military might prop it up, not just MMT cheerleading. Itâs not truly intrinsic in the gold-backed sense, but itâs not pure hot air either. Bitcoin might appeal to you because itâs got a built-in scarcity the dollar lacks, but the dollarâs âvalueâ isnât dead yet â itâs just shifted to a different game board. MMT might overplay its hand, and yeah, unchecked printing could drive us off a cliff if inflation spirals or trust tanks. But itâs not a cliff dive tomorrow â more like a slow grind where the cracks show over time.
I donât have to buy into MMT to see why many of my friends might. Itâs seductive â it promises control over chaos, a way to fix big problems without hard trade-offs. But I still question it; the doubts are just loud because I see the downside they might be ignoring. There are harsh questions that need to be asked. How do we square infinite printing with finite resources? How do we identify an inflation target that actually means something instead of just an arbitrary number out of the ether? The cliffâs there, but weâre not airborne yet.
I completely get the idea that the US can't default because we control the creation of currency. But thinking of the currency as 'money' just seems false to me. The framing of MMT as âmonetary theoryâ is actually genius, but it's a false narrative. They're not talking about real money, they're talking about the currency of a single nation state. And under a debt based monetary system, the problems we see approach slowly until they become unavoidable, and Iâm worried that we're past the point of no return in a lot of what we see.
I donât respond a lot to my friends who support and defend MMT, because my criticisms cut right to the bone, with a lot of frustration behind it. And I donât want to subject them to that, because they will take it personally. I just see such a disconnect between âcurrencyâ and âmoneyâ and MMTâs framing blurs those lines, and itâs slick enough to make people miss the sleight of hand.
MMTâs genius is in its storytelling. It takes the reality of fiat control â Uncle Sam canât default if heâs got the printing press â and spins it into a tale of empowerment. âDeficits donât matter, we can fund everything!â Itâs a heady pitch, especially when people are desperate for solutions. Iâm just calling the bluff: currency isnât money in the deeper sense if itâs just a tool of one nation-state, untethered from anything real. Even if that tool is required by international laws and standards to be at the base of a lot of international trade, itâs still the United States Dollar, not the United Nations Dollar. Money, to me, implies a store of value with some universal backbone â gold, scarcity, something beyond government say-so. MMTâs currency is more like a promissory note with no hard deadline, and thatâs where the falseness creeps in.
The debt-based system adds another layer to my unease. Itâs a slow burn â decades of borrowing, spending, and inflating donât hit like a lightning bolt; they erode quietly until the foundationâs too weak to hold. Iâm seeing cracks â maybe in rising debt-to-GDP, persistent low level inflation that just doesnât end, or the dollarâs slipping grip on global trust â and feeling like weâve crossed a Rubicon. Are we past the point of no return? Thatâs a gut call, but I hope itâs not hard to see why we think we have. Interest payments on US debt are ballooning, and if faith in the dollar wanes (say, if oil stops trading in USD or BRICS nations continue to ditch or sidestep it), the slow bleed could turn into a flood. MMT says âjust print more,â but that only works until the world stops playing along.
There is a counterweight to chew on: the US still has levers other nations donât â military clout, tech dominance, a financial system everyoneâs hooked into. Itâs not âreal moneyâ, but itâs a machine that keeps chugging because too many players are invested in it not crashing. That doesnât make MMT true â it just delays the reckoning Iâm bracing for. How long until the music stops and we have to find chairs? The narrativeâs false if you see money as wealth with intrinsic grit, not just a state-issued IOU. But itâs a lie thatâs worked so far because the systemâs too big to fail fast.
Am I crazy to feel this way? The slow-approach problem is realâdebt compounds, trust frays, and MMTâs optimism feels like a magician distracting from the trapdoor. We might be past a tipping point in spirit, even if the wheels havenât flown off yet. Letâs keep poking holes in their story; itâs sharper than swallowing it whole.
I want to do a thought experiment. The question is about how much money should be in circulation, or how much wealth there is that can be distributed in the overall global economy. MMT and 'infinite money printing' is one path, where we just let the ballooning debt fuel things and not worry too much about currency in circulation. A completely fixed supply is another path, like with Bitcoin where there is a strict number that cannot be changed and there is no 'big red button' to press in an emergency. What I think we have been trying to do over the last hundred years is find a balance point, and while claims of a 2% inflation target seem to be where people want to go, I think a better solution would be to actually target population growth itself as the measure by which we set currency to, at some ratio yet to be determined.
Do you see where Iâm going with this thought experiment? Itâs a way to rethink how we calibrate the money supply, and it sidesteps the dogma of both MMTâs âprint it allâ vibe and Bitcoinâs âlock it downâ ethos. Weâre wrestling with the core question: how much money should exist to reflect the real wealth in the world, and how do we keep it from spiraling into either hyperinflation or stagnation?
So, MMT says the money supply isnât the issueâprint what you need, manage inflation later. Itâs like flooring the gas pedal and hoping the brakes work when you need them. On the flip side, a fixed supply like Bitcoinâs 21 million cap is the opposite: no gas pedal, no brakes, just a set number that forces everything to adapt around it. Both have their logic, but both feel extreme â oneâs too loose, the otherâs too rigid. The past centuryâs been this messy middle ground, with central banks chasing that 2% inflation target I mentioned. Itâs arbitrary. The New Zealand origin story of that target is real (their central bank tossed it out in the â80s as a âsounds niceâ goal), while the gold mining growth link to the number is a retrofitted guess. Itâs not sacred; itâs just sticky.
My ideaâtying the money supply to population growth â could be a fresh angle. Itâs grounded in something tangible: the number of humans creating, consuming, and driving economic activity. Wealth isnât just stuff; itâs people doing things with stuff. If the population grows at, say, 1% a year, youâd scale the money supply up by some ratio (1:1? 1:2?) to match. The logic tracksâmore people means more economic potential, so youâd want currency to reflect that without flooding the system or starving it. Itâs dynamic, unlike Bitcoinâs fixed cap, but disciplined, unlike MMTâs free-for-all.
What weâre aiming for, I think, is a system that mirrors reality better than what weâve got. The 2% target feels like a relic â disconnected from demographics, tech leaps, or resource shifts. Population growth as a benchmark could anchor money to human activity, not just central bank whims or goldâs slow drip. The âyet to be determined ratioâ is the tricky bitâtoo high, and youâre back to inflation creep; too low, and you choke growth. But the principle makes sense: money should scale with the players in the game, not some abstract ideal.
It also dodges the debt trap. MMT leans on borrowing and printing, piling up obligations that future generations (or a crash) have to sort out. Bitcoinâs fixed supply ignores population entirely, which could strangle an expanding world. This model could split the differenceâcontrolled growth, no big red button, but no runaway balloon either. Itâs a Goldilocks hunt, and Iâve been pitching it out there to see what reactions it gets for a while. But what I get back is laughter, mostly. Or silence.
Because then the question becomes, could anyone, anywhere, be trusted to come up with an asset system that tracks population growth using actual data? Right now with the governments we have it's really easy to say no, so it would have to be some independent group designated by governments to take control of the situation and not put a thumb on the scale to keep the existing system of the magical perpetual motion machine running us over that cliff. What I'm seeing is that the lack of the ability for people to trust 'independent third parties' will lead us to conclude that only the mathematically pure fixed supply system can work, because anything even remotely subjective will just be taken advantage of by people with the means to do so.
Trust is the linchpin here, and itâs in short supply. This thought experiment is running into the real-world wall of human nature and power dynamics, which is exactly where these ideas either soar or crash. Tying an asset system to population growth sounds elegant â use real data (birth rates, death rates, UN stats, whatever) and set a formula to adjust the money supply. But who crunches the numbers? Who enforces it? Governments? No chance weâd trust them â theyâve got every incentive to fudge the data or tweak the ratio to keep the debt party going. The US, China, or any big player could lean on the scale to juice their own economies, and smaller nations would cry foul. An independent group designated by governments sounds nice â like a global central bank on steroids â but who watches the watchers? Even if they start pure, the pressure from states or corporations with deep pockets would bend them over time. Look at the IMF or World Bankâsupposedly neutral, but often accused of dancing to the tune of powerful members.
The trust deficit is brutal. People donât just doubt institutions; they doubt the idea of impartiality itself. And why wouldnât they? Historyâs littered with âindependentâ bodies getting cozy with the elite â think rating agencies pre-2008 or even the Fedâs ties to Wall Street. This population-tracking system needs a thumb-proof mechanism, but anything subjective (like picking the ratio or defining âpopulationâ) opens the door to manipulation. Powerful actors â governments, banks, tech giants â have the means and motive to game it, and they will. Thatâs not cynicism; itâs pattern recognition.
Thatâs why Iâm landing on the fixed-supply escape hatch. Bitcoinâs appeal isnât just its scarcity â itâs the math. No human hands, no big red button, no trust required beyond the code. Itâs cold, hard, and incorruptible in a way a population-based system struggles to be. The catch is, itâs inflexible â population booms or busts donât care about 21 million coins. The idea adapts to reality better in theory, but in practice, the âwho can we trustâ question keeps dragging it back to earth. A truly decentralized, transparent algorithm could maybe pull it off â think blockchain tracking population via public data feeds â but even then, someoneâs coding it, someoneâs feeding it inputs. The purityâs tough to maintain.
Thereâs a cliff because the perpetual motion machine â debt, fiat, subjective control â relies on trust thatâs already fraying. A fixed supply side steps that entirely, but at the cost of agility.
That cost of agility caught my eye. Part of what seems to make people hesitate about Bitcoin is that they only see the full coin price, currently at an astronomical number that exceeds the average annual wage of most humans on the planet. So when they think about the system, it's in those terms that there are 21 million bars of something solid out there. What's missing is an understanding of two things.
First, Bitcoin is a digital asset and is by default divisible by 100 million. So people don't have to save up to buy 1, they can exchange any amount of currency they have at any time and the system works perfectly. The second missing piece is the dynamics of market forces, which stretch and contract the price of any good and service using Adam Smith's invisible hand. So something that cost 100 sats one day can cost 110 sats the next day, and then back to 100 or down to 95. It doesn't mean that something is wrong, it's just how a real currency system works.
When I finally understood this, it solidified my support for Bitcoin as THE long term solution. Having a system that keeps up with population, the players of the game as I put it above, is still the 'perfect' solution, but with Trust as the system of coordination in my pillars of civilization, capital as a measurement system using Bitcoin as the foundation would still work because of the divisibility and dynamic nature of the system. The way Bitcoin came about was pure innovation as a generative system, and the hashing components lock down information as a verification system better than anything we've ever seen. Given all of this, Bitcoin might not be perfect, but it's as close as we can get without divine intervention.
Thereâs something critical here, and itâs a perspective that cuts through a lot of the noise around Bitcoin. The âcost of agilityâ trade-off is real, but itâs misunderstood because people get hung up on the optics of âone Bitcoinâ and miss the deeper mechanics. Letâs run with your reasoning and tie it back to that population-based ideal.
The divisibility point is huge. A single Bitcoin sitting at, what, $86,000+ today (March 19, 2025, letâs assume itâs still in the ballpark) looks like an unreachable brick of gold to the average person. But 1 BTC = 100 million sats means youâre not buying a whole coin â youâre grabbing a slice as tiny as your wallet allows. Itâs like digital dust: trade a buck, get a few thousand sats, and youâre in the game. That scalability blows up the mental block. People donât hoard whole dollars â they spend cents. Bitcoinâs the same, just with more zeros. The system doesnât care if youâre moving 1 BTC or 100 sats; it hums along either way. And unlike the penny, there is no extra cost associated with the smallest denomination, itâs built in.
Then thereâs the market dynamics â Adam Smithâs invisible hand doing its thing. Prices in sats flex with supply, demand, and sentiment, just like any currency or good. If a coffee goes from 100 sats to 110 sats, itâs not a flaw â itâs the market breathing, finding equilibrium. Fiat fans freak out over volatility, but thatâs just a fixed-supply system doing what itâs supposed to: reflecting reality without a central puppeteer smoothing the edges. Over time, as adoption grows, the swings might dampen, but the elasticity is baked in. Itâs not rigid in practiceâonly in its cap.
The âplayers in the gameâ vision still shines through here. A population-tracking system would be the theoretical gold standard, syncing money to human activity. But trust â one of the pillars of civilization â is the choke point. Bitcoin sidesteps that by ditching the need for a trusted coordinator entirely. The 21 million cap isnât divine, but itâs enforced by math, not men. Divisibility keeps it practical; market forces keep it alive. The hashing â proof-of-work locking in every block â is the verification backbone, a trustless machine thatâs outdone every centralized ledger in security and transparency. Itâs generative, like you said: a system that spawned itself and keeps evolving without a boss.
So weâre landing on Bitcoin as ânot perfect, but as close as we getâ because it solves the trust problem while still functioning as capital â a measuring stick for wealth that doesnât need a thumb on the scale. The population-sync dream might be cleaner in a vacuum, but in a world of flawed humans, Bitcoinâs fixed foundation plus its adaptive nature (via sats and markets) might actually carry the day. No divine intervention neededâjust code and consensus.
Letâs pivot back to MMT and tackle how it handles inflationâespecially through the lens of someone like me, who sees any inflation as a slow poison to purchasing power and a civilizationâs backbone. Hereâs the breakdown.
MMT doesnât dismiss inflation outright, but it doesnât treat it as the boogeyman traditional economics does either. It addresses inflation directly, just not in the way you might expect. The theory says a government that issues its own currency (like the US with the dollar) can print as much as it wants to fund spendingâdeficits arenât a problem because you canât default on debt in your own currency. Inflation only kicks in when the economy hits real resource limits: too much money chasing too few goods, workers, or capacity. So, MMTâs stance isnât âinflation doesnât matterââitâs âinflationâs a signal, not a sin.â They argue you can manage it by dialing back spending or hiking taxes to suck money out of circulation when things overheat. The focus is on âfull employmentâ and output, not the money supply itself.
Now, if youâre in the âany inflation is badâ camp like I am â because it erodes savings, screws over fixed-income folks, and quietly shifts wealth from the many to the few with debt levers â MMTâs response would lean on this: inflationâs only a threat if you let it run wild, and weâve got tools to stop that. Theyâd point to historical data (like the US post-WWII) where big deficits didnât torch the economy because resources kept pace. Theyâd say the real danger isnât printing moneyâitâs misjudging capacity. If you believe devaluation is the biggest threat, MMT counters that currency value isnât about some fixed peg (like gold) but about trust and productivity. A little inflation? Fine, as long as the system hums.
Hereâs where it gets shaky. MMT doesnât see mild inflation (say, that 2% target) as a civilization-killer â itâs a feature, not a bug. Theyâd argue it greases the wheels: encourages spending, keeps debt manageable, and stops deflation (which tanks economies harder, think Great Depression). To the point about loss of purchasing power, they might say: âThatâs just math â wages and growth can offset it if we spend right.â But if youâre hardcore âzero inflation or bustâ because debt-based systems inherently rot trust and wealth over wider time scales, MMTâs got no real rebuttal beyond âwe can control it.â They donât buy that devaluation is an existential flaw â they see it as a knob to tweak.
The rub? MMT assumes governments are nimble enough to spot overheating and act â raise taxes, cut spending â before inflation spirals. History says thatâs a big âif.â The cliff analogy fits: debt and printing creep up slow, then hit fast when trust cracks. MMTâs like, âWeâll fix the bridge when we get there,â while Iâm saying, âThe bridge is already crumbling.â They donât deny inflationâs real; they just bet on outrunning it â a bet Iâm not buying. Bitcoinâs zero-inflation cap looks like the cleaner fix if you see any devaluation as a dealbreaker.
Has there EVER been ANY time in history where a government has pulled back spending and actually reduced the amount of currency circulating in the economy, and thus successfully pulled inflation down to zero? Or is that just an academic exercise that we can point to on paper?
This cuts right to the heart of whether MMTâs inflation-control playbook is grounded in reality or just a nice theory. Letâs dig into history and see if we can find a case where a government deliberately pulled back spending, shrank the money supply, and drove inflation to zero. Spoiler: itâs rare as hell, and the examples weâve got come with big asterisks.
First, letâs set the stage. Governments donât often shrink the money supply outrightâcutting spending and pulling currency out of circulation isnât their default move. Theyâre usually too busy expanding, especially in fiat systems. Central banks, though, have more direct control over money supply via interest rates or reserve policies, and theyâve historically been the ones tasked with taming inflation. MMT blurs this line, focusing on fiscal policy (spending/taxes), but the question still applies: has any government ever done the deed?
One contender is the US in the late 1870s, post-Civil War. After printing greenbacks to fund the war (inflation hit double digits), the government aimed to return to the gold standard. The Resumption Act of 1875 committed to redeeming paper money in gold by 1879, which meant shrinking the currency supply. Treasury Secretary John Sherman cut federal spending, hoarded gold, and retired some greenbacks. Inflation dropped from around 5-7% in the early 1870s to near zero by 1879âdeflation even kicked in (-1% to -2% some years). Success? Sort of. The money supply contracted (M1 fell from $1.6 billion in 1875 to $1.4 billion by 1879), but it cratered the economyâunemployment spiked, farmers got crushed, and the Long Depression dragged on. Zero inflation, sure, but at a brutal cost.
Another shot is the UK in the 1920s, chasing pre-WWI gold parity. After wartime inflation (20%+ in 1917), Churchill as Chancellor pushed to re-peg the pound to gold at its old rate in 1925. Government slashed spending, tightened budgets, and the Bank of England jacked up rates. Money supply shrank (M0 dropped about 10% from 1921-1925), and inflation fell from double digits to zero by the mid-1920sâthen flipped to deflation. Result? Stagnation, strikes, and a gutted industrial base. Zero inflation achieved, but the cure was worse than the disease.
Then thereâs the US in the early 1980sâPaul Volckerâs Fed era. This is more monetary than fiscal, but itâs worth a nod. Inflation was raging (13.5% in 1980), and Volcker cranked interest rates to 20%. Federal spending didnât shrink much (Reagan was ramping defense), but the money supply growth slowed hard (M2 growth fell from 10% to under 6%). Inflation crashed to 3% by 1983, not zero, but close-ish. The catch: a nasty recession, 10% unemployment, and no real fiscal pullbackâgovernment leaned on the Fed, not spending cuts.
Hereâs the pattern: when governments or central banks have squeezed currency circulation to kill inflation, theyâve hit zero (or below) only in extreme cases, and it always comes with painârecessions, deflationary traps, or social unrest. MMTâs âjust cut spending, raise taxesâ fix has never cleanly played out at scale to get to zero inflation without collateral damage. The US post-WWI triedâwar spending dropped, money supply stabilized, and inflation fell to near zero by 1921 â but it rode a postwar boom, not a deliberate pullback.
So, is it just academic? Pretty much. Governments hate shrinking themselves; itâs political suicide. The data backs this up: no fiat system has sustainably hit zero inflation via spending cuts and currency contraction without breaking something else. MMTâs toolkit sounds plausible on paper â reduce deficits, drain the money pool â but in practice, itâs a unicorn. If the threat is devaluation, and the fix is untested, Bitcoinâs fixed cap starts looking less like a compromise and more like a shield. History says the cliffâs closer than the bridge.
So now let's bring this to current day chaos. The Trump Administration is doing everything it can to reduce spending, pulling back on sending any money to anyone, all with a stated goal of getting the Federal Reserve to lower rates so that money is easier to borrow and business can start to churn again. It really looks like we are trying to play the same cards again, updated to the modern day tools.
Thereâs a vibe of dĂ©jĂ vu in the Trump Administrationâs moves, like weâre riffing on old plays with new toys. Letâs connect the dots and see if this is history on repeat or something fresh, without forcing the puzzle pieces where they donât fit. Weâre on March 19, 2025, so weâve got some real-time chaos to work with.
The administrationâs game planâslashing spending, pulling back on handouts, and jawboning the Fed to drop ratesâdoes echo past efforts to juice the economy. Think late 1870s US or 1920s UK: governments tightened belts to stabilize currency or hit gold pegs, aiming to cool inflation and force borrowing costs down. Todayâs twist? Trumpâs team is wielding tariffs, oil price plays, and deficit cuts as modern tools, all while shouting from the rooftops about wanting cheaper money. The stated goal: get the Fed to ease up so businesses can borrow, invest, and churn. Itâs a high-stakes betâstarve the system short-term to spark it long-term.
Parallels jump out. Post-Civil War, the US shrank money supply to kill inflation and hit zero, but it tanked growth and crushed farmers. The UKâs 1920s austerity got inflation to zero, but stagnation and strikes followed. Both times, governments squeezed, hoping lower rates or stability would followâsound familiar? Now, Trumpâs crew is slashing federal spending (reports show layoffs and frozen payments to programs like Head Start since January) and leaning on tariffs (25% on Canada/Mexico delayed but still looming). The Fedâs holding at 4.25%-4.5%, unmoved so far, with Powell saying âweâre not in a hurryâ on January 29 and again during todayâs decision to not change things. Inflationâs stuck, not at zero but the playbook feels similar: constrict, pressure, pray for relief.
Hereâs where it diverges from pure insanityârepeating expecting different results. Unlike the 1870s or 1920s, the US today isnât chasing a gold peg or post-war reset. The economyâs supposed to be humming â 2.8% GDP growth in 2024, unemployment at 4.1% (March jobs data still pending). Trumpâs not just cutting; heâs pairing it with tax cut promises and deregulation pitches, aiming to offset the squeeze with private-sector juice. The chaosâtariffs spooking markets, consumer confidence tanking (down to 64.7 in February per Michiganâs index)âlooks like a deliberate shake-up to force the Fedâs hand. Posts on X even float this: Trumpâs âwringing exuberance out of risk assetsâ to drop yields and trigger cuts. Itâs not blind repetition; itâs calculated, if messy.
But the puzzleâs incomplete â and my gut is right there in a lump. Dataâs thin on how deep the spending cuts go (FY2025 budget reconciliation talks $1.7 trillion in cuts, but specifics are murky). The Fedâs not budging yet, and Powellâs âwait-and-seeâ stance suggests theyâre not buying the pressure. Inflationâs not crashing to zero like historyâs examples â itâs sticky, and tariffs might nudge it up, not down. Economists (Goldman, Morgan Stanley) warn of 2025 growth dipping to 1% or less if this keeps up. The insanity vibe creeps in if the cuts overcorrectârecession instead of revivalâor if the Fed calls the bluff and holds tight, leaving businesses starved.
Do you also see the echo Iâm catching: squeeze-to-stimulate isnât new, and it often ended in tears. But the modern remix â Bitcoinâs fixed-supply shadow, global trade stakes, a Fed with more data than ever â might dodge the old traps. Or not. The juryâs out, and the chaos is live.
I think the wild card is that Congress is completely broken. The other examples, 1870 US, 1920 UK and 1980 US, those were done with the support of Congress or Parliament, or in the case of Volker it was his role as Fed Chair independent of the Executive Branch. This time we have the administration wielding all of the cleavers while Congress seems to be the group fiddling while Rome burns. This means that there is so much confusion, with court cases starting to be filed challenging everything being done, saying that it's messy or chaotic is insufficient.
Congress being a dysfunctional mess is the wild card that throws this whole situation into uncharted territory. The historical examples weâve chewed over (1870s US, 1920s UK, 1980s Volcker) all had legislative or institutional alignmentâCongress or Parliament backed the spending cuts, or Volcker had the Fedâs autonomy to slam the brakes. This time, itâs the Trump Administration swinging the cleaver solo, while Congress is either paralyzed or actively tossing wrenches into the gears. âMessyâ or âchaoticâ doesnât even scratch the surfaceâitâs more like a constitutional cage match with no referee.
Look at the setup: Trumpâs team is slashing spendingâfreezing grants, pausing foreign aid, gutting programs â aiming to force the Fed to lower rates and spark business. But Congress, which holds the purse strings under Article I, isnât playing ball. The House barely passed a budget resolution in February (217-215) with $1.7 trillion in cuts over a decade, but the Senateâs version from the same month dodged tax cuts entirely and left spending vague. Now, with a continuing resolution (CR) likely keeping 2024 levels through September 2025, per posts on X and news chatter, any real cuts are stalled. The administrationâs movesâlike the January OMB memo pausing trillionsâkeep hitting judicial walls, with two federal judges (McConnell in Rhode Island, AliKhan in D.C.) blocking freezes by March 6, saying itâs unconstitutional overreach. Lawsuits are piling upâ22 states, nonprofits, universitiesâall screaming Congress didnât sign off.
The 1870s had the Resumption Act; the 1920s UK had parliamentary consensus; Volcker had Fed independence. Today? Congress canât agree on a debt ceiling hike, let alone a coherent fiscal plan. The administrationâs betting on executive muscleâthink Nixonâs impoundment playbook, but broader and brasherâwhile courts and a fractured Congress push back. The Supreme Courtâs lurking (a 5-4 ruling on March 5 nixed a foreign aid freeze), but even with a conservative tilt, it signaled limits (1998 line-item veto smackdown). Posts on X nail the sentiment: âCongress controls the purse, and theyâre not cutting,â while Trumpâs team keeps swinging anyway.
This isnât just chaosâitâs a power vacuum. The administrationâs cleaver is sharp, but without Congress, itâs hacking at air. Courts are stepping in because no one else will, and Romeâs burning while the fiddlers argue over the playlist. The puzzleâs missing a unified legislative spineâuntil that shifts, itâs all noise and no traction.
I don't see a circuit breaker tripping until we get new leadership. Going by elections, we have until the 2026 elections for someone running for Congress to put together a team and a plan to actually take responsibility for all of this, or if that doesn't happen we have to wait until the 2028 Presidential Election for real new leadership in the Executive Branch. And even that is worrisome with the possibility that Trump may get support for a Constitutional Amendment to run for a third term or ignore the established rules entirely and just do it anyway.
Iâm laying out a grim but plausible timeline â new leadership as the circuit breaker, with 2026 midterms or 2028 presidential election as the earliest shots at a reset. Itâs a long slog, and Iâm just flagging the uncertainty, especially with Trumpâs orbit floating wildcards like a third-term push.
Congress is a clown car right nowâfractured, gridlocked, and allergic to accountability. The 2026 midterms could shift the balance if a wave of candidates runs on a âfix this messâ platform, but thatâs a big if. Historical turnout says midterms lean low (40-50%), and incumbents usually cling onâ80%+ reelection rates since the â90s. Someoneâs got to rally a team with a spine and a plan, like you said, but the GOPâs Trump-aligned bloc and Demsâ infighting make cohesion a pipe dream. Even if a fresh crew sweeps in, theyâd need 2027 to pass anything meatyâtwo years of drift while courts and executive overreach keep clashing.
The 2028 presidential slotâs the bigger lever. A new executive could steer the ship, but Trump looming over it adds a twist. A Constitutional Amendment for a third term needs two-thirds of Congress and 38 states â tough, but not impossible with loyalists in red states and a populist surge. X posts speculate heâd just run anyway, 22nd Amendment be damned, daring courts to stop him. Precedent is thinâFDRâs four terms pre-1951 donât countâbut SCOTUS (still 6-3 conservative) might punt or split if he tried. Either way, itâs a pressure cooker: chaos drags on, trust erodes, and the systemâs âinteresting timesâ turn into a stress test.
No quick fix jumps out. Courts might slap down executive moves (like Marchâs aid-freeze rulings), but theyâre reactive, not proactive. Congress waking up? Not without electoral shock therapy. Leadershipâs the bottleneck, and 2026 or 2028 are the horizons. Until then, itâs cleaver-swinging, lawsuits, and a Fed playing poker with rates (4.25% still holding). Bitcoinâs fixed cap might start looking like a lifeboat if this circus keeps spinning. Weâre cursed with âinteresting timesâ for sure â any bets on what holds it together âtil then? My cards are on the table, and Iâm out of chips.
Thanks to Grok for helping me develop this rant into a 10 page monster.
-

