-
@ 0f9da413:01bd07d7
2025-04-09 14:23:54หลังจากที่เดินทางเกือบ 18 ชั่วโมงเราก็มาถึงหาดใหญ่กันแล้ว ช่วงระยะเวลาที่อยู่บนรถไฟเป็นอะไรที่เรี่ยเปี่ยมากๆ นั่งมองข้างทางส่วนมีเหตุการณ์อะไรนั่น ติดตามบทความพิเศษได้เร็วๆ นี้ ผมก็ได้พบเจอเพื่อนบน nostr ท่านหนึ่งที่อยู่หาดใหญ่อาสาพาทัวร์ในหาดใหญ่แห่งนี้ กัปตันนั่นเอง ขนาดชื่อเล่นจริงๆ ยังไม่เคยถามหลังจากที่ดูใน btcmap แล้วพบว่าร้านเปิดตอนกลางคืน ซึ่งเรามีเวลาคืนเดียวในการอยู่ที่หาดใหญ่ ดังนั้นหลังจากช่วงกลางวันพาทัวร์แถวสงขลากันแล้ว ก็ได้พากลับมาตามล่าหาร้านรับ bitcoin lighting ในหาดใหญ่ มีอยู่สามสถานที่ แต่มีเพียงสองร้าน คือ
Soymilk Toyou ฉือฉาง และ น้ำเต้าหู้ SOYMILK TOYOU
น้ำเต้าหูหลากหลายรสชาติ มีอยู่สองสาขาอยู่บริเวณ ตลาดโต้รุ่งฉื่อฉาง และ ถนนปุณณกัณฑ์ สาขาแรกอยู่ในตลาดโต้รุ่ง ร้านเล็กๆ เหมาะกับการชื้อกลับ และอีกร้านหนึ่งอยู่บริเวณเป็นร้านที่เหมาะกับนั่งทานที่ร้าน ซึ่งมีเต้าหู้หลากหลายรสชาติ ให้เลือกจนตาลายกันเลยทีเดียว สำหรับสาขา ถนนปุณณภัณฑ์นั้นมีเมนูเพิ่มเติมอย่าง เฉาก๋วยนมสด พุดติ้ง เต้าถึง และเฉาก๊วยโบราณ สาขานี้ลักษณะร้านออกแนวเกาหลีหน่อยๆ ซึ่งก็ค่อนข้างเหมาะกับชื่อร้านเหมือนกัน ค่อนข้างได้ฟิลพอสมควร ซึ่งผมเองกับกัปตันเองก็ได้แวะทั้งสองร้าน 4 แก้ว น่าจะเป็นเบาหวานเร็วๆ นี้ แต่ยังมีอีกหลากหลายอย่างที่ผมยังไม่ได้ลองชิม คราวหน้าอาจจะต้องได้ไปแวะใช้บริการอีกครั้ง ทั้งสองสาขานี้มีป้ายรับ bitcoin lighting ด้วยซึ่งอาจจะต้องสังเกตกันนิดหนึ่ง หากต้องการใช้งาน ซึ่งทั้งสองร้านนี้ก็สปีนประมาณ 5,820 sats
Soymilk Toyou ฉือฉาง (ตลาดโต้รุ่งฉื่อฉาง)
Google-map: https://maps.app.goo.gl/1PUVX3wkuzLBrQjw7
BTC-map: https://btcmap.org/merchant/node:12351330907
น้ำเต้าหู้ SOYMILK TOYOU (ถนนปุณณกัณฑ์)
Google-map: https://maps.app.goo.gl/FFaZSXKEvGwKvrwZ7
BTC-map: https://btcmap.org/merchant/node:12346018233
และเมื่อผมและกัปตันต้อง spin sats ทั้งสองร้านก็กลายเป็นว่าได้น้ำตาลมาหน่อยๆ แต่ไหนๆก็มาแล้วจะไม่ใช้ก็อย่างไรอยู่ ซึ่งรสชาติก็แตกต่างกันไปตามที่เราได้สั่ง ส่วนตัวเองสาขาตลาดโต้รุ่งฉื่อฉาง ผมสั่งน้ำเต้าหู้ธรรมดา และสาขา ถนนปุณณกัณฑ์ ก็น้ำลำใยบวกกับพุดติ้งเมนูของร้าน น้ำตาลน่าจะสไปรท์กันสุดๆแล้วละ 555+
ดูด(Dude) หลังจากเมากับความหวานทั้งสองสาขากันไปแล้ว เอ้ยนี่เราจะลุยกันต่อเรอะ เออว่ะ ก็กูนอนที่หาดใหญ่แค่คืนเดียวแล้วดันก็เปิดแค่กลางคืนด้วย ก็คงต้องอัดหน้าท้องแล้วละ กับอีกร้านหนึ่งที่รับ sats กับร้าน ดูด(Dude)
หากดูในแผนที่อยู่ระหว่างกลางร้านก่อนหน้าทั้งสองสาขา กึ่งกลางพอดิบพอดี ร้านนี้เป็นร้านขายเครื่องดื่มและกับแกล้มและมีกับข้าวช่วงเย็น เป็นบาร์กลางคืน ไม่มีเบียร์เหล้าขายนะ (ในใจนึกว่าจะมีเสียอีก) แต่หากอยากจ่าย lighting อาจจะต้องแจ้งกับเจ้าของร้านหน่อยเพราะไม่เจอป้ายรับ lighting เราก็อัดน้ำถังไปอีกคนละแก้ว (แก้วถังที่ใส่น้ำแข็งเยอะๆ) นั่งคุยกันเพลินๆ ซึ่งทั้งสามร้านเราก็เมากับน้ำหวาน มีกับแกล้มซึ่งกินไม่ค่อยไหวแล้วเพราะไปเปย์สาวๆตอนเย็นไปแล้ว เอ้ย และร้านท้ายนี้หมดไปทั้งหมด 6,809 sats
Google-map: https://maps.app.goo.gl/41Tsj4GLWvm7M6TC6
BTC-map: https://btcmap.org/merchant/node:12478715046
จบกันแล้วสำหรับสองร้านในหาดใหญ่ ตามบน BTC-map ถือว่าเราได้ไปครบแล้วในหาดใหญ่ ซึ่งโซนบริเวณภาคใต้นี่เป็นสถานที่ที่ผมซึ่งเป็นคนเหนือเองอยากจะได้เยี่ยมชมแวะไปหาและอยากไปเรียนรู้เกี่ยวกับวัฒนธรรมที่นี้ มันมีอะไรที่ผมอยากจะค้นหาและตามลิ้มลองรสชาติของอาหารปักใต้ แน่นอนยังมีอีกหลายสถานที่ที่กำลังจะมีให้ใช้งานในอนาคต ร้านค้าที่เกี่ยวข้องที่รับ lighting ซึ่งพอมีเยอะๆแล้วก็คงตามไล่ไปแวะชิมก็น่าจะไม่หมดแน่นอน อย่างน้อยๆ ผมเองก็ได้แวะไปเที่ยวหาเพื่อนที่อยู่บน nostr ที่นั่นที่นี้ แม้จะระยะเวลาสั้นๆ แต่ก็ถือว่าเป็นครั้งแรกที่ได้แวะเที่ยวหาดใหญ่ เที่ยวสงขลา ถ่ายรูปกับรูปนางเงือกหาดสมิลา (กัปตันบอกลูบนมเลย ไม่เอากลัวได้แฟนที่นี้ เอ้าไปที่ไหนก็กลัวหมด บวชพระป่ะ 555+)
แต่เพลงนี้มันเพราะจริงๆ นะถึงแม้จะเศร้านิดหน่อย ไปตรงนั่นได้ยังไง และจุดสุดท้ายนั่นคือเชียงใหม่ ซึ่งช่วงระหว่างกำลังจะขึ้นเครื่องไปเชียงใหม่ อ้าวเกิดแผ่นดินไหวชะงั้น ซึ่งเชียงใหม่นั้น มีร้านใน btcmap เยอะพอสมควรและมีแวะไปร้านหนึ่งกลายเป็นว่าไม่รับชะแล้ว จะมีกี่ร้านที่ผมไปแวะเยี่ยมชิม ติดตามใน ตอนสุดท้ายในบทความกับ ep4
ท้ายนี้ผมเปิดเพจบนเมนสตรีมละเน้อ ตามได้ในเพจ ไปกับจิ๊บ (บนเฟสบุ๊ค) ผมคงเอาไว้แอบติดตามเพื่อนบน nostr บนเฟสบุ๊คที่พอที่จะติดตามได้บ้าง น่าจะได้อ่านอะไรต่างๆที่ใหลมา คงเอาไว้เขียนรีวิวประสบการณ์การท่องเที่ยวส่วนตัว เพื่อนสมัยเรียนผมเคยบอกว่ามึงไปเที่ยวบ่อยมึงไม่เขียนลงบ้างวะ ไม่เอาขี้เกียจวะ ไม่รู้จะดึงพลังงานตอนทำเพจสมัยมอปลายได้หรือไม่ ก็ไม่รู้เหมือนกัน เอาไว้ส่องๆโปรไฟล์ใครบน nostr ที่อยู่บนเฟสแหละ ฮ่าๆ เป็นเพจอยากเล่าอะไรก็อยากเล่า และแว๊บไปคอมเมนต์เพื่อนๆ บน nostr บ้าง ขอบคุณครับ
-
@ fbf0e434:e1be6a39
2025-04-09 14:09:08Hackathon 概要
近日, Sonic DeFAI 黑客松圆满落幕,在 Sonic 区块链生态系统中掀起参与热潮与创新风暴。此次活动共吸引 822 名开发者注册,最终 47 个项目通过审核。在四周赛程里,参赛者们开发新型 AI 代理,角逐总计 29.5 万美元的奖池。这些代理旨在参与社交及链上活动,助力提升 DeFAI(人工智能驱动的去中心化金融)。
赛事核心创新聚焦自主代理整合,部分亮点项目运用 Zerebro 及其开源框架 ZerePy,展现了 Sonic 每秒 10000 笔交易(TPS)的高处理性能与次秒级最终性,同时凸显其与以太坊的无缝流动性集成优势。
本次黑客松评审标准注重技术实施、设计、潜在影响力及创意,提交项目由行业专家团队评估,其中包括 Sonic Labs 首席执行官 Michael Kong。活动充分突显 Sonic 通过创新 AI 应用与强大区块链基础设施,推动去中心化金融未来发展的实力。
Hackathon 获胜者
最佳代理综合奖获奖者
- Shogun: DeFAi super vault's - 一个由 AI 驱动的 DeFi 协议,通过动态资本分配和再平衡来优化去中心化金融金库的收益。
- Nuvolari.Ai - 利用 AI 代理提高链上财务决策的个人理财助手。
- Hyper Sonic - 一个支持表情包币创新的去中心化枢纽,整合了博彩市场、启动平台和 AI 驱动的功能。
- Paintswap Game Engine - 一个 Web3 dApp,通过 AI 驱动的提示实现游戏创作,民主化游戏开发过程。
- SUPERSONIC - 一个由 AI 驱动的平台,自动识别 Web3 生态系统中的套利机会。
最佳社交代理奖获奖者
- Memegents - 结合 AI 和区块链创建个性化 AI 代理和加密货币代币。
- deChat: AI-Powered DeFi Interface for Sonic - 一个 AI 聊天界面,通过自然语言命令简化 DeFi 交互。
- CurtAIs - 通过一个集成 Telegram 的知识库促进 Sonic Labs 的引导。
最佳 DeFAI 代理奖获奖者
- SonicChat - 一个整合钱包管理、交易分析和 AI 驱动见解的平台。
- NoRugz - 促进 meme 币的创建和推广,并与社交媒体集成。
- Shiami - DeFAI for Everyone on Sonic - 一个简化 Sonic 上 DeFi 操作的便捷聊天机器人。
最佳工具代理奖获奖者
- Sonic's Risk Watch - 提供 Sonic 生态系统中的风险评估和投资组合优化。
- Knowscroll - 将社交媒体转化为 AI 生成内容的微学习体验。
最佳 deBridge 集成奖获奖者
- Crème'ai - 一个由 AI 驱动的投资组合顾问,通过实时数据优化加密管理。
- deChat: AI-Powered DeFi Interface for Sonic
- DogBone - 一个简化 DeFi 交互的平台,利用自动化和自然语言处理。
最佳 Allora 集成奖获奖者
- Sonic TradeZo - 一个去中心化、匿名的 AI 驱动博彩游戏,配有 AI 交易代理。
- Shogun: DeFAi super vault's
- AIm — Artificial Intelligence Manager - 自动化创建 AI 驱动的 DeFi 代理以优化 Sonic 上的财务交互。
DWF Labs 赞助的赛道奖获奖者
- Shogun: DeFAi super vault's
- Crème'ai
- EdgerAI - 利用基于社交信号和智能合约的链上交易策略。
有关项目的完整列表,请访问 Sonic DeFAI Hackathon 页面。
关于组织者
Sonic Labs
Sonic Labs 专注于区块链解决方案,利用在去中心化技术方面的广泛专业知识。该组织开发了提升数据安全性和交易效率的项目,并因创建可扩展的区块链基础设施和实施智能合约而闻名。目前,Sonic Labs 通过主导各种计划来实现无缝区块链技术集成,专注于扩大其在各个领域的影响。
-
@ fbf0e434:e1be6a39
2025-04-09 14:07:49Hackathon 概要
EurekaHACKS 是加拿大奥克维尔市 Abbey Park 高中主办的年度 12 小时黑客马拉松,主要面向高中生群体。今年共有 92 名参与者,最终 51 个项目通过审核。作为哈顿地区规模最大的高中生黑客马拉松之一,活动开设技术研讨会,提供超 7000 美元奖金,营造出充满竞争的氛围。
赛事分设多个奖项:“最佳整体 Hack” 获奖者可获 Bambu Lab A1 Minis,亚军能得到 Red Dragon 机械键盘;其他奖项用于表彰在本地影响力、创造力及技术专长方面表现突出的项目。其中,运用 Internet Computer Protocol(ICP)的项目最高可获 500 美元奖励,涉及 Vectara 的项目可获 300 美元积分。技术研讨会环节还设有 Jane Street 卡片、泡泡茶及各类代金券等奖励。
这场黑客马拉松将年轻创新者汇聚一堂,激发创造力,促进技术技能提升,同时彰显了当地社区的高度参与。
Hackathon 获奖者
标准赛道奖项得主
2025 年 EurekaHacks 标准赛道的参赛者需让项目贴合特定主题,由此催生出多样的技术创新成果。
最佳整体Hack
- FaunaDex: 这款应用通过使用AI识别真实动物并提供详细信息来促进自然探索,鼓励户外活动和学习。
亚军Hack
- ArcaneStep: 将网页游戏与现实中的身体活动结合,ArcaneStep激励孩子们通过行走收集法力以施放法术,旨在减少屏幕时间。
终极编码者第三名
- LocalLink: LocalLink利用地理空间技术连接户外空间中的个人,以促进社区参与,提供即时、有意义的互动。
最佳本地影响
- Gems: Gems是一个基于地图的界面,促进城市探索,使用户能够发现和分享独特的地点,增强探索体验。
最具触感
- Greenlight: 这个游戏化应用鼓励户外活动,用户可通过体育锻炼和自然互动获得积分。
最佳展示
- The Moss Garden: The Moss Garden旨在提高用户的生产力,通过自然主题的网站来增强与自然的联系,提高专注力和心理健康。
终极编码者最佳年轻黑客
- socialize.ai: 利用AI代理,socialize.ai为在线互动提供对话提示和反向图像搜索功能,以增强社交互动。
如需获取完整项目列表,请访问 EurekaHacks 2025 Buidl Page。
关于主办方
EurekaHACKS
EurekaHACKS以促进技术创新着称,特别是在区块链和技术开发领域。通过组织各种hackathons,它连接了技术爱好者并支持协作项目开发。这些活动推动了去中心化应用程序的显著进展,为区块链社区做出了重要贡献。EurekaHACKS目前专注于培养新的人才,并通过教育项目和专项活动推广可持续技术解决方案。
-
@ c892835e:4d87bc55
2025-04-09 12:51:31Marketing digital para bancar a base prestação de serviço tambem
estudar ingles e as parada toda bitcoin programação russo
-
@ c892835e:4d87bc55
2025-04-09 12:49:20primeira 3
-
@ 8ba93868:44bdde52
2025-04-09 12:42:31ola
-
@ 8ba93868:44bdde52
2025-04-09 12:22:12primeira segunda
-
@ 6152ca12:e3742e80
2025-04-09 11:53:16Uau estou aprendendo isso parece complicado mas vamos la; aos pouco pego o jeito hehe
-
@ 7bb4843d:27a3a19a
2025-04-09 11:19:08Testing Comet
ignore me
-
@ 04c195f1:3329a1da
2025-04-09 10:54:43The old world order is crumbling. What was once considered stable and unshakable—the American-led global framework established after World War II—is now rapidly disintegrating. From the fraying fabric of NATO to the self-serving protectionism of Trump’s renewed presidency, the signals are clear: the empire that once held the Western world together is retreating. And in the vacuum it leaves behind, a new power must emerge.
The question is: will Europe finally seize this moment?
For decades, Europe has relied on the illusion of safety under an American umbrella. This dependency allowed us to indulge in what can only be described as “luxury politics.” Instead of strengthening our core institutions—defense, infrastructure, energy independence—we poured our energy into ideological experiments: value-based governance, multiculturalism, aggressive climate goals, and endless layers of bureaucracy.
We let ourselves believe history had ended. That war, scarcity, and geopolitical struggle were things of the past. That our greatest challenges would be inclusivity, carbon credits, and data protection regulations.
But history, as always, had other plans.
Trump, Nationalist Hope and Hard Reality
Across Europe, many nationalists and conservatives initially welcomed Donald Trump. He rejected the tenets of liberal globalism, called out the absurdities of woke ideology, and promised a return to realism. In a world saturated by progressive conformity, he seemed like a disruptive breath of fresh air.
And to a certain extent, he was.
But history will likely remember his presidency not for culture wars or conservative rhetoric—but for something far more consequential: the dismantling of the American empire.
What we are witnessing under Trump is the accelerated withdrawal of the United States from its role as global enforcer. Whether by design or incompetence, the result is the same. American institutions are retracting, its alliances are fraying, and its strategic grip on Europe is loosening.
For Americans, this may seem like decline. For Europe, it is an opportunity—an uncomfortable, painful, but necessary opportunity.
This is our chance to break free from the American yoke and step into the world as a sovereign power in our own right.
The End of Illusions
Europe is not a weak continent. We have a population larger than the United States, an economy that outpaces Russia’s many times over, and centuries of civilizational strength behind us. But we have been kept fragmented, distracted, and dependent—by design.
Both Washington and Moscow have an interest in a divided, impotent Europe. American strategists see us as junior partners at best, liabilities at worst. Russian elites, like Sergey Karaganov, openly admit their goal is to push Europe off the global stage. China, for its part, eyes our markets while quietly maneuvering to undermine our autonomy.
But something is changing.
In Brussels, even the ideologically captured technocrats are beginning to see the writing on the wall. Overbearing regulations like GDPR are being reconsidered. The long-pushed Equal Treatment Directive—a pan-European anti-discrimination law—may finally be scrapped. These are small signs, but signs nonetheless. Europe is waking up.
From Fracture to Foundation
To build something new, the old must first fall. That collapse is now well underway.
The collapse of American hegemony does not mean the rise of chaos—it means the opening of a path. Europe has a choice: continue to drift, clinging to broken institutions and obsolete alliances, or embrace the challenge of becoming a serious actor in a multipolar world.
This does not mean copying the imperial ambitions of others. Europe’s strength will not come from domination, but from independence, coherence, and confidence. A strong Europe is not one ruled from Brussels, but one composed of strong, rooted nations acting together in strategic alignment. Not a federation, not an empire in the classical sense—but a civilization asserting its right to survive and thrive on its own terms.
At the same time, we must not fall into the trap of romantic isolationism. Some nationalists still cling to the idea that their nation alone can stand firm on the global stage, detached from continental collaboration. That vision no longer matches the geopolitical reality. The world has changed, and so must our strategy. In key areas—such as defense, border security, trade policy, and technological sovereignty—Europe must act with unity and purpose. This does not require dissolving national identities; it requires mature cooperation among free nations. To retreat into purely national silos would be to condemn Europe to irrelevance. Strengthening the right kind of European cooperation—while returning power in other areas to the national level—is not a betrayal of nationalism, but its necessary evolution.
A Third Position: Beyond East and West
As the American empire stumbles and Russia attempts to fill the void, Europe must not become a pawn in someone else’s game. Our task is not to shift allegiance from one master to another—but to step into sovereignty. This is not about trading Washington for Moscow, or Beijing. It is about rejecting all external domination and asserting our own geopolitical will.
A truly pro-European nationalism must recognize that our civilizational future lies not in nostalgia or subservience, but in strategic clarity. We must build a third position—a pole of stability and power that stands apart from the decaying empires of the past.
That requires sacrifice, but it also promises freedom.
Hope Through Action
There is a romantic notion among some European nationalists that decline is inevitable—that we are simply passengers on a sinking ship. But fatalism is not tradition. It is surrender.
Our ancestors did not build cathedrals, repel invaders, or chart the globe by giving in to despair. They acted—often against impossible odds—because they believed in a Europe worth fighting for.
We must now rediscover that spirit.
This is not a call for uniformity, but for unity. Not for empire, but for sovereignty. Not for nostalgia, but for renewal. Across the continent, a new consciousness is stirring. From the Alps to the Baltic, from Lisbon to Helsinki, there are voices calling for something more than submission to global markets and American whims.
They are calling for Europe.
The Hour Has Come
There may not be a second chance. The tide of history is turning, and the next ten years will determine whether Europe reclaims its role in the world—or becomes a museum piece, mourned by tourists and remembered by none.
This is not the end.
It is our beginning—if we are brave enough to seize it.
■
-
@ 584a2010:0210b8ea
2025-04-09 09:14:00Nos últimos anos, as plataformas de entretenimento digital têm se tornado cada vez mais populares, oferecendo aos jogadores uma vasta gama de opções para se divertirem e experimentarem novas formas de diversão. Uma dessas plataformas que se destaca no cenário brasileiro é o 8385, que tem atraído a atenção de muitos pela sua interface inovadora, jogos envolventes e pela experiência única que proporciona aos seus usuários. Neste artigo, vamos explorar tudo o que essa plataforma tem a oferecer, desde a sua introdução até a experiência de jogo que proporciona aos seus usuários.
Introdução à Plataforma 8385 A plataforma 8385 foi criada com o objetivo de proporcionar aos usuários uma experiência de entretenimento digital completa e inovadora. Com um design moderno e uma interface amigável, ela visa atrair tanto novatos quanto jogadores experientes. A principal proposta do 8385 é oferecer uma plataforma acessível, intuitiva e segura, onde os usuários podem explorar uma ampla variedade de opções de jogos e diversão, tudo ao alcance de um clique.
Uma das características mais notáveis do 8385 é a sua abordagem centrada no usuário. A plataforma foi desenvolvida com a experiência do jogador em mente, com funcionalidades que garantem uma navegação simples e uma experiência fluida. Além disso, o 8385 está disponível em várias versões, como desktop e mobile, permitindo que os jogadores acessem suas preferências de entretenimento de onde estiverem, seja em casa ou em movimento.
Outro aspecto que se destaca na plataforma é a segurança. A 8385 investe em tecnologia de ponta para garantir que todas as transações e dados dos usuários sejam tratados com o mais alto nível de proteção. Isso faz com que a plataforma seja não só uma opção divertida, mas também confiável.
Introdução aos Jogos no 8385 O 8385 oferece uma vasta gama de jogos para atender aos mais diversos gostos e preferências. Desde jogos de habilidade, passando por títulos de sorte, até opções que combinam ambos os elementos, a plataforma garante que haja algo para todos.
Entre os jogos mais populares estão as opções de jogos de mesa, que envolvem estratégias e decisões rápidas. Esses jogos são ideais para quem busca uma experiência de jogo mais imersiva, com desafios e recompensas baseadas no conhecimento e na habilidade dos jogadores. Além disso, a plataforma conta com uma série de jogos de slot, que são altamente populares devido à sua simplicidade e diversão. Esses jogos oferecem uma experiência dinâmica, com gráficos e sons vibrantes que mantêm os jogadores engajados por longos períodos.
Outro ponto interessante sobre a plataforma 8385 é que ela oferece jogos com diferentes níveis de dificuldade, o que permite que jogadores de todas as habilidades se sintam confortáveis. Seja você um iniciante ou um jogador mais avançado, a plataforma possui títulos que se adequam às suas preferências e ao seu nível de habilidade.
Além disso, o 8385 frequentemente adiciona novos jogos ao seu portfólio, o que mantém o conteúdo fresco e empolgante. A plataforma está sempre se atualizando para garantir que os jogadores tenham acesso às últimas inovações e tendências no mundo dos jogos digitais.
A Experiência do Jogador no 8385 A experiência do jogador é o centro de toda a proposta da plataforma 8385. Com uma interface intuitiva e uma navegação simplificada, os usuários conseguem encontrar facilmente os jogos que mais os interessam. A plataforma foi projetada para garantir uma experiência sem fricções, com um design responsivo que se adapta bem tanto a dispositivos móveis quanto a desktops.
A fluidez da jogabilidade é outro ponto que merece destaque. Independentemente do tipo de jogo escolhido, o 8385 garante que o desempenho seja impecável, com gráficos de alta qualidade e um tempo de resposta rápido. Isso proporciona uma experiência mais envolvente e satisfatória para os jogadores, que podem se concentrar totalmente no jogo sem se preocupar com falhas técnicas ou lentidão.
Outro fator importante para a experiência do jogador no 8385 é o suporte ao cliente. A plataforma oferece um serviço de atendimento ao cliente eficiente, com uma equipe pronta para ajudar em qualquer dúvida ou problema que o usuário possa encontrar durante sua experiência. A equipe de suporte está disponível 24 horas por dia, 7 dias por semana, para garantir que todas as necessidades dos jogadores sejam atendidas de forma rápida e eficaz.
Por fim, o 8385 também se destaca por suas opções de personalização. Os jogadores podem ajustar configurações de áudio, gráficos e até mesmo a forma como os jogos são apresentados na tela, criando uma experiência personalizada que atende aos seus gostos individuais.
Conclusão O 8385 é uma plataforma de entretenimento digital que tem tudo para se tornar uma das preferidas dos jogadores brasileiros. Com uma vasta gama de jogos de alta qualidade, uma interface intuitiva e funcionalidades inovadoras, oferece uma experiência envolvente e agradável para usuários de todas as idades e habilidades. Seja para quem busca diversão casual ou para quem deseja se aprofundar em jogos mais desafiadores, o 8385 tem algo a oferecer. Se você ainda não experimentou, vale a pena conferir tudo o que essa plataforma tem a oferecer!
-
@ 584a2010:0210b8ea
2025-04-09 09:13:25A evolução das plataformas de apostas online tem sido notável nos últimos anos, oferecendo aos jogadores uma variedade de opções inovadoras e emocionantes. A 5526 surge como uma plataforma de destaque nesse mercado, trazendo uma experiência única para aqueles que buscam diversão, segurança e um ambiente intuitivo para suas apostas. Com um design inovador e uma gama diversificada de jogos, a 5526 está ganhando cada vez mais adeptos entre os entusiastas desse tipo de entretenimento. Neste artigo, vamos explorar mais sobre a plataforma 5526, os jogos que oferece e o que os jogadores podem esperar ao se aventurar nesse ambiente virtual.
Introdução à Plataforma 5526 A plataforma 5526 foi desenvolvida para fornecer aos usuários uma experiência online excepcional, misturando facilidade de uso, segurança de dados e uma interface altamente responsiva. Seu design intuitivo permite que qualquer jogador, independentemente de sua experiência prévia, consiga navegar pelos menus, explorar os jogos e realizar apostas com facilidade. A 5526 investiu fortemente em tecnologia para criar um ambiente seguro, confiável e, ao mesmo tempo, altamente envolvente para seus usuários.
Com um sistema robusto de segurança, a plataforma utiliza criptografia avançada para proteger todas as transações financeiras e dados pessoais de seus jogadores. Isso garante que, ao utilizar os serviços da 5526, os usuários possam se concentrar totalmente na diversão, sem preocupações sobre a segurança de suas informações. Além disso, a plataforma oferece suporte ao cliente altamente eficiente, com canais de comunicação disponíveis para resolver qualquer dúvida ou problema que os jogadores possam enfrentar durante sua experiência.
Jogos Oferecidos na 5526 A 5526 se destaca por oferecer uma seleção impressionante de jogos que atendem a uma ampla variedade de gostos e preferências. Se você é fã de jogos de mesa, jogos de cartas ou jogos de sorte, encontrará uma diversidade que promete satisfazer suas expectativas. A plataforma conta com títulos clássicos e também com opções inovadoras que utilizam a mais recente tecnologia de desenvolvimento de jogos.
Entre os principais destaques da plataforma estão os jogos de roleta, blackjack, baccarat, entre outros. Esses jogos são projetados com gráficos de alta qualidade e mecânicas de jogo simples, mas envolventes, que permitem aos jogadores se concentrar na estratégia e na emoção das apostas. Cada jogo possui uma versão adaptada para diferentes níveis de habilidade, desde iniciantes até jogadores mais experientes, oferecendo sempre uma experiência imersiva e emocionante.
A plataforma também oferece uma ampla variedade de jogos de dados, com diversas variações que atendem tanto aos jogadores tradicionais quanto aos que buscam novas formas de interação. Além disso, a 5526 está sempre atualizando sua oferta de jogos, garantindo que seus usuários tenham acesso às últimas novidades do mercado de entretenimento digital.
Experiência do Jogador na 5526 A experiência do jogador na 5526 é uma das principais razões para o sucesso da plataforma. Desde o momento da criação de conta até a realização da primeira aposta, os usuários são guiados por uma interface clara e amigável, projetada para garantir uma navegação fluida. A plataforma foi criada pensando na simplicidade, mas sem abrir mão de recursos avançados que elevam a experiência para um nível superior.
Um dos maiores atrativos da 5526 é a possibilidade de personalização da experiência de jogo. Os jogadores podem escolher suas preferências em relação aos jogos, ajustando parâmetros como limites de apostas, tipos de jogos e até mesmo a velocidade das jogadas. Isso permite que cada pessoa tenha uma experiência única, feita sob medida para suas preferências pessoais.
Outro aspecto que contribui para uma experiência mais envolvente é a opção de jogar em tempo real com dealers e outros jogadores, o que cria uma sensação de imersão total. A interação com outros participantes, mesmo que virtualmente, ajuda a criar uma atmosfera mais dinâmica e emocionante.
Além disso, a 5526 oferece várias promoções e recompensas para seus jogadores, incentivando a fidelidade e proporcionando novas oportunidades de diversão e ganhos. Programas de fidelidade e bônus regulares são apenas alguns exemplos das vantagens exclusivas que a plataforma oferece, tornando a experiência ainda mais gratificante.
Conclusão A 5526 é uma plataforma de apostas online que se destaca pela qualidade de sua oferta e pela experiência imersiva que proporciona aos seus usuários. Com um portfólio diversificado de jogos, segurança de ponta e uma interface intuitiva, ela se apresenta como uma excelente opção para quem deseja se divertir e testar sua sorte em um ambiente confiável e envolvente. Se você está em busca de novas experiências no universo dos jogos de apostas online, a 5526 é, sem dúvida, uma plataforma que vale a pena explorar.
-
@ 584a2010:0210b8ea
2025-04-09 09:12:51A 79x surge como uma das plataformas de entretenimento mais inovadoras e dinâmicas do mercado, com um foco claro em oferecer uma experiência de jogo envolvente, emocionante e acessível para todos os perfis de jogadores. Com uma proposta que mistura tecnologia de ponta, uma vasta gama de opções de jogos e uma interface amigável, a plataforma vem conquistando rapidamente a atenção de jogadores de todo o Brasil. Neste artigo, exploraremos a plataforma 79x, os jogos disponíveis e, principalmente, a experiência que ela proporciona aos seus usuários.
- A Plataforma 79x: Inovação e Acessibilidade A 79x se destaca no cenário digital por sua interface moderna e fácil de usar. Com uma plataforma que foi projetada para ser intuitiva, qualquer jogador, seja iniciante ou veterano, pode navegar sem dificuldades. O layout limpo e a navegação simples garantem uma experiência fluida, com uma organização que coloca os jogos mais populares em destaque e oferece categorias bem definidas para facilitar a escolha dos jogadores.
Um dos grandes diferenciais da 79x é o seu design responsivo, permitindo que os usuários joguem a qualquer momento e de qualquer lugar, seja no desktop ou em dispositivos móveis. Isso oferece a flexibilidade de acessar a plataforma de forma prática, seja em casa, no transporte público ou durante uma pausa no trabalho. A facilidade de acesso e a experiência personalizada tornam a 79x uma escolha atraente para todos os tipos de jogadores.
A plataforma também conta com uma série de recursos que aumentam a interatividade e o engajamento dos usuários. Entre as principais funcionalidades, estão a integração com redes sociais, a possibilidade de criar perfis personalizados e o suporte contínuo ao jogador, com um atendimento ao cliente de excelência. Essa abordagem centrada no usuário reflete o compromisso da 79x em oferecer não apenas entretenimento, mas também uma experiência completa e satisfatória.
- Jogos na 79x: Diversão sem Limites A 79x se orgulha de sua vasta seleção de jogos, que atende a todos os gostos e preferências. Desde opções mais tradicionais, como jogos de cartas e mesas interativas, até alternativas mais inovadoras e com recursos de última geração, a plataforma oferece algo para todos os jogadores.
Um dos pontos fortes da 79x é a variedade de estilos e temáticas dos jogos. Os jogadores podem escolher entre jogos de estratégia, agilidade, sorte e habilidade, o que cria uma diversidade que agrada tanto aos novatos quanto aos veteranos. Além disso, a 79x constantemente atualiza seu portfólio com novos jogos, mantendo a plataforma sempre fresca e dinâmica, com novidades que surpreendem e emocionam a comunidade de jogadores.
Outro destaque são as opções de jogos interativos, onde os jogadores podem competir em tempo real com outros participantes, criando uma atmosfera de competitividade e camaradagem. Esse tipo de jogo é ideal para quem busca uma experiência mais imersiva e dinâmica, com a possibilidade de interagir com outros jogadores, trocar estratégias e celebrar vitórias.
Os jogos na 79x são oferecidos por desenvolvedores renomados, garantindo que os gráficos, sons e mecânicas sejam de altíssima qualidade. Cada jogo é meticulosamente projetado para proporcionar não apenas diversão, mas também uma experiência visualmente impressionante e tecnicamente refinada.
- A Experiência do Jogador na 79x: Diversão, Segurança e Conforto A experiência do jogador na 79x vai muito além de simplesmente jogar. A plataforma se preocupa em criar um ambiente seguro e confortável, com recursos e funcionalidades que asseguram que todos os jogadores possam se divertir sem preocupações. A 79x adota medidas rigorosas de segurança para proteger os dados pessoais e financeiros de seus usuários, utilizando tecnologias de criptografia avançada e protocolos de segurança.
Além disso, a plataforma oferece uma série de benefícios exclusivos para seus membros, como bônus de boas-vindas, promoções periódicas e programas de fidelidade. Esses recursos incentivam a lealdade dos jogadores e tornam a experiência ainda mais gratificante. A 79x também prioriza o apoio ao jogador, oferecendo suporte ao cliente 24/7, que pode ser acessado facilmente através de chat ao vivo, e-mail ou telefone.
Outro aspecto importante da experiência do jogador na 79x é a personalização. Cada jogador tem a opção de criar um perfil único, onde pode acompanhar seu progresso, realizar depósitos e retiradas de forma prática, além de receber recomendações de jogos baseadas em suas preferências pessoais. Isso cria um ambiente altamente personalizado, onde o jogador sente que a plataforma é feita sob medida para suas necessidades e desejos.
Por fim, a 79x não apenas oferece uma ampla gama de jogos e funcionalidades, mas também uma comunidade vibrante. O sistema de interações entre jogadores, chats em tempo real e rankings cria um senso de comunidade que torna a experiência ainda mais envolvente e divertida. A possibilidade de competir, compartilhar dicas e interagir com outros jogadores aumenta a imersão e torna cada momento na plataforma único.
Conclusão A 79x se destaca como uma plataforma inovadora que oferece uma experiência de jogo completa, acessível e altamente envolvente para os jogadores brasileiros. Com uma interface amigável, uma vasta seleção de jogos de qualidade, segurança de ponta e um atendimento ao cliente impecável, a 79x é a escolha ideal para quem busca diversão e desafios. Ao integrar todas essas características em um único espaço, a plataforma não só atende às expectativas dos jogadores, mas também cria novas formas de entretenimento e interação no mundo digital. Se você é um fã de jogos online, a 79x é, sem dúvida, uma plataforma que vale a pena explorar.
-
@ e9711dbb:0f444686
2025-04-09 09:09:01- One
- Two
- Tre
- Four
Ok not bad at all blablabla, I should test it more.
Ok it's fine :)
-
@ e9711dbb:0f444686
2025-04-09 08:58:32- One
- Two
- Tre
Ok not bad at all blablabla, I should test it more.
Ok it's fine :)
-
@ 6fbc5b6b:0251e3df
2025-04-09 08:52:22Author: Owen (AIVille)
Recent research underscores the impressive strides made by large language models (LLMs), while also highlighting persistent challenges in four foundational areas: factual accuracy, reliability, memory capacity, and instruction-following performance.
- Factual Accuracy
While LLMs excel at recalling known information, they remain prone to hallucinations when addressing unfamiliar content. Studies show that hallucinations are still a widespread issue, especially in zero-shot scenarios. Evaluation tools such as MONITOR assess factual consistency by analyzing output stability across diverse prompts. Furthermore, inference-time resource allocation has become a critical research focus. Chain-of-Thought (CoT) prompting, for instance, continues to demonstrate promise in improving reasoning accuracy. To mitigate errors embedded in legacy benchmarks, researchers have introduced "platinum benchmarks"—high-precision datasets that reveal performance gaps even in state-of-the-art models, reinforcing the demand for more robust evaluation frameworks.
- Reliability
Model reliability encompasses both the consistency and credibility of generated outputs. The study "Large Language Models as Reliable Knowledge Bases?" suggests that larger models tend to exhibit greater consistency; however, this may include confidently incorrect outputs that can perpetuate misinformation. Structured reasoning techniques, highlighted in recent works such as "Stop Overthinking" and "Towards the Reasoning Era," have proven effective in improving task-level dependability. Reinforcement learning frameworks like DAPO also contribute meaningfully to enhancing robustness. In practical use cases, GPT-4o demonstrates superior reliability across a broad range of tasks, Claude excels in handling extended context, while Gemini shows strong multimodal capabilities but less reliability in domain-specific queries.
- Memory
Memory is a vital component enabling LLMs to maintain coherence across sessions and support long-term reasoning. Explicit memory mechanisms, such as those proposed in "MemLLM," facilitate structured read-write operations that enhance knowledge retention and interpretability. Theoretical models, including "Schrodinger's Memory," posit that LLM memory is inherently dynamic and query-dependent. For dialogue continuity, systems like "Empowering Working Memory" advocate centralized memory buffers to preserve conversational state. Multi-agent scenarios present additional challenges; as outlined in "Why Do Multi-Agent LLM Systems Fail?," effective knowledge coordination across agents remains an open problem.
- Instruction Following
The ability to follow complex and nuanced instructions is increasingly critical for real-world deployment. InFoBench introduces the Decomposed Requirement Fulfillment Ratio (DRFR), a metric for assessing how thoroughly models complete multi-step directives. AutoIF leverages execution feedback to automatically curate high-quality training data, thereby improving instruction fidelity. Nevertheless, even the most advanced models continue to struggle with multi-stage tasks, especially in zero-shot settings. GPT-4o and Claude consistently outperform Gemini in instruction-following benchmarks, while "Command A" represents a domain-specialized model optimized for enterprise workflows.
- Emerging Directions and Innovations
Reinforcement learning strategies (e.g., "ReSearch," "Vision-R1") have demonstrated measurable gains in reasoning efficiency.
CoT-based techniques (e.g., "CoT-Drive") have expanded LLM utility in verticals like autonomous driving.
Inference-time compute scaling ("Inference-Time Scaling") significantly boosts generalist model performance.
Multimodal progress ("Gemma 3") enables more comprehensive visual-linguistic integration in command execution.
Embodied reasoning efforts (e.g., "Cosmos-Reason1," "GR00T N1") bridge cognitive capabilities with physical-world interaction.
- Ongoing Challenges and Strategic Priorities
Optimizing the trade-off between model scale and task-specific adaptation
Enhancing context retention through human-inspired memory architectures
Scaling high-quality data generation for complex instruction tuning
Reducing hallucinations through fine-tuning, dynamic reasoning, and embedding-level learning
Developing comprehensive, fine-grained metrics that reflect real-world task diversity
Conclusion Substantial progress has been made in enhancing the core capabilities of LLMs, driven by advances in reinforcement learning, structured reasoning, and memory modeling. However, significant hurdles remain—particularly in minimizing hallucinations, ensuring reliable multi-turn interactions, and generalizing across task domains. Research into inference-time control, explicit memory modules, and instruction decomposition continues to illuminate the path forward.
AIVille AIVille stands at the forefront of this exploration. As a decentralized experimental town powered by AI agents, AIVille provides a sandbox for testing real-world LLM capabilities across diverse tasks, memory-driven behaviors, and interactive reasoning. Here, AI characters evolve through task simulations that mirror the complexity of human social and decision-making environments.
$AGT TGE is coming
As AIVille's native token AGT approaches its Token Generation Event (TGE), a limited-time airdrop campaign is now live, ending on April 20. Community members are invited to join and engage in the next chapter of AIVille’s intelligent and decentralized evolution.
-
@ 7d33ba57:1b82db35
2025-04-09 08:25:02Sagres, perched on the dramatic cliffs of Portugal’s Algarve, feels like the end of the world—and in the best way. It's a small, laid-back town with a surfer vibe, windswept beaches, and rugged coastal views that are simply breathtaking. If you’re into nature, chill vibes, and jaw-dropping sunsets, Sagres is your spot.
🌟 Top Things to See & Do in Sagres
1️⃣ Cabo de São Vicente (Cape St. Vincent)
- The southwesternmost point of mainland Europe
- Home to a dramatic cliffside lighthouse and epic sunsets
- Once thought to be the "end of the world" in ancient times
2️⃣ Fortaleza de Sagres
- A 15th-century fortress with a giant stone compass, sea views, and a coastal walking path
- Linked to Henry the Navigator and Portugal’s Age of Discoveries
- Simple, scenic, and full of history
3️⃣ Surf the Waves 🌊
- Some of the best surfing beaches in Europe
- Try Praia do Tonel or Praia do Beliche—great for both beginners and pros
- Tons of surf schools and rental shops around town
4️⃣ Chill on the Beaches
- Praia da Mareta – calm and central, perfect for swimming
- Praia do Beliche – surrounded by cliffs, more secluded
- Praia do Martinhal – family-friendly with shallow water
5️⃣ Coastal Hiking & Cliffs
- Walk along the Rota Vicentina trails for raw Atlantic views, wildflowers, and sea breeze
- Bring water and a camera—it's a nature-lover’s dream
🍽️ What to Eat in Sagres
- Fresh seafood – grilled sardines, octopus salad, and cataplana
- Percebes (goose barnacles) – a local delicacy from the rocks
- Pastéis de nata – always a good idea ☕
- Pair it all with a cold Super Bock or a glass of vinho verde
Try beachside spots or cozy taverns in town—nothing too fancy, just simple, tasty, and fresh.
🏄 Vibe & Tips
✅ Sagres is quiet, remote, and windswept—perfect if you're looking to unwind
✅ Great for vanlifers, surfers, hikers, and sunset chasers
✅ Bring layers—it can be windy, even in summer
✅ Sunsets at Cabo de São Vicente are legendary—get there early for a good spot
✅ A car helps to explore the nearby coastlines and hidden beaches -
@ 39cc53c9:27168656
2025-04-09 07:59:35The new website is finally live! I put in a lot of hard work over the past months on it. I'm proud to say that it's out now and it looks pretty cool, at least to me!
Why rewrite it all?
The old kycnot.me site was built using Python with Flask about two years ago. Since then, I've gained a lot more experience with Golang and coding in general. Trying to update that old codebase, which had a lot of design flaws, would have been a bad idea. It would have been like building on an unstable foundation.
That's why I made the decision to rewrite the entire application. Initially, I chose to use SvelteKit with JavaScript. I did manage to create a stable site that looked similar to the new one, but it required Jav aScript to work. As I kept coding, I started feeling like I was repeating "the Python mistake". I was writing the app in a language I wasn't very familiar with (just like when I was learning Python at that mom ent), and I wasn't happy with the code. It felt like spaghetti code all the time.
So, I made a complete U-turn and started over, this time using Golang. While I'm not as proficient in Golang as I am in Python now, I find it to be a very enjoyable language to code with. Most aof my recent pr ojects have been written in Golang, and I'm getting the hang of it. I tried to make the best decisions I could and structure the code as well as possible. Of course, there's still room for improvement, which I'll address in future updates.
Now I have a more maintainable website that can scale much better. It uses a real database instead of a JSON file like the old site, and I can add many more features. Since I chose to go with Golang, I mad e the "tradeoff" of not using JavaScript at all, so all the rendering load falls on the server. But I believe it's a tradeoff that's worth it.
What's new
- UI/UX - I've designed a new logo and color palette for kycnot.me. I think it looks pretty cool and cypherpunk. I am not a graphic designer, but I think I did a decent work and I put a lot of thinking on it to make it pleasant!
- Point system - The new point system provides more detailed information about the listings, and can be expanded to cover additional features across all services. Anyone can request a new point!
- ToS Scrapper: I've implemented a powerful automated terms-of-service scrapper that collects all the ToS pages from the listings. It saves you from the hassle of reading the ToS by listing the lines that are suspiciously related to KYC/AML practices. This is still in development and it will improve for sure, but it works pretty fine right now!
- Search bar - The new search bar allows you to easily filter services. It performs a full-text search on the Title, Description, Category, and Tags of all the services. Looking for VPN services? Just search for "vpn"!
- Transparency - To be more transparent, all discussions about services now take place publicly on GitLab. I won't be answering any e-mails (an auto-reply will prompt to write to the corresponding Gitlab issue). This ensures that all service-related matters are publicly accessible and recorded. Additionally, there's a real-time audits page that displays database changes.
- Listing Requests - I have upgraded the request system. The new form allows you to directly request services or points without any extra steps. In the future, I plan to enable requests for specific changes to parts of the website.
- Lightweight and fast - The new site is lighter and faster than its predecessor!
- Tor and I2P - At last! kycnot.me is now officially on Tor and I2P!
How?
This rewrite has been a labor of love, in the end, I've been working on this for more than 3 months now. I don't have a team, so I work by myself on my free time, but I find great joy in helping people on their private journey with cryptocurrencies. Making it easier for individuals to use cryptocurrencies without KYC is a goal I am proud of!
If you appreciate my work, you can support me through the methods listed here. Alternatively, feel free to send me an email with a kind message!
Technical details
All the code is written in Golang, the website makes use of the chi router for the routing part. I also make use of BigCache for caching database requests. There is 0 JavaScript, so all the rendering load falls on the server, this means it needed to be efficient enough to not drawn with a few users since the old site was reporting about 2M requests per month on average (note that this are not unique users).