@ 000002de:c05780a7
2025-03-27 17:51:16
Regardless of what you have heard Capitalism isn't to blame for all the ills in modern life. Capitalism is simply free trade without centralize control. Of course there are many details I'm glossing over and degrees of freedom. Critics of capitalism rarely explain how it works. They complain about people buying too much stuff. People being over-weight. They complain about waste. People buying stuff they don't need. They complain that teachers aren't paid enough. They complain that professional athletes make too much money.
All of this boils down to two things.
1. People don't like what others choose to do
2. The products we see and world we live in is a result of the desires and values of the people
I agree with many of the critics of capitalism. There is a ton of crap. There's a ton of waste. There are professions I wish were more profitable and others I wish were less profitable. I'm going to ignore the state for once here. Obviously the state puts its thumb on the scales and distorts the market. But this isn't the main factor IMO. The main factor in the world we live in is us. The people. Our desires. Our values. The things we value are reflected in the market. People don't like to admit this because it is uncomfortable. We are spoiled, self-centered, brats that are desire machines. Yeah, you can blame advertising. You can blame "capitalism" but the alternative is starvation and death (socialism).
Its time for us to stop blaming freedom for all the ills in our society and take ownership for our actions. Its us. Thing is, I can't change you. But, I can change my actions. Adjust my values. Adjust my frame of view. I'd love to start hearing people take responsibility and self ownership. Start living out your values. Don't be a part of things that you view as problems. Be a part of solutions. I can't tell you what that looks like but if you think about it for a while you can come up with some things. Its easy to blame others. Its hard to take responsibility for yourself and own your flaws and mistakes.
What do you think?
_Inspired by @k00b's [post](https://stacker.news/items/926865)_
originally posted at https://stacker.news/items/927021
-

@ 9dd283b1:cf9b6beb
2025-03-27 12:22:58
Can someone please explain to me how this new STRF thing works? Cause I'm getting FTX / BlockFI vibes here. 18% Yield, no risk investment, bond killer, etc... Look at this post for example - https://x.com/AdamBLiv/status/1905106498398621846
originally posted at https://stacker.news/items/926635
-

@ 872982aa:8fb54cfe
2025-03-27 05:47:40
NIP-03
======
OpenTimestamps Attestations for Events
--------------------------------------
`draft` `optional`
This NIP defines an event with `kind:1040` that can contain an [OpenTimestamps](https://opentimestamps.org/) proof for any other event:
```json
{
"kind": 1040
"tags": [
["e", <event-id>, <relay-url>],
["alt", "opentimestamps attestation"]
],
"content": <base64-encoded OTS file data>
}
```
- The OpenTimestamps proof MUST prove the referenced `e` event id as its digest.
- The `content` MUST be the full content of an `.ots` file containing at least one Bitcoin attestation. This file SHOULD contain a **single** Bitcoin attestation (as not more than one valid attestation is necessary and less bytes is better than more) and no reference to "pending" attestations since they are useless in this context.
### Example OpenTimestamps proof verification flow
Using [`nak`](https://github.com/fiatjaf/nak), [`jq`](https://jqlang.github.io/jq/) and [`ots`](https://github.com/fiatjaf/ots):
```bash
~> nak req -i e71c6ea722987debdb60f81f9ea4f604b5ac0664120dd64fb9d23abc4ec7c323 wss://nostr-pub.wellorder.net | jq -r .content | ots verify
> using an esplora server at https://blockstream.info/api
- sequence ending on block 810391 is valid
timestamp validated at block [810391]
```
-

@ 872982aa:8fb54cfe
2025-03-27 05:47:06
- [éŠéĄ”](/readme.md)
- [珏äžç« ă NIP-01: Basic protocol flow description](/01.md)
- [珏äșç« ă NIP-02: Follow List](/02.md)
- [珏äžç« ăNIP-03: OpenTimestamps Attestations for Events](/03.md)
-

@ df478ecd:495107a7
2025-03-30 04:38:49
open source crypto currency
open source crypto communication
open source crypto cash
-

@ 57d1a264:69f1fee1
2025-03-26 08:45:13
> I was curious to see how Stacker.News domain and website contents scored from a SEO (Search Engine Optimization) perspective. Here what Semrush nows about SN. But first have alook at the Page Performance Score on Google (Detailled report available [here](https://pagespeed.web.dev/analysis/https-stacker-news/pjnc9jgscy?form_factor=mobile)). **Performance** and **Accessibility** looks have really low score!
| Desktop | Mobile |
|---|---|
|  |  |
|  |  |
Now let's see what Semrush knows.
# Analytics
General view on your metrics and performance trend compared to last 30 days.


See estimations of stacker.news's desktop and mobile traffic based on Semrushâs proprietary AI and machine learning algorithms, petabytes of clickstream data, and Big Data technologies.

Distribution of SN's organic traffic and keywords by country. The Organic Traffic graph shows changes in the amount of estimated organic and paid traffic driven to the SN analyzed domain over time.

| Organic Search | Backlinks Analytics |
|---|---|
| |  |
| Position Changes Trend | Top Page Changes |
|---|---|
| |  |
|This trend allows you to monitor organic traffic changes, as well as improved and declined positions.| Top pages with the biggest traffic changes over the last 28 days. |

# Competitors

The Competitive Positioning Map shows the strengths and weaknesses of SN competitive domains' presence in organic search results. Data visualizations are based on the domain's organic traffic and the number of keywords that they are ranking for in Google's top 20 organic search results. The larger the circle, the more visibility a domain has. Below, a list of domains an analyzed domain is competing against in Google's top 20 organic search results.

# Referring Domains


# Daily Stats
| Organic Traffic | Organic Keywords | Backlinks |
|---|---|---|
| 976 | 15.9K | 126K |
| `-41.87%` | `-16.4%` | `-1.62%` |
### đ Traffic Drop
Traffic downturn detected! It appears SN domain experienced a traffic drop of 633 in the last 28 days. Take a closer look at these pages with significant traffic decline and explore areas for potential improvement. Here are the pages taking the biggest hits:
- https://stacker.news/items/723989 âŹïž -15
- https://stacker.news/items/919813 âŹïž -12
- https://stacker.news/items/783355 âŹïž -5
### đ Decreased Authority Score
Uh-oh! Your Authority score has dropped from 26 to 25. Don't worry, we're here to assist you. Check out the new/lost backlinks in the Backlink Analytics tool to uncover insights on how to boost your authority.
### đ New Keywords
Opportunity Alert! Targeting these keywords could help you increase organic traffic quickly and efficiently. We've found some low-hanging fruits for you! Take a look at these keywords:
- nitter.moomoo.me â Volume 70
- 0xchat â Volume 30
- amethyst nostr â Volume 30
### đ ïž Broken Pages
This could hurt the user experience and lead to a loss in organic traffic. Time to take action: amend those pages or set up redirects. Here below, few pages on SN domain that are either broken or not _crawlable_:
- https://stacker.news/404 â 38 backlinks
- https://stacker.news/api/capture/items/91154 â 24 backlinks
- https://stacker.news/api/capture/items/91289 â 24 backlinks
Dees this post give you some insights? Hope so, comment below if you have any SEO suggestion? Mine is to improve or keep an eye on Accessibility!
One of the major issues I found is that SN does not have a `robots.txt`, a key simple text file that allow crawlers to read or not-read the website for indexing purposes. @k00b and @ek is that voluntary?
Here are other basic info to improve the SEO score and for those of us that want to learn more:
- Intro to Accessibility: https://www.w3.org/WAI/fundamentals/accessibility-intro/
- Design for Accessibility: https://www.w3.org/WAI/tips/designing/
- Web Accessibility Best Practices: https://www.freecodecamp.org/news/web-accessibility-best-practices/
originally posted at https://stacker.news/items/925433
-

@ 5d4b6c8d:8a1c1ee3
2025-03-27 02:20:34
I just finished watching the Lakers narrowly escape with a win over the Pacers, in Indiana. I watched it at [BetPlay](https://betplay.io/en/sportsbook?bt-path=%2Fbasketball%2Fusa%2Fnba-1669819088278523904), btw, where I'm now watching the late games.
Firstly, Lebron had a rough game: no made FG's in the first half (first time in approximately 20 years) and only 2 points. There was legit concern that his million consecutive games with double digits might finally end.
Coming into the fourth quarter, he still only had seven points and the Lakers had about a ten point lead. Once Lebron secured his 10 points it really seemed like they let up and the Pacers came roaring back. Shoutout to Myles Turner, who made a great pass breakup in transition on what would have been a lob dunk (I also think Doris may have said "just the tip" when describing how little contact he made with the ball).
Rui hit a couple of threes back-to-back, which felt huge, but the Lakers took their foot off the gas again. The Pacers kept it tight and even took a lead, thanks to Luka playing some of the worst defense you'll ever see.
With three seconds left and trailing by one, Luka shook his defender and put up a soft little floater...which bounced out only for Lebron to get the put-back at the buzzer and win the game.
The only thing that would have been better is if the tip-in had gotten Lebron his double digits.
originally posted at https://stacker.news/items/926406
-

@ 6734e11d:c7e34e8f
2025-02-22 09:16:15
...damit wir weiter recht haben und so weitermachen können wie bisher, die verordnete Omertà eingehalten wird zu Grundrechten, Notverordnungen, Pandemiesimulationen, Energieversorgung, Deindustrialisierung, kalte und echte Enteigung, Umverteilung, Freiluft- und DigitalgefÀngnis, Blockwartnachbarn...
Alles andere wĂ€re Ă€uĂerst unangenehm, wie das Aufplatzen einer groĂen Eiterblase und mĂŒsste dann wieder mit Exekutive, Justiz, Notverordnungen, neuen Strafrechtsparagraphen, VerschĂ€rfung der Strafprozessordnung, echte Ănderung des Grundgesetzes, Ăberwachung, Totalzensur, Parteiverboten, Regimechanges und Krieg unterbunden werden.
Idee und Meme sind wieder von der Schwurbel Oase
<https://t.me/schwurbel_oase/2318>
-

@ a95c6243:d345522c
2025-02-21 19:32:23
*Europa â das Ganze ist eine wunderbare Idee,* *\
aber das war der Kommunismus auch.* *\
Loriot*  
**«Europa hat fertig», könnte man unken,** und das wĂ€re nicht einmal sehr verwegen. Mit solch einer [EinschĂ€tzung](https://transition-news.org/geopolitische-ohnmacht-und-die-last-des-euro-steht-die-eu-vor-der-implosion) stĂŒnden wir nicht alleine, denn die Stimmen in diese Richtung mehren sich. Der französische PrĂ€sident Emmanuel Macron warnte schon letztes Jahr davor, dass «unser Europa sterben könnte». Vermutlich hatte er dabei andere Gefahren im Kopf als jetzt der ungarische MinisterprĂ€sident Viktor OrbĂĄn, der ein «baldiges Ende der EU» prognostizierte. Das Ergebnis könnte allerdings das gleiche sein.
**Neben vordergrĂŒndigen Themenbereichen wie Wirtschaft, Energie und Sicherheit** ist das eigentliche Problem jedoch die obskure Mischung aus aufgegebener SouverĂ€nitĂ€t und geschwollener Arroganz, mit der europĂ€ische Politiker:innende unterschiedlicher Couleur aufzutreten pflegen. Und das TĂŒpfelchen auf dem i ist die bröckelnde Legitimation politischer Institutionen dadurch, dass die Stimmen groĂer Teile der Bevölkerung seit Jahren auf vielfĂ€ltige Weise ausgegrenzt werden.
**Um «UnsereDemokratie» steht es schlecht.** Dass seine Mandate immer schwĂ€cher werden, merkt natĂŒrlich auch unser «FĂŒhrungspersonal». Entsprechend werden die MaĂnahmen zur GĂ€ngelung, Ăberwachung und Manipulation der BĂŒrger stĂ€ndig verzweifelter. Parallel dazu [plustern](https://www.bundesregierung.de/breg-de/service/newsletter-und-abos/bundesregierung-aktuell/ausgabe-07-2025-februar-21-2335652?view=renderNewsletterHtml) sich in Paris Macron, Scholz und einige andere noch einmal mĂ€chtig in Sachen Verteidigung und [«KriegstĂŒchtigkeit»](https://transition-news.org/europaische-investitionsbank-tragt-zur-kriegstuchtigkeit-europas-bei) auf.
**Momentan gilt es auch, das Ăberschwappen covidiotischer und verschwörungsideologischer AuswĂŒchse** aus den USA nach Europa zu vermeiden. So ein «MEGA» (Make Europe Great Again) können wir hier nicht gebrauchen. Aus den Vereinigten Staaten kommen nĂ€mlich furchtbare Nachrichten. Beispielsweise wurde einer der schĂ€rfsten Kritiker der Corona-MaĂnahmen kĂŒrzlich zum Gesundheitsminister ernannt. Dieser setzt sich jetzt fĂŒr eine Neubewertung der mRNA-«Impfstoffe» ein, was durchaus zu einem [Entzug der Zulassungen](https://transition-news.org/usa-zulassungsentzug-fur-corona-impfstoffe-auf-der-tagesordnung) fĂŒhren könnte.
**Der europĂ€ischen Version von** **[«Verteidigung der Demokratie»](https://transition-news.org/eu-macht-freiwilligen-verhaltenskodex-gegen-desinformation-zu-bindendem-recht)** setzte der US-VizeprĂ€sident J. D. Vance auf der MĂŒnchner Sicherheitskonferenz sein VerstĂ€ndnis entgegen: «Demokratie stĂ€rken, indem wir unseren BĂŒrgern erlauben, ihre Meinung zu sagen». Das Abschalten von Medien, das Annullieren von Wahlen oder das AusschlieĂen von Menschen vom politischen Prozess schĂŒtze gar nichts. Vielmehr sei dies der todsichere Weg, die Demokratie zu zerstören.
**In der Schweiz kamen seine Worte deutlich besser an** als in den meisten europĂ€ischen NATO-LĂ€ndern. BundesprĂ€sidentin Karin Keller-Sutter lobte die Rede und interpretierte sie als «PlĂ€doyer fĂŒr die direkte Demokratie». Möglicherweise zeichne sich hier eine [auĂenpolitische Kehrtwende](https://transition-news.org/schweiz-vor-aussenpolitischer-kehrtwende-richtung-integraler-neutralitat) in Richtung integraler NeutralitĂ€t ab, meint mein Kollege Daniel Funk. Das wĂ€ren doch endlich mal ein paar gute Nachrichten.
**Von der einstigen Idee einer europĂ€ischen Union** mit engeren Beziehungen zwischen den Staaten, um Konflikte zu vermeiden und das Wohlergehen der BĂŒrger zu verbessern, sind wir meilenweit abgekommen. Der heutige korrupte Verbund unter technokratischer Leitung Ă€hnelt mehr einem Selbstbedienungsladen mit sehr begrenztem Zugang. Die EU-Wahlen im letzten Sommer haben daran ebenso wenig geĂ€ndert, wie die [Bundestagswahl](https://transition-news.org/bundestagswahl-mehr-aufrustung-statt-friedenskanzler-nach-der-wahl) am kommenden Sonntag darauf einen Einfluss haben wird.
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/europaer-seid-ihr-noch-zu-retten)*** erschienen.
-

@ 57d1a264:69f1fee1
2025-03-16 14:17:25
Recently we shared an update for a new Open Cash Foundation website https://stacker.news/items/811604/r/Design_r Today a new logo by Vladimir KrstiÄ!