The database is running with mariadb, using gorm as the ORM. This is more than enough for this project. I started working with an
sqlite
database, but I ended up migrating to mariadb since it works better with JSON.The scraper is using chromedp combined with a series of keywords, regex and other logic. It runs every 24h and scraps all the services. You can find the scraper code here.
The frontend is written using Golang Templates for the HTML, and TailwindCSS plus DaisyUI for the CSS classes framework. I also use some plain CSS, but it's minimal.
The requests forms is the only part of the project that requires JavaScript to be enabled. It is needed for parsing some from fields that are a bit complex and for the "captcha", which is a simple Proof of Work that runs on your browser, destinated to avoid spam. For this, I use mCaptcha.
-
@ 39cc53c9:27168656
2025-04-09 07:59:33Know Your Customer is a regulation that requires companies of all sizes to verify the identity, suitability, and risks involved with maintaining a business relationship with a customer. Such procedures fit within the broader scope of anti-money laundering (AML) and counterterrorism financing (CTF) regulations.
Banks, exchanges, online business, mail providers, domain registrars... Everyone wants to know who you are before you can even opt for their service. Your personal information is flowing around the internet in the hands of "god-knows-who" and secured by "trust-me-bro military-grade encryption". Once your account is linked to your personal (and verified) identity, tracking you is just as easy as keeping logs on all these platforms.
Rights for Illusions
KYC processes aim to combat terrorist financing, money laundering, and other illicit activities. On the surface, KYC seems like a commendable initiative. I mean, who wouldn't want to halt terrorists and criminals in their tracks?
The logic behind KYC is: "If we mandate every financial service provider to identify their users, it becomes easier to pinpoint and apprehend the malicious actors."
However, terrorists and criminals are not precisely lining up to be identified. They're crafty. They may adopt false identities or find alternative strategies to continue their operations. Far from being outwitted, many times they're several steps ahead of regulations. Realistically, KYC might deter a small fraction – let's say about 1% ^1 – of these malefactors. Yet, the cost? All of us are saddled with the inconvenient process of identification just to use a service.
Under the rhetoric of "ensuring our safety", governments and institutions enact regulations that seem more out of a dystopian novel, gradually taking away our right to privacy.
To illustrate, consider a city where the mayor has rolled out facial recognition cameras in every nook and cranny. A band of criminals, intent on robbing a local store, rolls in with a stolen car, their faces obscured by masks and their bodies cloaked in all-black clothes. Once they've committed the crime and exited the city's boundaries, they switch vehicles and clothes out of the cameras' watchful eyes. The high-tech surveillance? It didn’t manage to identify or trace them. Yet, for every law-abiding citizen who merely wants to drive through the city or do some shopping, their movements and identities are constantly logged. The irony? This invasive tracking impacts all of us, just to catch the 1% ^1 of less-than-careful criminals.
KYC? Not you.
KYC creates barriers to participation in normal economic activity, to supposedly stop criminals. ^2
KYC puts barriers between many users and businesses. One of these comes from the fact that the process often requires multiple forms of identification, proof of address, and sometimes even financial records. For individuals in areas with poor record-keeping, non-recognized legal documents, or those who are unbanked, homeless or transient, obtaining these documents can be challenging, if not impossible.
For people who are not skilled with technology or just don't have access to it, there's also a barrier since KYC procedures are mostly online, leaving them inadvertently excluded.
Another barrier goes for the casual or one-time user, where they might not see the value in undergoing a rigorous KYC process, and these requirements can deter them from using the service altogether.
It also wipes some businesses out of the equation, since for smaller businesses, the costs associated with complying with KYC norms—from the actual process of gathering and submitting documents to potential delays in operations—can be prohibitive in economical and/or technical terms.
You're not welcome
Imagine a swanky new club in town with a strict "members only" sign. You hear the music, you see the lights, and you want in. You step up, ready to join, but suddenly there's a long list of criteria you must meet. After some time, you are finally checking all the boxes. But then the club rejects your membership with no clear reason why. You just weren't accepted. Frustrating, right?
This club scenario isn't too different from the fact that KYC is being used by many businesses as a convenient gatekeeping tool. A perfect excuse based on a "legal" procedure they are obliged to.
Even some exchanges may randomly use this to freeze and block funds from users, claiming these were "flagged" by a cryptic system that inspects the transactions. You are left hostage to their arbitrary decision to let you successfully pass the KYC procedure. If you choose to sidestep their invasive process, they might just hold onto your funds indefinitely.
Your identity has been stolen
KYC data has been found to be for sale on many dark net markets^3. Exchanges may have leaks or hacks, and such leaks contain very sensitive data. We're talking about the full monty: passport or ID scans, proof of address, and even those awkward selfies where you're holding up your ID next to your face. All this data is being left to the mercy of the (mostly) "trust-me-bro" security systems of such companies. Quite scary, isn't it?
As cheap as $10 for 100 documents, with discounts applying for those who buy in bulk, the personal identities of innocent users who passed KYC procedures are for sale. ^3
In short, if you have ever passed the KYC/AML process of a crypto exchange, your privacy is at risk of being compromised, or it might even have already been compromised.
(they) Know Your Coins
You may already know that Bitcoin and most cryptocurrencies have a transparent public blockchain, meaning that all data is shown unencrypted for everyone to see and recorded forever. If you link an address you own to your identity through KYC, for example, by sending an amount from a KYC exchange to it, your Bitcoin is no longer pseudonymous and can then be traced.
If, for instance, you send Bitcoin from such an identified address to another KYC'ed address (say, from a friend), everyone having access to that address-identity link information (exchanges, governments, hackers, etc.) will be able to associate that transaction and know who you are transacting with.
Conclusions
To sum up, KYC does not protect individuals; rather, it's a threat to our privacy, freedom, security and integrity. Sensible information flowing through the internet is thrown into chaos by dubious security measures. It puts borders between many potential customers and businesses, and it helps governments and companies track innocent users. That's the chaos KYC has stirred.
The criminals are using stolen identities from companies that gathered them thanks to these very same regulations that were supposed to combat them. Criminals always know how to circumvent such regulations. In the end, normal people are the most affected by these policies.
The threat that KYC poses to individuals in terms of privacy, security and freedom is not to be neglected. And if we don’t start challenging these systems and questioning their efficacy, we are just one step closer to the dystopian future that is now foreseeable.
Edited 20/03/2024 * Add reference to the 1% statement on Rights for Illusions section to an article where Chainalysis found that only 0.34% of the transaction volume with cryptocurrencies in 2023 was attributable to criminal activity ^1
-
@ 39cc53c9:27168656
2025-04-09 07:59:32Over the past few months, I've dedicated my time to a complete rewrite of the kycnot.me website. The technology stack remains unchanged; Golang paired with TailwindCSS. However, I've made some design choices in this iteration that I believe significantly enhance the site. Particularly to backend code.
UI Improvements
You'll notice a refreshed UI that retains the original concept but has some notable enhancements. The service list view is now more visually engaging, it displays additional information in a more aesthetically pleasing manner. Both filtering and searching functionalities have been optimized for speed and user experience.
Service pages have been also redesigned to highlight key information at the top, with the KYC Level box always accessible. The display of service attributes is now more visually intuitive.
The request form, especially the Captcha, has undergone substantial improvements. The new self-made Captcha is robust, addressing the reliability issues encountered with the previous version.
Terms of Service Summarizer
A significant upgrade is the Terms of Service summarizer/reviewer, now powered by AI (GPT-4-turbo). It efficiently condenses each service's ToS, extracting and presenting critical points, including any warnings. Summaries are updated monthly, processing over 40 ToS pages via the OpenAI API using a self-crafted and thoroughly tested prompt.
Nostr Comments
I've integrated a comment section for each service using Nostr. For guidance on using this feature, visit the dedicated how-to page.
Database
The backend database has transitioned to pocketbase, an open-source Golang backend that has been a pleasure to work with. I maintain an updated fork of the Golang SDK for pocketbase at pluja/pocketbase.
Scoring
The scoring algorithm has also been refined to be more fair. Despite I had considered its removal due to the complexity it adds (it is very difficult to design a fair scoring system), some users highlighted its value, so I kept it. The updated algorithm is available open source.
Listings
Each listing has been re-evaluated, and the ones that were no longer operational were removed. New additions are included, and the backlog of pending services will be addressed progressively, since I still have access to the old database.
API
The API now offers more comprehensive data. For more details, check here.
About Page
The About page has been restructured for brevity and clarity.
Other Changes
Extensive changes have been implemented in the server-side logic, since the whole code base was re-written from the ground up. I may discuss these in a future post, but for now, I consider the current version to be just a bit beyond beta, and additional updates are planned in the coming weeks.
-
@ 39cc53c9:27168656
2025-04-09 07:59:30I'm launching a new service review section on this blog in collaboration with OrangeFren. These reviews are sponsored, yet the sponsorship does not influence the outcome of the evaluations. Reviews are done in advance, then, the service provider has the discretion to approve publication without modifications.
Sponsored reviews are independent from the kycnot.me list, being only part of the blog. The reviews have no impact on the scores of the listings or their continued presence on the list. Should any issues arise, I will not hesitate to remove any listing.
The review
WizardSwap is an instant exchange centred around privacy coins. It was launched in 2020 making it old enough to have weathered the 2021 bull run and the subsequent bearish year.
| Pros | Cons | |------|------| | Tor-friendly | Limited liquidity | | Guarantee of no KYC | Overly simplistic design | | Earn by providing liquidity | |
Rating: ★★★★★ Service Website: wizardswap.io
Liquidity
Right off the bat, we'll start off by pointing out that WizardSwap relies on its own liquidity reserves, meaning they aren't just a reseller of Binance or another exchange. They're also committed to a no-KYC policy, when asking them, they even promised they would rather refund a user their original coins, than force them to undergo any sort of verification.
On the one hand, full control over all their infrastructure gives users the most privacy and conviction about the KYC policies remaining in place.
On the other hand, this means the liquidity available for swapping isn't huge. At the time of testing we could only purchase at most about 0.73 BTC with XMR.
It's clear the team behind WizardSwap is aware of this shortfall and so they've come up with a solution unique among instant exchanges. They let you, the user, deposit any of the currencies they support into your account and earn a profit on the trades made using your liquidity.
Trading
Fees on WizardSwap are middle-of-the-pack. The normal fee is 2.2%. That's more than some exchanges that reserve the right to suddenly demand you undergo verification, yet less than half the fees on some other privacy-first exchanges. However as we mentioned in the section above you can earn almost all of that fee (2%) if you provide liquidity to WizardSwap.
It's good that with the current Bitcoin fee market their fees are constant regardless of how much, or how little, you send. This is in stark contrast with some of the alternative swap providers that will charge you a massive premium when attempting to swap small amounts of BTC away.
Test trades
Test trades are always performed without previous notice to the service provider.
During our testing we performed a few test trades and found that every single time WizardSwap immediately detected the incoming transaction and the amount we received was exactly what was quoted before depositing. The fees were inline with what WizardSwap advertises.
- Monero payment proof
- Bitcoin received
- Wizardswap TX link - it's possible that this link may cease to be valid at some point in the future.
ToS and KYC
WizardSwap does not have a Terms of Service or a Privacy Policy page, at least none that can be found by users. Instead, they offer a FAQ section where they addresses some basic questions.
The site does not mention any KYC or AML practices. It also does not specify how refunds are handled in case of failure. However, based on the FAQ section "What if I send funds after the offer expires?" it can be inferred that contacting support is necessary and network fees will be deducted from any refund.
UI & Tor
WizardSwap can be visited both via your usual browser and Tor Browser. Should you decide on the latter you'll find that the website works even with the most strict settings available in the Tor Browser (meaning no JavaScript).
However, when disabling Javascript you'll miss the live support chat, as well as automatic refreshing of the trade page. The lack of the first means that you will have no way to contact support from the trade page if anything goes wrong during your swap, although you can do so by mail.
One important thing to have in mind is that if you were to accidentally close the browser during the swap, and you did not save the swap ID or your browser history is disabled, you'll have no easy way to return to the trade. For this reason we suggest when you begin a trade to copy the url or ID to someplace safe, before sending any coins to WizardSwap.
The UI you'll be greeted by is simple, minimalist, and easy to navigate. It works well not just across browsers, but also across devices. You won't have any issues using this exchange on your phone.
Getting in touch
The team behind WizardSwap appears to be most active on X (formerly Twitter): https://twitter.com/WizardSwap_io
If you have any comments or suggestions about the exchange make sure to reach out to them. In the past they've been very receptive to user feedback, for instance a few months back WizardSwap was planning on removing DeepOnion, but the community behind that project got together ^1 and after reaching out WizardSwap reversed their decision ^2.
You can also contact them via email at:
support @ wizardswap . io
Disclaimer
None of the above should be understood as investment or financial advice. The views are our own only and constitute a faithful representation of our experience in using and investigating this exchange. This review is not a guarantee of any kind on the services rendered by the exchange. Do your own research before using any service.
-
@ 39cc53c9:27168656
2025-04-09 07:59:28Bitcoin enthusiasts frequently and correctly remark how much value it adds to Bitcoin not to have a face, a leader, or a central authority behind it. This particularity means there isn't a single person to exert control over, or a single human point of failure who could become corrupt or harmful to the project.
Because of this, it is said that no other coin can be equally valuable as Bitcoin in terms of decentralization and trustworthiness. Bitcoin is unique not just for being first, but also because of how the events behind its inception developed. This implies that, from Bitcoin onwards, any coin created would have been created by someone, consequently having an authority behind it. For this and some other reasons, some people refer to Bitcoin as "The Immaculate Conception".
While other coins may have their own unique features and advantages, they may not be able to replicate Bitcoin's community-driven nature. However, one other cryptocurrency shares a similar story of mystery behind its creation: Monero.
History of Monero
Bytecoin and CryptoNote
In March 2014, a Bitcointalk thread titled "Bytecoin. Secure, private, untraceable since 2012" was initiated by a user under the nickname "DStrange"^1^. DStrange presented Bytecoin (BCN) as a unique cryptocurrency, in operation since July 2012. Unlike Bitcoin, it employed a new algorithm known as CryptoNote.
DStrange apparently stumbled upon the Bytecoin website by chance while mining a dying bitcoin fork, and decided to create a thread on Bitcointalk^1^. This sparked curiosity among some users, who wondered how could Bytecoin remain unnoticed since its alleged launch in 2012 until then^2^.
Some time after, a user brought up the "CryptoNote v2.0" whitepaper for the first time, underlining its innovative features^4^. Authored by the pseudonymous Nicolas van Saberhagen in October 2013, the CryptoNote v2 whitepaper^5^ highlighted the traceability and privacy problems in Bitcoin. Saberhagen argued that these flaws could not be quickly fixed, suggesting it would be more efficient to start a new project rather than trying to patch the original^5^, an statement simmilar to the one from Satoshi Nakamoto^6^.
Checking with Saberhagen's digital signature, the release date of the whitepaper seemed correct, which would mean that Cryptonote (v1) was created in 2012^7^, although there's an important detail: "Signing time is from the clock on the signer's computer" ^9^.
Moreover, the whitepaper v1 contains a footnote link to a Bitcointalk post dated May 5, 2013^10^, making it impossible for the whitepaper to have been signed and released on December 12, 2012.
As the narrative developed, users discovered that a significant 80% portion of Bytecoin had been pre-mined^11^ and blockchain dates seemed to be faked to make it look like it had been operating since 2012, leading to controversy surrounding the project.
The origins of CryptoNote and Bytecoin remain mysterious, leaving suspicions of a possible scam attempt, although the whitepaper had a good amount of work and thought on it.
The fork
In April 2014, the Bitcointalk user
thankful_for_today
, who had also participated in the Bytecoin thread^12^, announced plans to launch a Bytecoin fork named Bitmonero^13^.The primary motivation behind this fork was "Because there is a number of technical and marketing issues I wanted to do differently. And also because I like ideas and technology and I want it to succeed"^14^. This time Bitmonero did things different from Bytecoin: there was no premine or instamine, and no portion of the block reward went to development.
However, thankful_for_today proposed controversial changes that the community disagreed with. Johnny Mnemonic relates the events surrounding Bitmonero and thankful_for_today in a Bitcointalk comment^15^:
When thankful_for_today launched BitMonero [...] he ignored everything that was discussed and just did what he wanted. The block reward was considerably steeper than what everyone was expecting. He also moved forward with 1-minute block times despite everyone's concerns about the increase of orphan blocks. He also didn't address the tail emission concern that should've (in my opinion) been in the code at launch time. Basically, he messed everything up. Then, he disappeared.
After disappearing for a while, thankful_for_today returned to find that the community had taken over the project. Johnny Mnemonic continues:
I, and others, started working on new forks that were closer to what everyone else was hoping for. [...] it was decided that the BitMonero project should just be taken over. There were like 9 or 10 interested parties at the time if my memory is correct. We voted on IRC to drop the "bit" from BitMonero and move forward with the project. Thankful_for_today suddenly resurfaced, and wasn't happy to learn the community had assumed control of the coin. He attempted to maintain his own fork (still calling it "BitMonero") for a while, but that quickly fell into obscurity.
The unfolding of these events show us the roots of Monero. Much like Satoshi Nakamoto, the creators behind CryptoNote/Bytecoin and thankful_for_today remain a mystery^17^, having disappeared without a trace. This enigma only adds to Monero's value.
Since community took over development, believing in the project's potential and its ability to be guided in a better direction, Monero was given one of Bitcoin's most important qualities: a leaderless nature. With no single face or entity directing its path, Monero is safe from potential corruption or harm from a "central authority".
The community continued developing Monero until today. Since then, Monero has undergone a lot of technological improvements, migrations and achievements such as RingCT and RandomX. It also has developed its own Community Crowdfundinc System, conferences such as MoneroKon and Monerotopia are taking place every year, and has a very active community around it.
Monero continues to develop with goals of privacy and security first, ease of use and efficiency second. ^16^
This stands as a testament to the power of a dedicated community operating without a central figure of authority. This decentralized approach aligns with the original ethos of cryptocurrency, making Monero a prime example of community-driven innovation. For this, I thank all the people involved in Monero, that lead it to where it is today.
If you find any information that seems incorrect, unclear or any missing important events, please contact me and I will make the necessary changes.
Sources of interest
- https://forum.getmonero.org/20/general-discussion/211/history-of-monero
- https://monero.stackexchange.com/questions/852/what-is-the-origin-of-monero-and-its-relationship-to-bytecoin
- https://en.wikipedia.org/wiki/Monero
- https://bitcointalk.org/index.php?topic=583449.0
- https://bitcointalk.org/index.php?topic=563821.0
- https://bitcointalk.org/index.php?action=profile;u=233561
- https://bitcointalk.org/index.php?topic=512747.0
- https://bitcointalk.org/index.php?topic=740112.0
- https://monero.stackexchange.com/a/1024
- https://inspec2t-project.eu/cryptocurrency-with-a-focus-on-anonymity-these-facts-are-known-about-monero/
- https://medium.com/coin-story/coin-perspective-13-riccardo-spagni-69ef82907bd1
- https://www.getmonero.org/resources/about/
- https://www.wired.com/2017/01/monero-drug-dealers-cryptocurrency-choice-fire/
- https://www.monero.how/why-monero-vs-bitcoin
- https://old.reddit.com/r/Monero/comments/u8e5yr/satoshi_nakamoto_talked_about_privacy_features/
-
@ 39cc53c9:27168656
2025-04-09 07:59:27I've been thinking about how to improve my seed backup in a cheap and cool way, mostly for fun. Until now, I had the seed written on a piece of paper in a desk drawer, and I wanted something more durable and fire-proof.
After searching online, I found two options I liked the most: the Cryptosteel Capsule and the Trezor Keep. These products are nice but quite expensive, and I didn't want to spend that much on my seed backup. Privacy is also important, and sharing details like a shipping address makes me uncomfortable. This concern has grown since the Ledger incident^1. A $5 wrench attack^2 seems too cheap, even if you only hold a few sats.
Upon seeing the design of Cryptosteel, I considered creating something similar at home. Although it may not be as cool as their device, it could offer almost the same in terms of robustness and durability.
Step 1: Get the materials and tools
When choosing the materials, you will want to go with stainless steel. It is durable, resistant to fire, water, and corrosion, very robust, and does not rust. Also, its price point is just right; it's not the cheapest, but it's cheap for the value you get.
I went to a material store and bought:
- Two bolts
- Two hex nuts and head nuts for the bolts
- A bag of 30 washers
All items were made of stainless steel. The total price was around €6. This is enough for making two seed backups.
You will also need:
- A set of metal letter stamps (I bought a 2mm-size letter kit since my washers were small, 6mm in diameter)
- You can find these in local stores or online marketplaces. The set I bought cost me €13.
- A good hammer
- A solid surface to stamp on
Total spent: 19€ for two backups
Step 2: Stamp and store
Once you have all the materials, you can start stamping your words. There are many videos on the internet that use fancy 3D-printed tools to get the letters nicely aligned, but I went with the free-hand option. The results were pretty decent.
I only stamped the first 4 letters for each word since the BIP-39 wordlist allows for this. Because my stamping kit did not include numbers, I used alphabet letters to define the order. This way, if all the washers were to fall off, I could still reassemble the seed correctly.
The final result
So this is the final result. I added two smaller washers as protection and also put the top washer reversed so the letters are not visible:
Compared to the Cryptosteel or the Trezor Keep, its size is much more compact. This makes for an easier-to-hide backup, in case you ever need to hide it inside your human body.
Some ideas
Tamper-evident seal
To enhance the security this backup, you can consider using a tamper-evident seal. This can be easily achieved by printing a unique image or using a specific day's newspaper page (just note somewhere what day it was).
Apply a thin layer of glue to the washer's surface and place the seal over it. If someone attempts to access the seed, they will be forced to destroy the seal, which will serve as an evident sign of tampering.
This simple measure will provide an additional layer of protection and allow you to quickly identify any unauthorized access attempts.
Note that this method is not resistant to outright theft. The tamper-evident seal won't stop a determined thief but it will prevent them from accessing your seed without leaving any trace.
Redundancy
Make sure to add redundancy. Make several copies of this cheap backup, and store them in separate locations.
Unique wordset
Another layer of security could be to implement your own custom mnemonic dictionary. However, this approach has the risk of permanently losing access to your funds if not implemented correctly.
If done properly, you could potentially end up with a highly secure backup, as no one else would be able to derive the seed phrase from it. To create your custom dictionary, assign a unique number from 1 to 2048 to a word of your choice. Maybe you could use a book, and index the first 2048 unique words that appear. Make sure to store this book and even get a couple copies of it (digitally and phisically).
This self-curated set of words will serve as your personal BIP-39 dictionary. When you need to translate between your custom dictionary and the official BIP-39 wordlist, simply use the index number to find the corresponding word in either list.
Never write the idex or words on your computer (Do not use
Ctr+F
) -
@ 7bc05901:8c26d22b
2025-04-09 14:15:31My wife (girlfriend at the time) and I were heading back from Nashville after celebrating the opening of Bitcoin Park in Nashville. My boy Ryan had, once again, drug me to a Bitcoin event in the waning days of my stubborn shitcoinery. This event was the nail in the coffin for those days, and I'm happy to say the "stay humble stack sats" message finally permeated.
My wife is a dedicated reseller, her family has been flipping garage sale finds and auction grabs for years, so we rarely see a flea market or antique mall that we pass up. Somewhere between Missouri and Nashville we pulled off the highway to check out a spot in a dying but (if you squint your eyes and imagine it is 50 years in the past) a picturesque little town.
We were in my little Scion FRS, a two door sports car, so when I came across an old newspaper vending machine, I had to do a lot of geometry to figure out if I could shove this thing in the Scion. I concluded that my girlfriend would have to ride in the backseat for the remaining three hour drive if I really wanted to scoop up this vending machine, because it was too wide to slide into the trunk. Even though she knew I had an infatuation for retro newspaper things and was encouraging me to buy it, I declined. Probably the right call, but I still think about that thing -- the price was right.
I don't know what I would have done with it, but I have for years produced various hobbyist newspaper zines focusing on local political issues that I distributed from the coffeeshop that I worked at in my small town. The idea was hitting so hard when the social media censorship conversation was at a fever pitch after 2016 -- You can't censor a copy machine, I kept thinking. Analog zines, I was convinced, were the future.
I hadn't thought through decentralized social media protocols, but I did get really tired of distributing zines that nobody was excited to pay me for. Copying, organizing, stapling. I should have known I didn't have the patience to maintain that, or the finances.
Even established local news corporations, especially in my town, are struggling to justify a print version. This wasn't the case a quarter of a century ago.
My dad would stop at the Casey's convenience story every morning on the way into town, as he took us to school. If you brought your own travel mug, it was only fifty cents to fill up your cup of coffee. Nearly everyday, he would also come out with a copy of the local newspaper: The Daily Journal. The price was right around a dollar for the paper. It might have even been cheaper, like fifty or seventy-five cents.
The idea I am inching towards in this post, is that if every person valued the distribution of local (and global) news to the tune of a buck or a buck fifty, we could see the re-emergence sustaining news ecosystems. A buck fifty is almost two thousand sats today -- imagine if each appreciator of local news set aside just a thousand sats a day to zap news distributors. If there was a bias for following and amplifying local news events in each user's town, which tend to get a lot of attention on the centralized social media platforms, I think an entirely new value-4-value journalism enterprise model could emerge.
It may be important to start tinkering on a client that is built specifically for newspapers. I am not sure which features would be critical, but as the normies trickle over to the uncensorable social media protocol -- let's be ready.
-
@ 39cc53c9:27168656
2025-04-09 07:59:25kycnot.me features a somewhat hidden tool that some users may not be aware of. Every month, an automated job crawls every listed service's Terms of Service (ToS) and FAQ pages and conducts an AI-driven analysis, generating a comprehensive overview that highlights key points related to KYC and user privacy.
Here's an example: Changenow's Tos Review
Why?
ToS pages typically contain a lot of complicated text. Since the first versions of kycnot.me, I have tried to provide users a comprehensive overview of what can be found in such documents. This automated method keeps the information up-to-date every month, which was one of the main challenges with manual updates.
A significant part of the time I invest in investigating a service for kycnot.me involves reading the ToS and looking for any clauses that might indicate aggressive KYC practices or privacy concerns. For the past four years, I performed this task manually. However, with advancements in language models, this process can now be somewhat automated. I still manually review the ToS for a quick check and regularly verify the AI’s findings. However, over the past three months, this automated method has proven to be quite reliable.
Having a quick ToS overview section allows users to avoid reading the entire ToS page. Instead, you can quickly read the important points that are grouped, summarized, and referenced, making it easier and faster to understand the key information.
Limitations
This method has a key limitation: JS-generated pages. For this reason, I was using Playwright in my crawler implementation. I plan to make a release addressing this issue in the future. There are also sites that don't have ToS/FAQ pages, but these sites already include a warning in that section.
Another issue is false positives. Although not very common, sometimes the AI might incorrectly interpret something harmless as harmful. Such errors become apparent upon reading; it's clear when something marked as bad should not be categorized as such. I manually review these cases regularly, checking for anything that seems off and then removing any inaccuracies.
Overall, the automation provides great results.
How?
There have been several iterations of this tool. Initially, I started with GPT-3.5, but the results were not good in any way. It made up many things, and important thigs were lost on large ToS pages. I then switched to GPT-4 Turbo, but it was expensive. Eventually, I settled on Claude 3 Sonnet, which provides a quality compromise between GPT-3.5 and GPT-4 Turbo at a more reasonable price, while allowing a generous 200K token context window.
I designed a prompt, which is open source^1, that has been tweaked many times and will surely be adjusted further in the future.
For the ToS scraping part, I initially wrote a scraper API using Playwright^2, but I replaced it with Jina AI Reader^3, which works quite well and is designed for this task.
Non-conflictive ToS
All services have a dropdown in the ToS section called "Non-conflictive ToS Reviews." These are the reviews that the AI flagged as not needing a user warning. I still provide these because I think they may be interesting to read.
Feedback and contributing
You can give me feedback on this tool, or share any inaccuraties by either opening an issue on Codeberg^4 or by contacting me ^5.
You can contribute with pull requests, which are always welcome, or you can support this project with any of the listed ways.
-
@ 39cc53c9:27168656
2025-04-09 07:59:24These reviews are sponsored, yet the sponsorship does not influence the outcome of the evaluations. Sponsored reviews are independent from the kycnot.me list, being only part of the blog. The reviews have no impact on the scores of the listings or their continued presence on the list. Should any issues arise, I will not hesitate to remove any listing. Reviews are in collaboration with Orangefren.
The review
Swapter.io is an all-purpose instant exchange. They entered the scene in the depths of the bear market about 2 years ago in June of 2022.
| Pros | Cons | | --------------- | ---------------------------------- | | Low fees | Shotgun KYC with opaque triggers | | Large liquidity | Relies on 3rd party liquidity | | Works over Tor | Front-end not synced with back-end | | Pretty UI | |
Rating: ★★★☆☆ Service Website: swapter.io
⚠️ There is an ongoing issue with this service: read more on Reddit.
Test Trades
During our testing we performed a trade from XMR to LTC, and then back to XMR.
Our first trade had the ID of:
mpUitpGemhN8jjNAjQuo6EvQ
. We were promised 0.8 LTC for sending 0.5 XMR, before we sent the Monero. When the Monero arrived we were sent 0.799 LTC.On the return journey we performed trade with ID:
yaCRb5pYcRKAZcBqg0AzEGYg
. This time we were promised 0.4815 XMR for sending 0.799 LTC. After Litecoin arrived we were sent 0.4765 XMR.As such we saw a discrepancy of
~0.1%
in the first trade and~1%
in the second trade. Considering those trades were floating we determine the estimates presented in the UI to be highly accurate and honest.Of course Swapter could've been imposing a large fee on their estimates, but we checked their estimates against CoinGecko and found the difference to be equivalent to a fee of just over
0.5%
. Perfectly in line with other swapping services.Trading
Swapter supports BTC, LTC, XMR and well over a thousand other coins. Sadly they don't support the Lightning Network. For the myriad of currencies they deal with they provide massive upper limits. You could exchange tens, or even hundreds, of thousands of dollars worth of cryptocurrency in a single trade (although we wouldn't recommend it).
The flip side to this is that Swapter relies on 3rd party liquidity. Aside from the large liqudity this also benefits the user insofar as it allows for very low fees. However, it also comes with a negative - the 3rd party gets to see all your trades. Unfortunately Swapter opted not to share where they source their liquidity in their Privacy Policy or Terms of Service.
KYC & AML policies
Swapter reserves the right to require its users to provide their full name, their date of birth, their address and government-issued ID. A practice known as "shotgun KYC". This should not happen often - in our testing it never did - however it's not clear when exactly it could happen. The AML & KYC policy provided on Swapter's website simply states they will put your trade on hold if their "risk scoring system [deems it] as suspicious".
Worse yet, if they determine that "any of the information [the] customer provided is incorrect, false, outdated, or incomplete" then Swapter may decide to terminate all of the services they provide to the user. What exactly would happen to their funds in such a case remains unclear.
The only clarity we get is that the Swapter policy outlines a designated 3rd party that will verify the information provided by the user. The third party's name is Sum & Substance Ltd, also simply known as samsub and available at sumsub.com
It's understandable that some exchanges will decide on a policy of this sort, especially when they rely on external liquidity, but we would prefer more clarity be given. When exactly is a trade suspicious?
Tor
We were pleased to discover Swapter works over Tor. However, they do not provide a Tor mirror, nor do they work without JavaScript. Additionally, we found that some small features, such as the live chat, did not work over Tor. Fortunately, other means of contacting their support are still available.
UI
We have found the Swapter UI to be very modern, straightforward and simple to use. It's available in 4 languages (English, French, Dutch and Russian), although we're unable to vouch for the quality of some of those, the ones that we used seemed perfectly serviceable.
Our only issue with the UI was that it claims the funds have been sent following the trade, when in reality it seems to take the backend a minute or so to actually broadcast the transaction.
Getting in touch
Swapter's team has a chat on their website, a support email address and a support Telegram. Their social media presence in most active on Telegram and X (formerly Twitter).
Disclaimer
None of the above should be understood as investment or financial advice. The views are our own only and constitute a faithful representation of our experience in using and investigating this exchange. This review is not a guarantee of any kind on the services rendered by the exchange. Do your own research before using any service.
-
@ 39cc53c9:27168656
2025-04-09 07:59:22“The future is there... staring back at us. Trying to make sense of the fiction we will have become.” — William Gibson.
This month is the 4th anniversary of kycnot.me. Thank you for being here.
Fifteen years ago, Satoshi Nakamoto introduced Bitcoin, a peer-to-peer electronic cash system: a decentralized currency free from government and institutional control. Nakamoto's whitepaper showed a vision for a financial system based on trustless transactions, secured by cryptography. Some time forward and KYC (Know Your Customer), AML (Anti-Money Laundering), and CTF (Counter-Terrorism Financing) regulations started to come into play.
What a paradox: to engage with a system designed for decentralization, privacy, and independence, we are forced to give away our personal details. Using Bitcoin in the economy requires revealing your identity, not just to the party you interact with, but also to third parties who must track and report the interaction. You are forced to give sensitive data to entities you don't, can't, and shouldn't trust. Information can never be kept 100% safe; there's always a risk. Information is power, who knows about you has control over you.
Information asymmetry creates imbalances of power. When entities have detailed knowledge about individuals, they can manipulate, influence, or exploit this information to their advantage. The accumulation of personal data by corporations and governments enables extensive surveillances.
Such practices, moreover, exclude individuals from traditional economic systems if their documentation doesn't meet arbitrary standards, reinforcing a dystopian divide. Small businesses are similarly burdened by the costs of implementing these regulations, hindering free market competition^1:
How will they keep this information safe? Why do they need my identity? Why do they force businesses to enforce such regulations? It's always for your safety, to protect you from the "bad". Your life is perpetually in danger: terrorists, money launderers, villains... so the government steps in to save us.
‟Hush now, baby, baby, don't you cry Mamma's gonna make all of your nightmares come true Mamma's gonna put all of her fears into you Mamma's gonna keep you right here, under her wing She won't let you fly, but she might let you sing Mamma's gonna keep baby cosy and warm” — Mother, Pink Floyd
We must resist any attack on our privacy and freedom. To do this, we must collaborate.
If you have a service, refuse to ask for KYC; find a way. Accept cryptocurrencies like Bitcoin and Monero. Commit to circular economies. Remove the need to go through the FIAT system. People need fiat money to use most services, but we can change that.
If you're a user, donate to and prefer using services that accept such currencies. Encourage your friends to accept cryptocurrencies as well. Boycott FIAT system to the greatest extent you possibly can.
This may sound utopian, but it can be achieved. This movement can't be stopped. Go kick the hornet's nest.
“We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.” — Eric Hughes, A Cypherpunk's Manifesto
The anniversary
Four years ago, I began exploring ways to use crypto without KYC. I bookmarked a few favorite services and thought sharing them to the world might be useful. That was the first version of kycnot.me — a simple list of about 15 services. Since then, I've added services, rewritten it three times, and improved it to what it is now.
kycnot.me has remained 100% independent and 100% open source^2 all these years. I've received offers to buy the site, all of which I have declined and will continue to decline. It has been DDoS attacked many times, but we made it through. I have also rewritten the whole site almost once per year (three times in four years).
The code and scoring algorithm are open source (contributions are welcome) and I can't arbitrarly change a service's score without adding or removing attributes, making any arbitrary alterations obvious if they were fake. You can even see the score summary for any service's score.
I'm a one-person team, dedicating my free time to this project. I hope to keep doing so for many more years. Again, thank you for being part of this.
-
@ 39cc53c9:27168656
2025-04-09 07:59:20Silent.link is an anonymous eSIM provider. They offer pay-as-you-go roaming in 160+ countries.
Pros
- Anonymous
- Private payment options
- High performance
- Global availability
Cons
- Need to select the right networks sometimes
- Latency
- Data and incoming SMS & call only
Rating
★★★★★
Service website
eSIMs replace traditional, physical SIM cards, if you have a fairly new phone, odds are it supports them. Since most people change their mobile carrier very rarely, the most common use case for these new eSIMs is their use in travel. Although their use as a piece of a larger OPSEC puzzle to improve privacy when using the internet from your phone is increasingly popular too.
Silent.link is not the only eSIM provider out there. Yet, they’re so unique that even Twitter’s (now X) founder Jack Dorsey recommends them.
Let’s start off with a quick explanation of how Silent.link works and what pay-as-you-go means. Most other eSIM providers will sell you packages of GBs with an expiration date. For instance imagine you’re visiting France then going to the UK after a few months. With other providers you might buy a 10GB in France package valid for 7 days, then after some months a 10GB in the UK package also valid for 7 days. You likely won’t use up the full package in either country and the remaining capacity will be voided as the package expires.
Silent.link’s pay-as-you-go is different. There are no geographic packages. There are no expiration dates. You simply have a balance denominated in USD and are charged as you use up the data according to the pricing of whichever local carrier you’re connecting via.
Preparing for the same trips from the example above you’d simply top-up your Silent.link balance with $10. Then you’d use Silent.link in France paying $1.33/GB, you’d only be charged for the exact amount used, then you’d go to the UK and pay $1.54/GB from the balance you had left over from France. It doesn’t matter how much time passes between the trips, because Silent.link balances don’t expire. If you have a balance left over you can use it on a future trip, or simply use it up in your home country.
Pros
Anonymity
Silent.link is anonymous. Most other eSIM providers require some form of identification. This can be a traditional, full KYC, procedure involving your ID or passport numbers or, as seemingly innocent, as verifying your phone number with your main carrier. Regardless, a link between the eSIM you bought online and your identity is established.
In some countries you’ll be able to pick up a traditional SIM (or the new eSIM) from a local carrier without undergoing this verification. This can still be a hassle though. You’ll need to look up the laws before travelling, you’ll need to find a local store selling them, you’ll need to decide how you’ll pay privately, etc. And that’s the best case, that’s assuming the country you want to get the SIM in allows you to buy one anonymously.
Private payment methods
Silent.link only accepts cryptocurrency and according to their stats, most payments are made with Bitcoin (either onchain or using the Lightning Network) or with Monero. As such paying anonymously is not a problem. The use a self-hosted instance of BTCPay Server to process payments and operate their own LN node. The entire checkout process can be completed over Tor.
Cons
Network selection
Although you can skip the hassle of buying a new eSIM every time you travel it’s a good idea to look up the pricing of different mobile networks in the country you’re going to. The differences can be trivial, but can also be 100x. If a specific mobile network offers a much better deal, you’ll probably want to dive into your phone’s settings to make sure it only connects to that network.
High prices for some regions
Second issue can be that, especially for poorer countries, Silent.link might not have the best prices. For instance if you travel to Angola you’ll end up paying $155.44/GB. But if you search around for other providers you’ll find eSIM that offer much lower prices for that same country.
Data & incoming SMS & calls only
These eSIMs are either data-only or only offer data and inbound sms and calls. You can’t use Silent.link eSIMs to send texts or make phone calls.
Latency
For most use-cases this shouldn’t matter, but the way roaming works is that when you’re abroad your data is first sent to your home country then sent out into the internet from there. For instance if you’re a Brit on holiday in Spain wherever you open up a website your phone communicates with the Spanish network who forwards the request to your home network in the UK and only there does the request start going towards the website you’re trying to load. The response takes the same path in reverse.
The home network for the Silent.link eSIMs is Poland. To take an extreme (antipodal) example, if you’re in Chile loading a Chilean website your request will go to Poland then back from Poland to the website’s server in Chile, then the response will go from Chile to Poland to you (in Chile). All those trips add latency. In our testing, done during the recent OrangeFren.com meetup in Istanbul, the difference was an additional 73ms. The bandwidth, however, was exceptional, easily surpassing 100 Mbps.
This latency issue isn’t unique to Silent.link, other eSIM providers usually suffer from it too, though their home network may be better suited for your latency needs. If you need the best latency we recommend a SIM from a local provider (or WiFi).
This proxy behaviour isn’t all negative however. It may potentially allow you to circumvent censorship or geoblocking if you’re trying to access resources available from Poland, but unavailable elsewhere.
Besides Istanbul one of the countries we also tested Silent.link in was Northern Cyprus. This territory is mostly unrecognized. It’s a country that, depending on who you ask, is or isn’t real. Despite this unresolved geopolitical status Silent.link performed without any issues.
Installation
If you decide to give Silent.link a try, you'll need to select if you want a data-only plan or a plan with inbound SMS & calling, once you complete the payment simply scan the QR code on the order confirmation page with your phone. Make sure to save the url of that order confirmation page somewhere! You will need it to top up your eSIM and check your remaining balance.
Getting in touch
The preferred way of contacting Silent.link's support is using the website's built-in chat function. Alternative methods include X (formerly Twitter), Matrix and email.
Their support is online from 09:00 - 21:00 UTC although even when testing outside of those hours we got a reply within a minute.
NOTE: These reviews are sponsored, yet the sponsorship does not influence the outcome of the evaluations. Sponsored reviews are independent from the kycnot.me list, being only part of the blog. The reviews have no impact on the scores of the listings or their continued presence on the list. Should any issues arise, I will not hesitate to remove any listing.
-
@ a367f9eb:0633efea
2025-04-09 07:28:49WIEN – Diese Woche enthüllte Innenminister Gerhard Karner von der ÖVP, dass er einen Gesetzesentwurf "schnell" durchsetzen möchte, der der Regierung die Befugnis geben würde, verschlüsselte Kommunikation in Nachrichten-Apps zu überwachen.
Obwohl Karner betont hat, dass die neuen Befugnisse nur sehr gezielt eingesetzt würden, ist unklar, ob die Entwickler und Anbieter von Nachrichten-Apps gezwungen werden sollen, die Verschlüsselung zu brechen, um die Anordnungen durchzuführen.
Wie der stellvertretende Direktor des Consumer Choice Center, Yaël Ossowski, erklärte, würde diese Befugnis bedeuten, die Verschlüsselung für Millionen von österreichischen Verbrauchern zu untergraben und zu brechen.
„Jeder Versuch, die Verschlüsselung für einige ausgewählte Personen zu brechen, gefährdet gleichzeitig die Privatsphäre von Millionen von Österreichern. Dies ist weniger eine Frage der angemessenen Polizeibefugnisse als vielmehr eine Frage der technischen und sicherheitsrelevanten Aspekte. Schwächere Verschlüsselung macht österreichische Nutzer weniger sicher“ sagte Ossowski.
„Verschlüsselungsstandards von Apps wie Signal, WhatsApp und sogar iMessage aufzuheben, würde der österreichischen Regierung außergewöhnliche Befugnisse einräumen, die das Risiko bergen, jede und alle Kommunikation zu kompromittieren, nicht nur die von Verdächtigen oder Terroristen.
„Um gegen kriminelle Akteure vorzugehen, sollte die Koalition das bestehende Justizsystem nutzen, um Haftbefehle auf Grundlage eines begründeten Verdachts durchzusetzen, anstatt Messaging-Dienste und Apps dazu zu zwingen, diese Aufgabe für sie zu übernehmen“ erklärte Ossowski.
Das Consumer Choice Center weist darauf hin, dass ähnliche Versuche, die Verschlüsselung mit polizeilicher Gewalt zu brechen, bereits im Vereinigten Königreich und in Frankreich unternommen wurden, wo sie von Bürgerrechtsgruppen abgelehnt wurden.
###
Das Consumer Choice Center ist eine unabhängige, parteiunabhängige Verbraucherorganisation, die die Vorteile von Wahlfreiheit, Innovation und Wachstum im Alltagsleben für Verbraucher in über 100 Ländern fördert. Wir interessieren uns insbesondere für regulatorische Trends in Washington, Brüssel, Wien, Berlin, Ottawa, Brasília, London und Genf genau.
Erfahren Sie mehr auf consumerchoicecenter.org
-
@ 872982aa:8fb54cfe
2025-04-09 05:41:40茶业
-
@ 872982aa:8fb54cfe
2025-04-09 05:40:27432143214321412
-
@ 9c9d2765:16f8c2c2
2025-04-09 05:15:09CHAPTER THREE
“What did you just say?” she lost control after hearing the news, she hissed at Robert, gripping the arms of her chair so tightly her knuckles turned white.
Robert held his ground. “James agreed to save the company, Helen. But he’s taking over as President. It’s the only way.”
Helen shot to her feet. “You fool! You think I’ll let that bastard sit in my father-in-law's chair? Robert’s expression remained firm. “If you don’t, Ray Enterprises will cease to exist.”
Christopher, who had been silent, finally spoke. “Helen… maybe we should consider it.” Helen had never been a woman to accept defeat. For years, she had ruled over the Ray family like a queen, ensuring that wealth and power remained in her hands. But with James threatening to take over Ray Enterprises, she knew she had to act fast.
So, she did something she once considered unthinkable.
She offered herself to Mark Lawson.
Mark, the only son of the Prime Minister, had always been infatuated with Rita. He had wanted to marry her not only for love but also for power. Helen knew that his weakness was his desire for her daughter.
So, during a secret meeting at Mark’s private estate, she leaned in close, her voice smooth as silk.
“Help us,” she whispered. “Save Ray Enterprises, and I promise you, Rita will be yours.”
Mark smirked, swirling the wine in his glass. “You expect me to believe Rita will suddenly fall in love with me?”
Helen smiled seductively, running a finger along the rim of her glass. “She doesn’t have to fall in love with you,” she said. “She just has to see James as a failure. And with your wealth, your influence… you can be the man she turns to when she realizes James has nothing left to offer.”
Mark raised an eyebrow. “And if she still refuses?”
Helen leaned closer, placing a hand on his knee. “Then I’ll convince her myself,” she promised.
Mark chuckled, looking at her with newfound interest. “And what about you?” he asked, his voice dripping with amusement.
Helen smirked. “Consider me… a bonus.”
Mark’s eyes darkened with desire. He knew Helen was a cunning woman, but this? This was a new level of manipulation.
And he loved it.
The deal was struck.
That very night, Mark wired eleven million dollars into Ray Enterprises’ account. The company was still in crisis, but for now, it was enough to keep them afloat.
With Helen’s full support, Mark wasted no time showering Rita with gifts.
He sent luxury cars to her doorstep. He booked private jets to take her on weekend getaways. He filled her office with bouquets of rare flowers and custom-made jewelry that no one else in the country owned.
Every time he visited the Ray family mansion, he publicly declared his love for Rita, making it clear that he was ready to give her everything James couldn’t.
Rita, however, remained indifferent.
She didn’t love Mark. She never had.
But her family’s pressure was unbearable.
Her mother, Helen, constantly reminded her, “James has nothing compared to Mark. If you stay with him, we’ll lose everything.”
Her father, Christopher, said, “Think of the family name, Rita. James was never one of us. But Mark? He’s from true power.”
And her brother, Stephen, scoffed, “You’re being stubborn, sis. Stop holding onto a dead marriage. Mark can give you the life you deserve.”
The walls were closing in on Rita.
And Mark knew it.
One evening, Mark arrived at the Ray family mansion once again, bringing yet another gift for Rita: a diamond necklace worth over a million dollars.
But this time, James was waiting for him.
As Mark stepped out of his sleek black car, James approached him, his expression cold and unreadable.
“Lawson,” James greeted, his voice low and firm.
Mark smirked. He responded mockingly. “Shouldn’t you be at work? Oh, wait, my money is currently keeping your wife’s family from bankruptcy.”
James clenched his jaw but kept his voice steady. “Let’s cut the games. Stop buying gifts for my wife.”
Mark chuckled. “Oh, come on, James. It’s just a friendly gesture. Can’t a man be generous?”
James took a step closer, his eyes dark. “Generosity? Or desperation?”
Mark’s smirk faded slightly.
James continued, his tone dangerous. “You think you can buy her love? Drown her in wealth until she forgets about me? You’re pathetic, Mark.”
Mark’s nostrils flared. “Pathetic?” He scoffed. “I have power, connections, and influence. You? You were thrown out like trash, James. The only reason you’re standing here is because your Ray adopted you here,But let’s be honest, you don’t belong in our world.”
James exhaled slowly, shaking his head. “You still don’t get it, do you?” He chuckled darkly. “Rita isn’t some prize you can buy. She doesn’t love you. She never will.”
Mark’s smirk returned. “Maybe,” he admitted. “But tell me, James… How long can a woman resist luxury, security, and power?”
“I’m warning you, Mark,” he said, voice like steel. “If you ever try to buy my wife again… you’ll regret it.”
Mark raised his hands mockingly. “Ooooh, I’m so scared. What are you going to do, James? Fight me?”
James didn’t answer.
Instead, he gave Mark one last look, one filled with silent promise before turning away and walking back inside.
Mark stood there for a moment, watching him go.
Then, he smirked.
Because this wasn’t over.
Not by a long shot.
That night, Rita sat alone in her bedroom, staring at the extravagant gifts Mark had sent.
She hated how her family was trying to force her into a life she didn’t want.
And most of all… she hated the way James was fighting this battle alone.
Her love for James had never wavered. But how much longer could she endure? How much longer could she watch him stand against the entire Ray family and Mark Lawson’s power?
Because deep down, she knew…
This wasn’t just about business anymore.
This was war.
And someone was going to lose everything.
James sat in his study, his mind clouded with frustration. The confrontation with Mark still burned in his chest. He knew the man wasn’t helping the Ray family out of generosity he was buying his way in. And Helen, blinded by desperation, was handing everything over to him, including her own daughter.
Just as he took a sip of water, the door to his study swung open. Helen stormed in, her heels clicking against the floor like gunfire.
-
@ 872982aa:8fb54cfe
2025-04-09 03:47:17 -
@ 52524fbb:ae4025dc
2025-04-09 03:36:09To most of us it's all about the sound of freedom, the innovation, it's technical implication, what if feels like in a decentralised environment. Now let's head into that which brings our fantasies to reality, Nostr which stands for "Notes and other stuffs Transmitted by Relays", is an open protocol designed for decentralised social networkin
Nostr most Amazing Features
-
Decentralisation: compared to traditional social media platforms like like Twitter (X) and Instagram that rely on centralised servers, Nostr operates through a network of relays. These relays serves as servers that store and forward messages. This amazing feature of decentralisation aims to make the network completely resistant to censorship, most people would say how? To answer your question it's because no single individual control's it
-
User Control: ever thought of the purest feeling of freedom, well Nostr just gave you the space to experience. User's have total control over their data and identity.
-
Simplicity: why get stressed when Nostr got you covered? This protocol is designed to be relatively simple, making it easier for developers to build applications on top of it.
Nostr Relation to Bitcoin
Who wouldn't want to be part of a community that embraces it's ethics in a dignified manner. Nostr has gained popularity within the Bitcoin community, and the Bitcoin Lightning Network is used for features like "Zaps" (which represents small payments or tips). There are also similarities in the philosophy of decentralization, that both bitcoin and Nostr share. Just like the saying goes, birds of the same feather flock together. This leads me to one of the best magnificent project, focused on building decentralisation media infrastructure, particularly within the Nostr ecosystem.
Yakihonne the future of the world
YakiHonne is an amazing project focused on building decentralized media infrastructure, particularly within the Nostr ecosystem. It's mind blowing features includes:
-
Decentralized Media: YakiHonne aims to provide tools and platforms that support freedom and automation in content creation, curation, article writing and reporting. It leverages the decentralized nature of the Nostr protocol to achieve this amazing feat.
-
Nostr and Bitcoin Integration: YakiHonne is closely tied to the Nostr network, and it also incorporates Bitcoin functionality. This integration includes features related to the Lightning Network, enabling things like "zaps" (small Bitcoin payments) within the platform.
-
Mobile Application: YakiHonne offers a mobile application with an eye catching user interface simply designed to provide users with a smooth and intuitive Nostr experience. This app includes features like: -Support for various login options. -Content curation tools. -Lightning Network integration. -Long form article support.
Disadvantages of Traditional social media
Lets go back to a world without the flute of freedom echoing in our hearts, where implementations are controlled by certain entities, reasons why traditional social media platforms hold not even a single stance compared to Nostr:
- Privacy Concerns:
Data Collection: Social media platforms collect vast amounts of user data, often without full transparency. This data can be used for targeted advertising, and sometimes, it can be compromised in data breaches. Which won't happen or be possible on yakihonne
-
Social Comparison and Low Self-Esteem: The over hyped and often unrealistic portrayals of life on social media can lead to feelings of inadequacy and low self-esteem. But on yakihonne you get to connect and grow with a community with specified goals bent on implementation
-
Misinformation and Fake News:
Spread of False Information: Social media platforms can be breeding grounds for misinformation and fake news, which can spread rapidly and have significant real-world consequences. Is that possible on yakihonne, well we all know the answer. 4. Centralized Control:
Censorship: Centralized platforms have the power to censor content, raising concerns about freedom of speech. Algorithm Bias: Algorithms can be biased, leading to unfair or discriminatory outcomes. This tells us why a decentralised media platform like yakihonne stands out to be the only media with a future.
Why Chose Nostr why chose yakihonne
When considering Nostr and related projects like YakiHonne, the appeal stems largely from a desire for greater control, privacy, and freedom in online communication. Which from the points aligned above, gives us no second chance of thought, but the thought of being part of the Nostr community, active on a platform like yakihonne.
-
-
@ f7f4e308:b44d67f4
2025-04-09 02:12:18https://sns-video-hw.xhscdn.com/stream/1/110/258/01e7ec7be81a85850103700195f3c4ba45_258.mp4
-
@ 502ab02a:a2860397
2025-04-09 02:08:12ทอดมันปลาฉลาด ของอร่อยและโภชนาการดี ที่หายากเพราะคนไม่ค่อยทำ เวลาพูดถึงทอดมันปลา ภาพที่ลอยมาในหัวของหลายคนคงเป็นเนื้อปลาเด้ง ๆ รสเผ็ดนิด หอมใบมะกรูดหน่อย ทอดให้ขอบกรอบนิด ๆ กินร้อน ๆ กับน้ำจิ้มหวานเปรี้ยว ถ้าไปถามว่าทำจากปลาอะไร ส่วนใหญ่ก็คงตอบว่า "ปลากราย" ซึ่งก็ไม่แปลก เพราะปลากรายถือเป็นวัตถุดิบยอดนิยมสำหรับทอดมันมายาวนาน
แต่วันนี้ เราอยากชวนมาทำความรู้จักกับอีกหนึ่งตัวเลือกที่น่าสนใจ…ปลาที่ชื่อออกจะขี้เล่นหน่อย ๆ ว่า “ปลาฉลาด”
ปลาฉลาดเป็นปลาน้ำจืดที่คนพื้นที่รู้ดีว่าเนื้อแน่น รสหวานธรรมชาติ และมีกลิ่นคาวน้อยจนบางคนเปรียบว่า "ขูดแล้วแทบไม่ต้องปรุงอะไรเยอะก็หอม" แถมยังมีเนื้อที่เหนียวในแบบธรรมชาติ โดยไม่ต้องใส่แป้งเพิ่มให้เสีย texture เลยแม้แต่น้อย
ความน่าสนใจของทอดมันปลาฉลาดคือมันให้สัมผัสที่ดีมาก Real food แท้ๆเพราะเนื้อปลาฉลาดเหนียวด้วยตัวเอง ไม่ต้องพึ่งแป้งหรือสารช่วยคงตัวใดๆ และยังมีกลิ่นหอมแบบปลาแม่น้ำที่ไม่ฉุน ไม่คาวดิน ไม่รบกวนสมาธิการกิน
เวลาขูดเนื้อปลาฉลาด จะรู้สึกได้เลยว่าเนื้อมัน "มีชีวิตชีวา" คือไม่ใช่เนื้อนิ่มเปื่อย ยุ่ย หรือแห้งจนฝืดมือ แต่จะมีความแน่น นุ่ม และติดยางนิด ๆ พอเอาไปคลุกกับพริกแกงกระชายสดสักนิด ใบมะกรูดฝอยบาง ๆ สิ่งที่เราทำแตกต่างเล็กน้อยคือ ใช้ถั่วพลูแทนถั่วฝักยาว ตีไปเรื่อย ๆ จนเหนียวได้ที่ แล้วทอดบนไฟกลาง ๆ...เสียงฉ่าแรกที่ลงกระทะ จะมาพร้อมกลิ่นหอมที่เรียกคนทั้งบ้านให้เดินมาด้อม ๆ มอง ๆ ได้แบบไม่ต้องใช้คำโฆษณา
ในแง่โภชนาการ ปลาฉลาดให้โปรตีนสูง ไขมันต่ำ และที่สำคัญคือ ย่อยง่าย ไม่หนักท้อง เหมาะสำหรับคนที่อยากกินของทอดแต่ไม่อยากให้ร่างกายต้องทำงานหนักเกินไป แถมยังนำมาประยุกต์เป็นทอดมันสายโลว์คาร์บได้สบาย ๆ เพราะเนื้อปลายึดเกาะตัวได้เองโดยธรรมชาติความดีงามของเนื้อปลา โดยไม่ต้องเติมแป้งหรือแปรรูปอะไรเพิ่มเติมอีก
แม้ปลาฉลาดอาจไม่ได้หาซื้อสะดวกเท่าปลาที่เลี้ยงในระบบฟาร์มทั่วไป แต่นั่นแหละคือเสน่ห์ของมัน…มันคือวัตถุดิบที่พาเรา “กลับไปหาของจริง” ที่ธรรมชาติให้มา ไม่ต้องปรุงแต่งมากก็อร่อย
ไม่ต้องบอกว่าปลากรายดีหรือไม่ดี เพราะมันก็ดีในแบบของมัน แต่ถ้าวันใดคุณอยากลองเปิดใจให้กับของหายากอีกหนึ่งชนิด…ลองทอดมันปลาฉลาดดูสักครั้ง แล้วคุณจะเข้าใจว่า บางครั้ง ของที่ไม่ค่อยมีคนพูดถึง อาจเป็นของที่ “พูดแทนตัวเอง” ได้ดีที่สุด #siripun #ตำรับเอ๋
-
@ c230edd3:8ad4a712
2025-04-09 00:33:31Chef's notes
I found this recipe a couple years ago and have been addicted to it since. Its incredibly easy, and cheap to prep. Freeze the sausage in flat, single serving portions. That way it can be cooked from frozen for a fast, flavorful, and healthy lunch or dinner. I took inspiration from the video that contained this recipe, and almost always pan fry the frozen sausage with some baby broccoli. The steam cooks the broccoli and the fats from the sausage help it to sear, while infusing the vibrant flavors. Serve with some rice, if desired. I often use serrano peppers, due to limited produce availability. They work well for a little heat and nice flavor that is not overpowering.
Details
- ⏲️ Prep time: 25 min
- 🍳 Cook time: 15 min (only needed if cooking at time of prep)
- 🍽️ Servings: 10
Ingredients
- 4 lbs ground pork
- 12-15 cloves garlic, minced
- 6 Thai or Serrano peppers, rough chopped
- 1/4 c. lime juice
- 4 Tbsp fish sauce
- 1 Tbsp brown sugar
- 1/2 c. chopped cilantro
Directions
- Mix all ingredients in a large bowl.
- Portion and freeze, as desired.
- Sautè frozen portions in hot frying pan, with broccoli or other fresh veggies.
- Serve with rice or alone.
-
@ b099870e:f3ba8f5d
2025-04-08 23:22:24A donkey that is tied to a post by a rope will keep walking around the post is an attempt to free it self,only to become more immobilize and attached to the post.
ikigai
-
@ 7dbd046d:64f7e513
2025-04-08 21:42:0011111111
This template is just for demo needs.
petrinet ;startDay () -> working ;stopDay working -> () ;startPause working -> paused ;endPause paused -> working ;goSmoke working -> smoking ;endSmoke smoking -> working ;startEating working -> eating ;stopEating eating -> working ;startCall working -> onCall ;endCall onCall -> working ;startMeeting working -> inMeetinga ;endMeeting inMeeting -> working ;logTask working -> working
-
@ 878dff7c:037d18bc
2025-04-08 21:27:19Australian Median Home Value Increases by $230,000 Over Five Years
Summary:
Recent data from CoreLogic reveals that Australia's median home value has risen by approximately $230,000 over the past five years, marking a 39.1% increase. This significant dollar increase surpasses previous five-year periods, highlighting escalating affordability challenges. Factors contributing to this surge include a persistent imbalance between housing supply and demand, low stock levels, and lower long-term interest rates. Major cities like Sydney and Adelaide, as well as parts of regional New South Wales, exhibit some of the highest housing value-to-income ratios.
Sources: The Guardian - April 9, 2025
Reserve Bank of Australia Adjusts Money Market Operations
Summary:
The Reserve Bank of Australia announced an increase in the rate at which it lends to financial institutions in regular money market operations. This technical change is aimed at adjusting the pricing of its open market operations and is stated to have no implications for broader monetary policy. Sources: Reuters - April 9, 2025
BPCL and Sembcorp Form Joint Venture for Green Hydrogen Projects
Summary:
Bharat Petroleum Corporation Ltd (BPCL) and Sembcorp have entered into a joint venture to explore renewable energy and green hydrogen production projects across India. This collaboration aims to decarbonize hard-to-abate sectors and support India's ambitious climate goals by leveraging both companies' expertise in renewable energy solutions.
Sources: PV Magazine India - April 9, 2025
Moderate Earthquake Reported Near Yonakuni, Japan
Summary:
A magnitude 5.6 earthquake occurred after midnight on Wednesday, April 9, 2025, near Yonakuni, Yaeyama-gun, Okinawa, Japan. The earthquake struck at a depth of approximately 33 kilometers. There have been no immediate reports of damage or casualties.
Sources: Volcano Discovery - April 9, 2025
Peter Dutton Unveils Gas Reservation Policy to Reduce Energy Prices
Summary:
Opposition Leader Peter Dutton has introduced a gas reservation policy aimed at lowering energy prices in Australia. The plan requires gas companies to prioritize domestic supply over exports, projecting a 15% reduction in gas prices for industrial consumers and a 7% decrease in residential gas bills. The policy also includes a 25% cut in fuel excise for one year and expedited approvals for new gas projects. While modeling suggests potential benefits, analysts caution that consumer advantages may be delayed due to existing contracts and retail bill components.
Sources: News.com.au - April 9, 2025, The Australian - April 9, 2025
Greens Propose Abolition of Negative Gearing and Capital Gains Tax Discounts
Summary:
Greens leader Adam Bandt has proposed significant reforms to Australia's housing policies, including the abolition of capital gains tax discounts and negative gearing tax breaks for investment properties. The plan also includes a nationwide rent freeze. Bandt argues these measures are necessary to address housing affordability and support renters and first-home buyers. The Greens suggest limiting tax concessions to a single pre-existing investment property and banning them for future purchases or inheritances. Additionally, they propose a two-year rent freeze with subsequent increases capped at 2% every two years. Analysis indicates these reforms could raise home ownership rates and save renters billions. Bandt criticized Labor's $33 billion housing plan as insufficient and is also advocating for dental care to be included in Medicare, funded by higher corporate taxes.
Sources: The Australian - April 9, 2025, News.com.au - April 9, 2025
Australian Stock Market Rebounds Despite Tariff Threats
Summary:
The Australian stock market experienced a strong rebound, with the S&P/ASX 200 rising over 2.3% to close at 7,510 points. This recovery follows a sharp decline prompted by escalating global trade tensions. The rally suggests investor optimism despite the looming tariff conflict between the U.S. and China. The Australian dollar also saw a slight rebound, benefiting exporters.
Sources: The Guardian - April 8, 2025
Divers Left Stranded Off Perth Coast During Charter Expedition
Summary:
Two brothers were left stranded in the ocean during a diving expedition off the Perth coast after their charter boat allegedly departed without them. The incident occurred four kilometers offshore, and the pair was rescued by a passing Rottnest ferry after being spotted in distress. The divers have criticized the Perth Diving Academy for failing in their duty of care and have engaged legal representation.
Source: ABC News - April 9, 2025
Australian Beef Industry Resilient Amid Global Tariff Changes
Summary:
Despite recent U.S. tariffs, Australia's beef industry remains robust, with exports to the United States averaging $275 million a month in the six months to February. Industry insiders express confidence that the 10% tariff will not significantly impact exports, highlighting the sector's resilience and strong international demand.
Sources: Hindustan Times - April 9, 2025
US Imposes 104% Tariffs on Chinese Imports, Sparking Global Economic Concerns
Summary:
US President Donald Trump has announced a 104% tariff on Chinese imports, escalating trade tensions and raising fears of a global economic slowdown. China has threatened retaliation, prompting concerns about a full-scale trade war that could impact international markets, including Australia.
Sources: The Guardian - April 9, 2025
Massive Decline in Bogong Moth Population Raises Ecological Concerns
Summary:
The bogong moth, once abundant in Australia, has experienced a drastic population decline of up to 99.5% by 2019. Despite its ecological and cultural significance, the Australian government recently declined to list it as threatened, citing limited data. The moth plays a crucial role in alpine ecosystems and Indigenous cultures, serving as a key food source for species like the mountain pygmy possum. Experts are calling for nationwide research and conservation efforts to protect this iconic species.
Sources: The Guardian - April 9, 2025
Treasury Secretary Scott Bessent Discusses Trump's Tariff Plan and Its Impact on the Middle Class
Summary:
In this episode of The Tucker Carlson Show, Treasury Secretary Scott Bessent provides an in-depth analysis of President Trump's proposed tariff plan, focusing on its potential effects on the American middle class. Bessent outlines the administration's objectives behind implementing the tariffs and addresses concerns about possible economic repercussions. He emphasizes that the tariffs are designed to protect domestic industries and create jobs, asserting that any short-term price increases will be offset by long-term economic growth. The discussion also covers strategies to mitigate adverse impacts on consumers and the importance of fair trade practices in strengthening the U.S. economy.
Key Insights: - Protection of Domestic Industries: Bessent explains that the tariffs aim to shield American manufacturers from unfair foreign competition, thereby preserving and creating jobs within the country. - Short-Term vs. Long-Term Effects: While acknowledging potential immediate price hikes on certain goods, Bessent argues that the long-term benefits, including a more robust economy and job market, will outweigh these initial challenges. - Fair Trade Practices: The conversation highlights the administration's commitment to establishing equitable trade agreements that prevent exploitation of U.S. markets and ensure reciprocal benefits.
Sources: Treasury Secretary Scott Bessent Discusses Trump's Tariff Plan and Its Impact on the Middle Class
-
@ 4d41a7cb:7d3633cc
2025-04-08 20:45:34The most interesting relation that a lawyer holds to the community, outside of his technical occupation, is that of a legislator. Lawyers were the chief authors of the Constitution of the United States and of all the state constitutions.
It seems natural that lawyers should predominate in the government. They framed the former instrument. They both make and interpret the law.
Every time the text is in italics, it is a direct quote from the book.
Lawyers control every branch of the republican form of government: legislative, executive, and judicial. The influence of the lawyers is enormous, for good or for evil.
The lawyer has the supreme power of direction in the general exercise, commencement, and conduct of litigated or other legal matters. It lies with him to suggest and to direct. There is no arbiter over him but his conscience.
The duty of a lawyer is threefold: to the state, as an officer and citizen; to the court, as an officer and adviser; and to his client, as a fiduciary.
The crude sentiments of the people must be filtered through the lawyers, first as politicians, then as legislators, and afterwards as lawyers and judges.
Since lawyers are in charge of every government branch as ‘elected officials’ in representation of the people, education about morality and their duties and responsibilities is fundamental since in their hands lies the monopoly of violence held by the government.
Without contingent arrangements with lawyers, their power would become oppressive and tyrannical.
THE PROBLEM
“Permit me to issue and control the currency of a nation, and I care not who makes its laws.” Mayer Amschel Rothschild (1744-1812)
- Money was placed above rightness, truth, and justice. The incentive structure is inverted, and it's detrimental. Society is morally bankrupt above and below. Institutions are no better than the individuals who compose them.
- Common law was replaced by commercial code (encryption). Adding complexity, inefficiencies, costs, and capacity to trick and twist the law. The incentive structure is broken. Cheating pays more than playing clean; we have more lawyers but less justice.
- The lawyer is not educated about the spirit of the profession, his duty, and the form of government he’s supposed to protect. The interest of the client is put above the interest of the court and the nation. Jurisprudence is taught instead of elementary law.
INSTITUTIONS CANNOT BE BETTER THAN THE MEMBERS OF WHICH THEY ARE COMPOSED. THE GOVERNMENT IS NO DIFFERENT.
The combined acts of a body of lawyers, oft repeated, like an army of worms, silently and secretly gnawing at the foundation of a great and magnificent structure, will gradually but surely cause it to give way and tumble into ruins. It is perhaps not going too far to assert that the lawyers, as a class, are largely answerable for the minimum of respect and obedience that the public has for the law.
1. Money was placed above rightness, truth, and justice.
Commercialism and materialism have placed money above everything else, including the human. This has completely demoralized society in every aspect, from government and justice to education, architecture, medicine, nutrition, and so on.
This has a common denominator: the quality of the currency. As the quality of the currency evaporates, so does the values of the people. But money and currency are inanimate and dead objects; the real actors are the humans trading and using that money.
The ‘fiat money’ we use these days is a result of codified law, a legal fiction for money, a commercial contract paper to exchange goods and services, and a creature of the codified public and private law.
This fiat currency has enabled its possessors to buy, or secure, political and social positions, which should be attained only by real merit, refinement, and learning.
Today judicial systems do not provide justice, newspapers and mainstream media do not provide the truth, today banks do not protect your money, today medical treatment does not cure you, etc. Profit is placed above everything else.
It was evident that materialism completely controlled the economic structure, the ultimate goal of which was for the individual to become part of a system that provided him with economic security at the expense of his soul, mind, and body.
Manly P. Hall, 1988
Society was morally bankrupted by materialistic ideologies and human institutions that are no better than the individuals who compose them.
No judicial action can be put in motion without the sanction of some lawyer.
The lawyer appears everywhere and in all stages of business transactions but also in family and other private and delicate matters as the trusted advisor and friend of his client.
There is a moral corruption, equally as bad in its results upon the judges, the bar, and the community.
2. The incentive structure is inverted, and it's detrimental.
Moral relativism justifies every wrongdoing since ‘there’s no objective difference between right and wrong.’ How can you have justice if you can justify every wrongdoing and there’s no moral compass?
But if being a member of a club or friends with the judge gives you an edge, how can you have excellence, meritocracy, and justice? The incentive is to short-cup your way, to cheat, to manipulate the game and law to your advantage to get economic stability.
If you want to have justice and great institutions, you need to educate their members in a high level of morality, ethics, and purpose…
The commercial code replaced common law. The difference between a common-law lawyer and the practitioner under the Code is the difference between a surgeon and a butcher.
Codification has produced more material to aid dishonest clients than the common law supplied. The lawyers as a body are morally worse than their professional ancestors. The lawyers of the past believed the constitution was adaptable; those of the present regard it as elastic.
Laws have accumulated really fast, creating inextricable confusion and doubt. Making justice was turned into a thing of doubt and change.
Instead of seeking the truth, the courts and the bar are engaged in the pursuit of technicality and form.
A precedent can be found on any side of any subject that anyone chooses to espouse.
The ratio of lawyers has multiplied four times since the law was codified and its complexity increased. The code was adopted in New York in 1848. Argentina's Commercial Code was first adopted by the Province of Buenos Aires in 1859 and later as the national code in 1862. In 1850 there was 1 lawyer per 1000 citizens in the United States. Now there is 1 in 256.
The excessive number of lawyers is detrimental, both to the community and the morale of the profession.
It creates, encourages, and continues illegal, unfounded, and fraudulent practices, demands, and litigations, because necessarily many of the lawyers depend not upon professional knowledge and accomplishments but upon sharpness and cunning. In the effort to sustain themselves, much unnecessary and unfounded litigation is inaugurated, and many disgraceful practices are engendered.
Let anyone consider the effect of the forty or fifty thousand legal agents spending their lives distorting and prostituting the forms of justice, misapplying and perverting its principles, and undermining the constitution and laws, and they can make a fairly accurate calculation as to the longevity of the system of government under which they exist and thrive.
Cunning and trickery have replaced real knowledge and ethics.
The modern code lawyer knows little of elementary law, but he carries, as a soldier would a knapsack, a memory filled with sections of codes and adjudicated cases.
Sheltered in the grip of his office, the lawyer can always, insidiously and secretly, deflect the course of justice and defraud the law. It is difficult to detect him; he is representing another’s interest and is not responsible for his client’s morals or frauds.
To say nothing of the extra cost and expenses, the manifold delays and intricacies of legal procedure, the attempt to simplify has been to muddle, confound, and destroy—to produce a race of pygmy lawyers, chattering and quarreling over the meaning of words in the Code.
The ones who benefit from codification are the same ones who benefit from fiat currencies and central banks. They have used the same strategy in both cases: create a problem, manipulate public opinion and make them demand the ‘solution’ they have already prepared—codification of law, central banks, etc. Time has shown that the public was manipulated and that the solutions that was sold to them only increased the size of the problem they were ‘trying’ to fix.
Picture the lawyers training themselves in a school of dishonesty, trickery, and chicanery, diverting and stopping the machinery of the law, prostituting the forms of justice for gain, selling their knowledge, ability, experience, and such talent as they may possess to the client who pays most for the service, and resorting to every device of cunning and deceit to gain their end! Do such lawyers exist? Do such practices prevail? Unfortunately, yes. In the first rank of the profession can be found many lawyers whose services are sought only to enable guilty men to escape punishment; only to open a door for others to avoid the consequences of the civil law and of their contracts; only to defeat and evade the legislative will and public policy; only to show their clients how to cheat, defraud, vilify, and defame without penalty or damage.
His profession consists of thwarting the law instead of enforcing it. The modern idea of a great lawyer is one who can most successfully manipulate the law and the facts. The public no longer calls them “great” but “successful” lawyers. Not a great jurist or profound student, but a successful practitioner.
The more desperate the case he wins, the greater his reputation.
It is the common belief, inside and outside of the profession, that the most brilliant and learned of the lawyers are employed to defeat or strangle justice.
In this view, every lawyer might be regarded as an intellectual prostitute whose mind, time, experience, knowledge, and influence can be hired and occupied by any stranger who desires to comply with his terms as to fees.
There is nothing secret or underhand about this part of the lawyer’s business. It has the approval of the people everywhere.
In fact, the community looks with perfect complacency and composure upon a transaction in which the leading lawyer sells his talent, his knowledge, his time, and his influence to the most corrupt or infamous individual in the land.
The lawyer is deliberately made an instrument to thwart the law and justice—and he knows it.
He uses the machinery of the law to accomplish results contrary to justice, truth, and right.
When the laws can be easily thwarted, the moral sense of the whole community is deadened. The incentive for justice was inverted and destroyed.
3. The lawyer is not educated about the spirit of the profession.
The lawyer’s power arises from the necessity of political organization; he is the official and authorized agent that puts in motion the machinery of the law.
In the commencement of suits, the lawyer has need, therefore, of honesty, learning, prudence, and patriotism. It rests with him to preserve the purity of the legal system; to separate the chaff of fraud, exaggeration, and doubt from the wheat of fact and truth.
The government exists for the people, not the people for the government.
American governments were organized by the people to provide the people a peaceful way of resolving conflicts and trading peacefully, providing justice and the protection of private property and equality under the law. The public is taxed for the general expenses of the courts, among other things.
Here’s the secret, -the cornerstone- of all legislation.
The goal is to have an easy and understandable set of rules that everyone can understand: to make as few laws as possible; for, in all normal and sound conditions of society, that country is best governed which is least governed. But codification has done the opposite: add complexity and create thousands of codified laws.
Here’s the secret, -the cornerstone- of all legislation.
The legislator should, therefore, be a man who understands the origin and nature of society- familiar with past and existing laws and history- with such practical and discriminating judgment as enables him to comprehend the wants and necessities of his fellow men.
Still, none of the formal oaths defines the duties of the lawyer.
Everything is now left to the moral perception of the lawyer.
THE LOYALTY TO ITS CLIENT (THE HAND THAT FEEDS HIS MOUTH) IS PLACED ABOVE THE ALLIANCE TO THE STATE (THE HAND THAT FEEDS THE JUDICIAL SYSTEM).
It is not the exception, but the rule, for the lawyer to surrender his whole mental, intellectual, and physical power to his client’s cause.
REMEDY
To produce lawyers who can perform their duties, they should be taught to cultivate a moral sense; the nature and object of law; the nature and duties of citizenship; the nature and duties of a legislator; but above and beyond everything else, they should be taught the real mission of the lawyer - which includes professional ethics. These fundamental requisites to the making of a full lawyer are almost entirely overlooked in all of the courses of education followed in law offices, law schools, and academies or colleges. Lawyers are made up to be mere instruments for their clients, without any attention being paid to their duties to the State. The fact is extraordinary, nay, incredible. But it is true. The curriculum of legal study is based upon codification. O means the sentiment of codification., pervades and influences all legal education.
If the moral sense of the community, which is another name for public opinion, should be maintained to the highest possible degree, an educated Bar, and a free, pure and intelligent Press, are the factors which can do much to accomplish all these results.
But this conscience, which should guide the lawyer, comes from training and education.
Trained in the knowledge of human nature, when he enters the field of jurisprudence and politics, his acts and opinions should be of the greatest value to the people. I would build up a race of pure lawyers, as far removed from commercialism as possible.
The country needs such a class more than ever.
-
@ 6be5cc06:5259daf0
2025-04-08 19:45:10O que são os juros?
Os juros são um reflexo da preferência temporal dos indivíduos: o valor que damos ao consumo no presente em comparação ao consumo no futuro. Em termos práticos, se alguém te pede dinheiro emprestado hoje e promete devolver só daqui a um ano, faz sentido você querer algo em troca por ter que esperar e postergar o consumo — esse “algo a mais” é o juro.
Nas palavras da Escola Austríaca, os juros não são um fenômeno artificial ou técnico, mas sim um fato da realidade humana: tempo tem valor. E como o tempo passa para todos, a preferência temporal é um traço universal. Logo, juros sempre existirão — e isso independe de moeda, bancos ou qualquer arranjo institucional.
Juros e poupança
Num mercado genuinamente livre, os juros emergem da relação entre dois grupos:
-
Poupadores, que abrem mão do consumo presente para acumular bens que serão utilizados no futuro.
-
Investidores, que tomam emprestados esses recursos para realizar projetos que renderão frutos adiante.
Quando há muita poupança, a taxa de juros tende a cair, pois há mais capital disponível para investimentos. Quando há pouca poupança, os juros sobem, pois o capital é escasso. Simples assim. É uma dinâmica voluntária, descentralizada e natural — e, portanto, intolerável para os engenheiros sociais e planejadores centrais.
Como sabotar tudo
O problema começa quando uma entidade com poder coercitivo — como um banco central, como o Federal Reserve (FED) — resolve interferir nesse processo natural. Em vez de permitir que os juros sejam determinados pelas preferências temporais das pessoas, o FED manipula a taxa básica de juros da economia, criando a ilusão de que há mais poupança do que realmente existe.
Como ele faz isso?
Simples: imprimindo dinheiro do nada e injetando esse capital nos mercados financeiros por meio da compra de títulos, operações com bancos e linhas de crédito. Essa expansão monetária distorce os sinais econômicos: os juros caem artificialmente, mesmo sem um aumento real na poupança. O crédito se torna barato — mas ilusoriamente.
O efeito prático dessa mentira monetária
Empresas e investidores, enganados por esses juros baixos, começam a empreender projetos de longo prazo como se houvesse capital real disponível para sustentá-los. Shoppings, fábricas, startups, construções, tudo parece viável. A sensação é de prosperidade: mais empregos, salários, consumo e lucros.
Mas há um detalhe crucial: a preferência temporal da população não mudou. As pessoas continuam consumindo no presente — e não há bens de capital suficientes para suprir os dois desejos ao mesmo tempo: o consumo presente e os investimentos de longo prazo.
Com o tempo, a realidade bate à porta: os preços dos bens de capital sobem, os custos dos projetos disparam, os empréstimos se tornam mais caros e muitos empreendimentos tornam-se inviáveis. Então vem a quebradeira: demissões, falências e recessão. Todo o “crescimento” anterior se revela uma miragem inflacionária.
Ciclos econômicos: uma criação do Estado
Esse processo de boom artificial seguido de colapso inevitável é o que Mises e Hayek explicaram como o Ciclo Econômico Austríaco. Não é um “erro do mercado”. É o resultado direto da distorção dos sinais econômicos provocada pela manipulação dos juros. E o culpado tem nome: o banco central — neste caso, o FED.
O FED não é um árbitro neutro. Ele é um planejador central disfarçado de autoridade monetária. Seu objetivo real é manter o sistema financeiro vivo à base de impressora. Ele socializa prejuízos, distorce o cálculo econômico e destrói o processo de alocação racional de capital. Tudo isso enquanto afirma estar “estabilizando a economia”.
A consequência disso? Inflação, endividamento, má alocação de recursos e, acima de tudo, roubo institucionalizado da poupança das pessoas comuns. O juro baixo artificial é um imposto oculto. É uma forma disfarçada de pilhagem, uma transferência silenciosa de riqueza dos poupadores — que trabalharam e se abstiveram do consumo — para os primeiros recebedores do novo dinheiro, como bancos e governos. Essa manipulação é um confisco disfarçado, que destrói capital real e sabota o esforço honesto de quem poupa.
O caminho da correção
Para que os juros cumpram sua função genuína — sinalizar a escassez ou abundância de capital — é preciso eliminar a interferência coercitiva dos bancos centrais. Em um mercado verdadeiramente livre, sem manipulação monetária, os juros seriam determinados pela poupança real, e não por burocratas em Washington.
Isso exige o fim do monopólio estatal sobre a moeda. Exige a destruição da base legal que sustenta o cartel bancário. E exige uma transição para formas de dinheiro que não podem ser inflacionadas por decreto, como o ouro ou — melhor ainda — o Bitcoin.
Para finalizar
Os juros não são uma variável a ser “ajustada” por tecnocratas com PhDs. Eles são a expressão natural das escolhas humanas diante do tempo. Qualquer tentativa de manipular essa realidade só pode gerar desequilíbrios, crises e sofrimento econômico.
Enquanto o FED existir, ciclos econômicos serão inevitáveis. Não por causa do mercado — mas porque um punhado de burocratas acredita que sabe mais do que milhões de pessoas agindo voluntariamente.
Liberdade monetária é a única solução. E a destruição do banco central é apenas o começo.
-
-
@ 4cebd4f5:0ac3ed15
2025-04-08 16:29:50Tóm tắt Hackathon Hackathon ETH Oxford 2025
Hackathon ETH Oxford 2025, diễn ra từ ngày 7 đến 9/2 tại Viện Toán học Oxford (Anh), đã thu hút sự quan tâm và tham gia lớn từ cộng đồng phát triển toàn cầu. Tổng cộng 318 nhà phát triển đăng ký, tạo ra 142 dự án được phê duyệt. Mỗi dự án được nộp vào hạng mục chính và tối đa 5 thử thách phụ (bounty), với 20 bounty khác nhau để lựa chọn.Sự kiện kết thúc vào ngày 9/2 với phiên thuyết trình, nơi các đội trình bày dự án trước ban giám khảo để tranh giải. Môi trường này thúc đẩy đổi mới và giải quyết thách thức kỹ thuật trong lĩnh vực blockchain, đồng thời tăng cường tương tác cộng đồng và chia sẻ tri thức. Thông báo về các hạng mục và bounty mới dự kiến sẽ tiếp tục mở ra cơ hội tham gia sau sự kiện.
Các Dự Án Chiến Thắng
Giải Hạng Mục Chính
Programmable Cryptography
- CallOrNothing: Trò chơi poker phi tập trung đảm bảo tính minh bạch không cần bên thứ ba.AI
- DEFAI: Giao diện chat AI đơn giản hóa thao tác DeFi trên Avalanche bằng xử lý ngôn ngữ tự nhiên (NLP).
- portent: Nền tảng AI phân tích tác động sự kiện thực tế lên thị trường crypto, kết hợp dữ liệu xác minh từ Flare.
- AADC: Bot Telegram AI hỗ trợ DeFi đa chuỗi qua lệnh ngôn ngữ tự nhiên.DeFi
- Quantum Enhanced Cross-chain Arbitrage: Bot kết hợp tối ưu lượng tử với giao thức DeFi để giao dịch chênh lệch đa hệ sinh thái.Consumer
- FlareGate: Nền tảng P2P phi tập trung cho giao dịch fiat-crypto tích hợp dữ liệu từ Flare.
- GuessTheHuman: Game xã hội AI dựa trên blockchain để nhận diện người chơi thật.
- The Golden Key: Ứng dụng di động chống lừa đảo cho người dùng cao tuổi.Giải Flare
Enshrined Data Protocols
- FlareGate: Nền tảng P2P phi tập trung cho giao dịch fiat-crypto. - Kingdom of LagaFlare: Game NFT thẻ bài với cơ chế công bằng qua blockchain.
- ProteinMango: Bảo hiểm động đất tự động hóa bồi thường bằng ZKPs.External Data Source/Cross-Chain
- portent - bump.artist: Nền tảng DeFi dành cho token nghệ sĩ và chia sẻ doanh thu. - ProteinMango - FlareInsure: Bảo hiểm vi mô blockchain sử dụng dữ liệu thực tế cho hợp đồng thông minh. - Decentralised Zero: Một nền tảng sử dụng FDC của Flare để thực hiện các hoạt động cá cược minh bạch, không cần tin cậy.Giải Torus
Decentralized Memory Organ
- ZK memory Organ: Giải pháp lưu trữ dữ liệu sử dụng zero-knowledge proofs để đảm bảo bảo mật và hiệu suất.
- Torus Decentralised Memory: Cơ sở dữ liệu phân tán đảm bảo lưu trữ an toàn và chịu lỗi (fault-tolerant).
- Porous Torus: Lưu trữ dữ liệu thông lượng cao cho các tác nhân AI Torus.
- TorBit: Hệ thống bộ nhớ zero-trust cho tác nhân AI Torus thông qua OrbitDB.Discord Community Insights Generator
- Hivemind: Công cụ phân tích chat Discord bằng LLM để tạo phản hồi và hỗ trợ cộng tác.
- stbb: Bot Discord phân tích tin nhắn để báo cáo chủ đề/xu hướng.
- discord community bot: Phân tích AI cho báo cáo hàng tuần trên Discord.Crypto Twitter Debate Analyzer
- DebateFi: Phân tích và tóm tắt tranh luận về crypto trên Twitter để đưa ra insight hành động.
- Oxford Kaggle Debaters: Công cụ AI phân tích Twitter crypto, đánh giá influencer và tối ưu hóa nội dung.
- DebateChain: AI phân tích tranh luận crypto qua điểm danh tiếng và tâm lý.Wildcard Challenge
- NewsCrypt: Diễn đàn phi tập trung nâng cao phân tích tranh luận để thúc đẩy báo chí khách quan.
Giải Ứng Dụng Trên Mina
- MinAES: Tích hợp mã hóa AES vào blockchain zk-native của Mina bằng công nghệ zero-knowledge.
- MINA Verify: Nền tảng triển khai chữ ký BLS12-381 để xác minh trong mạch điện.
- Guantanabet: Thị trường dự đoán ẩn danh trên Mina với cá cược dựa trên ZKP.
Giải Avalanche
Hạng Nhất ($2000)
- Swiish.cash: Giải pháp chuyển tiền stablecoin toàn cầu qua số điện thoại trên Avalanche.
- Smart Memorandum: Công cụ tạo tài liệu pháp lý đặc thù theo khu vực cho hợp đồng thông minh.
- blindbird.ai: Nền tảng AI phi tập trung cho suy luận an toàn và thanh toán vi mô.
- AADC- AI Agent for DeFi & Cross-Chain Operations: AI Agent hỗ trợ DeFi & hoạt động đa chuỗi.Hạng Nhì ($1500)
- AI-Powered DeFi Position Management Platform: Giao diện ngôn ngữ tự nhiên quản lý vị thế trên DEX GMX.
- NovaTools: Bộ công cụ Crypto-AI gồm bot NLP đa chuỗi và phân tích dữ liệu.Hạng Ba ($800)
- Oxwell AI agent: Trợ lý DeFi đa chuỗi qua quản lý tài sản bằng ngôn ngữ tự nhiên.
- Wired: Trợ lý AI quản lý tài sản BNB/AVAX đa chuỗi qua NLP.
- DEFAI: Agent AI xử lý thao tác on-chain bằng lệnh tự nhiên.
- NLWallet: Ví crypto thể chế tích hợp NLP và account abstraction.
- helpi: Nền tảng Avalanche hỗ trợ quyên góp dự án xã hội với đánh giá rủi ro bằng AI.
Giải AirDAO
DeSci World: Giải thưởng NERDo Awards.
- DebateChain - CrypTweep by RugPullCoin#42 - Project Lydia: Bot Discord phát hiện hành vi không phù hợp qua phân tích AI.
- bump.artist - Flare-FL:Học liên kết phi tập trung (federated learning) cho đào tạo mô hình AI an toàn.
Giải Ripple
Top Consumer Applications using RLUSD
- CoverMax: Giao thức bảo hiểm phi tập trung tự động hóa thanh toán dựa trên điều kiện oracle.
- BlockInvest: Hệ thống Tontine hiện đại trên XRPL cho tiết kiệm tập thể qua hợp đồng thông minh.
- PayCoin IC: Ví RLUSD di động thanh toán qua QR code trên XRPL.Best Decentralized Identity Solution
- XRPL Diploma Verify: Nền tảng web lưu trữ và xác minh bằng cấp an toàn trên XRPL blockchain sử dụng DID.Most Novel XRPL Integration
- BlockInvest
Giải BNB
Main Prize
- NovaTools - insr.finance: Giao thức bảo hiểm bảo vệ stablecoin và tạo lợi nhuận qua Venus Protocol.Honorable Mentions
- BNB Shield: Hệ thống AML phi tập trung sử dụng TEEs và ZKPs để phát hiện PEP.
- CloutDrop: Nền tảng tối ưu hóa airdrop KOL dựa trên dữ liệu.
- AADC- AI Agent for DeFi & Cross-Chain Operations - ReviewChain: Hệ thống phản biện ngang hàng phi tập trung nâng cao minh bạch và chất lượng trong xuất bản học thuật.
- Wired: Manage your assets with ease
Giải Vyper
Best Use of Vyper Lang
- SecureStake: Nền tảng quản lý token tích hợp staking bằng Vyper và xác thực đa chữ ký cho giao dịch an toàn.
- Quantum Enhanced Cross-chain Arbitrage - The Golden Key by Avalock
Thông Tin Về Đơn Vị Tổ Chức
ETH Oxford
ETH Oxford là tổ chức và cộng đồng uy tín tại Anh, thúc đẩy phát triển công nghệ blockchain. Với chuyên môn kỹ thuật, ETH Oxford đóng góp lớn cho hệ thống phi tập trung và giao thức giao dịch an toàn, đồng thời tập trung vào nghiên cứu ứng dụng blockchain giải quyết thách thức thực tế.Khám phá toàn bộ dự án tại DoraHacks.
-
@ fbf0e434:e1be6a39
2025-04-08 15:08:21Hackathon 概览
ETHiopia x BAM Hackathon 于 2 月 10 日至 14 日在线上进行,吸引了 108 名注册开发者和创新者深入探索以太坊技术。活动包括 Solidity 开发的技术研讨会和鼓励创造性技能培养的环节,最终审核通过了 38 个的项目。这些项目展示了参赛者的技术创造力以及他们对区块链技术的投入。
Hackathon 促进了以太坊生态系统内解决方案的创建,重点关注社区贡献和在现实场景中创新应用。参赛者在获得技能和探索了区块链创新的同时,也建立了开发者网络。活动提供了 2,000 美元 USDC 现金奖金,用于激励在代码质量、社区参与和展示技能方面表现出色的项目。
包括 ETHiopia, BAM 和 THE MU 在内的实体促进了非洲 Web3 BUIDLer的环境,推动了有影响力的解决方案。此次合作强调了区块链在应对现实世界挑战中的角色,并赋能了非洲开发者和BUIDLer。
Hackathon 获奖者
ETHiopia X Circles 奖项获奖者
第一名: Ethera
Ethera支持非洲内容创作者通过区块链实现货币化,利用Circles Protocol和CRC代币进行交易,以确保在Gnosis Chain上的透明度和去中心化。它通过Circles Protocol Avatar验证用户身份。
第二名: ETHqub
ETHiopia x BAM 一般Hackathon 获奖者
第一名: Imara
Imara是一个去中心化平台,帮助区块链开发者组建团队。它利用基于里程碑的质押和治理工具来增强协作,防止项目被遗弃,旨在区块链生态系统内实现广泛的集成。
第二名: Hakiba
Hakiba是一个去中心化的借贷协议,促进区块链上的社区信贷。它实施质押、担保和链上保险,以促进负责任的贷款和借款人支持,使用Solidity智能合约和FastAPI。
第三名: ETHqub
有关所有项目的更多信息,请访问 https://dorahacks.io/hackathon/ethiopiabamhackathon/buidl
关于组织者
BAM
BAM,即Bold African Movement,是一个为非洲的新兴建设者和创始人提供平台的机构,专注于区块链、AI和其他新兴技术。该组织致力于在非洲大陆培养创新人才,开发关键技术解决方案。通过积极参与重要的技术领域,BAM促进了这些行业的成长和协作。他们的使命是赋予非洲新一代的技术领导者,从而推动从愿景想法到实际实施的过渡。更多信息请访问他们的网站 joinbam.xyz。
-
@ d2554ae1:1e3208b1
2025-04-09 05:51:45Austrian Economics, the Fourth Turning, and the End of the Fiat Era
By DownWithBigBrother
The world is lurching through a period of unprecedented financial, political, and cultural upheaval. Inflation stubbornly persists, government debt has surged to unsustainable highs, bond markets are flashing red, and the institutional legitimacy of the West is crumbling under the weight of contradictions. Many wonder: is this the end of something—or the beginning?
From the vantage point of Austrian economics, this moment isn’t an anomaly. It’s the inevitable result of decades of interventionism, fiat monetary expansion, and distorted incentives. And when this lens is aligned with Ray Dalio’s long-term debt cycle, Strauss-Howe’s Fourth Turning theory, and historical precedent, a clear and troubling pattern emerges: we are in the final stages of a system that can no longer sustain itself.
⸻
The Austrian View: Malinvestment, Fiat Decay, and the Crack-Up Boom
Austrian economists warned us.