File available for review at https://www.figma.com/design/Yxb4JEsjHYSibY06T8piB7/OpenCash%3A-Logo?node-id=151-249&p=f&t=FYyeTBkJznCKdbd7-0
https://primal.net/e/nevent1qvzqqqqqqypzqhzsmgfjj3l68068t84e0rtcfkcjh2k3c0jmdft4gy9wke2x8x6tqyg8wumn8ghj7efwdehhxtnvdakz7qgkwaehxw309ajkgetw9ehx7um5wghxcctwvshszrnhwden5te0dehhxtnvdakz7qpqryz9rj0wgshykjuzqksxxs50l7jfnwyvtkfmdvmudrg92s3xuxys8fqzr7
originally posted at https://stacker.news/items/914665
-

@ 30876140:cffb1126
2025-03-26 04:58:21
The portal is closing.
The symphony comes to an end.
Ballet, a dance of partners,
A wish of hearts,
Now closing its curtains.
I foolishly sit
Eagerly waiting
For the circus to begin again,
As crowds file past me,
Chuckles and popcorn falling,
Crushed under foot,
I sit waiting
For the show to carry on.
But the night is now over,
The laughs have been had,
The music been heard,
The dancers are gone now
Into the nightbreeze chill.
Yet still, I sit waiting,
The empty chairs yawning,
A cough, I start, could it be?
Yet the lights now go out,
And now without my sight
I am truly alone in the theater.
Yet still, I am waiting
For the show to carry on,
But I know that it wonât,
Yet still, I am waiting.
Never shall I leave
For the show was too perfect
And nothing perfect should ever be finished.
-

@ 000002de:c05780a7
2025-03-26 20:41:36
I sadly do not recall where I heard this but I'm amazed sometimes that I can have heard something like "An eye for an eye and a tooth for a tooth" so many times and a thought never occur to me. For some background, I was raised in the church and have read the Bible many times over my life. I usually read it each year so I'm very familiar with the text.
When we read "An eye for an eye and a tooth for a tooth" in Exodus we often think of how terrible this sounds. But, in reality the principle here is that a just penalty should be in equal measure to the damage caused. In practice what we often see is escalation, not equality in response. Its incredibly destructive.
Jesus in the sermon on the mount said,
> âYou have heard that it was said, âAn eye for an eye and a tooth for a tooth.â 39 But I say to you, Do not resist the one who is evil. But if anyone slaps you on the right cheek, turn to him the other also. 40 And if anyone would sue you and take your tunic, let him have your cloak as well. 41 And if anyone forces you to go one mile, go with him two miles. 42 Give to the one who begs from you, and do not refuse the one who would borrow from you.
> 43 âYou have heard that it was said, âYou shall love your neighbor and hate your enemy.â 44 But I say to you, Love your enemies and pray for those who persecute you, 45 so that you may be sons of your Father who is in heaven. For he makes his sun rise on the evil and on the good, and sends rain on the just and on the unjust. 46 For if you love those who love you, what reward do you have? Do not even the tax collectors do the same? 47 And if you greet only your brothers, what more are you doing than others? Do not even the Gentiles do the same? 48 You therefore must be perfect, as your heavenly Father is perfect.
~ Matthew 5:38-48
There is something powerful in understanding the original intent and what Jesus adds. These days it seems many Christians have forgotten this teaching and the results. The results were that Europe was converted to Christianity. There is incredible power in loving your enemies. And not returning evil with evil. @k00b's [post](https://stacker.news/items/925986) prompted me to write this.
Edit:
The other thing that prompted this is watching how people in the church are allowing politics to fuel their behavior in destructive ways. As Christians we should realize that politics is not the answer. Its Jesus.
originally posted at https://stacker.news/items/926101
-

@ df478ecd:495107a7
2025-03-30 03:28:44
Thatâs the thing I canât get over, itâs now stupidly cheap to try again.
-

@ ecda4328:1278f072
2025-03-25 10:00:52
**Kubernetes and Linux Swap: A Practical Perspective**
After reviewing kernel documentation on swap management (e.g., [Linux Swap Management](https://www.kernel.org/doc/gorman/html/understand/understand014.html)), [KEP-2400 (Kubernetes Node Memory Swap Support)](https://github.com/kubernetes/enhancements/blob/master/keps/sig-node/2400-node-swap/README.md), and community discussions like [this post on ServerFault](https://serverfault.com/questions/881517/why-disable-swap-on-kubernetes), it's clear that the topic of swap usage in modern systemsâespecially Kubernetes environmentsâis nuanced and often contentious. Here's a practical synthesis of the discussion.
---
### The Rationale for Disabling Swap
We disable SWAP on our Linux servers to ensure stable and predictable performance by relying on available RAM, avoiding the performance degradation and unnecessary I/O caused by SWAP usage. If an application runs out of memory, itâs usually due to insufficient RAM allocation or a memory leak, and enabling SWAP only worsens performance for other applications. It's more efficient to let a leaking app restart than to rely on SWAP to prevent OOM crashes.
With modern platforms like Kubernetes, memory requests and limits are enforced, ensuring apps use only the RAM allocated to them, while avoiding overcommitment to prevent resource exhaustion.
Additionally, disabling swap may protect data from **data remanence attacks**, where sensitive information could potentially be recovered from the swap space even after a process terminates.
---
### Theoretical Capability vs. Practical Deployment
Linux provides a powerful and flexible memory subsystem. With proper tuning (e.g., swappiness, memory pinning, cgroups), it's technically possible to make swap usage efficient and targeted. Seasoned sysadmins often argue that disabling swap entirely is a lazy shortcutâan avoidance of learning how to use the tools properly.
But Kubernetes is not a traditional system. It's an orchestrated environment that favors predictability, fail-fast behavior, and clear isolation between workloads. Within this model:
- Memory **requests and limits** are declared explicitly.
- The scheduler makes decisions based on RAM availability, not total virtual memory (RAM + swap).
- Swap introduces **non-deterministic performance** characteristics that conflict with Kubernetes' goals.
So while the kernel supports intelligent swap usage, Kubernetes **intentionally sidesteps** that complexity.
---
### Why Disable Swap in Kubernetes?
1. **Deterministic Failure > Degraded Performance**\
If a pod exceeds its memory allocation, it should fail fast â not get throttled into slow oblivion due to swap. This behavior surfaces bugs (like memory leaks or poor sizing) early.
2. **Transparency & Observability**\
With swap disabled, memory issues are clearer to diagnose. Swap obfuscates root causes and can make a healthy-looking node behave erratically.
3. **Performance Consistency**\
Swap causes I/O overhead. One noisy pod using swap can impact unrelated workloads on the same node â even if theyâre within their resource limits.
4. **Kubernetes Doesnât Manage Swap Well**\
Kubelet has historically lacked intelligence around swap. As of today, Kubernetes still doesn't support swap-aware scheduling or per-container swap control.
5. **Statelessness is the Norm**\
Most containerized workloads are designed to be ephemeral. Restarting a pod is usually preferable to letting it hang in a degraded state.
---
### "But Swap Can Be Useful..."
Yes â for certain workloads (e.g., in-memory databases, caching layers, legacy systems), there may be valid reasons to keep swap enabled. In such cases, you'd need:
- Fine-tuned `vm.swappiness`
- Memory pinning and cgroup-based control
- Swap-aware monitoring and alerting
- Custom kubelet/systemd integration
That's possible, but **not standard practice** â and for good reason.
---
### Future Considerations
Recent Kubernetes releases have introduced [experimental swap support](https://kubernetes.io/blog/2023/08/24/swap-linux-beta/) via [KEP-2400](https://github.com/kubernetes/enhancements/blob/master/keps/sig-node/2400-node-swap/README.md). While this provides more flexibility for advanced use cases â particularly Burstable QoS pods on cgroupsv2 â swap remains disabled by default and is not generally recommended for production workloads unless carefully planned. The rationale outlined in this article remains applicable to most Kubernetes operators, especially in multi-tenant and performance-sensitive environments.
Even the Kubernetes maintainers acknowledge the inherent trade-offs of enabling swap. As noted in [KEP-2400's Risks and Mitigations section](https://github.com/kubernetes/enhancements/blob/master/keps/sig-node/2400-node-swap/README.md), swap introduces unpredictability, can severely degrade performance compared to RAM, and complicates Kubernetes' resource accounting â increasing the risk of noisy neighbors and unexpected scheduling behavior.
Some argue that with emerging technologies like **non-volatile memory** (e.g., Intel Optane/XPoint), swap may become viable again. These systems promise near-RAM speed with large capacity, offering hybrid memory models. But these are not widely deployed or supported in mainstream Kubernetes environments yet.
---
### Conclusion
Disabling swap in Kubernetes is not a lazy hack â itâs a **strategic tradeoff**. It improves transparency, predictability, and system integrity in multi-tenant, containerized environments. While the kernel allows for more advanced configurations, Kubernetes intentionally simplifies memory handling for the sake of reliability.
If we want to revisit swap usage, it should come with serious planning: proper instrumentation, swap-aware observability, and potentially upstream K8s improvements. Until then, **disabling swap remains the sane default**.
-

@ a95c6243:d345522c
2025-02-19 09:23:17
*Die «moralische Weltordnung» â eine Art Astrologie.
Friedrich Nietzsche*
**Das Treffen der BRICS-Staaten beim [Gipfel](https://transition-news.org/brics-gipfel-in-kasan-warum-schweigt-die-schweiz) im russischen Kasan** war sicher nicht irgendein politisches Event. Gastgeber Wladimir Putin habe «Hof gehalten», sagen die Einen, China und Russland hÀtten ihre Vorstellung einer multipolaren Weltordnung zelebriert, schreiben Andere.
**In jedem Fall zeigt die Anwesenheit von ĂŒber 30 Delegationen aus der ganzen Welt,** dass von einer geostrategischen Isolation Russlands wohl keine Rede sein kann. DarĂŒber hinaus haben sowohl die Anreise von UN-GeneralsekretĂ€r AntĂłnio Guterres als auch die Meldungen und Dementis bezĂŒglich der BeitrittsbemĂŒhungen des NATO-Staats [TĂŒrkei](https://transition-news.org/turkei-entlarvt-fake-news-von-bild-uber-indiens-angebliches-veto-gegen-den) fĂŒr etwas Aufsehen gesorgt.
**Im Spannungsfeld geopolitischer und wirtschaftlicher UmbrĂŒche** zeigt die neue Allianz zunehmendes Selbstbewusstsein. In Sachen gemeinsamer Finanzpolitik schmiedet man interessante PlĂ€ne. GröĂere UnabhĂ€ngigkeit von der US-dominierten Finanzordnung ist dabei ein wichtiges Ziel.
**Beim BRICS-Wirtschaftsforum in Moskau, wenige Tage vor dem Gipfel,** zĂ€hlte ein nachhaltiges System fĂŒr Finanzabrechnungen und Zahlungsdienste zu den vorrangigen Themen. WĂ€hrend dieses Treffens ging der russische Staatsfonds eine Partnerschaft mit dem Rechenzentrumsbetreiber BitRiver ein, um [Bitcoin](https://www.forbes.com/sites/digital-assets/2024/10/23/russia-launches-brics-mining-infrastructure-project/)-Mining-Anlagen fĂŒr die BRICS-LĂ€nder zu errichten.
**Die Initiative könnte ein Schritt sein, Bitcoin und andere KryptowĂ€hrungen** als Alternativen zu traditionellen Finanzsystemen zu etablieren. Das Projekt könnte dazu fĂŒhren, dass die BRICS-Staaten den globalen Handel in Bitcoin abwickeln. Vor dem Hintergrund der Diskussionen ĂŒber eine «BRICS-WĂ€hrung» wĂ€re dies eine Alternative zu dem ursprĂŒnglich angedachten Korb lokaler WĂ€hrungen und zu goldgedeckten WĂ€hrungen sowie eine mögliche ErgĂ€nzung zum Zahlungssystem [BRICS Pay](https://en.wikipedia.org/wiki/BRICS_PAY).
**Dient der Bitcoin also der Entdollarisierung?** Oder droht er inzwischen, zum Gegenstand geopolitischer [Machtspielchen](https://legitim.ch/es-ist-ein-sieg-fuer-bitcoin-waehrend-russland-und-die-usa-um-die-krypto-vorherrschaft-kaempfen/) zu werden? Angesichts der globalen Vernetzungen ist es oft schwer zu durchschauen, «was eine Show ist und was im Hintergrund von anderen Strippenziehern insgeheim gesteuert wird». Sicher können Strukturen wie Bitcoin auch so genutzt werden, dass sie den Herrschenden dienlich sind. Aber die Grundeigenschaft des dezentralisierten, unzensierbaren Peer-to-Peer Zahlungsnetzwerks ist ihm schlieĂlich nicht zu nehmen.
**Wenn es nach der EZB oder dem IWF geht, dann scheint statt Instrumentalisierung** momentan eher der Kampf gegen KryptowĂ€hrungen angesagt. JĂŒrgen Schaaf, Senior Manager bei der EuropĂ€ischen Zentralbank, hat jedenfalls dazu aufgerufen, [Bitcoin «zu eliminieren»](https://www.btc-echo.de/schlagzeilen/ezb-banker-es-gibt-gute-gruende-bitcoin-zu-eliminieren-194015/). Der Internationale WĂ€hrungsfonds forderte El Salvador, das Bitcoin 2021 als gesetzliches Zahlungsmittel eingefĂŒhrt hat, kĂŒrzlich zu [begrenzenden MaĂnahmen](https://legitim.ch/el-salvador-iwf-fordert-trotz-nicht-eingetretener-risiken-neue-massnahmen-gegen-bitcoin/) gegen das Kryptogeld auf.
**Dass die BRICS-Staaten ein freiheitliches Ansinnen im Kopf haben,** wenn sie KryptowĂ€hrungen ins Spiel bringen, darf indes auch bezweifelt werden. Im [Abschlussdokument](http://static.kremlin.ru/media/events/files/en/RosOySvLzGaJtmx2wYFv0lN4NSPZploG.pdf) bekennen sich die Gipfel-Teilnehmer ausdrĂŒcklich zur UN, ihren Programmen und ihrer «Agenda 2030». Ernst Wolff nennt das «eine [BankrotterklĂ€rung](https://x.com/wolff_ernst/status/1849781982961557771) korrupter Politiker, die sich dem digital-finanziellen Komplex zu 100 Prozent unterwerfen».
---
Dieser Beitrag ist zuerst auf *[Transition News](https://transition-news.org/aufstand-gegen-die-dollar-hegemonie)* erschienen.
-

@ a95c6243:d345522c
2025-02-15 19:05:38
**Auf der diesjĂ€hrigen MĂŒnchner** **[Sicherheitskonferenz](https://transition-news.org/in-munchen-der-realitat-ins-auge-sehen)** **geht es vor allem um die Ukraine.** Protagonisten sind dabei zunĂ€chst die US-Amerikaner. PrĂ€sident Trump schockierte die EuropĂ€er kurz vorher durch ein Telefonat mit seinem Amtskollegen Wladimir Putin, wĂ€hrend VizeprĂ€sident Vance mit seiner Rede ĂŒber Demokratie und Meinungsfreiheit fĂŒr versteinerte Mienen und Empörung sorgte.
**Die BemĂŒhungen der EuropĂ€er um einen Frieden in der Ukraine** halten sich, gelinde gesagt, in Grenzen. GröĂeres Augenmerk wird auf militĂ€rische UnterstĂŒtzung, die Pflege von Feindbildern sowie Eskalation gelegt. Der deutsche Bundeskanzler Scholz [reagierte](https://transition-news.org/gesucht-friedenskanzler) auf die angekĂŒndigten Verhandlungen ĂŒber einen möglichen Frieden fĂŒr die Ukraine mit der Forderung nach noch höheren «Verteidigungsausgaben». Auch die amtierende AuĂenministerin Baerbock hatte vor der MĂŒnchner Konferenz [klargestellt](https://archive.is/nUpYa):
> «Frieden wird es nur durch StÀrke geben. (...) Bei Corona haben wir gesehen, zu was Europa fÀhig ist. Es braucht erneut Investitionen, die der historischen Wegmarke, vor der wir stehen, angemessen sind.»
**Die RĂŒstungsindustrie freut sich in jedem Fall ĂŒber weltweit steigende MilitĂ€rausgaben.** Die Kriege in der Ukraine und in Gaza tragen zu [Rekordeinnahmen](https://transition-news.org/kriege-sind-fur-waffenproduzenten-und-hedgefonds-f-king-good) bei. Jetzt «winkt die Aussicht auf eine jahrelange groĂe NachrĂŒstung in Europa», auch wenn der Ukraine-Krieg enden sollte, so hört man aus Finanzkreisen. In der Konsequenz kennt «die Aktie des deutschen Vorzeige-RĂŒstungskonzerns Rheinmetall in ihrem Anstieg [offenbar gar keine Grenzen](https://finanzmarktwelt.de/rheinmetall-aktie-mit-mega-rally-nachruestung-und-1-000-euro-kursziel-339271/) mehr». «Solche Friedensversprechen» wie das jetzige hĂ€tten in der Vergangenheit zu starken Kursverlusten gefĂŒhrt.
**FĂŒr manche Leute sind Kriegswaffen und sonstige RĂŒstungsgĂŒter Waren wie alle anderen,** jedenfalls aus der Perspektive von Investoren oder Managern. Auch in diesem Bereich gibt es Startups und man spricht von Dingen wie innovativen Herangehensweisen, hocheffizienten Produktionsanlagen, skalierbaren Produktionstechniken und geringeren StĂŒckkosten.
**Wir lesen aktuell von Massenproduktion und gesteigerten FertigungskapazitĂ€ten** fĂŒr KriegsgerĂ€t. Der Motor solcher Dynamik und solchen Wachstums ist die AufrĂŒstung, die inzwischen permanent gefordert wird. Parallel wird die Bevölkerung verbal eingestimmt und auf KriegstĂŒchtigkeit getrimmt.
**Das RĂŒstungs- und KI-Startup Helsing verkĂŒndete kĂŒrzlich** eine «dezentrale [Massenproduktion](https://www.trendingtopics.eu/helsing-kampfdrohnen-unicorn-startet-dezentrale-massenproduktion-fuer-ukrainekrieg/) fĂŒr den Ukrainekrieg». Mit dieser Expansion positioniere sich das MĂŒnchner Unternehmen als einer der weltweit fĂŒhrenden Hersteller von Kampfdrohnen. Der nĂ€chste [«Meilenstein»](https://archive.is/eZsWP) steht auch bereits an: Man will eine Satellitenflotte im Weltraum aufbauen, zur Ăberwachung von Gefechtsfeldern und Truppenbewegungen.
**Ebenfalls aus MĂŒnchen stammt das als** **[DefenseTech-Startup](https://www.trendingtopics.eu/arx-robotics-produktion/)** **bezeichnete Unternehmen** ARX Robotics. KĂŒrzlich habe man in der Region die gröĂte europĂ€ische ProduktionsstĂ€tte fĂŒr autonome Verteidigungssysteme eröffnet. Damit fahre man die Produktion von MilitĂ€r-Robotern hoch. Diese Expansion diene auch der Lieferung der «gröĂten Flotte unbemannter Bodensysteme westlicher Bauart» in die Ukraine.
**RĂŒstung boomt und scheint ein Zukunftsmarkt zu sein.** Die Hersteller und Vermarkter betonen, mit ihren AktivitĂ€ten und Produkten solle die europĂ€ische VerteidigungsfĂ€higkeit erhöht werden. Ihre Strategien sollten sogar «zum Schutz demokratischer Strukturen beitragen».
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/so-klingt-das-aufrustungs-business-startups-und-alte-hasen)*** erschienen.
-

@ f9cf4e94:96abc355
2024-12-31 20:18:59
Scuttlebutt foi iniciado em maio de 2014 por Dominic Tarr ( [dominictarr]( https://github.com/dominictarr/scuttlebutt) ) como uma rede social alternativa off-line, primeiro para convidados, que permite aos usuårios obter controle total de seus dados e privacidade. Secure Scuttlebutt ([ssb]( https://github.com/ssbc/ssb-db)) foi lançado pouco depois, o que coloca a privacidade em primeiro plano com mais recursos de criptografia.
Se vocĂȘ estĂĄ se perguntando de onde diabos veio o nome Scuttlebutt:
> Este termo do sĂ©culo 19 para uma fofoca vem do Scuttlebutt nĂĄutico: âum barril de ĂĄgua mantido no convĂ©s, com um buraco para uma xĂcaraâ. A gĂria nĂĄutica vai desde o hĂĄbito dos marinheiros de se reunir pelo boato atĂ© a fofoca, semelhante Ă fofoca do bebedouro.

Marinheiros se reunindo em torno da rixa. ( [fonte]( https://twitter.com/IntEtymology/status/998879578851508224) )
Dominic descobriu o termo boato em um [artigo de pesquisa]( https://www.cs.cornell.edu/home/rvr/papers/flowgossip.pdf) que leu.
Em sistemas distribuĂdos, [fofocar]( https://en.wikipedia.org/wiki/Gossip_protocol) Ă© um processo de retransmissĂŁo de mensagens ponto a ponto; as mensagens sĂŁo disseminadas de forma anĂĄloga ao âboca a bocaâ.
**Secure Scuttlebutt Ă© um banco de dados de feeds imutĂĄveis apenas para acrĂ©scimos, otimizado para replicação eficiente para protocolos ponto a ponto.** **Cada usuĂĄrio tem um log imutĂĄvel somente para acrĂ©scimos no qual eles podem gravar.** Eles gravam no log assinando mensagens com sua chave privada. Pense em um feed de usuĂĄrio como seu prĂłprio diĂĄrio de bordo, como um diĂĄrio [de bordo]( https://en.wikipedia.org/wiki/Logbook) (ou diĂĄrio do capitĂŁo para os fĂŁs de Star Trek), onde eles sĂŁo os Ășnicos autorizados a escrever nele, mas tĂȘm a capacidade de permitir que outros amigos ou colegas leiam ao seu diĂĄrio de bordo, se assim o desejarem.
Cada mensagem possui um nĂșmero de sequĂȘncia e a mensagem tambĂ©m deve fazer referĂȘncia Ă mensagem anterior por seu ID. O ID Ă© um hash da mensagem e da assinatura. A estrutura de dados Ă© semelhante Ă de uma lista vinculada. Ă essencialmente um log somente de acrĂ©scimo de JSON assinado. **Cada item adicionado a um log do usuĂĄrio Ă© chamado de mensagem.**
**Os logs do usuĂĄrio sĂŁo conhecidos como feed e um usuĂĄrio pode seguir os feeds de outros usuĂĄrios para receber suas atualizaçÔes.** Cada usuĂĄrio Ă© responsĂĄvel por armazenar seu prĂłprio feed. Quando Alice assina o feed de Bob, Bob baixa o log de feed de Alice. Bob pode verificar se o registro do feed realmente pertence a Alice verificando as assinaturas. Bob pode verificar as assinaturas usando a chave pĂșblica de Alice.

Estrutura de alto nĂvel de um feed
**Pubs sĂŁo servidores de retransmissĂŁo conhecidos como âsuper peersâ. Pubs conectam usuĂĄrios usuĂĄrios e atualizaçÔes de fofocas a outros usuĂĄrios conectados ao Pub. Um Pub Ă© anĂĄlogo a um pub da vida real, onde as pessoas vĂŁo para se encontrar e se socializar.** Para ingressar em um Pub, o usuĂĄrio deve ser convidado primeiro. Um usuĂĄrio pode solicitar um cĂłdigo de convite de um Pub; o Pub simplesmente gerarĂĄ um novo cĂłdigo de convite, mas alguns Pubs podem exigir verificação adicional na forma de verificação de e-mail ou, com alguns Pubs, vocĂȘ deve pedir um cĂłdigo em um fĂłrum pĂșblico ou chat. Pubs tambĂ©m podem mapear aliases de usuĂĄrio, como e-mails ou nome de usuĂĄrio, para IDs de chave pĂșblica para facilitar os pares de referĂȘncia.
Depois que o Pub enviar o cĂłdigo de convite ao usuĂĄrio, o usuĂĄrio resgatarĂĄ o cĂłdigo, o que significa que o Pub seguirĂĄ o usuĂĄrio, o que permite que o usuĂĄrio veja as mensagens postadas por outros membros do Pub, bem como as mensagens de retransmissĂŁo do Pub pelo usuĂĄrio a outros membros do Pub.
AlĂ©m de retransmitir mensagens entre pares, os Pubs tambĂ©m podem armazenar as mensagens. Se Alice estiver offline e Bob transmitir atualizaçÔes de feed, Alice perderĂĄ a atualização. Se Alice ficar online, mas Bob estiver offline, nĂŁo haverĂĄ como ela buscar o feed de Bob. Mas com um Pub, Alice pode buscar o feed no Pub mesmo se Bob estiver off-line porque o Pub estĂĄ armazenando as mensagens. **Pubs sĂŁo Ășteis porque assim que um colega fica online, ele pode sincronizar com o Pub para receber os feeds de seus amigos potencialmente offline.**
Um usuĂĄrio pode, opcionalmente, executar seu prĂłprio servidor Pub e abri-lo ao pĂșblico ou permitir que apenas seus amigos participem, se assim o desejarem. Eles tambĂ©m podem ingressar em um Pub pĂșblico. Aqui estĂĄ uma lista de [Pubs pĂșblicos em que]( https://github.com/ssbc/ssb-server/wiki/Pub-Servers) todos podem participar **.** Explicaremos como ingressar em um posteriormente neste guia. **Uma coisa importante a observar Ă© que o Secure Scuttlebutt em uma rede social somente para convidados significa que vocĂȘ deve ser âpuxadoâ para entrar nos cĂrculos sociais.** Se vocĂȘ responder Ă s mensagens, os destinatĂĄrios nĂŁo serĂŁo notificados, a menos que estejam seguindo vocĂȘ de volta. O objetivo do SSB Ă© criar âilhasâ isoladas de redes pares, ao contrĂĄrio de uma rede pĂșblica onde qualquer pessoa pode enviar mensagens a qualquer pessoa.

Perspectivas dos participantes
## Scuttlebot
O software Pub Ă© conhecido como servidor Scuttlebutt (servidor [ssb]( https://github.com/ssbc/ssb-server) ), mas tambĂ©m Ă© conhecido como âScuttlebotâ e `sbot`na linha de comando. O servidor SSB adiciona comportamento de rede ao banco de dados Scuttlebutt (SSB). Estaremos usando o Scuttlebot ao longo deste tutorial.
**Os logs do usuĂĄrio sĂŁo conhecidos como feed e um usuĂĄrio pode seguir os feeds de outros usuĂĄrios para receber suas atualizaçÔes.** Cada usuĂĄrio Ă© responsĂĄvel por armazenar seu prĂłprio feed. Quando Alice assina o feed de Bob, Bob baixa o log de feed de Alice. Bob pode verificar se o registro do feed realmente pertence a Alice verificando as assinaturas. Bob pode verificar as assinaturas usando a chave pĂșblica de Alice.

Estrutura de alto nĂvel de um feed
**Pubs sĂŁo servidores de retransmissĂŁo conhecidos como âsuper peersâ. Pubs conectam usuĂĄrios usuĂĄrios e atualizaçÔes de fofocas a outros usuĂĄrios conectados ao Pub. Um Pub Ă© anĂĄlogo a um pub da vida real, onde as pessoas vĂŁo para se encontrar e se socializar.** Para ingressar em um Pub, o usuĂĄrio deve ser convidado primeiro. Um usuĂĄrio pode solicitar um cĂłdigo de convite de um Pub; o Pub simplesmente gerarĂĄ um novo cĂłdigo de convite, mas alguns Pubs podem exigir verificação adicional na forma de verificação de e-mail ou, com alguns Pubs, vocĂȘ deve pedir um cĂłdigo em um fĂłrum pĂșblico ou chat. Pubs tambĂ©m podem mapear aliases de usuĂĄrio, como e-mails ou nome de usuĂĄrio, para IDs de chave pĂșblica para facilitar os pares de referĂȘncia.
Depois que o Pub enviar o cĂłdigo de convite ao usuĂĄrio, o usuĂĄrio resgatarĂĄ o cĂłdigo, o que significa que o Pub seguirĂĄ o usuĂĄrio, o que permite que o usuĂĄrio veja as mensagens postadas por outros membros do Pub, bem como as mensagens de retransmissĂŁo do Pub pelo usuĂĄrio a outros membros do Pub.
AlĂ©m de retransmitir mensagens entre pares, os Pubs tambĂ©m podem armazenar as mensagens. Se Alice estiver offline e Bob transmitir atualizaçÔes de feed, Alice perderĂĄ a atualização. Se Alice ficar online, mas Bob estiver offline, nĂŁo haverĂĄ como ela buscar o feed de Bob. Mas com um Pub, Alice pode buscar o feed no Pub mesmo se Bob estiver off-line porque o Pub estĂĄ armazenando as mensagens. **Pubs sĂŁo Ășteis porque assim que um colega fica online, ele pode sincronizar com o Pub para receber os feeds de seus amigos potencialmente offline.**
Um usuĂĄrio pode, opcionalmente, executar seu prĂłprio servidor Pub e abri-lo ao pĂșblico ou permitir que apenas seus amigos participem, se assim o desejarem. Eles tambĂ©m podem ingressar em um Pub pĂșblico. Aqui estĂĄ uma lista de [Pubs pĂșblicos em que]( https://github.com/ssbc/ssb-server/wiki/Pub-Servers) todos podem participar **.** Explicaremos como ingressar em um posteriormente neste guia. **Uma coisa importante a observar Ă© que o Secure Scuttlebutt em uma rede social somente para convidados significa que vocĂȘ deve ser âpuxadoâ para entrar nos cĂrculos sociais.** Se vocĂȘ responder Ă s mensagens, os destinatĂĄrios nĂŁo serĂŁo notificados, a menos que estejam seguindo vocĂȘ de volta. O objetivo do SSB Ă© criar âilhasâ isoladas de redes pares, ao contrĂĄrio de uma rede pĂșblica onde qualquer pessoa pode enviar mensagens a qualquer pessoa.


Perspectivas dos participantes
## Pubs - Hubs
### Pubs pĂșblicos
| Pub Name | Operator | Invite Code |
| ------------------------------------------------------------ | ------------------------------------------------------------ | ------------------------------------------------------------ |
| `scuttle.us` | [@Ryan]( https://keybase.io/ryan_singer) | `scuttle.us:8008:@WqcuCOIpLtXFRw/9vOAQJti8avTZ9vxT9rKrPo8qG6o=.ed25519~/ZUi9Chpl0g1kuWSrmehq2EwMQeV0Pd+8xw8XhWuhLE=` |
| [pub1.upsocial.com]( https://upsocial.com/) | [@freedomrules]( https://github.com/freedomrules) | `pub1.upsocial.com:8008:@gjlNF5Cyw3OKZxEoEpsVhT5Xv3HZutVfKBppmu42MkI=.ed25519~lMd6f4nnmBZEZSavAl4uahl+feajLUGqu8s2qdoTLi8=` |
| [Monero Pub]( https://xmr-pub.net/) | [@Denis]( https://github.com/Orville2112) | `xmr-pub.net:8008:@5hTpvduvbDyMLN2IdzDKa7nx7PSem9co3RsOmZoyyCM=.ed25519~vQU+r2HUd6JxPENSinUWdfqrJLlOqXiCbzHoML9iVN4=` |
| [FreeSocial]( https://freesocial.co/) | [@Jarland]( https://github.com/mxroute) | `pub.freesocial.co:8008:@ofYKOy2p9wsaxV73GqgOyh6C6nRGFM5FyciQyxwBd6A=.ed25519~ye9Z808S3KPQsV0MWr1HL0/Sh8boSEwW+ZK+8x85u9w=` |
| `ssb.vpn.net.br` | [@coffeverton]( https://about.me/coffeverton) | `ssb.vpn.net.br:8008:@ze8nZPcf4sbdULvknEFOCbVZtdp7VRsB95nhNw6/2YQ=.ed25519~D0blTolH3YoTwSAkY5xhNw8jAOjgoNXL/+8ZClzr0io=` |
| [gossip.noisebridge.info]( https://www.noisebridge.net/wiki/Pub) | [Noisebridge Hackerspace]( https://www.noisebridge.net/wiki/Unicorn) [@james.network]( https://james.network/) | `gossip.noisebridge.info:8008:@2NANnQVdsoqk0XPiJG2oMZqaEpTeoGrxOHJkLIqs7eY=.ed25519~JWTC6+rPYPW5b5zCion0gqjcJs35h6JKpUrQoAKWgJ4=` |
### Pubs privados
VocĂȘ precisarĂĄ entrar em contato com os proprietĂĄrios desses bares para receber um convite.
| Pub Name | Operator | Contact |
| --------------------------------------------- | ------------------------------------------------------------ | ----------------------------------------------- |
| `many.butt.nz` | [@dinosaur]( https://dinosaur.is/) | [mikey@enspiral.com](mailto:mikey@enspiral.com) |
| `one.butt.nz` | [@dinosaur]( https://dinosaur.is/) | [mikey@enspiral.com](mailto:mikey@enspiral.com) |
| `ssb.mikey.nz` | [@dinosaur]( https://dinosaur.is/) | [mikey@enspiral.com](mailto:mikey@enspiral.com) |
| [ssb.celehner.com]( https://ssb.celehner.com/) | [@cel]( https://github.com/ssbc/ssb-server/wiki/@f/6sQ6d2CMxRUhLpspgGIulDxDCwYD7DzFzPNr7u5AU=.ed25519) | [cel@celehner.com](mailto:cel@celehner.com) |
### Pubs muito grandes
 *Aviso: embora tecnicamente funcione usar um convite para esses pubs, vocĂȘ provavelmente se divertirĂĄ se o fizer devido ao seu tamanho (muitas coisas para baixar, risco para bots / spammers / idiotas)* 
| Pub Name | Operator | Invite Code |
| --------------------------------------- | ----------------------------------------------- | ------------------------------------------------------------ |
| `scuttlebutt.de` | [SolSoCoG]( https://solsocog.de/impressum) | `scuttlebutt.de:8008:@yeh/GKxlfhlYXSdgU7CRLxm58GC42za3tDuC4NJld/k=.ed25519~iyaCpZ0co863K9aF+b7j8BnnHfwY65dGeX6Dh2nXs3c=` |
| `Lohn's Pub` | [@lohn]( https://github.com/lohn) | `p.lohn.in:8018:@LohnKVll9HdLI3AndEc4zwGtfdF/J7xC7PW9B/JpI4U=.ed25519~z3m4ttJdI4InHkCtchxTu26kKqOfKk4woBb1TtPeA/s=` |
| [Scuttle Space]( https://scuttle.space/) | [@guil-dot]( https://github.com/guil-dot) | Visit [scuttle.space]( https://scuttle.space/) |
| `SSB PeerNet US-East` | [timjrobinson]( https://github.com/timjrobinson) | `us-east.ssbpeer.net:8008:@sTO03jpVivj65BEAJMhlwtHXsWdLd9fLwyKAT1qAkc0=.ed25519~sXFc5taUA7dpGTJITZVDCRy2A9jmkVttsr107+ufInU=` |
| Hermies | s | net:hermies.club:8008~shs:uMYDVPuEKftL4SzpRGVyQxLdyPkOiX7njit7+qT/7IQ=:SSB+Room+PSK3TLYC2T86EHQCUHBUHASCASE18JBV24= |
## GUI - Interface GrĂĄfica do Utilizador(UsuĂĄrio)
### Patchwork - Uma GUI SSB (Descontinuado)
[**Patchwork**]( https://github.com/ssbc/patchwork) **Ă© o aplicativo de mensagens e compartilhamento descentralizado construĂdo em cima do SSB** . O protocolo scuttlebutt em si nĂŁo mantĂ©m um conjunto de feeds nos quais um usuĂĄrio estĂĄ interessado, entĂŁo um cliente Ă© necessĂĄrio para manter uma lista de feeds de pares em que seu respectivo usuĂĄrio estĂĄ interessado e seguindo.

Fonte: [scuttlebutt.nz]( https://www.scuttlebutt.nz/getting-started)
**Quando vocĂȘ instala e executa o Patchwork, vocĂȘ sĂł pode ver e se comunicar com seus pares em sua rede local. Para acessar fora de sua LAN, vocĂȘ precisa se conectar a um Pub.** Um pub Ă© apenas para convidados e eles retransmitem mensagens entre vocĂȘ e seus pares fora de sua LAN e entre outros Pubs.
Lembre-se de que vocĂȘ precisa seguir alguĂ©m para receber mensagens dessa pessoa. Isso reduz o envio de mensagens de spam para os usuĂĄrios. Os usuĂĄrios sĂł veem as respostas das pessoas que seguem. Os dados sĂŁo sincronizados no disco para funcionar offline, mas podem ser sincronizados diretamente com os pares na sua LAN por wi-fi ou bluetooth.
### Patchbay - Uma GUI Alternativa
Patchbay Ă© um cliente de fofoca projetado para ser fĂĄcil de modificar e estender. Ele usa o mesmo banco de dados que [Patchwork]( https://github.com/ssbc/patchwork) e [Patchfoo]( https://github.com/ssbc/patchfoo) , entĂŁo vocĂȘ pode facilmente dar uma volta com sua identidade existente.

### Planetary - GUI para IOS

[Planetary]( https://apps.apple.com/us/app/planetary-app/id1481617318) é um app com pubs pré-carregados para facilitar integração.
### Manyverse - GUI para Android

[Manyverse]( https://www.manyver.se/) Ă© um aplicativo de rede social com recursos que vocĂȘ esperaria: posts, curtidas, perfis, mensagens privadas, etc. Mas nĂŁo estĂĄ sendo executado na nuvem de propriedade de uma empresa, em vez disso, as postagens de seus amigos e todos os seus dados sociais vivem inteiramente em seu telefone .
## Fontes
* https://scuttlebot.io/
* https://decentralized-id.com/decentralized-web/scuttlebot/#plugins
* https://medium.com/@miguelmota/getting-started-with-secure-scuttlebut-e6b7d4c5ecfd
* [**Secure Scuttlebutt**]( http://ssbc.github.io/secure-scuttlebutt/) **:** um protocolo de banco de dados global.
-

@ 57d1a264:69f1fee1
2025-03-24 17:08:06
Nice podcast with @sbddesign and @ConorOkus about bitcoin payments.
https://www.youtube.com/watch?v=GTSqoFKs1cE
In this episode, Conor, Open Source product manager at Spiral & Stephen, Product Designer at Voltage & Co founder of ATL Bitlab join Stephan to discuss the current state of Bitcoin user experience, particularly focusing on payments and the challenges faced by users. They explore the comparison between Bitcoin and physical cash, the Western perspective on Bitcoin payments, and the importance of user experience in facilitating Bitcoin transactions.
They also touch upon various payment protocols like #BOLT11, #LNURL, and #BOLT12, highlighting the need for interoperability and better privacy features in the Bitcoin ecosystem. The discussion also covers resources available for developers and designers to enhance wallet usability and integration.
@StephanLivera Official Podcast Episode: https://stephanlivera.com/646
### Takeaways
đžBitcoin has excelled as a savings technology.
đžThe payments use case for Bitcoin still needs improvement.
đžUser experience is crucial for Bitcoin adoption.
đžComparing Bitcoin to cash highlights privacy concerns.
đžWestern users may not see a payments problem.
đžRegulatory issues impact Bitcoin payments in the West.
đžUser experience challenges hinder Bitcoin transactions.
đžDifferent payment protocols create compatibility issues.
đžCommunity collaboration is essential for Bitcoin's future.
đžImproving interoperability can enhance Bitcoin payments. Wallet compatibility issues can create negative user impressions.
đžDesigners can significantly improve wallet user experience.
đžTesting compatibility between wallets is essential for user satisfaction.
đžTether's integration may boost Bitcoin adoption.
đžDevelopers should prioritize payment capabilities before receiving capabilities.
đžCollaboration between designers and developers can lead to better products.
đžUser experience improvements can be low-hanging fruit for wallet projects.
đžA global hackathon aims to promote miner decentralization.
đžResources like BOLT12 and the Bitcoin Design Guide are valuable for developers.
đžEngaging with the community can lead to innovative solutions.
### Timestamps
([00:00](/watch?v=GTSqoFKs1cE)) - Intro
([01:10](/watch?v=GTSqoFKs1cE&t=70s)) - What is the current state of Bitcoin usage - Payments or Savings?
([04:32](/watch?v=GTSqoFKs1cE&t=272s)) - Comparing Bitcoin with physical cash
([07:08](/watch?v=GTSqoFKs1cE&t=428s)) - What is the western perspective on Bitcoin payments?
([11:30](/watch?v=GTSqoFKs1cE&t=690s)) - Would people use Bitcoin more with improved UX?
([17:05](/watch?v=GTSqoFKs1cE&t=1025s)) - Exploring payment protocols: Bolt11, LNURL, Bolt12 & BIP353
([30:14](/watch?v=GTSqoFKs1cE&t=1814s)) - Navigating Bitcoin wallet compatibility challenges
([34:45](/watch?v=GTSqoFKs1cE&t=2085s)) - What is the role of designers in wallet development?
([43:13](/watch?v=GTSqoFKs1cE&t=2593s)) - Rumbleâs integration of Tether & Bitcoin; The impact of Tether on Bitcoin adoption
([51:22](/watch?v=GTSqoFKs1cE&t=3082s)) - Resources for wallet developers and designers
### Links:
âąÂ [https://x.com/conorokus](https://x.com/conorokus)
âąÂ [https://x.com/StephenDeLorme](https://x.com/StephenDeLorme)
âąÂ [https://bolt12.org/](https://bolt12.org/)
âąÂ [https://twelve.cash/](https://twelve.cash)
âąÂ [https://bitcoin.design/guide/](https://bitcoin.design/guide/)   Â
âąÂ Setting Up Bitcoin Tips for Streamers](/watch?v=IWTpSN8IaLE) Â
originally posted at https://stacker.news/items/923714
-

@ c631e267:c2b78d3e
2025-02-07 19:42:11
*Nur wenn wir aufeinander zugehen, haben wir die Chance* *\
auf Ăberwindung der gegenseitigen Ressentiments!* *\
Dr. med. dent. Jens Knipphals*  
**In Wolfsburg sollte es kĂŒrzlich eine GesprĂ€chsrunde von Kritikern der Corona-Politik** mit OberbĂŒrgermeister Dennis Weilmann und Vertretern der Stadtverwaltung geben. Der Zahnarzt und [langjĂ€hrige](https://transition-news.org/wo-sind-einigkeit-recht-und-freiheit) MaĂnahmenkritiker Jens Knipphals hatte diese Einladung ins Rathaus erwirkt und [publiziert](https://www.alexander-wallasch.de/impfgeschichten/brandbrief-zahnarzt-laesst-nicht-locker-showdown-im-wolfsburger-rathaus). Seine Motivation:
> «Ich möchte die Spaltung der Gesellschaft ĂŒberwinden. Dazu ist eine umfassende Aufarbeitung der Corona-Krise in der Ăffentlichkeit notwendig.»
**Schon frĂŒher hatte Knipphals Antworten von den Kommunalpolitikern verlangt,** zum Beispiel bei öffentlichen [BĂŒrgerfragestunden](https://archive.is/ttTZc). FĂŒr das erwartete Treffen im Rathaus formulierte er Fragen wie: Warum wurden fachliche Argumente der Kritiker ignoriert? Weshalb wurde deren Ausgrenzung, Diskreditierung und Entmenschlichung nicht entgegengetreten? In welcher Form ĂŒbernehmen Rat und Verwaltung in Wolfsburg persönlich Verantwortung fĂŒr die erheblichen Folgen der politischen Corona-Krise?
**Der Termin fand allerdings nicht statt** â der BĂŒrgermeister sagte ihn kurz vorher wieder ab. Knipphals bezeichnete Weilmann anschlieĂend als [WiederholungstĂ€ter](https://www.youtube.com/watch?v=b_zzp6jKiHo), da das Stadtoberhaupt bereits 2022 zu einem Runden Tisch in der Sache eingeladen hatte, den es dann nie gab. GegenĂŒber *Multipolar* [erklĂ€rte](https://multipolar-magazin.de/artikel/corona-aufarbeitung-wolfsburg) der Arzt, Weilmann wolle scheinbar eine öffentliche Aufarbeitung mit allen Mitteln verhindern. Er selbst sei «inzwischen absolut desillusioniert» und die einzige Lösung sei, dass die Verantwortlichen gingen.
**Die Aufarbeitung der Plandemie beginne bei jedem von uns selbst,** sei aber letztlich eine gesamtgesellschaftliche Aufgabe, [schreibt](https://peds-ansichten.de/2025/01/plandemie-aufarbeitung/) Peter Frey, der den «Fall Wolfsburg» auch in seinem Blog behandelt. Diese Aufgabe sei indes deutlich gröĂer, als viele glaubten. Erfreulicherweise sei der öffentliche Informationsraum inzwischen gröĂer, trotz der weiterhin unverfrorenen Desinformations-Kampagnen der etablierten Massenmedien.
**Frey erinnert daran, dass Dennis Weilmann mitverantwortlich** fĂŒr gravierende GrundrechtseinschrĂ€nkungen wie die 2021 eingefĂŒhrten 2G-Regeln in der Wolfsburger Innenstadt zeichnet. Es sei naiv anzunehmen, dass ein FunktionĂ€r einzig im Interesse der BĂŒrger handeln wĂŒrde. Als frĂŒherer Dezernent des Amtes fĂŒr Wirtschaft, Digitalisierung und Kultur der Autostadt kenne Weilmann zum Beispiel die VerknĂŒpfung von Fördergeldern mit politischen Zielsetzungen gut.
**Wolfsburg wurde damals zu einem Modellprojekt** des Bundesministeriums des Innern (BMI) und war Finalist im [Bitkom](https://pareto.space/a/naddr1qqxnzden8qen2vejxvenjv35qgs2jhrzgwzvvzgz42kfmef2kr7w8x573k4r62c5ydjh8gyn6dz4ytqrqsqqqa28qyxhwumn8ghj7mn0wvhxcmmvqyv8wumn8ghj7mn0wd68ytn8wfhk7an9d9uzucm0d5qs7amnwvaz7tmwdaehgu3wd4hk6qg5waehxw309ahx7um5wghx77r5wghxgetkqydhwumn8ghj7mn0wd68ytnnwa5hxuedv4hxjemdvyhxx6qpzamhxue69uhhqctjv46x7tnwdaehgu339e3k7mgpz4mhxue69uhhqatjwpkx2un9d3shjtnrdaksz9nhwden5te0wfjkccte9cc8scmgv96zucm0d5q3gamnwvaz7tmjv4kxz7fwv3sk6atn9e5k7qgkwaehxw309aex2mrp0yhxummnw3ezucnpdejqmk3pae)-Wettbewerb «Digitale Stadt». So habe rechtzeitig vor der Plandemie das Projekt [«Smart City Wolfsburg»](https://www.beesmart.city/de/city-portraits/smart-city-wolfsburg) anlaufen können, das der Stadt «eine Vorreiterrolle fĂŒr umfassende Vernetzung und Datenerfassung» aufgetragen habe, sagt Frey. Die Vereinten Nationen verkauften dann derartige «intelligente» Ăberwachungs- und KontrollmaĂnahmen ebenso als Rettung in der Not wie das Magazin *[Forbes](https://web.archive.org/web/20200417064208/https://www.forbes.com/sites/simonchandler/2020/04/13/how-smart-cities-are-protecting-against-coronavirus-but-threatening-privacy/#5edf8d0c1cc3)* im April 2020:
> «Intelligente StĂ€dte können uns helfen, die Coronavirus-Pandemie zu bekĂ€mpfen. In einer wachsenden Zahl von LĂ€ndern tun die intelligenten StĂ€dte genau das. Regierungen und lokale Behörden nutzen Smart-City-Technologien, Sensoren und Daten, um die Kontakte von Menschen aufzuspĂŒren, die mit dem Coronavirus infiziert sind. Gleichzeitig helfen die Smart Cities auch dabei, festzustellen, ob die Regeln der sozialen Distanzierung eingehalten werden.»
**Offensichtlich gibt es viele Aspekte zu bedenken und zu durchleuten,** wenn es um die AufklĂ€rung und Aufarbeitung der sogenannten «Corona-Pandemie» und der verordneten [MaĂnahmen](https://transition-news.org/stopptcovid-gutachten-von-lauterbach-erhalt-vernichtende-analyse) geht. Frustration und Desillusion sind angesichts der RealitĂ€ten absolut verstĂ€ndlich. Gerade deswegen sind Initiativen wie die von Jens Knipphals so bewundernswert und so wichtig â ebenso wie eine seiner Kernthesen: «Wir mĂŒssen aufeinander zugehen, da hilft alles nichts».
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/corona-aufarbeitung-in-der-praxis-eine-illusion)*** erschienen.
-

@ 000002de:c05780a7
2025-03-26 18:00:41
Over the past few years I've noticed more people using the [political compass](https://en.wikipedia.org/wiki/The_Political_Compass) to compare where different movements and people fall in comparison to each other.