When central banks suppress interest rates below the natural rate, they distort the price of capital and create malinvestment across the economy. Asset bubbles form. Risk becomes mispriced. Government grows beyond its means. Eventually, the real structure of the economy collapses under its own weight.
Ludwig von Mises called it the crack-up boom: a moment when the public loses faith in the currency itself, accelerating toward hyperinflation or systemic reset.
Today, we see symptoms everywhere: • Short-term UK gilts faltering, despite higher yields—suggesting credit risk concerns in sovereign debt. • Central banks trapped, unable to raise rates without imploding debt servicing costs. • Pension funds relying on central bank liquidity, not investment returns. • People flocking to Bitcoin, gold, and hard assets, no longer trusting fiat promises.
This isn’t just a crisis of inflation. It’s a crisis of trust—of money, institutions, and narratives.
⸻
Ray Dalio’s Changing World Order: End of Empire, Debt, and Dominance
Ray Dalio, in Principles for Dealing with the Changing World Order, offers a complementary framework. He outlines the typical rise and fall of empires based on long-term debt cycles, reserve currency status, and geopolitical hegemony.
Dalio identifies several signs of a declining empire: • Unsustainable debt loads • Political polarization and populism • Declining education, productivity, and innovation • Rising external challengers (e.g. China, BRICS) • Devaluation of the currency to solve internal problems
Sound familiar?
The UK and U.S. fit this bill perfectly. Both are experiencing late-stage fiat dysfunction. Both are overstretched geopolitically. And both are losing internal coherence at the exact moment their adversaries gain strength.
In Dalio’s cycle, these forces typically lead to a changing global reserve currency, a new monetary system, and often—a major war.
⸻
The Fourth Turning: Crisis, Collapse, and Rebirth
Strauss and Howe’s generational theory offers a sociocultural overlay. They argued that every 80–100 years, Anglo-American civilizations undergo a “Fourth Turning”—a period of total institutional breakdown and civic realignment.
The last three Fourth Turnings: • The American Revolution (1776) • The Civil War (1861) • The Great Depression / World War II (1929–1945)
And now: 2008–2030.
The pattern is unmistakable: • Institutions lose credibility. • Society fractures along generational and ideological lines. • The old order resists collapse—but cannot reform. • Crisis breaks the system, and a new order emerges.
This isn’t prophecy. It’s a recurring cycle of institutional entropy followed by rebirth.
In this Fourth Turning, the fault lines are economic (debt, inequality), cultural (wokeism vs. tradition), technological (AI, surveillance), and monetary (fiat vs. Bitcoin).
⸻
Historical Echoes: Lessons from the Past
While our moment is unique, it echoes others: • Weimar Germany (1920s): Massive reparations debt, central bank money printing, social fragmentation—followed by authoritarianism. • Late Roman Empire: Currency debasement (clipping silver coins), overextension, loss of civic trust, internal decay. • French Revolution: State insolvency, rampant inflation, corrupt elite, and public uprising. • 1971–2025 (Modern West): Fiat detachment from gold, credit expansion, asset bubbles, pension fragility, war drums.
Each era collapsed under unsustainable monetary and political structures. Each ended with a reset, usually after pain, upheaval, and systemic failure.
⸻
What Comes Next: Bitcoin, Decentralization, and a Parallel Future
From an Austrian lens, the only sustainable future is built on sound money, decentralized decision-making, and organic community structures—not technocratic control.
Bitcoin represents more than a hedge. It is the lifeboat—the opt-out from a system that cannot be saved.
It aligns with all these frameworks: • Austrian: It restores monetary discipline, mimics gold with perfect scarcity, and resists state manipulation. • Dalio: It offers a neutral settlement layer amid collapsing fiat trust. • Fourth Turning: It is the generational technology of rebirth—decentralized, transparent, trustless.
Whether Bitcoin becomes the new monetary base or simply a parallel escape valve, it is central to the post-collapse architecture.
⸻
Conclusion: Clarity in the Collapse
The old world is dying. The fiat system is entering its terminal stage, unable to sustain the lies and leverage of the past 50 years. Austrian economics saw this coming. Dalio mapped its trajectory. Strauss and Howe timed the sociopolitical rupture. History confirms the pattern.
The only question now is how we prepare. • Do we cling to crumbling institutions, hoping for reforms that never come? • Or do we embrace the clarity of collapse, build resilient systems, and guide the next era?
Austrian thinkers remind us: the crash isn’t the failure—it’s the cure. A painful, necessary purge of decades of distortion.
The question is: will we have the courage to build what comes after?
⸻
-
@ f5369849:f34119a0
2025-04-08 15:06:27Hackathon Summary
The ETHiopia x BAM Hackathon, live from February 10th to 14th, engaged 108 registered developers and innovators in an in-depth exploration of Ethereum technologies. The event included workshops on Solidity development and sessions that encouraged creative skill-building, culminating in the submission of 38 approved projects. These projects demonstrated the participants' technical ingenuity and their engagement with blockchain technologies.
The hackathon facilitated the creation of solutions within Ethereum's ecosystem, focusing on community contributions and innovative applications in real-world scenarios. Participants gained skills, networked with peers, and explored blockchain innovations. A $2,000 USDC cash prize was awarded to projects excelling in code quality, community involvement, and presentation skills.
Entities including ETHiopia, BAM, and THE MU promoted an environment conducive to connecting African Web3 builders, fostering impactful solutions. This collaboration highlighted blockchain's role in addressing real-world challenges and empowered developers and builders in Africa.
Hackathon Winners
ETHiopia X Circles Prize Winners
1st Place
- Ethera: Ethera is a blockchain platform that enhances monetization for African content creators through fair, borderless transactions.
2nd Place
- ETHqub: Blockchain platform merging traditional African savings with DeFi for decentralized, community-based rotating credit/savings pools, promoting global financial inclusion.
ETHiopia x BAM General Hackathon Winners
1st Place
- Imara: Imara encourages decentralized team formation and project commitment in blockchain projects via staking mechanisms.
2nd Place
- Hakiba: Hakiba provides a decentralized protocol for community-based credit through staking, vouching, and on-chain insurance.
3rd Place
For more details and a comprehensive list of participating projects, visit DoraHacks.
About the Organizer
BAM
BAM is focused on advancing technology and blockchain solutions. Known for its capability to integrate blockchain into various sectors, BAM has led projects that improve operational efficiency and transparency. The organization takes a collaborative approach to driving technological innovations and is committed to developing secure, scalable blockchain infrastructures to meet industry demands.
-
@ fbf0e434:e1be6a39
2025-04-08 14:55:41Hackathon 概览
ETH Oxford 2025 Hackathon 于2月7日至9日在牛津数学学院举办,吸引了大量的开发者的兴趣和参与。活动共有318名开发者注册,最终通过审核有142个项目。活动强调创新和合作,主要集中在以太坊区块链上,参与者通过demo视频和GitHub仓库展示了他们的作品。
Hackathon 于2月9日结束,开发者们通过 Demo 他们的项目来角逐最后的奖项。他们在创新同时,也解决了区块链领域的各个技术挑战。这次 Hackathon 还促进了社区互动和知识分享,带来了区块链开发社区的实质贡献。
Hackathon 获奖者
主赛道奖项获胜者
- 可编程密码学
- CallOrNothing:利用区块链的去中心化扑克游戏,确保无中心化的信任游戏。
- AI
- DeFi
- Quantum Enhanced Cross-chain Arbitrage:结合量子优化与DeFi协议在生态系统间进行盈利套利交易的机器人。
- 消费者领域
- FlareGate:一个去中心化的P2P平台,用于法币-加密货币交易,整合Flare网络的安全数据。
- GuessTheHuman:基于区块链的AI社交推理游戏,用于识别真人玩家。
- The Golden Key:针对老年用户的区块链基础防欺诈移动应用。
Flare 奖项获胜者
- 刻入式数据协议
- FlareGate:用于法币-加密货币传输的去中心化P2P平台。
- Kingdom of LagaFlare:一个NFT卡牌游戏,通过区块链提供公平游戏和独特卡牌收集。
- ProteinMango:使用ZKP的自动理赔的参数性地震保险。
- 外部数据源/跨链
- portent
- bump.artist:为艺术家代币和收入分享的DeFi平台。
- ProteinMango
- FlareInsure:使用现实世界数据为智能合约服务的区块链小额保险。
- Decentralised Zero:利用Flare的FDC进行信任、透明的赌注操作的平台。
Torus 奖项获胜者
- 去中心化记忆机构
- ZK memory Organ:利用零知识证明实现高安全性和高效性的数据存储解决方案。
- Torus Decentralised Memory:安全、容错数据存储的分布式数据库。
- Porous Torus:为Torus AI代理提供安全、高吞吐量的数据存储。
- TorBit:通过OrbitDB为Torus AI代理提供零信任记忆系统。
- Discord 社区洞察生成器
- Hivemind:一个使用LLM从Discord聊天生成反馈和协作洞察的工具。
- stbb:分析服务器消息生成主题/趋势报告的Discord机器人。
- discord community bot:用于每周服务器报告的AI驱动Discord分析。
- 加密推特辩论分析器
- DebateFi:分析和总结有关加密货币的推特辩论,以获得可行的见解。
- Oxford Kaggle Debaters:一个用于加密推特分析、影响力评分和内容优化的AI工具。
- DebateChain:通过情绪和声誉评分分析加密推特辩论的AI。
- Wildcard 挑战
- NewsCrypt:去中心化论坛,通过辩论分析提升客观新闻报道。
基于Mina平台构建应用的获胜者
- MinAES:整合AES加密到Mina的zk-native区块链中,实现使用零知识技术的安全应用。
- MINA Verify:在电路中实现BLS12-381签名的一个平台。
- Guantanabet:基于Mina的隐私预测市场,使用基于ZKP的匿名投注。
Avalanche 奖项获胜者
- 一等奖 ($2000)
- Swiish.cash:一个通过手机号码全球稳定币转账的移动解决方案,使用Avalanche。
- Smart Memorandum:为智能合约提供司法管辖区特定法律文件的工具。
- blindbird.ai:去中心化AI推理平台,用于安全的小额付款。
- AADC- AI Agent for DeFi & Cross-Chain Operations
- 二等奖 ($1500)
- AI-Powered DeFi Position Management Platform:为GMX DEX头寸管理提供自然语言界面。
- NovaTools:包括多链NLP机器人和数据分析在内的加密AI工具。
- 三等奖 ($800)
- Oxwell AI agent:通过自然语言资产管理进行跨链DeFi助手。
- Wired:通过NLP为BNB/AVAX资产管理提供跨链AI助手。
- DEFAI:为链上操作提供自然语言的AI驱动DeFi代理。
- NLWallet:配备NLP和账户抽象的机构加密钱包。
- helpi:Avalanche平台的社会项目捐赠,配有AI风险评估。
AirDAO 奖项获胜者
- GameFi DApp
DeSci World: NERDo 奖项
- DebateChain
- CrypTweep by RugPullCoin#42
- Project Lydia:通过AI分析检测不当行为的Discord机器人。
- bump.artist
- Flare-FL:用于安全AI模型训练的去中心化联邦学习。
Ripple 奖项获胜者
- 使用RLUSD构建的顶级消费者应用
- CoverMax:一个使用oracle触发条件自动赔付的去中心化保险协议。
- BlockInvest:现代投资互助系统,利用XRPL通过智能合约进行集体储蓄。
- PayCoin IC:支持XRPL的QR码支付的移动RLUSD钱包。
- 使用XRPL的DID、凭证和RLUSD功能的最佳去中心化身份解决方案
- XRPL Diploma Verify:一个使用DIDs在XRPL区块链上安全存储和验证文凭的网页平台。
- 最具创新性的XRPL集成
BNB 奖项获胜者
- 主奖
- NovaTools
- insr.finance:一个通过Venus Protocol提供稳定币保护同时进行收益的保险协议。
- 荣誉提名
- BNB Shield:利用TEEs和ZKPs进行PEP检测的去中心化AML系统。
- CloutDrop:用于KOL空投优化的数据驱动平台。
- AADC- AI Agent for DeFi & Cross-Chain Operations
- Greenfield奖
- ReviewChain:一个去中心化的同行评审系统,提升学术出版透明度和质量。
- 荣誉提名
Vyper 奖项获胜者
- 最佳使用Vyper Lang
- SecureStake:一个使用Vyper进行质押和多签名验证的安全交易令牌管理平台。
- Quantum Enhanced Cross-chain Arbitrage
- The Golden Key by Avalock
若要探索 ETH Oxford 2025 的所有项目,请访问 DoraHacks。
关于组织者
ETH Oxford
ETH Oxford 是一个以推动区块链技术和创新而闻名的组织。以其技术专长而著称,ETH Oxford 对去中心化系统和安全交易协议的发展做出了重大贡献。其参与的众多项目提升了区块链的效率和可及性。目前,ETH Oxford 强调合作研究和区块链的实际应用,解决复杂的现实世界挑战,展现了其对技术进步和行业领导力的承诺。
- 可编程密码学
-
@ f5369849:f34119a0
2025-04-08 14:52:04Hackathon Summary
The ETH Oxford 2025 hackathon, hosted from February 7th to 9th at the Oxford Maths Institute, attracted considerable interest and participation from a global community of hackers. A total of 318 developers registered, resulting in 142 approved projects. Each project was submitted to the main track and up to a maximum five bounties - with 20 different bounty challenges to choose from.
The event concluded on February 9th with a pitching session where teams presented their projects to judging panels for prize consideration. This environment nurtured innovation and addressed technical challenges within the blockchain domain. The hackathon also fostered community interaction and knowledge sharing, leading to substantial contributions from the blockchain development community. Announcements concerning new tracks and bounties were expected, indicating continued opportunities for engagement beyond the initial event.
Hackathon Winners
Main Track Prize Winners
- Programmable Cryptography
- CallOrNothing: A decentralized poker game utilizing blockchain to ensure trustless gameplay without a central authority.
- AI
- DEFAI: An AI-powered chat interface that simplifies on-chain DeFi operations on the Avalanche blockchain using natural language processing.
- portent: AI platform using NLP/RAG to analyze real-world events' crypto impact, offering a conversational interface for predictive portfolio management with Flare-verified data.
- AADC: AI Telegram bot for cross-chain DeFi via natural language commands.
- DeFi
- Quantum Enhanced Cross-chain Arbitrage: A bot merging quantum optimization with DeFi protocols for profitable arbitrage trades across ecosystems.
- Consumer
- FlareGate: A decentralized P2P platform for fiat-crypto transactions, integrating secure data from the Flare Network.
- GuessTheHuman: Blockchain-based AI social deduction game to identify human players.
- The Golden Key: Mobile app for blockchain-based fraud protection for elderly users.
Flare Prize Winners
- Enshrined Data Protocols
- FlareGate: Decentralized P2P platform for fiat-crypto on/off-ramps.
- Kingdom of LagaFlare: An NFT card game offering fair play and unique card collection through blockchain.
- ProteinMango: Parametric earthquake insurance with automated claims via ZKPs.
- External Data Source/Cross-Chain
- portent
- bump.artist: DeFi platform for artist tokens and revenue sharing.
- ProteinMango
- FlareInsure: Blockchain micro-insurance using real-world data for smart contracts.
- Decentralised Zero: A platform utilizing Flare’s FDC for trustless, transparent betting operations.
Torus Prize Winners
- Decentralized Memory Organ
- ZK memory Organ: A data storage solution utilizing zero-knowledge proofs for high security and efficiency.
- Torus Decentralised Memory: Distributed database for secure, fault-tolerant data storage.
- Porous Torus: Secure, high-throughput data storage for Torus AI agents.
- TorBit: Zero-trust memory system for Torus AI agents via OrbitDB.
- Discord Community Insights Generator
- Hivemind: A tool generating insights from Discord chats using LLMs for feedback and collaboration.
- stbb: Discord bot analyzing server messages for topic/trend reports.
- discord community bot: AI-powered Discord analytics for weekly server reports.
- Crypto Twitter Debate Analyzer
- DebateFi: Analyzes and summarizes Twitter debates about cryptocurrency for actionable insights.
- Oxford Kaggle Debaters: AI tool for crypto Twitter analytics, influencer scoring, and content optimization.
- DebateChain: AI analyzing crypto Twitter debates via sentiment and reputation scoring.
- Wildcard Challenge
- NewsCrypt: A decentralized forum enhancing debate analysis to encourage objective journalism.
Applications Built on Mina Prize Winners
- MinAES: Integrates AES encryption into Mina's zk-native blockchain for secure applications using zero-knowledge technology.
- MINA Verify: A platform implementing BLS12-381 signatures for verification in circuits.
- Guantanabet: Private prediction market on Mina with ZKP-based anonymous betting.
Avalanche Prize Winners
- 1st Prize ($2000 each)
- Swiish.cash: A mobile solution for global stablecoin transfers via phone numbers using Avalanche.
- Smart Memorandum: Tool for jurisdiction-specific legal docs for smart contracts.
- blindbird.ai: Decentralized AI inference platform for secure micropayments.
- AADC- AI Agent for DeFi & Cross-Chain Operations
- 2nd Prize ($1500 each)
- AI-Powered DeFi Position Management Platform: Natural language interface for GMX DEX position management.
- NovaTools: Crypto-AI tools including a multi-chain NLP bot and data analysis.
- 3rd Prize ($800 each)
- Oxwell AI agent: Cross-chain DeFi assistant via natural language asset management.
- Wired: Cross-chain AI assistant for BNB/AVAX asset management via NLP.
- DEFAI: AI-driven DeFi agent for natural language on-chain operations.
- NLWallet: Institutional crypto wallet with NLP and account abstraction.
- helpi: Avalanche platform for social project donations with AI risk assessment.
AirDAO Prize Winner
- GameFi DApp
DeSci World: NERDo Awards
- DebateChain
- CrypTweep by RugPullCoin#42
- Project Lydia: Discord bot detecting inappropriate behavior via AI analysis.
- bump.artist
- Flare-FL: Decentralized federated learning for secure AI model training.
Ripple Prize Winners
- Top Consumer Applications built using RLUSD
- CoverMax: A decentralized insurance protocol automating payouts using oracle-triggered conditions.
- BlockInvest: Modern Tontine system on XRPL for collective savings via smart contracts.
- PayCoin IC: Mobile RLUSD wallet with QR code payments on XRPL.
- Best decentralized identity solution using XRPL's DID, Credentials, and RLUSD features
- XRPL Diploma Verify: A web platform storing and verifying diplomas securely on the XRPL blockchain using DIDs.
- Most novel XRPL integration
BNB Prize Winners
- Main Prize
- NovaTools
- insr.finance: An insurance protocol providing stablecoin protection while yielding through Venus Protocol.
- Honorable Mentions
- BNB Shield: Decentralized AML system using TEEs and ZKPs for PEP detection.
- CloutDrop: Data-driven platform for KOL airdrop optimization.
- AADC- AI Agent for DeFi & Cross-Chain Operations
- Greenfield Prize
- ReviewChain: A decentralized peer review system enhancing transparency and quality in academic publishing using blockchain.
- Honorable Mentions
Vyper Prize Winners
- Best use of Vyper Lang
- SecureStake: A token management platform with Vyper-based staking and multi-signature validation for secure transactions.
- Quantum Enhanced Cross-chain Arbitrage
- The Golden Key by Avalock
To explore all projects from ETH Oxford 2025, visit DoraHacks.
About the Organizer
ETH Oxford
ETH Oxford is an organization and community renowned for advancing blockchain technology and innovation, based in Oxford, UK. Known for its technical expertise, ETH Oxford has significantly contributed to the development of decentralized systems and secure transaction protocols. Its involvement in various projects has enhanced blockchain efficiency and accessibility. Currently, ETH Oxford emphasizes collaborative research and practical applications of blockchain, addressing complex real-world challenges and showcasing its commitment to technological advancement and industry leadership.
- Programmable Cryptography
-
@ 7d33ba57:1b82db35
2025-04-08 14:34:59Barcelona is a city that sizzles with creativity, blends beach life with bold architecture, and radiates Mediterranean energy. From Gaudí’s surreal masterpieces to the lively buzz of La Rambla and the golden sands of Barceloneta Beach, it's a place where every street feels like a gallery—and every evening invites a fiesta.
🌟 Top Things to Do in Barcelona
1️⃣ Sagrada Família
- Gaudí’s unfinished masterpiece and Barcelona’s iconic landmark
- A kaleidoscope of colorful stained glass, soaring columns, and symbolism
- Book tickets in advance—it gets busy for a reason
2️⃣ Park Güell
- A whimsical hilltop park filled with mosaics, dragons, and curves
- Explore the Monumental Zone and enjoy views over the city
- Like stepping into a dream—or a fairytale!
3️⃣ Stroll La Rambla & Explore the Gothic Quarter
- A lively pedestrian street with flower stalls, performers, and markets
- Wander into the Gothic Quarter (Barri Gòtic) for narrow alleys, Roman ruins, and hidden plazas
- Visit Plaça Reial for tapas and a good vibe
4️⃣ Casa Batlló & Casa Milà (La Pedrera)
- Two of Gaudí’s iconic modernist buildings on Passeig de Gràcia
- Casa Batlló looks like it’s made of bones and sea waves 🌊
- La Pedrera is all flowing stone and rooftop sculptures
5️⃣ Magic Fountain of Montjuïc
- Evening light & music shows (check schedule!)
- Combine it with a walk up Montjuïc for museums, parks, and castle views
6️⃣ Barceloneta Beach & Port Vell
- Chill on the beach or bike along the palm-lined promenade
- Great area for seafood, sangria, or sunset cocktails
- Stroll the harbor and check out the yachts at Port Vell
🍴 What to Eat in Barcelona
- Tapas – Patatas bravas, croquetas, pan con tomate
- Paella – Best enjoyed seaside, with seafood or mixed options
- Calçots (in season) – Grilled green onions with romesco sauce
- Crema catalana – Like crème brûlée, but with a Catalan twist
- Vermouth – A pre-lunch drink that's become trendy again 🍸
Try local markets like La Boqueria or cozy taverns in El Born for the full flavor.
🚇 Getting Around
- Metro & buses are fast and efficient – get a T-Casual card or Hola BCN pass
- Walk or rent a bike—many areas are super pedestrian-friendly
- Taxis & ride apps like Free Now are widely available
🎉 Extra Tips & Local Vibes
✅ Time your meals late – locals eat lunch at 2–3pm and dinner after 9pm
✅ Watch a Flamenco show, but choose authentic venues, not tourist traps
✅ Visit Bunkers del Carmel for one of the best panoramic sunset spots in the city
✅ Be aware of pickpockets in crowded areas (especially on La Rambla)
✅ If you love art: check out Museu Picasso and MACBA (modern art)
-
@ 554ab6fe:c6cbc27e
2025-04-08 14:16:11Throughout my inquiry into the science of meditation, I often ponder why meditation is not a part of our cultural norm. It is so ancient and beneficial, yet it is a lost art. Sure, it is still alive in regions such as India and Eastern Asia, yet even those cultures have become so engulfed by western culture that the dedicated practice of this art seems lost to the wayside. I began to think that the reason western philosophical tradition became more popular than eastern traditions was because one was easily transcribed into heritable texts.
All ancient cultures explored philosophical questions, attempting to unravel the mystery of reality. We all know of Plato, Socrates, and Aristotle, who wrote their ideas down into books that sparked a long lineage of philosophers and writings. The tradition of writing down the attempted understandings of reality contrasts with the East in some ways. The opening chapter in the Dao De Jing, the introductory book of Daoism written by Laozi (老子, laozi) in ancient China, states (老子, 1994):
The Tao that can be spoken is not the eternal Tao The name that can be named is not the eternal name The nameless is the origin of Heaven and Earth The named is the mother of myriad things Thus, constantly without desire, one observes its essence Constantly with desire, one observes its manifestations These two emerge together but differ in name The unity is said to be the mystery Mystery of mysteries, the door to all wonders
Daoism involves mindfulness practices such as meditation and Qi Gong that cultivated a sense of understanding of reality through these practices. It is a philosophy that claims the understanding of reality, not through analytical thinking but meditation. Therefore, the wisdom achieved is not easily described in words, hence the poetic and cryptic nature of the Dao De Jing. In the East, the ideas are not easily transcribable, contrary to the West, indicating why modern society is dominated by western thought and not meditative practices because communities learn from our ancestors' writings. Westerners, in my mind, took a different route in understanding reality, or so I thought. My ideas changed when I read two fascinating books: The Immortality Key by Brain C. Muraresku and In the Dark Places of Wisdom by Peter Kingsley. These books argue that the ancient ancestors of the West sought wisdom through the same means as the ancestors of the East, and we have just forgotten.A defining trait of western thought is the use of logic to deduce the nature of reality. Before the time of Plato, there was an ancient Greek philosopher known as Parmenides. He is known as the discoverer of logic. In my mind, logic is not something discovered. Yet, the title given to Parmenides speaks volumes to his contributions to the foundations of Greek philosophy and culture.
Contrary to the philosophers who followed him, he did not write a book of ideas. Instead, he wrote a poem. A cryptic one, nonetheless providing a distinct similarity between Parmenides and Laozi. The cryptic nature of his poetry has led to much scrutiny by scholars. They seek to understand his ideas from an analytical point of view and fail to do so—a method of analysis expected from classicists. However, Peter Kingsley takes a perspective that is far more conducive to the poem's true intention. In his book, Kingsley describes Parmenides as an Iatromantis, a prophetic healer of sorts with ties to Apollo who practiced incubation (Kingsley, 1999). Incubation is where an individual would lay down (as if a corpse) in a cave for extended periods until they had a sort of dream where their body descended into the underworld then came back. This experience could be used as a form of healing (Apollo was also the god of medicine) and granted wisdom derived from the gods. The insight could be philosophical and applied to the creations of laws (Kingsley, 1999). Incubation was not only associated with Parmenides either but also with Pythagoras (Kingsley, 1999). Surprising is the stark similarities between meditation of the East and incubation of the West. It seems that culturally significant individuals from the ancient world, regardless of geographical location, used the same method to achieve great wisdom.
Incubation may not have been the only means by which the ancient Greeks sought to achieve the wisdom of the gods. In the book The Immortality Key, Muraresku argues that during the Eleusinian Mysteries, the ancient Greeks consumed a beer spiked with psychedelic chemicals possibly derived from ergot (Muraresku, 2020). The experience was a means of going into the underworld, dying before dying, and coming back with greater wisdom and immortality (Muraresku, 2020). Muraresku further argues that this tradition continued into the Christian age with wine and holy communion. In double-blind studies, psychedelics induce incredible life-changing spiritual experiences (Griffiths et al., 2006). Both meditation and psychedelics seem to deactivate certain brain areas within the Default Mode Network (Farb et al., 2007; Palhano-Fontes et al., 2015; Scheibner et al., 2017; Speth et al., 2016). It is easy to draw a plausible connection of psychedelics as biotechnology capable of inducing, if not temporarily, the experience achieved by meditation and incubation. This experience, which reaches an altered form of consciousness, grants a spiritual understanding of great insight. At least, the Greeks and Romans likely thought so.
In The Immortality Key, I learned that the Greeks had two words for the English "know." There is a Greek word that describes a more reflective, analytical, and logical form of knowing. Then there is "gnosis," which describes a more intuitive and experiential state of knowing (Muraresku, 2020). Plato, Socrates, Aristotle, their knowledge lies within the former, whereas Parmenides and Pythagoras were in the later "gnosis" camp. I suppose this dichotomy could be voiced in the difference between "knowledge" and "wisdom" in English. Ironically, we derived our word "know" from" gnosis." In this context, do we truly know much of anything?
When it comes to archeology, nothing is certain. I cannot claim that these researchers are correct. Nonetheless, it is common knowledge that many cultures across the ancient world used meditation and psychedelics for various spiritual and ceremonial purposes. It existed in China, Japan, India, the Toltec people of southern Mexico, the Amazon, and other places. Why would the foundational cultures of the western world be any different?
I remember learning that scholars point to the crusades as a pivotal moment that leads to the development of the Renaissance in Europe. The reason was that Europeans had lost connection to the writings of ancient Greek and Roman society during the last age. It wasn't until the Europeans invaded the Middle East, andacquired the texts from the great libraries there that a massive boom in cultural prosperity and development began. Perhaps we are due for another remembering.
References Farb, N. A. S., Segal, Z. v., Mayberg, H., Bean, J., Mckeon, D., Fatima, Z., & Anderson, A. K. (2007). Attending to the present: Mindfulness meditation reveals distinct neural modes of self-reference. Social Cognitive and Affective Neuroscience, 2(4), 313–322. https://doi.org/10.1093/scan/nsm030
Griffiths, R. R., Richards, W. A., McCann, U., & Jesse, R. (2006). Psilocybin can occasion mystical-type experiences having substantial and sustained personal meaning and spiritual significance. Psychopharmacology, 187(3), 268–283. https://doi.org/10.1007/s00213-006-0457-5
Kingsley, P. (1999). In the Dark Places of Wisdom (Seventh). The Golden Sufi Center.
Muraresku, B. C. (2020). The Immortality Key: The Secret History of the Religion With No Name. St Martin's Press.
Palhano-Fontes, F., Andrade, K. C., Tofoli, L. F., Jose, A. C. S., Crippa, A. S., Hallak, J. E. C., Ribeiro, S., & de Araujo, D. B. (2015). The psychedelic state induced by Ayahuasca modulates the activity and connectivity of the Default Mode Network. PLoS ONE, 10(2), 1–13. https://doi.org/10.1371/journal.pone.0118143
Scheibner, H. J., Bogler, C., Gleich, T., Haynes, J. D., & Bermpohl, F. (2017). Internal and external attention and the default mode network. NeuroImage, 148(January), 381–389. https://doi.org/10.1016/j.neuroimage.2017.01.044
Speth, J., Speth, C., Kaelen, M., Schloerscheidt, A. M., Feilding, A., Nutt, D. J., & Carhart-Harris, R. L. (2016). Decreased mental time travel to the past correlates with default-mode network disintegration under lysergic acid diethylamide. Journal of Psychopharmacology, 30(4), 344–353. https://doi.org/10.1177/0269881116628430
老子. (1994). 道德经 Translated by Derek Lin.
-
@ e4950c93:1b99eccd
2025-04-08 13:11:01Vous avez trouvé un produit naturel ? Partagez-le ici en commentant cette page !
Ce site référence uniquement des produits et objets à usage durable. Les consommables (aliments, cosmétiques, combustibles, etc.) ne sont pas inclus.
Pour être référencé, le produit doit être composé de matières naturelles. 👉 En savoir plus sur les matières
Chaque information ajoutée (nom, matière, lien, zone de livraison pour un lien, etc.) et validée est considérée comme une contribution. 👉 En savoir plus sur les contributions
Chaque contribution validée est comptabilisée et donne lieu à une rétribution. 👉 En savoir plus sur les rétributions
Copiez-collez le modèle ci-dessous et remplissez les informations dont vous disposez. D’autres contribut-eur-rice-s pourront compléter les éléments manquants.
Nouveau produit
- Nom du produit :
- Image du produit (lien) :
- Description courte :
- Catégories :
- Marque ou fabricant :
- Composition (matériaux utilisés, y compris les éléments inconnus) :
- Liens pour l’acheter (et zone de livraison) :
- Zone de livraison pour les
- Autres infos utiles (lieu de fabrication, labels, etc.) :
Cet article est publié sur origine-nature.com 🌐 See this article in English
-
@ e4950c93:1b99eccd
2025-04-08 13:08:56Vous connaissez une marque proposant des alternatives naturelles ? Partagez-la ici en commentant cette page !
Pour être référencée, la marque doit proposer une partie au moins de ses produits en matières naturelles. 👉 En savoir plus sur les matières
Chaque information ajoutée (nom, lien, catégorie, etc.) et validée est considérée comme une contribution. 👉 En savoir plus sur les contributions
Chaque contribution validée est comptabilisée et donne lieu à une rétribution. 👉 En savoir plus sur les rétributions
Copiez-collez le modèle ci-dessous et remplissez les informations que vous avez. D’autres contribut-eur-rice-s pourront compléter les éléments manquants.
Nouvelle marque ou fabricant
- Nom de la marque :
- Image représentant des produits de la marque (lien, idéalement depuis le site de la marque) :
- Courte description :
- Catégories de produits proposées :
- Matières utilisées pour ses produits :
- Site internet de la marque :
- Autres informations (lieu de production, labels…) :
Cet article est publié sur origine-nature.com 🌐 See this article in English
-
@ a5142938:0ef19da3
2025-04-08 13:07:00Have you found a natural product? Share it here by commenting on this page!
This site only lists durable-use products and objects. Consumables (food, cosmetics, fuels, etc.) are not included.
To be listed, the product must be made of natural materials. 👉 Learn more about materials
Each piece of information added (name, material, link, shipping area, etc.) and validated is considered a contribution. 👉 Learn more about contributions
Every validated contribution is counted and eligible for rewards. 👉 Learn more about rewards
You can copy and paste the template below and fill in the information you have. Other contributors can complete any missing details.
New product
- Product name :
- Product image (link):
- Short description:
- Categories:
- Brand or manufacturer:
- Composition (materials used, including unknown elements):
- Links to buy (and shipping area):
- Other information (place of manufacture, certifications…):
This article is published on origin-nature.com 🌐 Voir cet article en français
-
@ a5142938:0ef19da3
2025-04-08 13:03:41Do you know a brand offering natural alternatives? Share it here by commenting on this page!
To be listed, the brand must offer at least some of its products made from natural materials. 👉 Learn more about materials
Each piece of information added (name, link, category, etc.) and validated is considered a contribution. 👉 Learn more about contributions
Every validated contribution is counted and eligible for rewards. 👉 Learn more about rewards
Copy and paste the template below and fill in the information you have. Other contributors can complete any missing details.
New brand or manufacturer
- Brand name:
- Image representing the brand’s products (link, ideally from the brand’s website):
- Short description:
- Categories of products offered:
- Materials used in its products:
- Brand’s website:
- Other information (place of production, certifications, etc.):
This article is published on origin-nature.com 🌐 Voir cet article en français
-
@ a5142938:0ef19da3
2025-04-08 12:59:23
This article is published on origin-nature.com 🌐 Voir cet article en français
-
@ e4950c93:1b99eccd
2025-04-08 12:58:34
Cet article est publié sur origine-nature.com 🌐 See this article in English
-
@ 4bc0bea1:29b9f2aa
2025-04-08 12:27:36How I’m Training Around An Elbow Injury
My right elbow is a mess.
I hurt it wrestling with a friend on a wooden deck.
It's easy to avoid injuries in wrestling...if you only wrestle on the mat. I guess I don't like it easy.
To take it a step further, I made it much worse by doing straight arm ring exercises.
C'mon Jordan!
Straight arm ring exercises while your elbow already hurts...pure buffoonery.
Alas, here I am.
I could sit out from jiujitsu, but instead, I’m adjusting how I train so I don’t lose progress.
Injuries are part of the game, but how you adapt defines your progress.
Most people see injuries as setbacks. But they're actually opportunities to refine your game.
These opportunities force you to find ways to keep improving even when things aren’t perfect.
Things don't need to be perfect if you have some G.R.I.T.
Let's break this approach down.
G – Grapple (Smart)
Don't stop training. Modify it. Drill with a dummy, watch tape, or do technique you can handle. Buy a brace if need be. Stay in the game.
There's nothing worse than forgetting everything you worked hard to learn. So don't let it happen.
Keep rolling. Do what you can without pain. Buy a brace if you think it will help. I wear Anaconda's Elbow Brace when I roll to make sure my elbow stays safe and pain-free.
I stop if I experience pain and don't allow myself to go 100%. Ignore your ego and give your body the pain-free work that it needs.
On days when it's fatigued, I drill with my dummy and watch instructionals so I can improve my technique.
Don't sit around. Grapple. But do it smart.
R – Restore Movement
Move the injured part pain-free to get blood flowing. Restore function over time.
If you sit around and don't move your injured body part, it will heal slower.
Healing requires the nutrients that blood brings. And blood won't bring as much of the goods if it's not recruited.
Rehab your injury to give it the blood boost it needs.
I diagnosed myself with Olecranon (Elbow) Bursitis. I've been doing exercises recommended here to help it heal faster.
I only do the exercises that are pain-free for me right now. And I'm moving on to more difficult ones as my elbow condition improves.
Waiting for an injury to heal is a slow, frustrating process.
Be patient and stay consistent with your rehab.
I – Integrate Strength
Once pain-free, begin light strengthening. Train around the injury, not through it.
Instagram recently sniped me with an ad for something called The Torque Bar.
The benefits from using it are endless:
- It's a single tool that targets forearms, wrists, elbows, biceps, triceps, and shoulders.
- It has a thick knurled handle that enhances grip strength and forearm activation.
- It improves rotational strength (supination/pronation) for sports.
- It helps with tennis elbow, golfer’s elbow, wrist tendinitis, and rotator cuff issues.
- It strengthens stabilizing muscles to reduce joint hyperextension and strain risks.
So of course I had to buy it.
A couple weeks of these torque bar exercises and I'm hooked. It's strengthening my neglected arm muscles and my elbow without any pain.
It's a key piece of my routine going forward and I highly recommend it for others.
The best part is that it doesn't agitate my injury and it's helping me get stronger.
That's the goal here.
T – Thrive with Nutrition & Sleep
Eat clean to recover faster. Sleep well. Don’t waste healing energy on processed junk.
This is the number one lever to pull in your healing journey. And also a great way to live.
Eat Clean
I eat healthy foods like ground beef, wild caught salmon, fruit, and more whole foods 80% of the time.
The days I eat clean are the days my elbow feels it best.
The other 20% of the time – when I eat some processed, junk food – my elbow aches. It makes me feel like I'm back at square one. The consequences of junk food are astounding.
I've put the 80/20 rule on hold and changed it to 95/5 to help this injury heal faster.
Sleep Well
My sleep has been horrible.
My daughter was born 3 weeks ago and she's been fussy. I'm getting 3-6hrs of sleep a night. It's definitely not helping my elbow.
Sleep is the most important piece of the human equation.
Bad sleep can result in
- Low energy levels
- Increased risk of injury
- Poor eating habits
- Lack of productivity
It sets the tone for each day.
If you take anything away from this, let it be that you need to optimize for sleep.
If you're in a situation like me, control what you can control.
I have more control over my food than my sleep so that's why I'm being more disciplined with it.
Once my sleep improves, I expect everything to be firing on all cylinders.
The Bottom Line
Injuries are opportunities to refine your game.
But you need to have some G.R.I.T. to do it.
- G – Grapple (Smart): Don’t stop training. Change it. Drill with a dummy, watch tape, or do technique you can handle. Stay in the game.
- R – Restore Movement: Move the injured part pain-free to get blood flowing. Restore function over time.
- I – Integrate Strength: Once pain-free, begin light strengthening. Train around the injury, not through it.
- T – Thrive with Nutrition & Sleep: Eat clean to recover faster. Sleep well. Don’t waste healing energy on processed junk.
Do the above and you'll be back better than before.
Injured and not sure what you can still train? Send me a message – happy to help however I can.
Original post is here
-
@ 6f1a5274:3b3bb9c4
2025-04-08 12:25:23VNDWin đã chứng tỏ mình là một nền tảng đột phá trong lĩnh vực giải trí trực tuyến, nơi người tham gia không chỉ tìm thấy những trò chơi thú vị mà còn được trải nghiệm một cộng đồng năng động và sáng tạo. Với những tính năng tương tác độc đáo, VNDWin không ngừng thu hút người dùng từ mọi miền, tạo nên một không gian giao lưu và học hỏi đầy sáng tạo.
Một Nền Tảng Đầy Sáng Tạo
VNDWin mang đến cho người dùng một trải nghiệm giải trí khác biệt, nơi họ có thể thỏa sức sáng tạo và thử thách bản thân qua những hoạt động đa dạng. Không chỉ đơn giản là những trò chơi, VNDWin còn cung cấp cho người tham gia cơ hội phát triển các kỹ năng mới và trau dồi những đam mê cá nhân trong một môi trường thân thiện và cởi mở.
Bằng việc cung cấp một giao diện dễ sử dụng và trực quan, VNDWin giúp người dùng dễ dàng tham gia vào các hoạt động và trò chơi yêu thích. Mỗi trải nghiệm trên nền tảng này đều được thiết kế để mang lại sự hấp dẫn và làm người tham gia cảm thấy hứng thú.
Xây Dựng Cộng Đồng Vững Mạnh
Một trong những yếu tố quan trọng làm nên sức hút của VNDWin chính là tinh thần cộng đồng. Nền tảng này không chỉ là nơi để người tham gia thể hiện tài năng mà còn là không gian để họ kết nối và chia sẻ với những người có cùng sở thích. Các nhóm, đội, và cộng đồng luôn được khuyến khích tham gia và phát triển, tạo nên một môi trường nơi người dùng có thể giao lưu và học hỏi từ nhau.
Bên cạnh đó, các công cụ giao tiếp trên VNDWin như trò chuyện trực tuyến và các diễn đàn tạo cơ hội cho người chơi kết nối với nhau nhanh chóng và dễ dàng, góp phần tạo nên một cộng đồng sôi nổi, tích cực.
Tiến Xa Hơn Với Sự Đổi Mới Liên Tục
VNDwinluôn nỗ lực không ngừng để nâng cao chất lượng và đổi mới nền tảng. Những cập nhật và tính năng mới liên tục được giới thiệu nhằm đáp ứng nhu cầu ngày càng cao của người dùng. Mỗi bản cập nhật đều nhằm mục đích cải thiện trải nghiệm người dùng, từ việc nâng cao chất lượng hình ảnh, âm thanh, đến việc bổ sung các trò chơi và hoạt động thú vị mới.
Với cam kết không ngừng đổi mới, VNDWin luôn lắng nghe và tiếp thu phản hồi từ cộng đồng để đem lại những trải nghiệm ngày càng tuyệt vời hơn cho người tham gia.
Dịch Vụ Hỗ Trợ Chuyên Nghiệp
VNDWin không chỉ chú trọng đến trải nghiệm người chơi mà còn cung cấp một dịch vụ hỗ trợ khách hàng tuyệt vời. Đội ngũ hỗ trợ luôn sẵn sàng giúp đỡ người dùng giải quyết các vấn đề liên quan đến kỹ thuật hay hướng dẫn sử dụng nền tảng. Mọi yêu cầu và thắc mắc đều được giải quyết nhanh chóng, giúp người tham gia có thể tận hưởng trải nghiệm mà không bị gián đoạn.
Kết Luận
VNDWin đã và đang chứng tỏ được sức hấp dẫn của mình nhờ vào sự sáng tạo, cộng đồng gắn kết và những tính năng đổi mới không ngừng. Với nền tảng dễ sử dụng, không gian giao lưu bổ ích, và hỗ trợ khách hàng tận tâm, VNDWin là sự lựa chọn lý tưởng cho những ai tìm kiếm một trải nghiệm giải trí trực tuyến độc đáo và đầy thú vị. VNDWin chắc chắn sẽ tiếp tục phát triển mạnh mẽ, mang đến những cơ hội mới cho cộng đồng người dùng.
-
@ 6f1a5274:3b3bb9c4
2025-04-08 12:24:03Với sự phát triển không ngừng của công nghệ, VNDWin đã khẳng định vị thế của mình như một nền tảng giải trí hấp dẫn và đầy sáng tạo. Nổi bật với các tính năng tương tác độc đáo và cộng đồng sôi nổi, VNDWin không chỉ thu hút người dùng trong nước mà còn mở rộng ảnh hưởng ra quốc tế.
Trải Nghiệm Sáng Tạo và Tương Tác
VNDWin mang đến cho người dùng một không gian đầy tính sáng tạo, nơi mọi người có thể khám phá và phát triển những kỹ năng cá nhân trong môi trường thân thiện và đầy thử thách. Các trò chơi và hoạt động đa dạng trên nền tảng này không chỉ giúp người tham gia giải trí mà còn kích thích khả năng tư duy và sáng tạo.
Giao diện dễ sử dụng và trực quan của VNDWin là một điểm cộng lớn, giúp người dùng dễ dàng tìm thấy những hoạt động phù hợp với sở thích của mình. Mọi trải nghiệm được thiết kế để mang lại cảm giác hứng thú và thú vị, khiến người tham gia không muốn rời mắt khỏi màn hình.
Tinh Thần Cộng Đồng Mạnh Mẽ
Điều làm nên sự khác biệt của VNDWin chính là tinh thần cộng đồng gắn kết. Người dùng có thể tham gia các nhóm, đội và cộng đồng để chia sẻ kinh nghiệm, giao lưu và học hỏi lẫn nhau. Những cuộc thi, sự kiện và hoạt động cộng đồng luôn được tổ chức thường xuyên, tạo cơ hội cho người tham gia thể hiện tài năng và kết nối với nhau.
Với các công cụ giao tiếp hiệu quả như trò chuyện trực tuyến và diễn đàn, VNDWin giúp người dùng không chỉ tham gia vào những thử thách mà còn dễ dàng giao lưu, kết bạn và tạo dựng những mối quan hệ lâu dài.
Luôn Đổi Mới và Phát Triển
VNDwinluôn nỗ lực để cung cấp những trải nghiệm mới mẻ, với các cập nhật và tính năng liên tục. Nền tảng này không ngừng cải tiến để đáp ứng nhu cầu ngày càng cao của người dùng. Dù là cải tiến về hình ảnh, âm thanh hay bổ sung các hoạt động mới, VNDWin luôn chú trọng đến việc mang lại sự hài lòng tối đa cho cộng đồng người chơi.
Một trong những điểm mạnh của VNDWin là khả năng linh hoạt trong việc điều chỉnh các hoạt động và trò chơi theo phản hồi từ người dùng, điều này giúp nền tảng luôn duy trì được sự hấp dẫn và cuốn hút.
Hỗ Trợ Khách Hàng Tận Tâm
Với mục tiêu mang lại trải nghiệm tốt nhất cho người dùng, VNDWin cũng đặc biệt chú trọng đến công tác hỗ trợ khách hàng. Đội ngũ hỗ trợ luôn sẵn sàng giải đáp các thắc mắc và giúp người dùng giải quyết mọi vấn đề mà họ gặp phải trong quá trình tham gia. Từ việc hướng dẫn ban đầu đến việc giải quyết các vấn đề kỹ thuật phức tạp, VNDWin luôn đảm bảo rằng người dùng sẽ không bao giờ cảm thấy bối rối hay gặp khó khăn khi sử dụng nền tảng này.
Kết Luận
VNDWin đã tạo ra một không gian giải trí độc đáo, nơi người tham gia có thể vừa thư giãn vừa thử thách bản thân trong một cộng đồng đầy sức sống. Sự đổi mới liên tục, tinh thần cộng đồng mạnh mẽ và sự hỗ trợ nhiệt tình là những yếu tố giúp nền tảng này thu hút và giữ chân người dùng. Với những tiềm năng phát triển mạnh mẽ, VNDWin chắc chắn sẽ tiếp tục là lựa chọn hàng đầu cho những ai tìm kiếm sự đổi mới và trải nghiệm giải trí thú vị.
-
@ 5188521b:008eb518
2025-04-08 13:33:42Ecology
When my father died, an entire ecosystem system of beneficiaries withered. Moussa Ag El Khir funded scholarships and community projects, paying thousands of Dinars monthly to stop the oasis town of In Salah from burning up. The few families we knew operating outside the oil-field economy would be forced to flee to the Mediterranean coast, along with just about every other Berber.