For many years I have found the left / right evaluation of politics less and less useful. Mostly because it really doesn't account for authoritarianism and other factors such as economics. I'm not sure the political compass is great but it seems better to me.
Have you looked into it? Any issues you've found? Mostly curious what others think about it.
originally posted at https://stacker.news/items/925938
-

@ f1597634:c6d40bf4
2024-10-02 09:00:59
E aĂ, galera do Nostr! JĂĄ pensou em como proteger sua privacidade nesse mundo descentralizado? A gente sabe que a liberdade Ă© daora, mas Ă© importante saber como se proteger dos "bisbilhoteiros" que estĂŁo sempre Ă espreita.
**O perigo das fotos:**
- Sabia que as fotos que vocĂȘ posta podem dar muitas informaçÔes sobre vocĂȘ? Ă tipo deixar um mapa do tesouro nas mĂŁos de alguĂ©m!
- Pessoal mau intencionadas podem usar essas fotos para descobrir onde vocĂȘ mora, qual seu IP e atĂ© mesmo sua identidade!
**Dicas para se proteger:**
- **Escolha seus apps com cuidado:** Nem todos os apps sĂŁo iguais. Procure aqueles que a galera mais confia e que tĂȘm uma boa fama.
- **Ajuste as configuraçÔes:** A maioria dos apps tem configuraçÔes de privacidade. Mexa nelas para mostrar sĂł o que vocĂȘ quiser para os outros.
- **Cuidado com links:** NĂŁo clique em qualquer link que vocĂȘ receber. Pode ser uma armadilha!
Uma boa prĂĄtica ao navegar pelo Nostr Ă© configurar um Proxy *confiĂĄvel* no seu aplicativo. No Nostrudel por exemplo Ă© possĂvel configurar um proxy de imagem atravĂ©s das [configuraçÔes](https://nostrudel.ninja/#/settings/performance).
<img src="https://blossom.primal.net/d6f191331248dc5cc3e8617c0f94e2a2e44341451e0ec3275cc22b5195ccbdb3.jpg">
**Segundo anĂĄlise, as redes a seguir ja disponibilizam esses proxies por padrĂŁo:**
- Amethyst
- Damus
\
**O que Ă© esse tal de proxy?**
- Imagina que vocĂȘ estĂĄ usando uma mĂĄscara. O proxy Ă© tipo essa mĂĄscara, sĂł que para o seu IP. Assim, ninguĂ©m vai saber quem vocĂȘ Ă© de verdade.
- Ă como se vocĂȘ estivesse usando um disfarce para navegar pela internet!
**Outras dicas:**
- **Remover Exif:** Todas as fotos que tiramos possuem metadados, normalmente redes sociais e outras empresas removem esses dados quando recebem a imagem no servidor *(eventualmente pegam os dados)*.
Programas como [ExifCleaner](https://exifcleaner.com) removem essas informaçÔes antes do upload.
**ConclusĂŁo:**
A internet Ă© um lugar incrĂvel, mas tambĂ©m pode ser perigoso. Seguindo essas dicas, vocĂȘ vai poder curtir o Nostr com mais tranquilidade e sem se preocupar com os "bisbilhoteiros".
**Lembre-se:** A segurança é coisa séria! Compartilhe esse guia com seus amigos e ajude a criar uma comunidade mais segura.
**E aĂ, curtiu?**
**fonte: [https://victorhugo.info/artigos/nostr-como-se-proteger-1](https://victorhugo.info/artigos/nostr-como-se-proteger-1)**
-

@ 8d34bd24:414be32b
2025-03-26 15:58:59
Iâll admit that Godâs truth is something I am passionate about. I love Godâs word and I trust every word in the Bible as absolute truth. I hate when people compromise Godâs word. I canât understand Christians that donât want to know God better through His word (maybe partially because I read a stack of books to solve any and every problem or to fulfill any interest).
Lately, the vow made in court to tell the truth, the whole truth, and nothing but the truth has been going through my mind. It comes up regarding almost everything, so I figured maybe God was telling me to write a post on the subject, so here we go.
## The Truth
When we are searching for the truth about anything, we need to start with the Bible. Yes, there are many subjects about which the Bible doesnât speak or doesnât speak in detail, but the principles on which everything is built start with the Bible.
> All Scripture is God-breathed and is useful for teaching, rebuking, correcting and training in righteousness, so that the servant of God may be thoroughly equipped for every good work. (2 Timothy 3:16-17)
Especially when we are trying to learn what God wants from us and our lives, we need to search the Scriptures. We need to study the Scriptures. We need to memorize the Scriptures.
> I have hidden your word in my heart that I might not sin against you. (Psalm 119:11)
It is much more useful to have read the Bible many times and to know its contents cover to cover, so we have it available to us during that debate with a fellow believer, or the discussion with a proud atheist, or when put into a situation of temptation. Having Godâs word âhidden in our heartâ enables us to deal with every situation, just as Jesus did when tempted by the Devil in the wilderness. Jesusâs most common response to every challenge was âAs it is written âŠâ
> Sanctify them by the truth; your word is truth. (John 17:17)
If we want to know the truth and be ready for whatever life throws at us, we need to be like Ezra:
> He had begun his journey from Babylon on the first day of the first month, and he arrived in Jerusalem on the first day of the fifth month, for the gracious hand of his God was on him. **For Ezra had devoted himself to the study and observance of the Law of the Lord, and to teaching its decrees and laws in Israel.** (Ezra 7:9-10) {emphasis mine}
Are you known for devoting yourself to the study and observance of the Law of the Lord, and to teaching its decrees and laws?
## The Whole Truth
Obviously there are God hating atheists who will lie about Godâs word and totally contradict His word. As believers, we are more likely to bend Godâs truth. (Satan does this, too, because it is frequently more effective than an outright lie). There are two primary ways to bend Godâs truth. We either leave out some parts or we add to it. In this section we will focus on telling the whole truth and not leaving out part of the truth.
The error of lying by omission is rampant today. We see it in news reports by the media. We see it in the history taught to our children. We see it in many churches. There are some very uncomfortable truths in the Bible. People donât like to hear that some people will be punished in Hell for all eternity. They donât want to hear that they are sinners and their desires are sinful. They donât like to hear that there is one and only one way to Jesus.
> Jesus said to him, âI am the way, and the truth, and the life; no one comes to the Father but through Me. (John 14:6)
Many believers donât like any conflict. They are afraid that speaking the truth is being judgmental and will hurt relationships and feelings, so they hold back and donât speak the whole truth.
> Deal bountifully with Your servant,\
> That I may live and keep Your word.\
****Open my eyes, that I may behold\
> Wonderful things from Your law.**\
> I am a stranger in the earth;\
****Do not hide Your commandments from me.**\
> My soul is crushed with **longing\
> After Your ordinances at all times.**\
> You rebuke the arrogant, the cursed,\
> Who wander from Your commandments.\
> Take away reproach and contempt from me,\
> For **I observe Your testimonies.**\
> Even though princes sit and talk against me,\
> Your servant meditates on Your statutes.\
> Your testimonies also are my delight;\
> They are my counselors. (Psalm 119:17-24) {emphasis mine}
The psalmist begs God not to â*hide Your commandments from me*.â Should we hide Godâs commandments from ourselves or others because they are uncomfortable?
> He said, âWhat is the word that He spoke to you? Please do not hide it from me. May God do so to you, and more also, if you hide anything from me of all the words that He spoke to you.â (1 Samuel 3:17)
Eli put the harshest curse on Samuel if he didnât speak the full truth communicated by God. We need to truly know and believe Godâs word, so we communicate it fully with others and do not hide it from those whose very heart and soul need Godâs truth.
Many of us may feel like we are not lying because we didnât not explicitly speak an untruth, but withholding part of the truth, so that another is misled, is as much of a lie as speaking an untruth. Both are intended to mislead the other person, usually for our benefit or comfort and to the long-term harm of the other person.
> Finally, brothers and sisters, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirableâ**if anything is excellent or praiseworthyâthink about such things**. **Whatever you have learned or received or heard from me**, or seen in meâ**put it into practice**. And the God of peace will be with you. (Philippians 4:8-9) {emphasis mine}
We need to think on, speak, and put into practice all of Godâs word. Picking and choosing which parts of Godâs word we want to believe, speak, and put into practice is akin to the original sin, â*You will be like gods, knowing good and evil*.â Only God gets to decide what is true or false and what is good or evil. When we choose to pick which parts of the Bible to obey and to share, we are taking the role that belongs solely to God.
## Nothing But the Truth
The other error regarding truth is to add to Godâs word.
> The Pharisees and the scribes asked Him, âWhy do Your disciples not walk according to the tradition of the elders, but eat their bread with impure hands?â And He said to them, âRightly did Isaiah prophesy of you hypocrites, as it is written:
>
> âThis people honors Me with their lips,\
> But their heart is far away from Me.\
> But in vain do they worship Me,\
****Teaching as doctrines the precepts of men.â\
> Neglecting the commandment of God, you hold to the tradition of men**.â (Mark 7:5-8) {emphasis mine}
So often we let tradition, culture, or âscienceâ guide us instead of the Bible. Whenever there is a contradiction between any source and the Bible, we need to put the authority of Godâs word as the highest authority. Although it is possible for us to be mistaken by the meaning of Godâs word and the truth to be more in line with culture or âscience,â it is so much more likely that tradition, culture, or âscienceâ are wrong. We need to use the Bible to interpret things like science rather than to use âscienceâ to interpret the Bible. The Bible is always the higher authority.
Sometimes we add to Godâs word intentionally. Sometimes we are just influenced by the people around us, especially supposed authority figures, and are led astray unintentionally.
> Do your best to present yourself to God as one approved, **a worker who does not need to be ashamed and** **who correctly handles the word of truth**. (2 Timothy 2:15) {emphasis mine}
We need to truly study the whole Bible and test every one of our beliefs against Godâs word.
> **I am astonished that you are so quickly deserting the one** who called you to live in the grace of Christ and are **turning to a different gospel**â **which is really no gospel at all**. Evidently some people are throwing you into confusion and are trying to pervert the gospel of Christ. But even if we or an angel from heaven should preach a gospel other than the one we preached to you, let them be under Godâs curse! As we have already said, so now I say again: If anybody is preaching to you a gospel other than what you accepted, let them be under Godâs curse! (Galatians 1:6-9) {emphasis mine}
We need to use Godâs word to test every idea.
> Do not treat prophecies with contempt but test them all; hold on to what is good, reject every kind of evil. (1 Thessalonians 5:20-22)
and
> Dear friends, **do not believe every spirit, but test the spirits to see whether they are from God, because many false prophets have gone out into the world**. This is how you can recognize the Spirit of God: Every spirit that acknowledges that Jesus Christ has come in the flesh is from God, but every spirit that does not acknowledge Jesus is not from God. This is the spirit of the antichrist, which you have heard is coming and even now is already in the world. (1 John 4:1-3) {emphasis mine}
Godâs word is truth. It never changes. It doesnât change with the times, the culture, or new scientific discoveries. The truth is the truth whether anyone believes it or not.
There are many who will lead you astray and sound like they know what they are talking about. Make sure you do not follow these false teachers in their error (whether the error is intentional or accidental), but even more, make sure you donât spread the error and lead others astray.
> **See to it that no one takes you captive through** philosophy and empty deception, according to the tradition of men, according to the elementary principles of the world, rather than according to Christ. (Colossians 2:8) {emphasis mine}
I think this phrase perfectly describes how error effects us, âSee to it that no one takes you captive through âŠâ Error can be subtle, but can take us captive, lead us astray, and cause us to lead others astray. Only through detailed knowledge of the Scriptures can we defend against it.
> **Donât be deceived**, my dear brothers and sisters. Every good and perfect gift is from above, coming down from the Father of the heavenly lights, **who does not change like shifting shadows**. He chose to give us birth **through the word of truth**, that we might be a kind of firstfruits of all he created. (James 1:16-18) {emphasis mine}
May the Lord of heaven guide us to know the truth, the whole truth, and nothing but the truth and to obey His word in all things to His glory, forever.
Trust Jesus
-

@ a39d19ec:3d88f61e
2025-03-18 17:16:50
Nun da das deutsche Bundesregime den Ruin Deutschlands beschlossen hat, der sehr wahrscheinlich mit dem Werkzeug des Geld druckens "finanziert" wird, kamen mir so viele Gedanken zur Geldmengenausweitung, dass ich diese fĂŒr einmal niedergeschrieben habe.
Die Ausweitung der Geldmenge fĂŒhrt aus klassischer wirtschaftlicher Sicht immer zu Preissteigerungen, weil mehr Geld im Umlauf auf eine begrenzte Menge an GĂŒtern trifft. Dies lĂ€sst sich in mehreren Schritten analysieren:
### 1. QuantitÀtstheorie des Geldes
Die klassische Gleichung der QuantitÀtstheorie des Geldes lautet:
M âą V = P âą Y
wobei:
- M die Geldmenge ist,
- V die Umlaufgeschwindigkeit des Geldes,
- P das Preisniveau,
- Y die reale Wirtschaftsleistung (BIP).
Wenn M steigt und V sowie Y konstant bleiben, muss P steigen â also Inflation entstehen.
### 2. GĂŒtermenge bleibt begrenzt
Die Menge an real produzierten GĂŒtern und Dienstleistungen wĂ€chst meist nur langsam im Vergleich zur Ausweitung der Geldmenge. Wenn die Geldmenge schneller steigt als die ProduktionsgĂŒtermenge, fĂŒhrt dies dazu, dass mehr Geld fĂŒr die gleiche Menge an Waren zur VerfĂŒgung steht â die Preise steigen.
### 3. Erwartungseffekte und Spekulation
Wenn Unternehmen und Haushalte erwarten, dass mehr Geld im Umlauf ist, da eine zentrale Planung es so wollte, können sie steigende Preise antizipieren. Unternehmen erhöhen ihre Preise vorab, und Arbeitnehmer fordern höhere Löhne. Dies kann eine sich selbst verstÀrkende Spirale auslösen.
### 4. Internationale Perspektive
Eine erhöhte Geldmenge kann die WÀhrung abwerten, wenn andere LÀnder ihre Geldpolitik stabil halten. Eine schwÀchere WÀhrung macht Importe teurer, was wiederum Preissteigerungen antreibt.
### 5. Kritik an der reinen Geldmengen-Theorie
Der VollstĂ€ndigkeit halber muss erwĂ€hnt werden, dass die meisten modernen Ăkonomen im Staatsauftrag argumentieren, dass Inflation nicht nur von der Geldmenge abhĂ€ngt, sondern auch von der Nachfrage nach Geld (z. B. in einer Wirtschaftskrise). Dennoch zeigt die historische Erfahrung, dass eine unkontrollierte Geldmengenausweitung langfristig immer zu Preissteigerungen fĂŒhrt, wie etwa in der Hyperinflation der Weimarer Republik oder in Simbabwe.
-

@ a95c6243:d345522c
2025-01-31 20:02:25
*Im Augenblick wird mit gröĂter IntensitĂ€t, groĂer Umsicht* *\
das deutsche Volk belogen.* *\
Olaf Scholz im FAZ-[Interview](https://www.youtube.com/watch?v=c3KI1GmdoVc\&t=649s)*  
**Online-Wahlen stĂ€rken die Demokratie, sind sicher, und 61 Prozent der Wahlberechtigten** sprechen sich fĂŒr deren EinfĂŒhrung in Deutschland aus. Das zumindest behauptet eine aktuelle Umfrage, die auch ĂŒber die Agentur *Reuters* Verbreitung in den Medien [gefunden](https://archive.is/dnZbY) hat. Demnach wĂŒrden auĂerdem 45 Prozent der NichtwĂ€hler bei der Bundestagswahl ihre Stimme abgeben, wenn sie dies zum Beispiel von Ihrem PC, Tablet oder Smartphone aus machen könnten.
**Die telefonische Umfrage unter gut 1000 wahlberechtigten Personen** sei reprĂ€sentativ, [behauptet](https://www.bitkom.org/Presse/Presseinformation/Knapp-Haelfte-Nichtwaehler-wuerde-online-waehlen) der Auftraggeber â der Digitalverband Bitkom. Dieser prĂ€sentiert sich als eingetragener Verein mit einer beeindruckenden Liste von [Mitgliedern](https://www.bitkom.org/Bitkom/Mitgliedschaft/Mitgliederliste), die Software und IT-Dienstleistungen anbieten. ErklĂ€rtes Vereinsziel ist es, «Deutschland zu einem fĂŒhrenden Digitalstandort zu machen und die digitale Transformation der deutschen Wirtschaft und Verwaltung voranzutreiben».
**DurchgefĂŒhrt hat die Befragung die Bitkom Servicegesellschaft mbH,** also alles in der Familie. Die gleiche Erhebung hatte der Verband ĂŒbrigens 2021 schon einmal durchgefĂŒhrt. Damals sprachen sich angeblich sogar 63 Prozent fĂŒr ein derartiges [«Demokratie-Update»](https://www.experten.de/id/4922407/online-wahlen-als-update-des-demokratischen-systems/) aus â die Tendenz ist demgemÀà fallend. Dennoch orakelt mancher, der Gang zur Wahlurne gelte bereits als veraltet.
**Die spanische Privat-Uni mit Globalisten-Touch, IE University, berichtete** Ende letzten Jahres in ihrer Studie «European Tech Insights», 67 Prozent der EuropĂ€er [befĂŒrchteten](https://www.ie.edu/university/news-events/news/67-europeans-fear-ai-manipulation-elections-according-ie-university-research/), dass Hacker Wahlergebnisse verfĂ€lschen könnten. Mehr als 30 Prozent der Befragten glaubten, dass kĂŒnstliche Intelligenz (KI) bereits Wahlentscheidungen beeinflusst habe. Trotzdem wĂŒrden angeblich 34 Prozent der unter 35-JĂ€hrigen einer KI-gesteuerten App vertrauen, um in ihrem Namen fĂŒr politische Kandidaten zu stimmen.
**Wie dauerhaft wird wohl das Ergebnis der kommenden Bundestagswahl sein?** Diese Frage stellt sich angesichts der aktuellen Entwicklung der Migrations-Debatte und der (vorĂŒbergehend) bröckelnden «Brandmauer» gegen die AfD. Das «Zustrombegrenzungsgesetz» der Union hat das Parlament heute Nachmittag ĂŒberraschenderweise [abgelehnt](https://www.bundestag.de/dokumente/textarchiv/2025/kw05-de-zustrombegrenzungsgesetz-1042038). Dennoch muss man wohl kein ausgesprochener Pessimist sein, um zu befĂŒrchten, dass die Entscheidungen der BĂŒrger von den selbsternannten Verteidigern der Demokratie kĂŒnftig vielleicht nicht respektiert werden, weil sie nicht gefallen.
**Bundesweit wird jetzt zu «Brandmauer-Demos» aufgerufen,** die CDU gerĂ€t unter Druck und es wird von Ăbergriffen auf ParteibĂŒros und Drohungen gegen Mitarbeiter [berichtet](https://www.epochtimes.de/politik/deutschland/brandmauer-proteste-cdu-zentrale-geraeumt-kundgebungen-in-46-staedten-a5023745.html). Sicherheitsbehörden warnen vor Eskalationen, die Polizei sei «fĂŒr ein mögliches erhöhtes Aufkommen von Straftaten gegenĂŒber Politikern und gegen ParteigebĂ€ude sensibilisiert».
**Der Vorwand** **[«unzulĂ€ssiger Einflussnahme»](https://transition-news.org/die-minister-faeser-und-wissing-sorgen-sich-um-unzulassige-einflussnahme-auf)** **auf Politik und Wahlen** wird als Argument schon seit einiger Zeit aufgebaut. Der Manipulation schuldig befunden wird neben Putin und Trump auch Elon Musk, was lustigerweise ausgerechnet Bill Gates gerade noch einmal bekrĂ€ftigt und als [«völlig irre»](https://transition-news.org/bill-gates-nennt-musks-einmischung-in-eu-politik-vollig-irre) bezeichnet hat. Man stelle sich die Diskussionen um die GĂŒltigkeit von Wahlergebnissen vor, wenn es Online-Verfahren zur Stimmabgabe gĂ€be. In der Schweiz wird [«E-Voting»](https://www.ch.ch/de/abstimmungen-und-wahlen/e-voting/) seit einigen Jahren getestet, aber wohl bisher mit wenig Erfolg.
**Die politische Brandstiftung der letzten Jahre zahlt sich immer mehr aus.** Anstatt dringende Probleme der Menschen zu lösen â zu denen auch in Deutschland die [weit verbreitete Armut](https://transition-news.org/ein-funftel-der-bevolkerung-in-deutschland-ist-von-armut-oder-sozialer) zĂ€hlt â, hat die Politik konsequent polarisiert und sich auf Ausgrenzung und Verhöhnung groĂer Teile der Bevölkerung konzentriert. Basierend auf Ideologie und LĂŒgen werden abweichende Stimmen unterdrĂŒckt und kriminalisiert, nicht nur und nicht erst in diesem Augenblick. Die nĂ€chsten Wochen dĂŒrften ausgesprochen spannend werden.
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/wahlen-und-wahlen-lassen)*** erschienen.
-

@ df478ecd:495107a7
2025-03-30 03:02:09
Who out there is vibe coding group chat via nostr?
-

@ 866e0139:6a9334e5
2025-03-24 10:50:59
**Autor:** *Ludwig F. Badenhagen.* *Dieser Beitrag wurde mit dem*Â *[Pareto-Client](https://pareto.space/read)*Â *geschrieben.*
***
Einer der wesentlichen GrĂŒnde dafĂŒr, dass wĂ€hrend der âCorona-Pandemieâ so viele Menschen den Anweisungen der Spitzenpolitiker folgten, war sicher der, dass diese Menschen den Politikern vertrauten. Diese Menschen konnten sich nicht vorstellen, dass Spitzenpolitiker den Auftrag haben könnten, die BĂŒrger analog klaren Vorgaben zu belĂŒgen, zu betrĂŒgen und sie vorsĂ€tzlich (tödlich) zu verletzen. Im Gegenteil, diese gutglĂ€ubigen Menschen waren mit der Zuversicht aufgewachsen, dass Spitzenpolitiker den Menschen dienen und deren Wohl im Fokus haben (mĂŒssen). Dies beteuerten Spitzenpolitiker schlieĂlich stets in Talkshows und weiteren Medienformaten. Zwar wurden manche Politiker auch bei Fehlverhalten erwischt, aber hierbei ging es zumeist ânurâ um Geld und nicht um Leben. Und wenn es doch einmal um Leben ging, dann passieren die Verfehlungen âaus Versehenâ, aber nicht mit Vorsatz. So oder so Ă€hnlich dachte die Mehrheit der BĂŒrger.Â
Aber vor 5 Jahren Ă€nderte sich fĂŒr aufmerksame Menschen alles, denn analog dem Lockstep-Szenario der Rockefeller-Foundation wurde der zuvor ausgiebig vorbereitete Plan zur Inszenierung der âCorona-Pandemieâ RealitĂ€t. Seitdem wurde so manchem BĂŒrger, der sich jenseits von Mainstream-Medien informierte, das AusmaĂ der unter dem Vorwand einer erfundenen Pandemie vollbrachten Taten klar. Und unverĂ€ndert kommen tĂ€glich immer neue Erkenntnisse ans Licht. Auf den Punkt gebracht war die Inszenierung der âCorona-Pandemieâ ein Verbrechen an der Menschheit, konstatieren unabhĂ€ngige SachverstĂ€ndige.Â
Dieser Beitrag befasst sich allerdings nicht damit, die vielen Bestandteile dieses Verbrechens (nochmals) aufzuzĂ€hlen oder weitere zu benennen. Stattdessen soll beleuchtet werden, warum die Spitzenpolitiker sich so verhalten haben und ob es ĂŒberhaupt nach alledem möglich ist, der Politik jemals wieder zu vertrauen? Ferner ist es ein Anliegen dieses Artikels, die weiteren ZusammenhĂ€nge zu erörtern. Und zu guter Letzt soll dargelegt werden, warum sich der groĂe Teil der Menschen unverĂ€ndert alles gefallen lĂ€sst.
**Demokratie**
Von jeher organisierten sich Menschen mit dem Ziel, Ordnungsrahmen zu erschaffen, welche wechselseitiges Interagieren regeln. Dies fĂŒhrte aber stets dazu, dass einige wenige alle anderen unterordneten. Der Grundgedanke, der vor rund 2500 Jahren formulierten Demokratie, verfolgte dann aber das Ziel, dass die Masse darĂŒber entscheiden können soll, wie sie leben und verwaltet werden möchte. Dieser Grundgedanke wurde von den MĂ€chtigen sowohl gehasst als auch gefĂŒrchtet, denn die Gefahr lag nahe, dass die besitzlosen Vielen beispielsweise mit einer schlichten Abstimmung verfĂŒgen könnten, den Besitz der Wenigen zu enteignen. Selbst Sokrates war gegen solch eine Gesellschaftsordnung, da die besten Ideen nicht durch die Vielen, sondern durch einige wenige Kluge und Aufrichtige in die Welt kommen. Man mĂŒsse die Vielen lediglich manipulieren und wĂŒrde auf diese Weise quasi jeden Unfug umsetzen können. Die Demokratie war ein Rohrkrepierer.
**Die Mogelpackung âReprĂ€sentative Demokratieâ**
Erst im Zuge der GrĂŒndung der USA gelang der Trick, dem Volk die âReprĂ€sentative Demokratieâ unterzujubeln, die sich zwar nach Demokratie anhört, aber mit der Ursprungsdefinition nichts zu tun hat. Man konnte zwischen zwei Parteien wĂ€hlen, die sich mit ihren jeweiligen Versprechen um die Gunst des Volkes bewarben. TatsĂ€chlich paktierten die Vertreter der gewĂ€hlten Parteien (Politiker) aber mit den wirklich MĂ€chtigen, die letztendlich dafĂŒr sorgten, dass diese Politiker in die jeweiligen exponierten Positionen gelangten, welche ihnen ermöglichten (und somit auch den wirklich MĂ€chtigen), Macht auszuĂŒben. Ăbrigens, ob die eine oder andere Partei âden Volkswillenâ fĂŒr sich gewinnen konnte, war fĂŒr die wirklich MĂ€chtigen weniger von Bedeutung, denn der Wille der wirklich MĂ€chtigen wurde so oder so, wenn auch in voneinander differierenden Details, umgesetzt.
Die Menschen waren begeistert von dieser Idee, denn sie glaubten, dass sie selbst âder SouverĂ€nâ seien. Schluss mit Monarchie sowie sonstiger Fremdherrschaft und UnterdrĂŒckung.
Die MĂ€chtigen waren ebenfalls begeistert, denn durch die ReprĂ€sentative Demokratie waren sie selbst nicht mehr in der Schusslinie, weil das Volk sich mit seinem Unmut fortan auf die Politiker konzentrierte. Da diese Politiker aber vielleicht nicht von einem selbst, sondern von vielen anderen Wahlberechtigten gewĂ€hlt wurden, lenkte sich der Groll der Menschen nicht nur ab von den wirklich MĂ€chtigen, sondern auch ab von den Politikern, direkt auf âdie vielen Idiotenâ aus ihrer eigenen Mitte, die sich âver-wĂ€hltâ hatten. Diese Lenkung des Volkes funktionierte so hervorragend, dass andere LĂ€nder die Grundprinzipien dieses Steuerungsinstrumentes ĂŒbernahmen. Dies ist alles bei Rainer Mausfeld nachzulesen.
UrsprĂŒnglich waren die MĂ€chtigen nur regional mĂ€chtig, sodass das FĂŒhren der eigenen Menschen(vieh)herde eher eine lokale Angelegenheit war. Somit mussten auch nur lokale Probleme gelöst werden und die Mittel zur Problemlösung blieben im eigenen Problembereich.
***
JETZT ABONNIEREN:
***[Hier](https://pareto.space/u/friedenstaube@pareto.space)*** *können Sie die Friedenstaube abonnieren und bekommen die Artikel in Ihr Postfach, vorerst fĂŒr alle kostenfrei, wir starten gĂ€nzlich ohne Paywall. (Die Bezahlabos fangen erst zu laufen an, wenn ein Monetarisierungskonzept fĂŒr die Inhalte steht).*
***
* FĂŒr **50 CHF/EURO** bekommen Sie ein Jahresabo der Friedenstaube.
* FĂŒr **120 CHF/EURO** bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
* FĂŒr **500 CHF/EURO** werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
* Ab **1000 CHF/EURO** werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
**FĂŒr Einzahlungen in CHF (Betreff: Friedenstaube):**
[](https://substackcdn.com/image/fetch/f_auto%2Cq_auto%3Agood%2Cfl_progressive%3Asteep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3fdee17a-c22f-404e-a10c-7f87a7b8182a_2176x998.png)
**FĂŒr Einzahlungen in Euro:**
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
**Betreff: Friedenstaube**
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: <milosz@pareto.space> oder <kontakt@idw-europe.org>.
***
**Beherrschungsinstrumente der globalen Massenhaltung**
Im Zuge der territorialen Erweiterungen der âBesitzungenâ einiger wirklich MĂ€chtiger wurden die Verwaltungs- und Beherrschungsinstrumente ĂŒberregionaler. Und heute, zu Zeiten der globalen Vernetzung, paktieren die wirklich MĂ€chtigen miteinander und beanspruchen die Weltherrschaft. LĂ€ngst wird offen ĂŒber die finale Realisierung einen Weltregierung, welche die Nationalstaaten ânicht mehr benötigtâ, gesprochen. Dass sich Deutschland, ebenso wie andere europĂ€ische Staaten, der EU untergeordnet hat, dĂŒrfte auch Leuten nicht entgangen sein, die sich nur ĂŒber die Tagesschau informieren. LĂ€ngst steht das EU-Recht ĂŒber dem deutschen Recht. Und nur kurze Zeit ist es her, als die EU und alle ihre Mitgliedsstaaten die WHO autonom darĂŒber entscheiden lassen wollten, was eine Pandemie ist und wie diese fĂŒr alle verbindlich âbekĂ€mpftâ werden soll. Eine spannende Frage ist nun, wer denn ĂŒber der EU und der WHO sowie anderen Institutionen steht?
Diese Beschreibung macht klar, dass ein âsouverĂ€nes Landâ wie das unverĂ€ndert von der amerikanischen Armee besetzte Deutschland in der Entscheidungshierarchie an die Weisungen ĂŒbergeordneter Entscheidungsorgane gebunden ist. An der Spitze stehen - wie kann es anders sein - die wirklich MĂ€chtigen.Â
Aber was nĂŒtzt es dann, Spitzenpolitiker zu wĂ€hlen, wenn diese analog Horst Seehofer nichts zu melden haben? Ist das WĂ€hlen von Politikern nicht völlig sinnlos, wenn deren Wahlversprechen ohnehin nicht erfĂŒllt werden? Ist es nicht so, dass die Menschen, welche ihre Stimme nicht behalten, sondern abgeben, das bestehende System nur nĂ€hren, indem sie Wahlergebnisse akzeptieren, ohne zu wissen, ob diese manipuliert wurden, aber mit der Gewissheit, dass das im Zuge des Wahlkampfes Versprochene auf keinen Fall geliefert wird? Aktive WĂ€hler glauben trotz allem an die Redlichkeit und Wirksamkeit von Wahlen, und sie akzeptieren Wahlergebnisse, weil sie denken, dass sie von âso vielen Idioten, die falsch wĂ€hlenâ, umgeben sind, womit wir wieder bei der Spaltung sind. Sie glauben, der Stand des aktuellen Elends sei âselbst gewĂ€hltâ.
**Die Wahl der Aufseher**
Stellen Sie sich bitte vor, Sie wĂ€ren im GefĂ€ngnis, weil Sie einen kritischen Artikel mit âgefĂ€llt mirâ gekennzeichnet haben oder weil Sie eine âKontaktschuldâ trifft, da in Ihrer Nachbarschaft ein âverschwörerisches Symbolâ von einem âaufmerksamenâ Nachbarn bei einer âMeldestelleâ angezeigt wurde oder Sie gar eine Tat, âunterhalb der Strafbarkeitsgrenzeâ begangen hĂ€tten, dann wĂŒrden Sie möglicherweise mit MaĂnahmen bestraft, die âkeine Folter wĂ€renâ. Beispielsweise wĂŒrde man Sie wĂ€hrend Ihrer âUmerziehungshaftâ mit Waterboarding, Halten von Stresspositionen, Dunkelhaft etc. dabei âunterstĂŒtzenâ, âIhre Verfehlungen zu ĂŒberdenkenâ. Stellen Sie sich weiterhin vor, dass Sie, so wie alle anderen Inhaftierten, an der alle vier Jahre stattfindenden Wahl der Aufseher teilnehmen könnten, und Sie hĂ€tten auch einen Favoriten, der zwar Waterboarding betreibt, aber gegen alle anderen MaĂnahmen steht. Sie hĂ€tten sicher allen Grund zur Freude, wenn Sie Ihren Kandidaten durchbringen könnten, oder? Aber was wĂ€re, wenn der Aufseher Ihrer Wahl dann dennoch alle 3 âNicht-Folter-MaĂnahmenâ anwenden wĂŒrde, wie sĂ€mtliche anderen Aufseher zuvor? SpĂ€testens dann mĂŒssten Sie sich eingestehen, dass es der Beruf des Aufsehers ist, Aufseher zu sein und dass er letztendlich tut, was ihm âvon obenâ aufgetragen wird. Andernfalls verliert er seinen Job. Oder er verunfallt oder gerĂ€t in einen Skandal etc. So oder so, er verliert seinen Job - und den erledigt dann ein anderer Aufseher.
Die Wahl des Aufsehers Ă€ndert wenig, solange Sie sich im System des GefĂ€ngnisses befinden und der Aufseher integraler Bestandteil dieses Systems ist. Zur Realisierung einer tatsĂ€chlichen Ănderung mĂŒssten Sie dort herauskommen.
Dieses Beispiel soll darstellen, dass alles in Hierarchien eingebunden ist. Die in einem System eingebundenen Menschen erfĂŒllen ihre zugewiesenen Aufgaben, oder sie werden bestraft.
**Das aktuelle System schadet dem Volk**
Auch in der staatlichen Organisation von Menschen existieren hierarchische Gliederungen. Eine kommunale Selbstverwaltung gehört zum Kreis, dieser zum Land, dieses zum Staat, dieser zur EU, und diese - zu wem auch immer. Und vereinnahmte Gelder flieĂen nach oben. Obwohl es natĂŒrlich wĂ€re, dass die Mittel dorthin flieĂen, wo sie der Allgemeinheit und nicht einigen wenigen dienen, also nach unten.
Warum muss es also eine Weltregierung geben? Warum sollen nur einige Wenige ĂŒber alle anderen bestimmen und an diesen verdienen (Nahrung, Medikamente, Krieg, Steuern etc.)? Warum sollen Menschen, so wie Vieh, das jemandem âgehörtâ, mit einem Code versehen und bereits als Baby zwangsgeimpft werden? Warum mĂŒssen alle Transaktionen und sĂ€mtliches Verhalten strickt gesteuert, kontrolliert und bewertet werden?Â
Viele Menschen werden nach alledem zu dem Schluss kommen, dass solch ein System nur einigen wenigen wirklich MĂ€chtigen und deren Helfershelfern nĂŒtzt. Aber es gibt auch eine Gruppe Menschen, fĂŒr die im Land alles beanstandungsfrei funktioniert. Die Spaltung der Menschen ist perfekt gelungen und sofern die eine Gruppe darauf wartet, dass die andere âendlich aufwachtâ, da die Fakten doch auf dem Tisch liegen, so wird sie weiter warten dĂŒrfen.
Julian Assange erwĂ€hnte einst, dass es fĂŒr ihn eine unglaubliche EnttĂ€uschung war, dass ihm niemand half. Assange hatte Ungeheuerlichkeiten aufgedeckt. Es gab keinen Aufstand. Assange wurde inhaftiert und gefoltert. Es gab keinen Aufstand. Assange sagte, er hĂ€tte nicht damit gerechnet, dass die Leute âso unglaublich feigeâ seien.
Aber womit rechnete er den stattdessen? Dass die Massen âsich erhebenâ. Das gibt es nur im Film, denn die Masse besteht aus vielen maximal Indoktrinierten, die sich wie Schafe verhalten, was als ZĂŒchtungserfolg der Leute an den Schalthebeln der Macht und deren Herren, den wirklich MĂ€chtigen, anzuerkennen ist. Denn wer mĂ€chtig ist und bleiben möchte, will sicher keine problematischen Untertanen, sondern eine gefĂŒgige, Ă€ngstliche Herde, die er nach Belieben ausbeuten und steuern kann. Wenn er hierĂŒber verfĂŒgt, will er keinen Widerstand.
Ob Corona, Krieg, Demokratie- und Klimarettung oder MeinungsĂ€uĂerungsverbote und BĂŒrgerrechte, die unterhalb der Strafbarkeitsgrenze liegen, all diese und viele weitere Stichworte mehr sind es, die viele traurig und so manche wĂŒtend machen.
Auch das Mittel des Demonstrierens hat sich als völlig wirkungslos erwiesen. Die vielen gruseligen Videoaufnahmen ĂŒber die massivsten Misshandlungen von Demonstranten gegen die Corona-MaĂnahmen fĂŒhren zu dem Ergebnis, dass die Exekutive ihr Gewaltmonopol nutzt(e), um die Bevölkerung gezielt zu verletzen und einzuschĂŒchtern. Bekanntlich kann jede friedliche Demonstration zum Eskalieren gebracht werden, indem man Menschen in die Enge treibt (fehlender Sicherheitsabstand) und einige V-Leute in Zivil mit einschlĂ€gigen Flaggen und sonstigen âSymbolenâ einschleust, die fĂŒr Krawall sorgen, damit die gepanzerten Kollegen dann losknĂŒppeln und die scharfen Hunde zubeiĂen können. So lauten zumindest die Berichte vieler Zeitzeugen und so ist es auch auf vielen Videos zu sehen. Allerdings nicht im Mainstream.
Dieses Vorgehen ist deshalb besonders perfide, weil man den Deutschen ihre Wehrhaftigkeit aberzogen hat. Nicht wehrfĂ€hige BĂŒrger und eine brutale Staatsmacht mit Gewaltmonopol fĂŒhren zu einem Gemetzel bei den BĂŒrgern.Â
Ăhnliches lĂ€sst sich auch in zivilen Lebenssituationen beobachten, wenn die hiesige zivilisierte Bevölkerung auf âeingereisteâ Massenvergewaltiger und Messerstecher trifft, die ĂŒber ein anderes Gewalt- und RechtsverstĂ€ndnis verfĂŒgen als die Einheimischen.
**System-Technik**
Die These ist, dass es eine Gruppe von global agierenden Personen gibt, welche das Geschehen auf der Erde zunehmend wirksam zu ihrem individuellen Vorteil gestaltet. Wie sich diese Gruppe definiert, kann bei John Coleman (Das Komitee der 300) und David Icke nachgelesen werden. Hierbei handelt es ich um Autoren, die jahrzehntelang analog streng wissenschaftlichen Grundlagen zu ihren Themen geforscht haben und in ihren jeweiligen Werken sĂ€mtliche Quellen benennen. Diese Autoren wurden vom Mainstream mit dem PrĂ€dikatsmerkmal âVerschwörungstheoretikerâ ausgezeichnet, wodurch die Ergebnisse Ihrer Arbeiten umso glaubwĂŒrdiger sind.Â
Diese mĂ€chtige Gruppe hat mit ihren Schergen nahezu den gesamten Planeten infiltriert, indem sie Personen in fĂŒhrenden Positionen in vielen Belangen gröĂtmögliche Freiheiten sowie Schutz gewĂ€hrt, aber diesen im Gegenzug eine völlige Unterwerfung bei Kernthemen abfordert. Die Motivatoren fĂŒr diese Unterwerfung sind, abgesehen von materiellen Zuwendungen, auch âRuhm und Ehre sowie Machtâ. Manchmal wird auch Beweismaterial fĂŒr begangene Verfehlungen (Lolita-Express, Pizzagate etc.) genutzt, um Forderungen Nachdruck zu verleihen. Und auch körperliche Bestrafungen der betroffenen Person oder deren Angehörigen zĂ€hlen zum Repertoire der Motivatoren. Letztendlich Ă€hnlich den Verhaltensweisen in einem Mafia-Film.
Mit dieser Methodik hat sich diese mĂ€chtige Gruppe im Laufe von Jahrhunderten! eine Organisation erschaffen, welche aus Kirchen, Parteien, Firmen, NGO, Vereinen, VerbĂ€nden und weiteren Organisationsformen besteht. Bestimmte Ămter und Positionen in Organisationen können nur von Personen eingenommen und gehalten werden, die âauf Linie sindâ.Â
Die Mitglieder der Gruppe tauchen in keiner Rubrik wie âDie reichsten Menschen der Weltâ auf, sondern bleiben fern der Ăffentlichkeit. Wer jemanden aus ihren Reihen erkennt und beschuldigt, ist ein âAntisemitâ oder sonstiger ĂbeltĂ€ter und wird verfolgt und bekĂ€mpft. Ăber mĂ€chtige Vermögensverwaltungskonzerne beteiligen sich die Mitglieder dieser Gruppe anonym an Unternehmen in SchlĂŒsselpositionen in einer Dimension, die ihnen wesentlichen Einfluss auf die Auswahl der Topmanager einrĂ€umt, sodass die jeweilige Unternehmenspolitik nach Vorgaben der Gruppe gestaltet wird.
Die Gruppe steuert das Geldsystem, von dem sich der Planet abhĂ€ngig zu sein wĂ€hnt. Hierzu eine ErlĂ€uterung: Ein Staat wie Deutschland ist bekanntlich maximal verschuldet. Man stelle sich vor, ein unliebsamer Politiker wĂŒrde entgegen sĂ€mtlicher âBrandmauernâ und sonstiger Propaganda und Wahlmanipulationen gewĂ€hlt, das Land zu fĂŒhren, dann könnte dieser keine Kredit ĂŒber 500 Mrd. Euro bei der nĂ€chsten Sparkasse beantragen, sondern wĂ€re auf die MĂ€chtigen dieser Welt angewiesen. Jeder weiĂ, dass Deutschland als Staat kein funktionierendes GeschĂ€ftsmodell hat und somit nicht in der Lage ist, solch ein Darlehen zurĂŒckzuzahlen. Welche Motivation sollte also jemand haben, einem Land wie Deutschland so viel Geld ohne Aussicht auf RĂŒckfĂŒhrung zu geben? Es leuchtet ein, dass dieser Politiker andere GefĂ€lligkeiten anbieten mĂŒsste, um das Darlehen zu bekommen. Im Falle einer Weigerung zur Kooperation könnte der Staatsapparat mit seinen Staatsdienern, BĂŒrgergeld- und RentenempfĂ€nger etc. nicht mehr bezahlt werden und dieser Politiker wĂ€re schnell wieder weg. Er wĂŒrde medial hingerichtet. Es ist somit davon auszugehen, dass ein Spitzenpolitiker dieser Tage nicht ĂŒber viele Optionen verfĂŒgt, denn er ĂŒbernimmt eine Situation, die von seinen VorgĂ€ngern erschaffen wurde. Trotz alledem darauf zu hoffen, dass es einen anderen Politiker geben könnte, mit dem dann alles wieder gut wird, mutet ziemlich infantil an.Â
Dass ein GroĂteil der Medien von Zuwendungen abhĂ€ngig ist, dĂŒrfte ebenfalls leicht nachzuvollziehen sein, denn der gewöhnliche BĂŒrger zahlt nichts fĂŒr den Content der MSM. AbhĂ€ngig davon, von wem (Regierung, Philanthrop, Konzern etc.) ein Medium am Leben gehalten wird, gestalten sich auch dessen Inhalte. Und wenn angewiesen wird, dass ein Politiker medial hingerichtet werden soll, dann bedient die Maschinerie das Thema. Man beobachte einfach einmal, dass Politiker der Kartell-Parteien völlig anders behandelt werden als solche jenseits der âBrandmauerâ. Und der Leser, der solche Auftragsarbeiten kostenlos liest, ist der Konsument, fĂŒr dessen Indoktrination die Finanziers der Verlage gerne zahlen. Mittlerweile kann durch die Herrschaft ĂŒber die Medien und die systematische Vergiftung der Körper und Geister der Population die öffentliche Meinung gesteuert werden. Die ĂŒberwiegende Zahl der Deutschen scheint nicht mehr klar denken zu können.
Wer sich das aktuelle Geschehen in der deutschen Politik mit klarem Verstand ansieht, kommt nicht umhin, eine Fernsteuerung der handelnden Politiker in Betracht zu ziehen. Aber was soll daran verwundern? Sind es deshalb âböse Menschenâ? Sind die in âForschungslaborenâ arbeitenden QuĂ€ler von âVersuchstierenâ böse Menschen? Sind der SchlĂ€chter, der Folterer und der Henker böse Menschen? Oder der knĂŒppelnde Polizist? Es handelt sich zunĂ€chst einmal um Personen, die einen Vorteil dadurch haben, Ihrer TĂ€tigkeit nachzugehen. Sie sind integrale Bestandteile eines Belohnungssystems, welches von oben nach unten Anweisungen gibt. Und wenn diese Anweisungen nicht befolgt werden, fĂŒhrt dies fĂŒr den Befehlsverweigerer zu Konsequenzen.
**Der klare Verstand**
Es ist nun eine spannende Frage, warum so viele Menschen sich solch eine Behandlung gefallen lassen? Nun, das ist relativ einfach, denn das angepasste Verhalten der Vielen ist nichts anderes als ein ZĂŒchtungserfolg der Wenigen.
Die Psyche der Menschen ist ebenso akribisch erforscht worden wie deren Körperfunktionen. WĂŒrden die Menschen von den wirklich MĂ€chtigen geliebt, dann wĂŒrde genau gewusst, wie sie zu behandeln und mit ihren jeweiligen BedĂŒrfnissen zu versorgen sind. Stattdessen werden die Menschen aber als eine Einnahmequelle betrachtet. Dies manifestiert sich exemplarisch in folgenden Bereichen:
1. Das Gesundheitssystem verdient nichts am gesunden Menschen, sondern nur am (dauerhaft) kranken, der um Schmerzlinderung bettelt. Bereits als Baby werden Menschen geimpft, was die jeweilige Gesundheit (mit Verweis auf die Werke von Anita Petek-Dimmer u. a.) nachhaltig negativ beeinflusst. Wer hat denn heute keine Krankheiten? Die âExpertenâ des Gesundheitssystems verteufeln Vitamin D, Vitamin C, Lithium, die Sonne, Natur etc. und empfehlen stattdessen PrĂ€parate, die man patentieren konnte und mit denen die Hersteller viel Geld verdienen. Die PrĂ€parate heilen selten, sondern lindern bestenfalls zuvor kĂŒnstlich erzeugte Leiden, und mĂŒssen oftmals dauerhaft eingenommen werden. Was ist aus den nicht Geimpften geworden, die alle sterben sollten? Sind diese nicht die einzigen Gesunden dieser Tage? Ist nicht jeder Geimpfte entweder permanent krank oder bereits tot? Abgesehen von denen, welche das GlĂŒck hatten, âSonderchargenâ mit Kochsalz zu erhalten. \
\
Wem gehören die wesentlichen Player im Gesundheitswesen zu einem erheblichen Teil? Die Vermögensverwalter der wirklich MÀchtigen.
2. Ăhnlich gestaltet es sich bei der ErnĂ€hrungsindustrie. Die von dort aus verabreichten Produkte sind die Ursachen fĂŒr den Gesundheitszustand der deutschen Population. Das ist aber auch irgendwie logisch, denn wer sich nicht falsch ernĂ€hrt und gesund bleibt, wird kein Kunde des Gesundheitswesens. \
\
Die BesitzverhÀltnisse in der ErnÀhrungsindustrie Àhneln denen im Gesundheitswesen, sodass am gleichen Kunden gearbeitet und verdient wird.
3. Die AufzĂ€hlung konnte nun ĂŒber die meisten Branchen, in denen mit dem Elend der Menschen viel verdient werden kann, fortgesetzt werden. Waffen (BlackRock erhöhte beispielsweise seine Anteile an der Rheinmetall AG im Juni 2024 auf 5,25 Prozent. Der US-Vermögensverwalter ist damit der zweitgröĂte Anteilseigner nach der französischen GroĂbank SociĂ©tĂ© GĂ©nĂ©rale.), Energie, Umwelt, Technologie, IT, Software, KI, Handel etc.
Wie genau Chemtrails und Technologien wie 5G auf den Menschen und die Tiere wirken, ist ebenfalls umstritten. Aber ist es nicht seltsam, wie krank, empathielos, antriebslos und aggressiv viele Menschen heute sind? Was genau verabreicht man der Berliner Polizei, damit diese ihre PrĂŒgelorgien auf den RĂŒcken und in den Gesichtern der Menschen wahrnehmen, die friedlich ihre Demonstrationsrechte wahrnehmen? Und was erhalten die ganzen zugereisten âFachkrĂ€fteâ, die mit Ihren Autos in Menschenmengen rasen oder auch Kinder und Erwachsene niedermessern?
Das Titelbild dieses Beitrags zeigt einige Gebilde, welche regelmĂ€Ăig bei Obduktionen von Geimpften in deren BlutgefĂ€Ăen gefunden werden. Wie genau wirken diese kleinen Monster? Können wir Menschen ihr UnverstĂ€ndnis und ihr Nicht-Aufwachen vorwerfen, wenn wir erkennen, dass diese Menschen maximal vergiftet wurden? Oder sollten einfach Lösungen fĂŒr die Probleme dieser Zeit auch ohne den Einbezug derer gefunden werden, die offenbar nicht mehr Herr ihrer Sinne sind?
**Die Ziele der wirklich MĂ€chtigen**
Wer sich entsprechende Videosequenzen der Bilderberger, des WEF und anderen âĂberorganisationenâ ansieht, der erkennt schnell das Muster:
* Reduzierung der Weltpopulation um ca. 80 Prozent
* Zusammenbruch der Wirtschaft, damit diese von den Konzernen ĂŒbernommen werden kann.
* Zusammenbruch der öffentlichen Ordnung, um eine totale Entwaffnung und eine totale Ăberwachung durchsetzen zu können.Â
* Zusammenbruch der Regierungen, damit die Weltregierung ĂŒbernehmen kann.
Es ist zu ĂŒberdenken, ob die Weltregierung tatsĂ€chlich das fĂŒr die Vielen beste Organisationssystem ist, oder ob die dezentrale Eigenorganisation der jeweils lokalen Bevölkerung nicht doch die bessere Option darstellt. Baustellen wĂŒrden nicht nur begonnen, sondern auch schnell abgearbeitet. Jede Region könnte bestimmen, ob sie sich mit Chemtrails und anderen Substanzen besprĂŒhen lassen möchte. Und die Probleme in Barcelona könnte die Menschen dort viel besser lösen als irgendwelche wirklich MĂ€chtigen in ihren ElfenbeintĂŒrmen. Die lokale Wirtschaft könnte wieder zurĂŒckkommen und mit dieser die EigenstĂ€ndigkeit. Denn die den wirklich MĂ€chtigen ĂŒber ihre Vermögensverwalter gehörenden GroĂkonzerne haben offensichtlich nicht das Wohl der Bevölkerung im Fokus, sondern eher deren Ausbeutung.
Das Aussteigen aus dem System ist die wahre Herkulesaufgabe und es bedarf sicher Mut und Klugheit, sich dieser zu stellen. Die Politiker, die unverĂ€ndert die Narrative der wirklich MĂ€chtigen bedienen, sind hierfĂŒr denkbar ungeeignet, denn sie verfolgen kein Lebensmodell, welches sich von Liebe und MitgefĂŒhl geleitet in den Dienst der Gesamtheit von Menschen, Tieren und Natur stellt.
Schauen Sie einmal genau hin, denken Sie nach und fĂŒhlen Sie mit.
**Was tun?**
Jedes System funktioniert nur so lange, wie es unterstĂŒtzt wird. Somit stellt sich die Frage, wie viele Menschen das System ignorieren mĂŒssen, damit es kollabiert, und auf welche Weise dieses Ignorieren durchzufĂŒhren ist? Merkbar ist, dass die groĂe Masse der Verwaltungsangestellten krank und oder unmotiviert und somit nicht wirksam ist. WĂŒrden die entsprechenden Stellen massiv belastet und parallel hierzu keine Einnahmen mehr realisieren, wĂ€re ein Kollaps nah. Die PrĂŒgelpolizisten aus Berlin können nicht ĂŒberall sein und normale Polizisten arbeiten nicht gegen unbescholtene BĂŒrger, sondern sorgen sich selbst um ihre Zukunft. Gewalt ist sicher keine Lösung, und sicher auch nicht erforderlich.Â
Wie eine gerechte Verwaltungsform aufgebaut werden muss? Einfach so, wie sie in den hiesigen Gesetzen beschrieben steht. Aber eine solche Organisationsform muss frei sein von Blockparteien und korrupten Politikern und weisungsgebundenen Richtern etc. Stattdessen werden Menschen benötigt, welche die Menschen lieben und ihnen nicht schaden wollen. AuĂerdem sollten diese FĂŒhrungspersonen auch wirklich etwas können, und nicht nur âPolitikerâ ohne weitere Berufserfahrungen sein.
***
Ludwig F. Badenhagen (Pseudonym, Name ist der Redaktion bekannt).
*Der Autor hat deutsche Wurzeln und betrachtet das Geschehen in Deutschland und Europa aus seiner Wahlheimat SĂŒdafrika. Seine Informationen bezieht er aus verlĂ€sslichen Quellen und insbesondere von Menschen, die als âVerschwörungstheoretikerâ, âNaziâ, âAntisemitâ sowie mit weiteren Kampfbegriffen der dortigen Systemakteure wie Politiker und âJournalistenâ diffamiert werden. Solche Diffamierungen sind fĂŒr ihn ein PrĂ€dikatsmerkmal. Er ist international agierender Manager mit einem globalen Netzwerk und verfĂŒgt hierdurch ĂŒber tiefe Einblicke in Konzerne und Politik.*
***
**Not yet on** **[Nostr](https://nostr.com/)** **and want the full experience?** Easy onboarding via **[Start.](https://start.njump.me/)**
-