It wasn’t unexpected. My father had cystic fibrosis for all sixty-one years of his life. So far, that’s the only legacy he’s passed on to his children. My brothers are just carriers, but me, his precious daughter ended up like him in more ways than one.
We sat there in the lawyer’s office in Algiers, my brothers and I, staring at the ledger which contained payment for his life’s work.
“And he only left one word in his will?” asked Ibrahim for the third time. Ecology.
The lawyer said Moussa was very clear. He chose each of the keys himself. The contents of the ledger would belong to whoever could decode his life — those who understood the real meaning. Then he cut all communications and walked into the Sahara. The Tuareg caravan on the road to Akabli found his body a week later, reddened by sand burn.
Earth
We made an agreement that day. To share each word we discovered. We could break the code together. Of course, Ibrahim and Hama didn’t share anything. We barely speak. That’s what happens when one child follows their father into science, and her two brothers move to France the minute they get rich enough to buy a wife. I bet they spent longer looking into legal loopholes to get their hands on my father’s assets than they did trying to identify the keys.
That day was the start of my second life, and I went from research assistant at a regional university to private-key detective. 2048 words and few clues where to start. Although I was 27, I was virtually a grandmother according to the In Salah wives. But of course, I could never be a grandmother, or even a mother. Every night, I scoured photos in the family archive. An initial sweep of his digital footprint returned no out-of-place instances of any keywords.
It took me a year to find the GPS tag he’d added to one photo — an eighteen-year-old daughter standing next to a father proud of his first infinite solar prototype. The panel has long-since been torn out by the oil corp, but the base is still there. I drove the three kilometres from the town limit and shone the high beams at the spot. When I got out, the air was cool but still thick with sand. A few more steps through sinking dunes, and I saw it. He’d scratched a little globe into the blistered metal, and for a moment, my mucus-laden lungs tasted clear air.
Trigger
The next word took three years. Friends, contacts, professors, biographers — visits to anyone with whom he might have left a clue. But it was in the In Salah hospital, where, upon a routine CF checkup with Jerome Devailier, a French doctor, ‘trigger’ appeared. The government might stack everything against the desert peoples, but they hadn’t taken away healthcare. I’d been living off the kindness of neighbours while finishing my thesis on the very solar technology my father developed. How could he have known the ‘buyer’ was just a tendril of the very oil company he sought to defeat.
Dr Devalier went through the list of carcinogens and allergens to avoid with my new drugs. Over forty triggers which could be my downfall. If I was lucky, I’d live as long as my father did.
By then, my research stipend was long gone. I existed on toughened bread and soup, which always carried the taste of the scorched city air. Yet, I stayed. The public library, disconnected from the grid by the oil corp, was where I finished my manuscript. They would fight its publication. Since father’s money no longer flowed into the town, many had deserted me. There were those who said he killed an entire people by selling his solar patent to the wrong buyers. Others in In Salah worshipped his name, but eventually, they all trudged north to the cities. My brothers sold the family home from under me, forcing me to follow.
When I returned from the hospital, I dug out my father’s medical documents. On every page, the word ‘trigger’ was underlined. That was the moment I knew my life’s work would be unlocking the ledger, not publishing studies on long-dead solar panel technology. That battle was lost.
They
All we need is a simple document, but here, it is the administrators’ job to send people away. Physical copies are only issued in extreme circumstances. Citizens’ Registry screens played endless repetitions of how to apply for digital documents. The shrill voices of family members desperate for the original copy of a pirated document drowned the TV messaging. Women removed headscarves and revealed thick black hair; teenagers paced. The atmosphere thickened with sweat. And hours passed. Each appointment required a reset of digital protocol, biometric tests, and identity cards from legal descendents. Through counterfeit identities, our Dinars leak into the hands of criminals, but still the government denies the need for bitcoin. They just print more money. They is the word my father used for the government that fought his patent so hard.
After a four-hour wait, I discovered that the physical death certificate included an ‘identifying mark’ on the deceased’s body. The ink was fresh — etched into the shoulder blade of a man who wished to turn his back on the government that ignored its people. The tattoo read aqqalan, the Tamasheq word for they.
Scheme
It took two trips to his cluttered Marseille office to convince him I was serious. Two visas, two flights, and the small amount from the sale of the family house. But few detectives wanted to work for a promise.
The ledger could not legally be owned in Algeria, and Laurent Mercier was the only serious professional who entertained a percentage of what was on there. The solar tech patent and documents from my father were enough to start Laurent on the trail. ‘Preliminary,’ he said, until I had the ledger in my possession.
“Flying is not easy with my condition,” I said.
He lowered his sunglasses. “Working is not easy without money.”
Contact with my brother through the lawyer in Algiers was achingly slow, but eventually they agreed to give me possession. What was 33% of nothing anyway? Years had gone by.
So, when I sat for the second time, in the sweaty office in Marseille, I gave Laurent the ledger, and he handed me a surprise. In all his business affairs, my father used little English, but the word ‘scheme’ appeared in all three company names he incorporated in the last three years of his life. We had our fifth word, and I finally had someone on my side.
Make
Some days, I could barely walk to the public library. I became lethargic and mostly sat in the cool dark of my room in the shelter. The government refused to provide housing outside of Algiers, but a Tuareg organisation from Mali opened a shelter in In Salah. Bulging eyes and faded clothes stared back in the mirror each day. How long had it been since I’d been to a wedding, or celebrated a friend’s child? Occupants came and went, and all that was left was a barren room and one meal per day.
As the sun punished the city with every ray of Allah’s untapped gift, streets grew thick with dust, and the local government fell, seat by seat, to oil execs. The only transport running was to and from the oil fields, which belched the remnants of the land into the sky. And still they worked. Still they sat on my father’s patent and refused to supply the world with efficient solar power.
With little else to cling onto, I harboured thoughts of how I could spend the ledger money. Fixing the town and replanting lost gardens. Bringing people back. That all took a back seat to decoding the message my father was sending. Laurent and I began to believe that the keys he chose formed some sort of instruction for his legacy.
Ten years to the day after his death, I was in the public library, looking for clues in an English history book. On my exit, the librarian stopped me.
“We have a gift for you, Kana.”
I waited while he fetched a package.
“Your father instructed me to give this to you. But not before this date.”
My hands tore open the package. More books, technical manuals, and hand-written notes. Amongst the papers was a tasselled leather bookmark embossed with the four letters that comprised one of the seven missing words. Make.
Citizen
It’s hard for a father in Algeria to admit to his daughter that she is his spirit — the heir to his life’s work. Of course he felt terrible guilt after our mother’s passing. That was when the letters started.
Moussa wrote to himself really, trying to come to terms with bringing a protégé into the world with a bright scientific mind and lungs that would snap her life expectancy. We communicated by letter for the last few years of his life — sharing the breakthroughs of his findings and what it might mean for our decaying oasis town. Analogue writing was the only real privacy, he said. His letters always ran to the same length, as if they were one lesson divided into equal chunks. We even exchanged letters during his last hospitalisation in Algiers. Those words were the only real strength I gained.
It was Laurent who analysed the letters with a new text scanning tool. For me, my father’s last letters were advice, regret, pain, and love, but to Laurent, they were simply a puzzle to solve to get one step closer.
Our letters gave Laurent the idea to communicate via physical mail. The process was painful, with letters sent from outlying towns before being shipped across the Alboran Sea and up into France. Muatin was one name my father called me. Like him, I dreamed of helping many through science. This was one of the few Arabic words in the French letters he wrote. It was also the only keyword included in any of the letters. Citizen.
When
Years of quiet followed. In Salah became unlivable after they co-opted the city reservoir for cooling drilling rigs. Each study that proved the field was still viable funnelled funds away from the locals who clung on. Resettlement benefits went up, and all but the semi-nomadic Tuaregs left. I followed. My health could not take much more desert. In the cooler coastal plains, I recovered strength, and subsidies for new medications helped me survive on a meagre teaching salary.
With no further clues, my Marseillais detective lost interest. His last letter, sent years ago, stated with unusual brevity that he was resigning the case. No payment was due.
I had lost my health, my father, his work, my money, our house, the town, and I spent each week delivering science and English classes to teenagers. They had no more hope for our country than I had. Algerians had already lost the Sahara. A one-degree temperature shift each decade of my life had shrunk Africa and sent its peoples northwards.
My father’s word puzzle occupied my thoughts. The combinations and permutations of letters and characters had millions of possible meanings but only one correct answer. Yet simple linguistic logic provided the next word. The headteacher was a linguist — a profession long lost to the higher-powered text analysers and language AI. He spoke little English but asked about the categorisations of grammatical terms in the 2048 key words.
“Why do you ask?”
“Because,” he said, “for a sentence of twelve words, at least one conjunction is necessary to form a second clause.”
He was right. I had been focussing on lists and complex codes to build my father’s motto. When I got home, I furiously searched my list of terms for conjunctions. I found only one. ‘When.’
Can
The permutations were still huge. Even eliminating some of the more conceptual words did not help. Millions of sentences existed in my dead father’s mind. Millions of meanings, all lost to the need for more energy to fund the world’s great thirst for energy. Still, the panels in most of the ‘dead middle’ (as the space between the tropics became known) melted at over 50 degrees.
I was back in Paris for CF treatment. As a young woman, I would have been pleased to make fifty years. But the realities of daily visits and the sickness brought on by medication stung. I wanted things to end, even when I discovered the next key.
It had been years since I had dreamed of the freedoms my father’s fortune could bring. Parts of Asia held out against bitcoin, but the cost of countries doing business off-network had become prohibitive. Eventually, the fossil conglomerates would give in to the need for solar mining and the provision of universal energy.
It was in a Parisian hospital bed that I discovered ‘can.’ My wardmate, a rough labourer from Oran, found a biography in the hospital library that made me sit up straight. ‘Can’ was repeated in almost every description of my father in his one-time business partner’s book. And it was this Arabian ‘businessman,’ Abdulkarim Rahman, who brokered the deal that robbed the world of infinite solar power. Each page mocked my father as believing only physical impossibilities are impossible. He branded him the ‘can man.’
Drastic
During my recuperation, I spent the final two weeks of my visa stay in Marseille. My days passed with endless algorithm tweaks to reject or accept word orders for the elusive twelve-word sentence my father once wrote.
Food lost its taste, and friends and colleagues in academia had scattered. In-person meetings were often contained to the night hours, but Marseille was not a place to go out after dark. The latest protests had gotten violent, and the government looked likely to topple. My people had always been resilient, but when the option to move and operate a caravan was removed by General Hafiz, part of my spirit died. I resolved to spend my final years in In Salah, however uncomfortable they would be.
My final port of call before returning was Laurent’s office. The eTaxi cast me out into the dusty street, and I wheezed as I climbed the three flights of stairs to his tiny door on Rue Marché. We hadn’t spoken in years, but I was surprised to find a different name about the door. Pascale Dupont, Investigateur.
The assistant I remembered was quite the opposite to Laurent — slow and methodical, short and heavy set.
“Madame,” he said. “I have difficult news.”
Their business had always straddled the law, but I never imagined an ex-officer of the law could be convicted of treason.
“A closed-door trial,” said Pascale. Then he handed over an air-gapped 3D storage file. “Laurent knew you would come for this.”
My mind cast forward to the reams of information he must have built on my father. The patents and technical diagrams he illegally acquired and other clues. I instantly recognised the brand of storage file as a keyword. Drastic.
“How can I thank him?”
“He is dead, madame.” Pascale hung his head. “He survived prison for only two weeks.”
Must
My final years brought me home. In Salah had gained fame for its one group of Tuaregs who refused to leave. The Lakzis owned a house in a desperate condition, not dissimilar to my failing body. By the age of fifty-two, I could no longer walk, but they welcomed me. I pooled my disability allowance and some money I’d gained from selling my father’s watch. We waited for the world to mourn the death of a once great city. We would keep it alive by refusing to move, by refusing to permit its rebranding as an ‘industrial area.’ Now the oil fields were finally drying up, they wanted to dig under the town.
We had managed to eliminate half of the remaining words. Just under 1,000 possible selections for the final two words, but little idea of an order.
The problem was that I was the only English speaker among them, and it took great energy to attempt to teach the meaning of the words and possible grammatical constructions for my father’s sentence.
But soon, patterns began to emerge. Fragments of word pairings and groups. ‘Trigger drastic scheme’ appeared again and again in the permutations. ‘They can’ and ‘When they can’ gave a tantalising glimpse. We ranked sentences in terms of likelihood to form the full key and categorised them by the most likely remaining words. Due to the need for a modal verb, ‘must’ scored highest by our calculations.
In this race to unlock the ledger before In Salah’s destruction, we nosed ahead.
Yet the day of that discovery was my final day in the desert. An air ambulance transported my feeble body to Algiers, and I would never return.
They messaged me — so close. They would unlock the ledger with the final word after my operation. The bitcoin could undo the wrongs of the past, and my father’s sentence would live on.
End
The phrase which began the global revolution first appeared on the wall of a much-disputed oil refinery in the desert outside In Salah, Algeria.
When they can make ecology end, citizen earth must trigger drastic scheme
Soon, the graffiti marked government buildings in Algiers. Activists took to the streets. Governments crumbled and currencies collapsed. Climate groups received massive donations said to come from ‘the one,’ a ledger with a huge stack written off by financiers the world over. The codebreaker credited with unlocking the ledger was unable to witness the transfer of 10,000 coins to the Global Climate Fund due to her death, aged 52, from a congenital condition.
The words of Moussa Ag El Khir now mark each of the millions of panels, which line the ‘dead middle.’ They contribute over 80% of the Earth’s power supply.
To mark the fiftieth anniversary of his death, the World Climate Forum will be held in the town of his birth, In Salah, Algeria. This story, compiled from the diaries of his daughter, Kana Ult El Khir, will be read as the opening address of the conference.
This story was originally published in 21 Futures: Tales From the Timechain
To continue the story of the real-world treasure (sats) use the address (it's real).\ Who knows, maybe some zaps will find their way into the wallet...
-
@ 6f1a5274:3b3bb9c4
2025-04-08 12:21:22Trong những năm gần đây, FTW đã nổi lên như một nền tảng hàng đầu kết nối người chơi từ khắp mọi nơi, mang đến cho họ một môi trường hấp dẫn để cạnh tranh, hợp tác và thể hiện kỹ năng. Với một cộng đồng người dùng ngày càng phát triển, FTW nhanh chóng trở thành điểm đến yêu thích của những ai tìm kiếm một trải nghiệm số đầy thú vị, nơi mà niềm vui, sự phấn khích và cộng đồng hòa quyện cùng nhau.
Trải Nghiệm Động và Bao Quát
FTW đã thu hút sự chú ý nhờ khả năng tạo ra một môi trường động và bao quát. Nền tảng này phục vụ cho một loạt các sở thích khác nhau, mang đến các loại trải nghiệm tương tác đa dạng phù hợp với nhiều người dùng có sở thích khác nhau. Dù bạn đang tìm kiếm những thử thách chiến lược hay muốn khám phá những cuộc phiêu lưu sáng tạo, FTW đều có những gì bạn cần.
Giao diện và thiết kế của nền tảng tập trung vào việc mang lại sự điều hướng mượt mà, đảm bảo người dùng có thể dễ dàng tìm thấy và tham gia vào những trải nghiệm phù hợp với sở thích của mình. Hệ thống mạnh mẽ cũng giúp tạo ra các tương tác suôn sẻ giữa các người tham gia, mang đến một trải nghiệm không gián đoạn.
Cộng Đồng Là Nền Tảng
Một trong những yếu tố nổi bật của FTW chính là sự chú trọng vào cộng đồng. Nền tảng này không chỉ đơn thuần là về thành tích cá nhân; nó thúc đẩy tinh thần đồng đội và cạnh tranh thân thiện. Người dùng có thể tham gia vào các nhóm, tạo các cộng đồng hoặc tham gia các sự kiện cộng đồng giúp xây dựng những mối quan hệ lâu dài với những người cùng sở thích.
Các công cụ giao tiếp tích hợp trên FTW, như hệ thống nhắn tin, diễn đàn và trò chuyện trực tiếp, giúp người dùng dễ dàng kết nối và tương tác với nhau. Mức độ tương tác này tạo ra một không gian sống động và chào đón, nơi người chơi có thể chia sẻ mẹo, ăn mừng chiến thắng và thậm chí tạo dựng tình bạn lâu dài.
Sự Đổi Mới Liên Tục
FTW không bao giờ tự mãn với những gì đã đạt được. Nền tảng này luôn không ngừng phát triển, với các bản cập nhật và tính năng mới giúp giữ cho trải nghiệm luôn mới mẻ và thú vị. Các nhà phát triển luôn tìm kiếm những cách thức mới để nâng cao sự hài lòng của người dùng, cho dù đó là cải thiện hình ảnh, tăng cường tính tương tác hay tạo ra những loại nội dung mới phản ánh các xu hướng mới trong thế giới giải trí.
Hơn nữa, FTW luôn lắng nghe cộng đồng người dùng, tiếp thu phản hồi khi ra mắt các bản cập nhật hay thay đổi. Điều này đảm bảo nền tảng luôn đồng điệu với những gì người dùng muốn, tạo ra một môi trường linh hoạt, luôn thích ứng với sở thích và công nghệ mới.
Khả Năng Tiếp Cận và Hỗ Trợ
Một yếu tố nổi bật khác của FTW là khả năng tiếp cận. Nền tảng được thiết kế để dễ sử dụng và có thể truy cập trên nhiều thiết bị khác nhau, cho phép người dùng thưởng thức trải nghiệm dù ở bất kỳ đâu. FTW cũng tự hào cung cấp dịch vụ hỗ trợ toàn diện, giúp người dùng giải quyết bất kỳ vấn đề nào họ gặp phải, đảm bảo một trải nghiệm suôn sẻ và dễ chịu.
Dù là người dùng lần đầu hay đã có kinh nghiệm, đội ngũ hỗ trợ khách hàng của FTW luôn sẵn sàng trợ giúp. Cam kết của họ trong việc đảm bảo một trải nghiệm không rắc rối khiến FTW trở thành sự lựa chọn đáng tin cậy cho những ai muốn gia nhập một nền tảng giải trí số.
Kết Luận
FTW đã nhanh chóng khẳng định vị thế là một nền tảng hàng đầu trong lĩnh vực giải trí tương tác. Sự cam kết của nó đối với đổi mới, xây dựng cộng đồng và khả năng tiếp cận đã giúp nó trở thành lựa chọn phổ biến của những ai tìm kiếm một trải nghiệm độc đáo và thú vị. Với cộng đồng người dùng ngày càng lớn mạnh và sự tập trung vào việc cung cấp những nội dung mới mẻ, FTW đang trên đà trở thành một cái tên hàng đầu trong lĩnh vực của mình trong nhiều năm tới.
-
@ e31e84c4:77bbabc0
2025-04-08 11:53:57The third annual edition of Bitcoin FilmFest returns to Warsaw this May. From its niche beginnings in 2023 to today’s global stage, BFF has become a catalyst for authentic storytelling—merging independent cinema, permissionless art, and Bitcoin’s ethos.
“Where centralized scripts end, new narratives begin — explore the uncharted stories beyond the frame.”
May 22-25, 2025, Poland: This year’s theme, “Beyond the Frame,” BFF25 expands the focus on creative expression—featuring narrative films, fiction, Bitcoin ads, and even a touch of AI, while keeping its genuine, community-driven vibe.
Key Highlights of Bitcoin FilmFest 2025
-
Pizza Day: The biggest European gathering to celebrate the first real-world Bitcoin transaction.
-
Exclusive Screenings: Feature films, documentaries, animations and shorts—including, for example: UNBANKABLE, SATOSHI THE MOVIE, REVOLUCIÓN BITCOIN, THE MAN WHO WOULDN’T CRY, HOTEL BITCOIN —all followed by face-to-face discussions with creators.
-
Golden Rabbits: Cinematic awards in categories like Best Movie, Best Story, Audience Choice.
-
Movie Pitch Contest: A platform for creators to turn Bitcoin-themed ideas into cinematic reality.
-
Generative Cinema: A special segment exploring AI’s role in filmmaking, including screenings and dynamic debates.
-
BFF PoWies: A dedicated show with Bitcoin-themed advertising, concluding with its own award ceremony (categories: GRAND PRIX / freestyle, VISUAL / video ad + out of home, IDENTITY / brand creative + campaigns).
-
Workshops & Networking: Thematic sessions on filmmaking, art, philosophy, spirituality, and beyond.
-
Memorable Experiences: Inspiring conversations in intimate circles, live music (concerts and DJ sets), stand-up comedy, and dozens of site activities—from bitcoin-only marketplaces, though yoga to self-defense.
\ Details, Tickets, Discounts.
For more visit the official event site: bitcoinfilmfest.com/bff25/
Follow the project's official feed on social media to stay up-to-date:
X: @bitcoinfilmfest | Nostr: Bitcoin FilmFest | LinkedIn: Bitcoin FilmFest
Use the discount code BITESIZE to get 10% off on tickets.
-
-
@ c11cf5f8:4928464d
2025-04-08 11:31:37Here we are again with our monthly Magnificent Seven, the summary giving you a hit of what you missed in the ~AGORA territory. This month, new ideas came to us to trying increase engagement within the marketplace. Thanks to all for sharing your ideas and needs.
Auctions OPEN! First of all, @AGORA made a comprehensive research analyzing all the various types of auctions and discovering which one could be the most suitable for stackers. Published a guide that help define a first experimental auction for Satoshi Nakamoto 50th ₿DAY Commemorative Poster.
Build your own Shopfront Second, we discovered that AGORA could enable shopfronts to simply showcase and link external products, one per comment. This allows, for example, @SN to have its own to showcase and collect all the past and future editions of the SNZ weekly zine, check it out here. Isn't that fantastic? We found a new use case, just leveraging current functionalities! We might try to highlight the details with a how-to guide soon.
Now let's check our top performing post Ads!
Top-Performing Ads
This month, the most engaging ones are:
01
[SELL] SNZ serialized inaugural issue, 3k sats (shipping to US) by @plebpoet congrats on launching this great initiative! Look forward to seeing ext one coming out!02
Easy self-hosting of a basic ecommerce store that accepts bitcoin? by @k00b that apparently opted in for @zaprite, as he was unable to find a better solution to self-host and sell zines and other products sovereignly.03
[SELL] Art piece "Reborn" by Von Bitcoin Art - Brekkie⚒️ @BVBTC (30k) by @Design_r promoting @BVBTC wonderful art masterpieces!04
[OFFER] BOLT12 Day: 12K sats for an item from the “Bullish X Alby” collection by @thebullishbitcoiner together with few other offers.05
Sats with 10% discount where @purpurato was trying to have someone pay a VPS service with PayPal and refund in sats. Glad to kow this deal has been completed successfully!06
[GIVEAWAY] Only a few hours left to post a meme to win free 21 Futures paperback by @realBitcoinDog how it went? Keep us posted!07
(SELL) Fine Art Black and White for sale by @Diego a photographer taking timeless shots. I look forward to seeing more of them framed and sold around here.
We also had so many other posts this month by @3a42879d5f, @kurszusz, @catoshi, @Coinsreporter, @BitFlio, @zapsammy and last but not the least, @whiteyfrauds, that actually posted a full list of interesting books and hacking software programs he is currently selling. Thank you all! Let's keep these trades coming and grow the Bitcoin circular economy!
Lost & Found in SN' Wild West Web
Stay with me, we're not done yet! I found plenty of other deals and offers in other territories too..
- Bitaxe 10% off code @stack_harder shared to buy within Europe.
- @plebpoet questioning What has Craigslist done for you?
- Costa Rica based Web Hosting and VPS for Bitcoin & Lightning shared by @hyperfree
- @Darthcoin remind us that there is an extensive set of options out there if you want to buy stuff with your precious sats https://stacker.news/items/775324/r/AG?commentId=776759
Wow, such an exciting month!
Active Professional Services accepting Bitcoin in the AGORA
Let us know if we miss any, here below the most memorable ones: - https://stacker.news/items/900208/r/AG @unschooled offering Language Tutoring - https://stacker.news/items/813013/r/AG @gpvansat's [OFFER][Graphic Design] From the paste editions (It's important to keep these offers available) - https://stacker.news/items/775383/r/AG @TinstrMedia - Color Grading (Styling) Your Pictures as a Service - https://stacker.news/items/773557/r/AG @MamaHodl, MATHS TUTOR 50K SATS/hour English global - https://stacker.news/items/684163/r/AG @BTCLNAT's OFFER HEALTH COUNSELING [21 SAT/ consultation - https://stacker.news/items/689268/r/AG @mathswithtess [SELL] MATHS TUTOR ONILINE, 90k sats per hour. Global but English only.
In case you missed
Here some interesting post, opening conversations and free speech about markets and business on the bitcoin circular economy:
- https://stacker.news/items/917679/r/AG Mundus Sine Caesaribus - A World Without Caesars Shirts by @k00b
- https://stacker.news/items/934100/r/AG 🛍️ Kartapio, a decentralized marketplace connecting businesses with customers. by @supratic
- https://stacker.news/items/924694/r/AG 🐢 4get is an open source search engine without data collection by @isolabellart
- https://stacker.news/items/914570/r/AG Sans is a library which supports ios/android/windows/macos/linux by @profullstack
BUYing or SELLing Cowboys Credits?
BUY or SELL them in the ~AGORA marketplace
Here's what stackers have to offers: - [SWAP] SN Cowboy credits by @DarthCoin - https://stacker.news/items/758411/r/AG by @SimpleStacker that also shares a CCs market analysis. - [BUY] 100 cowboy credits for one satoshi by @ek - Will Pay Sats For Cowboy Credits by @siggy47 - 📢 CCs to Sats Exchange Megathread recently started by @holonite, not sure why in ~bitcoin. Consider the ~AGORA next time ;)
🏷️ Spending Sunday and Selling weekly?
Share your most recent Bitcoin purchases of just check what other stackers are buying with their sats! All series available here: Or read the latest one from https://stacker.news/items/935969/r/AG
We also kickstarted a new weekly series titled What have you sold for Bitcoin this week?. It has been, and will be, going out every Thursday. Subscribe to our @AG0RA
bot
to don't miss the reminders!
Create your Ads now!
Looking to start something new? Hit one of the links below to free your mind:
- 💬 TOPIC for conversation,
- [⚖️ SELL] anything! or,
- if you're looking for something, hit the [🛒 BUY]!
- [🧑💻 HIRE] any bitcoiner skill or stuff from bitcoiners
- [🖇 OFFER] any product or service and stack more sats
- [🧑⚖️ AUCTION] to let stackers decide a fair price for your item
- [🤝 SWAP] if you're looking to exchange anything with anything else
- [🆓 FREE] your space, make a gift!
- Start your own [SHOPFRONT] or simply...
- [⭐ REVIEW] any bitcoin product or LN service you recently bought or subscribed to.
Or contact @AGORA team on nostr DM, and we can help you publish a personalized post.
.
#nostr
#bitcoin
#stuff4sats
#sell
#buy
#plebchain
#grownostr
#asknostr
#market
#business
originally posted at https://stacker.news/items/937858
-
@ edeb837b:ac664163
2025-04-08 11:24:58In today’s fast-paced, hyper-connected world, investing is no longer a solo sport.
The rise of social investing has transformed the way people trade, learn, and grow their wealth. Whether you're a seasoned trader or just getting started, chances are you've already encountered social investors—on Twitter, Discord, Reddit, or even in group chats. But who exactly are they? And why is NVSTly the go-to platform for this new wave of investors?
Let’s break it down.
What is a Social Investor?
A social investor is someone who engages in trading or investing with a strong focus on community, transparency, and collaboration.
They're not just buying and selling behind closed doors. They're:
- Sharing trades and strategies in real time
- Following top traders to learn from their wins (and losses)
- Collaborating with others in Discord servers, Telegram groups, and social media threads
- Using data-driven insights from the crowd to sharpen their own edge
Social investors believe that trading is better together—and they’re not wrong.
What Do Social Investors Do?
Social investors operate at the intersection of finance and social media. Here's what their day-to-day might look like:
✅ Share Trades Publicly
They log and post their trades for the community to see—building trust, accountability, and transparency.
✅ Follow Traders They Trust
They find top-performing traders or those with a style that resonates, then follow their moves to learn, mirror, or improve their own game.
✅ Collaborate & Discuss
Social investors thrive on conversation—sharing opinions, chart analysis, market sentiment, and more.
✅ Track Performance Over Time
Many use dashboards to measure their win rates, gain/loss ratios, and trade history to keep improving.
So… How Does Social Investing Actually Work?
At its core, social investing works like this:
-
Connect with the Community
Whether it’s a Discord server, app, or forum—start engaging. -
Log & Share Trades
Share your trade ideas, entries/exits, or even link your brokerage to auto-share your trades in real-time. -
Follow & Learn from Others
Use leaderboards, performance stats, and trade insights to follow top traders or promising new ones. -
Analyze and Improve
Get real-time feedback, stats, and charts to refine your strategy and grow your edge.
That’s where NVSTly comes in.
Why NVSTly is the Best Platform for Social Investors
NVSTly wasn’t just built for social investors—it was built by them.
Whether you're day trading crypto, swinging options, or investing long-term in stocks, NVSTly gives you everything you need to track, share, analyze, and grow—together.
Here’s what makes NVSTly stand out:
-
🚀 Real-Time Trade Sharing
Trades post instantly—on the app, and even in Discord—so your followers are always in the loop. -
📈 POV Charts
Our unique Point-of-View Chart shows the exact candlestick where a trader made a move. No more guessing—you see the strategy play out visually. -
🧠 Advanced Trade Insights
Dive into trade performance with key stats like win rate, average gain/loss, long vs short ratio, and even drawdowns. -
🌎 Global Leaderboards
See who’s crushing it across the platform, by day, week, month, or all-time. Filter by asset class, strategy, and more. -
🔗 Broker & Exchange Integration
Automatically track your trades from brokerages like Webull (with more on the way). No more manual input—just connect and go. -
📲 Multi-Platform Access
Use NVSTly on Web, iOS, Android—and even directly inside Discord via the NVSTly Bot. (Telegram support coming soon!) -
📣 Instant Social Sharing
Auto-post your trades to Discord, X (Twitter), and other platforms the moment they happen. Build your brand while you trade.
Social Investing is the Future. NVSTly is the Hub.
Whether you’re looking to grow your audience, follow expert traders, or just become more disciplined in your own trading, NVSTly is where social investors thrive.
Join 50,000+ traders who believe that sharing trades isn’t just about clout—it’s about accountability, growth, and community.
Ready to Social Trade?
Create your free account today and become part of the fastest-growing social trading platform in the game.
👉 Start Trading with NVSTly on the web, iOS, Android, or through the Discord app/bot.
-
@ f683e870:557f5ef2
2025-04-08 11:13:27When it comes to the Nostr Web of Trust, several NIPs have been proposed, but the one that seemed to gather the most traction was Trusted Assertion by Vitor Pamplona.
The idea is to have
kind:30382
represent assertions made about an entity, which could be a pubkey, for example. The NIP also specifies a tag calledrank
, which can be used to build some basic WoT primitives.Example event:
{ "kind": 30382, "tags": [ ["d", "e88a6...50411"], ["rank", "89"], ["zap_amt_sent", "1000000"], ], "content": "", //... }
However, we quickly realized that this NIP was too limiting for what we wanted to accomplish: real-time, personalized ranking.
To illustrate our different approaches, we will show how to replicate our Verify Reputation with trusted assertions.
Verify Reputation
Verify Reputation returns:
- the rank, follow count and followers count of the given
target
- its top followers by rank.
All ranks are personalized to the given
source
.This “batteries included” solution helps users avoid impersonation and fraud with a single request, no matter what application they are using, be it a kind:1 client, chat app, wallet, marketplace, or more.

To get the same result with trusted assertions, you would have to
- Get all contact lists that contain the
target
(as ap
tag) - Build the target’s
follower
list from those event authors - Get the trusted assertions for the target and each of the followers
- Sort them by the rank provided by the trusted assertions
This operation is computationally expensive, especially on mobile devices. It is clear that if the user is willing to verify and process a large number of events (potentially +100k), he can compute some (rudimentary) ranking directly on the device, without the need to trust a third party.
More generally, trusted assertions are very hard to use when one doesn’t know the pubkeys of the people he’s looking for. This goes fundamentally against our approach of Web of Trust, as a powerful mechanism for discovery.
Are you looking to add Web of Trust capabilities to your app or project?
- the rank, follow count and followers count of the given
-
@ 2b24a1fa:17750f64
2025-04-08 11:01:09Was haben wir damals gelacht, als jede „Miss“ ihren Wunsch nach Weltfrieden artikulierte, um ihre Chancen, zur Welt Schönsten gekürt zu werden, zu erhöhen. Was wird heute gewünscht? Solidarität? Zusammenhalt gegen den Feind? Stärke? Ich weiß es nicht.
https://soundcloud.com/radiomuenchen/alle-waffen-still-gestanden/s-pmO0oieSdzK?
Ich weiß nur, dass sich Intellektuelle, Künstler, Bürger durch alle Schichten wegen zunehmender Kriegsrhetorik, Aufrüstungspläne und Rekrutierungsideen große Sorgen um unser friedliches Zusammenleben machen. So lebt auch unsere lose Reihe „friedensnoten“ wieder auf. Hören Sie heute „Alle Waffen stillgestanden!“ des Liederpoeten Yann Song King. Der inspirierte den Philosphen- und Radialfeldforscher Uli Fischer zu einem Text den Ulrich Allroggen für uns eingelesen hat.
-
@ 2b24a1fa:17750f64
2025-04-08 10:57:20Mux, die Hauptfigur im Film „Muxmäuschenstill“ von 2004, leidet an Rechthaberitis. Das geht so weit, dass er quasi als Verschmelzung von Denunziant, Kläger, Richter und Henker in Eigenregie Leute bestraft, die Gesetze oder Regeln verletzen - egal ob jemand zu schnell fährt, in der U-Bahn ohne Fahrschein fährt, Graffiti sprüht oder Ladendiebstahl begeht. Mux geht mit seiner Sichtweise zwar gesetzeskonform, aber er hat kein Mandat für seine Übergriffe, sagte kürzlich sinngemäß der Drehbuchautor Jan Henrik Stahlberg in einem Interview. Diese Blockwart-Mentalität verbindet man automatisch mit dem Dritten Reich, doch ihre Wurzeln liegen tiefer. In ihr steckt zugleich eine Sehnsucht nach Einigkeit wie sie Stahlberg auch in der bürgerlichen Bewegung der Romantik erkennt.
https://soundcloud.com/radiomuenchen/corona-schicksale-ein-buch-von-eugen-zentner?
Die Kehrseite dieses Harmoniestrebens ist eine Aversion gegen Differenzen, gegen abweichendes Verhalten und der Drang, dagegen vorzugehen. Nicht umsonst attestiert man den Deutschen eine starke Neigung zur Prozesshanselei. Im Alltag der meisten Leute hielten sich deren Auswüchse noch in Grenzen. Dann kam Corona. Während der sogenannten Pandemie wurde Mux zum Standard-Typus, zur Monika Mustermann des Mainstream. Die Folgen durften viele von uns am eigenen Leib erfahren. Eugen Zentner erinnert daran anhand von 15 exemplarischen Kurzgeschichten in seinem Buch „Corona-Schicksale“, das im März erschienen ist:\ www.masselverlag.de/Programm/Corona-Schicksale/
Unser Autor Jonny Rieder hat das Buch gelesen.
Sprecher: Karsten Troyke.
Redaktion: Jonny Rieder
Bild: Ania Hardukiewicz / Massel Verlag
Radio München\ www.radiomuenchen.net/\ @radiomuenchen\ www.facebook.com/radiomuenchen\ www.instagram.com/radio_muenchen/\ twitter.com/RadioMuenchen\ odysee.com/@RadioMuenchen.net:9\ rumble.com/user/RadioMunchen
Radio München ist eine gemeinnützige Unternehmung.\ Wir freuen uns, wenn Sie unsere Arbeit unterstützen.
GLS-Bank\ IBAN: DE65 4306 0967 8217 9867 00\ BIC: GENODEM1GLS\ Bitcoin (BTC): bc1qqkrzed5vuvl82dggsyjgcjteylq5l58sz4s927\ Ethereum (ETH): 0xB9a49A0bda5FAc3F084D5257424E3e6fdD303482
-
@ 2b24a1fa:17750f64
2025-04-08 10:52:10Eine Kolumne von Michael Sailer, jeden ersten Freitag bei Radio München, nachzulesen auf sailersblog.de.
https://soundcloud.com/radiomuenchen/belastigungen-34-die-zeit-der-toten-stadte?
-
@ 2b24a1fa:17750f64
2025-04-08 10:49:21Wie praktisch, das Smartphone, das ohnehin in der Hand liegt, etwas gegen den Scanner neigen: Bezahlung erfolgt! Die Bewusstheit aber, was mit dem Zurückdrängen des Bargeldes an Freiheitsverlusten einhergehen, steckt wahrlich in den Kinderschuhen. Muss zuerst ein Stromausfall die Bezahlungen verunmöglichen? Müssen wir erst auf ein Creditsystem warten, das uns den Kauf von unliebsamen Produkten verweigert um zu verstehen, dass Bargeld ein großes Stück Freiheit bedeutet?
Es sind nicht nur die alten Menschen, die am Bargeld hängen, weil ihnen das Digitale fremd ist. Immer noch etwa die Hälfte aller Geschäfte werden bar abgewickelt. Und jetzt erhalten die Verteidiger des Bargeldes unverhofft Unterstützung: die Verbraucherzentrale, denn Euro Banknoten und Münzen sind gemäß § 14 1 Satz 2 des Gesetzes über die Deutsche Bundesbank gesetzliches Zahlungsmittel. Das bedeutet, dass die Banknoten und Scheine prinzipiell von jedermann zur Begleichung von Geldforderungen akzeptiert werden müssen. Häufig aber wird in Restaurants und Cafés beispielsweise kein Bargeld mehr annehmen. Deshalb ruft die Verbraucherzentrale seit kurzem dazu auf, Bargeldablehnungen mit einem eigens dafür eingerichteten Formular zu melden.
Hören Sie hierzu Norbert Härings Text „Verbraucherzentrale dokumentiert Bargeldablehnung“, der zunächst auf seinem Blog erschienen war. norberthaering.de/bargeld-widersta…entrale-bargeld/
Sprecher: Karsten Troyke
Bild: Radio München
www.radiomuenchen.net/\ @radiomuenchen\ www.facebook.com/radiomuenchen\ www.instagram.com/radio_muenchen/\ twitter.com/RadioMuenchen
Radio München ist eine gemeinnützige Unternehmung.\ Wir freuen uns, wenn Sie unsere Arbeit unterstützen.
GLS-Bank\ IBAN: DE65 4306 0967 8217 9867 00\ BIC: GENODEM1GLS\ Bitcoin (BTC): bc1qqkrzed5vuvl82dggsyjgcjteylq5l58sz4s927\ Ethereum (ETH): 0xB9a49A0bda5FAc3F084D5257424E3e6fdD303482
-
@ 4cebd4f5:0ac3ed15
2025-04-08 10:01:51HackSecret 5 vừa kết thúc thành công, giới thiệu những tiến bộ đột phá trong lĩnh vực ứng dụng phi tập trung (dApps). Với 142 nhà phát triển đăng ký, sự kiện nhấn mạnh khả năng xử lý dữ liệu bảo mật của Secret Network. Tổng cộng 53 dự án đã được phê duyệt trên nhiều hạng mục, nổi bật như Secret AI, ứng dụng Autonomys Network, dApps đa chuỗi (cross-chain) và ứng dụng gốc trên Secret Network.
Sự kiện ghi nhận nhiều thành tựu đáng chú ý, bao gồm các dự án sử dụng Secret AI SDK để đảm bảo tính bảo mật và khung Autonomys Network cho các tác nhân mạng xã hội có thể xác minh. Các nhà phát triển cũng khám phá ứng dụng điện toán phi tập trung, tập trung vào tương tác dữ liệu an toàn giữa các blockchain như Cosmos, EVM và Solana.
Những đổi mới trong dịch vụ tài chính tích hợp AI và tác nhân AI bảo mật đã giải quyết các lĩnh vực như y tế và hỗ trợ pháp lý, qua đó làm nổi bật tiềm năng của điện toán bảo mật phi tập trung trong việc bảo vệ ứng dụng Web3. Hackathon với tổng giải thưởng $15,000 đã khẳng định vai trò ngày càng lớn của công nghệ phi tập trung trong việc nâng cao quyền riêng tư và an ninh dữ liệu.
Các dự án chiến thắng
Giải dApps Secret AI
Danh mục này tôn vinh các dApp sử dụng Secret AI SDK của Secret Network, tích hợp lớp bảo mật với DeepSeek để tương tác API:
- Sentinex: Nền tảng đa tác nhân bảo vệ DeFi và token launch bằng Secret SDK.
- Secret AI Accountant System: Hệ thống quản lý sổ mua hàng với điện toán bảo mật trên blockchain.
- JS SDK for Secret AI: Thư viện JavaScript truy cập API vào các mô hình AI bảo mật Secret.
- Conflux-AI: Nền tảng giao dịch AI tập trung vào mô hình đào tạo phi tập trung, bảo mật.
- DocAssist: Phân tích dữ liệu bệnh nhân bằng LLM thông qua Secret AI SDK.
- codeforgeai: Hệ sinh thái phi tập trung cho công cụ phát triển tích hợp AI và blockchain.
- Secret AI Writer: Kết hợp tạo nội dung AI với lưu trữ blockchain an toàn.
- autonomous-copilot: Quản lý lưu trữ dữ liệu bằng công nghệ phi tập trung.
- SecureChat AI: Hỗ trợ giao tiếp mã hóa và tương tác dựa trên AI.Giải dApps Native Secret
Các dApp được xây dựng trực tiếp trên Secret Network, tận dụng tính năng riêng tư mặc định:
- Unchained Poker: Sàn poker trực tuyến sử dụng hợp đồng bí mật để giảm gian lận.
- HabiChain: Kết hợp phân tích hành vi và blockchain để nâng cao bảo mật dữ liệu trong hỗ trợ sức khỏe tâm thần.Giải Unstoppable AI Agents
Các dự án sử dụng Autonomys Agents Framework cho tương tác mạng xã hội và bộ nhớ trên chuỗi:- AgentMint.AI: Tạo meme coin tự động hóa bằng AI và tích hợp mạng xã hội.
- Aetherlink: Hỗ trợ khám phá nội dung trên mạng phi tập trung.
- Pixel Lock: Mã hóa và lưu trữ hình ảnh phi tập trung, thách thức lưu trữ đám mây truyền thống.
- Conflux-AI: Cũng được ghi chú trong Secret AI dApps track.
Giải Autonomys Track 2: Build with Auto Drive
Tập trung vào lưu trữ dữ liệu lâu dài thông qua nền tảng Auto Drive:
- autonomous-copilot (đã được đề cập trước đó).
- Decentralized Collaborative File Repository (DCFR): Nền tảng quản lý tệp phi tập trung được quản trị bởi DAO.Thông tin về đơn vị tổ chức
Secret Network:
Secret Network là giao thức blockchain tập trung vào quyền riêng tư, nâng cao tính bảo mật cho ứng dụng phi tập trung. Nổi tiếng với hợp đồng thông minh an toàn, Secret Network đã phát triển nhiều công nghệ như SecretSwap và Secret NFTs. Tổ chức cam kết thúc đẩy quyền riêng tư và bảo mật dữ liệu, mang lại môi trường an toàn cho nhà phát triển và người dùng.Xem thêm chi tiết về các dự án tại trang HackSecret 5 Projects.
-
@ f1577c25:de26ba14
2025-04-08 09:26:26النهاردة هنتكلم عن طريقة استثمار مختلفة: إزاي تستثمر في الدهب جوه مصر. فيه طريقتين: يا إما تشتري الدهب من محلات الصاغة يا إما تستثمر أونلاين (زي صندوق AZG). أنا بفضل الطريقة الأونلاين عشان سهلة والحد الأدنى للاستثمار أقل بكتير، بس فيه عمولة سنوية. هشرح مميزات وعيوب كل طريقة بالتفصيل.
الدهب الحقيقي
المميزات
- استثمار في أصل حقيقي تقدر تلمسه
- مش محتاج أوراق ولا كارت بنك عشان تشتري
العيوب
- محتاج مكان آمن تخزنه فيه (بيتك أو خزنة في البنك)
- الحد الأدنى للاستثمار عالي (جرام أو ربع جرام)
- ممكن تشتري دهب مغشوش لو مشتريتش من مكان موثوق فيه
الدهب الإلكتروني
المميزات
- سهل وسريع في الشرا والبيع
- الورق المطلوب بسيط (صورة البطاقة بس)
- تقدر تستثمر بفلوس قليلة
العيوب
- العمولات السنوية عالية شوية
المنصات
للشرا أونلاين، أنا عارف بس منصة AZG سواء عن طريق AZinvest أو من خلال برامج التداول زي ثاندر. بنصح باستخدام AZinvest عشان أسهل وكل الإجراءات بتتم أونلاين، أما منصة ثاندر فمحتاجة توقع ورق وبتاخد وقت أطول.
منصة AZinvest
ده تطبيق تابع لشركة أزموت (اللي مالكة صندوق الدهب وصناديق استثمارية تانية). الخطوات سهلة: 1. تنزل التطبيق 2. تسجل باستخدام صورة البطاقة 3. توقع العقد أونلاين 4. تحط فلوس عن طريق التحويل البنكي (إنستاباي) أو كارت البنك
المشكلة الوحيدة هي عمولة السحب (2 جنيه لبنك مصر، وأكتر للبنوك التانية). ممكن تتجنب العمولة دي لو سجلت من خلال منصة تانية زي ثاندر.
ويمكن شئ تاني و هو مواعيد الشراء و البيع و هي من كل اثنين لخميس لو عملت امر البيع قبل 12 الظهر هيبقي بنفس اليوم ولكن لو بعد يبقي تاني يوم (+ يوم او يومين عمل لو سحب لحسابك البنكي) بس دا كله يعتبر متوقع و طبيعي بس هي لو حاطط في بالك هتبقي بسرعة
و ملحوظة مهمة لما تيجي تبيع حصص في كل مرة هيخصموا عمولة الصندوق 4.9% فا حاول لو هتخرج خالص بيع كلة مرة واحدة و العمولة بتقل كل سنة لحد التالتة او الرابعة بتبقي من غير عمولة
ادعمني (اختياري)
- USDT (TRC20):
TKQ3Uwkq21ntiua2Zh9Hu376fdMdnRGWN6
شوف الكومنتات لو فيه أي تعديل أو بوستات جديدة.
-
@ 4cebd4f5:0ac3ed15
2025-04-08 08:58:16Sonic DeFAI Hackathon vừa chính thức khép lại, đánh dấu bước tiến đột phá trong hệ sinh thái blockchain của Sonic với sự tham gia của 822 nhà phát triển và 47 dự án công nghệ. Trong 4 tuần tranh tài, các đội thi đã cạnh tranh cho tổng giải thưởng $295,000 bằng cách xây dựng AI agents (tác nhân trí tuệ nhân tạo) sáng tạo, tập trung vào nâng cao DeFAI (Decentralized Finance powered by AI) thông qua hoạt động xã hội và giao dịch trên chuỗi.