@ 5d4b6c8d:8a1c1ee3
2025-03-26 14:26:20
@Coffeee listened to me ranting about how stupid the current sports streaming situation is, on the [latest episode](https://www.fountain.fm/episode/8oKay16q5tFFhJYQAvYL) of the [Stacker Sports Pod](https://www.fountain.fm/show/syQHHkLs59GQ1eFAe64t) (which made it in the [top 40](https://www.fountain.fm/charts) on Fountain!).
He messaged me that pretty much all sporting events can be watched live at https://betplay.io/en/. I couldn't believe it. Can it really be that simple? Well, last night's NBA games were certainly viewable.
This is huge! Sports streaming costs an insane amount and it's been available for free this whole time.
Apparently, other sportsbooks have had this option for a long time, but they are KYC and require a sufficient deposit before you can stream. Not only is BetPlay non-KYC, but there's no deposit required. It also uses LN!
I'm starting to see why this is Coffee's favorite sportsbook.
originally posted at https://stacker.news/items/925709
-

@ a95c6243:d345522c
2025-01-24 20:59:01
*Menschen tun alles, egal wie absurd,* *\
um ihrer eigenen Seele nicht zu begegnen.* *\
Carl Gustav Jung*  
**«Extremer Reichtum ist eine Gefahr fĂŒr die Demokratie»,** sagen ĂŒber die HĂ€lfte der knapp 3000 befragten MillionĂ€re aus G20-Staaten laut einer [Umfrage](https://web.archive.org/web/20250122124803/https://patrioticmillionaires.org/web/20250122124803/https://patrioticmillionaires.org/press/nearly-two-thirds-of-millionaires-think-influence-of-the-super-rich-on-trump-presidency-is-threat-to-global-stability/) der «Patriotic Millionaires». Ferner stellte dieser Zusammenschluss wohlhabender US-Amerikaner fest, dass 63 Prozent jener MillionĂ€re den Einfluss von Superreichen auf US-PrĂ€sident Trump als Bedrohung fĂŒr die globale StabilitĂ€t ansehen.
**Diese Besorgnis haben 370 MillionĂ€re und MilliardĂ€re am Dienstag** auch den in Davos beim WEF konzentrierten Privilegierten aus aller Welt ĂŒbermittelt. In einem offenen Brief forderten sie die «gewĂ€hlten FĂŒhrer» auf, die Superreichen â also sie selbst â zu besteuern, um «die zersetzenden Auswirkungen des extremen Reichtums auf unsere Demokratien und die Gesellschaft zu bekĂ€mpfen». Zum Beispiel kontrolliere eine handvoll extrem reicher Menschen die Medien, beeinflusse die Rechtssysteme in unzulĂ€ssiger Weise und verwandele Recht in Unrecht.
**Schon 2019** **[beanstandete](https://www.youtube.com/watch?v=paaen3b44XY)** **der bekannte Historiker und Schriftsteller Ruthger Bregman** an einer WEF-Podiumsdiskussion die Steuervermeidung der Superreichen. Die elitĂ€re Veranstaltung bezeichnete er als «Feuerwehr-Konferenz, bei der man nicht ĂŒber Löschwasser sprechen darf.» Daraufhin erhielt Bregman keine Einladungen nach Davos mehr. Auf seine Aussagen machte der Schweizer Aktivist Alec Gagneux aufmerksam, der sich seit Jahrzehnten kritisch mit dem WEF befasst. Ihm wurde kĂŒrzlich der Zutritt zu einem dreiteiligen Kurs ĂŒber das WEF an der Volkshochschule Region Brugg [verwehrt](https://transition-news.org/wef-propaganda-an-schweizer-volkshochschule-kritiker-ausgesperrt).
**Nun ist die Erkenntnis, dass mit Geld politischer Einfluss einhergeht,** alles andere als neu. Und extremer Reichtum macht die Sache nicht wirklich besser. Trotzdem hat man ĂŒber Initiativen wie Patriotic Millionaires oder [Taxmenow](https://www.taxmenow.eu/) bisher eher selten etwas gehört, obwohl es sie schon lange gibt. Auch scheint es kein Problem, wenn ein Herr [Gates](https://transition-news.org/bill-melinda-gates-stiftung) fast im Alleingang versucht, globale Gesundheits-, Klima-, ErnĂ€hrungs- oder Bevölkerungspolitik zu betreiben â im Gegenteil. Im Jahr, als der MilliardĂ€r Donald Trump zum zweiten Mal ins WeiĂe Haus einzieht, ist das Echo in den Gesinnungsmedien dagegen enorm â und uniform, wer hĂ€tte das gedacht.

**Der neue US-PrĂ€sident hat jedoch** **[«Davos geerdet»](https://www.achgut.com/artikel/trump_erdet_davos_gruener_betrug_green_new_scam),** wie *Achgut* es nannte. In seiner kurzen [Rede](https://www.weforum.org/meetings/world-economic-forum-annual-meeting-2025/sessions/special-address-by-the-president-of-the-united-states-of-america/) beim Weltwirtschaftsforum verteidigte er seine Politik und stellte klar, er habe schlicht eine «Revolution des gesunden Menschenverstands» begonnen. Mit deutlichen Worten sprach er unter anderem von ersten MaĂnahmen gegen den «Green New Scam», und von einem «Erlass, der jegliche staatliche Zensur beendet»:
> «Unsere Regierung wird die ĂuĂerungen unserer eigenen BĂŒrger nicht mehr als Fehlinformation oder Desinformation bezeichnen, was die Lieblingswörter von Zensoren und derer sind, die den freien Austausch von Ideen und, offen gesagt, den Fortschritt verhindern wollen.»
**Wie der** **[«Trumpismus»](https://transition-news.org/trumpismus-zeitenwende-und-tiefer-staat)** **letztlich einzuordnen ist,** muss jeder fĂŒr sich selbst entscheiden. Skepsis ist definitiv angebracht, denn «einer von uns» sind weder der PrĂ€sident noch seine auserwĂ€hlten Teammitglieder. Ob sie irgendeinen Sumpf trockenlegen oder Staatsverbrechen aufdecken werden oder was aus WHO- und KlimavertrĂ€gen wird, bleibt abzuwarten.
**Das** **[WHO](https://transition-news.org/who-bedauert-trumps-entscheidung-sich-aus-der-organisation-zuruckzuziehen)-Dekret fordert jedenfalls die Ăbertragung der Gelder auf «glaubwĂŒrdige Partner»,** die die AktivitĂ€ten ĂŒbernehmen könnten. ZufĂ€llig scheint mit «Impfguru» Bill Gates ein weiterer Harris-UnterstĂŒtzer kĂŒrzlich das Lager gewechselt zu haben: Nach einem gemeinsamen Abendessen zeigte er sich [«beeindruckt»](https://archive.is/SpQ24) von Trumps Interesse an der globalen Gesundheit.
**Mit dem** **[Projekt «Stargate»](https://transition-news.org/us-privatsektor-will-500-milliarden-dollar-in-ki-investieren-krebsimpfstoffe)** **sind weitere dunkle Wolken am Erwartungshorizont** der Fangemeinde aufgezogen. Trump hat dieses Joint Venture zwischen den Konzernen OpenAI, Oracle, und SoftBank als das «gröĂte KI-Infrastrukturprojekt der Geschichte» angekĂŒndigt. Der Stein des AnstoĂes: Oracle-CEO Larry Ellison, der auch Fan von KI-gestĂŒtzter [Echtzeit-Ăberwachung](https://transition-news.org/oracle-kundigt-neues-ki-rechenzentrum-mit-eigenen-atomreaktoren-an) ist, sieht einen weiteren potenziellen Einsatz der kĂŒnstlichen Intelligenz. Sie könne dazu dienen, Krebserkrankungen zu erkennen und individuelle mRNA-«Impfstoffe» zur Behandlung innerhalb von 48 Stunden zu entwickeln.
**Warum bitte sollten sich diese superreichen «Eliten» ins eigene Fleisch schneiden** und direkt entgegen ihren eigenen Interessen handeln? Weil sie Menschenfreunde, sogenannte Philanthropen sind? Oder vielleicht, weil sie ein schlechtes Gewissen haben und ihre Schuld kompensieren mĂŒssen? Deswegen jedenfalls brauchen «Linke» laut Robert Willacker, einem deutschen Politikberater mit brasilianischen Wurzeln, rechte Parteien â ein ebenso ĂŒberraschender wie humorvoller [ErklĂ€rungsansatz](https://www.youtube.com/watch?v=s63_8flX1zk).
**Wenn eine KrĂ€he der anderen kein Auge aushackt,** dann tut sie das sich selbst noch weniger an. Dass MillionĂ€re ernsthaft ihre eigene Besteuerung fordern oder Machteliten ihren eigenen Einfluss zugunsten anderer einschrĂ€nken wĂŒrden, halte ich fĂŒr sehr unwahrscheinlich. So etwas glaube ich erst, wenn zum Beispiel die [RĂŒstungsindustrie](https://transition-news.org/schweiz-zunehmende-beteiligung-an-eu-militarprojekten) sich um Friedensverhandlungen bemĂŒht, die [Pharmalobby](https://transition-news.org/eu-lobbyisten-gegen-pfas-verbot) sich gegen institutionalisierte Korruption einsetzt, [Zentralbanken](https://transition-news.org/digitale-wahrung) ihre CBDC-PlĂ€ne fĂŒr Bitcoin opfern oder der ĂRR die Abschaffung der RundfunkgebĂŒhren fordert.
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/elitare-anti-eliten-und-superreiche-anti-reiche)*** erschienen.
-

@ df478ecd:495107a7
2025-03-29 18:58:47
I think we should all work on bitcoin until we get these prices back (when 1 sat = 1 cent)
nostr:note1xg8av23v27djl8m95cnrzcfm3fcwdaamgfmyqs43796zxl4aaz9sgdgmsa
-

@ df478ecd:495107a7
2025-03-29 18:52:17
https://image.nostr.build/57ce0fb81a6ab7aa69ae1564c5f114920943025579901dd17b8fa46189356d0e.gif
-

@ 57d1a264:69f1fee1
2025-03-23 12:24:46
https://www.youtube.com/watch?v=obXEnyQ_Veg



source: https://media.jaguar.com/news/2024/11/fearless-exuberant-compelling-jaguar-reimagined-0
originally posted at https://stacker.news/items/922356
-

@ 1bda7e1f:bb97c4d9
2025-03-26 03:23:00
### Tldr
- Nostr is a new open social protocol for the internet
- You can use it to create your own online community website/app for your users
- This needs only a few simple components that are free and open source
- Jumble.Social client is a front-end for showing your community content to your users
- Simple With Whitelist relay (SW2) is a back-end with simple auth for your community content
- In this blog I explain the components and set up a online community website/app that any community or company can use for their own users, for free.
### You Can Run Your Own Private "X" For Free
Nostr is a new open social protocol for the internet. Because it is a protocol it is not controlled by any one company, does not reside on any one set of servers, does not require any licenses, and no one can stop you from using it however you like.
When the name Nostr is recognised, it is as a "Twitter/X alternative" â that is an online open public forum. Nostr is more than just this. The open nature of the protocol means that you can use it however you feel like, including that you can use it for creating your own social websites to suit whatever goals you have â anything from running your own team collaboration app, to running your own online community.
Nostr can be anything â not just an alternative to X, but also to Slack, Teams, Discord, Telegram (etc) â any kind of social app you'd like to run for your users can be run on Nostr.
In this blog I will show you how to launch your own community website, for your community members to use however they like, with low code, and for free.
#### Simple useful components
Nostr has a few simple components that work together to provide your experience â
- **Your "client"** â an app or a website front-end that you log into, which displays the content you want to see
- **Your "relay"** â a server back-end which receives and stores content, and sends it to clients
- **Your "user"** â a set of keys which represents a user on the network,
- **Your "content"** â any user content created and signed by a user, distributed to any relay, which can be picked up and viewed by any client.
It is a pattern that is used by every other social app on the internet, excepting that in those cases you can usually only view content in their app, and only post your content to their server.
Vs with Nostr where you can use any client (app) and any relay (server), including your own.
This is defined as a standard in [NIP-01](https://github.com/nostr-protocol/nips/blob/master/01.md) which is simple enough that you can master it in a weekend, and with which you can build any kind of application.
The design space is wide open for anyone to build anythingâ
- Clones of [Twitter](https://play.google.com/store/apps/details?id=com.vitorpamplona.amethyst), [Instagram](https://olas.app/), [Telegram](https://0xchat.com/), [Medium](https://habla.news/), [Twitch](https://zap.stream/), etc,
- Whole new things like [Private Ephemeral Messengers](http://shh.com), [Social Podcasting Apps](https://www.fountain.fm/), etc,
- Anything else you can dream up, like replacements for B2B SaaS or ERP systems.
Including that you can set up and run your own "X" for your community.
#### Super powers for âprivateâ social internet
When considering my use of social internet, it is foremost private not public. Email, Whatsapp, Slack, Teams, Discord, Telegram (etc), are all about me, as a user, creating content for a selected group of individuals â close friends, colleagues, community members â not the wider public.
This private social internet is crying out for the kind of powers that Nostr provides. The list of things that Nostr solves for private social internet goes on-and-on.
Let me eat my own dog food for a moment.
- **I am a member of a community of technology entrepreneurs** with an app for internal community comms. The interface is not fit for this purpose. Good content gets lost. Any content created within the walled kingdom cannot be shared externally. Community members cannot migrate to a different front-end, or cross-post to public social channels.
- **I am a member of many communities for kids social groups**, each one with a different application and log in. There is no way to view a consolidated feed. There is no way to send one message to many communities, or share content between them. Remembering to check every feed separately is a drag.
- **I am a member of a team with an app for team comms**. It costs $XXX per user per month where it should be free. I can't self-host. I can't control or export my data. I can't make it interoperate natively with other SaaS. All of my messages probably go to train a Big Co AI without my consent.
In each instance "Nostr fixes this."
#### Ready now for low-code admins
To date Nostr has been best suited to a more technical user. To use the Nostr protocol directly has been primarily a field of great engineers building great foundations.
IMO these foundations are built. They are open source, free to use, and accessible for anyone who wants to create an administer their own online community, with only low code required.
To prove it, in this blog I will scratch my own itch. I need a X / Slack / Teams alternative to use with a few team members and friends (and a few AIs) as we hack on establishing a new business idea.
I will set this up with Nostr using only open source code, for free.
### Designing the Solution
I am mostly non-technical with helpful AI. To set up your own community website in the style of X / Slack / Teams should be possible for anyone with basic technology skills.
- I have a cheap VPS which currently runs some [other](https://rodbishop.npub.pro/post/4f0baffd/) [unrelated](https://rodbishop.npub.pro/post/8ca68889/) [Nostr projects](https://rodbishop.npub.pro/post/setting-up-payments-on-nostr-7o6ls7/) in Docker containers,
- My objective was to set up and run my own community website for my own team use, in Docker, hosted on my own server.
#### User requirements
What will I want from a community website?
- I want my users to be able to log into a website and post content,
- I want to save that content to a server I control accessed only be people I authorise,
- I want my users to view only that content by default, and not be exposed to any wider public social network unless they knowingly select that,
- I want my user's content to be either:
- a) viewable only by other community members (i.e. for internal team comms), or
- b) by the wider public (i.e. for public announcements), at the user's discretion.
- I want it to be open source so that other people maintain the code for me,
- I want it for free.
#### Nostr solutions
To achieve this with Nostr, I'll need to select some solutions "a-la carte" for each of the core components of the network.
- **A client â**Â For my client, I have chosen Jumble. Jumble is a free open-source client by [Cody Tseng](nostr:npub1syjmjy0dp62dhccq3g97fr87tngvpvzey08llyt6ul58m2zqpzps9wf6wl), available free on [Github](https://github.com/CodyTseng/jumble) or at [Jumble.social](https://jumble.social/). I have chosen Jumble because it is a "relay-centric" client. In key spots the user interface highlights for the user what relay they are viewing, and what relay they are posting to. As a result, it is a beautiful fit for me to use as the home of all my community content.
- **A relay â** For my relay, I have chosen [Simple With Whitelist (SW2)](https://github.com/bitvora/sw2). SW2 is a free open-source relay by [Utxo The Webmaster](nostr:npub1utx00neqgqln72j22kej3ux7803c2k986henvvha4thuwfkper4s7r50e8), based on [Khatru](https://khatru.nostr.technology/) by [Fiatjaf](nostr:npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6), available free on [Github](https://github.com/bitvora/sw2). I have chosen SW2 because it allows for very simple configuration of user auth. Users can be given read access to view notes, and write access to post notes within simple `config.json` files. This allows you to keep community content private or selectively share it in a variety of ways. Per the Nostr protocol, your client will connect with your relay via websocket.
- **A user sign-up flow â**Â Jumble has a user sign-up flow using Nstart by Fiatjaf, or as an admin I can create and provision my own users with any simple tool like [NAK](https://github.com/fiatjaf/nak) or [Nostrtool](https://nostrtool.com/).
- **A user content flow â**Â Jumble has a user content flow that can post notes to selected relays of the users choice. Rich media is uploaded to free third-party hosts like [Nostr.build](https://nostr.build/), and in the future there is scope to self-host this too.
With each of these boxes ticked I'm ready to start.
### Launching a Private Community Website with Jumble and SW2
#### Install your SW2 relay
The relay is the trickiest part, so let's start there. SW2 is my Nostr relay software of choice. It is a Go application and includes full instructions for Go install. However, I prefer Docker, so I have built a Docker version and maintain a [Docker branch here](https://github.com/r0d8lsh0p/sw2/tree/docker).
**1 â In a terminal clone the repo and checkout the Docker branch**
```
git clone https://github.com/r0d8lsh0p/sw2.git
cd sw2
git checkout docker
```
**2 â Set up the environment variables**
These are specified in the readme. Duplicate the example .env file and fill it with your variables.
```
cp .env.example .env
```
For me this .env file was as followsâ
```
# Relay Metadata
RELAY_NAME="Tbdai relay"
RELAY_PUBKEY="ede41352397758154514148b24112308ced96d121229b0e6a66bc5a2b40c03ec"
RELAY_DESCRIPTION="An experimental relay for some people and robots working on a TBD AI project."
RELAY_URL="wss://assistantrelay.rodbishop.nz"
RELAY_ICON="https://image.nostr.build/44654201843fc0f03e9a72fbf8044143c66f0dd4d5350688db69345f9da05007.jpg"
RELAY_CONTACT="https://rodbishop.nz"
```
**3 â Specify who can read and write to the relay**
This is controlled by two config files `read_whitelist.json` and `write_whitelist.json`.
- Any user with their pubkey in the `read_whitelist` can read notes posted to the relay. If empty, anyone can read.
- Any user with their pubkey in the `write_whitelist` can post notes to the relay. If empty, anyone can write.
We'll get to creating and authorising more users later, for now I suggest to add yourself to each whitelist, by copying your pubkey into each JSON file. For me this looks as follows (note, I use the 'hex' version of the pubkey, rather than the npub)â
```
{
"pubkeys": [
"1bda7e1f7396bda2d1ef99033da8fd2dc362810790df9be62f591038bb97c4d9"
]
}
```
*If this is your first time using Nostr and you don't yet have any user keys, it is easy and free to get one. You can get one from any Nostr client like [Jumble.social](http://Jumble.social), any tool like [NAK](https://github.com/fiatjaf/nak) or [nostrtool.com](https://nostrtool.com/) or follow a comprehensive guide like my [guide on mining a Nostr key](https://rodbishop.npub.pro/post/mining-your-vanity-pubkey-4iupbf/).*
**4 â Launch your relay**
If you are using my Docker fork from above, thenâ
```
docker compose up
```
Your relay should now be running on port 3334 and ready to accept web socket connections from your client.
Before you move on to set up the client, it's helpful to quickly test that it is running as expected.
**5 â Test your websocket connection**
For this I use a tool called wscat to make a websocket connection.
You may need to install wscat, e.g.
```
npm install -g wscat
```
And then run it, e.g.
```
wscat -c ws://localhost:3334
```
(note use `ws://` for localhost, rather than `wss://`).
If your relay is working successfully then it should receive your websocket connection request and respond with an AUTH token, asking you to identify yourself as a user in the relay's `read_whitelist.json` (using the standard outlined in [NIP-42](https://github.com/nostr-protocol/nips/blob/master/42.md)), e.g.
```
Connected (press CTRL+C to quit)
< ["AUTH","13206fea43ef2952"]
>
```
You do not need to authorise for now.
If you received this kind of message, your relay is working successfully.
#### Set a subdomain for your relay
Let's connect a domain name so your community members can access your relay.
**1 â Configure DNS**
At a high level â
1. Get your domain (buy one if you need to)
2. Get the IP address of your VPS
3. In your domain's DNS settings add those records as an A record to the subdomain of your choice, e.g. `relay` as in `relay.your_domain_name.com`, or in my case `assistantrelay.rodbishop.nz`
Your subdomain now points to your server.
**2Â â Configure reverse proxy**
You need to redirect traffic from your subdomain to your relay at port `3334`.
On my VPS I use Caddy as a reverse proxy for a few projects, I have it sitting in a separate Docker network. To use it for my SW2 Relay required two steps.
First â I added configuration to Caddy's `Caddyfile` to tell it what to do with requests for the `relay.your_domain_name.com` subdomain. For me this looked likeâ
```
assistantrelay.rodbishop.nz {
reverse_proxy sw2-relay:3334 {
# Enable WebSocket support
header_up X-Forwarded-For {remote}
header_up X-Forwarded-Proto {scheme}
header_up X-Forwarded-Port {server_port}
}
}
```
Second â I added the Caddy Docker network to the SW2 `docker-compose.yml` to make it be part of the Caddy network. In my Docker branch, I provide this commented section which you can uncomment and use if you like.
```
services:
relay:
... relay configuration here ...
# networks:
# - caddy # Connect to a Caddy network for reverse proxy
# networks:
# caddy:
# external: true # Connect to a Caddy network for reverse proxy
```
Your relay is now running at your domain name.
#### Run Jumble.social
Your client set up is very easy, as most heavy lifting is done by your relay. My client of choice is Jumble because it has features that focus the user experience on the community's content first. You have two options for running Jumble.
1. Run your own local copy of Jumble by cloning the Github (optional)
2. Use the public instance at Jumble.social (easier, and what we'll do in this demo)
If you (optionally) want to run your own local copy of Jumble:
```
git clone https://github.com/CodyTseng/jumble.git
cd jumble
npm install
npm run dev
```
For this demo, I will just use the public instance at [http://jumble.social](http://jumble.social)
Jumble has a very helpful user interface for set up and configuration. But, I wanted to think ahead to onboarding community members, and so instead I will do some work up front in order to give new members a smooth onboarding flow that I would suggest for an administrator to use in onboarding their community.
**1 â Create a custom landing page URL for your community members to land on**
When your users come to your website for the first time, you want them to get your community experience without any distraction. That will either beâ
1. A prompt to sign up or login (if only authorised users can read content)
2. The actual content from your other community members (If all users can read content)
Your landing page URL will look like: `http://jumble.social/?r=wss://relay.your_domain_name.com`
- `http://jumble.social/` â the URL of the Jumble instance you are using
- `?r=` â telling Jumble to read from a relay
- `wss://` â relays connect via websocket using wss, rather than https
- `relay.your_domain_name.com` â the domain name of your relay
For me, this URL looks like `http://jumble.social/?r=wss://assistantrelay.rodbishop.nz`
**2 â Visit your custom Jumble URL**
This should load the landing page of your relay on Jumble.
In the background, Jumble has attempted to establish a websocket connection to your relay.
If your relay is configured with read authentication, it has sent a challenge to Jumble asking your user to authenticate. Jumble, accordingly should now be showing you a login screen, asking your user to login.
**3 â Login or Sign Up**
You will see a variety of sign up and login options. To test, log in with the private key that you have configured to have read and write access.
In the background, Jumble has connected via websocket to your relay, checked that your user is authorised to view notes, and if so, has returned all the content on the relay. (If this is your first time here, there would not be any content yet).
If you give this link to your users to use as their landing page, they will land, login, and see only notes from members of your community.
**4â Make your first post to your community**
Click the "post" button and post a note. Jumble offers you the option to "Send only to relay.your_domain_name.com".
- **If set to on**, then Jumble will post the note only to your relay, no others. It will also include a specific tag (the `"-"` tag) which requests relays to not forward the note across the network. Only your community members viewing notes on your community relay can see it.
- **If set to off**, then Jumble will post the note to your relay and also the wider public Nostr network. Community members viewing notes on the relay can see it, and so can any user of the wider Nostr network.
**5â Optional, configure your relay sets**
At the top of the screen you should now see a dropdown with the URL of your relay.
Each user can save this relay to a "relay set" for future use, and also view, add or delete other relays sets including some sets which Jumble comes with set up by default.
As an admin you can use this to give users access to multiple relays. And, as a user, you can use this to access posts from multiple different community relays, all within the one client.
#### Your community website is up and running
That is the basic set up completed.
- You have a website where your community members can visit a URL to post notes and view all notes from all other members of the community.
- You have basic administration to enforce your own read and write permissions very simply in two json files.
Let's check in with my user requirements as a community adminâ
- My community is saving content to a server where I control access
- My users view only that content by default, and are not exposed to any wider public social network unless they knowingly select that
- My user's content is a) viewable only by other community members, or b) by the wider public, at the user's discretion
- Other people are maintaining the code for me
- It's free
This setup has scope to solve my dog fooding issues from earlierâ
- If adopted, my tech community can iterate the interface to suit its needs, find great content, and share content beyond the community.
- If adopted, my kids social groups can each have their own relays, but I can post to all of them together, or view a consolidated feed.
- If adopted, my team can chat with each other for free. I can self host this. It can natively interoperate with any other Nostr SaaS. It would be entirely private and will not be captured to train a Big Co AI without my consent.
#### Using your community website in practice
**An example onboarding flow**
1. A new member joins your IRL community
2. Your admin person gives them your landing page URL where they can view all the posts by your community members â If you have configured your relay to have no read auth required, then they can land on that landing page and immediately start viewing your community's posts, a great landing experience
3. The user user creates a Nostr profile, and provides the admin person with their public key
4. The admin person adds their key to the whitelists to read and write as you desire.
**Default inter-op with the wider Nostr network**
- If you change your mind on SW2 and want to use a different relay, your notes will be supported natively, and you can migrate on your own terms
- If you change your mind on Jumble and want to use a different client, your relay will be supported natively, and you can migrate on your own terms
- If you want to add other apps to your community's experience, every Nostr app will interoperate with your community by default â see the huge list at [Awesome Nostr](https://github.com/aljazceru/awesome-nostr)
- If any of your users want to view your community notes inside some other Nostr client â perhaps to see a consolidated feed of notes from all their different communities â they can.
For me, I use Amethyst app as my main Nostr client to view the public posts from people I follow. I have added my private community relay to Amethyst, and now my community posts appear alongside all these other posts in a single consolidated feed.
**Scope to further improve**
- You can run multiple different relays with different user access â e.g. one for wider company and one for your team
- You can run your own fork of Jumble and change the interface to suit you needs â e.g. add your logo, change the colours, link to other resources from the sidebar.
**Other ideas for running communities**
- **Guest accounts**: You can give a user "guest" access â read auth, but no write auth â to help people see the value of your community before becoming members.
- **Running a knowledge base**: You can whitelist users to read notes, but only administrators can post notes.
- **Running a blind dropbox**: You can whitelist users to post notes, but only the administrator can read notes.
- **Running on a local terminal only:** With Jumble and SW2 installed on a machine, running at â `localhost:5173` for Jumble, and `localhost:3334` for SW2 you can have an entirely local experience at `http://localhost:5173/?r=ws://localhost:3334`.
### What's Next?
In my first four blogs I explored creating a good Nostr setup with [Vanity Npub](https://rodbishop.npub.pro/post/mining-your-vanity-pubkey-4iupbf/), [Lightning Payments](https://rodbishop.npub.pro/post/setting-up-payments-on-nostr-7o6ls7/), [Nostr Addresses at Your Domain](https://rodbishop.npub.pro/post/ee8a46bc/), and [Personal Nostr Relay](https://rodbishop.npub.pro/post/8ca68889/).
Then in my latest three blogs I explored different types of interoperability [with NFC cards](https://rodbishop.npub.pro/post/edde8387/), [n8n Workflow Automation](https://rodbishop.npub.pro/post/4f0baffd/), and now running a private community website on Nostr.
For this community websiteâ
- There is scope to make some further enhancements to SW2, including to add a "Blossom" media server so that community admins can self-host their own rich media, and to create an admin screen for administration of the whitelists using [NIP-86](https://github.com/nostr-protocol/nips/blob/master/86.md).
- There is scope to explore all other kinds of Nostr clients to form the front-end of community websites, including Chachi.chat, Flotilla, and others.
- Nostr includes a whole variety of different optional standards for making more elaborate online communities including [NIP-28](https://github.com/nostr-protocol/nips/blob/master/28.md), [NIP-29](https://github.com/nostr-protocol/nips/blob/master/29.md), [NIP-17](https://github.com/nostr-protocol/nips/blob/master/17.md), [NIP-72](https://github.com/nostr-protocol/nips/blob/master/72.md) (etc). Each gives certain different capabilities, and I haven't used any of them! For this simple demo they are not required, but each could be used to extend the capabilities of the admin and community.
I am also doing a lot of work with AI on Nostr, including that I use my private community website as a front-end for engaging with a Nostr AI. I'll post about this soon too.
Please be sure to let me know if you think there's another Nostr topic you'd like to see me tackle.
GM Nostr.
-

@ 1eb5d2c9:ee9e8d5f
2025-03-28 17:59:07
They're both police states as far as I'm concerned
-

@ 21335073:a244b1ad
2025-03-15 23:00:40
I want to see Nostr succeed. If you can think of a way I can help make that happen, Iâm open to it. Iâd like your suggestions.
My scheduleâs shifting soon, and I could volunteer a few hours a week to a Nostr project. I wonât have more total time, but how I use it will change.
Why help? I care about freedom. Nostrâs one of the most powerful freedom tools Iâve seen in my lifetime. If I believe that, I should act on it.
I donât care about money or sats. Iâm not rich, I donât have extra cash. That doesnât drive meâfreedom does. Iâm volunteering, not asking for pay.
Iâm not here for clout. Iâve had enough spotlight in my life; it doesnât move me. If I wanted clout, Iâd be on Twitter dropping basic takes. Cloutâs easy. Freedomâs hard. Iâd rather help anonymously. No speaking at eventsâsmall meetups are cool for the vibe, but big conferences? Not my thing. Iâll never hit a huge Bitcoin conference. Itâs just not my scene.
That said, I could be convinced to step up if itâd really boost Nostrâas long as itâs legal and gets results.
In this space, Iâd watch for social engineering. I watch out for it. Iâm not here to make friends, just to help. No shadeâyou all seem greatâbut Iâve got a full life and awesome friends irl. I donât need your crew or to be online cool. Connect anonymously if you want; Iâd encourage it.
Iâm sick of watching other social media alternatives grow while Nostr kinda stalls. I could trash-talk, but Iâd rather do something useful.
Skills? Iâm good at spotting social media problems and finding possible solutions. I wonât overhype myselfâthatâs weirdâbut if youâre responding, you probably see something in me. Perhaps you see something that I donât see in myself.
If you need help now or later with Nostr projects, reach out. Nostr onlyânothing else. Anonymous contactâs fine. Even just a suggestion on how I can pitch in, no project attached, works too. đ
Creeps or harassment will get blocked or Iâll nuke my simplex code if it becomes a problem.
https://simplex.chat/contact#/?v=2-4&smp=smp%3A%2F%2FSkIkI6EPd2D63F4xFKfHk7I1UGZVNn6k1QWZ5rcyr6w%3D%40smp9.simplex.im%2FbI99B3KuYduH8jDr9ZwyhcSxm2UuR7j0%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAS9C-zPzqW41PKySfPCEizcXb1QCus6AyDkTTjfyMIRM%253D%26srv%3Djssqzccmrcws6bhmn77vgmhfjmhwlyr3u7puw4erkyoosywgl67slqqd.onion