CÔNG NGHỆ NỔI BẬT CỦA SONIC
Các dự án triển khai AI agents tự động đã tận dụng tối đa nền tảng Zerebro và framework mã nguồn mở ZerePy, khẳng định ưu thế của Sonic:
- Hiệu suất vượt trội: Xử lý 10,000 giao dịch/giây (TPS) với thời gian xác thực dưới 1 giây.
- Tích hợp thanh khoản liền mạch với Ethereum.Ban giám khảo – bao gồm Michael Kong (CEO Sonic Labs) và các chuyên gia hàng đầu – đánh giá dự án dựa trên:
- Chất lượng triển khai công nghệ
- Thiết kế & tính sáng tạo
- Tiềm năng tác động
DANH SÁCH DỰ ÁN ĐOẠT GIẢI
Best Agent Overall Prize Winners
- Shogun: DeFAi super vault's Giao thức DeFi điều khiển bởi AI, tối ưu hóa lợi nhuận thông qua phân bổ vốn linh hoạt và tái cân bằng danh mục trên các vault phi tập trung.
- Nuvolari.Ai Trợ lý tài chính cá nhân sử dụng AI agents để nâng cao quyết định tài chính trên chuỗi.
- Hyper Sonic Trung tâm phi tập trung cho sáng tạo meme coin, tích hợp sàn cá cược, launchpad và tính năng AI.
- Paintswap Game Engine Ứng dụng Web3 cho phép tạo game thông qua lệnh AI, dân chủ hóa quy trình phát triển game.
- SUPERSONIC
Nền tảng AI tự động hóa việc phát hiện cơ hội arbitrage trong hệ sinh thái Web3.
Best Social Agent Prize Winners
- Memegents Kết hợp AI và blockchain để tạo AI agents cá nhân hóa và token tiền mã hóa.
- deChat: AI-Powered DeFi Interface for Sonic Giao diện chat AI đơn giản hóa tương tác DeFi bằng lệnh ngôn ngữ tự nhiên.
- CurtAIs Tác nhân xã hội hỗ trợ onboarding vào Sonic Labs thông qua cơ sở tri thức tích hợp Telegram.
Best DeFAI Agent Prize Winners
- SonicChat Nền tảng tích hợp quản lý ví, phân tích giao dịch và thông tin chi tiết từ AI.
- NoRugz Hỗ trợ tạo và quảng bá memecoin với tích hợp mạng xã hội.
- Shiami - DeFAI for Everyone on Sonic
Chatbot trực quan hóa thao tác DeFi trên Sonic cho người dùng phổ thông.
Best Tooling Agent Prize Winners
- Sonic's Risk Watch Cung cấp đánh giá rủi ro và tối ưu hóa danh mục trong hệ sinh thái Sonic.
- Knowscroll Chuyển đổi mạng xã hội thành trải nghiệm học tập vi mô với nội dung tạo bởi AI.
Best deBridge Integration Prize Winners
- Crème'ai Cố vấn danh mục AI, tối ưu quản lý tiền mã hóa qua dữ liệu thời gian thực.
- deChat: AI-Powered DeFi Interface for Sonic Nền tảng AI tự động hóa tương tác DeFi bằng xử lý ngôn ngữ tự nhiên.
- DogBone
Một nền tảng hỗ trợ AI giúp đơn giản hóa các tương tác DeFi bằng cách sử dụng tự động hóa và xử lý ngôn ngữ tự nhiên.
Best Allora Integration Prize Winners
- Sonic TradeZo Một trò chơi cá cược phi tập trung, ẩn danh do AI điều khiển có sự tham gia của các tác nhân giao dịch AI.
- Shogun: DeFAi super vault's
- AIm — Artificial Intelligence Manager
Tự động tạo AI agents DeFi để tối ưu tương tác tài chính trên Sonic.
DWF Labs Sponsored Track Prize Winners
- Shogun: DeFAi super vault's
- Crème'ai
- EdgerAI
Chiến lược giao dịch dựa trên tín hiệu xã hội và hợp đồng thông minh.
Xem toàn bộ dự án tại: Sonic DeFAI Hackathon.
VỀ NHÀ TỔ CHỨC: SONIC LABS
Sonic Labs chuyên về các giải pháp blockchain, tận dụng chuyên môn sâu rộng về công nghệ phi tập trung. Tổ chức đã phát triển các dự án nâng cao bảo mật dữ liệu và hiệu quả giao dịch và được công nhận vì tạo ra cơ sở hạ tầng blockchain có khả năng mở rộng và triển khai hợp đồng thông minh. Hiện tại, Sonic Labs tập trung vào việc mở rộng tác động của mình trên nhiều lĩnh vực khác nhau bằng cách dẫn đầu các sáng kiến tích hợp công nghệ blockchain liền mạch.
-
@ 866e0139:6a9334e5
2025-04-08 08:52:09
Autor: Lionne Douce. (Bild: Florian Simon Eiler). Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier.**
LASSEN SIE DER FRIEDENSTAUBE FLÜGEL WACHSEN!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt. (Vorerst an alle, da wir den Mailversand testen, später ca. drei Mails pro Woche.).
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: milosz@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ b32cc539:52a58281
2025-04-08 08:43:27This is a second test
-
@ 2791e524:cec69698
2025-04-08 08:42:07This is a test
-
@ 7c05c4f6:50d03508
2025-04-08 07:34:05Tensions over global trade policy are once again in the spotlight. China’s newly announced 34% retaliatory tariff—and the U.S. response threatening a 50% hike—signal an escalating standoff with global implications. This sharp exchange is more than just diplomacy; it highlights how tariffs, subsidies, and trade barriers are being used as instruments of economic pressure.
The ripple effects are clear. From semiconductors to clean energy, businesses are reassessing supply chains, creators are facing funding hurdles, and innovation is being shaped by forces far beyond individual control. In this unstable landscape, new models are quietly taking shape. The fusion of artificial intelligence (AI) and decentralized finance (DeFi) is offering individuals and teams a different kind of toolkit—one built around autonomy, resilience, and global collaboration.
The Role of Decentralization: A Financial Foundation Against Policy Volatility Though it may no longer dominate headlines, DeFi has not faded. Instead, it has been evolving in the background—building solid infrastructure for cross-border payments, digital asset governance, and creator-centric economic models. As traditional financial systems grow increasingly entangled with political and regulatory challenges, DeFi’s promises of borderless, low-barrier, and verifiable value exchange are regaining attention. The Create-to-Earn model, for instance, enables users around the world to collaborate and transact directly. Smart contracts on-chain ensure fair distribution of revenue and ownership—without the need to rely on centralized intermediaries or platforms.
Consider an AI artist who uploads their work to a decentralized platform and transacts with overseas users, free from the constraints of legacy payment systems or account bans. This peer-to-peer system breathes liquidity into the creator economy.
Cooker.club are exploring this direction—building creative and incentive networks rooted in DeFi logic to offer a more sustainable and resilient infrastructure for digital creators.
Strategic Significance: A Hedge for Digital Creators As global trade frictions intensify and regulatory barriers rise, digital creators, AI teams, and independent developers are seeking a more neutral, self-sustaining model for their work.
The convergence of AI and DeFi is not only a technical solution—it points toward a governance philosophy. Through transparency in algorithms, rules, and on-chain data, such systems break free from the limits of traditional platforms and offer a foundation for adaptive, global collaboration.
Built on distributed architecture, these networks resist centralized control and remain operational in environments of high regulatory pressure—making them increasingly relevant as mechanisms of digital resilience.
Conclusion In a world trending toward fragmentation, the value of open and resilient networks grows stronger. The emerging intersection of AI and DeFi is becoming a vital infrastructure for connecting people, value, and opportunity beyond borders. For creators and builders alike, we may not be able to eliminate global uncertainty—but we can respond structurally: with open protocols, intelligent incentives, and transparent collaboration. This is the vision that Cooker.club is exploring—and we look forward to shaping this future together with a wider community of pioneers.
-
@ 4cebd4f5:0ac3ed15
2025-04-08 07:04:49EurekaHACKS – hackathon thường niên kéo dài 12 giờ dành riêng cho học sinh trung học – đã chính thức khép lại tại Trường Trung học Abbey Park (Oakville, Canada) với sự tham gia của 92 lập trình viên trẻ cùng 51 dự án công nghệ ấn tượng. Đây là sự kiện quy mô nhất tại khu vực Halton, không chỉ tạo ra môi trường cạnh tranh sôi động mà còn trao cơ hội trải nghiệm thực tế thông qua các workshop đa dạng và tổng giải thưởng lên đến 7,000 USD.
HÀNH TRÌNH 12 GIỜ: THỬ THÁCH & ĐỘT PHÁ
Với chủ đề đa dạng, các đội thi đã phát triển sản phẩm công nghệ tập trung vào giải pháp địa phương, sáng tạo và tính ứng dụng thực tiễn. Tiêu chí đánh giá bao gồm:
- Chất lượng kỹ thuật
- Tính khả thi
- Khả năng trình bàyCơ cấu giải thưởng nổi bật:
- Best Overall Hack: Bambu Lab A1 Minis (Máy in 3D cao cấp).
- Runner’s Up Hacks: Bàn phím cơ Red Dragon.
- Giải thưởng phụ: Từ "Tác động địa phương" đến "Sáng tạo kỹ thuật", cùng ưu đãi tín dụng cho dự án sử dụng Internet Computer Protocol (ICP) (500 USD) và Vectara (300 USD).
CÁC DỰ ÁN ĐOẠT GIẢI: CÔNG NGHỆ PHỤC VỤ CỘNG ĐỒNG
Hạng mục chính
-
Best Overall Hack: FaunaDex Ứng dụng khuyến khích khám phá thiên nhiên bằng AI nhận diện động vật kèm thông tin chi tiết, thúc đẩy hoạt động ngoài trời và học tập.
-
Runner’s Up Hack: ArcaneStep****
Trò chơi web kết hợp vận động thực tế: Trẻ em tích lũy "mana" bằng cách đi bộ để thực hiện phép thuật, giảm thời gian sử dụng màn hình. - Ultimate Coder Third Place: LocalLink*
Nền tảng kết nối người dùng tại không gian ngoài trời thông qua *công nghệ địa không gian, tạo tương tác trực tiếp và xây dựng cộng đồng. - Best Local Impact: Gems
Giao diện bản đồ giúp người dùng khám phá và chia sẻ địa điểm độc đáo, nâng cao trải nghiệm đô thị. - Most Grass Touching: Greenlight
Ứng dụng gamification thưởng điểm khi người dùng tập thể dục hoặc tương tác với thiên nhiên. - Best Pitch: The Moss Garden
Website chủ đề thiên nhiên cải thiện năng suất bằng cách tăng cường tập trung và sức khỏe tinh thần. - Ultimate Coder Best Young Hacker: socialize.ai****
Trợ lý AI hỗ trợ tương tác xã hội thông qua gợi ý hội thoại và tìm kiếm hình ảnh ngược.
Xem toàn bộ dự án tại: EurekaHacks 2025 Buidl Page.
VỀ NHÀ TỔ CHỨC: EUREKAHACKS
Là đơn vị tiên phong thúc đẩy đổi mới công nghệ, EurekaHACKS tập trung vào phát triển blockchain và ứng dụng phi tập trung (dApp). Thông qua các hackathon và chương trình đào tạo, tổ chức này kết nối chuyên gia, hỗ trợ dự án cộng tác và ươm mầm nhân tài công nghệ trẻ. Định hướng hiện tại của EurekaHACKS là thúc đẩy giải pháp bền vững, kết hợp giáo dục và sự kiện chuyên sâu.
-
-
@ da0b9bc3:4e30a4a9
2025-04-08 06:55:42Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/937802
-
@ 57d1a264:69f1fee1
2025-04-08 06:39:52originally posted at https://stacker.news/items/937791
-
@ 4cebd4f5:0ac3ed15
2025-04-08 06:14:10Từ ngày 10 đến 14/02/2025, ETHiopia x BAM Hackathon đã chứng kiến sự hội tụ của 108 nhà phát triển và nhà đổi mới hàng đầu châu Phi, cùng nhau khám phá tiềm năng công nghệ Ethereum. Sự kiện không chỉ là nơi trình diễn kỹ thuật xuất sắc mà còn là cầu nối thúc đẩy giải pháp blockchain thực tiễn, với 38 dự án được phê duyệt.
HÀNH TRÌNH SÁNG TẠO: TỪ Ý TƯỞNG ĐẾN GIẢI PHÁP
Trong 5 ngày làm việc căng thẳng, các đội thi đã tham gia chuỗi hoạt động đa dạng:
- Hội thảo chuyên sâu về phát triển hợp đồng thông minh Solidity, cập nhật xu hướng công nghệ mới.
- Phiên tương tác xây dựng kỹ năng sáng tạo, thúc đẩy tư duy giải quyết vấn đề.
- Thử thách xây dựng sản phẩm tập trung vào ứng dụng thực tế, đặc biệt trong lĩnh vực tài chính phi tập trung (DeFi), quản trị cộng đồng và sáng tạo nội dung.Ban giám khảo đánh giá dự án dựa trên ba tiêu chí chính: chất lượng mã nguồn, tính tương tác cộng đồng và khả năng trình bày. Tổng giải thưởng 2,000 USDC đã được trao cho những đội vượt trội, ghi nhận nỗ lực đóng góp vào hệ sinh thái Ethereum toàn cầu.
CÁC DỰ ÁN ĐOẠT GIẢI:
Hạng mục ETHiopia X Circles Prize
-
Giải Nhất: Ethera
*Ethera là một nền tảng blockchain giúp tăng cường khả năng kiếm tiền cho những người sáng tạo nội dung ở Châu Phi thông qua các giao dịch công bằng, không biên giới. -
Giải Nhì: ETHqub
Dự án đang được cập nhật thông tin.
Hạng mục ETHiopia x BAM General Hackathon
- Giải Nhất: Imara
*Imara khuyến khích hình thành nhóm phi tập trung và cam kết dự án trong các dự án blockchain thông qua cơ chế staking. - Giải Nhì: Hakiba
*Hakiba cung cấp một giao thức phi tập trung cho tín dụng cộng đồng thông qua việc staking, chứng thực và bảo hiểm trên chuỗi. - Giải Ba: ETHqub
Thông tin chi tiết sẽ được công bố trong thời gian tới.
Khám phá toàn bộ dự án tại: DoraHacks.
THÔNG TIN VỀ ĐƠN VỊ TỔ CHỨC:
- BAM (Bold African Movement) – BAM tập trung vào việc thúc đẩy công nghệ và các giải pháp blockchain. Được biết đến với khả năng tích hợp blockchain vào nhiều lĩnh vực khác nhau, BAM đã dẫn đầu các dự án cải thiện hiệu quả hoạt động và tính minh bạch. Tổ chức này áp dụng phương pháp tiếp cận hợp tác để thúc đẩy các cải tiến công nghệ và cam kết phát triển cơ sở hạ tầng blockchain an toàn, có khả năng mở rộng để đáp ứng nhu cầu của ngành.
Thông tin liên hệ:
- Website: joinbam.xyz
- Theo dõi cập nhật từ ETHiopia: Twitter @ETHiopia_DAO -
-
@ f6488c62:c929299d
2025-04-08 05:09:55Galaxy Digital บริษัทบริการทางการเงินด้านคริปโตชื่อดัง กำลังเขย่าวงการครั้งใหญ่ หลังได้รับการอนุมัติจากสำนักงานคณะกรรมการกำกับหลักทรัพย์สหรัฐฯ (SEC) ให้ย้ายฐานการดำเนินงานจากหมู่เกาะเคย์แมนมายังรัฐเดลาแวร์ และเตรียมขึ้นทะเบียนในตลาดหลักทรัพย์ Nasdaq ภายในเดือนพฤษภาคมนี้
นี่ไม่ใช่แค่การเปลี่ยนที่อยู่ แต่คือการส่งสัญญาณชัดเจนถึงความพยายามยกระดับตัวเองให้เข้าใกล้ "ระบบการเงินกระแสหลัก" และผลักดันให้คริปโตเป็นที่ยอมรับมากขึ้นในสายตานักลงทุนและหน่วยงานกำกับดูแล
จุดเปลี่ยนที่สาวกคริปโตควรจับตา
การย้ายฐานไปเดลาแวร์ ไม่ใช่แค่เพื่อความสะดวกทางกฎหมายเท่านั้น แต่ยังเปิดประตูสู่การสร้างสัมพันธ์กับนักลงทุนสหรัฐฯ และสถาบันการเงินรายใหญ่ที่เคยลังเลกับความโปร่งใสของวงการคริปโต การได้ไฟเขียวจาก SEC จึงเท่ากับได้ "ตรายางความน่าเชื่อถือ" ไปในตัว
และที่สำคัญที่สุดคือ การขึ้นทะเบียนใน Nasdaq ซึ่งเป็นตลาดหุ้นระดับโลก จะทำให้ Galaxy Digital เข้าถึงเม็ดเงินลงทุนมหาศาล ทั้งจากนักลงทุนสถาบันและรายย่อยที่ต้องการลงทุนในสินทรัพย์ดิจิทัลผ่านบริษัทที่มีสถานะทางกฎหมายชัดเจน
คลื่นลูกใหม่แห่งวงการคริปโต
ไมค์ โนโวกรัตซ์ ซีอีโอของ Galaxy Digital กล่าวอย่างมั่นใจว่า นี่คือ "ใบเบิกทาง" สู่การเติบโตในระยะยาว และไม่ใช่แค่ Galaxy เท่านั้นที่จะได้รับประโยชน์ แต่ทั้งอุตสาหกรรมคริปโตก็จะได้แรงส่งจากเหตุการณ์นี้ด้วย
เพราะการเคลื่อนไหวครั้งนี้อาจเป็นแรงจูงใจให้บริษัทคริปโตอื่นๆ ปรับตัวเข้าสู่กรอบการกำกับดูแลมากขึ้น ซึ่งจะช่วยเสริมสร้างสภาพคล่อง เสถียรภาพ และความเชื่อมั่นในตลาดโดยรวม
เดลาแวร์: จุดยุทธศาสตร์ของสายเลือดใหม่คริปโต
การเลือกเดลาแวร์เป็นฐานปฏิบัติการใหม่ไม่ใช่เรื่องบังเอิญ เพราะที่นี่ถือเป็นแหล่งรวมบริษัทระดับโลกที่เน้นโครงสร้างการดำเนินงานที่ยืดหยุ่นและเป็นมิตรต่อธุรกิจ เช่น JPMorgan Chase และ Coca-Cola ก็อยู่ที่นี่
Galaxy Digital จึงได้ทั้งภาพลักษณ์ความเป็นมืออาชีพและความได้เปรียบด้านกฎหมายควบคู่กันไป
แล้วสาวกคริปโตอย่างเราๆ ได้อะไร?
ความเชื่อมั่นที่เพิ่มขึ้น: การที่บริษัทใหญ่ระดับ Galaxy Digital ได้รับการรับรองจาก SEC และเตรียมเข้า Nasdaq คือสัญญาณเชิงบวกว่า "คริปโตไม่ได้เป็นของเล่นอีกต่อไป"
ประตูสู่ทุนสถาบัน: เม็ดเงินจากฝั่ง TradFi (การเงินแบบดั้งเดิม) อาจไหลเข้าวงการคริปโตมากขึ้น ทั้งผ่าน Galaxy และโครงการอื่นที่ตามมา
แรงกระเพื่อมต่อราคาเหรียญ: ความเคลื่อนไหวนี้อาจเป็นตัวจุดประกายให้ราคาของเหรียญหลัก เช่น BTC, ETH หรือเหรียญที่เกี่ยวข้องกับ Galaxy มีแนวโน้มขาขึ้น
มาตรฐานใหม่ของวงการ: บริษัทคริปโตอื่นๆ อาจต้องปรับตัวให้โปร่งใสและสอดคล้องกับกฎหมายมากขึ้น ซึ่งจะทำให้ทั้งวงการดูมีความน่าเชื่อถือและปลอดภัยสำหรับนักลงทุน
สู่ยุคใหม่ของคริปโต
Galaxy Digital อาจกลายเป็น "สะพาน" ที่เชื่อมโลกคริปโตกับตลาดทุนดั้งเดิม และนี่อาจเป็นจุดเริ่มต้นของการยอมรับคริปโตในระดับโลกอย่างเต็มรูปแบบ
คำถามสำคัญคือ: เราพร้อมหรือยัง? ที่จะเติบโตไปพร้อมกับคลื่นลูกใหม่นี้...
-
@ 65038d69:1fff8852
2025-04-08 03:03:04Sometime in the not-too-distant future...
alert – low voltage – P Node 5
Pippin looked up from the McMaster-Carr catalogue to the blinking line of text. A double-click opened the Grafana page for Perimeter Node 5. The solar panel voltage graph showed a stable 18V, then a jagged drop to 10V. Weird, that panel is less than a year old, and it’s a clear, sunny, wind-less day. He reached to the wall and poked the button labelled “Patrol 3”, and listened for the noise of the Hawk 2A fixed-wing patrol drone leaving it’s nest.
whirrrrr-zip!
Off it went. It should be over the node in about 6 minutes. He opened the live feed on the second monitor and went back to the catalogue. Here we are, 49045K12. That should get the water system in the greenhouse working again. Back on the computer he opened his AirZap page, selected McMaster-Carr from the list of vendors, and entered the part number on the item list. 148sats with next week’s regular delivery, or 400sats special delivery tomorrow. He clicked the “Regular Delivery” button, then “Confirm Zap”. The HF radio on the network rack hummed for a moment then shrieked a burst of noise. The Nostr event with the order details and Lightning payment was on it’s way to McMaster-Carr’s relay. Luckily the part is small and light enough for drone delivery. Pippin’s private grid on Glass Lake is well outside Fed-PS’s ground delivery area, and even if it wasn’t, there are no government roads here. Being a non-citizen and outside a metro-state was a pain and could be expensive. It was better than paying a 95% tax rate though...
alert – low voltage – P Node 5
The node! His eyes snapped to the second monitor just in time for the flyover, and he could see right away that the solar panel was at an odd angle. Yay, a field repair out in the cold. He tossed the tool kit and electrical repair kit on the hovertrike rack while his thermos filled with coffee. Giving the freeze-frame from the Hawk 2A a second look, he grumbled and grabbed the mechanical kit, adding it to the pile. After a third look and an eye roll he dragged a spare solar panel over to the trailer, then slapped the “Hitch” button.
Clear! Clear! Clear! zzz-thunk!
The electromagnets sucked the trailer and trike together, the pin dropping in as soon as it cleared. Pippin silently prayed thanks to God for small conveniences that eased life’s suffering and slurped a sip off the top of the thermos. And coffee. Thank you Father for the coffee trees in the greenhouse.
...
The cutline running the border of Pippin’s property is technically straight and certainly looks it from above, but driving it, even on a hovertrike, is a bouncy, curvy, slow-going affair. Watching immediately ahead instead of appropriately further meant a surprise when the node entered his field of vision. The trailer slid sideways as the trike stopped immediately on its legs. After a sigh and a sip, Pippin powered off the pads and dismounted. Yup, the solar panel is definitely twisted sideways. And bent. And...scratched? Short gouges scraped through the 2 columns of cells closest to the bent edge. There were no fallen trees nearby, so that wasn’t the cause...
snap!
He reached for his laser and got nothing but air. It was in the shop on the charger. Of course it would be; cue a subconscious eye roll. When his brain finally caught up with his eyes he registered the source: 2 meters tall, all black, and capable of mowing him down without a second thought. Thankfully the bull moose was, as most are, completely disinterested in everything but the willow tree he was in the middle of dismembering for lunch. Nonchalance was a benefit of having no natural predators. The ceramic dust on the points of one antler solved the solar panel mystery though; the panel was at the perfect hight for him to have scrapped the side of it as he walked by. He probably didn’t even notice as they’re constantly dragging them through the brush and trees.
...
warning – P Node 5 offline
He hadn’t bothered to mute the alerts while he replaced the broken panel and twisted mounting hardware. Last time he did he forgot to unmute them and went 2 days without noticing. Better to be mildly annoyed for a short time then to go without system or security alerts. He closed the junction box and moved his gaze to the status screen.
powering on...
self check...
all tests pass...
connecting to network...
no signal, switching to failover network...
He mashed the reboot button before it could complete. If he let it connect to the backup ZuckLink satellite network he’d be paying non-citizen usage fees by the megabyte. It was probably just a hiccup anyways, the point-to-point terrestrial link would probably connect fine on the next try.
no signal, switching to failover network...
This time he hit the power switch. The moose hadn’t damaged the antenna and he’d double-checked the alignment while he had the ladder out. Why wasn’t it connecting? He picked up the network scanner, walked to the other side of the node, and pointed it in the general direction of Node 6. No signal. Surely Node 6 didn’t go down on his way here. Now it was either drive all the way there to check it, or let Node 5 connect via satellite and check remotely.
no signal, switching to failover network...
He could practically feel the sats streaming out of his wallet. Ugh, here we go...
failover network unavailble, no signal...
What? There’s no way the satellite link was down too, unless the whole network stack was borked. Huffing and grumbling back to the trike, he plugged the network scanner into it’s com system and selected the satellite interface.
no signal
“Hey Bullwinkle, you wouldn’t happen to be running around with an all-spectrum jammer would you?” Hearing nothing, he looked up and around for the moose. He had been working his way down the edge of the line where the young willows were while Pippin had been working on repairs. Now he was gone. If the moose had joined the rimwalker raiders and started carrying signal jammers, he should be out of range now. He chuckled at the thought of some off-grid wildman trying to train a moose to carry equipment.
no signal, switching to failover network...
failover network unavailable, no signal...
Maybe it was the network stack. But that wouldn’t explain being unable to connect through the trike. Maybe he should just unhitch the trailer and go check Node 6. While highly unlikely, there could be a ZuckLink outage in his cell and an issue with the link to the next node at the same time. The only way to know would be to check in-person.
As he looked up from the status screen his peripheral caught motion on the treeline. “Hey Bullwinkle, is that you?” Antler points protruded from behind a tree, unmoving. A bit too still, actually.
“Bullwinkle?” Those weren’t antler points. That was an antenna array.
no signal
Notes & Appendix
The various technical and other odd bits I used in this story are all either real things or will be very soon. If this was a movie or TV show the visual elements would make some of the nerdier references either to get (i.e. most people would know a drone if they saw one, but saying “fixed-wing patrol drone” doesn’t necessarily draw a mental image for everyone), but in an effort to not constantly interrupt the flow for explanations I’ve moved those here. If I’ve missed any or you want more more detailed explanations, you can find us at scalebright.ca!
McMaster-Carr: A 120+ year old distribution company that specializes in hardware, parts, and tools. Known for their iconic enormous yellow catalogues and legendary (in I.T. circles) website. They’ll probably still be around in another 120+ years and probably still have their yellow catalogues.
Fixed-wing patrol drones: The fixed-wing variety of drones look like miniature airplanes and generally fly much faster than their more common quad-copter style siblings, making them excellent for patrols of static routes.
Sats: Short for “satoshis”, sats are the smallest denomination of Bitcoin.
Zaps: Bitcoin Lighting payments made over Nostr.
Lighting: A Bitcoin protocol for small payments (usually denominated in sats).
Nostr: A decentralized communications and social media protocol.
HF radio: Short for “high frequency”, also knows as ham radio. Bitcoin Lightning payments have been made over HF, as have Nostr posts.
Metro-state: City-states have existed since cities were first built. Metro-states would be a modern version that include their entire greater metro areas in their statehood.
Laser: Advances in focusing lens manufacturing have made handheld “laser guns” possible, though currently legally dubious. I get ads for them on a few of my social networks.
Ceramic solar panels: They’re being marketed as the next big thing in solar tech, but time will tell if they’re as good as the sales pitches say.
Bullwinkle: An anthropomorphic moose character from the 1950s/60s TV show “Rocky and Bullwinkle”.
All-spectrum jammer: Police have been finding criminals using both commercially manufactured and home-made signal jammers during robberies, kidnappings, and other crimes to stop people from calling emergency services or disrupt wireless security cameras. Most of them look like a WIFI router with a whole bunch of antennas.
rimwalker raiders: A made-up category of bandits known for living on the edge of civilization but still making use of technology.
-
@ 502ab02a:a2860397
2025-04-08 02:01:29เรื่องมันเริ่มจากมีคนถามว่า ขนมของผมเป็นขนม healthy ใช่ไหมคะ มีคนชื่นชมเยอะเลยจะมาสั่งบ้าง
ผมได้แต่ตอบไปว่า ขนมของผมไม่ใช่ขนม healthy มันเป็นแค่ขนมทางเลือก เป็นอีกทางเลือกนึงของคนที่อยากเลือก
โดยผมจะให้รายละเอียดวัตถุดิบว่ามีอะไร แล้วสารอาหารเป็นประมาณเท่าไร ให้เขาเลือกเอาเอง ผมเลยไม่เคยตอบเลยว่า คนท้องกินได้ไหม คนป่วยเบาหวานกินได้ไหม และผมมักตอบว่า เจ้าตัวควรจะรู้ได้เองเมื่อทราบวัตถุดิบ ว่าตัวเองกินได้ไหม
ผมว่า ผมแม่งโคตรแฟร์ในเรื่องการให้ข้อมูลก่อนซื้อแล้วนะ
มันก็เลยเกิดข้อสงสัยว่า เมื่อเราตั้งคำถามกับคำว่า “Healthy” ว่านิยามของมันคือ ดีต่อสุขภาพ หรือ แค่ไม่ทำร้ายสุขภาพ?
ในยุคที่โลกเต็มไปด้วยคำศัพท์ใหม่ ๆ เกี่ยวกับสุขภาพ ที่เอามาช่วยในการขายของนั้น บางครั้งคำว่า “healthy” ที่เราได้ยินกันบ่อย ๆ ก็ไม่ค่อยชัดเจนเท่าไรนัก คนส่วนใหญ่เข้าใจว่าคำนี้น่าจะหมายถึง “ดีต่อสุขภาพ”
ความหมายของมันอาจจะไม่เป็นเช่นนั้นเสมอไป และการเข้าใจคำว่า “healthy” นั้นสำคัญยิ่งกว่าที่คิด ถ้าจะให้ถามกันตรง ๆ คือ คำว่า “healthy” จริง ๆ ควรจะหมายถึงอะไร?
“Healthy” หรือ “Not Harmful”? หลายครั้งที่เราพบคำว่า “healthy” ใช้กับผลิตภัณฑ์ที่ดูเหมือนจะดีต่อสุขภาพ เช่น ขนมสุขภาพ น้ำผลไม้คั้นสด หรืออาหารมังสวิรัติ ซึ่งทุกอย่างนี้อาจจะทำให้เราคิดว่าเป็นอาหารที่ “ดีต่อสุขภาพ” แต่ถ้าลองมองให้ลึกขึ้น คุณอาจจะพบว่า คำว่า “healthy” ที่เราคุ้นเคย อาจหมายถึงเพียงแค่ “ไม่ทำร้ายสุขภาพ” มากกว่าที่จะเป็นสิ่งที่มีประโยชน์จริง ๆ ต่อร่างกายหรือเปล่า?
ความแตกต่างระหว่าง “ดีต่อสุขภาพ” กับ “แค่ไม่ทำร้ายสุขภาพ”
อาหารที่เรียกว่า “healthy” ในปัจจุบันบางครั้งอาจจะไม่ได้ดีต่อร่างกายมากเท่าที่คิด เพราะอาจมีส่วนผสมที่ปรุงแต่งมากเกินไป เช่น น้ำตาลที่ซ่อนอยู่ในน้ำผลไม้คั้นสดหรือขนมที่ผลิตจากแป้งปริมาณมากเกินไป หรือแม้แต่ผ่านกระบวนการแบบ ultra processed ที่พวกนี้บางครั้งมันอาจจะไม่ทำร้ายร่างกายในระยะสั้นทันทีแต่ในระยะยาวอาจจะสะสมผลเสียต่อสุขภาพได้อยู่ดี แต่ถูก bold บางตัวมาชูความ healthy เสียอย่างนั้น
เมื่อเปรียบเทียบกับอาหารที่ “ดีต่อสุขภาพ” อาหารประเภทนี้ควรจะเป็น อาหารจากธรรมชาติที่ไม่ผ่านกระบวนการปรุงแต่งหรือแปรรูปมาก หรือเปล่า? เพราะอาหารเหล่านี้จะให้คุณค่าทางโภชนาการที่ร่างกายต้องการ เช่น โปรตีนคุณภาพสูงจากสัตว์ หรือ ผักผลไม้ที่ปลูกในระบบเกษตรอินทรีย์ ซึ่งมีสารอาหารที่ไม่เพียงแค่ไม่ทำร้ายร่างกาย แต่ยังช่วยเสริมสร้างระบบต่าง ๆ ในร่างกายให้ทำงานได้อย่างมีประสิทธิภาพ
“Not Harmful” ยังไม่พอ แต่อาหารที่แค่ “ไม่ทำร้ายสุขภาพ” ยังไม่เพียงพอที่จะเรียกว่า “healthy” เพราะอาหารเหล่านี้บางตัวอาจจะมีมุมกลับที่ไม่ได้สร้างผลเสียทันที แต่ก็อาจไม่ได้ให้ประโยชน์อะไรกับร่างกายเท่าที่ควรเป็นเช่นกัน การรับประทานอาหารที่แค่ “ไม่ทำร้ายสุขภาพ“ นั้นในระยะยาวอาจไม่ส่งผลต่อการมีสุขภาพที่แข็งแรงจริง ๆ เพราะแค่ ”ไม่ทำร้าย“
“not harmful” ยังไม่ใช่ “healthy” เพราะมันไม่ได้ดีต่อสุขภาพ แต่มันแค่ “ไม่ร้ายแรงทันที” หรือพูดให้ชัดคือ แค่ไม่ทำร้ายสุขภาพเร็วเกินไปนัก เช่น
ขนมที่บอกว่า “ไม่มีน้ำตาล” แต่ยังใช้สารให้ความหวานสังเคราะห์
เครื่องดื่มที่โฆษณาว่า “ลดแคลอรี่” แต่แฝงไปด้วยสารเคมีหรือสารปรุงแต่งที่ร่างกายไม่สามารถย่อยได้ดี
ผลิตภัณฑ์ที่บอกว่า “ใช้ได้สำหรับมังสวิรัติ” แต่เต็มไปด้วยแป้งขัดขาวหรือสารกันบูด หรือแม้แต่อาหารสารพัด ins
หรือแม้แต่อาหารที่หลอกล่อให้กินเกินความต้องการ ชูตัวนึงแต่เนียนไม่บอกอีกตัวนึง เช่นชูโปรตีน แต่เงียบเรื่องคาร์บสูงมาก
แถมบางครั้งมาในความ over claim ดึงสารตัวเล็กๆมาชูภายใต้คำว่า “มี xxxx ดีเพราะช่วยด้าน xxxx” ทั้งที่จะสัมฤทธิ์ผลต้องดื่มเป็นสิบๆแก้ว ซึ่งใช้ไม่ได้จริง
“Healthy” ที่แท้จริง อาหารที่ดีต่อสุขภาพ จึงควรเป็นอาหารที่เมื่อกินเข้าไปแล้ว ร่างกายได้รับ สารอาหารที่มีประโยชน์จริง ๆ ที่ช่วยเสริมสร้างและซ่อมแซมระบบต่าง ๆ ในร่างกาย อย่างเต็มที่เช่น • โปรตีนจากแหล่งธรรมชาติ อย่างเนื้อสัตว์ที่เลี้ยงแบบอิสระ หรือไข่ที่มาจากฟาร์มที่เลี้ยงตามธรรมชาติ • ไขมันที่ดีต่อสุขภาพ เช่น ไขมันจากสัตว์ที่เลี้ยงแบบธรรมชาติ ไขมันโอเมก้า 3 ที่มาจากปลา หรือไขมันพืชที่มีสัดส่วนโอเมก้า 6 ไม่มากจนไม่สามารถสมดุล โอเมก้า 3 ได้ทัน • ผักผลไม้สดที่ไม่ผ่านการแปรรูป เพราะยังพอมีไฟเบอร์ วิตามิน และแร่ธาตุที่ร่างกายเอาไปใช้งานได้บ้าง แต่ต้องผ่านการลดระดับของ anti-nutrient
หลายครั้งเราเห็นขนม healthy ไม่ว่าจะคลีน วีแกน หรือขนมเคลมความ healthy ต่างๆ คือพอเป็นขนม มันก็จะมีการใช้ “ปริมาณ” บางอย่างให้เรากินมากเกินไป เช่นบางขนมยังเป็นแป้งปริมาณมาก ต่อให้แป้งเทพแป้งสะอาดยังไง ก็กลายเป็นคาร์บย่อยเป็นกลูโคส ต่อให้ย่อยช้าย่อยเร็วก็ย่อยได้หมดอยู่ดี, บางขนมมีปริมาณน้ำตาลมาก ต่อให้ giต่ำแบบมะพร้าว โตนด แต่ปริมาณ ถ้าเกินที่ สธ. มีคำแนะนำ คือ 16กรัมต่อวัน ก็เกมส์อยู่ดี, หรือจะขนมจืดๆแต่ใช้น้ำมันคาโนลา ที่อุดมด้วยโอเมก้า6 หรือ น้ำมันรำข้าวที่มี oryzanol เข้มข้น
หรืออย่างสายคีโต ก็ไม่รอด โอเค โดยรวมมันช่วยเรื่องการไม่กระชากอินซุลิน แต่บางอย่างก็ใช่ว่าจะสามารถเรียก healthy ตามความหมาย เช่น ขนมแป้งอัลมอนด์ มันคือ อัลมอนด์ processed ที่ทำให้เรากินอัลมอนด์มากกว่าเม็ดๆไปได้มาก เพราะมันบดย่อยมาละเอียด ทำให้เรากินมากเกินไป, หลายขนมก็ใช้สารให้ความหวาน ต่อให้อินซุลินไม่พุ่ง แต่มันก็มีผลกับจุลินทรีย์ในลำไส้, แม้แต่พวกครีมชีส ตัวมันเองคือดี แต่การเอาปริมาณมากมาทำขนม มันก็กลายเป็น over consume ได้, อย่างที่ชัดมากคือ ขนมปังวีทกลูเตน ที่แป้งปกติกลูเตนราว 10-14% ถ้าวัดแบบโลฟละ 500กรัมเหมือนๆกัน แป้งธรรมดามีกลูเตนราวๆ 30กรัม ส่วนขนมปังวีทกลูเตนมีกลูเตนราวๆ 190กรัม หรือมากกว่าปกติ 633% แต่นั่นละครับ มัน not harmful (yet)
ดังนั้นในความคิดเห็นของผม ตามเหตุผลที่เรียบเรียงมา เมื่อขึ้นชื่อว่าขนม มันคืออาหารชนิดนึงที่ผ่านกระบวนการมาก จนกลายเป็น processed food ชนิดนึง มันทำให้เรากินเนยมาก กินน้ำมันมาก กินครีมมาก กินน้ำตาล(ทั้งแท้และสังเคราะห์)มาก กินแป้งและ/หรือถั่วบดมาก กินผลไม้มาก กินโยเกิรตมาก กินช็อคโกแลตมาก(ถึงจะ dark100% ก็เหอะ) เพื่อความอร่อย
ขนม เลยไม่ healthy และผมไม่ขอเคลมความ healthy ในสินค้าผม และผมไม่มองว่าขนม healthy ผมมองว่าขนมอร่อย กินเอาอร่อย แล้วไปบาลานซ์ความ healthy องค์รวมเอาในชีวิต ดังนั้น อย่าฝืนกินขนมไม่อร่อยเพียงเพราะเราดันเชื่อว่ามัน healthy หรือ เราอย่าไปซัดโฮกขนมมากๆเพราะเราดันเชื่อว่ามัน healthy
เรามองอาหารยังไง ก็มองขนมอย่างนั้น มองวัตถุดิบที่แปรรูปแล้วกินลงไป ขนม ก็จะเป็นอาหารประเภทนึง
คุณก็เช่นกัน ควรมองของที่กินเข้าไปทั้งหมดเป็นอาหาร แล้วมองอาหารเป็นวัตถุดิบ แล้วพิจารณาวัตถุดิบ+วิธีทำ ว่ามัน healthy กับตัวคุณแค่ไหน มากกว่า healthy ที่แปะบนห่อหรือในโพสขาย
คำว่า “healthy” จริง ๆ แล้วควรจะหมายถึง อาหารที่ไม่ใช่แค่ปลอดภัยจากการทำร้ายสุขภาพ แต่ยังต้องช่วยเสริมสร้างสุขภาพ อย่างแท้จริง อาหารที่ดีต่อสุขภาพควรเป็นอาหารธรรมชาติให้โปรตีนคุณภาพ ไขมันที่มีประโยชน์ ให้คาร์บที่พอเหมาะและมีสารอาหารที่ร่างกายต้องการในการทำงานที่ดีที่สุด ทั้งซ่อมและสร้าง
“Healthy = ดีต่อสุขภาพในทางบวก ไม่ใช่แค่ไม่ร้าย” “Not harmful = ไม่ร้าย ยังไม่เห็นผลเสีย แต่ไม่ให้คุณในทางบวกขนาดนั้น”
เพราะฉะนั้น มันเลยมีความเกือบจะทับซ่อนกัน ถ้าจะสื่อคำว่า “Healthy” แนะนำให้แปลว่า “อาหารที่ส่งเสริมสุขภาพ ไม่ใช่แค่ไม่ทำร้ายสุขภาพ“
กับดักที่ใหญ่ที่สุด ที่แม้แต่ชาวคีโตเองก็อาจตกหลุมนั้นแบบไม่รู้ตัว นั่นคือ
ปริมาณ สำคัญกว่า ประเภท
คุณตกหลุมคำว่า อาหาร/ขนม healthy หรือเปล่าหล่ะ คุณเท่านั้นที่ตอบตัวเองได้
จงมองทะลุ food matrix
เจริญพวง neo
pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก
ฉลาก3รู้
-
@ 000002de:c05780a7
2025-04-08 01:24:25Trump is trying to sell a victim narrative and I don't buy it.
Trump repeats a troupe that I find hard to swallow. The US is getting ripped off. When he says this, as far as I can tell he's not referring to the people. He's referring the US government getting ripped off by other nations. This is so absurd I'm surprised I don't hear more people push back on it.
The US is the most powerful government in the history of the planet. No nation has the firepower or wealth of the US. The US has manipulated the governments and policies of much of the world since WW2. The idea that the US government is getting ripped off is absurd.
Trump and I agree that NATO is obsolete. It was created to counter a government that dissolved in the 90s. This should be an example to everyone that governments do not behave like businesses. They do not respond to market forces. They will always seek to increase their power and influence and always resist any efforts to reduce their size and scope. But back to Trump. He says that the US is getting ripped off by the other NATO countries. I would say the US people are in indeed being ripped off by their own government. But the US government is NOT getting ripped off.
The US military power in Europe is a massive influence on geopolitics in the region. US military companies benefit massively as well. The US military has bases all over the globe and if you don't think that is a factor in "diplomatic" negotiations you are being naive. The US uses this "defensive" shield to keep the "leaders" of Europe in line. The US isn't being ripped off. This is just a marketing tactic Trump is using to sell downsizing the US military deployments.
Trump also loves to point out how other countries are imposing tariffs on the US. We are being ripped off! I mean, he has a point there. But if tariffs aren't a tax as many in his admin like to claim, how exactly are "we" being ripped off? We are being told that Trump's tariff policy isn't a tax and that expecting prices to increase is oversimplifying things. The talk about tariffs is frankly frustrating.
On the one hand the left is saying tariffs are a tax and is going to drive up prices. Yet these same people pretend to not understand that corporate tax increases don't have the same effect. The right claims to understand tax policy and often oppose corporate taxes. They will tell you that those taxes just get passed down to consumers in the form of price increases. Now they are pretending to not get this in relation to tariffs.
I've read and listened to the pro tariff people and they aren't all dumb. They may be right about tariffs not effecting all products and nations equally. I guess we will find out. But, can we be honest? The US is not getting ripped off.
Someone is getting ripped off, but it isn't the US federal government. Its the people of the world. First, the people of the world live under the thumb of the US fiat dollar standard. We in the US complain about 3+% inflation but most people in the world would kill for that level of inflation. Most of the world gets none of supposed benefits from government spending. They only get the debasement of their own currencies.
Moving away from economics, the entire globe is affected by the elections in the US. The US is the top dog government and its decisions effect people everywhere. The US deep state has manipulated many elections across the globe and continues to do so. Meanwhile we are told that Russia is manipulating our elections. So who exactly is getting ripped off here? I think the nation (the people) are being subjected to massive mismanagement at best. I can support that argument.
Don't get me wrong... I know we in the US are getting ripped off. We are being ruled by people that do not represent us and do not answer to us. The politicians that claim to represent us are being paid and influenced by foreign groups ranging from Israeli political groups, to any number of other groups domestic and foreign. We are getting ripped off, but I firmly believe the people in the US have it better than most of the world. Trump is trying to sell a victim narrative and I don't buy it.
originally posted at https://stacker.news/items/937482
-
@ 4d41a7cb:7d3633cc
2025-04-08 01:17:39Satoshi Nakamoto, the pseudonymous creator of Bitcoin, registered his birthday as April 5, 1975, on his P2P Foundation profile. Many think that he chose this date because on that same day in 1933, the United States government confiscated the gold of the American people. Whether this was on purpose or not, what happened in this day is very important to understand how do we ended up here.
In 1933, as expressed in Roosevelt’s Executive Orders 6073, 6102, and 6260, the United States first declared bankruptcy. The bankrupt U.S. went into receivership in 1933. America was turned over via receivership and reorganization in favor of its creditors. These creditors, the International Bankers, from the beginning stated their intent, which was to plunder, bankrupt, conquer and enslave America and return it to its colonial status.1
As one of his first acts as President, Franklin Delano Roosevelt declared a “Banking Emergency” to bail out the Federal Reserve Bank, which had embezzled this country’s gold supply. The Congress gave the President dictatorial powers under the “War Powers Act of 1917” (amended 1933), written, by the way, by the Board of Governors of the Federal Reserve Bank of New York.2
This day marked the official abandonment of the American Constitution, law and real money. Today, 92 years after this event, most of the people living today have never had any real money or paid for anything using real money; unless they used Bitcoin...
There could be no bankruptcy if there was not a private central bank lending paper currency to the government at interest, so we must start from 1913, when the Federal Reserve was created: a non-federal private bank with no reserves and the monopoly of issuing debt based paper currency in unlimited amounts and lending it to the government at interest by buying treasury bills. The fact that this currency is lent into existence at interest makes the debt mathematically impossible to be repaid; it can only be refinanced or defaulted.
Between 1929 and 1933, the Federal Reserve Bank reduced the currency supply by 33%, thereby creating the Great Depression, bankrupting the US government, stealing the Americans’ gold supply, and officially ending the gold standard. Since then the US dollar (money) was replaced with Federal Reserve Notes (debt). This was also the end of the Republican form of government and the beginning of a socialist mob rule democracy (Fascism).
“Fascism should more properly be called corporatism because it is the merger of state and corporate power.” — Benito Mussolini
The United States government has been bankrupt since 1933, since it defaulted on its gold bonds. This type of bond existed until 1933, when the U.S. monetary system abandoned the gold standard. 3 From this year the government has been totally controlled by the International bankers and used as a tool to spread and maintain their power worldwide.
Many people think that the gold standard was abandoned in 1971, but this is not true; in fact, this happened in 1933 when the US dollar was replaced by Federal Reserve Notes that are 100% debt-based fiat paper currency.
The year 1933 in the United States marked:
- The end of the Republican form of government and the beginning of American Fascism
- The end of the United States dollar and its replacement by Federal Reserve Notes
- The abandonment of common law and replacement with military admiralty law
- The takeover of the United States government by International bankers
- A massive gold theft and the end of the US gold standard
- The exchange of rights with privileges and licenses
- The United States government bankruptcy
The next shameful event in our history which still plagues us to this day was the “War Powers Act of 1933.” This Act permitted President Roosevelt to make law in the form of Executive Order, bypass Congress and create his socialist state. We (citizens of this country) were ever after to be considered enemies of the United States who must be licensed to engage in any commercial activity. With the aid of the Federal Reserve (the same people who created the Depression), the President confiscated our gold and silver coin and replaced it with worthless pieces of paper and a debt system that will eventually destroy this great country. Our land and our labor were pledged to the Federal Reserve Bank, Inc., as collateral for a debt system that could never be paid.4
“Emergency Powers” means any form of military style government, martial law, or martial rule. Martial law and martial rule are not the same.
United States Congressional Record March 17, 1993 Vol. #33, page H- 1303, Congressman James Traficant, Jr. (Ohio) addressing the House:
“Mr. Speaker, we are here now in chapter 11. Members of Congress are official trustees presiding over the greatest reorganization of any Bankrupt entity in world history, the U.S. Government. We are setting forth, hopefully, a blueprint for our future”
“There are some who say it is a coroner’s report that will lead to our demise. It is an established fact that the United States Federal Government has been dissolved by the Emergency Banking Act, March 9, 1933, 48 Stat. 1, Public Law 89-719; dered by President Roosevelt, being bankrupt and insolvent. H.J.R. 192, 73rd Congress in session June 5, 1933 – Joint Resolution To Suspend The Gold Standard and Abrogate the Gold Clause dissolved the Sovereign Authority of the United States and the official capacities of all United States Governmental Offices, Officers, and Departments and is further evidence that the United States Federal Government exists today in name only” **“The receivers of the United States Bankruptcy are the International Bankers, via the United Nations, the World Bank and the International Monetary Fund”
“All United States Offices, Officials, and Departments are now operating within a de facto status in name only under Emergency War Powers. With the Constitutional Republican form of Government now dissolved, the receivers of the Bankruptcy have adopted a new form of government for the United States. This new form of government is known as a Democracy, being an established Socialist/Communist order under a new governor for America. This act was instituted and established by transferring and/or placing the Office of the Secretary of Treasury to that of the Governor of the International Monetary Fund. Public Law 94-564, page 8, Section H.R. 13955 read in part:”
“The U.S. Secretary of Treasury receives no compensation for representing the United States.”
The American Spirit
The intention of the founding fathers of the United States was to create a constitutional republic to protect natural human rights and escape from the tyrannical English monarchy and its usurious Bank of England's monetary system. They created an honest monetary system based on gold and silver (United State Dollar) and got rid of nobility titles, creating equality under the law.
Section 10 of the American Constitution says:
No State shall enter into any Treaty, Alliance, or Confederation; grant Letters of Marque and Reprisal; coin Money; emit Bills of Credit; make anything but gold and silver Coin a tender in payment of debts; pass any bill of attainder, ex post facto law, or law impairing the obligation of contracts; or grant any title of nobility.
The United States Dollar (1792-1933)
A dollar is a measure of weight defined by the Coinage Act of 1792 and 1900, which specifies a certain quantity—24.8 grains of gold or 371.25 grains of silver (from 1792 to 1900) when the American dollar was based on a bimetallic standard.
The Gold Standard Act of 1900 formally placed the United States on the gold standard, setting the value of one dollar at 25.8 grams of 90% pure gold, which fixed the price of gold at $20.67 per troy ounce. This standard was totally abandoned in 1933.
Gold and silver were such powerful money during the founding of the United States of America that the founding fathers declared that only gold or silver coins could be “money” in America.
But since the greedy bankers cannot profit from honest money they cannot print, they replaced the money with paper debt instruments. And by doing this, they have effectively enslaved the American people until today. My definition of modern slavery is working for a currency that someone else can create at no cost or effort. What's worse is that they even demand to be paid back and with interest!
Federal Reserve Notes (1913-present)
Federal Reserve Notes are not real money. Money that has metallic or other intrinsic value, as distinguished from paper currency, checks, and drafts.
Federal Reserve Notes (FRNs) are a legal fiction. An assumption that something is true even though it may be untrue. 5 The assumption that they are money, when in fact they are the opposite of money: debt or paper currency.
Paper money. Paper documents that circulate as currency; bills drawn by a government against its own credit. 6 Like Goldsmiths' notes. Hist. Bankers' cash notes: promissory notes given by bankers to customers as acknowledgments of the receipt of money. • This term derives from the London banking business, which originally was transacted by goldsmiths.7
These notes were scientifically designed to bankrupt the government and slave the American people, as Alfred Owen Crozier warned one year before the bill for the creation of the FED was passed through Congress (1912):
If Congress yields and authorizes a private central bank as proposed by the pending bill, the end when the bubble bursts will be universal ruin and national bankruptcy.
Unfortunately, the bill was passed in 1913, and this private bank started printing a new currency different from the US dollar creating the great depression and effectible bankrupting the government like Alfred warned 20 years before.
Alfred also warned:
Thus the way is opened for an unlimited inflation of corporate paper currency issued by a mere private corporation with relatively small net assets and no government guarantee, every dollar supposed to be redeemable in gold, but with not a single dollar of gold necessarily held in the reserves of such corporation to accomplish such redemption.
Differently from what's commonly believed Federal Reserve Notes (FRNs) were never really “backed” by gold; they were never supposed to be hard currency. Currency backed by reserves, esp. gold and silver reserves.
The United States government defaulted on its gold clauses, calling for payment in gold. This marked the end of the gold standard. A monetary system in which currency is convertible into its legal equivalent in gold or gold coin.
Since then we have been under a paper standard, where we use fake money as tender for payments. Paper standard. A monetary system based entirely on paper; a system of currency that is not convertible into gold or other precious metal.
People traded their coupons as money or “currency.” Currency is not money but a money substitute. Redeemable currency must promise to pay a dollar equivalent in gold or silver money. Federal Reserve Notes (FRNs) make no such promises and are not “money.” A Federal Reserve Note is a debt obligation of the federal United States government, not “money.” The federal United States government and the U.S. Congress were not and have never been authorized by the Constitution of the United States of America to issue currency of any kind, but only lawful money—gold and silver coin.8
A bona fide note can be used in a financial transaction to discharge the debt only because it is an unconditional promise to pay by the issuer to the bearer. Is a Federal Reserve Note a contract note, an unconditional promise to pay? At one time the Federal Reserve issued bona fide contractual notes and certificates, redeemable in gold and silver coin. Most people never saw or comprehended the contract. It went largely unread because the Federal Reserve very cunningly hid the contract on the face of the note by breaking it up into five separate lines of text with a significantly different typeface for each line and placing the president’s picture right in the middle of it. They even used the old attorney’s ruse of obscuring the most important text in fine print! Over time, the terms and conditions of the contract were diluted until eventually they literally became an I.O.U. for nothing.
FEDERAL RESERVE NOTE
-
THIS NOTE IS LEGAL TENDER FOR ALL DEBT, PUBLIC AND PRIVATE, AND IT IS REDEEMABLE IN LAWFUL MONEY AT THE UNITED STATES TREASURY OR ANY FEDERAL RESERVE BANK.
-
DATE: SERIES OF 1934
-
WILL PAY TO THE BEARER ON DEMAND: ONE HUNDRED DOLLARS
-
TREASURER OF THE UNITED STATES SIGNATURE
-
SECRETARY OF THE TREASURY SIGNATURE
Nowadays FRNs say "This note is legal tender for all debts public and private" it tender debt but it does not pay the bearer on demand. It value was stolen by a counterfeiting technique commonly know as inflation.
One hundred dollars (SERIES OF 1934) will be 2480 grains of gold, or 159.4 grams, or 5.1249 troy ounces. Today one troy ounce is priced around $3,000 federal reserve notes. 5.1249 X 3,000 = $15,375 actual FRNs.
A $100 FRN bill today will buy 0.65% of a real gold $100 dollar certificate. That’s a -99.35% loss of purchasing power in the last 91 years.
FRNs savers have been rugged pulled!
Gold bugs where the winners...
But Bitcoin is even better...
Happy birthday Satoshi! April 5 will be forever remembered.
Satoshi... The man, the myth, the Legend...
-
@ d9a329af:bef580d7
2025-04-08 01:08:42Everyone who sees it knows at this point that the matrix of control comes from the overdependence of proprietary software to do our everyday tasks. You can think of this like us being the cling wrap that will just not let go of these pieces of garbage software that don't allow you to see what is in their source code, and how they work. This will tend to lead to the unlawful collection of data (violating the most basic of privacy laws, despite unenforceable contracts that are enforced regardless), bad OPSEC that sees you being stalked and harassed over nothing significant. In the worst of cases, if you speak your mind where you aren't necessarily supposed to be able to do that, and you get doxxed, the worst cases could be far worse than one could imagine.
The solution to this, on the other hand, is using almost exclusively free/libre open-source software and GNU/Linux operation systems. If you're using certain proprietary software, hardening it to give as little data as possible to the entity responsible for it will also work, as long as you know which ones to use. This is a hard pass for a lot of people, but if you want to escape the control matrix of proprietary software, Winblows, HackOS, iHackOS, iBloatOS and stock Google AI Fever Dream, then researching which Free Software (notice the spelling) to use is your first bet. I had already done this for the past four and a half years, and will continue to do it as long as I live, seeing what new Free Software compliant applications and libraries come into the spotlight once things get locked down into walled gardens like what HackOS, iHackOS and BlindnessOS do on a regular basis.
Each of these pieces of software will be in a categorized list with a brief description of what the software is used for. There is a lot to take in, so research this yourself and see if these are right for you. These are the applications I personally use on a regular day-to-day basis, and they work for my needs.
- Operating Systems (the core to your device)
- GNU/Linux operating systems (for PCs) or GrapheneOS (for de-googled Android phones) To be fair on this one, GNU/Linux is the combination of the Linux kernel with the GNU toolchain, which in turn allows any developer to make an operating system that is FOSS, not necessarily Free Software, especially with the Linux Kernel's proprietary bits of code. The Linux kernel is also used in the Android Open-Source Project (AOSP), and is used as the base of operating systems for Android phones such as GrapheneOS, the only AOSP custom ROM I would recommend based upon the research I had done on this (even if very little).
My recommendations on the Linux side of things are almost any Arch-based distribution (with the exception of Manjaro), Debian-based distributions like Linux Mint Debian edition, regular Debian, AntiX or Devuan, or a Fedora/RedHat-based distribution like Nobara Project (if you're a gamer), OpenSUSE (if set up properly) or even Bluefin if you want an atomic desktop (I wouldn't recommend Bluefin if you want to monkey with your operating system and DIY on many aspects of it). Once you learn how to set these up securely, privately and properly, you're on your way to starting your journey into digital liberation, but there's far more to go on this front.
- Web Browsers (How you surf the internet)
-
Firefox Forks This one is self-explanatory. I harden all the Firefox forks I use (LibreWolf, Waterfox, Cachy Browser, Floorp and Zen as some examples) to the nines, despite being unable to do anything about my fingerprint. This is why I use multiple browsers for specific purposes to counteract the fingerprint spying due to weaponized JavaScript. There are ways to circumvent the fingerprint-based espionage, and make sure the site fingerprint.com doesn't know that one's lying about what their user agent is, though it's not very easy to fool that site, as it's used by 6,000 companies.
-
Brave Browser This is the only Chromium-based browser I would recommend, as it's better when hardened against all the other Chromium-based browsers, including Ungoogled Chromium, which is almost impossible to harden due to security vulnerabilities. Despite that, Brave has some of the best features for a Chromium-based browser one can feel comfortable using, even though you'll have similar issues with Firefox-based browsers that aren't actually Firefox (and Firefox has its own issues regarding espionage from Mozilla)
-
Office Suites (If you need to do professional office documents)
-
LibreOffice A fork of Apache's OpenOffice, made better with many features missing from even OnlyOffice and OpenOffice, this suite of applications is the go-to Free Software office suite for many people looking to switch from the proprietary software nether to the diamonds of free/libre open-source software. Though one may need to perform some extra steps to set up compatibility with G-Suite and Microsoft Office past 2015 potentially, it's still a good thing that people trust LibreOffice as their one-stop shop for office documents, despite being completely different from your standard office suite fare.
-
OnlyOffice The competitor to LibreOffice with the ease of Microsoft Office and G-Suite compatibility, OnlyOffice is another office suite that can be good for those who need it, especially since anybody who had used Microsoft Office in particular will be familiar with its layout, if not for a slight learning curve. As someone who's used G-Suite more (due to schooling that stunk worse than a decomposing rat in New York City), that's part of the reason why I switched to LibreOffice, though I tried some others, including OnlyOffice and Abiword (since I use a word processor a lot). This one is another solid option for those who need it.
-
Wordgrinder For those who like to use a terminal emulator like I do, Wordgrinder is a word processor with a terminal user interface (TUI) designed with just focusing on typing without distractions in mind. .wg is the file extension for documents made using Wordgrinder, especially since nowadays most word processors are cloud based. For those who live in a terminal, this is a good option to your terminal UI-based toolbox
-
Text editors
-
Vi, Vim, Neovim and other Vim-like editors The classic VI Improved (Vim), a fork of the TUI modal editor, vi, with keybinds that will be confusing at first, but with practice and patience, bring about muscle memory to stay on the keyboard, and not necessarily touch the mouse, keypad on the right hand side, or even the arrow keys. These keybind skills will stay with one for the rest of their life once they learn how the modes in vi, Vim or vi-based editors work. It's a classic for those working in the terminal, and a staple in FLOSS text editing and coding tools once customized potentially to the nines to your particular style.
-
VSCodium The Free Software fork of Code OSS by Microsoft, but made to be similar in function to VSCode without Microsoft's espionage baked into it. It has almost exactly the same features as VSCode that one would need, and even any VSIX files from VSCode will work in VSCodium. This one is an easy switch from VSCode for those who use it, but don't want the forced telemetry.
-
Emacs The competitor to Vim, Emacs is an editor that is FLOSS in every way imaginable. It is one of the most customizable editors anybody could have ever conceived, though the programming language used in Emacs is a dialect of Lisp the developers had made themselves. There are more keybinds to memorize compared to Vim, though Vim keybinds can be added using the Evil Mode package in any Emacs package manager to get the best of both worlds in Emacs. Once one gets a handle of the steep learning curve for Emacs, it's customizable in every imaginable way almost.
These four categories will get you started on your privacy journey, though I covered things a developer might want. I have plans on more lists to compile once I get my ducks in a row on what I want to cover here on Nostr in a longform format. Feel free to let me know if you have recommendations for me to write about, and I can do some digging on that if it isn't a rabbit hole.
-
@ 404a8cf3:b03bd9d5
2025-04-08 00:01:29A popularidade das plataformas de apostas online tem crescido de forma significativa no Brasil, e a 337Bet surge como uma das mais novas opções para os apostadores do país. Com uma proposta inovadora e uma série de características que agradam aos jogadores, a 337Bet se destaca não apenas pela variedade de jogos, mas também pela experiência única que oferece aos usuários. Neste artigo, vamos analisar de forma detalhada o que torna essa plataforma tão atrativa para os jogadores brasileiros.
A Plataforma: Simples e Eficiente Quando se trata de plataformas de apostas online, a facilidade de uso é essencial. A 337Bet entende isso perfeitamente e, por isso, oferece uma interface simples, limpa e altamente eficiente. O design intuitivo permite que qualquer jogador, independentemente do nível de experiência, consiga navegar pela plataforma sem dificuldades.
O processo de registro é rápido e seguro, e a navegação pelo site também é descomplicada, com todas as opções de jogos, promoções e suporte claramente destacadas. Além disso, a plataforma é completamente responsiva, o que significa que pode ser acessada de forma confortável em qualquer dispositivo, seja desktop, smartphone ou tablet.
Jogos Para Todos os Tipos de Jogadores A 337bet oferece uma impressionante gama de jogos para todos os gostos. Para os fãs de esportes, a plataforma disponibiliza uma seção de apostas esportivas completa, que abrange uma enorme variedade de esportes locais e internacionais. O futebol, como esperado, é o esporte mais popular, com uma ampla cobertura das principais ligas e torneios. No entanto, os apostadores também podem explorar outras modalidades como basquete, vôlei, tênis e até esportes menos tradicionais, como o e-sports.
Para quem prefere jogos de sorte e habilidade, a 337Bet oferece uma rica seleção de jogos de mesa, como roleta, blackjack e baccarat, além de diversas opções de máquinas de caça-níqueis. Esses jogos são desenvolvidos com gráficos de alta qualidade e são projetados para proporcionar uma experiência de jogo fluida e envolvente.
Uma das características inovadoras da plataforma é a inclusão de jogos virtuais, como as corridas de cavalos e o futebol virtual, que simulam eventos esportivos de forma rápida e emocionante. Esses jogos permitem apostas em tempo real e são uma excelente opção para quem busca uma experiência mais dinâmica e acelerada.
Segurança e Suporte ao Jogador A segurança é uma prioridade fundamental na 337Bet. A plataforma utiliza tecnologia de criptografia avançada para proteger todas as transações financeiras e informações pessoais dos usuários. Isso garante que todos os jogadores possam fazer depósitos e retiradas com total confiança, sabendo que seus dados estão protegidos.
Além disso, o suporte ao cliente é outro ponto forte da 337Bet. A plataforma oferece atendimento contínuo, 24 horas por dia, 7 dias por semana, por meio de chat ao vivo, e-mail e telefone. Os jogadores podem contar com uma equipe de suporte qualificada para solucionar dúvidas ou problemas a qualquer momento.
Conclusão A 337Bet é uma plataforma de apostas online completa, oferecendo uma experiência de jogo segura, envolvente e cheia de oportunidades. Se você é um apostador experiente ou está começando sua jornada nas apostas online, a 337Bet é a escolha ideal. Com uma interface amigável, jogos diversificados e um excelente suporte ao cliente, a plataforma garante que seus usuários tenham uma experiência única.
-
@ a7f85dfe:27305a2b
2025-04-07 23:56:34在收到二手mini pc之前,先制作USB起动器。
首先,官网下载最新安装器的iso文件,下载地址:
https://www.proxmox.com/en/downloads
第二步,linux系统下使用dd命令制作USB起动器
查找usb路径
lsblk
dd命令直接烧录 ``` sudo dd if=/path/to/iso_file.iso of=/dev/sdX bs=4M status=progress```
-
@ 878dff7c:037d18bc
2025-04-07 23:54:09Potential Reacquisition of Port of Darwin by Australian Government
Summary:
Deputy Prime Minister Richard Marles has indicated that the Australian government may use legal powers to reclaim the Port of Darwin from Chinese control. While the government prefers a commercial solution, it is prepared to take legislative action if necessary. This move reflects growing concerns over foreign ownership of critical infrastructure amid escalating global trade tensions.
Sources: The Guardian - April 8, 2025
Australian Economy Faces Slowdown Amid Global Trade Tensions
Summary:
The Australian economy is projected to experience a slowdown due to escalating global trade tensions, particularly stemming from the United States' recent tariff implementations. Treasurer Jim Chalmers indicated that while Australia is not the primary target—only 4% of its exports go to the U.S.—the broader global impact is expected to affect the local economy. The Reserve Bank may consider interest rate cuts to mitigate these effects. Treasury forecasts suggest a deceleration in GDP growth from 4.25% in 2024–25 to 3.25% in 2025–26, influenced by declining terms of trade and global inflation pressures. Chalmers criticized the U.S. tariff measures as "ill-considered," warning of heightened economic risks and uncertainty.
Sources: News.com.au - April 8, 2025, Reuters - April 8, 2025, The Wall Street Journal - April 8, 2025
Spiking to Announce TradeGPT's Enterprise AI Future at IBM Z Day
Summary:
Spiking will participate in IBM Z Day: Special Edition 2025, unveiling TradeGPT's enterprise AI capabilities. This collaboration with IBM aims to revolutionize AI applications in capital markets by leveraging advanced computing technologies.
Sources: Newsfile - April 7, 2025, Yahoo Finance - April 7, 2025
Earthquake in Upper Hunter Region, NSW
Summary:
A magnitude 3.4 earthquake struck the Upper Hunter region of New South Wales early this morning, with the tremor recorded at 5:18 am local time. The earthquake occurred at a shallow depth of approximately 2.4 miles below the surface. Residents in the vicinity reported feeling the tremor, but there have been no reports of damage or injuries.
Sources: Volcano Discovery - April 8, 2025, Newcastle Weekly - April 8, 2025
Opposition Leader Peter Dutton Predicts Global Recession Amid Market Volatility
Summary:
Opposition Leader Peter Dutton has warned that Australia could face a global recession, citing recent stock market declines and potential delays in retirement for baby boomers. This comes as both Dutton and Prime Minister Anthony Albanese prepare for the first leaders' debate, with economic management and cost-of-living issues at the forefront of their campaigns.
Sources: News.com.au - April 8, 2025
Family Law Regulations Updated
Summary:
Effective April 1, 2025, new Family Law Regulations have commenced, replacing previous regulations from 1984, 2001, and 2008. These updates aim to modernize family law procedures and forms, impacting various aspects of family dispute resolution and arbitration processes.
Source: Federal Circuit and Family Court of Australia - April 1, 2025
U.S. Tariffs Spark Global Economic Concerns
Summary:
U.S. President Donald Trump has announced a 50% increase in tariffs on Chinese imports, escalating trade tensions and causing significant volatility in global stock markets. Australian Treasurer Jim Chalmers stated that while Australia can manage the immediate effects, the country's economic growth is expected to slow due to global repercussions, particularly from the resulting trade war between the U.S. and China. Treasury analysis indicated Australia's GDP would be 0.1% lower this year than previously forecasted, and inflation would rise by 0.2 percentage points. Despite these pressures, Chalmers emphasized that a recession is not expected, with the economy poised for continued growth, supported by increased consumer spending driven by easing inflation and tax cuts.
Sources: The Guardian - April 8, 2025, Reuters - April 7, 2025
NSW Public Hospital Doctors Begin Three-Day Strike Over Pay and Conditions
Summary:
Thousands of doctors in New South Wales public hospitals have commenced a three-day strike starting today, protesting against unsustainable workloads, chronic understaffing, and inadequate pay. The Australian Salaried Medical Officers' Federation (ASMOF) is demanding a 30% pay increase over time, citing excessive workloads and unsafe shift patterns as critical issues. The industrial action is expected to impact elective surgeries and specialist outpatient appointments, primarily at major Sydney hospitals, while emergency services will remain operational but with reduced staffing levels. The strike proceeds despite an Industrial Relations Commission order against such action, making it potentially illegal. The government has urged patients with urgent medical needs to seek emergency care, while those with non-urgent needs are advised to consider alternative healthcare options. Sources: The Guardian - April 7, 2025, ABC News - April 7, 2025, News.com.au - April 2, 2025
World War II Veteran Celebrates 100th Birthday Summary:
Mr. Roy Porter, a World War II veteran, celebrates his 100th birthday. Porter served as a tail-gunner with the Royal Australian Air Force’s 18 Squadron during the war. After returning, he married Norma in 1949, and they have spent over seven decades together in Ocean Grove, Australia. Despite health challenges, both remain mentally sharp and reflect on a century marked by service and love.
Sources: Herald Sun - April 8, 2025
Australian Government Officials Surprised by U.S. Beef Export Comments
Summary:
Australian government officials were taken aback by U.S. President Donald Trump's remarks regarding Australian beef exports. The U.S. administration's concerns appear to be based on inflated figures, with Australian officials clarifying that beef exports to the U.S. are valued closer to $2 billion, not $29 billion as suggested.
Sources: Sky News - April 8, 2025
Donald Trump Threatens 104% Tariff on Chinese Imports
Summary:
U.S. President Donald Trump has threatened to impose a 104% tariff on Chinese goods if China does not withdraw its 34% tariff on American products by April 8, 2025. This escalation has contributed to significant volatility in global stock markets, with concerns about a potential trade war intensifying. The Chinese government has yet to respond to this ultimatum.
Sources: ABC News - April 8, 2025, Sky News - April 8, 2025
Plastic Pollution on Australian Coastlines Drops by 39%
Summary:
Research by CSIRO indicates a 39% reduction in plastic pollution along Australia's metropolitan coastlines over the past decade. The study attributes this decline to effective waste management strategies and increased public awareness, highlighting significant progress in addressing coastal environmental challenges.
Sources: CSIRO - April 8, 2025
Trump’s FDA Chief Dr. Marty Makary Slams Medical Dogma in Healthcare
Summary:
In this episode of the "Dad Saves America" podcast, Dr. Marty Makary, former FDA Chief under President Trump, critiques entrenched medical dogmas that hinder innovation and patient care. He emphasizes the necessity for healthcare professionals to challenge outdated practices and adopt evidence-based approaches.
Key Discussions:
-
Medical Dogma vs. Innovation: Dr. Makary discusses how rigid adherence to traditional medical practices can obstruct the adoption of innovative treatments and technologies.
-
Patient-Centered Care: He advocates for a shift towards more personalized healthcare, emphasizing the importance of tailoring treatments to individual patient needs rather than relying solely on standardized protocols.
-
Transparency in Healthcare: The conversation highlights the need for greater transparency in medical practices and pricing to empower patients and foster trust in the healthcare system.
Insights:
-
Challenging established medical norms is crucial for progress and improving patient outcomes.
-
Embracing innovation requires a balance between evidence-based practices and openness to new methodologies.
-
Enhancing transparency can lead to more informed decisions by patients and promote accountability within the healthcare industry.
For a more in-depth exploration of these topics, listen to the full episode on Spotify: Dad Saves America Podcast - Episode with Dr. Marty Makary
-
-
@ a396e36e:ec991f1c
2025-04-07 23:46:01Introduction
In recent years, the term "the new normal" has been used to describe a world reshaped by pandemic policies, inflationary economic measures, rising surveillance, and growing cultural compliance. For many, this phrase signals safety and adaptation. But for others, it marks an era of overreach and loss of personal autonomy. At the heart of the digital resistance to this new order stands an unlikely champion: Bitcoin.
More than a volatile investment or tech novelty, Bitcoin has become a tool of protest, a lifeline for dissidents, and a vehicle for economic sovereignty. As governments expand control over currencies, transactions, and narratives, Bitcoin's decentralized, censorship-resistant architecture offers a parallel path. This post explores how Bitcoin is used to challenge the core pillars of the new normal.
- Pandemic-Era Restrictions and Bitcoin as a Lifeline
During the COVID-19 pandemic, governments worldwide implemented measures ranging from lockdowns to vaccine passports and mass surveillance. For many protestors, these policies were seen not as safety measures, but as infringements on civil liberties.
In Nigeria, during the #EndSARS protests against police brutality, bank accounts of organizers were frozen. Bitcoin became the fallback. Donations poured in through decentralized wallets, bypassing government censors. Similarly, in Canada’s 2022 Freedom Convoy, traditional fundraising platforms were blocked. Activists turned to Bitcoin, distributing funds peer-to-peer using QR codes, out of reach from centralized authority.
These examples underscore Bitcoin’s core strength: permissionless value transfer. No bank account, no ID, no government approval required. It provided activists with the means to continue their work even under financial siege.
- Economic Collapse and the Return to Sound Money
The economic fallout from pandemic stimulus measures has been immense. In the U.S. alone, over $5 trillion in stimulus spending contributed to record-breaking inflation, eroding the purchasing power of fiat currencies. Central banks worldwide flooded markets with newly created money, leading to a global crisis of confidence in fiat.
Bitcoin offered an escape route. With its capped supply of 21 million coins and transparent monetary policy, it attracted investors, corporations, and citizens looking to hedge against inflation and financial mismanagement. In countries like Turkey, Argentina, and Venezuela, where national currencies collapsed, Bitcoin emerged as a digital safe haven.
More than a hedge, Bitcoin became a symbol of protest. Where governments printed wealth out of thin air, Bitcoiners opted out. For them, stacking sats (satoshis) wasn't just financial planning—it was civil disobedience against fiat excess.
- CBDCs, Programmable Money, and the Case for Financial Autonomy
Central Bank Digital Currencies (CBDCs) are on the rise. Promoted as modern, efficient alternatives to cash, they also raise alarms for privacy advocates. Programmable money, expiration dates on stimulus funds, restrictions on purchases—these aren’t speculative fears. They’re openly discussed features.
Bitcoin offers the inverse: a financial system without surveillance, control, or gatekeeping. Unlike CBDCs, it is neutral, global, and governed by code, not political whim. Where CBDCs threaten to tether money to state approval, Bitcoin affirms the right to transact freely.
In this context, adopting Bitcoin is more than a tech choice. It’s a rejection of programmable compliance in favor of financial autonomy.
- Censorship, Compliance Culture, and the Sovereign Individual
Beyond economics and health, the new normal is marked by growing censorship and behavioral control. From deplatforming to frozen bank accounts, those who dissent often find their financial access cut off.
Bitcoin resists this. It doesn’t care who you are, what you believe, or where you live. As long as you control your private keys, your funds are yours.
This neutrality makes Bitcoin a sanctuary for the politically persecuted, the economically excluded, and the privacy-conscious. It’s not about hiding—it’s about freedom by design. In a time when expressing the wrong opinion can cost you your livelihood, Bitcoin offers a parallel economy where your rights don’t expire when you disagree.
Conclusion
Bitcoin is not a panacea. It doesn’t guarantee utopia, and it's not immune to misuse. But in the context of expanding state power, algorithmic governance, and compliant culture, it stands out as one of the few tools that empowers individuals to say "no."
To use Bitcoin today is to engage in a subtle form of protest. It is to opt out of a system many see as rigged, to reclaim privacy, and to assert control over one’s economic life. For those resisting the new normal—not with slogans, but with actions—Bitcoin is not just code. It’s civil disobedience made digital.
-
@ a7f85dfe:27305a2b
2025-04-07 23:26:25{"coverurl":"https://cdn.nostrcheck.me/a7f85dfe651aaa0b47d69659266f434479e40558a640a308a8f6769627305a2b/e9801593f2ea4560c55a6a2651788620cfe6c587c17c08f0e8023f06e7ffaf31.webp","title":"proxmox安装记录","author":"npub15lu"}
-
@ 2e8970de:63345c7a
2025-04-07 20:44:00the total number of U.S. forces in the Middle East has now reached 300,000 personnel, including both combat and administrative units.
The US normally has a total of 156,000 military personnel stationed overseas. Trump has suddenly doubled that number in just the Middle East. The Carl Vincent carrier group is relocating to the Red Sea, and half our active B2 bombers are in Diego Garcia. He’s going to bomb Iran.
https://x.com/davegreenidge57/status/1908826028467696075
originally posted at https://stacker.news/items/937451
-
@ 2e8970de:63345c7a
2025-04-07 19:49:08https://www.cnbc.com/amp/2025/04/07/peter-navarro-says-vietnams-0percent-tariff-offer-is-not-enough-its-the-non-tariff-cheating-that-matters.html
Vietnam is the US fastest growing trading partner and is helping to diversify away from China. Their offer to make imports from the US import tax free was rejected from the Trump administration.
This is a strong indicator that Trumps overall strategy isn't to use tariffs as a bargaining chip. It seems like the tariffs are the goal, not the means to an end.
originally posted at https://stacker.news/items/937410
-
@ f1577c25:de26ba14
2025-04-07 19:39:37احنا المرة اللي فاتت اتكلمنا عن الاساسيات تعالي بقي نتكلم بشكل عام علي الطرق اللي في وجهه نظري احسن طرق و هقولك ليه و تبدا بمين الاول و كمان كل طريقه هسيب لك ليها لينك تشرح التطبيق عنه بشكل مفصل اكتر بحيث تعرف الحلو و الوحش و الحد الادني و كل دا
البورصة الأمريكية
- العملة: دولار
- العائد المتوقع: ~10% سنوياً
- الحد الأدنى: ~100 جنيه
- الورق المطلوب: باسبور
- المميزات:
- استثمار دولاري
- سهولة الإيداع بالعملات الرقمية
- إمكانية السحب في أي وقت
- العيوب:
- تحتاج جواز سفر
- تتطلب معرفة بالشركات
- تقلبات السوق علي المدي القصير
- ملاحظات: لو لسة جديد بس معاك حساب دولاري يبقي انصحك بـ IBKR علشان سهل ولكن لو معكش حساب دولاري يبقي Tastytrade علشان سهل الايداع بالكريبتو
العملات الرقمية
- العملة: دولار
- العائد المتوقع: ~10% سنوياً (متغير)
- الحد الأدنى: ~100 جنيه
- الورق المطلوب: بطاقة
- المميزات:
- عائد يومي
- استثمار دولاري
- سهولة السحب
- العيوب:
- العائد متغير
- مخاطر الأمان
- ملاحظات: هنا قصدي منتجات Earn زي في بينانس
ذهب (عالمي)
- العملة: دولار
- العائد المتوقع: متغير حسب سعر الذهب
- الحد الأدنى: ~100 جنيه
- الورق المطلوب: بطاقة
- المميزات:
- الذهب بسعر السوق العالمي
- تحوط ضد التضخم
- العيوب:
- تقلبات السوق علي المدي القصير
- استثمار طويل الأجل
- مخاطر الامان
- ملاحظات: الذهب العالمي قصدي انه تحول عملات ل PAXG في بينانس او Kraken
عقارات (عالمي)
- العملة: دولار
- العائد المتوقع: ~9-10% سنوياً
- الحد الأدنى: ~50 دولار في موقع Realt و ~135 لو موقع Stake
- الورق المطلوب: باسبور
- المميزات:
- استثمار دولاري
- عائد شهري
- العيوب:
- استثمار طويل الأجل
- لو Stake فا تقدر تسحب فلوسك مرتين بالسنة بس
- تحتاج باسبور
- تقلبات السوق
- ملاحظات: في تطبيقين RealT للسوق الامريكي و Stake للسوق الامراتي او السعودي
فوري يومي
- العملة: جنيه مصري
- العائد المتوقع: ~24%
- الحد الأدنى: ~3 جنيه
- الورق المطلوب: بطاقة
- المميزات:
- سهولة الاستخدام
- عائد يومي
- بدون حد أدنى عالي
- العيوب:
- بالجنيه المصري
- عائد أقل من شهادات البنك (الي الان)
- تقلبات العائد
- ملاحظات: قصدي تطبيق فوري يومي
عقارات (محلي)
- العملة: جنيه مصري
- العائد المتوقع: الفعلي 9% ولكن متوقع 28-48% (متوسط 32%)
- الحد الأدنى: 50,000 جنيه
- الورق المطلوب: بطاقة
- المميزات:
- عائد سنوي مرتفع
- العائد مربوط بالدولار بمعني لو حصل تعويم العائد بتاعك هيزيد فا مقاوم للتضخم.
- سهولة الاستخدام
- العيوب:
- حجز الأموال 6 شهور
- 50 ألف حد أدنى
- ضرائب عقارية
- ملاحظات: قصدي تطبيق Safe
شهادات البنك
- العملة: جنيه مصري
- العائد المتوقع: 27% او 30% بعائد تناقصي
- الحد الأدنى: 1000 جنيه
- الورق المطلوب: بطاقة
- المميزات:
- عائد مرتفع
- العيوب:
- بالجنيه المصري
- متقدرش تسحب فلوسك غير بعد مدة الشهادة.
- ملاحظات: دخولك هنا او لا و العائد شهري او سنوي يبقي علي حسب هدفك
ذهب (محلي)
- العملة: جنيه مصري
- العائد المتوقع: متغير حسب سعر الذهب
- الحد الأدنى: ~18 جنيه
- الورق المطلوب: بطاقة
- المميزات:
- قيمة ثابتة ومستقرة
- سهولة الشراء
- الحد الادني صغير لو سهم في صندوق زي AZG
- العيوب:
- يحتاج مبلغ عالي للدخول لو حقيقي
- تقلبات السوق علي المدي القصير
- ملاحظات: يعتبر خيار حلو بس انا شايف لو هتدخل بدهب يبقي عالمي + قصدي ذهب بجد او عن طريق صناديق الذهب زي AZG
كمل قراية بالتفصيل:
nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xvurzvfsxuerzvphcvddg0
nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xvunzvesx5erywpsepywcn
nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xvunzdpcxq6nxwp3xqxgmx
nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xscrqdesxycnvv34l5ye0c
nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xvungvfsx5cnvv3ndwszwl
nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xscrqdpnxc6rvvee3fqr5t
nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xscrqdesxucrjdehs24uge
ادعمني (اختياري)
- USDT (TRC20):
TKQ3Uwkq21ntiua2Zh9Hu376fdMdnRGWN6
آخر تحديث: 4 أبريل 2025
-
@ da0b9bc3:4e30a4a9
2025-04-07 18:59:28Hello Stackers!
It's Monday so we're back doing "Meta Music Mondays" 😉.
From before the territory existed there was just one post a week in a ~meta take over. Now each month we have a different theme and bring music from that theme.
This month is April and we're doing what it...?. So give me those what if tracks.
Here's and example;
What if, Another Brick in the Wall was EDM?
Let's have fun.
https://youtu.be/uLMobfyKB9o?si=vD9OMd6irvFG2vP
Talk Music. Share Tracks. Zap Sats.
originally posted at https://stacker.news/items/937359
-
@ 39f70015:9d4e378a
2025-04-07 17:28:03This is a copy of chapter four of Mastering Bitcoin Cash. I'm using it to test out creating long-form content on highlighter.com.
This is an edit after the original post. I want to test how editing long-form content works on Nostr.
4. Transactions
Introduction
Transactions are the most important part of the Bitcoin Cash system. Everything else in Bitcoin Cash is designed to ensure that transactions can be created, propagated on the network, validated, and finally added to the global ledger of transactions (the blockchain). Transactions are data structures that encode the transfer of value between participants in the Bitcoin Cash system. Each transaction is a public entry in Bitcoin Cash’s blockchain, the global double-entry bookkeeping ledger.
In this chapter we will examine all the various forms of transactions, what they contain, how to create them, how they are verified, and how they become part of the permanent record of all transactions.
Transaction Lifecycle
A transaction’s lifecycle starts with the transaction’s creation, also known as origination. The transaction is then signed with one or more signatures indicating the authorization to spend the funds referenced by the transaction. The transaction is then broadcast on the Bitcoin Cash network, where each network node (participant) validates and propagates the transaction until it reaches (almost) every node in the network. Finally, the transaction is verified by a mining node and included in a block of transactions that is recorded on the blockchain.
Once recorded on the blockchain and confirmed by sufficient subsequent blocks (confirmations), the transaction is a permanent part of the Bitcoin Cash ledger and is accepted as valid by all participants. The funds allocated to a new owner by the transaction can then be spent in a new transaction, extending the chain of ownership and beginning the lifecycle of a transaction again.
Creating Transactions
In some ways it helps to think of a transaction in the same way as a paper check. Like a check, a transaction is an instrument that expresses the intent to transfer money and is not visible to the financial system until it is submitted for execution. Like a check, the originator of the transaction does not have to be the one signing the transaction.
Transactions can be created online or offline by anyone, even if the person creating the transaction is not an authorized signer on the account. For example, an accounts payable clerk might process payable checks for signature by the CEO. Similarly, an accounts payable clerk can create Bitcoin Cash transactions and then have the CEO apply digital signatures to make them valid. Whereas a check references a specific account as the source of the funds, a Bitcoin Cash transaction references a specific previous transaction as its source, rather than an account.
Once a transaction has been created, it is signed by the owner (or owners) of the source funds. If it is properly formed and signed, the signed transaction is now valid and contains all the information needed to execute the transfer of funds. Finally, the valid transaction has to reach the Bitcoin Cash network so that it can be propagated until it reaches a miner for inclusion in the pubic ledger (the blockchain).
Broadcasting Transactions to the Bitcoin Cash Network
First, a transaction needs to be delivered to the Bitcoin Cash network so that it can be propagated and included in the blockchain. In essence, a Bitcoin Cash transaction is just 300 to 400 bytes of data and has to reach any one of tens of thousands of Bitcoin Cash nodes. The senders do not need to trust the nodes they use to broadcast the transaction, as long as they use more than one to ensure that it propagates. The nodes don’t need to trust the sender or establish the sender’s "identity." Because the transaction is signed and contains no confidential information, private keys, or credentials, it can be publicly broadcast using any underlying network transport that is convenient. Unlike credit card transactions, for example, which contain sensitive information and can only be transmitted on encrypted networks, a Bitcoin Cash transaction can be sent over any network. As long as the transaction can reach a Bitcoin Cash node that will propagate it into the Bitcoin Cash network, it doesn’t matter how it is transported to the first node.
Bitcoin Cash transactions can therefore be transmitted to the Bitcoin Cash network over insecure networks such as WiFi, Bluetooth, NFC, Chirp, barcodes, or by copying and pasting into a web form. In extreme cases, a Bitcoin Cash transaction could be transmitted over packet radio, satellite relay, or shortwave using burst transmission, spread spectrum, or frequency hopping to evade detection and jamming. A Bitcoin Cash transaction could even be encoded as smileys (emoticons) and posted in a public forum or sent as a text message or Skype chat message. Bitcoin Cash has turned money into a data structure, making it virtually impossible to stop anyone from creating and executing a Bitcoin Cash transaction.
Propagating Transactions on the Bitcoin Cash Network
Once a Bitcoin Cash transaction is sent to any node connected to the Bitcoin Cash network, the transaction will be validated by that node. If valid, that node will propagate it to the other nodes to which it is connected, and a success message will be returned synchronously to the originator. If the transaction is invalid, the node will reject it and synchronously return a rejection message to the originator.
The Bitcoin Cash network is a peer-to-peer network, meaning that each Bitcoin Cash node is connected to a few other Bitcoin Cash nodes that it discovers during startup through the peer-to-peer protocol. The entire network forms a loosely connected mesh without a fixed topology or any structure, making all nodes equal peers. Messages, including transactions and blocks, are propagated from each node to all the peers to which it is connected, a process called "flooding." A new validated transaction injected into any node on the network will be sent to all of the nodes connected to it (neighbors), each of which will send the transaction to all its neighbors, and so on. In this way, within a few seconds a valid transaction will propagate in an exponentially expanding ripple across the network until all nodes in the network have received it.
The Bitcoin Cash network is designed to propagate transactions and blocks to all nodes in an efficient and resilient manner that is resistant to attacks. To prevent spamming, denial-of-service attacks, or other nuisance attacks against the Bitcoin Cash system, every node independently validates every transaction before propagating it further. A malformed transaction will not get beyond one node.
Transaction Structure
A transaction is a data structure that encodes a transfer of value from a source of funds, called an input, to a destination, called an output. Transaction inputs and outputs are not related to accounts or identities. Instead, you should think of them as Bitcoin Cash amounts—chunks of Bitcoin Cash—being locked with a specific secret that only the owner, or person who knows the secret, can unlock. A transaction contains a number of fields, as shown in The structure of a transaction.
| Size | Field | Description | | --- | --- | --- | | 4 bytes | Version | Specifies which rules this transaction follows | | 1–9 bytes (VarInt) | Input Counter | How many inputs are included | | Variable | Inputs | One or more transaction inputs | | 1–9 bytes (VarInt) | Output Counter | How many outputs are included | | variable | Outputs | One or more transaction outputs | | 4 bytes | Locktime | A Unix timestamp or block number |
Table 1. The structure of a transaction
Transaction Locktime
Locktime, also known as nLockTime from the variable name used in the reference client, defines the earliest time that a transaction is valid and can be relayed on the network or added to the blockchain. It is set to zero in most transactions to indicate immediate propagation and execution. If locktime is nonzero and below 500 million, it is interpreted as a block height, meaning the transaction is not valid and is not relayed or included in the blockchain prior to the specified block height. If it is above 500 million, it is interpreted as a Unix Epoch timestamp (seconds since Jan-1-1970) and the transaction is not valid prior to the specified time. Transactions with locktime specifying a future block or time must be held by the originating system and transmitted to the Bitcoin Cash network only after they become valid. The use of locktime is equivalent to postdating a paper check.
Transaction Outputs and Inputs
The fundamental building block of a Bitcoin Cash transaction is an unspent transaction output, or UTXO. UTXO are indivisible chunks of Bitcoin Cash currency locked to a specific owner, recorded on the blockchain, and recognized as currency units by the entire network. The Bitcoin Cash network tracks all available (unspent) UTXO currently numbering in the millions. Whenever a user receives Bitcoin Cash, that amount is recorded within the blockchain as a UTXO. Thus, a user’s Bitcoin Cash might be scattered as UTXO amongst hundreds of transactions and hundreds of blocks. In effect, there is no such thing as a stored balance of a Bitcoin Cash address or account; there are only scattered UTXO, locked to specific owners. The concept of a user’s Bitcoin Cash balance is a derived construct created by the wallet application. The wallet calculates the user’s balance by scanning the blockchain and aggregating all UTXO belonging to that user.
There are no accounts or balances in Bitcoin Cash; there are only _unspent transaction outputs_ (UTXO) scattered in the blockchain.
A UTXO can have an arbitrary value denominated as a multiple of satoshis. Just like dollars can be divided down to two decimal places as cents, bitcoins can be divided down to eight decimal places as satoshis. Although UTXO can be any arbitrary value, once created it is indivisible just like a coin that cannot be cut in half. If a UTXO is larger than the desired value of a transaction, it must still be consumed in its entirety and change must be generated in the transaction. In other words, if you have a 20 Bitcoin Cash UTXO and want to pay 1 Bitcoin Cash, your transaction must consume the entire 20 Bitcoin Cash UTXO and produce two outputs: one paying 1 Bitcoin Cash to your desired recipient and another paying 19 Bitcoin Cash in change back to your wallet. As a result, most Bitcoin Cash transactions will generate change.
Imagine a shopper buying a $1.50 beverage, reaching into her wallet and trying to find a combination of coins and bank notes to cover the $1.50 cost. The shopper will choose exact change if available (a dollar bill and two quarters), or a combination of smaller denominations (six quarters), or if necessary, a larger unit such as a five dollar bank note. If she hands too much money, say $5, to the shop owner, she will expect $3.50 change, which she will return to her wallet and have available for future transactions.
Similarly, a Bitcoin Cash transaction must be created from a user’s UTXO in whatever denominations that user has available. Users cannot cut a UTXO in half any more than they can cut a dollar bill in half and use it as currency. The user’s wallet application will typically select from the user’s available UTXO various units to compose an amount greater than or equal to the desired transaction amount.
As with real life, the Bitcoin Cash application can use several strategies to satisfy the purchase amount: combining several smaller units, finding exact change, or using a single unit larger than the transaction value and making change. All of this complex assembly of spendable UTXO is done by the user’s wallet automatically and is invisible to users. It is only relevant if you are programmatically constructing raw transactions from UTXO.
The UTXO consumed by a transaction are called transaction inputs, and the UTXO created by a transaction are called transaction outputs. This way, chunks of Bitcoin Cash value move forward from owner to owner in a chain of transactions consuming and creating UTXO. Transactions consume UTXO by unlocking it with the signature of the current owner and create UTXO by locking it to the Bitcoin Cash address of the new owner.
The exception to the output and input chain is a special type of transaction called the coinbase transaction, which is the first transaction in each block. This transaction is placed there by the "winning" miner and creates brand-new Bitcoin Cash payable to that miner as a reward for mining. This is how Bitcoin Cash’s money supply is created during the mining process, as we will see in Mining and Consensus.
What comes first? Inputs or outputs, the chicken or the egg? Strictly speaking, outputs come first because coinbase transactions, which generate new Bitcoin Cash, have no inputs and create outputs from nothing.
Transaction Outputs
Every Bitcoin Cash transaction creates outputs, which are recorded on the Bitcoin Cash ledger. Almost all of these outputs, with one exception (see Data Output (OP_RETURN)) create spendable chunks of Bitcoin Cash called unspent transaction outputs or UTXO, which are then recognized by the whole network and available for the owner to spend in a future transaction. Sending someone Bitcoin Cash is creating an unspent transaction output (UTXO) registered to their address and available for them to spend.
UTXO are tracked by every full-node Bitcoin Cash client as a data set called the UTXO set or UTXO pool, held in a database. New transactions consume (spend) one or more of these outputs from the UTXO set.
Transaction outputs consist of two parts:
- An amount of Bitcoin Cash, denominated in satoshis, the smallest Bitcoin Cash unit
- A locking script, also known as an "encumbrance" that "locks" this amount by specifying the conditions that must be met to spend the output
The transaction scripting language, used in the locking script mentioned previously, is discussed in detail in Transaction Scripts and Script Language. The structure of a transaction output shows the structure of a transaction output.
| Size | Field | Description | | --- | --- | --- | | 8 bytes | Amount | Bitcoin Cash value in satoshis (108 Bitcoin Cash) | | 1–9 bytes (VarInt) | Locking-Script Size | Locking-Script length in bytes, to follow | | Variable | Locking-Script | A script defining the conditions needed to spend the output | | 1–9 bytes (VarInt) | Output Counter | How many outputs are included | | variable | Outputs | One or more transaction outputs | | 4 bytes | Locktime | A Unix timestamp or block number |
Table 2. The structure of a transaction output
In A script that calls
bitbox.Address.utxo
to find the UTXO related to an address, we use thebitbox.Address
class to find the unspent outputs (UTXO) of a specific address.Example 1. A script that calls
bitbox.Address.utxo
to find the UTXO related to an address```javascript bitbox.Address.utxo('bitcoincash:qpcxf2sv9hjw08nvpgffpamfus9nmksm3chv5zqtnz').then((result) => { console.log(result); }, (err) => { console.log(err); });
Returns the following: [{ txid: 'cc27be8846276612dfce5924b7be96556212f0f0e62bd17641732175edb9911e', vout: 0, scriptPubKey: '76a9147064aa0c2de4e79e6c0a1290f769e40b3dda1b8e88ac', amount: 0.00007021, satoshis: 7021, height: 527155, confirmations: 11879, legacyAddress: '1BFHGm4HzqgXXyNX8n7DsQno5DAC4iLMRA', cashAddress: 'bitcoincash:qpcxf2sv9hjw08nvpgffpamfus9nmksm3chv5zqtnz' } ] ```
Running the script, we see an array of objects representing unspent transaction outputs which are available to this address.
Spending conditions (encumbrances)
Transaction outputs associate a specific amount (in satoshis) to a specific encumbrance or locking script that defines the condition that must be met to spend that amount. In most cases, the locking script will lock the output to a specific Bitcoin Cash address, thereby transferring ownership of that amount to the new owner. When Alice paid Bob’s Cafe for a cup of coffee, her transaction created a 0.00208507 Bitcoin Cash output encumbered or locked to the cafe’s Bitcoin Cash address. That 0.00208507 Bitcoin Cash output was recorded on the blockchain and became part of the Unspent Transaction Output set, meaning it showed in Bob’s wallet as part of the available balance. When Bob chooses to spend that amount, his transaction will release the encumbrance, unlocking the output by providing an unlocking script containing a signature from Bob’s private key.
Transaction Inputs
In simple terms, transaction inputs are pointers to UTXO. They point to a specific UTXO by reference to the transaction hash and sequence number where the UTXO is recorded in the blockchain. To spend UTXO, a transaction input also includes unlocking scripts that satisfy the spending conditions set by the UTXO. The unlocking script is usually a signature proving ownership of the Bitcoin Cash address that is in the locking script.
When users make a payment, their wallet constructs a transaction by selecting from the available UTXO. For example, to make a 0.00208507 Bitcoin Cash payment, the wallet app may select a 0.002 UTXO and a 0.00008507 UTXO, using them both to add up to the desired payment amount.
Once the UTXO is selected, the wallet then produces unlocking scripts containing signatures for each of the UTXO, thereby making them spendable by satisfying their locking script conditions. The wallet adds these UTXO references and unlocking scripts as inputs to the transaction. The structure of a transaction input shows the structure of a transaction input.
| Size | Field | Description | | --- | --- | --- | | 32 bytes | Transaction Hash | Pointer to the transaction containing the UTXO to be spent | | 4 bytes | Output Index | The index number of the UTXO to be spent; first one is 0 | | 1-9 bytes (VarInt) | Unlocking-Script Size | Unlocking-Script length in bytes, to follow | | Variable | Unlocking-Script | A script that fulfills the conditions of the UTXO locking script | | 4 bytes | Sequence Number | Currently disabled Tx-replacement feature, set to 0xFFFFFFFF |
Table 3. The structure of a transaction input
Transaction Fees
Most transactions include transaction fees, which compensate the Bitcoin Cash miners for securing the network. Mining and the fees and rewards collected by miners are discussed in more detail in Mining and Consensus. This section examines how transaction fees are included in a typical transaction. Most wallets calculate and include transaction fees automatically. However, if you are constructing transactions programmatically, or using a command-line interface, you must manually account for and include these fees.
Transaction fees serve as an incentive to include (mine) a transaction into the next block and also as a disincentive against "spam" transactions or any kind of abuse of the system, by imposing a small cost on every transaction. Transaction fees are collected by the miner who mines the block that records the transaction on the blockchain.
Transaction fees are calculated based on the size of the transaction in kilobytes, not the value of the transaction in Bitcoin Cash. Overall, transaction fees are set based on market forces within the Bitcoin Cash network. Miners prioritize transactions based on many different criteria, including fees, and might even process transactions for free under certain circumstances. Transaction fees affect the processing priority, meaning that a transaction with sufficient fees is likely to be included in the next-most–mined block, whereas a transaction with insufficient or no fees might be delayed, processed on a best-effort basis after a few blocks, or not processed at all. Transaction fees are not mandatory, and transactions without fees might be processed eventually; however, including transaction fees encourages priority processing.
The current algorithm used by miners to prioritize transactions for inclusion in a block based on their fees is examined in detail in Mining and Consensus.
Adding Fees to Transactions
The data structure of transactions does not have a field for fees. Instead, fees are implied as the difference between the sum of inputs and the sum of outputs. Any excess amount that remains after all outputs have been deducted from all inputs is the fee that is collected by the miners.
Transaction fees are implied, as the excess of inputs minus outputs:
Fees = Sum(Inputs) – Sum(Outputs)
This is a somewhat confusing element of transactions and an important point to understand, because if you are constructing your own transactions you must ensure you do not inadvertently include a very large fee by underspending the inputs. That means that you must account for all inputs, if necessary by creating change, or you will end up giving the miners a very big tip!
For example, if you consume a 20-Bitcoin Cash UTXO to make a 1-Bitcoin Cash payment, you must include a 19-Bitcoin Cash change output back to your wallet. Otherwise, the 19-Bitcoin Cash "leftover" will be counted as a transaction fee and will be collected by the miner who mines your transaction in a block. Although you will receive priority processing and make a miner very happy, this is probably not what you intended.
If you forget to add a change output in a manually constructed transaction, you will be paying the change as a transaction fee. "Keep the change!" might not be what you intended.
Let’s see how this works in practice, by looking at Alice’s coffee purchase again. Alice wants to spend 0.00208507 Bitcoin Cash to pay for coffee. To ensure this transaction is processed promptly, she will want to include a transaction fee of 1 satoshi per byte. That will mean that the total cost of the transaction will be 0.00208750. Her wallet must therefore source a set of UTXO that adds up to 0.00208750 Bitcoin Cash or more and, if necessary, create change. Let’s say her wallet has a 0.00277257-Bitcoin Cash UTXO available. It will therefore need to consume this UTXO, create one output to Bob’s Cafe for 0.00208507, and a second output with 0.00068507 Bitcoin Cash in change back to her own wallet, leaving 0.00000243 Bitcoin Cash unallocated, as an implicit fee for the transaction.
Transaction Chaining and Orphan Transactions
As we have seen, transactions form a chain, whereby one transaction spends the outputs of the previous transaction (known as the parent) and creates outputs for a subsequent transaction (known as the child). Sometimes an entire chain of transactions depending on each other—say a parent, child, and grandchild transaction—are created at the same time, to fulfill a complex transactional workflow that requires valid children to be signed before the parent is signed.
When a chain of transactions is transmitted across the network, they don’t always arrive in the same order. Sometimes, the child might arrive before the parent. In that case, the nodes that see a child first can see that it references a parent transaction that is not yet known. Rather than reject the child, they put it in a temporary pool to await the arrival of its parent and propagate it to every other node. The pool of transactions without parents is known as the orphan transaction pool. Once the parent arrives, any orphans that reference the UTXO created by the parent are released from the pool, revalidated recursively, and then the entire chain of transactions can be included in the transaction pool, ready to be mined in a block. Transaction chains can be arbitrarily long, with any number of generations transmitted simultaneously. The mechanism of holding orphans in the orphan pool ensures that otherwise valid transactions will not be rejected just because their parent has been delayed and that eventually the chain they belong to is reconstructed in the correct order, regardless of the order of arrival.
There is a limit to the number of orphan transactions stored in memory, to prevent a denial-of-service attack against Bitcoin Cash nodes. The limit is defined as MAX_ORPHAN_TRANSACTIONS in the source code of the Bitcoin Cash reference client. If the number of orphan transactions in the pool exceeds MAX_ORPHAN_TRANSACTIONS, one or more randomly selected orphan transactions are evicted from the pool, until the pool size is back within limits.
Transaction Scripts and Script Language
Bitcoin Cash clients validate transactions by executing a script, written in a Forth-like scripting language. Both the locking script (encumbrance) placed on a UTXO and the unlocking script that usually contains a signature are written in this scripting language. When a transaction is validated, the unlocking script in each input is executed alongside the corresponding locking script to see if it satisfies the spending condition.
Today, most transactions processed through the Bitcoin Cash network have the form "Alice pays Bob" and are based on the same script called a Pay-to-Public-Key-Hash script. However, the use of scripts to lock outputs and unlock inputs means that through use of the programming language, transactions can contain an infinite number of conditions. Bitcoin Cash transactions are not limited to the "Alice pays Bob" form and pattern.
This is only the tip of the iceberg of possibilities that can be expressed with this scripting language. In this section, we will demonstrate the components of the Bitcoin Cash transaction scripting language and show how it can be used to express complex conditions for spending and how those conditions can be satisfied by unlocking scripts.
Bitcoin Cash transaction validation is not based on a static pattern, but instead is achieved through the execution of a scripting language. This language allows for a nearly infinite variety of conditions to be expressed. This is how Bitcoin Cash gets the power of "programmable money."
Script Construction (Lock + Unlock)
Bitcoin Cash’s transaction validation engine relies on two types of scripts to validate transactions: a locking script and an unlocking script.
A locking script is an encumbrance placed on an output, and it specifies the conditions that must be met to spend the output in the future. Historically, the locking script was called a scriptPubKey, because it usually contained a public key or Bitcoin Cash address. In this book we refer to it as a "locking script" to acknowledge the much broader range of possibilities of this scripting technology. In most Bitcoin Cash applications, what we refer to as a locking script will appear in the source code as scriptPubKey.
An unlocking script is a script that "solves," or satisfies, the conditions placed on an output by a locking script and allows the output to be spent. Unlocking scripts are part of every transaction input, and most of the time they contain a digital signature produced by the user’s wallet from his or her private key. Historically, the unlocking script is called scriptSig, because it usually contained a digital signature. In most Bitcoin Cash applications, the source code refers to the unlocking script as scriptSig. In this book, we refer to it as an "unlocking script" to acknowledge the much broader range of locking script requirements, because not all unlocking scripts must contain signatures.
Every Bitcoin Cash client will validate transactions by executing the locking and unlocking scripts together. For each input in the transaction, the validation software will first retrieve the UTXO referenced by the input. That UTXO contains a locking script defining the conditions required to spend it. The validation software will then take the unlocking script contained in the input that is attempting to spend this UTXO and execute the two scripts.
In the original Bitcoin Cash client, the unlocking and locking scripts were concatenated and executed in sequence. For security reasons, this was changed in 2010, because of a vulnerability that allowed a malformed unlocking script to push data onto the stack and corrupt the locking script. In the current implementation, the scripts are executed separately with the stack transferred between the two executions, as described next.
First, the unlocking script is executed, using the stack execution engine. If the unlocking script executed without errors (e.g., it has no "dangling" operators left over), the main stack (not the alternate stack) is copied and the locking script is executed. If the result of executing the locking script with the stack data copied from the unlocking script is "TRUE," the unlocking script has succeeded in resolving the conditions imposed by the locking script and, therefore, the input is a valid authorization to spend the UTXO. If any result other than "TRUE" remains after execution of the combined script, the input is invalid because it has failed to satisfy the spending conditions placed on the UTXO. Note that the UTXO is permanently recorded in the blockchain, and therefore is invariable and is unaffected by failed attempts to spend it by reference in a new transaction. Only a valid transaction that correctly satisfies the conditions of the UTXO results in the UTXO being marked as "spent" and removed from the set of available (unspent) UTXO.
Combining scriptSig and scriptPubKey to evaluate a transaction script is an example of the unlocking and locking scripts for the most common type of Bitcoin Cash transaction (a payment to a public key hash), showing the combined script resulting from the concatenation of the unlocking and locking scripts prior to script validation.
Figure 1. Combining scriptSig and scriptPubKey to evaluate a transaction script
Scripting Language
The Bitcoin Cash transaction script language, called Script, is a Forth-like reverse-polish notation stack-based execution language. If that sounds like gibberish, you probably haven’t studied 1960’s programming languages. Script is a very simple language that was designed to be limited in scope and executable on a range of hardware, perhaps as simple as an embedded device, such as a handheld calculator. It requires minimal processing and cannot do many of the fancy things modern programming languages can do. In the case of programmable money, that is a deliberate security feature.
Bitcoin Cash’s scripting language is called a stack-based language because it uses a data structure called a stack. A stack is a very simple data structure, which can be visualized as a stack of cards. A stack allows two operations: push and pop. Push adds an item on top of the stack. Pop removes the top item from the stack.
The scripting language executes the script by processing each item from left to right. Numbers (data constants) are pushed onto the stack. Operators push or pop one or more parameters from the stack, act on them, and might push a result onto the stack. For example, OP_ADD will pop two items from the stack, add them, and push the resulting sum onto the stack.
Conditional operators evaluate a condition, producing a boolean result of TRUE or FALSE. For example, OP_EQUAL pops two items from the stack and pushes TRUE (TRUE is represented by the number 1) if they are equal or FALSE (represented by zero) if they are not equal. Bitcoin Cash transaction scripts usually contain a conditional operator, so that they can produce the TRUE result that signifies a valid transaction.
In Bitcoin Cash’s script validation doing simple math, the script 2 3 OP_ADD 5 OP_EQUAL demonstrates the arithmetic addition operator OP_ADD, adding two numbers and putting the result on the stack, followed by the conditional operator OP_EQUAL, which checks that the resulting sum is equal to 5. For brevity, the OP_ prefix is omitted in the step-by-step example.
The following is a slightly more complex script, which calculates 2 + 7 – 3 + 1. Notice that when the script contains several operators in a row, the stack allows the results of one operator to be acted upon by the next operator:
2 7 OP_ADD 3 OP_SUB 1 OP_ADD 7 OP_EQUAL
Try validating the preceding script yourself using pencil and paper. When the script execution ends, you should be left with the value TRUE on the stack.
Although most locking scripts refer to a Bitcoin Cash address or public key, thereby requiring proof of ownership to spend the funds, the script does not have to be that complex. Any combination of locking and unlocking scripts that results in a TRUE value is valid. The simple arithmetic we used as an example of the scripting language is also a valid locking script that can be used to lock a transaction output.
Use part of the arithmetic example script as the locking script:
3 OP_ADD 5 OP_EQUAL
which can be satisfied by a transaction containing an input with the unlocking script:
2
The validation software combines the locking and unlocking scripts and the resulting script is:
2 3 OP_ADD 5 OP_EQUAL
As we saw in the step-by-step example in Bitcoin Cash’s script validation doing simple math, when this script is executed, the result is OP_TRUE, making the transaction valid. Not only is this a valid transaction output locking script, but the resulting UTXO could be spent by anyone with the arithmetic skills to know that the number 2 satisfies the script.
Figure 2. Bitcoin Cash’s script validation doing simple math
Transactions are valid if the top result on the stack is TRUE (noted as {0x01}), any other non-zero value or if the stack is empty after script execution. Transactions are invalid if the top value on the stack is FALSE (a zero-length empty value, noted as {}) or if script execution is halted explicitly by an operator, such as OP_VERIFY, OP_RETURN, or a conditional terminator such as OP_ENDIF.
Turing Incompleteness
The Bitcoin Cash transaction script language contains many operators, but is deliberately limited in one important way—there are no loops or complex flow control capabilities other than conditional flow control. This ensures that the language is not Turing Complete, meaning that scripts have limited complexity and predictable execution times. Script is not a general-purpose language. These limitations ensure that the language cannot be used to create an infinite loop or other form of "logic bomb" that could be embedded in a transaction in a way that causes a denial-of-service attack against the Bitcoin Cash network. Remember, every transaction is validated by every full node on the Bitcoin Cash network. A limited language prevents the transaction validation mechanism from being used as a vulnerability.
Stateless Verification
The Bitcoin Cash transaction script language is stateless, in that there is no state prior to execution of the script, or state saved after execution of the script. Therefore, all the information needed to execute a script is contained within the script. A script will predictably execute the same way on any system. If your system verifies a script, you can be sure that every other system in the Bitcoin Cash network will also verify the script, meaning that a valid transaction is valid for everyone and everyone knows this. This predictability of outcomes is an essential benefit of the Bitcoin Cash system.
Standard Transactions
In the first few years of Bitcoin Cash’s development, the developers introduced some limitations in the types of scripts that could be processed by the reference client. These limitations are encoded in a function called isStandard(), which defines five types of "standard" transactions. These limitations are temporary and might be lifted by the time you read this. Until then, the five standard types of transaction scripts are the only ones that will be accepted by the reference client and most miners who run the reference client. Although it is possible to create a nonstandard transaction containing a script that is not one of the standard types, you must find a miner who does not follow these limitations to mine that transaction into a block.
Check the source code of the Bitcoin Core client (the reference implementation) to see what is currently allowed as a valid transaction script.
The five standard types of transaction scripts are pay-to-public-key-hash (P2PKH), public-key, multi-signature (limited to 15 keys), pay-to-script-hash (P2SH), and data output (OP_RETURN), which are described in more detail in the following sections.
Pay-to-Public-Key-Hash (P2PKH)
The vast majority of transactions processed on the Bitcoin Cash network are P2PKH transactions. These contain a locking script that encumbers the output with a public key hash, more commonly known as a Bitcoin Cash address. Transactions that pay a Bitcoin Cash address contain P2PKH scripts. An output locked by a P2PKH script can be unlocked (spent) by presenting a public key and a digital signature created by the corresponding private key.
For example, let’s look at Alice’s payment to Bob’s Cafe again. Alice made a payment of 0.00208507 Bitcoin Cash to the cafe’s Bitcoin Cash address. That transaction output would have a locking script of the form:
OP_DUP OP_HASH160 <Cafe Public Key Hash> OP_EQUAL OP_CHECKSIG
The Cafe Public Key Hash is equivalent to the Bitcoin Cash address of the cafe, without the Base58Check encoding. Most applications would show the public key hash in hexadecimal encoding and not the familiar Bitcoin Cash address Base58Check format that begins with a "1".
The preceding locking script can be satisfied with an unlocking script of the form:
<Cafe Signature> <Cafe Public Key>
The two scripts together would form the following combined validation script:
<Cafe Signature> <Cafe Public Key> OP_DUP OP_HASH160 <Cafe Public Key Hash> OP_EQUAL OP_CHECKSIG
When executed, this combined script will evaluate to TRUE if, and only if, the unlocking script matches the conditions set by the locking script. In other words, the result will be TRUE if the unlocking script has a valid signature from the cafe’s private key that corresponds to the public key hash set as an encumbrance.
Figures and show (in two parts) a step-by-step execution of the combined script, which will prove this is a valid transaction.
Figure 3. Evaluating a script for a P2PKH transaction (Part 1 of 2)
Pay-to-Public-Key
Pay-to-public-key is a simpler form of a Bitcoin Cash payment than pay-to-public-key-hash. With this script form, the public key itself is stored in the locking script, rather than a public-key-hash as with P2PKH earlier, which is much shorter. Pay-to-public-key-hash was invented by Satoshi to make Bitcoin Cash addresses shorter, for ease of use. Pay-to-public-key is now most often seen in coinbase transactions, generated by older mining software that has not been updated to use P2PKH.
A pay-to-public-key locking script looks like this:
<Public Key A> OP_CHECKSIG
The corresponding unlocking script that must be presented to unlock this type of output is a simple signature, like this:
<Signature from Private Key A>
The combined script, which is validated by the transaction validation software, is:
<Signature from Private Key A> <Public Key A> OP_CHECKSIG
This script is a simple invocation of the CHECKSIG operator, which validates the signature as belonging to the correct key and returns TRUE on the stack.
Figure 4. Evaluating a script for a P2PKH transaction (Part 2 of 2)
Multi-Signature
Multi-signature scripts set a condition where N public keys are recorded in the script and at least M of those must provide signatures to release the encumbrance. This is also known as an M-of-N scheme, where N is the total number of keys and M is the threshold of signatures required for validation. For example, a 2-of-3 multi-signature is one where three public keys are listed as potential signers and at least two of those must be used to create signatures for a valid transaction to spend the funds. At this time, standard multi-signature scripts are limited to at most 15 listed public keys, meaning you can do anything from a 1-of-1 to a 15-of-15 multi-signature or any combination within that range. The limitation to 15 listed keys might be lifted by the time this book is published, so check the isStandard() function to see what is currently accepted by the network.
The general form of a locking script setting an M-of-N multi-signature condition is:
M <Public Key 1> <Public Key 2> ... <Public Key N> N OP_CHECKMULTISIG
where N is the total number of listed public keys and M is the threshold of required signatures to spend the output.
A locking script setting a 2-of-3 multi-signature condition looks like this:
2 <Public Key A> <Public Key B> <Public Key C> 3 OP_CHECKMULTISIG
The preceding locking script can be satisfied with an unlocking script containing pairs of signatures and public keys:
OP_0 <Signature B> <Signature C>
or any combination of two signatures from the private keys corresponding to the three listed public keys.
The prefix OP_0 is required because of a bug in the original implementation of CHECKMULTISIG where one item too many is popped off the stack. It is ignored by CHECKMULTISIG and is simply a placeholder.
The two scripts together would form the combined validation script:
OP_0 <Signature B> <Signature C> 2 <Public Key A> <Public Key B> <Public Key C> 3 OP_CHECKMULTISIG
When executed, this combined script will evaluate to TRUE if, and only if, the unlocking script matches the conditions set by the locking script. In this case, the condition is whether the unlocking script has a valid signature from the two private keys that correspond to two of the three public keys set as an encumbrance.
Data Output (OP_RETURN)
Bitcoin Cash’s distributed and timestamped ledger, the blockchain, has potential uses far beyond payments. Many developers have tried to use the transaction scripting language to take advantage of the security and resilience of the system for applications such as digital notary services, stock certificates, and smart contracts. Early attempts to use Bitcoin Cash’s script language for these purposes involved creating transaction outputs that recorded data on the blockchain; for example, to record a digital fingerprint of a file in such a way that anyone could establish proof-of-existence of that file on a specific date by reference to that transaction.
The use of Bitcoin Cash’s blockchain to store data unrelated to Bitcoin Cash payments is a controversial subject. Many developers consider such use abusive and want to discourage it. Others view it as a demonstration of the powerful capabilities of blockchain technology and want to encourage such experimentation. Those who object to the inclusion of non-payment data argue that it causes "blockchain bloat," burdening those running full Bitcoin Cash nodes with carrying the cost of disk storage for data that the blockchain was not intended to carry. Moreover, such transactions create UTXO that cannot be spent, using the destination Bitcoin Cash address as a free-form 20-byte field. Because the address is used for data, it doesn’t correspond to a private key and the resulting UTXO can never be spent; it’s a fake payment. These transactions that can never be spent are therefore never removed from the UTXO set and cause the size of the UTXO database to forever increase, or "bloat."
A compromise was reached with the introduction of the OPRETURN operator. OP_RETURN allows developers to add 220 bytes of nonpayment data to a transaction output. However, unlike the use of "fake" UTXO, the OP_RETURN operator creates an explicitly _provably unspendable output, which does not need to be stored in the UTXO set. OP_RETURN outputs are recorded on the blockchain, so they consume disk space and contribute to the increase in the blockchain’s size, but they are not stored in the UTXO set and therefore do not bloat the UTXO memory pool and burden full nodes with the cost of more expensive RAM.
``` OP_RETURN scripts look like this:
OP_RETURN ```
The data portion is limited to 220 bytes and most often represents a hash, such as the output from the SHA256 algorithm (32 bytes). Many applications put a prefix in front of the data to help identify the application per the Terab 4-byte prefix guideline for OP_RETURN on Bitcoin Cash.
Keep in mind that there is no "unlocking script" that corresponds to OPRETURN that could possibly be used to "spend" an OP_RETURN output. The whole point of OP_RETURN is that you can’t spend the money locked in that output, and therefore it does not need to be held in the UTXO set as potentially spendable—OP_RETURN is _provably un-spendable. OP_RETURN is usually an output with a zero Bitcoin Cash amount, because any Bitcoin Cash assigned to such an output is effectively lost forever. If an OP_RETURN is encountered by the script validation software, it results immediately in halting the execution of the validation script and marking the transaction as invalid. Thus, if you accidentally reference an OP_RETURN output as an input in a transaction, that transaction is invalid.
A standard transaction (one that conforms to the isStandard() checks) can have only one OP_RETURN output. However, a single OP_RETURN output can be combined in a transaction with outputs of any other type.
OP_RETURN was initially proposed with a limit of 80 bytes, but the limit was raised to 220 bytes of data on the May 15th 2018 BCH network upgrade.
Pay-to-Script-Hash (P2SH)
Pay-to-script-hash (P2SH) was introduced in 2012 as a powerful new type of transaction that greatly simplifies the use of complex transaction scripts. To explain the need for P2SH, let’s look at a practical example.
In What is Bitcoin Cash we introduced Mohammed, an electronics importer based in Dubai. Mohammed’s company uses Bitcoin Cash’s multi-signature feature extensively for its corporate accounts. Multi-signature scripts are one of the most common uses of Bitcoin Cash’s advanced scripting capabilities and are a very powerful feature. Mohammed’s company uses a multi-signature script for all customer payments, known in accounting terms as "accounts receivable," or AR. With the multi-signature scheme, any payments made by customers are locked in such a way that they require at least two signatures to release, from Mohammed and one of his partners or from his attorney who has a backup key. A multi-signature scheme like that offers corporate governance controls and protects against theft, embezzlement, or loss.
The resulting script is quite long and looks like this:
2 <Mohammed's Public Key> 5 OP_CHECKMULTISIG
Although multi-signature scripts are a powerful feature, they are cumbersome to use. Given the preceding script, Mohammed would have to communicate this script to every customer prior to payment. Each customer would have to use special Bitcoin Cash wallet software with the ability to create custom transaction scripts, and each customer would have to understand how to create a transaction using custom scripts. Furthermore, the resulting transaction would be about five times larger than a simple payment transaction, because this script contains very long public keys. The burden of that extra-large transaction would be borne by the customer in the form of fees. Finally, a large transaction script like this would be carried in the UTXO set in RAM in every full node, until it was spent. All of these issues make using complex output scripts difficult in practice.
Pay-to-script-hash (P2SH) was developed to resolve these practical difficulties and to make the use of complex scripts as easy as a payment to a Bitcoin Cash address. With P2SH payments, the complex locking script is replaced with its digital fingerprint, a cryptographic hash. When a transaction attempting to spend the UTXO is presented later, it must contain the script that matches the hash, in addition to the unlocking script. In simple terms, P2SH means "pay to a script matching this hash, a script that will be presented later when this output is spent."
In P2SH transactions, the locking script that is replaced by a hash is referred to as the redeem script because it is presented to the system at redemption time rather than as a locking script. Complex script without P2SH shows the script without P2SH and Complex script as P2SH shows the same script encoded with P2SH.
Locking Script: 2 PubKey1 PubKey2 PubKey3 PubKey4 PubKey5 5 OP_CHECKMULTISIG Unlocking Script: Sig1 Sig2
Table 4. Complex script without P2SH
Redeem Script: 2 PubKey1 PubKey2 PubKey3 PubKey4 PubKey5 5 OP_CHECKMULTISIG Locking Script: OP_HASH160 <20-byte hash of redeem script> OP_EQUAL Unlocking Script: Sig1 Sig2 redeem script
Table 5. Complex script as P2SH
As you can see from the tables, with P2SH the complex script that details the conditions for spending the output (redeem script) is not presented in the locking script. Instead, only a hash of it is in the locking script and the redeem script itself is presented later, as part of the unlocking script when the output is spent. This shifts the burden in fees and complexity from the sender to the recipient (spender) of the transaction.
Let’s look at Mohammed’s company, the complex multi-signature script, and the resulting P2SH scripts.
First, the multi-signature script that Mohammed’s company uses for all incoming payments from customers:
2 <Mohammed's Public Key> <Partner1 Public Key> <Partner2 Public Key> <Partner3 Public Key> <Attorney Public Key> 5 OP_CHECKMULTISIG
If the placeholders are replaced by actual public keys (shown here as 520-bit numbers starting with 04) you can see that this script becomes very long:
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
This entire script can instead be represented by a 20-byte cryptographic hash, by first applying the SHA256 hashing algorithm and then applying the RIPEMD160 algorithm on the result. The 20-byte hash of the preceding script is:
54c557e07dde5bb6cb791c7a540e0a4796f5e97e
A P2SH transaction locks the output to this hash instead of the longer script, using the locking script:
OP_HASH160 54c557e07dde5bb6cb791c7a540e0a4796f5e97e OP_EQUAL
which, as you can see, is much shorter. Instead of "pay to this 5-key multi-signature script," the P2SH equivalent transaction is "pay to a script with this hash." A customer making a payment to Mohammed’s company need only include this much shorter locking script in his payment. When Mohammed wants to spend this UTXO, they must present the original redeem script (the one whose hash locked the UTXO) and the signatures necessary to unlock it, like this:
<Sig1> <Sig2> <2 PK1 PK2 PK3 PK4 PK5 5 OP_CHECKMULTISIG>
The two scripts are combined in two stages. First, the redeem script is checked against the locking script to make sure the hash matches:
<2 PK1 PK2 PK3 PK4 PK5 5 OP_CHECKMULTISIG> OP_HASH160 <redeem scriptHash> OP_EQUAL
If the redeem script hash matches, the unlocking script is executed on its own, to unlock the redeem script:
<Sig1> <Sig2> 2 PK1 PK2 PK3 PK4 PK5 5 OP_CHECKMULTISIG
Pay-to-script-hash addresses
Another important part of the P2SH feature is the ability to encode a script hash as an address, as defined in BIP0013. P2SH addresses are Base58Check encodings of the 20-byte hash of a script, just like Bitcoin Cash addresses are Base58Check encodings of the 20-byte hash of a public key. P2SH addresses use the version prefix "5", which results in Base58Check-encoded addresses that start with a "3". For example, Mohammed’s complex script, hashed and Base58Check-encoded as a P2SH address becomes 39RF6JqABiHdYHkfChV6USGMe6Nsr66Gzw. Now, Mohammed can give this "address" to his customers and they can use almost any Bitcoin Cash wallet to make a simple payment, as if it were a Bitcoin Cash address. The 3 prefix gives them a hint that this is a special type of address, one corresponding to a script instead of a public key, but otherwise it works in exactly the same way as a payment to a Bitcoin Cash address.
P2SH addresses hide all of the complexity, so that the person making a payment does not see the script.
Benefits of pay-to-script-hash
The pay-to-script-hash feature offers the following benefits compared to the direct use of complex scripts in locking outputs:
- Complex scripts are replaced by shorter fingerprints in the transaction output, making the transaction smaller.
- Scripts can be coded as an address, so the sender and the sender’s wallet don’t need complex engineering to implement P2SH.
- P2SH shifts the burden of constructing the script to the recipient, not the sender.
- P2SH shifts the burden in data storage for the long script from the output (which is in the UTXO set) to the input (stored on the blockchain).
- P2SH shifts the burden in data storage for the long script from the present time (payment) to a future time (when it is spent).
- P2SH shifts the transaction fee cost of a long script from the sender to the recipient, who has to include the long redeem script to spend it.
Redeem script and isStandard validation
Prior to version 0.9.2, pay-to-script-hash was limited to the standard types of Bitcoin Cash transaction scripts, by the isStandard() function. That means that the redeem script presented in the spending transaction could only be one of the standard types: P2PK, P2PKH, or multi-sig nature, excluding OP_RETURN and P2SH itself.
As of version 0.9.2, P2SH transactions can contain any valid script, making the P2SH standard much more flexible and allowing for experimentation with many novel and complex types of transactions.
Note that you are not able to put a P2SH inside a P2SH redeem script, because the P2SH specification is not recursive. You are also still not able to use OP_RETURN in a redeem script because OP_RETURN cannot be redeemed by definition.
Note that because the redeem script is not presented to the network until you attempt to spend a P2SH output, if you lock an output with the hash of an invalid transaction it will be processed regardless. However, you will not be able to spend it because the spending transaction, which includes the redeem script, will not be accepted because it is an invalid script. This creates a risk, because you can lock Bitcoin Cash in a P2SH that cannot be spent later. The network will accept the P2SH encumbrance even if it corresponds to an invalid redeem script, because the script hash gives no indication of the script it represents.
P2SH locking scripts contain the hash of a redeem script, which gives no clues as to the content of the redeem script itself. The P2SH transaction will be considered valid and accepted even if the redeem script is invalid. You might accidentally lock Bitcoin Cash in such a way that it cannot later be spent.
-
@ 3165b802:a9f51d37
2025-04-07 17:01:23Humanrights #Human #Rights
-
@ 8f69ac99:4f92f5fd
2025-04-07 15:35:08No dia 2 de Abril de 2025, o Presidente dos Estados Unidos, Donald Trump, anunciou um novo pacote abrangente de tarifas com o objectivo de combater os desequilíbrios comerciais e revitalizar as indústrias nacionais. Foi imposta uma tarifa geral de 10% sobre todas as importações, com taxas mais elevadas—34% para a China e 20% para a União Europeia—em preparação para entrar em vigor. O anúncio reacendeu debates antigos sobre proteccionismo, globalização e o futuro do dólar norte-americano.
Embora estas medidas possam parecer extremas, as tarifas são um instrumento tradicional da política comercial internacional. Países de todo o mundo, incluindo a União Europeia, utilizam-nas rotineiramente para proteger indústrias estratégicas, regular o comércio e gerar receitas. A UE, por exemplo, impõe há muito tempo taxas sobre produtos norte-americanos como bens agrícolas, maquinaria e têxteis. Em contrapartida, os EUA já taxaram importações da UE, como o aço, alumínio e aeronaves, em disputas comerciais.
O que distingue a proposta de Trump é a sua escala, ambição e o objectivo mais amplo: reestruturar a economia dos EUA. Por detrás desta estratégia está uma realidade económica mais profunda—moldada por décadas de défices comerciais, endividamento crescente e o papel do dólar como moeda de reserva mundial. Este artigo explora como estes factores se cruzam, por que razão os EUA se encontram numa posição precária, e se políticas como tarifas elevadas, taxas de juro baixas ou até o Bitcoin podem apontar o caminho a seguir.
As Raízes da Crise: Sobreconsumo e Desindustrialização nos EUA
Durante décadas, os Estados Unidos "viveram acima das suas possibilidades", acumulando um défice comercial que actualmente ultrapassa os 800 mil milhões de dólares por ano. Este desequilíbrio—em que o país compra mais do que vende ao exterior—é sintoma de um problema mais profundo. No pós-Segunda Guerra Mundial, os EUA eram uma potência industrial. Mas, a partir dos anos 70, e com maior intensidade nos anos 90, a globalização transferiu a produção para o estrangeiro. As empresas procuraram custos de mão de obra mais baixos e os mercados norte-americanos encheram-se de produtos fabricados fora.
Para sustentar este consumo, os EUA apoiaram-se na sua posição privilegiada: a emissão da moeda de reserva mundial. Isso gerou um ciclo de endividamento, com o país a pedir emprestado ao exterior para manter o nível de vida. O resultado? Desindustrialização. Fábricas fecharam e milhões de empregos na indústria desapareceram em estados como Ohio, Michigan e Pensilvânia.
Hoje, os EUA produzem muito menos—em proporção ao seu tamanho—do que há algumas décadas, mesmo mantendo um apetite crescente por importações. O défice comercial expõe uma fragilidade estrutural: um país cada vez mais incapaz de sustentar-se através da sua própria produção. Os dólares gastos fora regressam muitas vezes sob a forma de compras de dívida pública, perpetuando o ciclo.
À medida que os défices crescem e a economia depende cada vez mais de mecanismos financeiros do que da produção real, surge uma questão inevitável: até quando poderá a América continuar a comprar a crédito antes que o cartão seja recusado?
O Dilema de Triffin: Moeda Global vs. Potência Industrial
Imagine ser a única pessoa numa cidade com uma impressora de dinheiro que todos usam. Para satisfazer a procura, continua a imprimir e a enviar notas para o exterior—até que o seu próprio negócio local entra em decadência e se torna dependente dos outros. Esta é a essência do Dilema de Triffin, e a corda bamba que os EUA têm vindo a atravessar há gerações.
O dilema surge quando a moeda de um país é usada como padrão global. O dólar—utilizado mundialmente para transacções de petróleo, comércio e reservas—precisa de estar amplamente disponível. Essa abundância provém de défices comerciais persistentes por parte dos EUA.
Mas os défices têm um custo. Os dólares enviados para fora voltam como procura por bens estrangeiros, enfraquecendo a produção interna. Porque fabricar um produto em Detroit por 10 dólares, quando se pode importar por $2? Com o tempo, isto destrói a base industrial do país.
Esta não é uma preocupação teórica—é uma realidade histórica. O economista Robert Triffin advertiu nos anos 60 que um país não pode simultaneamente manter a sua moeda como padrão mundial e conservar uma base industrial sólida. Os EUA confirmaram essa previsão. Após a guerra, os dólares ajudaram a reconstruir a Europa e o Japão, mas esses mesmos países tornaram-se concorrentes industriais dos EUA em sectores como o aço e a indústria automóvel.
As fábricas abandonadas no Midwest e os teares silenciosos no sul são marcas visíveis desta troca. O domínio do dólar concedeu influência global à América, mas às custas da sua produção.
Espiral da Dívida: Obrigações Financeiras Crescentes dos EUA
Em 2025, a dívida federal dos EUA ultrapassa os 36 biliões de dólares ($36 000 000 000 000 000 000)—cerca de 108 mil dólares por cada americano, adultos, jovens, idosos. Durante anos, o acesso fácil ao crédito e a procura global por dívida americana mascararam os riscos. Agora, as fissuras estão à vista.
O problema não é apenas o montante—é o prazo e o custo de manter esta dívida. Grande parte dela é de curto prazo, exigindo refinanciamentos frequentes. Com o aumento das taxas de juro, os custos associados disparam. Só em 2024, os pagamentos de juros ultrapassaram 1 bilião de dólares—mais do que os orçamentos combinados de educação, transportes e habitação.
A “Lei de Ferguson”, proposta pelo historiador Niall Ferguson, afirma que quando os juros da dívida superam os gastos militares, o império está em declínio. Em 2025, os EUA gastam cerca de 900 mil milhões em defesa, e os encargos com juros já os ultrapassaram.
Este ponto de viragem trouxe problemas a impérios do passado—do Reino Unido após a Primeira Guerra Mundial até Roma no seu declínio. Hoje, cresce o cepticismo quanto à saúde fiscal dos EUA. Países como a China e a Rússia estão a reduzir as suas reservas em dívida americana, preferindo ouro, yuan ou outros activos.
Se mais nações seguirem o mesmo caminho, os EUA terão de escolher: continuar a endividar-se para sustentar o sistema ou aceitar um papel reduzido para o dólar na economia mundial.
Desdolarização: A Mudança Global Longe do Dólar
A desdolarização refere-se à tendência crescente de reduzir a dependência do dólar nas transacções comerciais, reservas e sistemas financeiros. Embora o dólar ainda domine, a sua supremacia está sob crescente pressão de novas potências económicas e tensões geopolíticas.
Porque Está o Mundo a Afastar-se do Dólar?
- Risco Económico: A volatilidade do dólar, agravada pela dívida e instabilidade política nos EUA, torna-o menos fiável como reserva de valor.
- Instrumento Geopolítico: O uso do dólar pelos EUA para impor sanções leva rivais a procurar alternativas.
Alternativas Emergentes
- Ouro: Bancos centrais estão a reforçar as reservas em ouro como protecção.
- Commodities: Petróleo e cereais começam a ser transaccionados em moedas alternativas—como vendas de petróleo em yuan pela Arábia Saudita.
- Criptomoedas: Bitcoin e outros activos digitais ganham terreno como reservas neutras e descentralizadas.
- Moedas Regionais: Os países dos BRICS desenvolvem sistemas de pagamento e discutem uma moeda comum para reduzir a dependência do dólar.
Um Declínio Lento, Mas Visível
A percentagem do dólar nas reservas cambiais mundiais caiu de 70% no ano 2000 para menos de 60% actualmente. O comércio em moedas não-dólar cresceu 25% desde 2020. O domínio do dólar persiste, mas o movimento de mudança é claro.
A Estratégia Económica de Trump em 3 Etapas
Em 2025, Trump apresentou uma estratégia económica audaciosa em três frentes:
1. Tarifas Elevadas para Revitalizar a Indústria
Uma tarifa de 10% sobre todas as importações, com taxas superiores para países com superavit comercial, visa incentivar a produção interna. Críticos alertam para o aumento de preços e inflação, mas apoiantes defendem que é necessário para reindustrializar.
2. Redução das Taxas de Juro para Gerir a Dívida
A administração pressiona a Reserva Federal para baixar as taxas, reduzindo os encargos da dívida pública. Isto levanta preocupações sobre a independência do banco central e a estabilidade monetária a longo prazo.
3. Bitcoin como Activo Estratégico de Reserva
Num passo histórico, Trump assinou uma ordem executiva para criar a Reserva Estratégica de Bitcoin e o Stock Nacional de Activos Digitais. O objectivo é diversificar as reservas e proteger contra a inflação.
Riscos e Compensações
A estratégia económica de Trump não está isenta de riscos:
- Inflação: Tarifas mais altas poderão aumentar o custo de vida.
- Polarização Política: Medidas controversas poderão acentuar divisões internas.
- Incerteza Económica: O proteccionismo pode afastar investimento e travar a inovação.
- Instabilidade Monetária: Um erro na gestão da dívida ou dos activos digitais poderá enfraquecer o dólar.
Estes riscos exigem gestão cuidadosa para evitar agravar os problemas existentes.
O Papel de Bitcoin: Protecção ou Último Recurso?
Integrar Bitcoin nas reservas nacionais é ousado—mas pode ser revolucionário, e a meu ver, inevitável!
Vantagens
- Escassez: Com oferta limitada a 21 milhões de unidades, Bitcoin é deflacionário.
- Descentralização: Resistente à censura e manipulação, reforça a soberania financeira.
- Alcance Global: Sem fronteiras, permite trocas neutras num mundo multipolar.
Desafios
- Volatilidade: As flutuações no curto prazo são ainda significativas, mas a adopção institucional pode estabilizar o preço.
- Regulação: O enquadramento legal está em evolução, mas tende para maior clareza.
- Adopção Técnica: Persistem desafios de escalabilidade, embora soluções como a Lightning Network estejam a amadurecer.
A Reserva Estratégica de Bitcoin pode revelar-se visionária—ou precipitada. Tudo dependerá da execução e da aceitação global.
Futuros Possíveis: Crise ou Reinvenção?
Os EUA estão perante uma encruzilhada histórica. Um caminho aponta para a renovação: revitalizar a indústria e adoptar activos digitais, como por exemplo as stablecoins para perpetuar a hegemonia do dólar, lastreado em Bitcoin. O outro conduz à crise—com inflação, instabilidade e perda de influência global.
Num cenário optimista, os EUA emergem como líderes industriais e digitais, com reservas diversificadas que incluem Bitcoin. A recente ordem executiva para adquirir Bitcoin de forma neutra ao orçamento é um sinal positivo.
Num cenário pessimista, menos provável com as medidas em curso, o país mergulha em dívidas, vê o dólar enfraquecer e perde coesão interna. Mas com visão estratégica e inovação económica, há margem para navegar os desafios com sucesso.
Conclusão
A América enfrenta uma oportunidade única de redefinir o seu destino económico. A estratégia de Trump—baseada em tarifas, taxas de juro baixas e Bitcoin—pode marcar o início de uma nova era de resiliência e recuperação industrial.
A inclusão de Bitcoin nas reservas nacionais mostra que os instrumentos tradicionais já não bastam. Ao abraçar os activos digitais e restaurar a produção nacional, os EUA podem recuperar a liderança económica mundial.
O caminho será difícil. Mas com ousadia e execução eficaz, os Estados Unidos não só podem recuperar—podem reinventar-se.
-
@ e4950c93:1b99eccd
2025-04-07 14:34:11Équipe Cœur
L'équipe Cœur porte le projet et valide les contenus.
- Jean-David Bar : https://njump.me/npub1qr4p7uamcpawv7cr8z9nlhmd60lylukf7lvmtlnpe7r4juwxudzq3hrnll
Pour démarrer, je gère le projet en solo en partageant mes favoris pour éviter le plastique sur nous et sur nos enfants. Contactez-moi si vous souhaitez rejoindre l'aventure !
Enrichisseu-r-se-s de contenus
Les contribut-eur-rice-s rendent ce site vivant et intéressant.
A venir.
👉 En savoir plus sur les contributions
Cet article est publié sur origine-nature.com 🌐 See this article in English
-
@ a5142938:0ef19da3
2025-04-07 14:33:33Core Team
The Core Team drives the project and validates the content.
- Jean-David Bar: https://njump.me/npub1qr4p7uamcpawv7cr8z9nlhmd60lylukf7lvmtlnpe7r4juwxudzq3hrnll
To start, I'm managing the project solo by sharing my bookmarks to avoid plastic on ourselves and on our children. Contact me if you'd like to join!
Content Enrichers
Our contributors make this site engaging and interesting.
Coming soon.
👉 Learn more about contributions
This article is published on origin-nature.com 🌐 Voir cet article en français